node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
685 | 9 | Lisp_Machines:lisp machines lisp machines inc. company formed 1979 richard greenblatt mit artificial intelligence laboratory build lisp machines based cambridge massachusetts 1979 lisp machine project mit originated headed greenblatt constructed 30 cadr computers various projects mit russell noftsker formerly administrator mit artificial intelligence lab years previously since started run small company convinced computers based artificial intelligence language lisp bright future commercially number ready customers anxious get machines similar ones seen mit greenblatt noftsker differing ideas structure financing proposed company greenblatt believed company could bootstrapped i.e financed practically scratch order flow customers willing pay advance would mean principals company would retain control noftsker favored conventional venture capital model raising considerable sum money investors control company two negotiated length neither would compromise ensuing discussions choice rent lab two factions february 1979 matters came head greenblatt believed proceeds construction sale machines could profitably reinvested funding company sided noftsker believing commercial venture fund-backed company better chance surviving commercializing lisp machines greenblatt proposed self-sustaining start-up went start symbolics inc. alexander jacobson consultant cdc trying put together ai natural language computer application came greenblatt seeking lisp machine group work eight months greenblatt disastrous conference noftsker yet produce anything alexander jacobson decided way greenblatt going actually start company build lisp machines jacobson needed pushed financially helped greenblatt launch company jacobson pulled together business plans board partner f. stephen wyle greenblatt newfound company named lisp machine inc. lmi funded mostly order flow including cdc orders via jacobson following parable-like story told lmi steven levy used first time 1984 levy account hackers large part based values hackers mit artificial intelligence laboratory among hackers richard stallman levy time called last true hacker noftsker started symbolics able pay salaries n't actually building equipment programmers work bargained patrick winston exchange allowing symbolics staff keep working mit symbolics would let mit use internally freely software symbolics developed unfortunately openness would later lead accusations intellectual property theft late 1970s early 1980s prevent software used competitors computers manufacturers stopped distributing source code began using copyright restrictive software licenses limit prohibit copying redistribution proprietary software existed shift legal characteristics software regarded consequence triggered u.s copyright act 1976 stated mit fellow brewster kahle companies delivered proprietary software richard stallman believed lmi unlike symbolics tried avoid hurting lab stallman proclaimed prospect charging money software crime humanity clarified years later blocking user freedom believes crime act charging copy software symbolics recruited remaining mit hackers including notable hacker bill gosper left ai lab symbolics forced greenblatt also resign ai lab citing mit policies two years mit ai lab 1982 end 1983 stallman singlehandedly duplicated efforts symbolics programmers order prevent gaining monopoly lab computers although lmi able benefit stallman freely available code last hackers lab later programmers would sign non-disclosure agreements share source code technical information software developers lisp machines inc. sold first lisp machines designed mit lmi-cadr series internal battles symbolics began selling cadr mit lab lm-2 symbolics hindered noftsker promise give greenblatt year head start severe delays procuring venture capital symbolics still major advantage none ai lab hackers gone work greenblatt solid 14 signed onto symbolics two ai lab people choose employed either richard stallman marvin minsky symbolics ended producing around 100 lm-2s sold 70,000 companies developed second-generation products based cadr symbolics 3600 lmi-lambda lmi managed sell around 200 3600 shipped year late expanded cadr widening machine word 36-bits expanding address space 28-bits adding hardware accelerate certain common functions implemented microcode cadr lmi-lambda came year 3600 1983 mostly upward compatible cadr source cadr microcode fragments could reassembled improvements instruction fetch hardware differences including use multiplier chip faster logic family cache memory lambda processor cards designed work nubus based engineering workstation originated steve ward group mit separate chain events developed western digital corporation allowed popular lambda 2x2 configuration whereby two machines shared one infrastructure considerable savings texas instruments ti joined fray investing lmi ran money purchasing relocating nubus engineering workstation unit western digital licensing lmi-lambda design later producing variant ti explorer symbolics continued develop 3600 family operating system genera produced ivory vlsi chip implementation symbolics architecture texas instruments shrunk explorer silicon explorer ii later microexplorer lmi abandoned cadr architecture developed k-machine lmi went bankrupt 1987 machine could brought market lmi reincarnated gigamos systems greenblatt one officers gigamos ownership canadian backer named guy montpetit bought assets lmi chapter 11 bankruptcy reorganization prior incorporation gigamos lmi developed new lisp machine called k-machine used risc-like architecture montpetit subsequently became embroiled 1989 canadian political scandal side-effect resulted seizure assets gigamos rendering company unable meet payroll according richard stallman dispute lmi symbolics inspired stallman start software development gnu operating system january 1984 free software foundation fsf october 1985 forerunners open-source-software movement gnu/linux operating system | [
1522,
5077,
5012,
4543,
5501,
50,
5571,
3500,
6754,
578,
355,
267
] | Test |
686 | 9 | Mobile_3D_Graphics_API:mobile 3d graphics api mobile 3d graphics api commonly referred m3g specification defining api writing java programs produce 3d computer graphics extends capabilities java version java platform tailored embedded devices mobile phones pdas object-oriented interface consists 30 classes used draw complex animated three-dimensional scenes m3g developed java community process jsr 184. current version m3g 1.1 version 2.0 development jsr 297 m3g designed meet specific needs mobile devices constricted terms memory processing power often lack fpu graphics hardware gpu api architecture allows implemented completely inside software take advantage hardware present device m3g provides two ways developers draw 3d graphics immediate mode retained mode immediate mode graphics commands issued directly graphics pipeline rendering engine executes immediately using method developer must write code specifically tells rendering engine draw animation frame camera set lights also associated scene necessarily part immediate mode possible display single objects well entire scenes worlds camera lights background parts scene retained mode always uses scene graph links geometric objects 3d world tree structure also specifies camera lights background higher-level information object—such geometric structure position appearance—is retained frame frame m3g standard also specifies file format 3d model data including animation data allows developers create content pcs loaded m3g mobile devices | [
7442,
2520,
6280,
1803
] | Test |
687 | 3 | Memory_dependence_prediction:memory dependence prediction memory dependence prediction technique employed high-performance out-of-order execution microprocessors execute memory access operations loads stores program order predict true dependencies loads stores instruction execution time predicted dependence information processor decide speculatively execute certain loads stores order preventing loads stores executing out-of-order keeping in-order later pipeline memory disambiguation techniques used determine loads stores correctly executed recover using memory dependence predictor keep dependent loads stores order processor gains benefits aggressive out-of-order load/store execution avoids many memory dependence violations occur loads stores incorrectly executed increases performance reduces number pipeline flushes required recover memory dependence violations see memory disambiguation article information memory dependencies memory dependence violations recovery general memory dependence prediction predicts whether two memory operations dependent interact accessing memory location besides using store load raw true memory dependence prediction out-of-order scheduling loads stores applications memory dependence prediction proposed see example memory dependence prediction optimization top memory dependence speculation sequential execution semantics imply stores loads appear execute order specified program however out-of-order execution instructions may possible execute two memory operations different order implied program possible two operations independent memory dependence speculation load may allowed execute store precedes speculation succeeds load independent store two instructions access different memory locations speculation fails load dependent upon store two accesses overlap memory first modern out-of-order designs memory speculation used benefits limited αs scope out-of-order execution increased tens instructions naive memory dependence speculation used naive memory dependence speculation load allowed bypass preceding store form speculation important weight benefits correct speculation penalty paid incorrect speculation scope out-of-order execution increases several tens instructions performance benefits naive speculation decrease retain benefits aggressive memory dependence speculation avoiding costs mispeculation several predictors proposed selective memory dependence prediction stalls specific loads certain violation may occur explicitly predict dependencies predictor may delay loads longer necessary hence result suboptimal performance fact cases performs worse naively speculating loads early possible often faster mispeculate recover wait preceding stores execute exact memory dependence prediction developed university wisconsin–madison specifically dynamic speculation synchronization delays loads long necessary predicting exact store load wait predictor predicts exact dependences store load pair synonym predictor groups together dependences share common load store instruction store sets predictor represents multiple potential dependences efficiently grouping together possible stores load may dependent upon store barrier predictor treats certain store instructions barriers subsequent load store operations allowed bypass specific store store barrier predictor explicitly predict dependencies predictor may unnecessarily delay subsequent yet independent loads memory dependence prediction applications beyond scheduling loads stores example speculative memory cloaking speculative memory bypassing use memory dependence prediction streamline communication values memory memory dependence prediction loads stores analogous branch prediction conditional branch instructions branch prediction branch predictor predicts way branch resolve known processor speculatively fetch execute instructions one paths branch later branch instruction executes determined branch instruction correctly predicted branch misprediction pipeline flush necessary throw away instructions speculatively fetched executed branch prediction thought two step process first predictor determines direction branch taken binary decision predictor determines actual target address similarly memory dependence prediction thought two step process first predictor determines whether dependence determines dependence | [
5012,
1447,
5371,
3948,
7527,
7529,
5737,
2567,
4694,
5042,
1481,
5055,
2226,
1867,
2248,
6148,
441,
2266,
4047,
5483,
1556,
5487,
6198,
1568,
1570,
6922,
7666,
515,
8024,
5521,
3747,
1237,
6236,
534,
7314,
1252,
1254,
4847,
4479,
895,
... | Validation |
688 | 7 | Cloud_Security_Alliance:cloud security alliance cloud security alliance csa not-for-profit organization mission “ promote use best practices providing security assurance within cloud computing provide education uses cloud computing help secure forms computing. ” csa 80,000 individual members worldwide csa gained significant reputability 2011 american presidential administration selected csa summit venue announcing federal government ’ cloud computing strategy csa formed december 2008 coalition individuals saw need provide objective enterprise user guidance adoption use cloud computing initial work product security guidance critical areas focus cloud computing put together wiki-style dozens volunteers 2014 chairman board csa dave cullinane vp global security privacy catalina marketing st petersburg florida former ciso ebay cullinane said application exposed internet allow people make money probed 2009 cloud security alliance incorporated nevada corporation achieved us federal 501 c 6 non-profit status registered foreign non-profit corporation washington csa works support number global policy makers focus cloud security initiatives including national institute standards technology nist european commission singapore government various data protection authorities march 2012 csa selected partner three europe ’ largest research centers cern embl esa launch helix nebula – science cloud cloud security alliance employs roughly sixty full-time contract staff worldwide several thousand active volunteers participating research working groups chapters time according csa member-driven organization chartered promoting use best practices providing security assurance within cloud computing providing education uses cloud computing help secure forms computing individuals interested cloud computing experience assist making secure receive complimentary individual membership based minimum level participation cloud security alliance network chapters worldwide chapters separate legal entities cloud security alliance operate within guidelines set cloud security alliance united states chapters may elect benefit non-profit tax shield cloud security alliance chapters encouraged hold local meetings participate areas research chapter activities coordinated cloud security alliance worldwide separate legal entities europe asia pacific called cloud security alliance europe scottish company united kingdom cloud security alliance asia pacific ltd singapore legal entity responsible overseeing cloud security alliance-related activities respective regions legal entities operate agreement cloud security alliance give oversight power separate boards directors companies limited guarantee managing directors members executive team cloud security alliance cloud security alliance 25+ active working groups key areas research include cloud standards certification education training guidance tools global reach driving innovation | [
4861,
545,
308,
1328,
7803,
5135
] | Test |
689 | 2 | List_of_products_based_on_FreeBSD:list products based freebsd many products based freebsd information products version freebsd based often difficult come since fact widely publicised | [
5268,
1523,
972,
1341,
1254,
5275,
7514,
191,
5905,
6711,
1356,
8037,
1547,
4498,
7355,
481,
3457,
732,
2300,
6278,
8194,
8096,
1193,
1013,
3636,
4059,
6454,
496,
2488,
8001,
6918,
4802,
5760,
6211,
3986,
4806,
5065,
594,
4441,
4534,
58... | Test |
690 | 4 | National_Information_Assurance_Training_and_Education_Center:national information assurance training education center national information assurance training education center niatec american consortium academic industry government organizations improve literacy awareness training education standards information assurance serves develop professionals ia expertise various disciplines ultimately contributes protection national information infrastructure niatec associated idaho state university national security agency center academic excellence information assurance education centers academic excellence niatec components plan establish federal cyber-corps defend cyber-based disruption attacks niatec active development training standards associated national institute standards technology special publication 800-16 committee national security systems instructions 4011 4012 4013 4014 4015 4016 dr. corey schou director niatec dr. james frost associate director group subscribes isc ² code ethics | [
2513,
429,
3932,
6004,
5255,
8091,
1805
] | Test |
691 | 3 | Skylake_(microarchitecture):skylake microarchitecture skylake codename used intel processor microarchitecture launched august 2015 succeeding broadwell microarchitecture skylake microarchitecture redesign using 14 nm manufacturing process technology predecessor serving tock intel tick–tock manufacturing design model according intel redesign brings greater cpu gpu performance reduced power consumption skylake cpus share microarchitecture kaby lake coffee lake cannon lake cpus skylake last intel platform windows earlier windows 10 officially supported microsoft although enthusiast-created modifications exist allow windows 8.1 earlier continue receive updates later platforms processors based skylake microarchitecture marketed 6th-generation core intel officially end life discontinued skylake lga 1151 cpus march 4 2019 skylake development processors banias dothan conroe sandy bridge ivy bridge primarily undertaken intel israel engineering research center haifa israel haifa development team worked project four years faced many challenges re-writing microarchitecture developing new concepts speed shift technology created processor 4.5 w 45 w mobile devices 91 w desktop devices skylake processors used power wide range devices fanless laptops way desktops skylake features companies able release laptop pcs half thick half heavy five years ago according intel september 2014 intel announced skylake microarchitecture intel developer forum san francisco volume shipments skylake cpus scheduled second half 2015 also skylake development platform announced available q1 2015 announcement intel also demonstrated two computers desktop mobile skylake prototypes first desktop testbed system running latest version 3dmark second computer fully functional laptop playing 4k video initial batch skylake cpu models 6600k 6700k announced immediate availability gamescom august 5 2015 unusually soon release predecessor broadwell suffered launch delays intel acknowledged 2014 moving 22 nm haswell 14 nm broadwell difficult process develop yet causing broadwell planned launch slip several months yet 14 nm production back track full production q3 2014 industry observers initially believed issues affecting broadwell would also cause skylake slip 2016 intel able bring forward skylake release shorten broadwell release cycle instead result broadwell architecture unusually short run officially intel supported overclocking k x versions skylake processors however later discovered non-k chips could overclocked modifying base clock value – process made feasible base clock applying cpu ram integrated graphics skylake beta uefi firmware updates motherboard vendors asrock prominently promoted name sky oc allowed base clock modified manner february 2016 however asrock firmware update removed feature february 9 2016 intel announced would longer allow overclocking non-k processors issued cpu microcode update removes function april 2016 asrock started selling motherboards allow overclocking unsupported cpus using external clock generator january 2016 microsoft announced would end support windows 7 windows 8.1 skylake processors effective july 17 2017 date critical updates two operating systems would released skylake users judged affect reliability os older hardware windows 10 would microsoft windows platform officially supported skylake well future intel cpu microarchitectures beginning skylake successor kaby lake terry myerson stated microsoft make large investment order reliably support skylake older versions windows future generations processors would require investments microsoft also stated due age platform would challenging newer hardware firmware device driver combinations properly run windows 7 march 18 2016 response criticism move primarily enterprise customers microsoft announced revisions support policy changing cutoff support non-critical updates july 17 2018 stating skylake users would receive critical security updates windows 7 8.1 end extended support august 2016 citing strong partnership oem partners intel microsoft stated would continue fully support 7 8.1 skylake end respective lifecycles addition enthusiast-created modification released disabled windows update check allowed windows 8.1 earlier continue updated later platforms linux kernel 4.10 skylake mobile power management reasonably good shape package c states supported seeing use case cause likely bugs system firmware particular computer might resolved updating bios user easily optimize power management beyond linux default settings powertop utility use lennart poettering systemd powertop provides service start computer auto-tune various settings reduce power usage linux 4.11 enables frame-buffer compression integrated graphics chipset default lowers power consumption battery runtime similar windows 10 possibly better improvements still made skylake fully supported openbsd 6.2 later including accelerated graphics like predecessor broadwell skylake available five variants identified suffixes skl-s x skl-x h skl-h u skl-u skl-y skl-s skl-x contain overclockable k x variants unlocked multipliers h u variants manufactured ball grid array bga packaging x variants manufactured land grid array lga packaging using new socket lga 1151 lga 2066 skylake x skylake used conjunction intel 100 series chipsets also known sunrise point major changes haswell skylake architectures include removal fully integrated voltage regulator fivr introduced haswell variants use discrete platform controller hub pch direct media interface dmi 2.0 replaced dmi 3.0 allows speeds 8 gt/s skylake u variants support one dimm slot per channel h variants support two dimm slots per channel skylake launch sales lifespan occur time ongoing sdram market transition ddr3 sdram memory gradually replaced ddr4 memory rather working exclusively ddr4 skylake microarchitecture remains backward compatible interoperating types memory accompanying microarchitecture support memory standards new so-dimm type capable carrying either ddr3 ddr4 memory chips called unidimm also announced skylake p variants reduced on-die graphics unit 12 execution units enabled instead 24 execution units direct counterparts see table contrast ivy bridge cpus p suffix used cpus completely disabled on-die video chipset enhancements include thunderbolt 3.0 sata express iris pro graphics direct3d feature level 12_1 128 mb l4 edram cache certain skus skylake line processors retires vga support supporting five monitors connected via hdmi 1.4 displayport 1.2 embedded displayport edp interfaces hdmi 2.0 4k 60 hz supported motherboards equipped intel ’ alpine ridge thunderbolt controller skylake instruction set changes include intel mpx memory protection extensions intel sgx software guard extensions future xeon variants also advanced vector extensions 3.2 avx-512f skylake-based laptops may use wireless technology called rezence charging wireless technologies communication peripherals many major pc vendors agreed use technology skylake-based laptops released end 2015 integrated gpu skylake variant supports windows directx 12 feature level 12_1 opengl 4.6 latest windows 10 driver update opengl 4.5 linux opencl 2.0 standards well modern hardware video encoding/decoding formats vp9 gpu accelerated decode vp8 hevc hardware accelerated 8-bit encode/decode gpu accelerated 10-bit decode intel also released unlocked capable overclocking mobile skylake cpus unlike previous generations skylake-based xeon e3 longer works desktop chipset supports socket requires either c232 c236 chipset operate short loops specific combination instruction use may cause unpredictable system behavior cpus hyperthreading microcode update issued fix issue skylake vulnerable spectre attacks fact vulnerable processors uses indirect branch speculation indirect branches also return prediction stack underflows pause latency increased dramatically cause issues older programs libraries using pause instructions skylake processors produced five main families u h x multiple configurations available within family common features mainstream desktop skylake cpus common features high performance skylake-x cpus see also server mobile mobile workstation processors e3 series server chips consist system bus 9 gt/s max memory bandwidth 34.1 gb/s dual channel memory unlike predecessor skylake xeon cpus require either c232 c236 chipset operate | [
5012,
6793,
3942,
1465,
742,
1867,
418,
766,
5431,
6152,
441,
2977,
5802,
4759,
6170,
4765,
3020,
3717,
4077,
8024,
866,
3063,
4098,
2351,
4108,
2000,
3443,
6616,
1645,
7364,
584,
3803,
6647,
1670,
6675,
3156,
2085,
2448,
2449,
2814,
63... | Test |
692 | 3 | Rollerball_(video_game):rollerball video game pinball machine rendered rollerball composed four screens proportion would long two standard pinball tables real table graphics two four screens based various aspects new york city skyline topmost screen hereafter called bonus screen merely shows clouds blimp second screen main screen shows top empire state building third screen intermediate shows lower skyline statue liberty lowest final screen shows blue backdrop representing ocean main mode player launches ball directly main screen top small loop marked slot player sends ball loop slot machine display center screen cycles various penalties rewards given one three symbols eggplant pair cherries bell appears three times center slot loop open allowing player enter bonus screen pair kickback holes upper left main screen bumper proximity upper one lower one shoot ball straight relying curvature wall direct upper hole player lucky ball falls upper hole one two things happen kickback slot bonus screen empty ball transferred slot another ball released plunger enter play kickback slot already filled ball relaunched lower hole intermediate screen viable way returning main screen kickback hole upper left screen initially fires main screen entered switches directions every time used player gets three cherries main screen slot hole always shoot ball upwards otherwise chances score screen desirable place ball three sets three drop targets set three slots game begins light letter lit first slot one set three drop targets chosen marked flashing green light additionally bonus tally screen begins 3,000 points completing set drop targets increases bonus tally sending ball slot light lit one move light flipping flippers adds current tally player score lower screen however least desirable place ball officially drained screen however options still available player bonus screen player must shoot ball seven sensors letters phrase sky high written random forced order player must shoot ball flashing letter light activate passing non-flashing already activated letters effect done ball placed kickback hole top screen letters turn bumpers must hit numerous times remove start bonus game successfully finishing bonus gives player large sum points well extra ball first time completed increase bonus multiplier completion two sets four targets similar drop targets top corners bonus screen activated upper left targets labeled raise saver place stopper gap left wall left flipper apparatus upper right targets labeled open gate open kickback slot lower right corner locking ball kickback slot send ball play part two-ball multiball event bonus game enabled slot opened ball already locked locked ball kick entering ball back play ball passes flippers lower screen either side flippers drained end-of-ball bonus calculated tally current bonus kept gameplay shown lower screen bonus starts 1,000 points increased intervals 1,000 points play upon draining ball bonus counted 0 points added player score represent increase bonus multiplier count repeated bonus multiplier increased finishing bonus game receiving three cherries three bells main screen slot machine game ends three balls addition extra balls bonus screen drained typical final score around 300,000 points scoring 1,000,000 points enables credits final ball drained alternate mode two-player game called match play mode much smaller table one screen tall houses number buttons switches lower score player side various amounts four sensors middle table switch scores two players whenever become lit slot machine spun buttons outer walls bonus enacted hitting button top wall first player lose points loses two animals middle player area show emotion ecstasy sadness neutral indifference depending player score score margin two players japanese version left player animal elephant right player giraffe english version giraffe changed donkey likely reference republican democratic u.s. political parties | [] | Test |
693 | 3 | Stardust_(1987_video_game):stardust 1987 video game stardust top-scrolling shoot 'em developed spanish studio topo soft released uk kixx 1987 zx spectrum full version included sinclair user covertape 1991 also released amstrad cpc dos msx title screen included music composed pablo toledo music later re-used game bronx player controls small space ship called astrohunter flies surface series large enemy supercruisers way attack earth player must avoid destroy various ground targets free-flying drones order eventually reach array shield generators ship equipped gun improved collecting power-ups second weapon targets objects ground supercruisers passed astrohunter lands enemy starship pilot continues foot reach shield generators destroying generators pilot must returned ship escape | [] | Train |
694 | 3 | Athlon:athlon athlon brand name applied series x86-compatible microprocessors designed manufactured advanced micro devices amd original athlon called athlon classic first seventh-generation x86 processor first desktop processor reach speeds one gigahertz ghz made debut june 23 1999 amd continued using athlon name 64-bit athlon 64 architecture athlon ii accelerated processing unit apu chips targeting socket am1 desktop soc architecture socket am4 zen microarchitecture athlon comes ancient greek athlon meaning sport contest prize contest place contest arena amd founder then-ceo jerry sanders aggressively pursued strategic partnerships engineering talent late 1990s build earlier successes pc market amd k6 line processors one major partnership announced 1998 paired amd semiconductor giant motorola co-develop copper-based semiconductor technology resulted k7 project first commercial processor utilize copper fabrication technology announcement sanders referred partnership creating virtual gorilla would enable amd compete intel fabrication capacity limiting amd financial outlay new facilities k7 design team led dirk meyer worked lead engineer dec multiple alpha microprocessors employment dec dec sold compaq 1998 company discontinued alpha processor development sanders approached many alpha engineering staff compaq/dec wound semiconductor business able bring nearly alpha design team k7 engineering design team thus consisted previously acquired nexgen k6 team already including engineers vinod dham nearly complete alpha design team august 1999 amd released athlon k7 processor working motorola amd able refine copper interconnect manufacturing production stage one year intel revised process permitted 180-nanometer processor production accompanying die-shrink resulted lower power consumption permitting amd increase athlon clock speeds 1 ghz range yields new process exceeded expectations permitting amd deliver high speed chips volume march 2000 athlon architecture also used ev6 bus licensed dec main system bus intel required licensing use gtl+ bus used slot 1 pentium ii later processors licensing ev6 bus used alpha line processors dec amd able develop chipsets motherboards avoid dependent licensing direct competitor internally athlon fully seventh generation x86 processor first kind like amd k5 k6 athlon dynamically buffers internal micro-instructions runtime resulting parallel x86 instruction decoding cpu out-of-order design like previous post-5x86 amd cpus athlon utilizes alpha 21264 ev6 bus architecture double data rate ddr technology means 100 mhz athlon front side bus actually transfers rate similar 200 mhz single data rate bus referred 200 mt/s superior method used intel pentium iii sdr bus speeds 100 mhz 133 mhz amd designed cpu robust x86 instruction decoding capabilities k6 enhance ability keep data in-flight athlon three decoders could potentially decode three x86 instructions six microinstructions per clock although somewhat unlikely real-world use critical branch predictor unit essential keeping pipeline busy enhanced compared board k6 deeper pipelining stages allowed higher clock speeds attained whereas amd k6-iii+ topped 570 mhz due short pipeline even built 180 nm process athlon capable clocking much higher amd ended long-time handicap floating point x87 performance designing super-pipelined out-of-order triple-issue floating point unit three units tailored able calculate optimal type instructions redundancy separate units possible operate one floating point instruction fpu huge step forward amd k6 fpu looked anemic compared intel p6 fpu athlon longer case 3dnow floating point simd technology present received revisions name change enhanced 3dnow additions included dsp instructions implementation extended mmx subset intel sse athlon cpu cache consisted typical two levels athlon first x86 processor 128 kb split level 1 cache 2-way associative cache separated 2×64 kb data instructions concept harvard architecture cache double size k6 already large 2×32 kb cache quadruple size pentium ii iii 2×16 kb l1 cache initial athlon slot later called athlon classic used 512 kb level 2 cache separate cpu processor cartridge board running 50 33 core speed done 250 nm manufacturing process large allow on-die cache maintaining cost-effective die size later athlon cpus afforded greater transistor budgets smaller 180 nm 130 nm process nodes moved on-die l2 cache full cpu clock speed amd athlon processor launched june 23 1999 general availability august '99 launched 500 mhz average 10 faster pentium iii clock business applications even faster ~20 gaming workloads athlon classic cartridge-based processor named slot similar intel cartridge slot 1 used pentium ii pentium iii used commonly available physical 242 pin connector used intel slot 1 processors rotated 180 degrees connect processor motherboard reversal served make slot keyed prevent installation wrong cpu athlon intel processors used fundamentally different incompatible signaling standards front-side bus cartridge assembly allowed use higher speed cache memory modules could put reasonably bundled motherboards time similar pentium ii katmai-based pentium iii athlon classic contained 512 kb l2 cache high-speed sram cache run divisor processor clock accessed via 64-bit bus known back-side bus allowing processor service system front side bus requests rest system cache accesses simultaneously versus traditional approach pushing everything front-side bus one limitation also afflicting intel pentium iii sram cache designs time incapable keeping athlon clock scalability due manufacturing limitations cache chips difficulty routing electrical connections cache chips became increasingly difficult reliably run external processor cache match processor speeds released—and fact became impossible thus initially level 2 cache ran half cpu clock speed 700 mhz 350 mhz cache faster slot-a processors compromise run 2/5 850 mhz 340 mhz cache 1/3 1 ghz 333 mhz cache later race 1 ghz 1000 mhz amd intel exacerbated bottleneck ever higher speed processors demonstrated decreasing gains overall performance—stagnant sram cache memory speeds choked improvements overall speed directly lead development integrating l2 cache onto processor remove dependence external cache chips amd integration cache onto athlon processor would later result athlon thunderbird slot-a athlons first multiplier-locked cpus amd partly done hinder cpu remarking done questionable resellers around globe amd older cpus could simply set run whatever clock speed user chose motherboard making trivial relabel cpu sell faster grade originally intended relabeled cpus always stable overclocked tested properly damaging amd reputation although athlon multiplier locked crafty enthusiasts eventually discovered connector pcb cartridge could control multiplier eventually product called goldfingers device created could unlock cpu named gold connector pads processor board attached commercial terms athlon classic enormous success—not merits also intel endured series major production design quality control issues time particular intel transition 180 nm production process starting late 1999 running mid-2000 suffered delays shortage pentium iii parts contrast amd enjoyed remarkably smooth process transition ample supplies available causing athlon sales become quite strong argon-based athlon contained 22 million transistors measured 184 mm fabricated amd slightly modified version cs44e process 0.25 µm complementary metal–oxide–semiconductor cmos process six levels aluminium interconnect pluto orion athlons fabricated 0.18 µm process second generation athlon thunderbird debuted june 5 2000 version athlon shipped traditional pin-grid array pga format plugged socket socket motherboard also shipped slot package sold speeds ranging 600 mhz 1.4 ghz athlon classics using slot package could clock 1 ghz major difference however cache design intel done replaced old katmai-based pentium iii much faster coppermine-based pentium iii amd replaced 512 kb external reduced-speed cache athlon classic 256 kb on-chip full-speed exclusive cache general rule cache improves performance faster cache improves still amd changed cache design significantly thunderbird core older athlon cpus cpu caching inclusive design data l1 duplicated l2 cache thunderbird moved exclusive design l1 cache contents duplicated l2 increases total cache size processor effectively makes caching behave large l1 cache slower region l2 fast region l1 athlon large l1 cache exclusive design turns l2 cache basically victim cache need high l2 performance size lessened amd kept 64-bit l2 cache data bus older athlons result allowed relatively high latency simpler l2 cache reduced possibility l2 cache causing clock scaling yield issues still instead 2-way associative scheme used older athlons thunderbird move efficient 16-way associative layout thunderbird amd successful product since am386dx-40 ten years earlier mainboard designs improved considerably time initial trickle athlon mainboard makers swollen include every major manufacturer amd new fab dresden came online allowing production increases process technology improved switch copper interconnects october 2000 athlon c introduced raising mainboard front-side bus speed 100 mhz 133 mhz 266 mt/s providing roughly 10 extra performance per clock b model thunderbird amd released third-generation athlon code-named palomino october 9 2001 athlon xp xp suffix interpreted mean extended performance also unofficial reference microsoft windows xp athlon xp marketed using pr system compared relative performance athlon utilizing earlier thunderbird core athlon xp launched speeds 1.33 ghz pr1500+ 1.53 ghz pr1800+ giving amd x86 performance lead 1800+ model less month later enhanced lead release 1600 mhz 1900+ subsequent 1.67 ghz athlon xp 2000+ january 2002 palomino first k7 core include full sse instruction set intel pentium iii well amd 3dnow professional roughly 10 faster thunderbird clock speed thanks part new simd functionality several additional improvements core enhancements k7 tlb architecture added hardware data prefetch mechanism take better advantage available memory bandwidth palomino also first socketed athlon officially supporting dual processing chips certified purpose branded athlon mp according articles posted hardwarezone possible mod athlon xp function mp connecting fuses opga although results varied motherboard used changes core layout also resulted palomino frugal electrical demands consuming approximately 20 less power predecessor thus reducing heat output comparatively well preceding athlon thunderbird capable clock speeds exceeding 1400 mhz power thermal considerations required reach speeds would made increasingly impractical marketable product thus palomino goals lowered power consumption resultant heat produced allowed amd increase performance within reasonable power envelope palomino design also allowed amd continue using 180 nm manufacturing process node core voltages thunderbird palomino core debuted earlier mobile market—branded mobile athlon 4 codename corvette distinctively used ceramic interposer much like thunderbird instead organic pin grid array package used later palomino processors fourth-generation athlon thoroughbred released june 10 2002 1.8 ghz athlon xp pr2200+ thoroughbred core marked amd first production 130 nm silicon resulting significant reduction die size compared 180 nm predecessor came two steppings revisions core commonly referred tbred-a cpuid:6 8 0 tbred-b cpuid:6 8 1 initial version later known simply direct die shrink palomino demonstrated amd successfully transitioned 130 nm process successful reducing production cost per processor unmodified palomino design demonstrate expected reduction heat clock scalability usually seen design shrunk smaller process result amd able increase thoroughbred-a clock speeds much palomino replace tbred-a sold versions 1333 mhz 1800 mhz able displace production-costly palomino amd lineup amd thus reworked thoroughbred design better match process node produced turn creating thoroughbred-b significant aspect redesign addition another ninth metal layer already quite complex eight-layered thoroughbred-a comparison competing pentium 4 northwood utilized six successor prescott seven layers addition layers improve performance gives flexibility chip designers routing electrical pathways within chip importantly thoroughbred core flexibility working around electrical bottlenecks prevented processor attaining higher clock speeds tbred-b offered startling improvement headroom tbred-a made popular overclocking tbred-a often struggled reach clock speeds 1.9 ghz tbred-b often could easily reach 2.3 ghz thoroughbred line received increased front side bus clock lifetime 133 mhz 266 mt/s 166 mhz 333 mt/s improving processor ability access memory i/o efficiency resulted improved per-clock performance amd shifted pr rating scheme accordingly making lower clock speeds equate higher pr ratings thoroughbred-b direct basis successor—the tbred-b additional 256 kb l2 cache 512 kb total became barton core fifth-generation athlon barton -core processors released early 2003 pr 2500+ 2600+ 2800+ 3000+ 3200+ operating higher clock rates thoroughbred -core processors marked higher pr featuring increased 512 kb l2 cache later models additionally supported increased 200 mhz 400 mt/s front side bus thorton core later variant barton half l2 cache disabled thus functionally identical thoroughbred-b core name thorton portmanteau thoroughbred barton time barton release northwood -based pentium 4 become competitive amd processors unfortunately amd simple increase size l2 cache 512 kb nearly impact intel pentium 4 line athlon architecture nearly cache-constrained pentium 4 athlon exclusive-cache architecture shorter pipeline made less sensitive l2 cache size barton saw increase several percent gained per-clock performance thoroughbred-b derived increased performance welcome sufficient overtake pentium 4 line overall performance pr also became somewhat inaccurate barton models lower clock rates given higher pr higher-clocked thoroughbred processors instances computational task benefit additional cache make loss raw clock speed created situations lower rated faster clocked thoroughbred would outperform higher-rated lower clocked barton barton also used officially introduce higher 400 mt/s bus clock socket platform used gain barton models efficiency increased pr however clear time intel quad-pumped bus scaling well amd double-pumped ev6 bus 800 mt/s bus used many later pentium 4 processors well athlon xp reach order reach bandwidth levels athlon xp bus would clocked levels simply unreachable point four-year-old athlon ev6 bus architecture scaled limit maintain exceed performance intel newer processors would require significant redesign k7 derived athlons replaced september 2003 athlon 64 family featured on-chip memory controller completely new hypertransport bus replace ev6 barton 130 nm thorton 130 nm mobile athlon xps athlon xp-m using given core physically identical equivalent desktop athlon xps counterpart differing configuration used achieve given performance level processors usually binned selected become mobile processor ability run given processor speed supplied lower desktop voltage results lower power consumption longer battery life reduced heat using normal desktop part additionally mobile xps feature multiplier-locked generally higher-rated maximum operating temperatures requirements intended better operation within tight thermal constraints within notebook pc—but also making attractive overclocking athlon xp-m replaced older mobile athlon 4 based palomino core athlon xp-m using newer thoroughbred barton cores athlon xp-m also offered compact micropga socket 563 version space constrained applications alternative larger socket like mobile k6-2+/iii+ predecessors cpus capable dynamic clock adjustment power optimization also reason unlocked multiplier system idle cpu clocks via lower bus multiplier selects lower voltage program demands computational resources cpu quickly latency returns intermediate maximum speed appropriate voltage meet demand technology marketed powernow similar intel speedstep power saving technique feature controlled cpu motherboard bios operating system amd later renamed technology cool n'quiet k8-based cpus athlon 64 etc introduced use desktop pcs well athlon xp-ms popular desktop overclockers well underclockers lower voltage requirement higher heat rating selected cpus essentially cherry picked manufacturing line best cores line cpus typically overclocked reliably desktop-headed counterparts also fact locked single multiplier significant simplification overclocking process barton core athlon xp-ms successfully overclocked high 3.1 ghz chips also liked undervolting ability undervolting process determining lowest voltage cpu remain stable given clock speed athlon xp-m cpus already rated running lower voltages desktop siblings better starting point lowering voltage even popular application use home theater pc systems due high performance low heat output resultant low vcore settings besides multiplier locked xp-ms curiously disabled multi processor operation thus could used place expensive athlon mp dual socket motherboards since boards generally lacked multiplier voltage adjustment normally supported 133 mhz fsb adjustments would still needed full speed operation one method modification known wire-modding involves connecting appropriate cpu pins cpu socket small lengths wire select appropriate multiplier typical overclock mobile 2500+ cpu 2.26 ghz 17x multiplier would result faster highest official 2800+ mp cpu running 2.13 ghz fastest supercomputers based athlonmp | [
2539,
2449,
2541,
5799,
5804,
4847,
7163,
5559,
719,
5377,
7726,
5571,
2751,
5669,
5670,
4514,
5404,
5055,
2226,
2765,
5947,
1961,
5063,
6299,
512,
2685,
2508,
5343,
7403,
1052,
866,
694,
3063,
1237,
780,
3747,
352,
1143,
1797,
441,
235... | Test |
695 | 4 | Cisco_Security_Agent:cisco security agent cisco security agent csa endpoint intrusion prevention system made originally okena formerly named stormwatch agent bought cisco systems 2003 software rule-based examines system activity network traffic determining behaviors normal may indicate attack csa offered replacement cisco ids host sensor announced end-of-life 21 february 2003 end life action result cisco acquisition okena inc. cisco security agent product line based okena technology would replace cisco ids host sensor product line entercept result end-of-life action cisco offered no-cost one-for-one product replacement/migration program cisco ids host sensor customers new cisco security agent product line intent program support existing ids host sensor customers choose migrate new cisco security agent product line cisco ids host sensor customers eligible migration program whether customer purchased cisco software application support sas service contract cisco ids host sensor products csa uses two three-tier client-server architecture management center 'mc management console contains program logic ms sql database backend used store alerts configuration information mc sql database may co-resident system agent installed desktops and/or servers protected agent communicates management center sending logged events management center receiving updates rules occur network world article dated 17 december 2009 stated cisco hinted end-of-life csa mars full article linked 11 june 2010 cisco announced end-of-life end-of-sale csa cisco offer replacement product | [
3915,
5571,
4783,
3680,
1805
] | Test |
696 | 7 | FreshBooks:freshbooks freshbooks accounting software package developed marketed 2ndsite inc. freshbooks products geared mainly toward small medium-sized businesses offer cloud-based accounting applications send invoices clients bill time expertise company founded 2003 based toronto ontario canada company founded 2003 mike mcderment joe sawada mcderment previous internet marketing consulting business anicon company traces origins mcderment inadvertently losing invoice record overwriting 2003 sought new way manage accounting business product first eponymously named 2ndsite synonymous company company rebranded product 2006 freshbooks based toronto ontario canada freshbooks customers 160 countries july 23 2014 company announced raised 30 million usd first round institutional venture capital 2016 company unveiling new interface improved functionality load times app freshbooks offers subscription-based product includes invoicing accounts payable expense tracking time tracking retainers fixed asset depreciation purchase orders payroll integrations double-entry accounting industry-standard business management reporting financial data stored cloud single unified ledger allowing users access set books regardless location desktop mobile offers free api enables customers 3rd-party software vendors integrate external applications freshbooks freshbooks also supports multiple tax rates currencies also incorporates payroll feature projects feature freshbooks headquarters toronto canada operations north america europe australia founder mike mcderment chief executive officer company since inception 2003 2014 freshbooks raised series venture investment 30 million led venture capital firm oak investment partners participation georgian partners atlas venture 2017 company announced raised another 43 million funding accomplice georgian partners oak investment partners | [
3668,
7766,
5258,
7332,
1165,
330,
518
] | Test |
697 | 4 | Internet_Junkbuster:internet junkbuster internet junkbuster web proxy block ads cookies developed junkbusters corporation released gnu general public license however internet junkbuster updated since 1998 junkbusters.com web site longer maintained privoxy up-to-date filtering proxy based junkbuster code much powerful see also proxomitron windows-based web filter update dated november 2012 sorry junkbusters.com web site longer maintained says website article contains material infoanarchy | [
3338
] | Test |
698 | 4 | ISO_15292:iso 15292 iso 15292 information technology – security techniques – protection profile registration procedures establishes international registry operated afnor protection profiles packages used computer security evaluation common criteria framework format profiles packages specified iso 15408 iso 15292 assigns registered protection profiles packages labels form entry type-registration year-registration number example pp-2003-0001 | [
6172,
7721,
3620,
1543,
6428,
7732,
6015,
2214,
737,
4608,
4884,
6208,
1114,
5948,
1774,
2057,
2872,
2877,
3916,
1435,
7144
] | Test |
699 | 4 | Woo–Lam:woo–lam cryptography woo–lam refers various computer network authentication protocols designed simon s. lam thomas woo protocols enable two communicating parties authenticate identity exchange session keys involve use trusted key distribution center kdc negotiate parties symmetric-key public-key variants described however protocols suffer various security flaws part described inefficient compared alternative authentication protocols following notation used describe algorithm assumed parties know kdc public key original version protocol identifier formula_23 omitted lines 5 6 account fact formula_24 unique among nonces generated parties protocol revised authors spotted flaw algorithm | [
3,
2993,
1460,
6717,
1464,
3293,
3794,
4261,
6045,
1593,
6049
] | Train |
700 | 4 | Protection_mechanism:protection mechanism computer science protection mechanisms built computer architecture support enforcement security policies simple definition security policy set may use information computer system access matrix model first introduced 1971 generalized description operating system protection mechanisms separation protection security special case separation mechanism policy | [
3231,
6748,
5571,
4304,
7371
] | Validation |
701 | 3 | Kryo:kryo qualcomm kryo brand name series custom semi-custom arm-based cpus cpus implement armv8-a 64-bit instruction set serve successor older 32-bit krait core first announced september 2015 used snapdragon 820 soc kryo cores used parts big.little configuration two dual-core clusters case snapdragon 820 821 run different clock frequency similar cortex-a53 clusters work snapdragon 615 kryo 820/821 in-house custom armv8.0-a aarch64/aarch632 design based arm cortex design kryo 2xx series cpus derivative original kryo microarchitecture rather semi-custom design licensed arm ’ built arm cortex technology boc license kryo 2xx series cpus derivative arm cortex-a73 performance/gold cluster cortex-a53 efficiency/silver cluster big.little arrangement kryo 280 cpu announced along snapdragon 835 mobile platform november 2016 compared original kryo new kryo 280 core improved integer instructions per clock lower floating point instructions per clock however overall 835 praised reviewers offering significant performance efficiency advantage compared 820 exynos 8895 largely due improvements cpu scheduling dvfs systems kryo 260 cpu announced along snapdragon 660 mobile platform mid-range smartphone may 2017 kryo 260 cores also used snapdragon 636 snapdragon 665 kryo 250 cpu introduced snapdragon 632 mobile platform announced june 2018 also built 14 nm process similar kryo 260 differences size l2 cache qualcomm claims increased performance 40 compared snapdragon 625 uses cortex-a53 cores kryo 3xx series cpus features semi-custom gold silver cores derivative arm cortex-a75 cortex-a55 respectively arranged configurations dynamiq qualcomm first cpus support armv8.2-a dynamiq dynamiq allows flexibility cpu configuratoin including amounts cores/cache cpu clusters kryo 385 core announced part snapdragon 845 december 2017 qualcomm expected 25–30 increased performance task run high-performance cores 15 increase efficiency cores relative snapdragon 835 testing found significant advantages performance efficiency compared exynos 8895 9810 kryo 385 also used snapdragon 850 kryo 360 qualcomm upper mid-range semi-custom core introduced snapdragon 710 announced may 2018 kryo 360 also used snapdragon 670 712 kryo 4xx series cpus features semi-custom gold prime/gold silver cores derivative arm cortex-a76 cortex-a55 respectively arranged configurations dynamiq qualcomm reveal semi-custom cortex-a76 larger out-of-order execution window reorder buffer data prefetchers optimised floating point workloads kryo 495 cpu announced snapdragon 8cx 6 december 2018 qualcomm claims 8cx 60 efficient snapdragon 850 kryo 485 cpu announced snapdragon 855 5 december 2018 qualcomm claim 45 increase performance compared 845 kryo 385 testing found 855 outperformed 845 51 specint2006 61 specfp2006 39 power efficiency 855 also significantly efficient exynos 9820 kryo 470 cpu qualcomm upper mid-range semi-custom core introduced april 2019 snapdragon 730 730g kryo 460 cpu qualcomm mid-range semi-custom core introduced october 2018 snapdragon 675 | [
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
67,
446,
451,
6874,
6165,
463,
5472,
469,
4041,
3008,
3365,
6910,
5845,
7654,
3397,
1977,
2339,
2711,
1995,
550,
3786,
568,
2024,
5576,
4879,
7376,
5585,
4166,
4537,
950,
... | Test |
702 | 3 | Apache_Heron:apache heron apache heron distributed stream processing engine developed twitter according creators twitter scale diversity twitter data increased heron real-time analytics platform process streaming introduced sigmod 2015 | [
7238,
894,
1333,
5728,
7805,
2741,
7444,
7896,
5571,
3463,
3542,
3204,
1286,
6821,
5054,
840,
1392,
3031,
5408,
3558,
5677,
3479,
5863,
6387,
5075,
6137,
7488,
7857,
5874,
3915,
1511,
5007,
2619,
357
] | Test |
703 | 9 | Agda_(programming_language):agda programming language agda dependently typed functional programming language originally developed ulf norell chalmers university technology implementation described phd thesis original agda system developed chalmers catarina coquand 1999 current version originally known agda 2 full rewrite considered new language shares name tradition agda also proof assistant based propositions-as-types paradigm unlike coq support tactics proofs written functional programming style language ordinary programming constructs data types pattern matching records let expressions modules haskell-like syntax system emacs atom interfaces also run batch mode command line agda based zhaohui luo unified theory dependent types utt type theory similar martin-löf type theory main way defining data types agda via inductive data types similar algebraic data types non-dependently typed programming languages definition peano numbers agda basically means two ways construct value type ℕ representing natural number begin codice_1 natural number codice_2 natural number codice_3 standing successor codice_2 natural number definition less equal relation two natural numbers first constructor codice_5 corresponds axiom zero less equal natural number second constructor codice_6 corresponds inference rule allowing turn proof codice_7 proof codice_8 value codice_9 proof one successor zero less equal two successor one parameters provided curly brackets may omitted inferred core type theory induction recursion principles used prove theorems inductive types agda dependently typed pattern matching used instead example natural number addition defined like way writing recursive functions/inductive proofs natural applying raw induction principles agda dependently typed pattern matching primitive language core language lacks induction/recursion principles pattern matching translates one distinctive features agda compared similar systems coq heavy reliance metavariables program construction example one write functions like agda codice_10 metavariable interacting system emacs mode show user expected type allow refine metavariable i.e. replace detailed code feature allows incremental program construction way similar tactics-based proof assistants coq programming pure type theory involves lot tedious repetitive proofs agda support tactics instead agda support automation via reflection reflection mechanism allows one quote program fragments – unquote – abstract syntax tree way reflection used similar way template haskell works another mechanism proof automation proof search action emacs mode enumerates possible proof terms limited 5 seconds one terms fits specification put meta variable action invoked action accepts hints e.g. theorems modules used whether action use pattern matching etc agda total language i.e. program must terminate possible patterns must matched without feature logic behind language becomes inconsistent becomes possible prove arbitrary statements termination checking agda uses approach foetus termination checker agda extensive de facto standard library includes many useful definitions theorems basic data structures natural numbers lists vectors library beta active development one notable features agda heavy reliance unicode program source code standard emacs mode uses shortcuts input codice_11 σ two compiler backends malonzo haskell one javascript | [
6507,
7071,
2740,
2451,
6489,
7,
3915,
5571,
7711,
7713,
2775,
1825,
6223,
4359
] | Test |
704 | 4 | Lazy_FP_state_restore:lazy fp state restore lazy fpu state leak also referred lazy fp state restore lazyfp security vulnerability affecting intel core cpus vulnerability caused combination flaws speculative execution technology present within affected cpus certain operating systems handle context switching floating point unit fpu exploiting vulnerability local process leak content fpu registers belong another process vulnerability related spectre meltdown vulnerabilities publicly disclosed january 2018 announced intel 13 june 2018 discovered employees amazon cyberus technology sysgo besides used floating point arithmetic fpu registers also used purposes including storing cryptographic data using aes instruction set present many intel cpus means vulnerability may allow key material compromised floating point simd registers large used every task thread system make context switching faster common microprocessors support lazy state switching rather storing full state context switch operating system simply mark fpu available hopes switched-to task need operating system guessed correctly time saved guess wrong first fpu simd instruction cause trap operating system save state previous task load correct state current task out-of-order cpus fpu available condition detected immediately fact almost detected immediately may multiple fault-causing instructions executing simultaneously processor must take first fault encountered preserve illusion in-order execution information first available in-order retire stage processor speculatively executes instruction using previous task register contents following instructions later detects fpu available condition although architectural state reverted beginning faulting instruction possible use part fpu state address memory load triggering load processor cache exploitation follows pattern spectre-family vulnerabilities cache state architectural state cache affect speed correctness cache load undone address including part previous task register state later detected measuring time taken access different memory addresses possible exploit bug without actually triggering operating system traps placing fpu access shadow forced branch misprediction e.g using retpoline processor still speculatively execute code rewind mispredicted branch never actually execute operating system trap allows attack rapidly repeated quickly reading entire fpu simd register state possible mitigate vulnerability operating system hypervisor levels always restoring fpu state switching process contexts fix firmware upgrade required operating systems already lazily restore fpu registers default protecting operating systems affected hardware platforms even underlying hardware issue existed linux operating system using kernel 3.7 higher possible force kernel eagerly restore fpu registers using codice_1 kernel parameter also many system software vendors projects including linux distributions openbsd xen released patches address vulnerability | [
3932,
2912,
376,
3277,
2923,
2587,
3323,
5779,
6148,
7600,
4025,
1528,
2991,
1173,
6526,
6904,
6541,
6194,
2678,
3038,
3047,
6569,
2693,
862,
7307,
6589,
5187,
1996,
7328,
4847,
3100,
208,
2021,
5922,
6628,
924,
6647,
4531,
600,
1307,
2... | Test |
705 | 2 | Resident_set_size:resident set size computing resident set size rss portion memory occupied process held main memory ram rest occupied memory exists swap space file system either parts occupied memory paged parts executable never loaded | [
4579,
5571,
8066,
6472,
56,
4625
] | Test |
706 | 0 | Marti_Hearst:marti hearst marti hearst professor school information university california berkeley early work corpus-based computational linguistics including first work automating sentiment analysis word sense disambiguation invented algorithm became known hearst patterns applies lexico-syntactic patterns recognize hyponymy isa relations high accuracy large text collections including early application wordnet algorithm widely used commercial text mining applications including ontology learning hearst also developed early work automatic segmentation text topical discourse boundaries inventing well-known approach called texttiling hearst research user interfaces search engine technology big data analytics early work user interfaces information visualization search user interfaces inventing tilebars query term visualization flamenco research project investigated developed widely used faceted navigation approach searching browsing web sites information collections wrote first academic book topic search user interfaces cambridge university press 2009 hearst edge foundation contributing author member usage panel american heritage dictionary english language hearst received b.a. m.s. ph.d. computer science u.c berkeley 2013 became fellow association computing machinery | [
5885,
5388
] | Test |
707 | 2 | Brian_Fox_(computer_programmer):brian fox computer programmer brian j fox born 1959 american computer programmer entrepreneur consultant author free software advocate original author gnu bash shell announced beta june 1989 continued primary maintainer bash least early 1993 fox also built first interactive online banking software u.s. wells fargo 1995 created open source election system 2008 1985 fox worked richard stallman stallman newly created free software foundation fsf fox authored gnu bash gnu makeinfo gnu info gnu finger gnu echo readline history libraries also maintainer gnu emacs time made many contributions software created gnu project 1986 1994 2008 fox collaborated alan dechert brent turner create completely open source election system system coded together parker abercrombie demonstrated linuxworld conference moscone center san francisco august 5–7 2008 fox also founding member california association voting officials cavo national association voting officials navo not-for-profit organizations promote open source voting systems use public elections fox co-wrote new york times piece 2017 former cia head r. james woolsey advocating open source election systems means securing us elections russian interference fox also wrote amacs cut-down implementation emacs apple ii series fourth born family 6 siblings composer musician donal fox thaddeus fox sister ena fox daniel fox sister sara fox-ray lives santa barbara longtime partner lissa liggett three children son physicist educator herbert fox grandson artist daniel fox creator monopoly man | [
1523,
8158,
3174,
1351,
2379,
2559,
3868,
6365,
7463,
7559,
3981,
4070,
2599,
1406,
7494,
6674,
5787,
966
] | Test |
708 | 3 | Accumulator_(computing):accumulator computing computer central processing unit cpu accumulator register intermediate arithmetic logic results stored without register like accumulator would necessary write result calculation addition multiplication shift etc main memory perhaps read right back use next operation access main memory slower access register like accumulator technology used large main memory slower cheaper used register early electronic computer systems often split two groups accumulators without modern computer systems often multiple general purpose registers operate accumulators term longer common however number special-purpose processors still use single accumulator work simplify design mathematical operations often take place stepwise fashion using results one operation input next instance manual calculation worker weekly payroll might look something like computer program carrying task would follow basic sequence operations although values looked would stored computer memory early computers number hours would likely held punch card pay rate form memory perhaps magnetic drum multiplication complete result needs placed somewhere drum machine would likely back drum operation takes considerable time next operation read value back introduces another considerable delay accumulators dramatically improve performance systems like providing scratchpad area results one operation fed next one little performance penalty example basic weekly pay would calculated placed accumulator could immediately used income tax calculation removes one save one read operation sequence operations generally took tens hundreds times long multiplication accumulator machine also called 1-operand machine cpu accumulator-based architecture kind cpu although may several registers cpu mostly stores results calculations one special register typically called accumulator almost early computers accumulator machines high-performance supercomputers multiple registers mainframe systems gave way microcomputers accumulator architectures popular mos 6502 notable example many 8-bit microcontrollers still popular 2014 picmicro 8051 accumulator-based machines modern cpus typically 2-operand 3-operand machines additional operands specify one many general purpose registers also called general purpose accumulators used source destination calculations cpus considered accumulator machines characteristic distinguishes one register accumulator computer architecture accumulator architecture one would used implicit operand arithmetic instructions instance cpu might instruction like codice_1 adds value read memory location memaddress value accumulator placing result back accumulator accumulator identified instruction register number implicit instruction register specified instruction architectures use particular register accumulator instructions instructions use register numbers explicit operand specification system uses single memory store result multiple operations considered accumulator j. presper eckert refers even earliest adding machines gottfried leibniz blaise pascal accumulator-based systems percy ludgate first conceive multiplier-accumulator mac analytical machine 1909 historical convention dedicates register accumulator arithmetic organ literally accumulates number sequence arithmetic operations instructions example modern interpretation convention exists regarding names operations registers accumulator accumulator registers tradition e.g donald knuth 1973 hypothetical mix computer example uses two instructions called load accumulator register/memory e.g lda r store accumulator register/memory e.g sta r knuth model many instructions well 1945 configuration eniac 20 accumulators could operate parallel one could store eight decimal digit number add subtract number received ibm early binary scientific computers beginning vacuum tube ibm 701 1952 used single 36-bit accumulator along separate multiplier/quotient register handle operations longer results ibm 650 decimal machine one 10 digit accumulator ibm 7070 later transistorized decimal machine three accumulators 12-bit pdp-8 one first minicomputers use accumulators inspired many later machines pdp-8 one accumulator hp 2100 data general nova 2 4 accumulators nova created follow-on pdp-8 rejected favor would become pdp-11 nova provided four accumulators ac0-ac3 although ac2 ac3 could also used provide offset addresses tending towards generality usage registers pdp-11 introduced contemporary model general registers numbered r0-r7 adopted later cisc risc machines early 4-bit 8-bit microprocessors 4004 8008 numerous others typically single accumulators 8051 microcontroller two primary accumulator secondary accumulator second used instructions multiplying mul ab dividing div ab former splits 16-bit result two 8-bit accumulators whereas latter stores quotient primary accumulator remainder secondary accumulator b direct descendent 8008 8080 8086 modern ubiquitous intel x86 processors still uses primary accumulator eax secondary accumulator edx multiplication division large numbers instance mul ecx multiply 32-bit registers ecx eax split 64-bit result eax edx however mul div special cases arithmetic-logical instructions add sub cmp xor test may specify eight registers eax ecx edx ebx esp ebp esi edi accumulator i.e left operand destination also supported multiply upper half result required x86 thus fairly general register architecture despite based accumulator model 64-bit extension x86 x86-64 generalized 16 instead 8 general registers | [
2449,
3764,
5208,
6898,
3782,
7733,
6111,
4611,
1023,
6922,
5680,
2237,
1041,
949,
4540,
2155,
3747,
1237,
3156,
3918,
352,
3242,
5190,
6687
] | Validation |
709 | 5 | Serial_Line_Internet_Protocol:serial line internet protocol serial line internet protocol also slip encapsulation internet protocol designed work serial ports router connections documented personal computers slip largely replaced point-to-point protocol ppp better engineered features require ip address configuration set established microcontrollers however slip still preferred way encapsulating ip packets due small overhead people refer successful widely used serial line internet protocol rick adams slip avoid confusion proposed protocols named slip protocols include much complicated appendix serial line interface protocol slip modifies standard tcp/ip datagram slip requires serial port configuration 8 data bits parity either eia hardware flow control clocal mode 3-wire null-modem uart operation settings slip provide error detection reliant upper layer protocols therefore slip satisfactory error-prone dial-up connection however still useful testing operating systems response capabilities load looking flood-ping statistics slip escape characters also required modem connections escape hayes command set allowing therefore pass binary data modems would recognize characters commands version slip header compression called compressed slip cslip compression algorithm used cslip known van jacobson tcp/ip header compression cslip effect data payload packet independent compression serial line modem used transmission reduces transmission control protocol tcp header twenty bytes seven bytes cslip effect user datagram protocol udp datagrams | [
7148,
6871,
4294,
456,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
1543,
7170,
6619,
6531,
1462,
2650,
7637,
6815,
2119,
6908,
3462,
5492,
7091,
2219,
3383,
3640,
3797,
4249,
7916,
2043,
8008,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,... | Test |
710 | 2 | Instant-on:instant-on computers instant-on ability boot nearly instantly thus allowing go online use specific application without waiting pc traditional operating system launch instant-on technology today mostly used laptops netbooks nettops user boot one program instead waiting pc entire operating system boot instance user may want launch movie-playing program launch internet browser without needing whole operating system true instant-on machines atari st described booting article machines complete operating systems resident rom similar way bios function conventionally provided current computer architectures instant-on concept used results loading os legacy system dos small hard drive footprint latency inherent mechanical drive performance also eliminated using live usb live sd flash memory load systems electronic speeds orders magnitude faster instant-on operating system like used 1980s home computers commodore 64 offers many advantages standard modern operating system however comes price limited local functionality focusing web cloud services past consumer electronics manufacturers would emblazon radios television sets instant instant play decals series filament sets instant-on accomplished adding silicon diode across power switch keep tube filaments lit 50 power diode placed typical half wave rectifier day reverse-biased instant-on advantages included near-instant operation television radio potentially longer vacuum tube life disadvantages included energy consumption risk fire solid state consumer electronics inherently instant-on moniker survived early solid state era differentiate product vacuum-tube based brethren crts notable exception | [
3764,
1052,
5571,
3130,
7108,
578,
972,
3996,
1992,
3271
] | Test |
711 | 8 | Angelfish_software:angelfish software angelfish software on-premises self-hosted web analytics application allows organizations monitor users interact websites web-based applications angelfish use web server logs javascript page tags create reports first released 2013 angelfish software created response google cancellation urchin lack options existed on-premises web analytics software angelfish popular solution tracking intranet sharepoint environments significant interest organizations required protect website visitor data due regulations use google analytics due data privacy concerns | [
2902,
4759,
578,
5571,
4600
] | Test |
712 | 2 | Virtual_CD-ROM_switching_utility:virtual cd-rom switching utility virtual cd-rom switching utilities programs disable virtual cd-rom drive found many devices virtual cd-rom switching utility mode switching tool controlling flip flop multiple device usb gear several new usb devices especially high-speed wireless wan equipment seems chipset qualcomm offering feature microsoft windows device drivers board plugged first time act like usb flash drive start installing device driver every consecutive plugging device driver switches mode internally storage device vanishes cases new device like usb modem shows wireless wan wwan gear maker option calls feature zerocd tm usb sniffing programs libusb possible eavesdrop communication ms windows device driver isolate command action switching reproduce thing rule linux bsd variants problem usb 3g modems two modes one mode usb flash drive mode modem typically ship windows device drivers sometimes mac device drivers well case seemingly seldom ever ship linux device drivers normally happens windows device starts usb flash drive hardware drivers installed responsible switching device modem mode use switch done via codes specific device controlling software pass command switch disk modem mode virtual cd-rom switching utility manages switch mode disk modem latter disconnects mounted disk containing software n't care wo n't work anyway crucially creates modem port/serial device usually /dev/ttyusb0 networkmanager approach adding virtual cd-rom software drivers 3g storage devices two problems presumably raises cost device may ship outdated software even viruses times up-to-date drivers anyway built operating systems systems implementing usb standard like gnu/linux 3g device usb serial port storage device ... usb storage device virtual cd-rom u3-compatible devices removed u3-tool utility 3g devices huawei support complete disabling virtual cd-rom device uses zerocd method means behaves usb cd-rom first connected virtual cd-rom inserted windows device drivers related cosmote control program windows device drivers installed special usb command sent device “ switch ” modem mode ozerocdoff temporarily disables zerocd usb option wwan modem new usb option wwan modem devices support cd-rom device holds needed windows device driver use wwan modem therefore firmware wwan modem announces usb enumeration process work virtual cd-rom device vendor name zoption device called zero-cd ozerocdoff solution switch zero-cd allow modem used modem usb_modeswitch virtual cd-rom switching utility version 1.0.3 upwards simple framework integrating switching udev device manager make fully automatic switch2modem designed switching 3g usb modem program works opensolaris huaweiaktbbo.c utility compiled re-creates usb communication used windows | [
1361,
768,
6874,
4759,
5661
] | Train |
713 | 2 | Rosetta_(software):rosetta software rosetta discontinued dynamic binary translator mac os x allowed many powerpc applications run certain intel-based macintosh computers without modification apple released rosetta 2006 changed instruction set architecture macintosh platform powerpc intel processor name rosetta reference rosetta stone discovery made possible comprehend translate egyptian hieroglyphs rosetta based quicktransit technology graphical user interface led apple describe rosetta amazing software 'll never see rosetta initially included mac os x v10.4.4 tiger version released first intel-based macintosh models rosetta installed default mac os x v10.6 snow leopard retained option via installer apple software update users need run powerpc applications rosetta neither included supported mac os x v10.7 lion later therefore lion later releases current macintosh platform support powerpc applications rosetta part mac os x intel operating systems prior lion translates g3 g4 altivec instructions however translate g5 instructions therefore applications rely g5-specific instruction sets must modified developers work rosetta-supported intel-based macs according apple applications heavy user interaction low computational needs word processors well suited translation via rosetta applications high computational needs autocad games adobe photoshop pre-existing powerpc versions apple pro media-production applications final cut pro motion aperture logic pro supported rosetta require crossgrade universal binary version work rosetta-supported intel-based macs rosetta support following reason rosetta reduced compatibility compared apple earlier 68k emulator ppcs lies within implementation rosetta user-level program intercept emulate user-level code older emulator integrated system much lower level 68k emulator given access lowest levels os level tightly connected mac os nanokernel ppc macs later used multiprocessing mac os 8.6 later means nanokernel able intercept powerpc interrupts translate 68k interrupts mixed mode switch necessary executing 68k code handle interrupts allowed lines 68k ppc code interspersed within binary fat application similar effect could likely achieved mac os x running rosetta within xnu apple instead chose implement rosetta user-level process avoid excessive debugging potential security issues | [
3940,
2915,
4690,
734,
405,
6832,
3989,
2597,
3322,
1502,
5786,
4740,
1897,
6502,
6505,
2627,
7609,
1171,
5109,
2284,
1178,
6188,
1187,
1562,
6909,
6548,
502,
6557,
2679,
6565,
2329,
3050,
163,
6582,
3747,
5535,
8043,
5191,
8051,
7327,
... | Test |
714 | 2 | Broadcast_Driver_Architecture:broadcast driver architecture broadcast driver architecture bda microsoft standard digital video capture microsoft windows operating systems encompasses atsc dvb standards gives developers standardized method accessing tv tuner devices usually pci pci-e usb driver component microsoft tv technologies used hardware vendors create digital tv tuning devices windows also support new network types custom hardware functionality bda documented windows ddk driver development kit platform sdk ideally bda-compliant software compatible bda-compliant hardware applications using bda drivers include web tv windows built windows 98 windows windows xp media center edition mediaportal gb-pvr dvbviewer ulenet several third-party solutions broadcast driver architecture introduced windows 98 part windows driver model | [
7149,
6420,
720,
1460,
2928,
7907,
5747,
2953,
6840,
422,
4017,
6504,
4022,
4026,
7607,
1526,
3687,
4759,
2283,
5479,
7263,
5850,
150,
6933,
519,
3052,
4448,
3407,
1232,
2702,
7687,
1989,
4848,
4129,
8073,
2018,
8085,
6989,
6991,
5571,
... | Validation |
715 | 0 | N-gram:n-gram fields computational linguistics probability n -gram contiguous sequence n items given sample text speech items phonemes syllables letters words base pairs according application n -grams typically collected text speech corpus items words -grams may also called shingles using latin numerical prefixes n -gram size 1 referred unigram size 2 bigram less commonly digram size 3 trigram english cardinal numbers sometimes used e.g. four-gram five-gram computational biology polymer oligomer known size called k -mer instead n -gram specific names using greek numerical prefixes monomer dimer trimer tetramer pentamer etc. english cardinal numbers one-mer two-mer three-mer etc n -gram model type probabilistic language model predicting next item sequence form n − 1 –order markov model n -gram models widely used probability communication theory computational linguistics instance statistical natural language processing computational biology instance biological sequence analysis data compression two benefits n -gram models algorithms use simplicity scalability – larger n model store context well-understood space–time tradeoff enabling small experiments scale efficiently figure 1 shows several example sequences corresponding 1-gram 2-gram 3-gram sequences examples word-level 3-grams 4-grams counts number times appeared google n -gram corpus 3-grams 4-grams n -gram model models sequences notably natural languages using statistical properties n -grams idea traced experiment claude shannon work information theory shannon posed question given sequence letters example sequence ex likelihood next letter training data one derive probability distribution next letter given history size formula_1 0.4 b 0.00001 c 0 ... probabilities possible next-letters sum 1.0 concisely n -gram model predicts formula_2 based formula_3 probability terms formula_4 used language modeling independence assumptions made word depends last n − 1 words markov model used approximation true underlying language assumption important massively simplifies problem estimating language model data addition open nature language common group words unknown language model together note simple n -gram language model probability word conditioned number previous words one word bigram model two words trigram model etc described following categorical distribution often imprecisely called multinomial distribution practice probability distributions smoothed assigning non-zero probabilities unseen words n -grams see smoothing techniques n -gram models widely used statistical natural language processing speech recognition phonemes sequences phonemes modeled using n -gram distribution parsing words modeled n -gram composed n words language identification sequences characters/graphemes e.g letters alphabet modeled different languages sequences characters 3-grams sometimes referred trigrams generated good morning goo ood od mo mor forth counting space character gram sometimes beginning end text modeled explicitly adding _g _go ng_ g_ _ sequences words trigrams shingles generated dog smelled like skunk dog dog smelled dog smelled like smelled like like skunk skunk practitioners interested multiple word terms might preprocess strings remove spaces many simply collapse whitespace single space preserving paragraph marks whitespace frequently either element writing style introduces layout presentation required prediction deduction methodology punctuation also commonly reduced removed preprocessing frequently used trigger functionality n -grams also used sequences words almost type data example used extracting features clustering large sets satellite earth images determining part earth particular image came also successful first pass genetic sequence search identification species short sequences dna originated n -gram models often criticized lack explicit representation long range dependency explicit dependency range n − 1 tokens n -gram model since natural languages incorporate many cases unbounded dependencies wh-movement means n -gram model principle distinguish unbounded dependencies noise since long range correlations drop exponentially distance markov model reason n -gram models made much impact linguistic theory part explicit goal model dependencies another criticism made markov models language including n -gram models explicitly capture performance/competence distinction n -gram models designed model linguistic knowledge make claims even potentially complete models linguistic knowledge instead used practical applications practice n -gram models shown extremely effective modeling language data core component modern statistical language applications modern applications rely n -gram based models machine translation applications rely exclusively models instead typically also incorporate bayesian inference modern statistical models typically made two parts prior distribution describing inherent likelihood possible result likelihood function used assess compatibility possible result observed data language model used used part prior distribution e.g gauge inherent goodness possible translation even often component distribution handcrafted features various sorts also used example variables represent position word sentence general topic discourse addition features based structure potential result syntactic considerations often used features also used part likelihood function makes use observed data conventional linguistic theory incorporated features although practice rare features specific generative particular theories grammar incorporated computational linguists tend agnostic towards individual theories grammar issue using n-gram language models out-of-vocabulary oov words encountered computational linguistics natural language processing input includes words present system dictionary database preparation default language model estimated entire observed vocabulary used cases may necessary estimate language model specific fixed vocabulary scenario n-grams corpus contain out-of-vocabulary word ignored n-gram probabilities smoothed words vocabulary even observed nonetheless essential cases explicitly model probability out-of-vocabulary words introducing special token e.g unk vocabulary out-of-vocabulary words corpus effectively replaced special unk token n-grams counts cumulated option possible estimate transition probabilities n-grams involving out-of-vocabulary words n -grams also used efficient approximate matching converting sequence items set n -grams embedded vector space thus allowing sequence compared sequences efficient manner example convert strings letters english alphabet single character 3-grams get formula_5-dimensional space first dimension measures number occurrences aaa second aab forth possible combinations three letters using representation lose information string example strings abc bca give rise exactly 2-gram bc although ab bc clearly bc ca however know empirically two strings real text similar vector representation measured cosine distance likely similar metrics also applied vectors n -grams varying sometimes better results example z-scores used compare documents examining many standard deviations n -gram differs mean occurrence large collection text corpus documents form background vector event small counts g-score also known g-test may give better results comparing alternative models also possible take principled approach statistics n -grams modeling similarity likelihood two strings came source directly terms problem bayesian inference n -gram-based searching also used plagiarism detection n -grams find use several areas computer science computational linguistics applied mathematics used choose value n n -gram model necessary find right trade stability estimate appropriateness means trigram i.e triplets words common choice large training corpora millions words whereas bigram often used smaller ones problems balance weight infrequent grams example proper name appeared training data frequent grams also items seen training data given probability 0.0 without smoothing unseen plausible data sample one introduce pseudocounts pseudocounts generally motivated bayesian grounds practice necessary smooth probability distributions also assigning non-zero probabilities unseen words n -grams reason models derived directly n -gram frequency counts severe problems confronted n -grams explicitly seen – zero-frequency problem various smoothing methods used simple add-one laplace smoothing assign count 1 unseen n -grams see rule succession sophisticated models good–turing discounting back-off models methods equivalent assigning prior distribution probabilities n -grams using bayesian inference compute resulting posterior n -gram probabilities however sophisticated smoothing models typically derived fashion instead independent considerations field computational linguistics particular language modeling skip-grams generalization n -grams components typically words need consecutive text consideration may leave gaps skipped provide one way overcoming data sparsity problem found conventional n -gram analysis formally -gram consecutive subsequence length sequence tokens -skip -- gram length- subsequence components occur distance example input text set 1-skip-2-grams includes bigrams 2-grams addition subsequences syntactic n -grams n -grams defined paths syntactic dependency constituent trees rather linear structure text example sentence economic news little effect financial markets transformed syntactic n -grams following tree structure dependency relations news-economic effect-little effect-on-markets-financial syntactic n -grams intended reflect syntactic structure faithfully linear n -grams many applications especially features vector space model syntactic n -grams certain tasks gives better results use standard n -grams example authorship attribution another type syntactic n -grams part-of-speech n -grams defined fixed-length contiguous overlapping subsequences extracted part-of-speech sequences text part-of-speech n -grams several applications commonly information retrieval | [
3601,
5800,
1718,
1444,
4760,
8065,
715,
1353,
2832,
2648,
2022,
5304,
3292,
2215,
1751,
7372,
2579,
4337,
4426,
411,
143,
3651,
4349,
7202,
3660,
4089,
1314,
3662,
5429,
2882,
2884,
1233,
5528,
5612,
3158,
7138,
5885,
5008
] | Validation |
716 | 4 | Superfish:superfish superfish advertising company developed various advertising-supported software products based visual search engine company based palo alto california founded israel 2006 regarded part country download valley cluster adware companies superfish software described malware adware many sources software bundled various applications early 2010 lenovo began bundle software computers september 2014 february 20 2015 united states department homeland security advised uninstalling associated root certificate make computers vulnerable serious cyberattacks including interception passwords sensitive data transmitted browsers superfish founded 2006 adi pinhas michael chertok pinhas graduate tel aviv university 1999 co-founded vigilant technology “ invented digital video recording surveillance market ” according linkedin profile worked verint intelligence company analyzed telephone signals allegedly tapped verizon communication lines chertok graduate technion bar-ilan university 10 years experience large scale real-time data mining systems since founding superfish used team dozen phds primarily develop algorithms comparison matching images released first product windowshopper 2011 windowshopper immediately prompted large number complaints internet message boards users n't know software installed machines superfish initially received funding draper fisher jurvetson date raised 20 million mostly dfj vintage investment partners forbes listed company number 64 list america promising companies pinhas 2014 stated visual search replace keyboard ... visual search cases words describe see 2014 superfish products 80 million users may 2015 following lenovo security incident see distance fallout team behind superfish changed name moved activities justvisual.com users expressed concerns scans ssl-encrypted web traffic superfish visual search software pre-installed lenovo machines since least early december 2014 became major public issue however february 2015 installation included universal self-signed certificate authority certificate authority allows man-in-the-middle attack introduce ads even encrypted pages certificate authority private key across laptops allows third-party eavesdroppers intercept modify https secure communications without triggering browser warnings either extracting private key using self-signed certificate. ref name= komodia/superfish ssl validation broken /ref february 20 2015 microsoft released update windows defender removes superfish article slate tech writer david auerbach compares incident sony drm rootkit scandal said lenovo actions installing superfish one irresponsible mistakes established tech company ever made february 24 2015 heise security published article revealing certificate question would also spread number applications companies including say media lavasoft ad-aware web companion criticisms superfish software predated lenovo incident limited lenovo user community early 2010 apple mozilla firefox microsoft windows users expressed concerns online support discussion forums superfish software installed computers without knowledge bundled software ceo pinhas statement prompted lenovo disclosures maintained security flaw introduced superfish software directly attributable code rather appears third-party add-on introduced potential vulnerability know product identified source problem code authored tech company komodia deals among things website security certificates komodia code also present applications among parental-control software experts said komodia tool could imperil company program using code found within superfish fact komodia refers https-decrypting interception software ssl hijacker since least january 2011 use 100 corporate clients may jeopardize sensitive data lenovo customers also much larger base pc users superfish first product windowshopper developed browser add-on desktop mobile devices directing users hover browser images shopping web sites purchase similar products 2014 windowshopper approximately 100 million monthly users according xconomy high conversion sale rate soft goods superfish business model based receiving affiliate fees sale core technology superfish visualdiscovery installed man-in-the-middle proxy lenovo laptops injects advertising results internet search engines also intercepts encrypted ssl/tls connections 2014 superfish released new apps based image search technology | [
6049,
363,
73,
4456,
4759,
7287,
3249,
359,
3426
] | Test |
717 | 7 | Virtual_Object_System:virtual object system virtual object system vos computer software technology creating distributed object systems sites hosting vobjects typically linked computer network local area network internet vobjects may send messages vobjects network links remotely within host site locally perform actions synchronize state way vos may also called object-oriented remote procedure call system addition vobjects may number directed relations vobjects allows form directed graph data structures vos patent free implementation free software primary application focus vos general purpose multiuser collaborative 3d virtual environments virtual reality primary designer author vos peter amstutz | [
5571
] | Test |
718 | 9 | Reactive_programming:reactive programming computing reactive programming declarative programming paradigm concerned data streams propagation change paradigm possible express static e.g. arrays dynamic e.g. event emitters data streams ease also communicate inferred dependency within associated execution model exists facilitates automatic propagation changed data flow example imperative programming setting formula_1 would mean formula_2 assigned result formula_3 instant expression evaluated later values formula_4 formula_5 changed effect value formula_2 hand reactive programming value formula_2 automatically updated whenever values formula_4 formula_5 change without program re-execute statement formula_1 determine presently assigned value formula_11 another example hardware description language verilog reactive programming enables changes modeled propagate circuits reactive programming proposed way simplify creation interactive user interfaces near-real-time system animation example model–view–controller mvc architecture reactive programming facilitate changes underlying model reflected automatically associated view several popular approaches employed creation reactive programming languages specification dedicated languages specific various domain constraints constraints usually characterized real-time embedded computing hardware description another approach involves specification general-purpose languages include support reactivity approaches articulated definition use programming libraries embedded domain-specific languages enable reactivity alongside top programming language specification use different approaches results language capability trade-offs general restricted language associated compilers analysis tools able inform developers e.g. performing analysis whether programs able execute actual real time functional trade-offs specificity may result deterioration general applicability language variety models semantics govern family reactive programming loosely split along following dimensions reactive programming language runtimes represented graph identifies dependencies among involved reactive values graph nodes represent act computing edges model dependency relationships runtime employs said graph help keep track various computations must executed anew involved input changes value various abstract implementation approaches enable specification reactive programming flow data explicitly described employment graph common algorithms implementation level event reaction consists propagation across graph information characterizes existence change consequently computations affected change become outdated must flagged re-execution computations usually characterized transitive closure change associated source change propagation may lead update value graph sinks graph propagated information consist node complete state i.e. computation result involved node cases node previous output ignored another method involves delta propagation i.e incremental change propagation case information proliferated along graph edges consist delta describing previous node changed approach especially important nodes hold large amounts state data would otherwise expensive recompute scratch delta propagation essentially optimization extensively studied via discipline incremental computing whose approach requires runtime satisfaction involving view-update problem problem infamously characterized use database entities responsible maintenance changing data views another common optimization employment unary change accumulation batch propagation solution faster reduces communication among involved nodes optimization strategies employed reason nature changes contained within make alterations accordingly e.g two changes batch cancel thus simply ignored yet another available approach described invalidity notification propagation approach causes nodes invalid input pull updates thus resulting update outputs two principal ways employed building dependency graph propagating changes possible pick propagation orders value expression natural consequence source program illustrate easily example suppose codice_1 reactive value changes every second represent current time seconds consider expression codice_2 always greater codice_1 expression always evaluate true value unfortunately depend order evaluation codice_1 changes two expressions update codice_5 conditional first evaluates second invariant hold however conditional updates first using old value codice_2 new value codice_1 expression evaluate false value called glitch reactive languages glitch-free prove property usually achieved topologically sorting expressions updating values topological order however performance implications delaying delivery values due order propagation cases therefore reactive languages permit glitches developers must aware possibility values may temporarily fail correspond program source expressions may evaluate multiple times instance codice_8 may evaluate twice new value codice_1 arrives codice_2 updates topological sorting dependencies depends dependency graph directed acyclic graph dag practice program may define dependency graph cycles usually reactive programming languages expect cycles broken placing element along back edge permit reactive updating terminate typically languages provide operator like codice_11 used update mechanism purpose since codice_11 implies follows must evaluated next time step allowing current evaluation terminate reactive languages typically assume expressions purely functional allows update mechanism choose different orders perform updates leave specific order unspecified thereby enabling optimizations reactive language embedded programming language state however may possible programmers perform mutable operations make interaction smooth remains open problem cases possible principled partial solutions two solutions include reactive languages graph dependencies static i.e. graph fixed throughout program execution languages graph dynamic i.e. change program executes simple example consider illustrative example codice_1 reactive value every second value expression changes different reactive expression codice_14 depends therefore graph dependencies updates every second permitting dynamic updating dependencies provides significant expressive power instance dynamic dependencies routinely occur graphical user interface gui programs however reactive update engine must decide whether reconstruct expressions time keep expression node constructed inactive latter case ensure participate computation supposed active reactive programming languages range explicit ones data flows set using arrows implicit data flows derived language constructs look similar imperative functional programming example implicitly lifted functional reactive programming frp function call might implicitly cause node data flow graph constructed reactive programming libraries dynamic languages lisp cells python trellis libraries construct dependency graph runtime analysis values read function execution allowing data flow specifications implicit dynamic sometimes term reactive programming refers architectural level software engineering individual nodes data flow graph ordinary programs communicate reactive programming purely static data flows set statically dynamic data flows change execution program use data switches data flow graph could extent make static data flow graph appear dynamic blur distinction slightly true dynamic reactive programming however could use imperative programming reconstruct data flow graph reactive programming could said higher order supports idea data flows could used construct data flows resulting value data flow another data flow graph executed using evaluation model first ideally data changes propagated instantly assured practice instead might necessary give different parts data flow graph different evaluation priorities called differentiated reactive programming example word processor marking spelling errors need totally sync inserting characters differentiated reactive programming could potentially used give spell checker lower priority allowing delayed keeping data-flows instantaneous however differentiation introduces additional design complexity example deciding define different data flow areas handle event passing different data flow areas evaluation reactive programs necessarily based stack based programming languages evaluated instead data changed change propagated data derived partially completely data changed change propagation could achieved number ways perhaps natural way invalidate/lazy-revalidate scheme could problematic simply naively propagate change using stack potential exponential update complexity data structure certain shape one shape described repeated diamonds shape following structure a→b→a a→c→a n=1,2 ... problem could overcome propagating invalidation data already invalidated later re-validate data needed using lazy evaluation one inherent problem reactive programming computations would evaluated forgotten normal programming language needs represented memory data-structures could potentially make reactive programming highly memory consuming however research called lowering could potentially overcome problem side reactive programming form could described explicit parallelism could therefore beneficial utilizing power parallel hardware reactive programming principal similarities observer pattern commonly used object-oriented programming however integrating data flow concepts programming language would make easier express could therefore increase granularity data flow graph example observer pattern commonly describes data-flows whole objects/classes whereas object-oriented reactive programming could target members objects/classes stack-based evaluation model common object orientation also entirely suitable data-flow propagation occurrences tree feedback edges data structures could make program face exponential complexities relatively limited use low granularity rarely problem observer pattern practice possible fuse reactive programming ordinary imperative programming paradigm imperative programs operate upon reactive data structures set-up analogous constraint imperative programming however constraint imperative programming manages bidirectional constraints reactive imperative programming manages one-way dataflow constraints object-oriented reactive programming oorp combination object oriented programming reactive programming perhaps natural way make combination follows instead methods fields objects reactions automatically re-evaluate reactions depend modified illustration codice_15 introductory example using javascript jquery function seta // a=x+y integers seta // initial value x .css 'cursor 'pointer .click function oorp programming language maintains imperative methods would also fall category imperative reactive programming functional reactive programming frp programming paradigm reactive programming functional programming relatively new category programming languages uses constraints rules main programming concept consists reactions events keep constraints satisfied facilitate event-based reactions makes reactive programs instrumental correctness software example rule based reactive programming language ampersand founded relation algebra modern spreadsheet often cited example reactive programming problematic unqualified term spreadsheet may refer either confusion arises spreadsheet application 2 example reactive program program effectively defined underlying spreadsheet 1 typically reactive program semantically underlying spreadsheet 1 simply determines calculation set input cells set output cells thus could directly translated simple transformational calculation i.e function traditional programming language | [
6507,
2451,
4573,
4758,
5482,
5662,
1102,
1479,
3120,
7557,
2054,
3570,
3229,
160,
5878,
7777,
1901,
2619,
357
] | Train |
719 | 3 | Extended_MMX:extended mmx extended mmx refers one two possible extensions mmx instruction set x86 included intel streaming simd extensions number new instructions extended functionality mmx amd incorporated subset extended mmx instructions athlon microarchitecture instructions commonly known extended mmx instructions instructions debuted may 1999 intel pentium iii processor part sse instruction set next month late june 1999 amd athlon processor released featured extended mmx instructions sse today extended mmx instructions notable common subset mmx extensions work across amd athlon sse-capable intel processors less commonly known extended mmx could also refer original cyrix emmi extended multi-media instructions instruction set developed cyrix implemented 6x86 mx mii line processors extended mmx instruction set 12 new instructions useful multimedia applications extensions enabled default requiring bios software enable emmi never given much support software developers acknowledged cyrix competitors certain intel sse instructions even share opcodes emmi instructions never implemented processors mii emmi instruction set included | [
694,
352,
1335,
5669,
5670
] | Test |
720 | 2 | Microsoft_Enterprise_Library:microsoft enterprise library microsoft enterprise library set tools programming libraries microsoft .net framework provides apis facilitate proven practices core areas programming including data access logging exception handling others enterprise library provided pluggable binaries source code freely used customized developers purposes also ships test cases quickstarts application block addresses specific cross-cutting concern provides highly configurable features results higher developer productivity application blocks enterprise library designed agnostic possible application architecture example logging application block may used equally web smart client service-oriented application patterns practices team produces number deliverables leverage enterprise library application blocks include web service software factory smart client software factory addition application blocks standard microsoft distribution enterprise library includes several versions microsoft enterprise library microsoft enterprise library 6 released april 2013 public announcements s.somasegar senior vp developer division grigori melnik enterprise library producer available new features include release also retired following 3 blocks details see release notes change log microsoft enterprise library 5.0 released april 2010 public announcement grigori melnik enterprise library producer available new features include note existing public apis v4.1 mostly supported list breaking changes see note several features demoed video note full change log see note optional update released may 2011 contains fixes unity interception file configuration source update required using silverlight integration pack need wcf ria services integration configuration tool support available via nuget http //www.microsoft.com/download/en/details.aspx id=6836 port microsoft enterprise library 5.0 silverlight includes following blocks public announcement http //blogs.msdn.com/b/agile/archive/2011/05/11/silverlight-integration-pack-for-microsoft-enterprise-library-5-0-released.aspx available individual blocks via nuget single download release enterprise library october 2008 service releases includes following application block software factory strong naming guidance package included release available separate download thus longer dependency guidance automation extensions gax detailed list changes see release enterprise library release enterprise library may 2008 includes following may 2007 enterprise library 3.1 released minor enhancements validation policy injection application blocks april 2007 enterprise library 3.0 released contains new application blocks new application block software factory designed simplify development new application blocks extensions new features providing better integration .net framework 3.0 3.0 release enterprise library contains following application blocks january 2006 new version enterprise library released targeted .net framework 2.0 significant change release configuration application block removed blocks updated use .net improved system.configuration capabilities release also included significant improvements logging application block much security application block removed due similar capabilities provided .net framework 2.0 .net 2.0 release enterprise library contained following application blocks two releases enterprise library released .net framework 1.1 first released january 2005 followed minor maintenance release june 2005 .net 1.1 releases enterprise library contained following application blocks ron jacobs microsoft evangelist described purpose enterprise library filling gaps .net development releases framework framework continues advance developers demanding productive development libraries time microsoft platforms evolve certain scenarios initially addressed enterprise library supported platforms case patterns practices team uses graceful retirement process deprecate parts explained microsoft continues promote enterprise library enterprise/line-of-business development even many microsoft products well projects within microsoft use extensively starting november 2013 microsoft fully opensourced enterprise library application blocks accept community contributions latest releases slab1.1 unity3.5 developed close collaboration community august 2015 microsoft posted handing unity dependency injection new owners pablo cibraro pedro wood new github repo time patterns practices enterprise library home web site codeplex announced remainder application blocks longer developed however source continue available | [
7149,
6420,
714,
1460,
2928,
7907,
5747,
2953,
6840,
422,
4017,
6504,
4022,
4026,
7607,
1526,
3687,
4759,
2283,
5479,
7263,
5850,
150,
6933,
519,
3052,
4448,
3407,
1232,
2702,
7687,
1989,
4848,
4129,
8073,
2018,
8085,
6989,
6991,
5571,
... | Validation |
721 | 4 | Solving_the_E-waste_Problem:solving e-waste problem solving e-waste problem step international initiative created develop solutions address issues associated waste electrical electronic equipment weee eminent players fields production reuse recycling electrical electronic equipment eee government agencies ngos well un organisations count among members step encourages collaboration stakeholders connected e-waste emphasising holistic scientific yet applicable approach problem waste electrical electronic equipment weee increasing every day volume weee becoming serious environmental problem yet become recognised greater public guarantee neutrality required give analysis recommendations necessary credibility step started starting period three years initiated united nations university unu promotion team wetzlar hewlett-packard step initiative official launch march 2007 “ one important aims step initiative elaborate set global guidelines treatment e-waste promotion sustainable material recycling ” press communiqué initiative initiative comprises five cooperating task forces addressing specific aspects e-waste covering entire life-cycle electric electronic equipment activities initiative places emphasis working policy-making bodies allow results research impact current practices step coordinated science research body un system united nations university unu long-term goal step “ develop – based scientific analysis – globally accepted standard refurbishment recycling e-waste herewith step ’ aim reduce dangers humans environment result inadequate irresponsible treatment practices advance resource efficiency. ” ruediger kuehr executive secretary step initiative achieve step conceives implements projects based results multidisciplinary dialogues projects seek develop sustainable solutions reduce environmental risk enhance development supreme body step initiative general assembly decides general direction development general assembly based memorandum understanding signed members states guiding principles step secretariat hosted unu bonn mandated accomplishment day-to-day managerial work initiative steering committee composed representatives key stakeholders monitors progress initiative core work accomplished five task forces tf “ policy ” “ redesign ” “ reuse ” “ recycle ” “ capacity building ” task forces conduct research analysis respective domains seek implement innovative projects tf 1 – policy aim task force assess analyse current governmental approaches regulations related weee starting analysis recommendations future regulating activities shall formulated tf2 – redesign task force works design eee focusing reduction negative consequences electrical electronic appliances throughout entire life cycle task force especially takes heed situation developing countries tf3 – reuse focus task force lies development sustainable transmissible principles standards reuse eee tf4 – recycle objective task force improve infrastructures systems technologies realize sustainable recycling global level tf5 – capacity building aim task force draw attention problems connected weee aim shall achieved making results research task forces stakeholders publicly available task force relies personal networks internet collaborative working tools etc guiding principles 1 step ’ work founded scientific assessments incorporates comprehensive view social environmental economic aspects e-waste 2 step conducts research entire life-cycle electronic electrical equipment corresponding global supply process material flows 3 step ’ research pilot projects meant contribute solution e-waste problems 4 step condemns illegal activities related e-waste including illegal shipments reuse/ recycling practices harmful environment human health 5 step seeks foster safe eco/energy-efficient reuse recycling practices around globe socially responsible manner quote website | [
3764
] | Test |
722 | 3 | Apple_A11:apple a11 apple a11 bionic 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared iphone 8 iphone 8 plus iphone x introduced september 12 2017 according apple chip two high-performance cores 25 faster apple a10 four high-efficiency cores 70 faster energy-efficient cores a10 a11 features apple-designed 64-bit armv8-a six-core cpu two high-performance cores 2.39 ghz called monsoon four energy-efficient cores called mistral monsoon cores 7-wide decode out-of-order superscalar design mistral cores 3-wide decode out-of-order superscalar design mistral cores based apple swift cores apple a6 a11 uses new second-generation performance controller permits a11 use six cores simultaneously unlike predecessor a10 a11 also integrates apple-designed three-core graphics processing unit gpu 30 faster graphics performance a10 embedded a11 m11 motion coprocessor a11 includes new image processor supports computational photography functions lighting estimation wide color capture advanced pixel processing a11 manufactured tsmc using 10 nm finfet process contains 4.3 billion transistors die 87.66 mm size 30 smaller a10 manufactured package package pop together 2 gb lpddr4x memory iphone 8 3 gb lpddr4x memory iphone 8 plus iphone x a11 also includes dedicated neural network hardware apple calls neural engine neural network hardware perform 600 billion operations per second used face id animoji machine learning tasks neural engine allows apple implement neural network machine learning energy-efficient manner using either main cpu gpu however third party apps use neural engine leading similar neural network performance older iphones bloomberg says neural engine fruit apple efforts improve ai team since 2015 report bloomberg apple secretive nature made difficult attract ai research scientists apple since recruited people multiple companies working ai published papers related ai research october 2016 apple hired russ salakhutdinov director ai research | [
6788,
6421,
7890,
5732,
1799,
1094,
2926,
5037,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
6125,
2954,
7572,
6482,
6847,
67,
6142,
4373,
7226,
2978,
446,
4749,
7601,
451,
3346,
6165,
4389,
5463,
102,
463,
5469,
4768,
5472,
469,
4041,
300... | Test |
723 | 3 | Rally-X:rally-x rally-x one namco first video games imported outside japan due business relations midway presented amusement machine operator union america trade show north america alongside namco pac-man william defender despite rumors executives claimed rally-x would successful namco marketing team heavily promoted game test run would gain much praise pac-man despite sales lower anticipated rally-x given positive reception standing amidst games genre contemporary home port game release msx japan rally-x would followed several sequels releases namco video game collections platforms cited early hit golden age arcade games item game special flag would make appearances plethora future video games including xevious gaplus super smash bros. nintendo 3ds wii u usually item grants extra life player drives blue car around multi-directional scrolling maze car automatically moves whichever direction joystick pushed runs wall turn continue every round ten flags scattered around maze player must collect clear round move next round flags increase value collected first 100 points second 200 third 300 also special flags indicated letter — player collects one value earned flags doubles rest round player dies however next flag value set back 100 double bonus lost collecting special first flag 10 flags one run maximum points player obtain round 11000 player also obtain fuel bonus round complete varies depending much fuel remaining according fuel gauge several red cars chase blue one around maze contact results losing life hit number cars begins three increases number throughout normal round eight first five appear bottom maze next three appear top maze however player smoke screen use red cars red car runs cloud smokescreen momentarily stunned still kill player contact amount time stunned decreases level still always cause red car chase blue car using alternate route using smokescreen uses small amount fuel using every 30 seconds almost ensure runs round finishes car limited amount fuel consumed time though normally sufficient last ten flags collected fuel runs car moves slowly smoke screen longer works quickly falls victim red cars player clear round without fuel remaining rare occurrence receive fuel bonus result also stationary rocks player must avoid rocks randomly distributed throughout maze increasing number game progresses unlike cars flags positions shown radar player careful rocks also kill player contact player careful get trapped rocks red cars happens escape third stage every fourth stage bonus stage challenging stage start player must collect flags normal way red cars maximum normal number red cars eight unable move player runs fuel red cars start moving player hits red car rock challenging stage ends player lose life player run lives game highest score day game tell 1980 battlezone defender pac-man shown alongside rally-x trade show sponsored amusement machine operators america believed rally-x would top money-earner defender went sell 60,000 units — disproving projections — cemented place video game history meanwhile pac-man went sell 350,000 worldwide arcade units became highest-grossing video game time game sequel new rally-x released 1981 offers slightly different color scheme easier gameplay special flag flashes radar fewer red cars new flag called lucky flag also added awards player bonus points amount fuel remaining collected car refueled round continues still flags remaining new rally-x manufactured greater numbers became popular least japan original game compilation arcade game namco classic collection vol 2 released 1996 includes version game enhanced graphics gameplay called rally-x arrangement multiplayer capability namco museum remix released october 23 2007 nintendo wii also features revamped version game known rally-x remix also included namco museum megamix another revamped sequel rally-x rumble released apple ios platform august 17 2011 rally-x later included namco museum volume 1 sony playstation 1995 namco museum 50th anniversary 2005 pac-man arcade party 30th anniversary compilation arcade game 2010 carbon copy game along one new rally-x also included compilation title namco classic collection vol 2 1996 rally-x included part microsoft revenge arcade jakks pacific ported rally-x namco collection tv game | [
8052,
7179,
1237,
7362,
4506,
3993,
2148
] | Test |
724 | 9 | FOCAL_(Hewlett-Packard):focal hewlett-packard focal forty-one calculator language language used program hp-41 range expandable science/engineering calculators hewlett-packard calculator programming languages 1980s focal program linear list instructions instruction step roughly correspond key key combination press thus correspond user would perform computation calculator paradigm made focal programming relatively easy newcomer program maintenance could nightmare besides use goto instructions—including going program step based value data register gto ind technique known computed goto — easily led spaghetti code program steps numbered starting 1 numbering intrinsic meaning change new instructions added removed middle program special instruction lbl used create label used user invoke program program target gto unconditional go-to xeq execute instruction simple focal program note contrary many programmable calculators focal step could stored memory one byte calculator memory could hold 2233 bytes program code reported program actually reached number steps | [
3764,
5965,
6212
] | Test |
725 | 3 | Might_and_Magic_II:_Gates_to_Another_World:might magic ii gates another world might magic ii gates another world also known might magic book two gates another world role-playing video game developed published new world computing 1988 sequel events adventurers helped corak defeat sheltem varn take gates another world located varn land cron central research observational nacelle land cron facing many problems brought encroachment sheltem adventurers must travel cron four elemental planes even time help corak stop sheltem flinging cron sun many ways might magic ii updated version original improved graphics help greatly navigation interface added several functions facilitated gameplay delay selector allowed faster slower response times spinning cursor input required features lacking might magic book one might magic book one player used six player-generated characters time total twenty-six characters could created thereafter stayed various inns across cron continue game continuity possible import characters developed first game additionally might magic 2 became first game series utilize hirelings predefined characters could extend party eight active characters hirelings controlled like regular characters required payment day pay increased level new features include two new character classes increased number spells introduction class upgrade quests twice number mini-quests also added secondary skills mountaineering necessary travelling mountainous regions linguist raising character intelligence necessary reading certain messages character could two secondary skills game introduced automap feature series activated training character cartographer skill perhaps peculiar development game numeric scope character levels could reach 255 2 -1 point could train without limit provided enough gold hit points could extended high 65535 2 -1 magic points 9999 nearly item bonus could added via enchantment bonus increased weapon damage attribute bonus dungeons dragons unlike ceiling bonuses 63 might magic 2 pitted player party one 255 monsters varying 1 hit point 64000 battles could consist 255 opponents might magic 2 remained battle-focused game many puzzles solved curiosities discovered cave sex-change device instance scattered land seemingly nonsensical colored messages eventually combines useful hints first game quests game require player solve puzzles rather look next hack slash battle time travel added though ramifications practically nil exception necessary fight final boss taverns feature humorous culinary selections various absurdities strewn ability get drunk much ale would result reduced abilities character stats increased annual circus requires collection cupie dolls play games character belong one eight classes class least one prime statistic character must equal exceed member class classes knights barbarians also special skills abilities six classes featured might magic book one secret inner sanctum available sequel knight must defeat dread knight paladin must slay frost dragon archer must stop baron wilfrey cleric reunite soul corak body sorcerer must release good evil wizards isle ancients robber addition two new classes introduced many aspects game standard rpgs time characters aging gameplay reaching old age ~75 would die randomly due natural causes spell reverses process usually fails resulting increasing character age opposed decreasing however paying visit health spa resort isle reduce character age ability travel past specifically nine different centuries although two seemed relevant main story two sidequest class-specific quests class-restricted areas forcing player split party use different combinations characters departure high fantasy flavour typical rpgs last dungeon requires pcs board spaceship solve encrypted message time limit order escape planet dragon reviewers gave game 4 5 stars 5 5 stars sega genesis version computer gaming world gave game mixed review noting several bugs 1.0 version reviewer scorpia also lamented simple plotline saying might magic ii seems swerved path boring monster mash/monty haul direction ever-more-powerful characters ever-more-powerful weapons fight ever-more-powerful monsters escalates realm ludicrous van caneghem later got revenge scorpia naming monster sequel 1991 magazine also reviewed sega genesis version stating easy play excellent graphics overemphasis combat made game workmanlike airless 1993 scorpia stated might magic ii good previous game many counts ... devoted hack slash crowd 1991 pc format placed might magic ii list 50 best computer games time | [
2171
] | Test |
726 | 4 | Comparison_of_packet_analyzers:comparison packet analyzers following tables compare general technical information several packet analyzer software utilities also known network analyzers packet sniffers please see individual products articles information basic general information software—creator/company license/price etc utilities run operating systems | [
5194,
4759,
900,
3950,
5557,
1542,
4316,
5571,
578,
7646,
6367,
588,
325,
7476,
6929,
4895,
1403,
6220,
6574,
7216,
6489,
7220,
6236,
2894,
971
] | Test |
727 | 7 | Onshape:onshape onshape computer-aided design cad software system delivered internet via software service saas model makes extensive use cloud computing compute-intensive processing rendering performed internet-based servers users able interact system via web browser ios android apps onshape allows teams collaborate single shared design way multiple writers work together editing shared document via cloud services primarily focused mechanical cad mcad used product machinery design across many industries including consumer electronics mechanical machinery medical devices 3d printing machine parts industrial equipment onshape upgrades released directly web interface software require maintenance work user founded 2012 onshape based cambridge massachusetts usa offices singapore pune india leadership team includes several engineers executives originated solidworks popular 3d cad program runs windows computers onshape ’ co-founders include two former solidworks ceos jon hirschtick john mceleney onshape venture-backed company investments firms including andreessen horowitz commonwealth capital ventures new enterprise associates nea north bridge venture partners total venture funding currently amounts 169 million | [
2961,
5036,
4759,
5571,
578
] | Test |
728 | 2 | Wii_system_software:wii system software wii system software set updatable firmware versions software frontend wii home video game console updates downloaded via system internet connection wiiconnect24 discontinued allowed nintendo add additional features software new update became available nintendo sent message connected systems notifying available update several game discs first-party third-party games included system software updates players connected internet still update system additionally force upgrade requiring player perform update without new game played online games super smash bros. brawl mario kart wii come specific extra updates able receive posts game-specific addresses regardless version installed software install update wii firmware form ioses thought wii homebrew developers stand input output systems internal operating systems run separate arm architecture processor wii software nicknamed starlet wii homebrew community physically located inside graphics chip ati hollywood small part hollywood patent wii u indicates similar device simply named input/output processor control input output code running main processor ibm powerpc broadway processor wii hardware features exist gamecube accessed via arm nintendo releases new ios version except unusual circumstances example security updates block homebrew new ios replace ios already installed instead gets installed addition current ios versions native wii software including games distributed nintendo optical discs system menu virtual console games wiiware wii channels exception certain homebrew applications ios version hardcoded software software run ios hardcoded gets loaded wii loads software ios exist wii case disc-based software gets installed automatically user prompted downloaded software theoretically happen user access shop download software unless player ios versions require however homebrew used forcefully install run piece software required ios exist user brought back system menu nintendo created system new updates would unintentionally break compatibility older games side effect uses space wii internal nand flash memory ioses referred number theoretically 0 254 although many numbers skipped presumably development versions never completed one ios version run given time time ios running wii enters gamecube backward compatibility mode wii runs variant ios specifically gamecube games mios contains modified version gamecube ipl system provides graphical interface wii abilities games run directly broadway processor either directly interface hardware hardware common wii gamecube interface ios running arm architecture processor wii-specific hardware arm processor access screen therefore neither ios means piece software running everything seen screen comes software operating system firmware therefore version number reported wii actually version number system menu updates result change version number system menu updated example ioses channels side effect means impossible nintendo implement functions would affect games example in-game system menu similar xbox 360 in-game dashboard playstation 3 in-game xmb wii menu known internally system menu name user interface wii game console first thing seen system boots similar many video game consoles wii games example possible install applications netflix stream media without requiring disc wii wii menu let users access game no-game functions built-in applications called channels designed represent television channels six primary channels disc channel mii channel photo channel wii shop channel forecast channel news channel although latter two initially included became available via system updates functions provided channels wii used limited computer full-featured web browser digital photo viewer users also use channels create share cartoon-like digital avatars called miis download new games channels directly wii shop channel new channels include example everybody votes channel internet channel separate channels graphically displayed grid navigated using pointer capability wii remote users also rearrange channels satisfied channels originally organized menu wii system supports wireless connectivity nintendo ds handheld console additional accessories connectivity allows players use nintendo ds microphone touch screen inputs wii games pokémon battle revolution first example nintendo given game using nintendo ds-wii connectivity nintendo later released nintendo channel wii allowing users download game demos additional data nintendo ds like many video game consoles wii console able connect internet although required wii system function wii unique 16-digit wii code use wii non-game features internet connection enabled users able access established nintendo wi-fi connection service wireless encryption wep wpa tkip/rc4 wpa2 ccmp/aes supported aoss support added system menu version 3.0 nintendo ds nintendo charge playing via service 12-digit friend code system controls players connect one another service features console including virtual console wiiconnect24 several channels wii console also communicate connect wii systems self-generated wireless lan enabling local wireless multiplayer different television sets system also implements console-based software including wii message board one connect internet third-party devices well wii console also includes web browser known internet channel version opera 9 browser menus meant convenient way access web television screen although far offering comfortable user interface compared modern internet browsers virtual keyboard pops needed input wii remote acts like mouse making possible click anywhere screen navigate though web links however browser always handle features normal web pages although support adobe flash thus capable playing flash games third-party services online bbc iplayer also available wii via internet channel browser although bbc iplayer later relaunched separate bbc iplayer channel wii addition internet access including internet channel system updates may restricted parental controls feature wii original designs nintendo wii console specifically wii models made pre-2011 fully backward compatible gamecube devices including game discs memory cards controllers wii hardware ports gamecube memory cards peripherals slot-loading drive able accept read previous console discs gamecube games work wii without additional configuration gamecube controller required play gamecube titles neither wii remote classic controller functions capacity wii supports progressive-scan output 480p-enabled gamecube titles peripherals connected via set four gamecube controller sockets two memory card slots concealed removable flip-open panels console retains connectivity game boy advance e-reader game boy advance cable used manner gamecube however feature accessed select gamecube titles previously utilized also limitations backward compatibility example online lan features certain gamecube games available since wii serial ports nintendo gamecube broadband adapter modem adapter wii uses proprietary port video output incompatible nintendo gamecube audio/video cables composite video s-video component video rgb scart console also lacks gamecube footprint high-speed port needed game boy player support furthermore gamecube functions available compatible memory cards controllers could used playing gamecube game due fact wii internal memory would save gamecube data original device backward compatibility earlier nintendo products players enjoy massive selection older games console addition hundreds newer wii game titles however south korean units lack gamecube backward compatibility also redesigned wii family edition wii mini launched 2011 2013 respectively compatibility stripped nevertheless another service called virtual console allow users download older games prior nintendo platforms namely nintendo entertainment system super nes nintendo 64 onto wii console well games non-nintendo platforms genesis turbografx-16 list new wii channels released beyond four initial channels i.e disc channel mii channel photo channel wii shop channel included original consoles news channel forecast channel released part system updates separate downloads required january 30 2019 channels listed discontinued exception wii fit channel internet channel list features included wii system updates list updates releases wii channels § released part system update separate download required gaming platforms nintendo gaming platforms next generation gaming platforms generation | [
5984,
7514,
3081,
786,
481,
3286,
3457,
1435,
2043,
6294,
7207,
7209,
4815,
424,
6158
] | Test |
729 | 3 | Virtual_DMA_Services:virtual dma services computing virtual dma services vds refer application programming interface allow dos win16 applications device drivers perform dma operations running protected virtual 8086 mode | [
858
] | Validation |
730 | 4 | SQRL:sqrl sqrl pronounced squirrel secure quick reliable login formerly secure qr login draft open standard secure website login authentication software solution typically uses link scheme sqrl // optionally qr code user identifies via pseudonymous zero-knowledge proof rather providing user id password method thought impervious brute force password attack data breach shifts burden security away party requesting authentication closer operating system implementation possible hardware well user sqrl proposed steve gibson gibson research corporation october 2013 way simplify process authentication without risk revelation information transaction third party acronym sqrl coined steve gibson protocol drafted discussed analyzed in-depth community internet security enthusiasts news.grc.com newsgroups weekly podcast security october 2 2013 within two days airing podcast w3c google expressed interest working standard thesis sqrl analyzed found appears interesting approach terms envisioned user experience well underlying cryptography sqrl mostly combining well established cryptography novel way protocol answer problem identity fragmentation improves protocols oauth openid requiring third party broker transaction giving server secrets protect username password additionally provides standard freely used simplify login processes available password manager applications importantly standard open one company benefit owning technology according gibson website robust technology public domain security cryptography verified deliberately restricted commercial reasons sqrl design-inherent intentional phishing defenses mainly intended authentication anti-phishing despite anti-phishing properties protocol used website two components necessary implementation part web service implementation authenticates displays qr code specially crafted url according specifications protocol browser plugin mobile application read code order provide secure authentication sqrl client uses one-way functions user single master password decrypt secret master key generates combination site name comprising domain name optionally additional sub-site identifier example.com example.edu/chessclub sub- site-specific public/private key pair signs transaction tokens private key gives public key site verify encrypted data shared secrets compromise site could expose allow attacks accounts sites thing successful attacker could get public key would limited verifying signatures used site even though user unlocks master key single password never leaves sqrl client individual sites receive information sqrl process could used site number proof-of-concept implementations made various platforms including server php drupal c .net client android c .net java python also various server-end test debugging sites available sqrl currently used wickr single sign-on sso feature wickr pro steve gibson states sqrl open free solution unencumbered patents sqrl brought lot attention qr code based authentication mechanisms suggested protocol said patented earlier generally available royalty free use gibson says guys described patent completely different way sqrl operates would conflict sqrl patent superficially anything uses 2d code authentication seems similar ... superficially solutions details matter way sqrl operates entirely different details | [
2086,
860,
2789,
6029,
6986,
5965,
7729,
3915,
5571,
3794,
3795,
2196,
4133
] | Test |
731 | 4 | Radio_jamming:radio jamming radio jamming deliberate jamming blocking interference authorized wireless communications united states radio jamming devices known jammers illegal use result large fines cases jammers work transmission radio signals disrupt communications decreasing signal-to-noise ratio concept used wireless data networks disrupt information flow common form censorship totalitarian countries order prevent foreign radio stations border areas reaching country jamming usually distinguished interference occur due device malfunctions accidental circumstances devices simply cause interference regulated differently unintentional 'jamming occurs operator transmits busy frequency without first checking whether use without able hear stations using frequency another form unintentional jamming occurs equipment accidentally radiates signal cable television plant accidentally emits aircraft emergency frequency originally terms used interchangeably nowadays radio users use term jamming describe deliberate use radio noise signals attempt disrupt communications prevent listening broadcasts whereas term interference used describe unintentional forms disruption far common however distinction still universally applied inadvertent disruptions see electromagnetic compatibility intentional communications jamming usually aimed radio signals disrupt control battle transmitter tuned frequency opponents receiving equipment type modulation enough power override signal receiver digital wireless jamming signals bluetooth wifi possible low power common types form signal jamming random noise random pulse stepped tones warbler random keyed modulated cw tone rotary pulse spark recorded sounds gulls sweep-through divided two groups obvious subtle obvious jamming easy detect heard receiving equipment usually type noise stepped tones bagpipes random-keyed code pulses music often distorted erratically warbling tones highly distorted speech random noise hiss recorded sounds various combinations methods may used often accompanied regular morse identification signal enable individual transmitters identified order assess effectiveness example china used jamming extensively still plays loop traditional chinese music jamming channels cf attempted jamming numbers stations purpose type jamming block reception transmitted signals cause nuisance receiving operator one early soviet attempt jamming western broadcasters used noise diesel generator powering jamming transmitter subtle jamming jamming sound heard receiving equipment radio receive incoming signals yet everything seems superficially normal operator often technical attacks modern equipment squelch capture thanks fm capture effect frequency modulated broadcasts may jammed unnoticed simple unmodulated carrier receiver locks larger carrier signal hence ignore fm signal carries information digital signals use complex modulation techniques qpsk signals robust presence interfering signals signal relies hand shaking transmitter receiver identify determine security settings method high-level transmission jamming device sends initiation data packets receiver begin state machine establish two-way data transmission jammer loop back beginning instead completing handshake method jams receiver infinite loop keeps trying initiate connection never completes effectively blocks legitimate communication bluetooth consumer radio protocols wifi built-in detectors transmit channel free simple continuous transmission given channel continuously stop transmitter transmitting hence jamming receiver ever hearing intended transmitter jammers work analysing packet headers depending source destination selectively transmitting end message corrupting packet world war ii ground radio operators would attempt mislead pilots false instructions language precisely spoofing attack jamming radar jamming also important disrupt use radar used guide enemy missiles aircraft modern secure communication techniques use methods spread spectrum modulation resist deleterious effects jamming jamming foreign radio broadcast stations often used wartime periods tense international relations prevent deter citizens listening broadcasts enemy countries however jamming usually limited effectiveness affected stations usually change frequencies put additional frequencies and/or increase transmission power jamming also occasionally used governments germany ww2 israel cuba iraq iran iraq iran war 1980–1988 china north south korea several latin american countries well ireland pirate radio stations radio nova united kingdom government used two coordinated separately located transmitters jam offshore radio ship radio north sea international coast britain 1970 occupied europe nazis attempted jam broadcasts continent bbc allied stations along increasing transmitter power adding extra frequencies attempts made counteract jamming dropping leaflets cities instructing listeners construct directional loop aerial would enable hear stations jamming netherlands aerials nicknamed moffenzeef english kraut sieve much cold war soviet eastern bloc jamming western broadcasters led power race broadcasters jammers alike repeatedly increased transmission power utilised highly directional antennas added extra frequencies known barrage frequency diversity broadcasting already heavily overcrowded shortwave bands extent many broadcasters directly targeted jammers including pro-soviet stations suffered rising levels noise interference radio free europe sister service radio liberty main target soviet jammers followed voice america bbc world service stations targeted soviet jammers extent rfe/rl/voa/bbc included deutsche welle occasionally vatican radio kol yisrael radio canada international jamming usually took place programming languages widely spoken eastern bloc countries e.g. russian polish czech lithuanian etc. programmes english major western languages rarely ever jammed intentionally also periods china soviet union jammed programmes soviet union also jammed albanian programmes times parts world impacted broadcasting practices others meanwhile listeners soviet union eastern bloc devised ingenious methods homemade directional loop antennas hear western stations noise radio propagation shortwave difficult predict reliably listeners sometimes found days/times jamming particularly ineffective radio fading due atmospheric conditions affecting jamming signals favouring broadcasts phenomenon sometimes dubbed twilight immunity days course reverse case also times jamming transmitters temporarily air due breakdowns maintenance soviets eastern bloc allies used two types jamming transmitter skywave jamming covered large area reasons described limited effectiveness groundwave jamming effective small area thus used in/near major cities throughout eastern bloc types jamming less effective higher shortwave frequencies 15 mhz however many radios soviet union n't cover higher bands skywave jamming usually accompanied morse signals order enable coded identification jamming station order soviet monitoring posts could assess effectiveness station 1987 decades generally refusing acknowledge jamming even taking place soviets finally stopped jamming western broadcasts exception rfe/rl continued jammed several months 1988 previously periods individual eastern bloc countries refrained jamming western broadcasts varied widely time country general outside soviet union bulgaria one prolific operators jamming transmitters eastern bloc east germany least western governments may occasionally considered jamming broadcasts eastern bloc stations generally accepted would pointless exercise ownership shortwave radios less common western countries soviet union due vast physical size country many domestic stations relayed shortwave practical way cover remote areas additionally western governments generally less afraid intellectual competition eastern bloc francoist spain dictatorship jammed decades radio españa independiente radio station communist party spain broadcast moscow 1941–1955 bucharest 1955–1977 important pirate radio spain regime considered threat since allowed citizens skip censorship local media money technological assistance jamming came united states however latin america instances communist radio stations radio venceremos jammed allegedly cia short lived instances britain jammed egyptian suez crisis greek prior cyprus gaining independence rhodesian stations 2002 china acquired standard short-wave radio-broadcasting equipment designed general public radio-broadcasting technical support thales broadcast multimedia former subsidiary french state-owned company thales group debates raised iran regarding possible health hazards satellite jamming iranian officials including health minister claimed jamming health risk humans however minister communication recently admitted satellite jamming 'serious effects called identification jamming stations put stop practice government generally denied involvement jamming claimed sent unknown sources according sources irgc organization behind satellite jamming iran russian armed forces since summer 2015 begun using multi-functional ew weapon system ukraine known borisoglebsk 2 postulated system defeated communications parts country including mobile telephony gps systems | [
4517,
2944,
909,
431,
5175,
8191,
803,
4196,
6419,
4310,
1175
] | Test |
732 | 6 | BSD_disklabel:bsd disklabel bsd-derived computer operating systems including netbsd openbsd freebsd dragonfly bsd related operating systems sunos disklabel record stored data storage device hard disk contains information location partitions disk disklabels introduced 4.3bsd-tahoe release disklabels usually edited using disklabel utility later versions freebsd renamed bsdlabel traditionally disklabel first sector disk however system works operating systems access disk unix systems comprehend disklabels world ibm pc compatibles disks usually partitioned using pc bios master boot record mbr partition table scheme instead bsd partitioning scheme nested within single primary mbr partition extended partitioning scheme nested within single primary partition extended boot records sometimes particularly freebsd primary mbr partitions referred slices subdivisions primary mbr partition nested bsd partitioning scheme described disklabel called partitions bsd disklabel contained within volume boot record primary mbr partition mbr partition ids primary partitions subdivided using bsd disklabels a5h 386bsd freebsd a6h openbsd a9h netbsd 6ch dragonfly bsd format similar goal extended partitions logical partition system used ms-dos windows linux pc hard drive bsd disklabel partitions ms-dos type logical partitions separate primary partitions freebsd bsd operating systems access bsd disklabel subdivided partition ms-dos type extended/logical partitions bsd disklabels traditionally contain 8 entries describing partitions convention labeled alphabetically h bsd variants since increased 16 partitions labeled p also convention partitions b c fixed meanings | [
885,
1341,
6972,
191,
6711,
1356,
1547,
7355,
8194,
8096,
1193,
3636,
4059,
6367,
8001,
6743,
1394,
5760,
594,
5065,
4441,
6477,
4534,
5250,
1315,
1133,
689,
1052,
1697,
6149,
1793,
2161,
4277,
4910,
1703,
1798,
6402,
875,
6860,
1992,
6... | Test |
733 | 0 | Logic_form:logic form logic forms simple first-order logic knowledge representations natural language sentences formed conjunction concept predicates related shared arguments noun verb adjective adverb pronoun preposition conjunction generates predicate logic forms decorated word senses disambiguate semantics word two types predicates events marked e entities marked x shared arguments connect subjects objects verbs prepositions together example input/output might look like logic forms used natural language processing techniques question answering well inference database systems qa systems senseval-3 2004 introduced | [
1314,
5429,
8065,
2054,
6890
] | Validation |
734 | 2 | AirDrop:airdrop airdrop ad-hoc service apple inc. ios macos operating systems introduced mac os x lion mac os x 10.7 ios 7 enables transfer files among supported macintosh computers ios devices wi-fi bluetooth without using mail mass storage device prior os x yosemite os x 10.10 os x lion mountain lion mavericks os x 10.7–10.9 respectively airdrop protocol macos different airdrop protocol ios two therefore interoperable os x yosemite later support ios airdrop protocol used transfers mac ios device well two 2012 newer mac computers uses wi-fi bluetooth restriction size file airdrop accommodate ios 7 later airdrop accessed either tapping settings general airdrop swiping home screen control center wi-fi bluetooth automatically switched airdrop enabled utilized options controlling airdrop discovery devices include ios 7 later application implements airdrop support available share button airdrop subject number restrictions ios inability share music videos native apps macs running macos 10.7 greater airdrop available finder window sidebar macs running os x 10.8.1 later also accessed menu option go → airdrop pressing ++ wi-fi must turned order airdrop recognize device device must also airdrop selected finder window sidebar able transfer files furthermore files automatically accepted receiving user must accept transfer done improve security privacy running ios 7 later airdrop enabled unofficially ipad 3rd generation although supported default airdrop enabled jailbreaking device installing airdrop enabler 7.0+ cydia procedure supported apple running mac os x lion 10.7 later transfer files mac iphone ipad ipod touch following minimum requirements met ios devices airdrop supported ios 8 later running os x yosemite 10.10 later bluetooth wi-fi turned mac ios devices devices required connected wi-fi network airdrop uses tls encryption direct apple-created peer-to-peer wi-fi connection transferring files wi-fi radios source target devices communicate directly without using internet connection wi-fi access point technical details airdrop proprietary peer-to-peer wi-fi protocol called apple wireless direct link awdl reverse engineered resulting open source implementations published owl opendrop numerous reported cases ios device users airdrop privacy set “ everyone ” received unwanted files nearby strangers phenomenon termed cyber-flashing users full ability control airdrop settings limit send files options everyone contacts | [
6788,
3940,
713,
7890,
4320,
2926,
4690,
5752,
405,
6832,
6125,
3989,
2954,
2597,
1123,
3322,
6847,
1502,
6142,
2609,
5786,
1895,
4740,
1897,
4376,
5091,
4749,
5450,
6505,
7601,
2627,
7609,
1171,
5109,
3001,
2284,
1178,
120,
6188,
1187,
... | Validation |
735 | 5 | Alpine_(email_client):alpine email client alpine free software email client developed university washington alpine rewrite pine message system adds support unicode features alpine meant suitable inexperienced email users demanding power users alpine learned exploration use context-sensitive help user interface customized alpine shares many common features console applications like rich set shortcut keys using keyboard instead mouse navigation operations fact operations alpine corresponding shortcut keys unlike console applications targeting developers experienced users often require users edit configuration file alpine lets users change configuration options within software makes alpine one easy learn console-based email clients alpine supports imap pop smtp nntp ldap protocols natively although support composing html email display emails html content text alpine read write folders several formats including maildir mbox mh format used mh message handling system mbx mix alpine includes editor pico pico stands pine composer includes commands basic editing files search replace spelling justifying text besides cut paste intuitive navigation commands however editor used compose messages alpine using editor configuration variable besides able set alternate editor users configure hundred variables options liking including setting configuration sending receiving e-mail different services incoming folders collection use personalities called roles alpine therefore user share address book different accounts alpine also sort individual folders several criteria including threading original sender recipient size alpine also allows users configure colors filters scores character set display among others configuration address books saved locally remote imap server accessible wherever alpine also handles encrypted signed messages using s/mime standard although alpine designed accessible beginners easily set advanced users screens alpine include built-in help quickly accessed ctrl-g command alpine 1.0 publicly released december 20 2007 4 august 2008 uw alpine team announced one release incorporating web alpine 2.0 would shift effort direct development consultation coordination role help integrate contributions community taken mean uw longer maintains alpine left development others june 2009 project named re-alpine created sourceforge used upstream patches maintainers august 2013 re-alpine project official announced december 21 2012 release re-alpine 2.03 last official release since january 2013 eduardo chappa active software developer formerly university washington released newer versions alpine site announcement made public usenet newsgroup comp.mail.pine major unix-like systems currently use primary upstream site march 17 2017 chappa announced release version 2.21 latest stable released version 2.21.9 released september 19 2017 recent developmental version 2.21.99999 released june 22 2019 alpine officially stands alternatively licensed program internet news email uw also referred apache licensed pine alpine licensed apache license version 2 november 29 2006 saw first public alpha release december 20 2007 milestone new approach since alpha test pine always non-public | [
1152,
6965,
2453,
2281,
7975,
6721,
1475,
6908,
2131,
4352,
5070,
6582,
8034,
6588,
5887,
4918,
1435
] | Test |
736 | 7 | Data_Format_Description_Language:data format description language data format description language dfdl often pronounced daff-o-dil published open grid forum proposed recommendation january 2011 modeling language describing general text binary data standard way dfdl model schema allows text binary data read parsed native format presented instance information set information set logical representation data contents independent physical format example two records could different formats one fixed-length fields uses delimiters could contain exactly data would represented information set dfdl schema also allows data taken instance information set written serialized native format dfdl descriptive prescriptive dfdl data format impose use particular data format instead provides standard way describing many different kinds data format approach several advantages allows application author design appropriate data representation according requirements describing standard way shared enabling multiple programs directly interchange data dfdl achieves building upon facilities w3c xml schema 1.0 subset xml schema used enough enable modeling non-xml data motivations approach avoid inventing completely new schema language make easy convert general text binary data via dfdl information set corresponding xml document educational material available form dfdl tutorial videos several hands-on dfdl labs dfdl created response need grid apis able understand data regardless source language needed capable modeling wide variety existing text binary data formats working group established global grid forum later became open grid forum 2003 create specification language.. decision made early base language subset w3c xml schema using xs appinfo annotations carry extra information necessary describe non-xml physical representations established approach already used today commercial systems dfdl takes approach evolves open standard capable describing many text binary data formats work continued language resulting publication dfdl 1.0 specification ogf proposed recommendation gfd.174 january 2011 latest revision gfd.207 published november 2014 obsoletes gfd.174 incorporates issues noted date also available html summary dfdl features available ogf issues specification tracked using redmine issue trackers implementations dfdl processors parse serialize data using dfdl schemas available presentation available describes ibm dfdl daffodil public repository dfdl schemas describe commercial scientific data formats established github dfdl schemas formats like un/edifact nacha iso8583 available free download take example following text data stream gives name age location person logical model data described following fragment xml schema document order names types cardinality fields expressed xml schema model additionally model physical representation data stream dfdl augments xml schema fragment annotations xs element xs sequence objects follows property attributes dfdl annotations express data represented ascii text format fields variable length delimited commas alternative compact syntax also provided dfdl properties carried non-native attributes xml schema objects goal dfdl provide rich modeling language capable representing text binary data format 1.0 release major step towards goal capability includes support | [
1905,
7999,
7916,
7303,
4530,
5539
] | Validation |
737 | 7 | Cloud_Infrastructure_Management_Interface:cloud infrastructure management interface cloud infrastructure management interface cimi open standard api specification managing cloud infrastructure cimi goal enable users manage cloud infrastructure simple way standardizing interactions cloud environments achieve interoperable cloud infrastructure management service providers consumers developers cimi 1.1 registered international standard august 2014 joint technical committee 1 jtc 1 international organization standardization iso international electrotechnical commission iec cimi standard defined published distributed management task force dmtf includes cloud infrastructure management interface cimi model restful http-based protocol specification cimi xml schema cimi primer cimi uses cases whitepaper cimi aims provide single set interfaces cloud consumer use provision manage cloud infrastructure multiple clouds client code need adapted proprietary interfaces multiple vendors cimi described de jure standard change control standards body contrasting de facto standard typically one vendor change control interface everyone else reverse engineer inner workings expecting vendors embrace dual strategy delivering two offerings – one cimi compliant offering second proprietary offering allows proprietary functionality cimi scoped core iaas functionality deploying managing machines volumes networks monitoring systems group includes feature discovery mechanism find functions cloud provider supports including metadata describing capabilities resource constraints cimi model describes detail resources accessible cloud consumer maintained cloud provider relationships main entry point cimi consumer iaas provider cloud entry point data discovered iteratively model self-describing allows querying metadata e.g. discover extensions implemented model also extensible consumer provider model also defines serializations xml json resource cimi addresses management lifecycle infrastructure provided iaas provider creation deletion viewing alteration virtual machines networks storage start stop operations also defines resource operations creating machine images snapshots machines backup restore creation additional identical virtual machines cimi allows import ovf package create system machines cimi resources well export cimi system resources ovf package actual import export ovf packages handled underlying hypervisor management cimi implementation cimi currently supports rest architectural style using http interactions consumer providers mappings soap ws-man also considered protocol binding follows rest principles describes mapping http protocol verbs operations model request sent using http verb get post put delete includes message body either json xml format response uses standard http status code whose semantics interpreted context particular request made several adapters developed expose cimi api endpoint client applications consume translate api calls proprietary api calls supported target cloud provider following list cimi implementations cimi working group announced plug-fests improved interoperability cimi implementations | [
6172,
4308,
7721,
3620,
1543,
6428,
6806,
2477,
7732,
6015,
2214,
4884,
6208,
1114,
5948,
1774,
2057,
2872,
2877,
2961,
7857,
3916,
4552,
698,
7315,
1435,
7144
] | Test |
738 | 2 | Bitrig:bitrig bitrig openbsd-based operating system targeted exclusively amd64 armv7 platforms longer developed work done merged back openbsd achievements included porting fuse/puffs support libc++ platform replace libstdc++ pie support amd64 ndb kernel support bitrig focused using modern tools git llvm/clang along focusing modern platforms aimed commercially friendly code base texinfo gnu tool base system gpt partitioning supported bitrig future plans included support virtualisation efi | [
5268,
3838,
1522,
1341,
7514,
6794,
6085,
3856,
908,
481,
3457,
1279,
1193,
7267,
5232,
6367,
6369,
2583,
6743,
6918,
3559,
594,
4441,
6477,
2512,
424,
6489,
6583,
3751,
443
] | Test |
739 | 5 | Host_model:host model computer networking host model option designing tcp/ip stack networking operating system like microsoft windows linux unicast packet arrives host ip must determine whether packet locally destined destination matches address assigned interface host ip stack implemented weak host model accepts locally destined packet regardless network interface packet received ip stack implemented strong host model accepts locally destined packets destination ip address packet matches ip address assigned network interface packet received weak host model provides better network connectivity example easy find packet arriving host using ordinary tools also makes hosts susceptible multihome-based network attacks strong host model provides better security ipv4 implementation microsoft windows versions prior windows vista uses weak host model windows vista windows server 2008 tcp/ip stack supports strong host model ipv4 ipv6 configured use default however also configured use weak host model ipv4 implementation linux defaults weak host model source validation reversed path specified rfc 1812 enabled rp_filter option distributions default quite strong host model defends class attacks typical multihomed hosts arp_ignore arp_announce also used tweak behaviour bsd defaults strong host model | [
3821,
5850,
4759,
5571,
578,
3855,
3819
] | Test |
740 | 7 | Smartphone:smartphone smartphones class mobile phones multi-purpose mobile computing devices distinguished feature phones stronger hardware capabilities extensive mobile operating systems facilitate wider software internet including web browsing mobile broadband multimedia functionality including music video cameras gaming alongside core phone functions voice calls text messaging smartphones typically include various sensors leveraged software magnetometer proximity sensors barometer gyroscope accelerometer support wireless communications protocols bluetooth wi-fi satellite navigation early smartphones marketed primarily towards enterprise market attempting bridge functionality standalone personal digital assistant pda devices support cellular telephony limited bulky form short battery life immaturity wireless data services issues eventually resolved advances mosfet mos transistor lithium-ion battery mobile network technologies 2000s ntt docomo i-mode platform blackberry nokia symbian platform windows mobile began gain market traction models often featuring qwerty keyboards resistive touchscreen input emphasizing access push email wireless internet since unveiling iphone 2007 majority smartphones featured thin slate-like form factors large capacitive screens support multi-touch gestures rather physical keyboards offer ability users download purchase additional applications centralized store use cloud storage synchronization virtual assistants well mobile payment services improved hardware faster wireless communication due standards lte bolstered growth smartphone industry third quarter 2012 one billion smartphones use worldwide global smartphone sales surpassed sales figures feature phones early 2013 development smartphone enabled advances mosfet metal-oxide-silicon field-effect transistor semiconductor device fabrication mosfet mos transistor invented mohamed atalla dawon kahng bell labs 1959 basic building block computing devices smartphones mosfet scaling mos transistors get smaller decreasing power consumption enabled large-scale integration vlsi technology mos transistor counts integrated circuit chips increasing exponential pace predicted moore law continuous mosfet scaling eventually made possible build portable smart devices smartphones 1990s2000s typical smartphone built billions tiny mosfets 2019 used integrated circuits microprocessors memory chips power devices thin-film transistors tfts mobile displays advances mosfet power electronic technology also enabled development digital wireless mobile networks essential smartphone wide adoption power mosfet ldmos lateral diffused mos rf cmos radio frequency cmos devices led development proliferation digital wireless mobile networks 1990s advances mosfet technology leading increasing bandwidth 2000s essential elements wireless mobile networks built mosfets including mobile tranceivers base station modules routers rf power amplifiers telecommunication circuits rf circuits radio transceivers networks 2g 3g 4g another important enabling factor lithium-ion battery became indispensable energy source smartphones lithium-ion battery invented john goodenough rachid yazami akira yoshino 1980s commercialized sony asahi kasei 1991 advances mosfet technology enabling smaller integrated circuit chips improving wireless mobile networks ibm engineer frank canova realised chip-and-wireless technology becoming small enough use handheld devices first commercially available device could properly referred smartphone began prototype called angler developed canova 1992 ibm demonstrated november year comdex computer industry trade show refined version marketed consumers 1994 bellsouth name simon personal communicator addition placing receiving cellular calls touchscreen-equipped simon could send receive faxes emails included address book calendar appointment scheduler calculator world time clock notepad well visionary mobile applications maps stock reports news ibm simon manufactured mitsubishi electric integrated features wireless personal digital assistant pda cellular radio technologies building ibm simon also featured liquid-crystal display lcd pc card support internal hardware includes nec vadem vg230 system-on-a-chip soc sony hitachi random-access memory ram chips intel hitachi flash memory chips cirrus logic modem chips simon commercially unsuccessful particularly due bulky form factor limited battery life using nicad batteries rather lithium-ion battery used modern smartphones term smart phone smartphone coined year introduction simon appearing print early 1995 describing phonewriter communicator beginning mid-late 1990s many people mobile phones carried separate dedicated pda device running early versions operating systems palm os newton os symbian windows ce/pocket pc operating systems would later evolve early mobile operating systems smartphones era hybrid devices combined existing familiar pda oses basic phone hardware results devices bulkier either dedicated mobile phones pdas allowed limited amount cellular internet access pda mobile phone manufacturers competed reducing size devices bulk smartphones combined high cost expensive data plans plus drawbacks expansion limitations decreased battery life compared separate standalone devices generally limited popularity early adopters business users needed portable connectivity march 1996 hewlett-packard released omnigo 700lx modified hp 200lx palmtop pc nokia 2110 mobile phone piggybacked onto rom-based software support 640×200 resolution cga compatible four-shade gray-scale lcd screen could used place receive calls create receive text messages emails faxes also 100 dos 5.0 compatible allowing run thousands existing software titles including early versions windows august 1996 nokia released nokia 9000 communicator digital cellular pda based nokia 2110 integrated system based pen/geos 3.0 operating system geoworks two components attached hinge became known clamshell design display physical qwerty keyboard pda provided e-mail calendar address book calculator notebook applications text-based web browsing could send receive faxes closed device could used digital cellular telephone june 1999 qualcomm released pdq smartphone cdma digital pcs smartphone integrated palm pda internet connectivity subsequent landmark devices included 1999 japanese wireless provider ntt docomo launched i-mode new mobile internet platform provided data transmission speeds 9.6 kilobits per second access web services available platform online shopping ntt docomo i-mode used chtml language restricted aspects traditional html favor increasing data speed devices limited functionality small screens limited bandwidth allowed phones use slower data speeds available rise i-mode helped ntt docomo accumulate estimated 40 million subscribers end 2001 ranked first market capitalization japan second globally power would later wane face rise 3g new phones advanced wireless network capabilities japanese cell phones increasingly diverged global standards trends offer forms advanced services functionality mobile payments near-field communication nfc 1seg mobile television smartphones still rare outside japan introduction danger hiptop 2002 saw moderate success among u.s. consumers t-mobile sidekick later mid-2000s business users u.s. started adopt devices based microsoft windows mobile blackberry smartphones research motion american users popularized term crackberry 2006 due blackberry addictive nature outside u.s. japan nokia seeing success smartphones based symbian originally developed psion personal organisers popular smartphone os europe middle late 2000s initially nokia symbian smartphones focused business eseries similar windows mobile blackberry devices time 2006 onwards nokia started producing consumer-focused smartphones popularized entertainment-focused nseries 2010 symbian world widely used smartphone operating system 2000s common smartphones physical t9 numeric keypad qwerty keyboard either candybar sliding form factor smartphones resistive touchscreens allowed virtual keyboards handwriting input finger stylus thus also allowing easy entry asian characters 2007 lg prada first mobile phone released large capacitive touchscreen later year apple computer introduced iphone iphone also designed around large capacitive touchscreen added support multi-touch gestures interactions pinching zoom photos web pages phones notable abandoning use stylus keyboard keypad typical smartphones time favor capacitive touchscreen direct finger input input type invention touchscreen smartphone often attributed apple iphone n't first phone touchscreen although made smartphone know today something mainstream due company popularity us lesser extent worldwide made interacting smartphones touchscreen popular following iphone success despite high retail price us 500 smartphone manufacturers started use basic design iphone iphone first smartphone conventional terms ... platform device allows software installed year later followed platforms like palmos symbian windows mobile allowing apps installed apple app store online distribution platform present phone controlled monetized apple became common means smartphone software distribution installation first iphone also faced criticism supporting latest 3g wireless network standards praised hardware software design june 2007 release met heavy demand customers waiting lines outside apple store locations among first purchase screen-focused hardware phones centered around capacitive touchscreen stimulated software focus features web browser designed render full web pages opposed stripped wap services multimedia functionality videos online services maps apps key factor success form factor advantages design around capacitive touchscreen affected development another smartphone os platform android blackberry-like prototype device scrapped favor touchscreen device slide-out physical keyboard google engineers thought time touchscreen could completely replace physical keyboard buttons first android device htc dream released september 2008 although android adoption relatively slow first started gaining widespread popularity 2010 largely due functionality low price early 2012 dominated smartphone market share worldwide continues day android based around modified linux kernel makes linux widely used operating system worldwide also makes android widely used general purpose operating system worldwide apple iphones widespread rich developed countries relatively poor developing countries iphone high end android smartphone considered luxury and/or part social status android iphone devices popularized smartphone form factor based large capacitive touchscreen led decline earlier keyboard- keypad-focused platforms microsoft instance discontinued windows mobile started new touchscreen-oriented os scratch called windows phone nokia abandoned symbian partnered microsoft use windows phone smartphones windows phone became third-most-popular smartphone os replaced windows 10 mobile declined share become largely irrelevant less 0.5 smartphone market palm replaced palm os webos blackberry limited formerly known research motion known phones full qwerty keyboard screen made new platform based qnx blackberry 10 possible control device without press physical buttons mid-2010s almost smartphones touchscreen-only android iphone smartphones dominated market early 2010s larger smartphones screen sizes least 5.5 inches diagonal dubbed phablets began achieve popularity samsung galaxy note series gaining notably wide adoption 2013 huawei launched huawei mate series sports 6.1-inch hd 1280 x 720 ips+ lcd display considered quite large back day 2013 fairphone launched first socially ethical smartphone london design festival address concerns regarding sourcing materials manufacturing followed shiftphone 2015 late 2013 qsalpha commenced production smartphone designed entirely around security encryption identity protection companies began release smartphones incorporating flexible displays create curved form factors samsung galaxy round lg g flex october 2013 motorola mobility announced project ara concept modular smartphone platform would allow users customize upgrade phones add-on modules attached magnetically frame ara retained google following sale motorola mobility lenovo shelved 2016 year lg motorola unveiled smartphones featuring limited form modularity accessories lg g5 allowed accessories installed via removal battery compartment moto z utilizes accessories attached magnetically rear device first smartphone fingerprint reader motorola atrix 4g 2011 september 2013 iphone 5s unveiled first smartphone major u.s. carrier since atrix feature technology 2014 1440p displays began appear high-end smartphones 2015 sony released xperia z5 premium featuring 4k resolution display although images videos could actually rendered resolution software upscaled 1080p microsoft expanding upon concept motorola short-lived webtop unveiled functionality windows 10 operating system phones allows supported devices docked use pc-styled desktop environment major technologies began trend 2016 including focus virtual reality augmented reality experiences catered towards smartphones newly introduced usb-c connector improving lte technologies 2015 global median smartphone ownership 43 statista forecast 2.87 billion people would smartphones 2020 new trends smartphone displays began emerge 2017 lg samsung releasing flagship smartphones utilizing displays taller aspect ratios common ratio designs allow display larger diameter slimmer width 16:9 displays equivalent screen size another trend popularized year displays contained tab-like cut-outs top-centre—colloquially known notch —to contain front-facing camera sometimes sensors typically located along top bezel device designs allow edge-to-edge displays take nearly entire height device little bezel along top design characteristic popularized essential phone featured circular tab camera iphone x used wider tab contain camera facial scanning system 2018 first smartphones featuring fingerprint readers embedded within oled displays announced followed 2019 implementation using ultrasonic sensor samsung galaxy s10 2019 4.7-inches 5.5 inches become industry standard size companies abandoning smaller 4.7-inch displays smartphones foldable displays theorized possible manufacturing costs production processes feasible november 2018 startup company royole unveiled first commercially available foldable smartphone royole flexpai also month samsung presented prototype phone featuring infinity flex display developers conference smaller outer display cover larger tablet-sized display opened samsung stated also develop new polymer material coat display opposed glass early examples foldable phones manufacturers became subject rumors early 2019 samsung officially announced galaxy fold based previously-demonstrated prototype february 2019 originally-scheduled release late-april smartphones central processing units cpus similar computers optimised operate low power environments performance mobile cpu depends clock rate generally given multiples hertz also memory hierarchy challenges performance mobile phone cpus often appropriately given scores derived various standardized tests measure real effective performance commonly used applications one main characteristics smartphones screen depending device design screen fills nearly space device front surface many smartphone displays aspect ratio taller aspect ratios became common 2017 screen sizes measured diagonal inches phones screens larger 5.2 inches often called phablets smartphones screens 4.5 inches size commonly difficult use single hand since thumbs reach entire screen surface may need shifted around hand held one hand manipulated used place hands due design advances modern smartphones large screen sizes edge-to-edge designs compact builds improve ergonomics shift taller aspect ratios resulted phones larger screen sizes whilst maintaining ergonomics associated smaller 16:9 displays liquid-crystal displays common others ips led oled amoled displays displays integrated pressure-sensitive digitizers developed wacom samsung apple force touch system audio quality enhancing features voice lte hd voice appeared often available newer smartphones sound quality remain problem due design phone quality cellular network compression algorithms used long distance calls audio quality improved using voip application wifi cellphones small speakers user use speakerphone feature talk person phone without holding ear small speakers also used listen digital audio files music speech watch videos audio component without holding phone close ear end 2017 smartphone battery life become generally adequate however earlier smartphone battery life poor due weak batteries could handle significant power requirements smartphones computer systems color screens smartphone users purchase additional chargers use outside home work cars buying portable external battery packs external battery packs include generic models connected smartphone cable custom-made models piggyback onto smartphone case 2016 samsung recall millions galaxy note 7 smartphones due explosive battery issue consumer convenience wireless charging stations introduced hotels bars public spaces wide range accessories sold smartphones including cases screen protectors power charging cables wireless power stations usb on-the-go adapters connecting usb drives cases hdmi cable external monitor add-on batteries headphones combined headphone-microphones example allow person privately conduct calls device without holding ear bluetooth-enabled powered speakers enable users listen media smartphones wirelessly cases range relatively inexpensive rubber soft plastic cases provide moderate protection bumps good protection scratches expensive heavy-duty cases combine rubber padding hard outer shell cases book -like form cover user opens use device cover closed protects screen book -like cases additional pockets credit cards thus enabling people use wallets accessories include products sold manufacturer smartphone compatible products made manufacturers mobile operating system mobile os operating system phones tablets smartwatches mobile devices mobile operating systems combine features personal computer operating system features useful mobile handheld use usually including following considered essential modern mobile systems touchscreen cellular bluetooth wi-fi protected access wi-fi global positioning system gps mobile navigation video- single-frame picture cameras speech recognition voice recorder music player near field communication infrared blaster q1 2018 383 million smartphones sold 85.9 percent running android 14.1 percent running ios negligible number smartphones running oses android alone popular popular desktop operating system windows general smartphone use even without tablets exceeds desktop use mobile devices mobile communications abilities e.g. smartphones contain two mobile operating systemsthe main user-facing software platform supplemented second low-level proprietary real-time operating system operates radio hardware research shown low-level systems may contain range security vulnerabilities permitting malicious base stations gain high levels control mobile device mobile app computer program designed run mobile device smartphone term app short-form term software application introduction apple app store iphone ipod touch july 2008 popularized manufacturer-hosted online distribution third-party applications software computer programs focused single platform huge variety apps including video games music products business tools point smartphone application distribution depended third-party sources providing applications multiple platforms getjar handango handmark pocketgear following success app store smartphone manufacturers launched application stores google android market later renamed google play store rim blackberry app world android-related app stores like f-droid february 2014 93 mobile developers targeting smartphones first mobile app development since 1996 smartphone shipments positive growth november 2011 27 photographs created taken camera-equipped smartphones september 2012 study concluded 4 5 smartphone owners use device shop online global smartphone sales surpassed sales figures feature phones early 2013 worldwide shipments smartphones topped 1 billion units 2013 38 2012 725 million comprising 55 share mobile phone market 2013 42 2012 q1 2016 first time shipments dropped 3 percent year year situation caused maturing china market 2011 samsung highest shipment market share worldwide followed apple 2013 samsung 31.3 market share slight increase 30.3 2012 apple 15.3 decrease 18.7 2012 huawei lg lenovo 5 significantly better 2012 figures others 40 previous years figure apple lost market share although shipment volume still increased 12.9 rest significant increases shipment volumes 36–92 q1 2014 samsung 31 share apple 16 q4 2014 apple 20.4 share samsung 19.9 q2 2016 samsung 22.3 share apple 12.9 q1 2017 idc reported samsung first placed 80 million units followed apple 50.8 million huawei 34.6 million oppo 25.5 million vivo 22.7 million samsung mobile business half size apple revenue apple business increased rapidly years 2013 2017 2012 university southern california study found unprotected adolescent sexual activity common among owners smartphones study conducted rensselaer polytechnic institute rpi lighting research center lrc concluded smartphones backlit devices seriously affect sleep cycles persons might become psychologically attached smartphones resulting anxiety separated devices smombie combination smartphone zombie walking person using smartphone paying attention walk possibly risking accident process increasing social phenomenon issue slow-moving smartphone users led temporary creation mobile lane walking chongqing china issue distracted smartphone users led city augsburg germany embed pedestrian traffic lights pavement many countries mobile phones used provide mobile banking services may include ability transfer cash payments secure sms text message kenya m-pesa mobile banking service example allows customers mobile phone operator safaricom hold cash balances recorded sim cards cash deposited withdrawn m-pesa accounts safaricom retail outlets located throughout country transferred electronically person person used pay bills companies branchless banking successful south africa philippines pilot project bali launched 2011 international finance corporation indonesian bank bank mandiri another application mobile banking technology zidisha us-based nonprofit micro-lending platform allows residents developing countries raise small business loans web users worldwide zidisha uses mobile banking loan disbursements repayments transferring funds lenders united states borrowers rural africa mobile phones use internet mobile payments first trialled finland 1998 two coca-cola vending machines espoo enabled work sms payments eventually idea spread 1999 philippines launched country first commercial mobile payments systems mobile operators globe smart mobile phones make mobile payments via direct mobile billing schemes contactless payments phone point sale support near field communication nfc enabling contactless payments nfc-equipped mobile phones requires co-operation manufacturers network operators retail merchants mobile phone use driving—including calling text messaging playing media web browsing gaming using mapping apps operating phone features—is common controversial since widely considered dangerous due known distracted driving distracted operating motor vehicle shown increase risk accidents september 2010 us national highway traffic safety administration nhtsa reported 995 people killed drivers distracted phones march 2011 us insurance company state farm insurance announced results study showed 19 drivers surveyed accessed internet smartphone driving many jurisdictions prohibit use mobile phones driving egypt israel japan portugal singapore handheld hands-free calling mobile phone uses speakerphone banned countries including uk france many us states use calling handheld phones banned hands-free use permitted 2011 study reported 90 college students surveyed text initiate reply read driving scientific literature danger driving sending text message mobile phone texting driving limited simulation study university utah found sixfold increase distraction-related accidents texting due complexity smartphones began grow introduced additional difficulties law enforcement officials attempting distinguish one usage another drivers using devices apparent countries ban handheld hands-free usage rather ban handheld use officials easily tell function phone used simply looking driver lead drivers stopped using device illegally call fact using device legally example using phone incorporated controls car stereo gps satnav 2010 study reviewed incidence phone use cycling effects behavior safety 2013 national survey us reported number drivers reported using phones access internet driving risen nearly one four study conducted university vienna examined approaches reducing inappropriate problematic use mobile phones using phones driving accidents involving driver distracted call phone begun prosecuted negligence similar speeding united kingdom 27 february 2007 motorists caught using handheld phone driving three penalty points added license addition fine £60 increase introduced try stem increase drivers ignoring law japan prohibits use phones driving including use hands-free devices new zealand banned handheld phone use since 1 november 2009 many states united states banned text messaging phones driving illinois became 17th american state enforce law july 2010 30 states banned texting driving kentucky becoming recent addition july 15 public health law research maintains list distracted driving laws united states database laws provides comprehensive view provisions laws restrict use mobile devices driving 50 states district columbia 1992 first law passed december 1 2010 dataset contains information 22 dichotomous continuous categorical variables including example activities regulated e.g. texting versus talking hands-free versus handheld calls web browsing gaming targeted populations exemptions patent war samsung apple started latter claimed original galaxy android phone copied interfaceand possibly hardwareof apple ios iphone 3gs also smartphone patents licensing litigation involving sony mobile google apple inc. samsung microsoft nokia motorola htc huawei zte among others conflict part wider patent wars multinational technology software corporations secure increase market share companies granted patent sue prevent competitors using methods patent covers since 2010s number lawsuits counter-suits trade complaints based patents designs market smartphones devices based smartphone oses android ios increased significantly initial suits countersuits rulings license agreements major events began 2009 smartphone market stated grow rapidly 2012 apps allows sending receiving facsimile fax smartphone including facsimile data composed raster bi-level graphics generated directly digitally document image file formats rise number mobile medical apps market place government regulatory agencies raised concerns safety use applications concerns transformed regulation initiatives worldwide aim safeguarding users untrusted medical advice smartphone malware easily distributed insecure app store often malware hidden pirated versions legitimate apps distributed third-party app stores malware risk also comes known update attack legitimate application later changed include malware component users install notified app updated well one three robberies 2012 united states involved theft mobile phone online petition urged smartphone makers install kill switches devices 2014 apple find iphone google android device manager locate disable wipe data phones lost stolen blackberry protect os version 10.3.2 devices rendered unrecoverable even blackberry operating system recovery tools incorrectly authenticated dissociated account leaked documents published wikileaks codenamed vault 7 dated 2013–2016 detail capabilities united states central intelligence agency cia perform electronic surveillance cyber warfare including ability compromise operating systems smartphones including ios android guidelines mobile device security issued nist many organizations conducting private in-person meeting least one site recommends user switch smartphone disconnect battery using smartphones late night disturb sleep due blue light brightly lit screen affects melatonin levels sleep cycles effort alleviate issues several apps change color temperature screen warmer hue based time day reduce amount blue light generated developed android ios 9.3 integrated similar system-level functionality known night shift amazon released feature known blue shade fire os bellini 5.0 later also theorized users addicted use phones especially go bed result ego depletion many people also use phones alarm clocks also lead loss sleep pocket cameras difficulty producing bokeh images nowadays smartphones dual-lens cameras produce bokeh effect easily even rearrange level bokeh shooting iphone 7 plus debuted dual-lens camera back smartphone advanced smartphones may come 'quad cameras two dual-lens cameras honor 9 lite smartphone back front smartphone 13mp main lens 2mp lens capturing depth information evercoss u50a max smartphone 4 cameras costs less 100 huawei p20 pro smartphone triple lenses back smartphone launched bokeh camera smartphone optical zoom first lens 40mp rgb second lens 20mp monochrome third lens 8mp rgb telephoto 3x zoom enhanced 5x combination optical zoom megapixel lens 40mp rgb produce undeteriorated optical+digital zoom digital zoom without loss quality | [
7148,
5718,
2,
1443,
1447,
1453,
7170,
4317,
2922,
23,
4320,
5740,
7189,
4340,
42,
4343,
5771,
7209,
5775,
65,
84,
5794,
2983,
5803,
7247,
108,
4400,
1544,
3009,
5822,
4407,
118,
7261,
5832,
1565,
3025,
3029,
136,
139,
3039,
1581,
158... | Test |
741 | 3 | Magical_Tree:magical tree konami included magical tree 1998 game anthology konami antiques msx collection vol 2 playstation player character indian brave stereotype wears tanned vest trousers headband feather player ascends magical tree hopping branch branch climbing vines ladders—while also dodging larvae owls lightning bolts player jump dangle branches earns points gathering apples arrows daggers coronets tree 2004 meters tall gauge tracks player altitude conclusion level game informs player much climb reach goal castle treetop ascent divided nine game levels player character dances conclusion level player clears ninth level curtain opens reveal castle top tree smiling crenels castle parapet young woman purple frock man wearing war bonnet end sequence game continues base tree | [] | Test |
742 | 3 | Intel_ADX:intel adx intel adx multi-precision add-carry instruction extensions intel arbitrary-precision arithmetic extension x86 instruction set architecture isa intel adx first supported broadwell microarchitecture instruction set extension contains two new instructions though codice_1 bmi2 also considered part large integer arithmetic support instructions efficient variants existing codice_2 instruction difference two new instructions affects one flag codice_2 signed addition may set overflow carry flags old-style x86 instruction also reset rest cpu flags two versions affecting different flags means two chains additions carry calculated parallel amd added support processors instructions starting ryzen | [
2000,
3173,
4845,
2989,
3262,
4224,
6523,
6616,
1465,
1377,
5665,
5934,
4879,
5669,
5670,
496,
584,
5055,
6647,
2226,
1770,
4077,
6563,
6133,
2332,
1881,
5431,
691,
6945,
3747,
6675,
6236,
352,
971,
6956,
2977,
3248,
4840
] | Test |
743 | 5 | X.400:x.400 x.400 suite itu-t recommendations define standards data communication networks message handling systems mhs — commonly known email one time designers x.400 expecting predominant form email role taken smtp-based internet e-mail despite widely used within organizations core part microsoft exchange server 2006 variants continue important military aviation contexts first x.400 recommendations published 1984 red book substantially revised version published 1988 blue book new features added 1992 white book subsequent updates although x.400 originally designed run adaptation allow operation tcp/ip rfc 1006 become popular way run x.400 developed cooperation iso x.400-series recommendations specify osi standard protocols exchanging addressing electronic messages companion f.400-series recommendations define message handling services built message handling systems mhs well access mhs public services late 1990s itu-t consolidated recommendations f.400 x.400 published itu-t f.400/x.400 06/1999 recommendation message handling system service overview x.400-series recommendations define technical aspects mhs itu-t rec x.402 iso/iec 10021-2 defines overall system architecture mhs itu-t rec x.411 iso/iec 10021-4 defines message transfer service mts functional component message transfer agent mta itu-t rec x.413 iso/iec 10021-5 defines message store itu-t recommendations provide specific terms descriptions system entities procedures example messages email exchanged among people referred interpersonal messaging ipm electronically structured business documents e.g. invoices purchase orders dispatch advice etc exchanged among trading partners ’ computers fall edi protocols message handling distributed information processing task integrates two related subtasks message transfer message storage itu-t recommendations define specific protocols wide range communication tasks example p1 protocol used explicitly communication among mtas p3 user agent mta p7 user agent message store 1994 version p7 enhanced provide folders message store allow storage submitted messages provide many automatic actions auto-foldering correlation replies delivery reports receipt notifications submitted messages x.400 message content standards defined communication user agents modelled conceptual protocols treat p1 p3/p7 providing underlying reliable transport message contents message content standard interpersonal messaging ipm defined itu-t rec x.420 iso/iec 10021-7 named p2 red book extended version ipm blue book given content-type 22 p2 version 2 often referred informally p22 although term used standards message content standard edi defined itu-t rec f.435 iso/iec 10021-8 itu-t rec x.435 iso/iec 10021-9 informally referred p35 voice messaging content type defined itu-t recs f.440 x.440 exchange server 2007 use mta object x.400 connector must use mta gone exchange server 2007 longer x.400 default proxy e-mail addresses exchange server 2007 important features x.400 include structured addressing asn.1 binary code enabling multimedia content predating efficient mime integrated security capabilities x.400 inter-domain relay services assumed itu run ptts x.400 incorporated fields automated transfer messages x.400 ptt services telex facsimile physical postal mail iso later added open routing standards itu-t rec x.412 iso/iec 10021-10 itu-t rec x.404 iso/iec 10021-11 initial misconception x.400 required ptt relay services coupled ptt volume-based charges factors inhibited widespread uptake x.400 late 1980s many major countries committed osi stack via gosip government open systems interconnection profiles united states form 1990 nist federal information processing standard fips 146 turn major computer vendors committed producing osi-compliant products including x.400 microsoft exchange server developed time period internally based x.400/x.500 initial release equally happy dispatch messages via messaging api mapi x.400 simple mail transfer protocol smtp practice however poorly produced seldom put operation north america many large defense contractors universities also already committed internet tcp/ip standards including smtp email x.400 still used applications military intelligence services aviation mainly x.400 functions integrity security developed deployed much earlier smtp counterparts s/mime pgp smtp-tls similar reasons sometimes used transmission edi messages applications europe south america asia x.400 quite widely implemented especially edi services x.400 extended use military applications see mmhs aviation see amhs one core issues x.400 attempted address failure email properly delivered address specified correctly time addressing formats varied platform platform difficult users know properly type error caused delivery fail outright contrast real postal service even partial addresses would routed dead letter office attempt deliver even information missing wrong solve problem x.400 address scheme included several redundant fields could used help deliver message instance separate fields first last name well initials server identified multiple fields including company organization name well country idea address misspelt name company instance would still contain enough information person name country message properly routed time believed email would provided large service providers often national telephone companies meant long message reached service provider indicated administration management domain admd portion address system would likely know user question service provider likely national scope simply providing right country code could enough information route message properly however model fails email services provided user company organization service provider known case national-scale database users improper organization name enough cause fail dominant model today companies use internal server even commonly use provider like gmail invisible outside organization even users model admd unknown organization multi-part addressing system also led format complex users sure fields important tended provide could made trivial things like printing address business card typing email client difficult simpler systems like found smtp unwieldiness addressing format believed many one factor lack success x.400 x.400 address technically referred originator/recipient address two purposes x.400 address consists several elements including standards originally specify email addresses written instance business card even whether field identifiers upper lower case character sets allowed rfc 1685 specified one encoding based 1993 draft itu-t recommendation f.401 looked like 1984 two forms address formats 1988 x.400 recommendations four forms addressing delineated 1984 form 1 variant 1 format renamed mnemonic o/r address 1984 form 1 variant 3 form 2 format combined renamed terminal o/r address new forms introduced numeric o/r form variation form 1 variant 2 postal o/r address first large-scale use conducted u.s. military communication contract 1992 1997 confusion caused x.400 addressing format led creation x.500 standard directory services idea create hierarchical standardized email address directory replication distribution functionality allowed multiple organizations produce single public directory instance administration management domain service provider could optionally upload directory shared x.500 server allow database searched x.400 user agents email creation thereby avoiding needing know anything address recipient name sort organizational name like company unfortunately x.500 protocol proved every bit complex unwieldy x.400 led creation lightweight directory access protocol ldap standardized simple subset x.500 protocols suitable use end-user software searching addresses ldap widely used directory services like microsoft active directory additionally goal providing universal address database fundamentally flawed time proposed era national telecommunications companies like bell canada france télécom people names phone numbers considered public information already collected directories form phone book extending email addresses seemed obvious however simply case 1980s time email often associated business government users organizations treated addresses valuable even confidential reason organizations share information anyone else rfc2693 put imagine cia adding directory agents world-wide x.500 pool | [
644,
2961,
7607,
5722,
5773,
232,
6908,
7144,
3855
] | Validation |
744 | 5 | Bitcoin:bitcoin bitcoin ₿ cryptocurrency decentralized digital currency without central bank single administrator sent user user peer-to-peer bitcoin network without need intermediaries transactions verified network nodes cryptography recorded public distributed ledger called blockchain bitcoin invented unknown person group people using name satoshi nakamoto released open-source software 2009 bitcoins created reward process known mining exchanged currencies products services research produced university cambridge estimates 2017 2.9 5.8 million unique users using cryptocurrency wallet using bitcoin bitcoin criticized use illegal transactions high electricity consumption price volatility thefts exchanges reputable economists stating zero price bitcoin also used investment although several regulatory agencies issued investor alerts bitcoin domain name bitcoin.org registered 18 august 2008 31 october 2008 link paper authored satoshi nakamoto titled bitcoin peer-to-peer electronic cash system posted cryptography mailing list nakamoto implemented bitcoin software open-source code released january 2009 nakamoto identity remains unknown 3 january 2009 bitcoin network created nakamoto mined first block chain known genesis block embedded coinbase block text times 03/jan/2009 chancellor brink second bailout banks note references headline published times interpreted timestamp comment instability caused fractional-reserve banking receiver first bitcoin transaction cypherpunk hal finney created first reusable proof-of-work system rpow 2004 finney downloaded bitcoin software release date 12 january 2009 received ten bitcoins nakamoto early cypherpunk supporters creators bitcoin predecessors wei dai creator b-money nick szabo creator bit gold 2010 first known commercial transaction using bitcoin occurred programmer laszlo hanyecz bought two papa john pizzas ₿10,000 blockchain analysts estimate nakamoto mined one million bitcoins disappearing 2010 handed network alert key control code repository gavin andresen andresen later became lead developer bitcoin foundation andresen sought decentralize control left opportunity controversy develop future development path bitcoin contrast perceived authority nakamoto contributions early proof-of-concept transactions first major users bitcoin black markets silk road 30 months existence beginning february 2011 silk road exclusively accepted bitcoins payment transacting 9.9 million bitcoins worth 214 million 2011 price started 0.30 per bitcoin growing 5.27 year price rose 31.50 8 june within month price fell 11.00 next month fell 7.80 another month 4.77 litecoin early bitcoin spin-off altcoin appeared october 2011 many altcoins created since 2012 bitcoin prices started 5.27 growing 13.30 year 9 january price risen 7.38 crashed 49 3.80 next 16 days price rose 16.41 17 august fell 57 7.10 next three days bitcoin foundation founded september 2012 promote bitcoin development uptake 2013 prices started 13.30 rising 770 1 january 2014 march 2013 blockchain temporarily split two independent chains different rules due bug version 0.8 bitcoin software two blockchains operated simultaneously six hours version transaction history moment split normal operation restored majority network downgraded version 0.7 bitcoin software selecting backward compatible version blockchain result blockchain became longest chain could accepted participants regardless bitcoin software version split mt gox exchange briefly halted bitcoin deposits price dropped 23 37 recovering previous level approximately 48 following hours us financial crimes enforcement network fincen established regulatory guidelines decentralized virtual currencies bitcoin classifying american bitcoin miners sell generated bitcoins money service businesses msbs subject registration legal obligations april exchanges bitinstant mt gox experienced processing delays due insufficient capacity resulting bitcoin price dropping 266 76 returning 160 within six hours bitcoin price rose 259 10 april crashed 83 45 next three days 15 may 2013 us authorities seized accounts associated mt gox discovering registered money transmitter fincen us 23 june 2013 us drug enforcement administration listed ₿11.02 seized asset united states department justice seizure notice pursuant 21 u.s.c § 881 marked first time government agency seized bitcoin fbi seized ₿30,000 october 2013 dark web website silk road arrest ross william ulbricht bitcoins sold blind auction united states marshals service venture capital investor tim draper bitcoin price rose 755 19 november crashed 50 378 day 30 november 2013 price reached 1,163 starting long-term crash declining 87 152 january 2015 5 december 2013 people bank china prohibited chinese financial institutions using bitcoins announcement value bitcoins dropped baidu longer accepted bitcoins certain services buying real-world goods virtual currency illegal china since least 2009 2014 prices started 770 fell 314 year july 30 2014 wikimedia foundation started accepting donations bitcoin 2015. prices started 314 rose 434 year 2016 prices rose 998 1 january 2017 prices started 998 2017 rose 13,412.44 1 january 2018 reaching time high 19,783.06 17 december 2017 china banned trading bitcoin first steps taken september 2017 complete ban started 1 february 2018 bitcoin prices fell 9,052 6,914 5 february 2018 percentage bitcoin trading chinese renminbi fell 90 september 2017 less 1 june 2018 throughout rest first half 2018 bitcoin price fluctuated 11,480 5,848 1 july 2018 bitcoin price 6,343 price january 1 2019 3,747 72 2018 81 since all-time high bitcoin prices negatively affected several hacks thefts cryptocurrency exchanges including thefts coincheck january 2018 coinrail bithumb june bancor july first six months 2018 761 million worth cryptocurrencies reported stolen exchanges bitcoin price affected even though cryptocurrencies stolen coinrail bancor investors worried security cryptocurrency exchanges unit account bitcoin system bitcoin ticker symbols used represent bitcoin btc xbt unicode character ₿ small amounts bitcoin used alternative units millibitcoin mbtc satoshi sat named homage bitcoin creator satoshi smallest amount within bitcoin representing bitcoins one hundred millionth bitcoin millibitcoin equals bitcoins one thousandth bitcoin 100,000 satoshis bitcoin blockchain public ledger records bitcoin transactions implemented chain blocks block containing hash previous block genesis block chain network communicating nodes running bitcoin software maintains blockchain transactions form payer x sends bitcoins payee z broadcast network using readily available software applications network nodes validate transactions add copy ledger broadcast ledger additions nodes achieve independent verification chain ownership network node stores copy blockchain every 10 minutes new group accepted transactions called block created added blockchain quickly published nodes without requiring central oversight allows bitcoin software determine particular bitcoin spent needed prevent double-spending conventional ledger records transfers actual bills promissory notes exist apart blockchain place bitcoins said exist form unspent outputs transactions transactions defined using forth-like scripting language transactions consist one inputs one outputs user sends bitcoins user designates address amount bitcoin sent address output prevent double spending input must refer previous unspent output blockchain use multiple inputs corresponds use multiple coins cash transaction since transactions multiple outputs users send bitcoins multiple recipients one transaction cash transaction sum inputs coins used pay exceed intended sum payments case additional output used returning change back payer input satoshis accounted transaction outputs become transaction fee though transaction fees optional miners choose transactions process prioritize pay higher fees miners may choose transactions based fee paid relative storage size absolute amount money paid fee fees generally measured satoshis per byte sat/b size transactions dependent number inputs used create transaction number outputs blockchain bitcoins registered bitcoin addresses creating bitcoin address requires nothing picking random valid private key computing corresponding bitcoin address computation done split second reverse computing private key given bitcoin address mathematically unfeasible users tell others make public bitcoin address without compromising corresponding private key moreover number valid private keys vast extremely unlikely someone compute key-pair already use funds vast number valid private keys makes unfeasible brute force could used compromise private key able spend bitcoins owner must know corresponding private key digitally sign transaction network verifies signature using public key private key never revealed private key lost bitcoin network recognize evidence ownership coins unusable effectively lost example 2013 one user claimed lost 7,500 bitcoins worth 7.5 million time accidentally discarded hard drive containing private key 20 bitcoins believed lost would market value 20 billion july 2018 prices ensure security bitcoins private key must kept secret private key revealed third party e.g data breach third party use steal associated bitcoins around 980,000 bitcoins stolen cryptocurrency exchanges regarding ownership distribution 16 march 2018 0.5 bitcoin wallets 87 bitcoins ever mined mining record-keeping service done use computer processing power miners keep blockchain consistent complete unalterable repeatedly grouping newly broadcast transactions block broadcast network verified recipient nodes block contains sha-256 cryptographic hash previous block thus linking previous block giving blockchain name accepted rest network new block must contain proof-of-work pow system used based adam back 1997 anti-spam scheme hashcash pow requires miners find number called nonce block content hashed along nonce result numerically smaller network difficulty target proof easy node network verify extremely time-consuming generate secure cryptographic hash miners must try many different nonce values usually sequence tested values ascending natural numbers 0 1 2 3 ... meeting difficulty target every 2,016 blocks approximately 14 days roughly 10 min per block difficulty target adjusted based network recent performance aim keeping average time new blocks ten minutes way system automatically adapts total amount mining power network 1 march 2014 1 march 2015 average number nonces miners try creating new block increased 16.4 quintillion 200.5 quintillion proof-of-work system alongside chaining blocks makes modifications blockchain extremely hard attacker must modify subsequent blocks order modifications one block accepted new blocks mined time difficulty modifying block increases time passes number subsequent blocks also called confirmations given block increases successful miner finding new block allowed rest network reward newly created bitcoins transaction fees reward amounted 12.5 newly created bitcoins per block added blockchain plus transaction fees payments processed block claim reward special transaction called coinbase included processed payments bitcoins existence created coinbase transactions bitcoin protocol specifies reward adding block halved every 210,000 blocks approximately every four years eventually reward decrease zero limit 21 million bitcoins reached 2140 record keeping rewarded solely transaction fees words nakamoto set monetary policy based artificial scarcity bitcoin inception total number bitcoins could never exceed 21 million new bitcoins created roughly every ten minutes rate generated drops half every four years circulation computing power often bundled together pooled reduce variance miner income individual mining rigs often wait long periods confirm block transactions receive payment pool participating miners get paid every time participating server solves block payment depends amount work individual miner contributed help find block wallet stores information necessary transact bitcoins wallets often described place hold store bitcoins due nature system bitcoins inseparable blockchain transaction ledger wallet correctly defined something stores digital credentials bitcoin holdings allows one access spend bitcoin uses public-key cryptography two cryptographic keys one public one private generated basic wallet collection keys several modes wallets operate inverse relationship regards trustlessness computational requirements third-party internet services called online wallets offer similar functionality may easier use case credentials access funds stored online wallet provider rather user hardware result user must complete trust online wallet provider malicious provider breach server security may cause entrusted bitcoins stolen example security breach occurred mt gox 2011 physical wallets store credentials necessary spend bitcoins offline simple paper printout private key paper wallet paper wallet created keypair generated computer internet connection private key written printed onto paper erased computer paper wallet stored safe physical location later retrieval bitcoins stored using paper wallet said cold storage 2014 interview quadrigacx founder gerald cotten explained company stored customer funds paper wallets safe deposit boxes send money ’ need go back bank every time want put money send money bitcoin app directly paper wallets keep safe way cameron tyler winklevoss founders gemini trust co. exchange reported cut paper wallets pieces stored envelopes distributed safe deposit boxes across united states system theft one envelope would neither allow thief steal bitcoins deprive rightful owners access physical wallets also take form metal token coins private key accessible security hologram recess struck reverse side security hologram self-destructs removed token showing private key accessed originally tokens struck brass base metals later used precious metals bitcoin grew value popularity coins stored face value high ₿1000 struck gold british museum coin collection includes four specimens earliest series funded bitcoin tokens one currently display museum money gallery 2013 utahn manufacturer tokens ordered financial crimes enforcement network fincen register money services business producing funded bitcoin tokens another type physical wallet called hardware wallet keeps credentials offline facilitating transactions hardware wallet acts computer peripheral signs transactions requested user must press button wallet confirm intended make transaction hardware wallets never expose private keys keeping bitcoins cold storage even used computers may compromised malware first wallet program simply named bitcoin sometimes referred satoshi client released 2009 satoshi nakamoto open-source software version 0.5 client moved wxwidgets user interface toolkit qt whole bundle referred bitcoin-qt release version 0.9 software bundle renamed bitcoin core distinguish underlying network bitcoin core perhaps best known implementation client alternative clients forks bitcoin core exist bitcoin xt bitcoin unlimited parity bitcoin 1 august 2017 hard fork bitcoin created known bitcoin cash bitcoin cash larger block size limit identical blockchain time fork 24 october 2017 another hard fork bitcoin gold created bitcoin gold changes proof-of-work algorithm used mining developers felt mining become specialized bitcoin decentralized researchers pointed trend towards centralization although bitcoin sent directly user user practice intermediaries widely used bitcoin miners join large mining pools minimize variance income transactions network confirmed miners decentralization network requires single miner mining pool obtains 51 hashing power would allow double-spend coins prevent certain transactions verified prevent miners earning income six mining pools controlled 75 overall bitcoin hashing power 2014 mining pool ghash.io obtained 51 hashing power raised significant controversies safety network pool voluntarily capped hashing power 39.99 requested pools act responsibly benefit whole network 70 hashing power 90 transactions operating china according researchers parts ecosystem also controlled small set entities notably maintenance client software online wallets simplified payment verification spv clients bitcoin pseudonymous meaning funds tied real-world entities rather bitcoin addresses owners bitcoin addresses explicitly identified transactions blockchain public addition transactions linked individuals companies idioms use e.g. transactions spend coins multiple inputs indicate inputs may common owner corroborating public transaction data known information owners certain addresses additionally bitcoin exchanges bitcoins traded traditional currencies may required law collect personal information heighten financial privacy new bitcoin address generated transaction wallets similar software technically handle bitcoins equivalent establishing basic level fungibility researchers pointed history bitcoin registered publicly available blockchain ledger users may refuse accept bitcoins coming controversial transactions would harm bitcoin fungibility example 2012 mt gox froze accounts users deposited bitcoins known stolen blocks blockchain originally limited 32 megabytes size block size limit one megabyte introduced satoshi nakamoto 2010 eventually block size limit one megabyte created problems transaction processing increasing transaction fees delayed processing transactions satoshi nakamoto stated white paper root problem conventional currencies trust required make work central bank must trusted debase currency history fiat currencies full breaches trust according european central bank decentralization money offered bitcoin theoretical roots austrian school economics especially friedrich von hayek book denationalisation money argument refined hayek advocates complete free market production distribution management money end monopoly central banks according new york times libertarians anarchists attracted idea early bitcoin supporter roger ver said first almost everyone got involved philosophical reasons saw bitcoin great idea way separate money state economist describes bitcoin techno-anarchist project create online version cash way people transact without possibility interference malicious governments banks david golumbia says ideas influencing bitcoin advocates emerge right-wing extremist movements liberty lobby john birch society anti-central bank rhetoric recently ron paul tea party-style libertarianism steve bannon owns good stake bitcoin considers disruptive populism takes control back central authorities revolutionary however researchers looking uncover reasons interest bitcoin find evidence google search data linked libertarianism bitcoin digital asset designed work peer-to-peer transactions currency bitcoins three qualities useful currency according economist january 2015 hard earn limited supply easy verify per researchers bitcoin functions payment system currency economists define money store value medium exchange unit account according economist 2014 bitcoin functions best medium exchange however debated 2018 assessment economist stated cryptocurrencies met none three criteria according research cambridge university 2.9 million 5.8 million unique users used cryptocurrency wallet 2017 bitcoin number users grown significantly since 2013 300,000–1.3 million users addition characterized cryptocurrency bitcoin also characterized payment system overwhelming majority bitcoin transactions take place cryptocurrency exchange rather used transactions merchants delays processing payments blockchain ten minutes make bitcoin use difficult retail setting prices usually quoted units bitcoin many trades involve one sometimes two conversions conventional currencies merchants accept bitcoin payments may use payment service providers perform conversions 2017 2018 bitcoin acceptance among major online retailers included three top 500 u.s. online merchants five 2016 reasons decline include high transaction fees due bitcoin scalability issues long transaction times bloomberg reported largest 17 crypto merchant-processing services handled 69 million june 2018 411 million september 2017 bitcoin actually usable retail transactions high costs inability process chargebacks according nicholas weaver researcher quoted bloomberg high price volatility transaction fees make paying small retail purchases bitcoin impractical according economist kim grauer however bitcoin continues used large-item purchases sites overstock.com cross-border payments freelancers vendors bitcoins bought digital currency exchanges per researchers little sign bitcoin use international remittances despite high fees charged banks western union compete market south china morning post however mentions use bitcoin hong kong workers transfer money home 2014 national australia bank closed accounts businesses ties bitcoin hsbc refused serve hedge fund links bitcoin australian banks general reported closing bank accounts operators businesses involving currency 10 december 2017 chicago board options exchange started trading bitcoin futures followed chicago mercantile exchange started trading bitcoin futures 17 december 2017 winklevoss twins purchased bitcoin 2013 washington post reported claim owned 1 bitcoins existence time methods investment bitcoin funds first regulated bitcoin fund established jersey july 2014 approved jersey financial services commission forbes named bitcoin best investment 2013 2014 bloomberg named bitcoin one worst investments year 2015 bitcoin topped bloomberg currency tables according bitinfocharts.com 2017 9,272 bitcoin wallets 1 million worth bitcoins exact number bitcoin millionaires uncertain single person one bitcoin wallet venture capitalists peter thiel founders fund invested million bitpay purchase bitcoins instead fund bitcoin infrastructure provides payment systems merchants exchanges wallet services etc 2012 incubator bitcoin-focused start-ups founded adam draper financing help father venture capitalist tim draper one largest bitcoin holders winning auction 30,000 bitcoins time called mystery buyer company goal fund 100 bitcoin businesses within 2–3 years 10,000 20,000 6 stake investors also invest bitcoin mining according 2015 study paolo tasca bitcoin startups raised almost 1 billion three years q1 2012 – q1 2015 price bitcoins gone cycles appreciation depreciation referred bubbles busts 2011 value one bitcoin rapidly rose us 0.30 us 32 returning us 2 latter half 2012 2012–13 cypriot financial crisis bitcoin price began rise reaching high us 266 10 april 2013 crashing around us 50 29 november 2013 cost one bitcoin rose peak us 1,242 2014 price fell sharply april remained depressed little half 2013 prices us 600 time bitcoin developers gavin andresen mike hearn warned bubbles may occur according mark t. williams bitcoin volatility seven times greater gold eight times greater p 500 18 times greater us dollar bitcoin decentralized nature trading online exchanges located many countries regulation bitcoin difficult however use bitcoin criminalized shutting exchanges peer-to-peer economy given country would constitute de facto ban legal status bitcoin varies substantially country country still undefined changing many regulations bans apply bitcoin probably extend similar cryptocurrency systems according library congress absolute ban trading using cryptocurrencies applies eight countries algeria bolivia egypt iraq morocco nepal pakistan united arab emirates implicit ban applies another 15 countries include bahrain bangladesh china colombia dominican republic indonesia iran kuwait lesotho lithuania macau oman qatar saudi arabia taiwan u.s. commodity futures trading commission issued four customer advisories bitcoin related investments july 2018 warning emphasized trading cryptocurrency often speculative risk theft hacking fraud december 2017 advisory warned virtual currencies risky u.s. securities exchange commission also issued warnings may 2014 investor alert warned investments involving bitcoin might high rates fraud investors might solicited social media sites earlier investor alert warned use bitcoin ponzi schemes european banking authority issued warning 2013 focusing lack regulation bitcoin chance exchanges would hacked volatility bitcoin price general fraud self-regulatory organization finra north american securities administrators association issued investor alerts bitcoin official investigation bitcoin traders reported may 2018 u.s. justice department launched investigation possible price manipulation including techniques spoofing wash trades traders u.s. u.k south korea possibly countries investigated brett redfearn head u.s. securities exchange commission division trading markets identified several manipulation techniques concern march 2018 u.s. federal investigation prompted concerns possible manipulation futures settlement dates final settlement price cme bitcoin futures determined prices four exchanges bitstamp coinbase itbit kraken following first delivery date january 2018 cme requested extensive detailed trading information several exchanges refused provide later provided limited data commodity futures trading commission subpoenaed data exchanges state provincial securities regulators coordinated north american securities administrators association investigating bitcoin scams icos 40 jurisdictions academic research published journal monetary economics concluded price manipulation occurred mt gox bitcoin theft market remains vulnerable manipulation history hacks fraud theft involving bitcoin dates back least 2011 research john m. griffin amin shams 2018 suggests trading associated increases amount tether cryptocurrency associated trading bitfinex exchange account half price increase bitcoin late 2017 j.l van der velde ceo bitfinex tether denied claims price manipulation bitfinex tether ever engaged sort market price manipulation tether issuances used prop price bitcoin coin/token bitfinex bank international settlements summarized several criticisms bitcoin chapter v 2018 annual report criticisms include lack stability bitcoin price high energy consumption high variable transactions costs poor security fraud cryptocurrency exchanges vulnerability debasement forking influence miners economist wrote 2015 criticisms unfair predominantly shady image may compel users overlook capabilities blockchain technology also due fact volatility bitcoin changing time bitcoin along cryptocurrencies described economic bubble least eight nobel memorial prize economic sciences laureates including robert shiller joseph stiglitz richard thaler noted keynesian economist paul krugman wrote new york times column criticizing bitcoin calling bubble fraud professor nouriel roubini new york university called bitcoin mother bubbles central bankers including former federal reserve chairman alan greenspan investors warren buffett george soros stated similar views business executives jamie dimon jack bitcoin criticized amount electricity consumed mining economist estimated even miners used modern facilities combined electricity consumption would 166.7 megawatts 1.46 terawatt-hours per year end 2017 global bitcoin mining activity estimated consume one four gigawatts electricity politico noted even high-end estimates bitcoin total consumption levels amount 6 total power consumed global banking sector even bitcoin consumption levels increased 100 fold today levels bitcoin consumption would still amount 2 global power consumption lower costs bitcoin miners set places like iceland geothermal energy cheap cooling arctic air free bitcoin miners known use hydroelectric power tibet quebec washington state austria reduce electricity costs miners attracted suppliers hydro quebec energy surpluses according university cambridge study much bitcoin mining done china electricity subsidized government various journalists economists central bank estonia voiced concerns bitcoin ponzi scheme april 2013 eric posner law professor university chicago stated real ponzi scheme takes fraud bitcoin contrast seems like collective delusion july 2014 report world bank concluded bitcoin deliberate ponzi scheme june 2014 swiss federal council examined concerns bitcoin might pyramid scheme concluded since case bitcoin typical promises profits lacking assumed bitcoin pyramid scheme july 2017 billionaire howard marks referred bitcoin pyramid scheme bitcoin vulnerable theft phishing scamming hacking around 980,000 bitcoins stolen cryptocurrency exchanges use bitcoin criminals attracted attention financial regulators legislative bodies law enforcement media united states fbi prepared intelligence assessment sec issued pointed warning investment schemes using virtual currencies u.s. senate held hearing virtual currencies november 2013 u.s. government claimed bitcoin used facilitate payments related russian interference 2016 united states elections several news outlets asserted popularity bitcoins hinges ability use purchase illegal goods nobel-prize winning economist joseph stiglitz says bitcoin anonymity encourages money laundering crimes open hole like bitcoin nefarious activity go hole government allow also said regulate could n't engage money laundering crimes demand bitcoin regulating abuses going regulate existence exists abuses 2014 researchers university kentucky found robust evidence computer programming enthusiasts illegal activity drive interest bitcoin find limited support political investment motives australian researchers estimated 25 bitcoin users 44 bitcoin transactions associated illegal activity estimated 24 million bitcoin users primarily using bitcoin illegal activity held 8 billion worth bitcoin made 36 million transactions valued 72 billion charles stross 2013 science fiction novel neptune brood universal interstellar payment system known bitcoin operates using cryptography stross later blogged reference intentional saying wrote neptune brood 2011 bitcoin obscure back figured enough name recognition useful term interstellar currency 'd clue people networked digital currency 2014 documentary rise rise bitcoin portrays diversity motives behind use bitcoin interviewing people use include computer programmer drug dealer 2016 documentary banking bitcoin introduction beginnings bitcoin ideas behind cryptocurrency today september 2015 establishment peer-reviewed academic journal ledger announced covers studies cryptocurrencies related technologies published university pittsburgh journal encourages authors digitally sign file hash submitted papers timestamped bitcoin blockchain authors also asked include personal bitcoin address first page papers | [
6069,
5629,
1340,
5808,
2821,
3263,
1168,
376,
6424,
7343,
993,
6526,
3528,
6430,
7442,
1376,
7050,
2482,
5746,
3024,
2576,
7600,
403,
744,
584,
3798,
5939,
499,
4159,
840,
4067,
6025,
6653,
48,
6654,
5325,
6216,
7848,
7928,
600,
3401,
... | Test |
745 | 8 | Kiwix:kiwix kiwix free open-source offline web browser created emmanuel engelhart renaud gaudin 2007 first launched allow offline access wikipedia since expanded include projects wikimedia foundation well public domain texts project gutenberg available 100 languages kiwix included several high-profile projects smuggling operations north korea encyclopedic access cuba google impact challenge recipient bibliothèques sans frontières founder emmanuel engelhart sees wikipedia common good saying contents wikipedia available everyone even without internet access launched kiwix project becoming wikipedia editor 2004 emmanuel engelhart became interested developing offline versions wikipedia initiated 2003 trigger project 2012 kiwix grant wikimedia france build kiwix-plug deployed universities eleven countries known afripedia project february 2013 kiwix sourceforge project month award open source award 2015 software designed offline reader web content used computers without internet connection computers slow expensive connection avoid censorship also used traveling e.g plane train users first download kiwix download content offline viewing kiwix compression saves disk space bandwidth english-language wikipedia pictures fits usb stick 54 gb may 2016 16 gb pictures content files compressed zim format makes smaller leaves easy index search selectively decompress zim files opened kiwix looks behaves like web browser kiwix offers full text search tabbed navigation option export articles pdf html http server version called kiwix-serve allows computer host kiwix content make available computers network computers see ordinary website kiwix-plug http server version plug computers often used provide wi-fi server kiwix uses deprecated xulrunner mozilla application framework localised translatewiki.net plans replace list content available kiwix available download including language-specific sublists content loaded kiwix since 2014 wikipedia versions available download various different languages english wikipedia full version containing pictures well alternative version containing text downloaded archive servers updated every two ten months depending size file english wikipedia update frequency thus substantially lower bzip2 database downloads wikimedia foundation besides wikipedia content wikimedia foundation wikisource wikiquote wikivoyage wikibooks wikiversity also available offline viewing various different languages november 2014 zim version open texts forming part project gutenberg made available besides public domain content works licensed creative commons license available download well example offline versions ubuntu wiki containing user documentation ubuntu operating system zim editions ted conference talks videos crash course available kiwix archive zim file formats kiwix installed desktop computer stand-alone program installed tablet smartphone create wlan environment raspberry plug software development project kiwix directly involved deployment projects however third party organisations use software component projects examples include kiwix formerly available native package managers linux distributions however kiwix currently available package databases due xulrunner program kiwix depends deprecated mozilla removed package databases kiwix available sugar archlinux linux distributions also available android kiwix available microsoft store google play apple ios app store since 2015 series customized apps also released medical wikipedia phet simulations two largest | [
745,
3738,
647,
6312,
3559,
169,
5571,
6015,
7619,
578,
1284,
4627,
740,
2645
] | Test |
746 | 3 | PlayStation_2_accessories:playstation 2 accessories various accessories playstation 2 video game console produced sony well third parties include controllers audio video input devices like microphones video cameras cables better sound picture quality dualshock 2 analog controller scph-10010 standard controller playstation 2 almost identical original dualshock controller original playstation console minor changes buttons l3 r3 analog feature analog pressure sensitivity connecting cable slightly longer original dualshock black rather grey connector squarer dualshock 2 printed top controller features two levels vibration feedback logitech cordless action controller officially licensed wireless controller playstation 2 made logitech features inputs found standard dualshock 2 controller i.e ten analog pressure-sensitive buttons l1 r1 l2 r2 start select three digital button l3 r3 analog mode button two analog sticks buttons pressure-sensitive controller compatible games require dualshock 2 controller also features two vibration motors haptic feedback compatible dualshock/dualshock 2 enabled games power saving measure vibration may turned user way button controller face powered two aa batteries communicates console using proprietary 2.4 ghz rf protocol wireless way dongle connects ps2 controller port similar manner nintendo wavebird wireless controller like logitech cordless action controller logitech cordless controller officially licensed wireless playstation 2 controller made logitech features buttons including analog functionality standard dualshock 2 controller compatible games requiring dualshock 2 powered two aa batteries power-saving measure vibration function turned communicates console via wireless dongle connects ps2 controller port uses proprietary 2.4 ghz rf technology sega saturn ps2 controller controller ps2 based around sega saturn type-2/japanese style controller controller officially licensed sony sega first version released black exclusively japan 2005 second version produced color purple part joint venture sega capcom coincide launch vampire darkstalkers collection japan connector almost identical original saturn controller minor changes place original saturn start button indented playstation style start select buttons additionally reset stop play/pause rewind fast-forward labels x z l r buttons removed labels corresponding playstation buttons added listed http //uk.playstation.com/ps2/peripherals/detail/item285752/driving-force e2 84 a2-gt/ various microphones available use playstation 2 rhythm games sony singstar karaoke games harmonix rock band series singstar microphones available wired wireless varieties connect console via usb certain ps2 games dance pad compatible allows player follow alongside game actions player must perform usually found games dance revolution games buzz buzzers special controllers designed specifically buzz quiz game series controllers feature large red buzzer buttons four smaller coloured buttons answer selection wired wireless versions available come bundled buzz games four-buzzer set acts single usb device connects usb port playstation 2 wireless versions connect via usb dongle dongle able support 4 wireless buzzers time second dongle required additional buzzers 8 player games wired wireless versions buzzers compatible playstation 2 playstation 3 big button controllers available xbox 360 heavily resemble buzzers many respects fulfil function dvd remote control infra-red remote control playstation 2 designed allow easier control dvd movies first remote scph-10150 came bundled scph-10170 infra-red receiver dongle scph-10160 attached one playstation 2 controller ports dongle needed later ps2 models beginning scph-500xx slimline ps2 models scph-700xx scph-900xx feature integrated ir port two different models dvd remote control released minor differences first released scph-10150 second scph-10420 functionally visually identical apart addition eject reset/power buttons however eject button work ps2 models scph-100xx -500xx slimline playstation 2 models motorized disc tray eject versions remote feature standard ps2 buttons addition dvd playback controls various a/v cables made available playstation 2 offer varying levels picture quality additionally ps2 features toslink port facilitates output digital s/pdif audio 2-channel lpcm 5.1-channel dolby digital 5.1-channel dts latter two available dvd playback encoded disk ps2 compatible playstation playstation 3 cables use av-multi port rfu adapter scph-1122 rf modulator cable carries mono audio video 576i/50 hz pal 480i/60 hz ntsc via rf signal connects using tv aerial plug similar rfu adapter cable available playstation av cable scph-10500 included ps2 carries dual-channel stereo audio composite video 576i/50 hz pal 480i/60 hz ntsc identical composite cables available playstation playstation 3 consoles pal territories also come bundled composite/stereo scart adapter block facilitate connection scart enabled tvs merely adapter provides quality improvement direct composite connection s-video cable scph-10060u/97030 carries dual-channel stereo audio s-video 576i/50 hz pal 480i/60 hz ntsc provides clearer picture standard av cable av adaptor video connector scph-10130 break-out box provides additional av-multi port well composite s-video stereo audio connectors allow connection av receiver similar device euro av cable scph-10142 scart cable capable carrying 576i/50 hz 480i/60 hz using rgb standard well standard stereo audio composite video provides clearer picture either s-video composite signals use euro av cable ps2 must set rgb mode options component av cable scph-10490 cable capable carrying 576i/50 hz 480i/60 hz using ypp rgb standards well standard stereo audio via rca connectors provides clearer picture either s-video composite signals also required games support video modes progressive scan 480p 1080i ps1 games output 240p cable may cause compatibility issues newer tv's.to use component av cable ps2 must set ypp mode options d-terminal cable identical component cable connector sold japan uses japanese d-terminal standard playstation 2 vga cable carries rgbhv video via vga connector compatible progressive scan games ps2 linux since ps2 output separate sync sync green must used instead may incompatible monitors memory card 8 mb scph-10020 magic gate used store settings eyetoy video messages savegames official sony memory cards available size 8 mb memory card came black crimson red ocean blue later sony partnered third-party accessories company katana make memory cards came 16 mb 32 mb memory cards officially licensed products playstation 2 logo says magic gate third party memory cards available 128 mb multitap playstation 2 allows four controllers four memory cards attached single controller port memory card slot 8 controllers memory cards may attached console one time using two multitaps simultaneously certain multitaps work specific ps2 models due slight differences slot placement scph-10090 designed fit original consoles scph-70120 instead designed slim consoles eyetoy digital camera device similar webcam playstation 2 originally eyetoys manufactured logitech known logicool japan later models manufactured namtai eyetoy mainly used playing specifically-designed eyetoy games also used capture images videos also compatible playstation 3 ps2 headset connects via usb 1.1 front console headset commonly used online multiplayer games however also used karaoke style games voice control enhance immersive experience single player games 3.5mm audio stereo splitter transfer audio playstation 2 output devices including headphones headset speakers playstation 2 network adapter optional accessory internet multiplayer compatible games although ps2 slim one built ps2 fat network adapter needed purchased official sony playstation 2 usb keyboard mouse came bundled part linux playstation 2 turns non slim ps2 linux computer standard usb keyboard mouse work addition linux kit handful games used keyboard mouse mouse trackball vertical stand attached playstation 2 console allow stand vertically three different versions available scph-10040 original large consoles scph-70110 slimline scph-700xx consoles scph-90110 slimline scph-900xx consoles horizontal stand attached base original fat playstation 2 consoles add height style | [
7232,
450,
6330,
2177,
7962,
7514,
4761,
6621,
4408,
481,
7014,
4718,
602,
2873,
424,
253,
4011,
4911,
5446,
4748
] | Test |
747 | 7 | Limnu:limnu limnu online whiteboarding app founded 2015 david debry david hart primarily used educators businesses sketch ideas digital boards via ipad users invite others view edit boards | [] | Test |
748 | 4 | Open_Information_Security_Maturity_Model:open information security maturity model open group information security management maturity model o-ism3 information security management framework provides approach designing planning implementing governing information security management systems original motivation behind o-ism3 development narrow gap theory practice information security management systems trigger idea linking security management maturity models o-ism3 strove keep clear number pitfalls previous approaches project looked capability maturity model integration iso 9000 cobit itil standards found potential improvement several fields linking security business needs using process based approach providing additional details implementation suggesting specific metrics preserving compatibility current security management standards open group provides o-ism3 free charge organisations internal noncommercial purposes | [
4440
] | Validation |
749 | 4 | Control-flow_integrity:control-flow integrity control-flow integrity cfi general term computer security techniques prevent wide variety malware attacks redirecting flow execution program associated techniques include code-pointer separation cps code-pointer integrity cpi stack canaries shadow stacks vtable pointer verification related implementations available clang microsoft control flow guard return flow guard google indirect function-call checks reuse attack protector rap control flow guard cfg first released windows 8.1 update 3 kb3000850 november 2014 developers add cfg programs adding codice_1 linker flag program linking visual studio 2015 newer windows 10 creators update windows 10 version 1703 windows kernel compiled cfg windows kernel uses hyper-v prevent malicious kernel code overwriting cfg bitmap cfg operates creating per-process bitmap set bit indicates address valid destination performing indirect function call application checks destination address bitmap destination address bitmap program terminates makes difficult attacker exploit use-after-free replacing object contents using indirect function call execute payload protected indirect function calls codice_2 function called performs following steps several generic techniques bypassing cfg | [
1363,
449,
4729,
755,
3220,
1584,
6731,
1805
] | Validation |
750 | 8 | UTM_parameters:utm parameters urchin tracking module utm parameters five variants url parameters used marketers track effectiveness online marketing campaigns across traffic sources publishing media introduced google analytics predecessor urchin consequently supported out-of-the-box google analytics utm parameters url identify campaign refers traffic specific website attributes browser website session sessions campaign attribution window expires parameters parsed analytics tools used populate reports example url utm parameters highlighted question mark codice_1 utm parameters url identify marketing campaign refers traffic specific website define append relevant utm parameters appropriate urls marketers routinely use simple spreadsheet-based automated utm builder tools including google analytics url builder websites equivalent chrome extension hyperlink followed contains url utm parameters web analytics software destination website interprets parameter information attributes browser website session sessions campaign attribution window expired default six months google analytics utm parameters passed urls parsed analytics tools google analytics adobe analytics data used populate standard custom analytics reports web analytics software may attribute parameters browser current subsequent sessions campaign window expired five different utm parameters may used order | [
2902,
7390,
3850,
3383
] | Test |
751 | 8 | Web_Single_Sign-On_Interoperability_Profile:web single sign-on interoperability profile web single sign-on interoperability profile web services federated identity specification published microsoft sun microsystems defines interoperability ws-federation liberty alliance protocols | [
6986,
5500,
1409
] | Validation |
752 | 9 | Eugene_McDonnell:eugene mcdonnell eugene edward mcdonnell october 18 1926 – august 17 2010 computer science pioneer long-time contributor programming language siblings apl j graduate brooklyn technical high school serving infantry corporal u.s. army world war ii attended university kentucky graduating 1949 summa cum laude elected phi beta kappa awarded first year graduate fellowship harvard university studied comparative literature particularly dante ’ divine comedy studying poems robert frost noticed first two poems frost book west-running brook spring pools freedom moon discuss reflecting rhyme schemes two reflect aabcbc cbcbaa met frost delighted find committed 193 lines john milton lycidas memory first work ibm design ibm ’ first time-sharing system became early host ivsys iverson system predecessor apl 1968 became colleague ken iverson used iverson notation apl named active earliest days apl holds 3 september 1968 information transfer control system allowing communication two users 1978 left ibm joined i. p. sharp associates retiring therefrom 1990 ibm mcdonnell devised notation signum circle functions apl designed complex floor function proposed extension gcd lcm iverson responsible including hooks forks j result zero divided zero j proposed 1976 1987 iverson award mcdonnell publisher apl press producing source book apl apl quote quad early years editor principal contributor recreational apl column apl quote-quad many years wrote dozens play j columns vector journal british apl association contributed sloane on-line encyclopedia integer sequences member jane austen society north america jasna gave talk classical persuasion jasna meeting lake louise 1993 active bay area jane austen group wrote topical index dierdre le faye edition austen letters seen republic pemberley website mcdonnell died peacefully home palo alto august 17 2010 | [
811,
6263,
470,
3464,
6285,
5322,
1774,
1308,
7758,
6846,
8137,
3060,
1892,
6064,
356,
2081
] | Test |
753 | 4 | Open-source_software_security:open-source software security open-source software security measure assurance guarantee freedom danger risk inherent open-source software system variety models metrics measure security system methods used measure security software systems argued system vulnerable potential vulnerability discovered patch created measuring number days vulnerability vulnerability fixed basis determined security system caveats approach every vulnerability equally bad fixing lot bugs quickly might better finding taking little bit longer fix taking account operating system effectiveness fix poisson process used measure rates different people find security flaws open closed source software process broken number volunteers n paid reviewers n. rates volunteers find flaw measured λ rate paid reviewers find flaw measured λ expected time volunteer group expected find flaw 1/ n λ expected time paid group expected find flaw 1/ n λ comparing large variety open source closed source projects star system could used analyze security project similar morningstar inc. rates mutual funds large enough data set statistics could used measure overall effectiveness one group example system follows coverity collaboration stanford university established new baseline open-source quality security development completed contract department homeland security utilizing innovations automated defect detection identify critical types bugs found software level quality security measured rungs rungs definitive meaning change coverity releases new tools rungs based progress fixing issues found coverity analysis results degree collaboration coverity start rung 0 currently go rung 2 project analyzed coverity ’ scan infrastructure representatives open-source software come forward results rung 1 collaboration coverity development team software analyzed subset scanning features prevent development team overwhelmed 11 projects analyzed upgraded status rung 2 reaching zero defects first year scan projects include amanda ntp openpam openvpn overdose perl php postfix python samba tcl number podcasts cover open-source software security | [
2810,
5983,
5275,
280,
7159,
635,
7975,
2285,
6428,
3955,
907,
204,
3368,
5569,
2026,
486,
1559,
578,
5047,
4705,
6367,
7463,
6029,
2585,
3981,
7282,
7217,
6211,
7201,
2142,
3732,
7669,
2334,
6940,
7581,
6489,
4824,
74,
5523,
169,
1139,... | Test |
754 | 7 | Enomaly_Inc:enomaly inc enomaly inc. founded 2004 developer system software virtualization management cloud computing headquartered toronto ontario canada initially founded open source consulting company reuven cohen george bazos lars forsberg company quickly grew open source consultancy system integrator one first focused emerging cloud computing space richard reiner joined enomaly chairman ceo march 2009 company among first provide self-service infrastructure-as-a-service iaas platform first version launched 2005 open source platform called enomalism later renamed ecp made available commercially closed sourced enomaly current software called elastic computing platform service provider edition ecp/spe released july 2009 allows web hosts service providers offer public facing iaas cloud services customers means similar amazon ec2 enomaly offers cloud infrastructure capabilities established carriers service hosting providers turn use existing physical data center offer combination cloud services dedicated hosting services customers november 2010 enomaly launched spotcloud.com described first commodity style clearinghouse marketplace unused cloud computing capacity according spotcloud site service built google app engine enomaly ecp platform well cloud infrastructure platforms near future spotcloud easy use structured cloud capacity marketplace service providers sell excess computing capacity wide array buyers resellers enomaly core product ecp used numerous service providers foundation cloud computing offerings includes | [
4295,
2988,
7613,
632,
1634,
3091,
6262,
6806,
3627,
5927,
2212,
5135,
1757,
3028,
842,
5064,
330,
2961,
7037,
2700,
5884,
1514,
5889
] | Validation |
755 | 4 | Return-oriented_programming:return-oriented programming return-oriented programming rop computer security exploit technique allows attacker execute code presence security defenses executable space protection code signing technique attacker gains control call stack hijack program control flow executes carefully chosen machine instruction sequences already present machine memory called gadgets gadget typically ends return instruction located subroutine within existing program and/or shared library code chained together gadgets allow attacker perform arbitrary operations machine employing defenses thwart simpler attacks return-oriented programming advanced version stack smashing attack generally types attacks arise adversary manipulates call stack taking advantage bug program often buffer overrun buffer overrun function perform proper bounds checking storing user-provided data memory accept input data store properly data written onto stack excess data may overflow space allocated function variables e.g. locals stack diagram right overwrite return address address later used function redirect control flow back caller overwritten control flow diverted location specified new return address standard buffer overrun attack attacker would simply write attack code payload onto stack overwrite return address location newly written instructions late 1990s major operating systems offer protection attacks microsoft windows provided buffer-overrun protections 2004 eventually operating systems began combat exploitation buffer overflow bugs marking memory data written non-executable technique known executable space protection enabled machine would refuse execute code located user-writable areas memory preventing attacker placing payload stack jumping via return address overwrite hardware support later became available strengthen protection data execution prevention adversary execute maliciously injected instructions typical buffer overflow overwrites contents data section memory marked non-executable defeat return-oriented programming attack inject malicious code rather uses instructions already present called gadgets manipulating return addresses typical data execution prevention defend attack adversary use malicious code rather combined good instructions changing return addresses therefore code used would marked non-executable widespread implementation data execution prevention made traditional buffer overflow vulnerabilities difficult impossible exploit manner described instead attacker restricted code already memory marked executable program code linked shared libraries since shared libraries libc often contain subroutines performing system calls functionality potentially useful attacker likely candidates finding code assemble attack return-into-library attack attacker hijacks program control flow exploiting buffer overrun vulnerability exactly discussed instead attempting write attack payload onto stack attacker instead chooses available library function overwrites return address entry location stack locations overwritten obeying applicable calling conventions carefully pass proper parameters function performs functionality useful attacker technique first presented solar designer 1997 later extended unlimited chaining function calls rise 64-bit x86 processors brought change subroutine calling convention required first argument function passed register instead stack meant attacker could longer set library function call desired arguments manipulating call stack via buffer overrun exploit shared library developers also began remove restrict library functions performed functions particularly useful attacker system call wrappers result return-into-library attacks became much difficult mount successfully next evolution came form attack used chunks library functions instead entire functions exploit buffer overrun vulnerabilities machines defenses simpler attacks technique looks functions contain instruction sequences pop values stack registers careful selection code sequences allows attacker put suitable values proper registers perform function call new calling convention rest attack proceeds return-into-library attack return-oriented programming builds borrowed code chunks approach extends provide turing complete functionality attacker including loops conditional branches put another way return-oriented programming provides fully functional language attacker use make compromised machine perform operation desired hovav shacham published technique 2007 demonstrated important programming constructs simulated using return-oriented programming target application linked c standard library containing exploitable buffer overrun vulnerability return-oriented programming attack superior attack types discussed expressive power resistance defensive measures none counter-exploitation techniques mentioned including removing potentially dangerous functions shared libraries altogether effective return-oriented programming attack although return-oriented programming attacks performed variety architectures shacham paper majority follow-up work focus intel x86 architecture x86 architecture variable-length cisc instruction set return-oriented programming x86 takes advantage fact instruction set dense random sequence bytes likely interpretable valid set x86 instructions therefore possible search opcode alters control flow notably return instruction 0xc3 look backwards binary preceding bytes form possibly useful instructions sets instruction gadgets chained overwriting return address via buffer overrun exploit address first instruction first gadget first address subsequent gadgets written successively onto stack conclusion first gadget return instruction executed pop address next gadget stack jump conclusion gadget chain continues third chaining small instruction sequences attacker able produce arbitrary program behavior pre-existing library code shacham asserts given sufficiently large quantity code including limited c standard library sufficient gadgets exist turing-complete functionality automated tool developed help automate process locating gadgets constructing attack binary tool known ropgadget searches binary looking potentially useful gadgets attempts assemble attack payload spawns shell accept arbitrary commands attacker address space layout randomization also vulnerabilities according paper shacham et al aslr 32-bit architectures limited number bits available address randomization 16 32 address bits available randomization 16 bits address randomization defeated brute force attack minutes 64-bit architectures 40 bits 64 available randomization 2016 brute force attack 40-bit randomization possible unlikely go unnoticed also randomization defeated de-randomization techniques even perfect randomization leakage memory contents help calculate base address dll runtime according paper checkoway et al possible perform return-oriented-programming x86 arm architectures without using return instruction 0xc3 x86 instead used carefully crafted instruction sequences already exist machine memory behave like return instruction return instruction two effects firstly searches four-byte value top stack sets instruction pointer value secondly increases stack pointer value four x86 architecture sequences jmp pop instructions act return instruction arm sequences load branch instructions act return instruction since new approach use return instruction negative implications defense defense program checks several returns also several jump instructions attack may detected g-free technique developed kaan onarlioglu leyla bilge andrea lanzi davide balzarotti engin kirda practical solution possible form return-oriented programming solution eliminates unaligned free-branch instructions instructions like ret call attackers use change control flow inside binary executable protects free-branch instructions used attacker way g-free protects return address similar xor canary implemented stackguard checks authenticity function calls appending validation block expected result found g-free causes application crash number techniques proposed subvert attacks based return-oriented programming rely randomizing location program library code attacker accurately predict location instructions might useful gadgets therefore mount successful return-oriented programming attack chain one fairly common implementation technique address space layout randomization aslr loads shared libraries different memory location program load although widely deployed modern operating systems aslr vulnerable information leakage attacks approaches determine address known library function memory attacker successfully determine location one known instruction position others inferred return-oriented programming attack constructed randomization approach taken relocating instructions and/or program state registers stack objects program separately instead library locations requires extensive runtime support software dynamic translator piece randomized instructions back together runtime technique successful making gadgets difficult find utilize comes significant overhead another approach taken kbouncer modifies operating system verify return instructions actually divert control flow back location immediately following call instruction prevents gadget chaining carries heavy performance penalty effective jump-oriented programming attacks alter jumps control-flow-modifying instructions instead returns w^x also called data execution prevention/dep no-execute/nx security feature pages processes memory may either writable executable w^x alone provide perfect protection memory-based vulnerabilities aslr technologies provide advanced protection memory based vulnerabilities w^x first implemented openbsd 2003 structured exception handler overwrite protection feature windows protects common stack overflow attacks especially attacks structured exception handler small embedded systems proliferating due expansion internet things need protection embedded systems also increasing using instruction based memory access control ib-mac implemented hardware possible protect low-cost embedded systems malicious control flow stack overflow attacks protection provided separating data stack return stack however due lack memory management unit embedded systems hardware solution applied embedded systems 2010 jinku li et al proposed suitably modified compiler could completely eliminate return-oriented gadgets replacing codice_1 instruction sequence codice_2 codice_3 instruction sequence codice_4 codice_5 represents immutable tabulation legitimate return addresses program codice_6 represents specific index table prevents creation return-oriented gadget returns straight end function arbitrary address middle another function instead gadgets return legitimate return addresses drastically increases difficulty creating useful gadgets li et al claimed return indirection technique essentially de-generalizes return-oriented programming back old style return-into-libc proof-of-concept compiler included peephole optimization phase deal certain machine instructions happen contain return opcode opcodes immediate operands codice_7 armv8.3-a architecture introduces new feature hardware level takes advantage unused bits pointer address space cryptographically sign pointer addresses jumping pointer signature checked error occurs check fails notably latest iphone a12 chips upgraded armv8.3 make use pacs | [
449,
4759,
2549,
4585,
1265,
5571,
3635,
1658,
8103,
749,
2318,
1867,
1217,
3220,
2327,
6569,
3746,
352,
263,
4652
] | Train |
756 | 7 | Zettabox:zettabox zettabox pan-european online cloud storage team-sharing tool created co-founders james kinsella robert mcneal company ’ operational headquarters located prague whilst sales marketing decisions headed london time zettabox founded total amount worldwide data saved networks surpassed 1,000 exabytes entered new era sizing storage – zettabytes 1 x 1021 cloud team sharing storage market heavily dominated american-domiciled companies dropbox box.com zettabox launched european alternative launch coincided news impending general data protection regulation part digital single market strategy requires companies business europe know data stored able communicate information customers recently 2018 2019 series privacy violations facebook social media companies renewed calls greater scrutiny largest companies use misuse users data zettabox described ‘ example genuinely european cloud storage solution ’ “ eu data protection reform big data factsheet ” european commission cited zettabox first major pan-european alternative us-based cloud storage products like google drive dropbox | [
1254
] | Test |
757 | 2 | Prelink:prelink computing prebinding also called prelinking method optimizing application load times resolving library symbols prior launch computer programs consist code requires external shared libraries execute libraries normally integrated program run time loader process called dynamic linking dynamic linking advantages code size management drawbacks well every time program run loader needs resolve find relevant libraries since libraries move around memory performance penalty resolution penalty increases additional library needing resolution prelinking reduces penalty resolving libraries advance afterward resolution occurs libraries changed since prelinked following perhaps upgrade mac os stores executables mach-o file format mac os x performs prebinding optimizing stage installing system software certain applications prebinding changed times within mac os x series 10.2 prebinding happened installation procedure aforementioned optimizing stage 10.2 10.3 os checked prebinding launch time applications first time application ran would prebound making subsequent launches faster could also manually run os-level installs 10.4 os libraries prebound 10.5 later apple replaced prebinding dyld shared cache mechanism provided better os performance linux prelinking accomplished via prelink program free program written jakub jelínek red hat elf binaries performance results mixed seems aid systems large number libraries kde prelink run -r option randomly select address base libraries loaded makes difficult perform return-to-libc attack system addresses used unique system reason prelink kernel facilities supplying address space layout randomization aslr libraries used conjunction prelink without defeating purpose prelink forcing dynamic linker perform relocations program load time stated prelink per-process library address randomization used conjunction order avoid completely removing security enhancement prelink supplies randomization however help general information leak caused prelink attackers ability read certain arbitrary files target system discover libraries loaded privileged daemons often libc enough common library used return-to-libc attacks reading shared library file libc attacker local access discover load address libc every application system since programs link libc libc library file always readable attacker local access may gather information address space higher privileged processes local access may commonly gained shell accounts web server accounts allow use cgi scripts may read output file system directory traversal vulnerabilities used attackers without accounts cgi script vulnerabilities available prelink often run periodically typically every two weeks address given library chance changing time prelink often used incremental mode already prelinked libraries altered unless absolutely necessary library may change base address prelink re-run gives address derived half-life period prelink run also note new version library installed addresses changes jakub jelínek points position independent executables pie ignore prelinking red hat enterprise linux fedora recommends network suid programs built pie facilitate secure environment occasionally prelinking cause issues application checkpoint restart libraries like codice_1 well libraries like openmpi use codice_1 internally specifically checkpointing program one host trying restart different host restarted program may fail segfault due differences host-specific library memory address randomization | [
7096,
1339,
1640,
6249,
4662,
3557,
2403,
6586,
1989,
578,
3635,
1495,
3468,
5890
] | Test |
758 | 4 | Cloudbric:cloudbric cloudbric cloud-based web security provider based seoul south korea offers waf ddos protection ssl solution protects websites sql injection cross-site scripting identity theft website defacement application layer ddos attacks early 2015 cloudbric launched in-house venture penta security systems inc. idea creating cloud web security service/web application firewall accessible first started in-house project grew global service december 1 2017 cloudbric corporation became company time spin-off cloudbric acquired 27 idcs internet data centers 50 partnerships 8,000 user sign-ups november 2017 cloudbric launched cloudbric labs collection free web security resources services available use integration users across web currently consists blackipedia ip reputation service threat index database web vulnerabilities wafer waf evaluator tests performance accuracy may 2018 cloudbric unveiled plans launch reverse ico initiative working product cloudbric plans build web security offerings introduction decentralized user-led security platform cloudbric ’ pricing model based monthly website traffic rather premium service features meaning users access cloudbric ’ comprehensive suite web security services default cloudbric ’ waf operates proxy detect filter malicious attacks requiring customers change website domain name system dns | [
623,
2043,
5365,
230,
5135
] | Validation |
759 | 6 | Sticky_bit:sticky bit computing sticky bit user ownership access right flag assigned files directories unix-like systems directory sticky bit set filesystem treats files directories special way file owner directory owner root user rename delete file without sticky bit set user write execute permissions directory rename delete contained files regardless file owner typically set codice_1 directory prevent ordinary users deleting moving users files modern function sticky bit introduced 4.3bsd 1986 found modern unix-like systems sticky bit introduced fifth edition unix 1974 use pure executable files set instructed operating system retain text segment program swap space process exited speeds subsequent executions allowing kernel make single operation moving program swap real memory thus frequently-used programs like editors would load noticeably faster one notable problem stickied programs replacing executable instance patching required removing sticky bit executable executing program exiting flush cache replacing binary executable restoring sticky bit currently behavior operative hp-ux unixware solaris appears abandoned 2005 4.4-lite release bsd retained old sticky bit behavior subsequently dropped openbsd release 3.7 freebsd release 2.2.1 version linux ever supported traditional behavior common use sticky bit directories residing within filesystems unix-like operating systems directory sticky bit set filesystem treats files directories special way file owner directory owner root rename delete file without sticky bit set user write execute permissions directory rename delete contained files regardless file owner typically set codice_1 directory prevent ordinary users deleting moving users files feature introduced 4.3bsd 1986 today found modern unix-like systems addition solaris solaris 2.5 defines special behavior sticky bit set non-executable files files accessed cached kernel usually set swap files prevent access file flushing important data system cache also used occasionally benchmarking tests sticky bit also set automounter indicate file mounted yet allows programs like ls ignore unmounted remote files sticky bit set using chmod command set using octal mode 1000 symbol already used setuid bit example add bit directory codice_3 one would type chmod +t /usr/local/tmp make sure directory standard codice_4 permissions one could also type chmod 1777 /usr/local/tmp clear use chmod -t /usr/local/tmp chmod 0777 /usr/local/tmp latter also reset codice_4 directory standard permissions unix symbolic file system permission notation sticky bit represented letter final character-place replacing would otherwise x instance solaris 8 codice_1 directory default sticky-bit set shows sticky-bit set file directory without execution bit set others category non-user-owner non-group-owner indicated capital replacing would otherwise | [
3599,
2547,
7161,
4672,
3626,
3638,
6117,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
5842,
836,
5843,
6558,
2683,
5859,
5865,
4444,
4447,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
4480,
8... | Test |
760 | 4 | Blue_team_(computer_security):blue team computer security blue team group individuals perform analysis information systems ensure security identify security flaws verify effectiveness security measure make certain security measures continue effective implementation part united states computer security defense initiative red teams developed exploit malicious entities would harm result blue teams developed design defensive measures red team activities incident occur within organization blue team perform following six steps handle situation preparation computer security incident blue team perform hardening techniques operating systems throughout organization blue team must always mindful network perimeter including traffic flow packet filtering proxy firewalls intrusion detection systems blue teams employ wide range tools allowing detect attack collect forensic data perform data analysis make changes threat future attacks mitigate threats tools include siem software supports threat detection security incident response performing real-time data collection analysis security events type software also uses data sources outside network including indicators compromise ioc threat intelligence | [
7984,
6756,
2556,
7585,
7836,
129,
8123,
1805
] | Test |
761 | 9 | GNU_Smalltalk:gnu smalltalk gnu smalltalk implementation smalltalk programming language gnu project implementation unlike smalltalk environments uses text files program input interprets contents smalltalk code way gnu smalltalk acts like interpreter rather environment traditional smalltalk manner gnu smalltalk includes bindings many free software libraries including sqlite libsdl cairo gettext expat examples work gnu smalltalk 3.0 later versions classic hello world example basic smalltalk code constructing using array constructing using hash parameter-passing block closure returning closures method using block send info back caller invoke method passing block iterating enumerations arrays using blocks method inject accept parameter block iterates member list performing function retaining aggregate analogous foldl function functional programming languages example first pass block receives 10 argument inject sum 1 first element array element returns 11 11 becomes sum next pass added 3 get 14 14 added 5 finally return 19 blocks work many built-in methods using enumeration block square numbers 1 10 following code defines class named person deriving magnitude automatically defines comparison methods except one codice_1 addition one codice_2 sort age note override way object printed/displayed default share programmer-print user-display representation overriding codice_3 prints three names reverse age order exception raised codice_4 call optional message added exception also codice_5 raises different kind exception actually wrappers actual exception raising method codice_6 exceptions handled codice_7 blocks course catch particular exceptions subclasses possible use exception object made available handler clause exit resume first block exiting default also mentioned explicitly | [
1523,
8158,
2091,
3174,
1351,
2728,
5116,
1267,
3779,
2559,
4685,
3863,
6011,
5571,
3868,
578,
6365,
7463,
499,
3981,
7559,
4070,
2599,
1406,
604,
8137,
3152,
6674,
5787,
966,
1804,
360
] | Test |
762 | 4 | David_A._Wagner:david a. wagner david a. wagner born 1974 professor computer science university california berkeley well-known researcher cryptography computer security member election assistance commission technical guidelines development committee tasked assisting eac drafting voluntary voting system guidelines also member accurate project wagner received a.b mathematics princeton university 1995 m.s computer science berkeley 1999 ph.d. computer science berkeley 2000 published two books 90 peer-reviewed scientific papers notable achievements include | [
7072,
907,
1811,
433,
1283,
4805,
2823,
1168,
807,
1353,
1243,
6411,
7207,
5333,
1805
] | Test |
763 | 3 | IBM_BladeCenter:ibm bladecenter ibm bladecenter ibm blade server architecture replaced flex system x86 division later sold lenovo 2014 introduced 2002 based engineering work started 1999 ibm bladecenter relatively late blade server market differed prior offerings offered range x86 intel server processors input/output i/o options february 2006 ibm introduced bladecenter h switch capabilities 10 gigabit ethernet infiniband 4x web site called blade.org available blade computing community 2009 2012 replacement flex system introduced original ibm bladecenter later marketed bladecenter e 14 blade slots 7u power supplies upgraded life chassis original 1200 1400 1800 2000 2320 watt bladecenter e co-developed ibm intel included bladecenter telecommunications company version original ibm bladecenter available either ac dc 48 v power 8 blade slots 8u uses switches blades regular bladecenter e. keep nebs level 3 etsi compliant special network equipment-building system nebs compliant blades available upgraded bladecenter design high-speed fabric options fits 14 blades 9u backwards compatible older bladecenter switches blades bladecenter ht telecommunications company version ibm bladecenter h available either ac dc 48 v power 12 blade slots 12u uses switches blades regular bladecenter h. keep nebs level 3 etsi compliant special nebs compliant blades available targets mid-sized customers offering storage inside bladecenter chassis separate external storage needs purchased also use 110 v power north american market used outside datacenter running 120v total chassis capacity reduced modules based x86 processors intel 2008 features 2002-6 features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features features features similar hs22 features features features blade model targeted workstation market features blade model targeted server virtualization market features modules based x86 processors amd features blade model use high-speed i/o bladecenter h also backwards compatible regular bladecenter features upgraded model ls21 features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features upgraded model ls41 features modules based powerpc- power isa-based processors ibm features blade model high-speed io option bladecenter h backwards compatible regular bladecenter features features features features features features features similar ps700 think two ps701 tied together back-to-back forming double-wide blade features similar ps701 think two ps703 tied together back-to-back forming double-wide blade modules based cell processors ibm features features features themis computer announced blade around 2008 ran sun solaris operating system sun microsystems module one ultrasparc t2 64 threads 1.2 ghz 32 gb ddr2 sdram processor memory developed conjunction cloudshield features ibm roadrunner supercomputer used custom module called triblade 2008 2013 expansion blade connects two qs22 modules 8 gb ram via four pcie x8 links ls21 module 16 gb ram two links qs22 also provides outside connectivity via infiniband 4x ddr adapter makes total width four slots single triblade three triblades fit one bladecenter h chassis bladecenter total four switch modules two switch module bays take ethernet switch ethernet pass-though use switch module bays daughtercard needs installed blade needs provide required san ethernet infiniband myrinet function mixing different type daughtercards bladecenter chassis allowed gigabit ethernet switch modules produced ibm nortel cisco systems blade network technologies produced switches later purchased ibm cases speed internal bladecenter blades non-blocking external gigabit ethernet ports vary four six either copper optical fiber variety san switch modules produced qlogic cisco mcdata acquired brocade brocade ranging speeds 1 2 4 8 gbit fibre channel speed san switch blade determined lowest-common-denominator blade hba daughtercard san switch external port counts vary two six depending switch module infiniband switch module produced cisco speed blade infiniband daughtercard switch limited ib 1x 2.5 gbit externally switch one ib 4x one ib 12x port ib 12x port split three ib 4x ports giving total four ib 4x ports total theoretical external bandwidth 40 gbit two kinds pass-through module available copper pass-through fibre pass-through copper pass-through used ethernet fibre pass-through used ethernet san myrinet bridge modules compatible bladecenter h bladecenter ht function like ethernet san switches bridge traffic infiniband advantage operating system blade everything seems normal regular ethernet san connectivity inside bladecenter everything gets routed infiniband high-speed switch modules compatible bladecenter h bladecenter ht blade needs function must high-speed daughtercard installed different high-speed daughtercards mixed bladecenter chassis 10 gigabit ethernet switch module available blade network technologies allowed 10 gbit/s connection blade outside bladecenter several infiniband options | [
6597,
6329,
450,
2458,
3693,
4408,
7361,
2845,
4783,
6014,
578,
4242,
1388,
1023,
2139,
4718,
1678,
763,
602,
2601,
3234,
352,
4200,
1244,
4839
] | Validation |
764 | 9 | Translational_Backus–Naur_form:translational backus–naur form translational backus–naur form tbnf translational bnf refers backus–naur form formal grammar notation used define syntax computer languages algol ada c++ cobol fortran java perl python many others tbnf goes beyond bnf extended bnf ebnf grammar notation defines syntax language also defines structure abstract syntax tree ast created memory output intermediate code generated thus tbnf defines complete translation process input source code intermediate code specification output intermediate code optional case still get automatic ast creation ability define structure grammar tbnf concept first published april 2006 paper sigplan notices special interest group acm sample grammar specified tbnf given input running translator generated grammar would produce output | [
7375,
1365,
3030,
5983,
304,
2803
] | Test |
765 | 6 | File_virtualization:file virtualization computing file virtualization field storage virtualization operating computer file level involves uniting multiple storage devices single logical pool file vital part file area network fan network file management nfm concepts virtualization designs primary driver behind file virtualization desire shield users administrators complexity underlying storage environment goals include simplified management efficient capacity usage allocation reduced management costs network file management nfm data storage management-related category identified defined 2004 several prominent data storage analysts term used interchangeably nas virtualization file virtualization among data storage industry press analysts system administrators basic idea nfm rapid ongoing growth file data capacity enterprise networks led massive management complexity accelerating operating costs nfm concept creating virtualization layer clients file servers nas devices creating abstraction layer system administrators may simplify management multiple storage devices including non-disruptive movement data servers preserving client access path pathname policies automating placement data according changing needs ability discover analyze report server file usage | [
1710,
3637,
2763,
6860,
6711,
5865
] | Test |
766 | 3 | Tiger_Lake_(microarchitecture):tiger lake microarchitecture tiger lake intel cpu microarchitecture based second-generation 10nm process node named 10nm+ replace ice lake tiger lake slated include quad-core 9 w tdp 25 w tdp models power 2020 project athena laptops | [
2449,
2000,
2814,
5802,
6332,
6698,
6793,
3942,
3849,
4765,
6170,
3443,
6344,
6616,
4108,
1465,
7449,
7453,
3020,
7364,
3717,
5669,
5670,
584,
3803,
6647,
1867,
1770,
3565,
4077,
6133,
4985,
691,
5343,
6057,
4098,
6675,
352,
6152,
2351,
... | Test |
767 | 3 | Nobunaga's_Ambition_(video_game):nobunaga ambition video game player may choose four campaign scenarios including battle east beginning 1560 daimyo power struggles 1560 ambition untamed 1571 road towards unification 1582 scenario player must allocate resources raise capable military force provide productive economy support military civilian expansion support peasants order sustain respect loyalty gameplay taken turns turn map view corresponding season turn battle corresponding day player may achieve victory numerous means among forcing enemy retreat destroying enemy command unit outlasting invading force prolonging battles opposing force exhausted supplies player make many choices campaign according evan brooks computer gaming world one may transfer soldiers fiefs go war increase taxes causes decrease peasant loyalty may lead rebellion transfer rice gold another fief raise level flood control decreases productivity make non-aggression pact arrange marriage cultivate increases productivity decreases peasant loyalty use merchant buy/sell rice borrow funds purchase weapons recruit military soldiers ninja train army increases fighting efficiency spy rival expand town increases taxes collected decreases peasant loyalty give food/rice peasants/soldiers raise morale steal peasants rival daimyos allocate military strength recuperate even daimyo get sick turn controlled fief computer administration pass turn hint one idea train troops north america game positively reviewed computer gaming world reviewer evan brooks gave four stars five introduced game detailed economic diplomatic political military simulation unification japan sixteenth century praised graphics among best reviewer ever seen ibm 5x10 hex map battles noted used role-playing game elements including assigning various statistics selected persona time system turn represents year daimyo ages eventually dies old age multiplayer option stated thoroughly enjoyed nobunaga ambition concluded highly recommended rating compute similarly praised ibm pc version calling one best strategic war games ever designed personal computer citing game play user interface documentation console versions lukewarm reception reviewing snes version gamepro praised control interface combat system opined game essentially offers nothing set apart koei previous historical simulators rated genesis version similarly saying like koei games nobunaga easy-to-use detailed menu-driven interface activates load complex commands | [
3325
] | Test |
768 | 5 | Modem:modem modem portmanteau modulator-demodulator hardware device converts data format suitable transmission medium transmitted computer computer historically telephone wires modem modulates one carrier wave signals encode digital information transmission demodulates signals decode transmitted information goal produce signal transmitted easily decoded reliably reproduce original digital data modems used almost means transmitting analog signals light-emitting diodes radio common type modem one turns digital data computer modulated electrical signal transmission telephone lines demodulated another modem receiver side recover digital data modems generally classified maximum amount data send given unit time usually expressed bits per second symbol bit sometimes abbreviated bps rarely bytes per second symbol b modems also classified symbol rate measured baud baud unit denotes symbols per second number times per second modem sends new signal example itu v.21 standard used audio frequency-shift keying two possible frequencies corresponding two distinct symbols one bit per symbol carry 300 bits per second using 300 baud contrast original itu v.22 standard could transmit receive four distinct symbols two bits per symbol transmitted 1,200 bits sending 600 symbols per second 600 baud using phase-shift keying news wire services 1920s used multiplex devices satisfied definition modem however modem function incidental multiplexing function commonly included history modems modems grew need connect teleprinters ordinary phone lines instead expensive leased lines previously used current loop–based teleprinters automated telegraphs 1941 allies developed voice encryption system called sigsaly used vocoder digitize speech encrypted speech one-time pad encoded digital data tones using frequency shift keying mass-produced modems united states began part sage air-defense system 1958 year word modem first used connecting terminals various airbases radar sites command-and-control centers sage director centers scattered around united states canada sage modems described bell labs conforming newly published bell 101 dataset standard ran dedicated telephone lines devices end different commercial acoustically coupled bell 101 110 baud modems 201a 201b data-phones synchronous modems using two-bit-per-baud phase-shift keying psk 201a operated half-duplex 2,000 bit/s normal phone lines 201b provided full duplex 2,400 bit/s service four-wire leased lines send receive channels running set two wires famous bell 103a dataset standard also introduced 1962 provided full-duplex service 300 bit/s normal phone lines frequency-shift keying used call originator transmitting 1,070 1,270 hz answering modem transmitting 2,025 2,225 hz readily available 103a2 gave important boost use remote low-speed terminals teletype model 33 asr ksr ibm 2741 reduced modem costs introducing originate-only 113d answer-only 113b/c modems many years bell system maintained monopoly use phone lines devices could connected however fcc seminal carterfone decision 1968 fcc concluded electronic devices could connected telephone system long used acoustic coupler since handsets supplied western electric thus standard design acoustic couplers relatively easy build acoustically coupled bell 103a-compatible 300 bit/s modems common 1970s well-known models included novation cat anderson-jacobson latter spun in-house project stanford research institute sri international even lower-cost option pennywhistle modem designed built using parts electronics scrap surplus stores december 1972 vadic introduced va3400 notable full-duplex operation 1,200 bit/s phone network like 103a used different frequency bands transmit receive november 1976 introduced 212a modem compete vadic similar design used lower frequency set transmission one could also use 212a 103a modem 300 bit/s according vadic change frequency assignments made 212 intentionally incompatible acoustic coupling thereby locking many potential modem manufacturers 1977 vadic responded va3467 triple modem answer-only modem sold computer center operators supported vadic 1,200-bit/s mode 212a mode 103a operation hush-a-phone decision applied mechanical connections carterfone decision 1968 led fcc introducing rule setting stringent t-designed tests electronically coupling device phone lines opened door direct-connect modems plugged directly phone line rather via handset however cost passing tests considerable acoustically coupled modems remained common early 1980s rapidly falling prices electronics late 1970s led increasing number direct-connect models around 1980 spite directly connected modems generally operated like earlier acoustic versions – dialing phone-control operations completed hand using attached handset small number modems added ability automatically answer incoming calls automatically place outgoing call single number even limited features relatively rare limited special models lineup flexible solutions needed third party dialers used automate calling normally using separate serial port communicate dialer would control modem private electrical connection introduction microcomputer systems internal expansion slots made first software-controllable modems common slot connections gave computer complete access modem memory input/output i/o channels allowed software send commands modem data led series popular modems s-100 bus apple ii computers could directly dial phone answer incoming calls hang phone basic requirements bulletin board system bbs seminal cbbs created s-100 machine hayes internal modem number similar systems followed next major advance modems hayes smartmodem introduced 1981 smartmodem otherwise standard 103a 300 bit/s direct-connect modem attached small microcontroller watched data stream certain character strings representing commands allowed data commands sent single serial port now-standard hayes command set included instructions picking hanging phone dialing numbers answering calls among others similar commands offered internal modems unlike smartmodem could connected computer rs-232 port practically every microcomputer built introduction smartmodem made communications much simpler easily accessed provided growing market vendors licensed hayes patents competed price adding features 1980s number new higher-speed modems first 1,200 2,400 bit/s greatly improved responsiveness online systems made file transfer practical led rapid growth online services large file libraries turn gave reason modem rapid update modems led similar rapid increase bbs use helped fact bbss could control modem simply sending strings rather talking device driver different every direct-connect modem 300 bit/s modems used audio frequency-shift keying send data system stream 1s 0s computer data translated sounds easily sent phone lines bell 103 system originating modem sends 0s playing 1,070 hz tone 1s 1,270 hz answering modem transmitting 0s 2,025 hz 1s 2,225 hz frequencies chosen carefully range suffers minimum distortion phone system harmonics 1,200 bit/s faster systems phase-shift keying used system two tones one side connection sent similar frequencies 300 bit/s systems slightly phase voiceband modems generally remained 300 1,200 bit/s v.21 v.22 mid-1980s v.22bis 2,400-bit/s system similar concept 1,200-bit/s bell 212 signaling introduced u.s. slightly different one europe limited available frequency range meant symbol rate 1,200 bit/s modems still 600 baud symbols per second bit rate increases achieved defining four eight distinct symbols allowed encoding two three bits per symbol instead 1 use smaller shifts drawback making symbol vulnerable interference improvements phone line quality time helped compensate late 1980s modems could support standards 2,400-bit/s operation becoming common many standards also introduced special purposes commonly using high-speed channel receiving lower-speed channel sending one typical example used french minitel system user terminals spent majority time receiving information modem minitel terminal thus operated 1,200 bit/s reception 75 bit/s sending commands back servers three u.s. companies became famous high-speed versions concept telebit introduced trailblazer modem 1984 used large number 36 bit/s channels send data one-way rates 18,432 bit/s single additional channel reverse direction allowed two modems communicate much data waiting either end link modems could change direction fly trailblazer modems also supported feature allowed spoof uucp g protocol commonly used unix systems send e-mail thereby speed uucp tremendous amount trailblazers thus became extremely common unix systems maintained dominance market well 1990s usrobotics usr introduced similar system known hst although supplied 9,600 bit/s early versions least provided larger backchannel rather offer spoofing usr instead created large market among fidonet users offering modems bbs sysops much lower price resulting sales end users wanted faster file transfers hayes forced compete introduced 9,600 bit/s standard express 96 also known ping-pong generally similar telebit pep hayes however offered neither protocol spoofing sysop discounts high-speed modems remained rare common feature high-speed modems concept fallback speed hunting allowing communicate less-capable modems call initiation modem would transmit series signals wait remote modem respond would start high speeds get progressively slower response thus two usr modems would able connect 9,600 bit/s user 2,400 bit/s modem called usr would fall back common 2,400 bit/s speed would also happen v.32 modem hst modem connected used different standard 9,600 bit/s would fall back highest commonly supported standard 2,400 bit/s applies v.32bis 14,400 bit/s hst modem would still able communicate 2,400 bit/s echo cancellation next major advance modem design local telephone lines use wires send receive data results small amount outgoing signal reflected back useful people talking phone provides signal speaker voice making system however reflected signal causes problems modem unable distinguish signal remote modem echo signal earlier modems split signal frequencies answer originate modem could ignore signals frequency range using transmission even improvements phone system allowing higher speeds splitting available phone signal bandwidth still imposed half-speed limit modems echo cancellation eliminated problem call setup negotiation period modems send series unique tones listen return phone system measure total delay time set local delay loop time connection completed send signals phone lines normal also delay inverted signal returning echo meets inverted version coming delay line cancels echo allowed modems use full spectrum available doubling speed additional improvements introduced via quadrature amplitude modulation qam encoding system previous systems using phase shift keying psk encoded two bits sometimes three per symbol slightly delaying advancing signal phase relative set carrier tone qam used combination phase shift amplitude encode four bits per symbol transmitting 1,200 baud produced 4,800 bit/s v.27ter standard working base rate 2,400 baud produced 9,600 bit/s v.32 carrier frequency 1,650 hz systems many years engineers considered rate limit data communications telephone networks introduction higher-speed systems also led digital fax machine 1980s digital faxes simply image format sent high-speed commonly 14.4 kbit/s modem software running host computer convert image fax format sent using modem software one time add-on since become largely universal first 9,600 bit/s modem developed 1968 sold 20,000 high error rates 1980 gottfried ungerboeck ibm zurich research laboratory applied channel coding techniques search new ways increase speed modems results astonishing conveyed colleagues 1982 agreed publish landmark paper theory information coding applying parity check coding bits symbol mapping encoded bits two-dimensional diamond pattern ungerboeck showed possible increase speed factor two error rate new technique called mapping set partitions known trellis modulation error correcting codes encode code words sets bits way far case error still closest original word confused another thought analogous sphere packing packing pennies surface two bit sequences one another easier correct minor errors dave forney introduced trellis diagram landmark 1973 paper popularized viterbi algorithm practically modems operating faster 9600 bit/s decode trellis-modulated data using viterbi algorithm v.32 modems operating 9600 bit/s expensive starting enter market early 1990s v.32bis standardized rockwell international chip division developed new driver chip set incorporating standard aggressively priced supra inc. arranged short-term exclusivity arrangement rockwell developed suprafaxmodem 14400 based introduced january 1992 399 less half price slower v.32 modems already market led price war end year v.32 dead never really established v.32bis modems widely available 250 v.32bis successful older high-speed standards little recommend usr fought back 16,800 bit/s version hst introduced one-off 19,200 bit/s method referred v.32ter neither non-standard modem sold well interest proprietary improvements destroyed lengthy introduction 28,800 bit/s v.34 standard waiting several companies decided release hardware introduced modems referred v.fast order guarantee compatibility v.34 modems standard ratified 1994 manufacturers forced use flexible parts generally dsp microcontroller opposed purpose-designed asic modem chips itu standard v.34 represents culmination joint efforts employs powerful coding techniques including channel encoding shape encoding mere four bits per symbol 9.6 kbit/s new standards used functional equivalent 6 10 bits per symbol plus increasing baud rates 2,400 3,429 create 14.4 28.8 33.6 kbit/s modems rate near theoretical shannon limit calculated shannon capacity narrowband line formula_1 formula_2 linear signal-to-noise ratio narrowband phone lines bandwidth 3,000 hz using formula_3 snr 30 db capacity approximately 30 kbit/s late 1990s rockwell-lucent usrobotics introduced competing technologies based upon digital transmission used telephony networks standard digital transmission modern networks 64 kbit/s networks use part bandwidth remote office signaling e.g hang phone limiting effective rate 56 kbit/s ds0 new technology adopted itu standards v.90 common modern computers 56 kbit/s rate possible central office user site downlink united states government regulation limits maximum power output resulting maximum data rate 53.3 kbit/s uplink user central office still uses v.34 technology 33.6 kbit/s usrobotics began work technology first calling x2 56k twice speed 28k modems usrobotics held 40-percent share retail modem market rockwell international held 80-percent share modem chipset market concerned shut market rockwell began work rival 56k technology joined lucent motorola called k56flex flex technologies reached market around february 1997 although problems k56flex modems noted product reviews july within six months worked equally well variations dependent local connection characteristics retail price 56k modems us 200 compared 100 33k modems separate equipment required internet service providers isps support incompatible technologies costs varying depending whether current equipment could upgraded half isps offered 56k support october 1997 consumer sales relatively low usrobotics rockwell attributed conflicting standards international telecommunication union itu announced draft new 56 kbit/s standard v.90 february 1998 strong industry support incompatible either existing standard amalgam designed allow types modem converted firmware upgrade v.90 standard approved september 1998 widely adopted isps consumers later v.92 digital pcm technique applied increase upload speed maximum 48 kbit/s expense download rates 48 kbit/s upstream rate would reduce downstream low 40 kbit/s due echo telephone line avoid problem v.92 modems offer option turn digital upstream instead use 33.6 kbit/s analog connection order maintain high digital downstream 50 kbit/s higher v.92 also adds two features first ability users call waiting put dial-up internet connection hold extended periods time answer call second feature ability quickly connect one isp achieved remembering analog digital characteristics telephone line using saved information reconnecting v.42 v.42bis v.44 standards allow modem transmit data faster basic rate would imply instance 53.3 kbit/s connection v.44 transmit 53.3 × 6 320 kbit/s using pure text however compression ratio tends vary due noise line due transfer already-compressed files zip files jpeg images mp3 audio mpeg video points modem sending compressed files approximately 50 kbit/s uncompressed files 160 kbit/s pure text 320 kbit/s value situations small amount memory modem buffer used hold data compressed sent across phone line order prevent overflow buffer sometimes becomes necessary tell computer pause datastream accomplished hardware flow control using extra lines modem–computer connection computer set supply modem higher rate 320 kbit/s modem tell computer start stop sending data telephone-based 56k modems began losing popularity internet service providers netzero/juno netscape others started using pre-compression increase throughput maintain customer base server-side compression operates much efficiently on-the-fly compression done modems compression techniques application-specific jpeg text exe etc. website text images flash executables compacted approximately 4 12 30 respectively drawback approach loss quality causes image content become pixelated smeared isps employing approach often advertise accelerated dial-up accelerated downloads integrated opera amazon silk web browsers using server-side text image compression winmodem softmodem stripped-down modem replaces tasks traditionally handled hardware software case modem simple interface codec code decode digital signal softmodems cheaper traditional modems fewer hardware components however software interpreting modem tones sent softmodem uses system resources online gaming real concern another problem lack cross-platform compatibility meaning non-windows operating systems linux often equivalent driver operate modem values maximum values actual values may slower certain conditions example noisy phone lines complete list see companion article list device bandwidths baud one symbol per second symbol may encode one data bits 1994 software publishers association found although 60 computers us households modem 7 households went online cea study 2006 found dial-up internet access declining u.s 2000 dial-up internet connections accounted 74 u.s. residential internet connections united states demographic pattern dial-up modem users per capita less mirrored canada australia past 20 years dial-up modem use u.s. dropped 60 2003 2006 stood 36 voiceband modems popular means internet access u.s. advent new ways accessing internet traditional 56k modem losing popularity dial-up modem still widely used customers rural areas dsl cable satellite fiber optic service available unwilling pay companies charge 2012 annual report aol showed still collects around us 700 million fees dial-up users three million people adsl asymmetric digital subscriber line modems recent development limited telephone voiceband audio frequencies standard twisted-pair telephone cable short distances carry signals much higher frequencies cable maximum frequency rating adsl broadband takes advantage capability however adsl performance gradually declines telephone cable length increases limits adsl broadband service subscribers within relatively short distance telephone exchange cable modems use infrastructure originally intended carry television signals therefore designed outset carry higher frequencies single cable carry radio television signals time broadband internet service without interference newer types broadband modems also available including satellite modems power line modems consumers know networking routers broadband became available however many people knew modem connected computer internet telephone line take advantage consumers familiarity modems companies called devices broadband modems rather using less familiar terms adapter interface transceiver bridge fact broadband modems fit definition modem use complex waveforms carry digital data use advanced technology dial-up modems typically modulate demodulate hundreds channels simultaneously use much wider channels dial-up modems direct broadcast satellite wifi mobile phones use modems communicate wireless services today modern telecommunications data networks also make extensive use radio modems long distance data links required systems important part pstn also common use high-speed computer network links outlying areas fibre economical even cable installed often possible get better performance make parts system simpler using radio frequencies modulation techniques cable coaxial cable large bandwidth signal attenuation becomes major problem high data rates baseband digital signal used using modem much larger amount digital data transmitted single wire digital cable television cable internet services use radio frequency modems provide increasing bandwidth needs modern households using modem also allows frequency-division multiple access used making full-duplex digital communication many users possible using single wire wireless modems come variety types bandwidths speeds wireless modems often referred transparent smart transmit information modulated onto carrier frequency allow many simultaneous wireless communication links work simultaneously different frequencies transparent modems operate manner similar phone line modem cousins typically half duplex meaning could send receive data time typically transparent modems polled round robin manner collect small amounts data scattered locations easy access wired infrastructure transparent modems commonly used utility companies data collection smart modems come media access controllers inside prevents random data colliding resends data correctly received smart modems typically require bandwidth transparent modems typically achieve higher data rates ieee 802.11 standard defines short range modulation scheme used large scale throughout world wifi wimax standards use wireless mobile broadband modems operating microwave frequencies modems use mobile telephone system gprs umts hspa evdo wimax etc known mobile broadband modems sometimes also called wireless modems wireless modems embedded inside laptop appliance external external wireless modems connect cards usb modems mobile broadband cellular routers connect card pc card expresscard slides pcmcia/pc card/expresscard slot computer usb wireless modems use usb port laptop instead pc card expresscard slot usb modem used mobile broadband internet also sometimes referred dongle cellular router may external datacard aircard slides cellular routers allow datacards usb modems cellular routers may modems definition contain modems allow modems slid difference cellular router wireless modem cellular router normally allows multiple people connect since route data support multi-point multi-point connections modem designed one connection gsm wireless modems come integrated sim cardholder i.e. huawei e220 sierra 881 etc models also provided microsd memory slot and/or jack additional external antenna huawei e1762 sierra wireless compass 885 cdma evdo versions use r-uim cards use electronic serial number esn instead cost using wireless modem varies country country carriers implement flat rate plans unlimited data transfers caps maximum limits amount data transferred per month countries plans charge fixed rate per data transferred—per megabyte even kilobyte data downloaded tends add quickly today content-filled world many people pushing flat data rates faster data rates newest wireless modem technologies umts hspa evdo wimax also considered broadband wireless modems compete broadband modems end april 2011 worldwide shipments usb modems surpassed embedded 3g 4g modules 3:1 usb modems easily discarded embedded modems could start gain popularity tablet sales grow incremental cost modems shrinks 2016 ratio may change 1:1 like mobile phones mobile broadband modems sim locked particular network provider unlocking modem achieved way unlocking phone using 'unlock code devices referred broadband modems residential gateways integrating functions modem network address translation nat router ethernet switch wifi access point dhcp server firewall among others residential gateway offer so-called bridged mode disables built-in routing function makes device function similarly plain modem bridged mode separate rfc 1483 bridging dc-bus powerline modem provide communication noisy power lines speeds 1.3mbit/s using ordinary uart lin spi protocols modems used connect fiber optic network known optical network units onus fiber optic systems upgraded use quadrature amplitude modulation modulator demodulator separate components rather single assembly modems 16qam uses 16-point constellation send four bits per symbol speeds usually order 200 400 gigabits per second 64qam uses 64-point constellation send six bits per symbol although suppliers announced components announcements installation rare speeds 65 terabits per second observed although name modem seldom used case modems also used high-speed home networking applications especially using existing home wiring one example g.hn standard developed itu-t provides high-speed 1 gbit/s local area network using existing home wiring power lines phone lines coaxial cables g.hn devices use orthogonal frequency-division multiplexing ofdm modulate digital signal transmission wire phrase null modem used describe attaching specially wired cable serial ports two personal computers basically transmit output one computer wired receive input true computers software used modems procomm minicom could used null modem connection voice modems regular modems capable recording playing audio telephone line used telephony applications see voice modem command set details voice modems type modem used fxo card private branch exchange pbx systems compare v.92 | [
1443,
712,
4676,
3956,
1836,
4687,
5387,
740,
5401,
7189,
3306,
3653,
3314,
5080,
82,
84,
4749,
447,
4751,
7241,
7614,
2995,
6175,
5116,
3698,
824,
4786,
6203,
6217,
6568,
6936,
6572,
1227,
5175,
4454,
1234,
5880,
1988,
3755,
4140,
4145... | Test |
769 | 9 | Categorical_abstract_machine:categorical abstract machine categorical abstract machine cam model computation programs preserves abilities applicative functional compositional style based techniques applicative computing notion categorical abstract machine arose mid-1980s took place computer science kind theory computation programmers represented cartesian closed category embedded combinatory logic cam transparent sound mathematical representation languages functional programming machine code optimized using equational form theory computation using cam various mechanisms computation recursion lazy evaluation emulated well parameter passing call name call value theory cam preserves advantages object approach towards programming computing main current implementation ocaml added class inheritance dynamic method dispatch caml categorical abstract machine language variants metalanguage ml notable type-inference one implementation approaches functional languages given machinery based supercombinators sk-machine d. turner notion cam gives alternative approach structure cam consists syntactic semantic computational constituents syntax based de bruijn ’ notation overcomes difficulties using bound variables evaluations similar p. landin ’ secd machine coverage cam gives sound ground syntax semantics theory computation comprehension arises influenced functional style programming | [
7256,
4573,
1058,
5164,
7005
] | Validation |
770 | 4 | Message_submission_agent:message submission agent message submission agent msa mail submission agent computer program software agent receives electronic mail messages mail user agent mua cooperates mail transfer agent mta delivery mail uses esmtp variant simple mail transfer protocol smtp specified rfc 6409 many mtas perform function msa well also programs specially designed msas without full mta functionality historically internet mail mta msa functions use port number 25 official port msas 587 mta accepts user incoming mail msa accepts user outgoing mail separation mta msa functions produces several benefits one benefit msa since interacting directly author mua correct minor errors message format missing date message-id fields address missing domain name and/or immediately report error author corrected sent recipients mta accepting message another site reliably make kinds corrections error reports generated mta reach author message already sent one benefit dedicated port number 587 always possible users connect domain submit new mail combat spam including spam sent unwittingly victim botnet many isps institutional networks restrict ability connect remote mtas port 25 accessibility msa port 587 enables nomadic users example working laptop continue send mail via preferred submission servers even within others networks using specific submission server requirement sender policies signing practices enforced another benefit separating mta msa functions makes easier mta deny relaying refuse mail addressed recipient domain served locally strategy used isps prevent sending spam virus infected client computers contrast msa must generally accept mail recipient internet though accepts mail authors authorized use msa established identity msa via authentication times mail submission acceptance incoming mail usually accomplished using protocol server ability send mail arbitrary destinations without authentication allowed spammers use mtas means distributing spam since single message transaction request mta relay message large number recipients also made difficult trace message origin yet another benefit msas mtas different policies filtering spam msas require authentication form username password provided author messages received msa therefore traceable author direct relationship msa held accountable actions allows msa either spam filtering permissive spam filtering mta exists purpose accepting incoming email domains difficult establish trust mail sent arbitrary domains generally direct relationship domains via trust even identity established absence trust mta must generally rely heuristics third-party reputation services distinguish spam legitimate traffic mechanisms history error-prone separation msa mta therefore avoids use unreliable spam recognition mechanisms mail submission increases probability legitimate mail delivered successfully recent email clients use port 587 default older ones still propose port 25 users change port number manually latter case also possible mua may automatically discover server provides msa given domain looking srv records domain domain example.com publish record like rfc 6409 requires clients authorized authenticated use mail submission service e.g. described smtp-auth esmtpa means radius public key certificates mostly obsolete pop smtp msa must check submitted mail syntactically valid conforms relevant site policies rfc 6409 contains optional features | [
2015,
5847,
2839,
5722,
2298,
6795,
6908,
7088,
334,
3379,
6046
] | Test |
771 | 2 | Apache_Mynewt:apache mynewt apache mynewt modular real-time operating system connected internet things iot devices must operate long times power memory storage constraints free open-source software incubating apache software foundation source code distributed apache license 2.0 permissive license conducive commercial adoption open-source software apache mynewt real-time operating system rich set libraries intended make prototyping deploying managing 32-bit microcontroller based iot devices easy highly composable allow building embedded system applications e.g. locks medical devices industrial iot across different types microcontrollers name mynewt wordplay english word minute meaning small kernel 6 kb size os designed connectivity comes full implementation bluetooth low energy 4.2 stack addition ble supporting bluetooth 4.2 compliant security features except privacy various utilities default file system console shell logs stats etc. image size approximately 96 kb nordic nrf51822 bluetooth soc size metric excludes boot loader image core operating system supports features utilities include first network stack available mynewt bluetooth low energy called nimble complies bluetooth core specification 4.2 nimble includes host controller components access controller source code makes ble performance highly configurable example ble throughput adjusted changing connection intervals data packet size packet queue size etc use case requiring large number concurrent connections similarly configured provided adequate ram allocated example applications demonstrate use available services included package operating system designed cross-platform use embedded systems devices microcontrollers includes board support packages following project includes newt tool command-line interface cli based smart source package manager system embedded systems development also allows composing builds specified packages compiler options generating images digital signatures finally downloading debugging firmware different targets | [
1522,
7605,
5457,
5208,
5110,
993,
3365,
3368,
6994,
5571,
1556,
3298,
4336,
224,
5055,
6918,
4890,
3559,
238,
7396,
4631,
3664,
861,
771,
3915,
7312,
1989,
7950,
1992,
1435
] | Validation |
772 | 5 | Multilink_Procedure:multilink procedure multilink procedure mlp subscription-time selectable option exists added upper sublayer data link layer operating packet layer multiplicity single data link protocol functions slps data link layer multilink procedure mlp must perform functions accepting packets packet layer distributing packets across available dce dte slps transmission dte dce slps respectively resequencing packets received dte dce slps delivery dte dce packet layer respectively mlp extension lapb allows multiple physical links thus providing better throughput device multiple lapb links implement mlp upper-layer management protocol allocate frames links mlp sees multiple lapb links pool links transmitting information higher-layer protocols frames higher-level software need aware multiple links exist mlp layer handles distributing frames among links thus gives upper layers full access links | [
2062,
3525,
7433
] | Test |
773 | 8 | Java_API_for_XML_Web_Services:java api xml web services java api xml web services jax-ws java programming language api creating web services particularly soap services jax-ws one java xml programming apis part java ee platform jax-ws 2.2 specification jsr 224 defines standard java- to-wsdl mapping determines wsdl operations bound java methods soap message invokes wsdl operation java-to-wsdl mapping determines java method gets invoked soap message mapped method ’ parameters mapping also determines method ’ return value gets mapped soap response jax-ws uses annotations introduced java se 5 simplify development deployment web service clients endpoints part java web services development pack jax-ws used java se starting version 6 jax-ws 2.0 replaced jax-rpc api java platform enterprise edition 5 leans towards document style web services api provides core project metro inside glassfish open-source application server community oracle corporation jax-ws also one foundations wsit | [
3345,
5631,
2371,
7347,
5646,
6986,
5571,
4422,
1479,
1286,
2126,
2322,
3488,
2517,
2519,
5874,
3915,
2799,
7315
] | Validation |
774 | 7 | Grammarly:grammarly grammarly online grammar checking spell checking plagiarism detection platform english language developed grammarly inc software first released july 2009 grammarly proofreading resources check 250 grammar rules grammarly app automatically detects potential grammar spelling punctuation word choice style mistakes writing grammarly algorithms flag potential issues text suggest context-specific corrections grammar spelling wordiness style punctuation plagiarism available via browser extension chrome safari firefox edge grammarly available app ios android premium service available monthly annual payment developed 2009 ukrainians alex shevchenko max lytvyn kiev backend grammar engine written common lisp app owned grammarly inc san francisco area california 2018 security bug discovered desktop web browser extension version grammarly allowed websites access everything user ever typed grammarly editor bug rapidly fixed grammarly said evidence security vulnerability used access customers ’ account data october 2018 grammarly announced support google docs | [
3932,
5429,
3057,
3726,
1445,
6425,
518
] | Test |
775 | 9 | Frink_(programming_language):frink programming language frink computer programming language according creator language designed make physical calculations simple help ensure answers come right make tool really useful real world tracks units measure feet meters kilograms watts etc calculations allowing mix units measure transparently helps easily verify answers make sense frink named professor frink recurring character animated television series simpsons | [
6507,
2451,
5983,
7246,
993,
6428,
5117,
2740,
3368,
4705,
6029,
4070,
5948,
5506,
1774,
336,
4543,
8137,
5965,
7687,
2803,
2619,
5091,
1435
] | Validation |
776 | 9 | O-Matrix:o-matrix o-matrix matrix programming language mathematics engineering science financial analysis marketed harmonic software language designed use high-performance computing o-matrix provides integrated development environment matrix-based scripting language environment includes mathematical statistical engineering visualization functions set analysis functions designed development complex computationally intensive scientific mathematical engineering applications integrated environment provides mode largely compatible version 4 matlab language commercial product mathworks certain features matlab non-numeric data types structures cell arrays objects error handling try/catch nested anonymous functions missing o-matrix o-matrix environment includes virtual machine o-matrix language enable re-distribution applications | [
7071,
5117
] | Test |
777 | 2 | EuroLinux:eurolinux eurolinux campaigning organisation promotes open source software free software europe opposed european union proposals introduce laws software patents also known eurolinux alliance umbrella organisation linux user groups europe describes eurolinux alliance free information infrastructure open coalition commercial companies non-profit associations united promote protect vigorous european software culture based copyright open standards open competition open source software linux corporate members sponsors eurolinux develop sell software free semi-free non-free licenses operating systems linux mac os microsoft windows eurolinux organised public eu campaign software patents signed 300,000 people members include ffii april aful ael european linux user group lug umbrella associations | [
5571,
4759,
578
] | Test |
778 | 7 | Kubity:kubity kubity cloud-based 3d communication tool works desktop computers web smartphones tablets augmented reality gear virtual reality glasses kubity powered proprietary 3d crystallization engine called paragone prepares 3d file transfer mobile devices kubity practical applications architecture interior design engineering product design film video games among others majority users create 3d models using sketchup autodesk revit software kubity products include kubity pro plugin sketchup revit kubity go mobile application ios android kubity compatible across many platforms devices operating systems including ios android firefox chrome windows macos linux kubity created paris-based software company kubity s.a.s. designs develops cloud-based visual communication tools 3d models founded 2012 group software engineers urban projects developer united around simple idea create way anyone anywhere simply intuitively explore 3d models smartphones computers order bring architects engineers designers together clients around 3d model essential develop interactive platform supported multiple desktop mobile devices instantaneous fluid 3d navigation specifications place 15 engineers fused together several technologies 3d design data compression decimation rendering optimization web mobile transfer virtual reality headset integration january 2014 first public kubity prototype 1.0 amethyst launched small group beta testers plug-in allowed users import 3d models sketchup browser global release announced april 2014 sketchup basecamp vail colorado may 2015 kubity launched web application worked using webgl technology 2.0 citrine first time users able drag drop sketchup file web browser without install plug-in december 2015 kubity launched mobile application app store iphone ipod ipad well google play android devices 3.0 druzy november 2016 kubity launched support oculus rift htc vive 4.0 emerald beginning november 2017 kubity launched full suite rollout mobile applications six months included kubity ar augmented reality kubity vr virtual reality kubity mirror remote presentations screen mirroring 5.0 feldspar september 2018 one-click plugin sketchup revit kubity pro along mobile-first revamp kubity go launched allowing pro-to-go device pairing automatic mobile sync 6.0 gypsum early 2019 kubity go application updated include fully integrated ar vr screen mirroring functionalities killing dedicated companion apps kubity ar kubity vr kubity mirror process 7.0 heliotrope kubity powered proprietary 3d crystallization engine known paragone technology developed kubity s.a.s paragone takes constrained information 3d file runs blockwave algorithm also developed kubity s.a.s blockwave multiphase optimization algorithm combines 3d design data compression decimation rendering optimization web mobile transfer mixed reality headset integration create crystallized universal format original file one phase blockwave algorithm based quadric-based polygonal surface simplification algorithm performed using predefined heuristics associated plurality simplified versions 3d model version associated predefined level detail adapted user specific end device blockwave extracts data content geometry textures sets quadrics top original 3d model identifies pairs adjacent tops linked vertices algorithm uses local collapsing operator top-plan error metric obtain fixed number faces maximum defined error 3d meshing simplified replacing two points one deleting degrading faces updating adjacent relations decimation completed texture optimization set using texture target parameters allowing maximized gpu memory improve computing time texture encoding completed crystallized universal 3d file easily opened user-specific end device played across kubity suite tools real-time rendering user converts crystallizes 3d file exporting kubity pro plugin crystallization adds features like ar/vr cinematic fly-through tour well assigns model dedicated qr code 3d model exported kubity pro automatically synced kubity go user mobile device accessed explored shared others without internet connection user models managed one place kubity go models renamed password-protected shared played developed using apple arkit google arcore technology kubity ar maps environment room detecting horizontal planes like tables floors track place 3d objects blending digital objects information environment kubity ar allows users interact 3d models true augmented reality built-in communication features allows users instantly share 3d models anyone text email social media direct device-to-device qr code platform support ar supports devices running ios11 including iphone se iphone 6s iphone 6s plus iphone 7 iphone 7 plus iphone 8 iphone x ipad pro models ipad 2017 ar android requires android 7.0 later access google play store full list compatible devices found arcore developer website vr allows users explore sketchup models revit projects on-the-go right mobile device using google cardboard samsung gear vr glasses-free magic window feature kubity vr compatible google cardboard viewers cardboard compatible devices including clip-on style vr glasses like homido mini well mobile virtual reality headset samsung gear vr samsung gear vr supports galaxy s6 galaxy s6 edge galaxy s6 edge+ samsung galaxy note 5 galaxy s7 galaxy s7 edge galaxy s8 galaxy s8+ samsung galaxy note fan edition samsung galaxy note 8 samsung galaxy a8/a8+ 2018 samsung galaxy s9/galaxy s9+ screen mirroring allows user sync sender device receiver webpage mirror.kubity.com control sender device give remote presentation 3d model devices easily synced entering six-digit number displayed receiving computer kubity 3d communication tool sketchup models revit projects designed work together desktop plugin mobile app user downloads installs plugin sync mobile device plugin using kubity go mobile application model exported kubity 3d crystallization engine automatically optimizes 3d integrates augmented virtual reality features creates secure crystallized format original file kubity go mobile app kubity pro paired kubity pro account display exported sketchup revit models seamlessly across devices allow immersive ar/ vr experiences remote presentations device-to-device share on-the-go access features include cinematic tour walk mode clay mode share augmented reality virtual reality screen mirroring kubity pro plugin available sketchup extension warehouse autodesk app store kubity go free download app store google play ios kubity application compatible devices running version 9.0 higher android kubity compatible devices running version 4.4 “ kit kat ” higher web version kubity applications currently support web browsers compatible webgl2 mozilla firefox google chrome ar compatible devices running ios11 including iphone se iphone 6s iphone 6s plus iphone 7 iphone 7 plus iphone 8 iphone x ipad pro models ipad 2017 android devices requires android 7.0 later access google play store vr compatible google cardboard viewers cardboard compatible devices including clip-on style vr glasses like homido mini well samsung gear vr oculus go samsung gear vr supports galaxy s6 galaxy s6 edge galaxy s6 edge+ samsung galaxy note 5 galaxy s7 galaxy s7 edge galaxy s8 galaxy s8+ samsung galaxy note fan edition samsung galaxy note 8 samsung galaxy a8/a8+ 2018 samsung galaxy s9/galaxy s9+ technology developed kubity used products created kubity s.a.s including rvt2skp pro — plugin revit allows users export revit file sketchup file 2vr — dedicated plugin sketchup revit allows instant 3d exploration 1:1 scale immersive desktop vr compatible oculus rift htc vive | [
2961,
4320,
4759,
5571,
578
] | Test |
779 | 1 | DaDaBIK:dadabik dadabik no-code low-code development platform written php quickly creating crud create read update delete database front-end sophisticated database-driven web application without coding database management systems currently supported mysql postgresql sqlite starting version 9.2 microsoft sql server dadabik originally released 2001 sourceforge gnu general public license eugenio tacchini supported mysql version 4.5 release june 2012 license changed gpl proprietary dadabik 1.0 license requires payment downloading prohibits redistribution old gpl code dadabik v. 4.x removed official website sourceforge project still distributed freely current version moment 9.1 monterosso downloaded official website version 6 introduced new features including possibility add custom hand-coded php pages dadabik application version 8 lerici important milestone development dadabik new responsive front-end introduced together many new features including graph reports generation calculated fields hooks smart installation dadabik tries automatically configure application according database schema new license dadabik license v. 2.0 also introduced version 9 monterosso another important milestone development dadabik dadabik 9 allows build web application without coding starting excel csv ods file v.9 could build dadabik application starting database several new features help power users develop complex applications also introduced including custom buttons dashboards layout hooks new license dadabik license v. 2.1 also introduced version 9.2 introduced support microsoft sql server current last release 9.4 monterosso released july 23 2019 original author still main developer behind core code simone magnaschi takes care ux e ui design group mother tongue users handle translation/localization front-end available 22 languages main features forms customization e.g labels different types html input field content check lookup fields master/details view files upload calculated fields hooks graph report generation export csv checking possible duplication insertions authentication authorization restrictions view/update/delete e-mail notices dadabik used several big organizations like university cambridge università cattolica del sacro cuore considered one popular php database tools dadabik recursive acronym stands dadabik database interfaces kreator | [
6029,
3863,
3915,
5571,
7715,
6386,
5956
] | Test |
780 | 3 | AMD_10h:amd 10h amd family 10h k10 microprocessor microarchitecture amd based k8 microarchitecture though reports k10 canceled first third-generation opteron products servers launched september 10 2007 phenom processors desktops following launching november 11 2007 immediate successors k8 series processors athlon 64 opteron 64-bit sempron commonly perceived pc community time use codename k8 amd k8 athlon 64 processor family amd longer uses k-nomenclatures originally stood kryptonite since k-nomenclature naming convention beyond k8 appeared official amd documents press releases beginning 2005 name k8l first coined charlie demerjian one writers inquirer back 2005 used wider community convenient shorthand according amd official documents processor family termed amd next generation processor technology microarchitecture also referred stars codenames desktop line processors named stars constellations initial phenom models codenamed agena toliman video interview giuseppe amato confirmed codename k10 revealed inquirer codename k8l referred low-power version k8 family later named turion 64 k10 official codename microarchitecture amd refers family 10h processors successor family 0fh processors codename k8 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0fh h represents hexadecimal numbering equals decimal number 15 10h equals decimal 16 k10h form sometimes pops improper hybrid k code family identifier number 2003 amd outlined features upcoming generations microprocessors k8 family processors various events analyst meetings including microprocessor forum 2003 outlined features deployed next-generation microprocessors follows april 13 2006 henri richard amd executive vice president chief officer marketing sales acknowledged existence new microarchitecture interview june 2006 amd executive vice president henri richard another interview digitimes commented upcoming processor developments july 21 2006 amd president chief operating officer coo dirk meyer senior vp marty seyer confirmed launch date new microprocessors revision h new microarchitecture slated middle 2007 contain quad core version servers workstations high-end desktops well dual core version consumer desktops revision h opterons shipped 2007 thermal design power 68 w. august 15 2006 launch first socket f dual-core opterons amd announced firm reached final design stage tape-out quad-core opteron parts next stages testing validation sampling follow several months june 29 2007 amd stated server processors codenamed barcelona ship august 2007 corresponding server systems partners ship september year august 13 reported ship dates first barcelona processors set september 10 2007 announced opteron 2348 2350 core frequencies 1.9 ghz 2.0 ghz november 2007 amd stopped delivery barcelona processors bug translation lookaside buffer tlb stepping b2 discovered could rarely lead race condition thus system lockup patch bios software worked around bug disabling cache page tables connected 5 20 performance penalty kernel patches would almost completely avoid penalty published linux april 2008 new stepping b3 brought market amd including fix bug plus minor enhancements november 2006 reports leaked upcoming desktop part codenames agena agena fx core speeds parts range 2.4 ghz 2.9 ghz respectively 512 kb l2 cache core 2 mb l3 cache using hypertransport 3.0 tdp 125 w. recent reports single core variants codenamed spica dual core without l3 cache codenamed kuma rana respectively available microarchitecture amd analyst day 2006 december 14 2006 amd announced official timeline server desktop mobile processors servers segment amd unveil two new processors based architecture codenamed barcelona budapest 8/4/2-way 1-way servers respectively second half 2007 hypertransport 3.0 socket am2+ unveiled designed specific implementation aforementioned consumer quad core desktop chip series naming convention changes city names middle 2007 stars constellations agena addition amd quad fx platform immediate successor support high end enthusiast dual-processor versions chip codenamed agena fx updates processors line amd quad fx platform server chips codenamed barcelona new desktop quad core series feature shared l3 cache 128-bit floating point fp units enhanced microarchitecture agena native quad-core processor desktop kuma dual-core variant follow q3 rana dual-core version shared l3 cache expected end year information upcoming chip codenamed montreal server roadmap using mcm technique two shanghai cores total 12 mb l3 cache codenamed amd k10.5 desktop variant shanghai codenamed ridgeback afterwards release products based bulldozer cores optimized integrated graphics core amd accelerated processing unit native octal-core 8 core server architecture codenamed sandtiger bobcat core optimized low-power operations computex 2007 early june new information regarding naming schemes upcoming amd microprocessors emerged additional letters indicating performance power envelope precede 4 digit model number model numbers new line processors apparently changed pr ratings used predecessors athlon 64 series processors except phenom fx series suggested follow nomenclature athlon 64 fx series reported dailytech model numbers alpha-numeric format aa- aa alphabetical letters first letter indicating processor class second indicating typical tdp power envelope character series indicator varies branding see table last three characters model number higher numbers indicating greater performance much information known details model numbers processors divided three segments premium intermediate value premium segment model numbers processor class g intermediate segment b value level l discovered web asrock website similarly three levels tdp 65w 65w less 65w indicated letters p e respectively november 2007 amd removed letters model names x2/x3/x4 monikers depicting number cores processor leaving four digit model number first character sole identification processor family sempron remained using le prefix follows november 30 2006 amd live demonstrated native quad core chip known barcelona first time public running windows server 2003 64-bit edition amd claims 70 scaling performance real world loads better performance intel xeon 5355 processor codenamed clovertown details regarding first revision next generation amd microprocessor architecture surfaced web including clock speeds january 24 2007 amd executive vice president randy allen claimed live tests regard wide variety workloads barcelona able demonstrate 40 performance advantage comparable intel xeon codenamed clovertown dual-processor 2p quad-core processors expected performance floating point per core would approximately 1.8 times k8 family clock speed may 10 2007 amd held private event demonstrating upcoming processors codenamed agena fx chipsets one demonstrated system amd quad fx platform one radeon hd 2900 xt graphics card upcoming rd790 chipset system also demonstrated real-time converting 720p video clip another undisclosed format 8 cores maxed 100 tasks also due similar time frame sister microarchitecture focus lower power consumption chips mobile platforms well small form factor features microarchitecture contain specialized features mobile optimized crossbar switch memory controller on-die components link power management hypertransport 3.0 others time amd simply dubbed new mobile core without giving specific codename december 2006 analyst day executive vice president marty seyer announced new mobile core codenamed griffin launched 2008 inherited power optimizations technologies k10 microarchitecture based k8 design late 2007 second quarter 2008 modification core fabricated 45 nm process node enhancements fb-dimm support direct connect architecture 2.0 enhanced reliability availability serviceability ras probably processor die platform also add support i/o virtualization pci express 2.0 10 gigabit nic larger caches however reports suggested fb-dimm support dropped future roadmaps majority amd products since popularity low also fb-dimm future industry standard called question article published inquirer corroborates earlier reports timeline cited article according report three iterations server processor core one named barcelona due q2 2007 new cpu core components well microarchitecture built old hypertransport 2.0 infrastructure second budapest single socket systems using socket am2+ socket am3 hypertransport 3.0 third codenamed shanghai update server chip based 45 nm process probably also hypertransport 3.0 ddr3 implementation due q1-q2 2008 amd september 17 2007 announced three core triple-core processor also released phenom brand lineup codenamed toliman amd official replied interview product benefitted ati technologies add fuses quad-core processor shutting one four cores become triple-core processor technique popular making one mainstream gpu cores single high-end gpu core blowing parts circuit save r costs targeting markets time ago triple-core processor still see specifications quad-core variants naming processor lineup according amd branding scheme named phenom triple-core 8000 series processor line focused amd called fourth market segment high-end mainstream segment beside value mainstream performance segments interview betanews targeted customers processors willing pay performance required much processing power required gamers system builders single core sempron variants low-end market dual-core athlon variants mid-range market quad-core phenom quad-core 9000 series phenom fx variants seen high-end market time frame 2008 amd introduce deneb fx replacement amd quad fx platform well deneb mainstream propos regor also replace kuma rana lower market segments socket am2+ named late 2006 might actually original am3 socket naming conventions changed next generation consumer desktop socket capable ddr3 socket am3 amd introduced microprocessors manufactured 65 nm feature width using silicon-on-insulator soi technology since release k10 coincides volume ramp manufacturing process servers produced socket f 1207 later 1207-pin socket infrastructure server socket amd near-term roadmap desktop parts come socket am2 socket am2+ amd announced technology analyst day use continuous transistor improvement cti shared transistor technology stt would finally lead implementation silicon-germanium-on-insulator sgoi 65 nm process cpus later processors manufactured using 45nm soi technology apu k10 processors manufactured using 32nm soi technology starting 45nm immersion lithography used k8 family known particularly sensitive memory latency since design gains performance minimizing use on-die memory controller integrated cpu increased latency external modules negates usefulness feature ddr2 ram introduces additional latency traditional ddr ram since dram internally driven clock one quarter external data frequency opposed one half ddr however since command clock rate ddr2 doubled relative ddr latency-reducing features e.g additive latency introduced common comparisons based cas latency alone sufficient example socket am2 processors known demonstrate similar performance using ddr2 sdram socket 939 processors utilize ddr-400 sdram k10 processors support ddr2 sdram rated ddr2-1066 1066 mhz desktop k10 processors am2+ supporting ddr2 am3 k10 processor supports ddr2 ddr3 am3 motherboards ddr2 ddr3 slots mean fit types time part ddr3 lynx desktop processors support ddr3 use fm1 socket also reported several sources anandtech inquirer geek.com microprocessors implementing microarchitecture feature doubling width sse execution units cores help major improvements memory subsystem load re-ordering improved prefetch mechanisms well doubled instruction fetch load expected increase suitability processor scientific high-performance computing tasks potentially improve competitiveness intel xeon core 2 itanium 2 contemporary microprocessors many improvements computational throughput core listed characteristics microarchitecture include following amd released limited edition deneb-based processor extreme overclockers partners fewer 100 manufactured 42 officially represents four cores running 2 ghz also reference answer life universe everything hitchhiker guide galaxy first generation desktop apus based k10 microarchitecture released 2011 models provide graphics capability lynx athlon ii sempron x2 models two generations k10-based processors servers opteron 65 nm 45 nm amd discontinued development k10 based cpus thuban choosing focus fusion products mainstream desktops laptops bulldozer based products performance market however within fusion product family apus first generation a4 a6 a8-series chips llano apus continued use k10-derived cpu cores conjunction radeon graphics core k10 derivatives phased production introduction trinity-based apus 2012 replaced k10 cores apu bulldozer-derived cores family 11h microarchitecture mixture k8 k10 designs lower power consumption laptop marketed turion x2 ultra later replaced completely k10-based designs family 12h microarchitecture derivative k10 design note media discussions listed ascending date publication | [
2539,
5799,
5895,
5804,
6599,
4845,
4847,
5559,
6351,
5737,
1465,
4318,
7726,
7826,
4694,
578,
6545,
5669,
5670,
5055,
6373,
1961,
6655,
6562,
4077,
3145,
4090,
5431,
1052,
694,
3063,
1237,
780,
7499,
352,
1797,
2172
] | Validation |
781 | 2 | Opkg:opkg opkg open package management lightweight package management system based upon ipkg written c resembles advanced packaging tool apt /dpkg operation intended use embedded linux devices used capacity openembedded openwrt projects opkg originally forked ipkg openmoko project recently development opkg moved old google code repository yocto project actively maintained opkg packages use codice_1 extension | [
8055,
1621,
2091,
5200,
5017,
5545,
6609,
1723,
1260,
5726,
7619,
4675,
5912,
4400,
3366,
5480,
4778,
5571,
578,
2034,
4603,
4059,
7092,
2581,
7555,
6743,
3559,
2771,
326,
2594,
3042,
5092,
7289,
4441,
1406,
6663,
1684,
952,
4991,
523,
... | Test |
782 | 4 | IDN_homograph_attack:idn homograph attack internationalized domain name idn homograph attack way malicious party may deceive computer users remote system communicating exploiting fact many different characters look alike i.e. homographs hence term attack although technically homoglyph accurate term different characters look alike example regular user example.com may lured click link latin character replaced cyrillic character а kind spoofing attack also known script spoofing unicode incorporates numerous writing systems number reasons similar-looking characters greek ο latin cyrillic о assigned code incorrect malicious usage possibility security attacks registration homographic domain names akin typosquatting forms attacks use similar-looking name established domain fool user major difference typosquatting perpetrator attracts victims relying natural human typographical errors manually entering url homograph spoofing perpetrator deceives victims presenting visually indistinguishable hyperlinks indeed would rare accident web user type e.g. cyrillic letter within otherwise english word citibank cases registration typosquatting homograph spoofing pairs l/i i/j 0/o close together keyboards depending typeface may difficult impossible distinguish early nuisance kind pre-dating internet even text terminals confusion l lowercase letter l 1 number one capital letter vowel 0 number zero typewriters pre-computer era even combined ell one users type lowercase l number one needed zero/oh confusion gave rise tradition crossing zeros computer operator would type correctly unicode may contribute greatly combining characters accents several types hyphen-alikes etc. often due inadequate rendering support especially smaller fonts sizes wide variety fonts even earlier handwriting provided rich opportunities confusion notable example etymology word zenith translation arabic samt included scribe confusing ni common medieval blackletter connect vertical columns letters n u making difficult distinguish several row latter well rn rri rn rri confusion still possible human eye even modern advanced computer technology intentional look-alike character substitution different alphabets also known various contexts example faux cyrillic used amusement attention-grabber volapuk encoding cyrillic script represented similar latin characters used early days internet way overcome lack support cyrillic alphabet another example vehicle registration plates cyrillic domestic usage cyrillic script countries latin international driving letters registration plates issued greece limited using letters greek alphabet homoglyphs latin alphabet european union regulations require use latin letters ascii several characters pairs characters look alike known homographs homoglyphs spoofing attacks based similarities known homograph spoofing attacks example 0 number letter l lowercase l uppercase typical example hypothetical attack someone could register domain name appears almost identical existing domain goes somewhere else example domain rnicrosoft.com begins r n examples g00gle.com looks much like google.com fonts using mix uppercase lowercase characters googie.com capital small l looks much like google.com fonts paypal target phishing scam exploiting using domain paypai.com certain narrow-spaced fonts tahoma default address bar windows xp placing c front j l produce homoglyphs cl cj ci g multilingual computer systems different logical characters may identical appearances example unicode character u+0430 cyrillic small letter а look identical unicode character u+0061 latin small letter lowercase used english hence codice_1 cyrillic version instead codice_2 latin version problem arises different treatment characters user mind computer programming viewpoint user cyrillic а within latin string latin difference glyphs characters fonts however computer treats differently processing character string identifier thus user assumption one-to-one correspondence visual appearance name named entity breaks internationalized domain names provide backward-compatible way domain names use full unicode character set standard already widely supported however system expanded character repertoire dozen characters single alphabet many thousands characters many scripts greatly increased scope homograph attacks opens rich vein opportunities phishing varieties fraud attacker could register domain name looks like legitimate website letters replaced homographs another alphabet attacker could send e-mail messages purporting come original site directing people bogus site spoof site could record information passwords account details passing traffic real site victims may never notice difference suspicious criminal activity occurs accounts december 2001 evgeniy gabrilovich alex gontmakher technion israel published paper titled homograph attack described attack used unicode urls spoof website url prove feasibility kind attack researchers successfully registered variant domain name microsoft.com incorporated cyrillic characters problems kind anticipated idn introduced guidelines issued registries try avoid reduce problem example advised registries accept characters latin alphabet country unicode characters advice neglected major tlds february 7 2005 slashdot reported exploit disclosed 3ric johanson hacker conference shmoocon web browsers supporting idna appeared direct url nowiki http //www.pаypal.com/ /nowiki first character replaced cyrillic а site well known payment site paypal actually led spoofed web site different content popular browsers continued problems properly displaying international domain names april 2017 following alphabets characters used spoofing attacks please note obvious common given artistic license much risk spoofer take getting caught possibilities far numerous listed cyrillic far commonly used alphabet homoglyphs largely contains 11 lowercase glyphs identical nearly identical latin counterparts cyrillic letters а с е о р х у optical counterparts basic latin alphabet look close identical c e p x y. cyrillic з ч б resemble numerals 3 4 6 italic type generates homoglyphs дтпи дтпи дтпи standard type resembling dmnu fonts д used since italic form resembles lowercase g however mainstream fonts д instead resembles partial differential sign ∂ capital letters counted авсеніјкморѕтх substitute abcehijkmopstx addition capitals lowercase cyrillic homoglyphs cyrillic non-russian problematic letters і ј j ԛ q ѕ ԝ w ү ғ f ԍ g bear resemblance cyrillic ӓёїӧ also used idn spoofed fake äëïö komi de ԁ shha һ palochka ӏ izhitsa ѵ bear strong resemblance latin h l v letters either rare archaic widely supported standard fonts included wgl-4 attempting use could cause ransom note effect greek alphabet omicron ο sometimes nu ν appear identical latin alphabet letter lowercase used urls fonts italic type feature greek alpha α looking like latin list increases close matches also allowed greek εικηρτυωχγ eiknptuwxy using capital letters list expands greatly greek αβεηικμνορτχυζ looks identical latin abehikmnoptxyz greek αγβεηκμοπρτφχ looks similar cyrillic агвенкмопртфх cyrillic л л greek λ certain geometric sans-serif fonts greek letters κ о look similar cyrillic к о besides greek τ φ similar cyrillic т ф fonts greek δ resembles cyrillic б serbian alphabet cyrillic а also italicizes latin counterpart making possible substitute alpha vice versa lunate form sigma ϲϲ resembles latin cc cyrillic сс idn spoofed greek beta β substitute german esszet ß fonts fact code page 437 treats equivalent greek sigma ς ç accented greek substitutes όίά usually used óíá many fonts last alpha resembling italic type also armenian alphabet contribute critical characters several armenian characters like օ ո ս well capital տ լ often completely identical latin characters modern fonts symbols like ա resemble cyrillic ш. beside symbols look alike ցհոօզս look like ghnoqu յ resembles j albeit dotless ք either resemble p f depending font however use armenian problematic standard fonts feature armenian glyphs whereas greek cyrillic scripts standard fonts windows prior windows 7 rendered armenian distinct font sylfaen supports armenian mixing armenian latin would appear obviously different using font sylfaen unicode typeface known ransom note effect current version tahoma used windows 7 supports armenian previous versions furthermore font differentiates latin g armenian ց two letters armenian ձշ also resemble number 2 յ resembles 3 another վ sometimes resembles number 4 hebrew spoofing generally rare three letters alphabet reliably used samekh ס sometimes resembles vav diacritic וֹ resembles heth ח resembles letter n. less accurate approximants alphanumerics also found usually accurate enough use purposes foreign branding substitution furthermore hebrew alphabet written right left trying mix left-to-right glyphs may cause problems chinese language problematic homographs many characters exist traditional regular script simplified chinese characters .org domain registering one variant renders unavailable anyone .biz single chinese-language idn registration delivers variants active domains must domain name server registrant .hk .香港 also adopts policy unicode scripts homographs found include number forms roman numerals cjk compatibility enclosed cjk letters months certain abbreviations latin certain digraphs currency symbols mathematical alphanumeric symbols alphabetic presentation forms typographic ligatures two names differ accent one character may look similar instance wíkipedia.org wikipedia.org dot first replaced acute accent top-level domain registries wíkipedia.tld xn -- wkipedia-c2a.tld wikipedia.tld two different names may held different registrants one exception .ca reserving plain-ascii version domain prevents another registrant claiming accented version name unicode includes many characters displayed default zero-width space general icann prohibits domain characters registered regardless tld september 2017 security researcher ankit anubhav discovered idn homograph attack attackers registered adoḅe.com deliver betabot trojan simplest defense web browsers support idna similar mechanisms users turn whatever support browsers could mean blocking access idna sites generally browsers permit access display idns punycode either way amounts abandoning non-ascii domain names additional defense internet explorer 7 firefox 2.0 opera 9.10 include phishing filters attempt alert users visit malicious websites.. april 2017 several browsers including chrome firefox opera displaying idns consisting purely cyrillic characters normally punycode allowing spoofing attacks chrome tightened idn restrictions version 59 prevent attack methods defense extend within browser homographic urls house malicious software still distributed without displayed punycode e-mail social networking web sites without detected user actually clicks link fake link show punycode clicked point page already begun loading browser malicious software may already downloaded onto computer television station kboi-tv raised concerns unknown source registering name completely anonymous registered domain name homographic spread april fool day joke regarding governor idaho issuing supposed ban sale music justin bieber icann implemented policy prohibiting potential internationalized tld choosing letters could resemble existing latin tld thus used homograph attacks proposed idn tlds .бг bulgaria .укр ukraine .ελ greece rejected stalled perceived resemblance latin letters three serbian .срб mongolian .мон later accepted three-letter tld considered safer two-letter tld since harder match normal latin iso-3166 country domains although potential match new generic domains remains generic domains far expensive registering second- third-level domain address making cost-prohibitive try register homoglyphic tld sole purpose making fraudulent domains would draw icann scrutiny russian registry operator coordination center tld ru accepts cyrillic names top-level domain .рф forbidding mix latin greek characters however problem .com gtlds remains open | [
2086,
2944,
5984,
7047,
3486
] | Test |
783 | 9 | Pascal_Script:pascal script pascal script scripting language based programming language pascal facilitates automated runtime control scriptable applications server software implemented free scripting engine includes compiler interpreter byte code pascal script supports majority object pascal constructs making partly compatible delphi free pascal gnu pascal initially developed carlo kok cajscript renamed innerfuse pascal script version 2.23 software taken remobjects renamed remobjects pascal script offered open source software delphi ide beginning version 2.07 cajscript ported free pascal since 2017 pascal script included standard component lazarus ide pascal script used installer scripts inno setup open source setup engine using pascal script may provide additional flexibility installation uninstallation e. g. adding new wizard pages calling dlls providing custom behaviour install conditions pascal script also used server-side scripting pascal server pages maxbox scripter studio inbuild delphi engine renamer batch-oriented automated file renaming tool windows expanded macros written pascal script release version 1.2 lazarus ide began include pascal script engine available form several components additionally lazarus standard packages including synedit tachart support pascal script ide may extended using macros written pascal script increasingly reported applications pascal script science technology include scada robotics education pascal script started 2000 cajscript 1.0 soon superseded cajscript 2.0 later called innerfuse pascal script 2.0 version 2.0 interpreted scripts ran disadvantage every piece code reparsed every time script engine went pascal script 3.0 changed new model compiler runtime completely separated used custom byte code format represent compiled script compiled script contained bare minimum required execute code later carlo kok joined remobjects renamed remobjects pascal script maintained remobjects software fork pascal script maintained sources lazarus ide lazarus free pascal teams ported pascalscript intel processors additional architectures including powerpc arm | [
6507,
4759,
5639,
7970,
4589,
3955,
1361,
304,
5571,
6277,
578,
5937,
5948,
6778,
352,
3069
] | Test |
784 | 1 | Object-relational_database:object-relational database object-relational database ord object-relational database management system ordbms database management system dbms similar relational database object-oriented database model objects classes inheritance directly supported database schemas query language addition pure relational systems supports extension data model custom data types methods object-relational database said provide middle ground relational databases object-oriented databases object-relational databases approach essentially relational databases data resides database manipulated collectively queries query language extreme oodbmses database essentially persistent object store software written object-oriented programming language programming api storing retrieving objects little specific support querying basic need object-relational database arises fact relational object database individual advantages drawbacks isomorphism relational database system mathematical relation allows exploit many useful techniques theorems set theory types databases useful matter comes data complexity mismatch application dbms object oriented database model allows containers like sets lists arbitrary user-defined datatypes well nested objects brings commonality application type systems database type systems removes issue impedance mismatch object databases unlike relational provide mathematical base deep analysis basic goal object-relational database bridge gap relational databases object-oriented modeling techniques used programming languages java c++ visual basic .net c however popular alternative achieving bridge use standard relational database systems form object-relational mapping orm software whereas traditional rdbms sql-dbms products focused efficient management data drawn limited set data-types defined relevant language standards object-relational dbms allows software developers integrate types methods apply dbms ordbms like odbms oodbms integrated object-oriented programming language characteristic properties ordbms 1 complex data 2 type inheritance 3 object behavior complex data creation sql ordbmss based preliminary schema definition via user-defined type udt hierarchy within structured complex data offers additional property type inheritance structured type subtypes reuse attributes contain additional attributes specific subtype another advantage object behavior related access program objects program objects must storable transportable database processing therefore usually named persistent objects inside database relations persistent program object relations object identifier oid points addressed proper relational system although sql standard implementations impose arbitrary restrictions additional complexity object-oriented programming oop object behavior described methods object functions methods denoted one name distinguished type parameters type objects attached method signature oop languages call polymorphism principle briefly defined one interface many implementations oop principles inheritance encapsulation related methods attributes method inheritance included type inheritance encapsulation oop visibility degree declared example codice_1 codice_2 codice_3 access modifiers object-relational database management systems grew research occurred early 1990s research extended existing relational database concepts adding object concepts researchers aimed retain declarative query-language based predicate calculus central component architecture probably notable research project postgres uc berkeley spawned two products tracing lineage research illustra postgresql mid-1990s early commercial products appeared included illustra illustra information systems acquired turn acquired ibm omniscience omniscience corporation acquired oracle corporation became original oracle lite unisql unisql inc. acquired kcoms ukrainian developer ruslan zasukhin founder paradigma software inc. developed shipped first version valentina database mid-1990s c++ sdk next decade postgresql become commercially viable database basis several current products maintain ordbms features computer scientists came refer products object-relational database management systems ordbmss many ideas early object-relational database efforts largely become incorporated sql:1999 via structured types fact product adheres object-oriented aspects sql:1999 could described object-relational database management product example ibm db2 oracle database microsoft sql server make claims support technology varying degrees success rdbms might commonly involve sql statements sql databases allow crafting custom functions would allow query appear object-relational database one might see something like user-defined data-types expressions codice_4 object-relational model offer another advantage database make use relationships data easily collect related records address book application additional table would added ones hold zero addresses customer using traditional rdbms collecting information user address requires join query object-relational database appears simply | [
3928,
1449,
3268,
3951,
6430,
2937,
7915,
6462,
1861,
6128,
7205,
5419,
5778,
7213,
2249,
6144,
1891,
2265,
1905,
7248,
3005,
4775,
3011,
6543,
7999,
4798,
517,
7303,
2702,
4457,
6594,
4463,
5209,
7715,
3776,
8079,
4866,
927,
2054,
7022,
... | Validation |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.