node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
785
2
Incompatible_Timesharing_System:incompatible timesharing system incompatible timesharing system time-sharing operating system developed principally mit artificial intelligence laboratory help project mac name jocular complement mit compatible time-sharing system ctss software developed technically influential far beyond core user community remote guest tourist access easily available via early arpanet allowing many interested parties informally try features operating system application programs software environment major influence hacker culture described steven levy book development initiated late 1960s majority mit ai lab staff time disagreed direction taken project mac multics project started mid-1960s particularly decisions inclusion powerful system security name chosen tom knight joke name earliest mit time-sharing operating system compatible time-sharing system dated early 1960s simplifying system compared multics authors able quickly produce functional operating system lab written assembly language originally digital equipment corporation pdp-6 computer majority development use later pdp-10 although used intensively 1986 continued operate mit 1990 1995 stacken computer club sweden introduced many then-new features environment seen users philosophically significantly different provided operating systems time wide-open philosophy collaborative community direct forerunner free open-source software open-design wiki movements emacs editor macros editor originally written instantiation collection teco programs called macros later operating systems written common language systems example c language unix zetalisp lisp machine system gnu ‘ info help system originally emacs subsystem later written complete standalone system unix-like machines several important programming languages systems developed including maclisp precursor zetalisp common lisp microplanner implemented maclisp mdl became basis infocom programming environment scheme among significant influential software subsystems developed macsyma symbolic algebra system probably important terry winograd shrdlu program developed computer game zork also originally written richard greenblatt mac hack vi top-rated chess program years first display graphical board representation default top-level command interpreter pdp-10 machine language debugger ddt usual text editor teco later emacs written teco ddt teco implemented simple dispatch tables single-letter commands thus true syntax task manager called peek local spelling turist artifact six-character filename identifier limitations traceable six sixbit encoded characters fitting single 36-bit pdp-10 word turist may also pun alan turing pioneer theoretical computer science less-complimentary term luser also applied guest users especially repeatedly engaged clueless vandalous behavior jargon file started combined effort people machines mit stanford university sail document described much terminology puns culture two ai labs related research groups direct predecessor hacker dictionary
[ 1807, 4297, 1445, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 7550, 405, 1855, 1116, 4347, 50, 65, 4733, 5783, 6853, 5088, 6500, 2266, 788, 3682, 1522, 7605, 1524, 6875, 7611, 4759, 7242, 6882, 2280, 4397, 6892, 5116, 2300, 126, 6907,...
Test
786
2
Xbox_360_system_software:xbox 360 system software xbox 360 system software xbox 360 dashboard updateable software operating system xbox 360 formerly resided 16 mb file system however starting nxe update storage became requirement rectified either hard drive installed one later revisions console adequate flash storage embedded within console system software access maximum 32 mb system memory otherwise known random access memory updates downloaded xbox live service directly xbox 360 subsequently installed microsoft also provided ability download system software updates respective official xbox website pcs storage media update installed system xbox 360 game system allows users download applications add functionality dashboard apps required user signed valid xbox live gold account order use features advertised given app 2.0.16756.0 update apps require xbox live gold subscription access although app may subscription able use exception early apps microsoft added partners develop apps xbox 360 system since new xbox experience nxe dashboard update 2008 following success xbox one preview program launched 2014 march 2015 microsoft announced xbox 360 preview program public microsoft released xbox 360 console november 22 2005 whole year earlier sony playstation 3 nintendo wii advantage lead microsoft able experiment various customization options consumer ’ individual consoles ability customize way console looked various themes fit front sides something different home console users system xbox 360 dashboard ability multiple profiles password console user able customize dashboard exactly fit unique style premium themes available purchase xbox live marketplace apart default styles originally five tabs sections known blades xbox 360 menu namely marketplace xbox live games media system scrolling left right section would different-colored background signifying unique area users also option change sections one background color well 2008 however gaming scene changed dramatically competitions playstation 3 wii new xbox dashboard titled new xbox experience nxe launched features major changes user interface functionalities new user interface navigation system similar windows media center contained new pop-up/in-game live guide using redesigned version blades interface tabbed interface featured five blades also users able create personalized avatars essentially mini characters furthermore selecting avatar required xbox live service two years later microsoft launched new dashboard set release microsoft kinect adding fresh new user interface touch silver late 2011 system update came complete new user interface metro-style design inspired windows phone many enhancements included update pushed system modernized interface improved features pushed envelope social gaming media xbox 360 console primarily designed play games like video game consoles used media player similar playstation 3 sony xbox 360 media center capabilities built relatively easy set xbox 360 users also copy videos directly hard drive play via usb stick two ways watch videos xbox 360 first download videos xbox live marketplace videos available free others paid microsoft control videos available xbox live marketplace second stream videos windows media center pc using xbox 360 media center extender way users control videos want watch however restrictions kind video playback specifically supports playback dvr-ms mpeg-1 mpeg-2 wmv videos every xbox 360 play dvd movies box using built-in dvd drive additional parts necessary although user may control everything optional remote improvements experience xbox 360 original xbox including ability upscale image look better progressive scan another feature dvd output xbox 360 produces smoother output playing movies televisions support high definition although using dedicated dvd player would offer even features sound quality xbox 360 system software includes built software emulation support original xbox game system software emulation achieved downloadable emulation profiles require hard drive original xbox games supported last reported update compatibility list 2007 support since discontinued adding new titles 400 titles list covers big name titles requirement backwards compatibility users hard drive xbox 360 specifically official microsoft-brand xbox 360 hard drive contrast xbox 360 successor xbox one console backward compatible launch applying november 2015 new xbox one experience system update also supports select group xbox 360 games using software emulator similar xbox 360 backward compatibility feature however also notable differences ways emulations—unlike xbox 360 emulation original xbox xbox one emulation xbox 360 games specifically patched instead need repackaged xbox one format starting nxe dashboard november 2008 larry hryb known xbox live major nelson team members hosted new segment using microsoft connect allow members xbox live community get chance preview next dashboard small bug fixes minor improvements included preview program limited major releases nxe kinect metro released november years 2009 preview program returned august rather november summer update preview program incentive enrollment started either march/april august/september depending major dashboard release planned applicants notified later 2 weeks enrollment date new preview program dashboard launching consoles early 24 hours acceptance preview program invitation users invited friends using invite friends page xbox preview dashboard app friends already program xbox preview dashboard app place preview participants give feedback program get latest news change console enrollment settings report problems users decide n't want get preview updates anymore opt xbox preview dashboard app details preview program located xbox official website first version xbox 360 system software 2.0.1888.0 released november 22 2005 shipped original xbox 360 consoles although version numbered 2.0 available product launch course next years saw continuous updates system software early updates version 2.0.4532.0 released october 31 2006 added supports 1080p video output external hd dvd drive attachment version 2.0.7357.0 released november 19 2008 first major upgrade system software titled new xbox experience added many new features including completely redesigned gui included changes menu system featuring 3d style vibe options sections new sound effects menus notification sounds remain support 1440×900 1680×1050 16:10 resolutions letterboxed vga hdmi using dvi well abilities preview themes setting disable notifications new messages chat requests etc mute notification sound change qwerty keyboard place alphabetical keyboard subsequent system software updates major upgrade continued add although usually numerically smaller new features make changes including bugfixes example new features introduced version 2.0.8498.0 released august 11 2009 addition display discovery allow console override factory settings hdtv resolutions refresh rates well discovering best possible resolution refresh rates hdtv capable displaying selected hdtvs version 2.0.12611.0 released november 1 2010 also added features ability install game updates hdd select games visual refresh incorporate elements microsoft metro design style also featured new boot screen animation redesigned xbox 360 orb ribbons new anti-piracy 2.5 scheme newly released games also added version later updated anti-piracy 2.6 version 2.0.13599.0 released july 19 2011 version 2.0.14699.0 released december 6 2011 introduced redesigned interface fresh new take platform half decade changes enhancements releases version 2.0.16197.0 released october 16 2012 typically minor usually bugfixes mandatory update prepared subsequent growth service system software still constantly updated gaming platforms next generation gaming platforms generation
[ 1522, 4751, 7514, 3081, 4759, 6256, 2555, 7172, 5648, 728, 481, 3457, 5571, 224, 6294, 1668, 4524, 6380, 3039, 6839, 239, 424, 3907, 522, 5872, 6580, 6399, 6158, 2085 ]
Test
787
3
SGI_IndyCam:sgi indycam indycam small fixed-focus camera intended sit top monitor sgi systems sgi originally distributed indy workstation also connect indigo2 video option designed video conferencing thus optimized office landscape bright fluorescent lighting indycam superseded moosecam 02cam indycam continued used among small group sgi hobbyists
[ 5055, 4362, 7010, 4121, 4802, 6922, 5104, 3849, 3567, 970, 7990, 3692, 156 ]
Test
788
2
Live_CD:live cd live cd also live dvd live disc live operating system complete bootable computer installation including operating system runs directly cd-rom similar storage device computer memory rather loading hard disk drive live cd allows users run operating system purpose without installing making changes computer configuration live cds run computer without secondary storage hard disk drive corrupted hard disk drive file system allowing data recovery cd dvd drives steadily phased-out live cds become less popular replaced live usbs equivalent systems written onto usb flash drives added benefit write-able storage functionality live cd also available bootable live usb flash drive external hard disk drive connected usb many live cds offer option persistence writing files hard drive usb flash drive many linux distributions make iso images available burning cd dvd open source operating systems used free commercial software windows go requires license use many live cds used data recovery computer forensics disk imaging system recovery malware removal tails operating system aimed preserving privacy anonymity users allowing work sensitive documents without leaving record computer hard drive computers except earliest digital computers built form minimal built-in loader loads program succession programs storage medium operate computer initially read-only medium punched tape punched cards used initial program load introduction inexpensive read-write storage read-write floppy disks hard disks used boot media introduction audio compact disc adapted use medium storing distributing large amounts computer data data may also include application operating-system software sometimes packaged archived compressed formats later seen convenient useful boot computer directly compact disc often minimal working system install full system onto hard drive read-write optical discs either mass-produced read-only discs write-once discs used purpose first compact disc drives personal computers generally much slow run complex operating systems computers designed boot optical disc operating systems came distributed compact discs either boot floppy cd would boot specifically install onto hard drive world first oldest non-linux live cd fm towns os first released 1989 release macintosh system 7 1991 yggdrasil linux 1992 although early developers users distributions built top linux kernel could take advantage cheap optical disks rapidly declining prices cd drives personal computers linux distribution cds distros generally treated collection installation packages must first permanently installed hard disks target machine however case distributions built top linux kernel free operating system meeting resistance consumer market perceived difficulty effort risk involved installing additional partition hard disk parallel existing operating system installation term live cd coined typical pc ram large enough 52x speed cd drives cd burners widespread among pc owners finally became convenient practical boot kernel run x11 window manager gui applications directly cd without disturbing os hard disk new different situation linux operating systems updates/upgrades released quickly different distributions versions offered online especially users burning cds first linux-based 'live cd yggdrasil linux first released beta form 1992~1993 ceased production 1995 though practice functionality hampered due low throughput contemporary cd-rom drives demolinux released 1998 first linux distribution specially designed live cd linuxcare bootable business card first released 1999 first live cd focus system administration first distributed bootable business card form factor finnix first released 2000 oldest live cd still production knoppix debian-derived linux distribution released 2003 found popularity rescue disk system primary distribution right since 2003 popularity live cds increased substantially partly due linux live scripts remastersys made easy build customized live systems popular linux distributions include live cd variant cases also preferred installation medium live cds made many different uses designed demonstrate test drive particular operating system usually linux another free open source operating system software tested run particular single use without interfering system setup data system functioning normally due operating system software issues made available example data recovered machine active virus infection without virus process active causing damage virus removed defences removal bypassed although live cds load memory free optical drive uses loading data cd-rom still slower typical hard drive boot rarely default large live cd images smaller live cd images loading filesystem directly ram provide significant performance boost ram much faster hard drive uses less power experienced users operating system may also use live cd determine whether extent particular operating system version compatible particular hardware configuration certain peripherals way know beforehand computer peripheral work buying live cd used troubleshoot hardware especially hard drive fails generally recovery disc case problems live cds save user-created files windows partition usb drive network drive accessible media live backup cds create image drives back files without problems due open files inconsistent sets additional uses include several live cds dedicated specific type applications according requirements thematic user communities cds tailored needs applications subject including general knowledge tutorial specifications trial data topics covers sub topics e.g administration breaks firewall rescue security etc type live cds cases particular live dvd covers one topic packaging software appliance installable live cd live iso often beneficial single image run real hardware types virtual machines allows developers avoid complexities involved supporting multiple incompatible virtual machine images formats focus lowest common denominator instead typically booting machine live cd appliance either runs non-persistent demo mode installs user request available storage device files live cd iso image accessed microsoft windows disk image emulator daemon tools unix variants mounting loop device later versions windows i.e windows 8 later software available earlier versions allow iso mounted volume mounting live cd filesystem software live cd run directly without booting chrooting mounted filesystem live cd iso image also mounted virtual machine software virtualbox vmware workstation converted live usb using syslinux special tools automate process live cd initialization user typically may resort using one boot codes change booting behavior vary distribution distribution often accessed upon first boot screen one function keys live cds come installation utility launchable desktop icon optionally install system hard drive usb flash drive live cds access information internal and/or external hard drives diskettes usb flash drives live cds usually distributed read-only media requiring either copying rewriteable media i.e hard drive cd writer complete remastering install additional software however exceptions puppy linux recorded open multisession medium changes made use files created programs installed preferences customised written new session boot medium persisting subsequent boots term live cd came used cd containing operating system software could run without installation host computer operating systems used live include amigaos 4 amithlon aros freebsd freedos classic mac os macos microsoft windows installation repair discs os/2 reactos netbsd openbsd minix 3 plan 9 bell labs morphos opensolaris belenix others based solaris maintenance versions microsoft windows bootable cd bartpe windows pe microsoft diagnostics recovery toolset dart previously known emergency repair disk commander erd commander first personal computer operating system cd support live operations might amigaos could booted cd amiga cdtv 1990.. earlier examples live os course operating systems used floppy widely spread dos unlike previous operating systems optical media though linux os/2 live cds specifically designed run without installation onto media like hard disk drive live cd concept meant promote linux showcase abilities free open source operating system conventional personal computers microsoft windows already installed pc bootable compact disc generally conforms el torito specification introduced 1994 many linux based live cds use compressed filesystem image often cloop compressed loopback driver squashfs compressed filesystem generally doubling effective storage capacity although slowing application start resulting environment quite rich typical knoppix systems include around 1,200 separate software packages live cds reputation supporting advanced auto-configuration plug-and-play functionality came necessity avoid requiring user configure system time boots make easily usable new operating system read-only file system cd-rom drawback unable save current working data reason read-only file system often merged temporary writable file system form ram disk often default linux directories codice_1 containing users personal files configuration files codice_2 containing variable data kept ramdisk system updates frequently puppy linux live cds allow configuration added files written used later sessions modern live cds read-only file system merged ram drive using transparent techniques unionfs aufs ewf boot loaders like syslinux boot iso files usb memory devices live cds able detect use wide variety hardware including network cards graphic cards etc realtime often using facilities udev hotplug hal udisk etc.. common part distributions based linux kernel 2.6
[ 1807, 2174, 3599, 4293, 2179, 4297, 6792, 2909, 5724, 4670, 5021, 6085, 13, 3271, 7894, 3276, 3626, 386, 5041, 7546, 7550, 2936, 5401, 5753, 6823, 405, 1855, 6117, 2228, 4347, 6835, 6836, 58, 65, 7581, 6488, 4006, 4733, 5783, 6853, 7587...
Test
789
6
FreeFileSync:freefilesync freefilesync free open-source program used file synchronization available windows linux os x project backed donations donors get additional features auto-updater parallel sync portable version silent installation freefilesync works comparing one multiple folders content date file size subsequently synchronizing content according user-defined settings addition supporting local file systems network shares freefilesync able sync ftp ftps sftp mtp devices earlier versions packaged opencandy adware module many antivirus software vendors classify malware since release version 10.0 april 2018 software ad-free 13 november 2018 norton considers freefilesync installer malware blocks installation latest release compatible mac os x 10.7.5 freefilesync_8.4_mac_os_x https //freefilesync.org/archive.php cnet.com staff praised software quoting best software far business
[ 4759, 5571, 578 ]
Test
790
9
Global_variable:global variable computer programming global variable variable global scope meaning visible hence accessible throughout program unless shadowed set global variables known global environment global state compiled languages global variables generally static variables whose extent lifetime entire runtime program though interpreted languages including command-line interpreters global variables generally dynamically allocated declared since known ahead time languages variables global global default modern languages variables limited scope generally lexical scope though global variables often available declaring variable top level program languages however global variables exist generally modular programming languages enforce module structure class-based object-oriented programming languages enforce class structure interaction mechanisms global variables called global environment see also global state mechanisms global environment paradigm contrasted local environment paradigm variables local shared memory therefore interactions reconducted message passing global variables used extensively pass information sections code share caller/callee relation like concurrent threads signal handlers languages including c file defines implicit namespace eliminate problems seen languages global namespace though problems may persist without proper encapsulation without proper locking mutex code using global variables thread-safe except read values protected memory environment variables facility provided operating systems within os shell ksh unix bash linux command.com dos cmd.exe windows kind variable instance unix related systems ordinary variable becomes environment variable codice_1 keyword used program code shells access api calls codice_2 codice_3 local process set means open two terminal windows two different processes running shell change value environment variable one window change seen window child process created inherits environment variables values parent process usually program calls another program first creates child process forking child adjusts environment needed lastly child replaces program called child processes therefore use environment variables communicate peers avoiding action distance problem number non-structured languages early versions basic cobol fortran 1956 provide global variables fortran ii 1958 introduced subroutines local variables common keyword accessing global variables usage common fortan continued fortan 77 influenced later languages pl/sql named common groups globals behave somewhat like structured namespaces variables also global default forth lua perl shells c language codice_4 keyword however variables declared outside function file scope meaning visible within file variables declared file scope visible declaration end compilation unit codice_5 file unless shadowed like-named object nearer scope local variable implicitly external linkage thus visible codice_5 file compilation unit containing declarations also every compilation unit linked form complete program external linkage however sufficient variable use files compilation unit correctly access global variable need know type accomplished declaring variable file using codice_7 keyword declared file may defined one codice_7 declarations often placed shared header file since common practice .c files project include least one codice_9 file standard header file codice_10 example making codice_11 variable accessible modules project global access mechanism judged problematic disabled using codice_12 keyword restricts variable file scope cause attempts import codice_7 raise compilation linking error example global variable c variable external one need pass parameter use function besides main belongs every function module output languages like java n't global variables java variables local variables fields class hence variables scope either class method java static fields also known class variables exist independently instances class one copy shared among instances hence public static fields used many purposes global variables languages similar sharing behavior php codice_4 keyword number unusual ways using global variables variables declared outside functions file scope purposes widest scope however accessible inside functions unless imported codice_4 keyword i.e. keyword accesses global variables declare however predefined variables known superglobals always accessible arrays general purpose one codice_16 superglobal contains variables defined function scope changes elements change original variables additions create new variables superglobals codice_17 codice_18 widely used web programming
[ 1437, 1997, 274, 5983, 1445, 7333, 2827, 4039, 6614, 5116, 5117, 6428, 7074, 3531, 5480, 3368, 1476, 578, 4425, 1857, 6029, 3557, 4432, 233, 6765, 5173, 5537, 5965, 6585, 3238, 2348, 2803, 1435 ]
Test
791
5
Go-Back-N_ARQ:go-back-n arq go-back-n arq specific instance automatic repeat request arq protocol sending process continues send number frames specified window size even without receiving acknowledgement ack packet receiver special case general sliding window protocol transmit window size n receive window size 1 transmit n frames peer requiring ack receiver process keeps track sequence number next frame expects receive sends number every ack sends receiver discard frame exact sequence number expects either duplicate frame already acknowledged out-of-order frame expects receive later resend ack last correct in-order frame sender sent frames window detect frames since first lost frame outstanding go back sequence number last ack received receiver process fill window starting frame continue process go-back-n arq efficient use connection stop-and-wait arq since unlike waiting acknowledgement packet connection still utilized packets sent words time would otherwise spent waiting packets sent however method also results sending frames multiple times – frame lost damaged ack acknowledging lost damaged frame following frames window even received without error re-sent avoid selective repeat arq used examples assume infinite number sequence request numbers things keep mind choosing value n
[ 1952, 3563, 1869, 3462, 1540 ]
Test
792
4
Proof_of_secure_erasure:proof secure erasure computer security proof secure erasure pose proof erasure remote attestation protocol embedded device proves verifying party erased overwritten writable memory purpose make sure malware remains device typically new software installed device verifying party may called verifier device erased prover verifier must know device writable memory size trusted source device must allowed communicate parties execution protocol proceeds follows verifier constructs computational problem solved reasonable time using less specified amount memory sends device device responds solution verifier checks correctness simplest implementation verifier sends random message large device memory device expected store device received complete message required send back security approach obvious includes transfer huge amount data twice size device memory halved device responds hash message prevent device computing fly without actually storing message hash function parametrized random value sent device message avoiding huge data transfer requires suitable stated overview computational problem whose description short dziembowski et al achieve constructing call − δ ε -uncomputable hash function computed quadratic time using memory size memory size − δ computed negligible probability ε. karvelas kiayias claim designed first pose quasilinear time sublinear communication complexity proof space protocol similar proof secure erasure require prover dedicate specific amount memory convince verifier nevertheless important differences design considerations purpose proof space similar proof work verifier time complexity must small property may useful proof secure erasure well fundamental usefulness proof secure erasure hand requires prover unable convince verifier using less specified amount memory even may useful protocol however proof space harmed prover may succeed even significantly less space
[ 1805 ]
Test
793
1
U1DB:u1db u1db cross-platform cross-device syncable database application programming interface api allows applications store json documents synchronize machines devices u1db schemaless document-oriented database api need contain pre-defined list fields implemented language platform using data store backend u1db created canonical scaling issues couchdb previously used ubuntu one service problems implementing service millions users time providing good performance large server farms well tablets smart phones defining interface api allowed implement data synchronization service using different languages data stores platform
[ 2451, 3863, 5965, 3873, 993, 1435 ]
Test
794
4
Certificate_Transparency:certificate transparency certificate transparency ct internet security standard open source framework monitoring auditing digital certificates standard creates system public logs seek eventually record certificates issued publicly trusted certificate authorities allowing efficient identification mistakenly maliciously issued certificates 2011 reseller certificate authority comodo attacked certificate authority diginotar compromised calling attention existing flaws certificate authority ecosystem accelerating work various mechanisms prevent monitor unauthorized certificate issuance ben laurie adam langley emilia kasper began work open source framework combat issues year submitted first draft standard ietf internet draft 2012 code-name sunlight one problems digital certificate management fraudulent certificates take long time spotted reported revoked browser vendors certificate transparency would help making impossible certificate issued domain without domain owner knowing certificate transparency require side channel communication validate certificates competing technologies online certificate status protocol ocsp convergence certificate transparency also operates without need trust third party certificate transparency depends verifiable certificate transparency logs log appends new certificates ever-growing merkle hash tree seen behaving correctly log must log may accept certificates yet fully valid certificates expired monitors act clients log servers monitors check logs make sure behaving correctly inconsistency used prove log behaved correctly signatures log data structure merkle tree prevent log denying misbehavior auditors also act clients log servers certificate transparency auditors use partial information log verify log partial information google launched first certificate transparency log march 2013 september 2013 digicert became first certificate authority implement certificate transparency google chrome began requiring certificate transparency newly issued extended validation certificates 2015 began requiring certificate transparency certificates newly issued symantec june 1 2016 found issued 187 certificates without domain owners knowledge cloudflare announced ct named nimbus march 23 2018
[ 363, 887, 6795, 1168, 1173, 1356, 6348, 2644, 1460, 5824, 6006, 8189, 8093, 6540, 5399, 6458, 6553, 2587, 4071, 7567, 7925, 1401, 3899, 2691, 6049, 4990, 2789, 7214, 3588, 353, 1059, 1513, 2620, 359, 3426 ]
Test
795
9
BBN_LISP:bbn lisp bbn lisp also stylized bbn-lisp dialect lisp programming language bolt beranek newman inc. cambridge massachusetts based l. peter deutsch implementation lisp pdp-1 called basic pdp-1 lisp developed 1960 1964 time language expanded became separate dialect 1966 bbn lisp notable predecessor interlisp
[ 7878, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 1557, 218, 4789, 1478, 5494, 4704, 3880, 4609, 6116, 3212, 5501, 6210, 1116, 144, 6471, 7481, 2144, 2600, 7298, 5515, 8025, 5077, 7032, 4543, 7678, 1889, 2156, 3749, ...
Test
796
5
Wireless_Transport_Layer_Security:wireless transport layer security wireless transport layer security wtls security protocol part wireless application protocol wap stack sits wtp wdp layers wap communications stack wtls derived tls wtls uses similar semantics adapted low bandwidth mobile device main changes wtls superseded wap wireless application protocol 2.0 standard end-to-end transport layer security specification wtls uses modern cryptographic algorithms common tls allows negotiation cryptographic suites client server incomplete list mentioned client server negotiate cryptographic suite happens session started briefly client sends list supported algorithms server chooses suite refuses connection standard mandate support algorithm endpoint either client server needs interoperable endpoint may need implement every algorithm including covered intellectual property rights
[ 7440, 884, 7861, 4101, 6522, 3426 ]
Test
797
2
ILBM:ilbm interleaved bitmap ilbm image file format conforming interchange file format iff standard format originated amiga platform ibm-compatible systems files format related pbm planar bitmap format typically encountered games late 1980s early 1990s either amiga ports graphical assets designed amiga machines characteristic feature format stores bitmaps form interleaved bit planes gives format name reflects way amiga graphics hardware natively reads graphics data memory simple form compression supported make ilbm files compact amiga files associated particular file extension though started used pc systems extensions systematically used employed .lbm occasionally .bbm extension ilbm implementation iff file format consisting number consecutive chunks whose order extent varied chunk different function basic format means program read decode every chunk file ones wants deal ones understand ilbm files usually contain enough information allow displayed image editing program including image dimensions palette pixel data files designed act palettes paint programs pixel data left blank merged another image makes much flexible also much complex formats bmp ilbms bmhd chunk 'vital chunks must appear body chunk chunks appearing body considered 'extra many programs leave unread unchanged bmhd chunk specifies image displayed usually first chunk inside form defines image height/width drawn screen display various screen resolutions image compressed content chunk follows body chunk usually last chunk file largest ilbm files body chunk stores actual image data interleaved bitplanes optional mask row bitplanes appear first 1 n followed mask plane image uncompressed line made codice_1 16-bit values i.e one bit per pixel rounded nearest multiple 16-bits compressed line compressed individually always multiple 16-bits long compressed pbm files body chunk simpler uncompressed continuous stream bytes containing image data image compressed row data bitplane compressed individually including mask data present compression variety rle compression using flags decoded follows compression routine best encode 2 byte repeat run replicate run except preceded followed literal run case best merge three one literal run always encode 3 byte repeats replicate runs camg chunk specifically commodore amiga computer stores long viewport mode lets specify amiga display modes like dual playfield hold modify surprisingly rare outside amiga games need convert display files might contain meaningful camg chunks see 'notes working ilbm files cmap chunk contains image palette consists 3-byte rgb values colour used byte 0 255 inclusive chunk codice_2 bytes long number colours palette codice_3 chunk optional default palette used present possible fewer entries expected e.g 7 colours 4-plane '16 colour bitmap example remember odd number colours per iff specification chunk padded one byte make even number bytes long pad byte included chunk length field colour range chunk 'nonstandard used electronic arts deluxe paint program identify contiguous range colour registers shade range colour cycling zero crng chunks ilbm file appear body chunk deluxe paint normally writes 4 crng chunks ilbm user asks save picture commodore graphicraft program uses ccrt colour cycling range timing chunk contains cycleinfo structure like crng nonstandard chunk data similar crng chunk program would probably use one two methods expressing colour cycle data could write want communicate information deluxepaint graphicraft optional property dest way control scatter zero source bitplanes deeper destination image readers may ignore dest low order depth number bits planepick planeonoff planemask correspond one-to-one destination bitplanes bit 0 bitplane 0 etc higher order bits ignored 1 bits planepick mean put next source bitplane bitplane number 1 bits equal numplanes 0 bits mean put corresponding bit planeonoff bitplane bits planemask gate writing destination bitplane 1 bits mean write bitplane 0 bits mean leave bitplane alone normal case dest chunk equivalent codice_4 remember color numbers formed pixels destination bitmap depth planes deep source bitmap numplanes planes deep optional grab chunk locates handle hotspot image relative upper left corner e.g. used mouse cursor paint brush optional sprt chunk indicates image intended sprite thus mask plane transparent colour n't fullscreen handled depends program using image data stored sprite order used many programs place sprite foreground sprite order 1 appears behind one order 0 etc optional tiny chunk contains small preview image various graphics programs including deluxe paint compressed similar format body chunk sometimes ilbm file contains colour map image data often used store palette colours applied image separately case body chunk empty numplanes field bmhd chunk 0 ilbm files contain 'true-colour information rather indexed colours so-called 'deep images files cmap chunk usually 24 32 bitplanes standard ordering bitplanes put least significant bit red component first r0 r1 r2 r3 r4 r5 r6 r7 g0 g1 g2 g3 g4 g5 g6 g7 b0 b1 b2 b3 b4 b5 b6 b7 32 bit planes last 8 bit planes alpha channel r0 r1 ... r7 g0 ... g7 b0 ... b6 b7 a0 a1 a2 a3 a4 a5 a6 a7 image containing colour map 8 bitplanes may greyscale image i0 i1 i2 i3 i4 i5 i6 i7 ilbm file contains camg chunk bit 7 set i.e 0x80 hexadecimal file expects make use ehb extra half-brite mode amiga chipset colour map 32 entries image 6 bitplanes significant bitplane regarded flag unset use lower 5 bits index colour map usual flag set use lower 5 bits index colour map actual colour used half bright achieved shifted rgb components colour one bit right alternatively create colour map 64 entries copy lower 32 entries upper half converting half brightness use 6 bitplanes colour index pbm images exist extra half-brite mode ilbm file contains camg chunk bit 11 set i.e 0x800 hexadecimal file expects make use ham hold-and-modify mode amiga chipset ham6 format colour map 16 entries image 6 possibly 5 bitplanes ham8 format colour map 64 entries image 8 possibly 7 bitplanes last two bitplanes odd number bitplanes assume extra bitplane always 0 control flags indicate use first 4 6 bitplanes first pixel scanline modification pixel modify use image border colour note using 4 bits modify colour component use 4 bits upper 4 bits component lower 4 bits avoid reducing overall colour gamut using 6 bits less important still put 2 significant bits modification bits least significant two bits colour component pbm images exist hold modify mode utilities work ilbm bbm files rather dated macpaint deluxe paint irfanview allows viewing files free non commercial use work linux netpbm convert images ilbm ppm format back commander keen dreams series games compressed standalone ilbm images used title screens game read ilbm chunks images edited deluxepaint imported directly game files
[ 4474, 307, 4277, 6015, 6016 ]
Test
798
4
Phoenix_Labs:phoenix labs phoenix labs formerly methlabs software developing community founded tim leonard ken mcclelland best known peerguardian open-source software program optimized use personal firewall file sharing networks group originally organized work peerguardian program leonard created 2003 response shutdown audiogalaxy file sharing site name methlabs came leonard handle 'method late 2004 group added blocklist.org website designed allow users interactively manage block ip addresses certain organisations companies phoenix labs formed september 2005 following dispute members methlabs team according phoenix labs press release series threats incidents forced group methlabs.org website press release attributed action team member responsibility finances server control based information participants internet news sources identified person using nickname cerberius cerberius reportedly disputed charges domain hijacking described situation revolt method members group decided could get methlabs.com domain back decided took suggestions new name irc channel user named 'bizzyb0t came name phoenixlabs.org represent group reborn rising ashes peerguardian peerguardian 2 free open source programs developed capable blocking incoming outgoing connections based ip blocklists purpose block several organizations including riaa mpaa using file sharing networks fasttrack bittorrent system also advertising spyware government educational ranges depending upon user preferences programs developed phoenix labs xs file-sharing hub client deepdelete program erasing files securely make extremely difficult recover latter longer development
[ 7744, 6107, 806 ]
Test
799
7
Jumbune:jumbune jumbune juhm-b-yoon open-source multi-module framework intended hadoop mapreduce developers cluster administrators designed monitor profile analyse validate hadoop job cluster jumbune provides complete view whole hadoop cluster jobs one go framework comprises various modules helps admins monitor cluster node system-level fine grained statistics option mark frequently monitored stats favorites fetch refreshed results specified interval time selection trends specific stats also available simple easy utility helps mapreduce developers find discrepancies errors hdfs data user may check data violations various categories like data type null values regular expression values provides developers code level control flow statistics mapreduce job user may apply regex validations user defined validation classes per validations applied jumbune flow debugger checks flow key value data mapper reducer respectively enables developers understand resources creating bottleneck mapreduce phases thatare consuming time estimated requires optimization achieve efficient job performance
[ 5571, 578 ]
Test
800
7
Browser-based_computing:browser-based computing browser-based computing term denoting use web browsers perform computing tasks opportunities computing web noted far back 1997 computing web described 2000 applications include distributed computing web workers illustrated crowdprocess use browser stack qmachine embedding web applications semantic hypermedia components signaling server peer-to-peer networks set via webrtc browser-based computing complements cloud computing reduce server-side computational load often using cloud-hosted restful web services
[ 6025, 2961 ]
Test
801
8
Xenu's_Link_Sleuth:xenu link sleuth xenu xenu link sleuth computer program checks websites broken hyperlinks written tilman hausherr proprietary software available charge program named xenu galactic ruler scientology scripture link sleuth runs microsoft windows link verification performed links appear codice_1 tags well images frames plug-ins backgrounds local image maps style sheets scripts java applets program follows links pages checks links pages also possible check entire site broken links one session xenu displays continuously updated list urls sorted according different criteria program uses simple no-frills user-interface help users understand certain web sites structured program support ssl web sites xenu link sleuth software called fastest link-checking software pc magazine amazingly fast accurate university wyoming newsletter software used testing tool usability study grand valley state university xenu link sleuth also cited rossett astd e-learning handbook zhong intelligent technologies information analysis gerrard risk-based e-business testing reynolds complete e-commerce book slocombe max hits websites work george abc seo well german books italian books
[ 4759, 5571 ]
Test
802
2
Lightweight_Kernel_Operating_System:lightweight kernel operating system lightweight kernel lwk operating system one used large computer many processor cores termed parallel computer massively parallel high-performance computing hpc system particularly sensitive operating system overhead traditional multi-purpose operating systems designed support wide range usage models requirements support range needs large number system processes provided often inter-dependent computing overhead processes leads unpredictable amount processor time available parallel application common parallel programming model referred bulk synchronous parallel model often employs message passing interface mpi communication synchronization events made specific points application code one processor takes longer reach point processors everyone must wait overall finish time increased unpredictable operating system overhead one significant reason processor might take longer reach synchronization point others custom lightweight kernel operating systems currently used fastest computers world help alleviate problem ibm blue gene line supercomputers runs various versions cnk operating system cray xt4 cray xt5 supercomputers run compute node linux sandia national laboratories almost two-decade commitment lightweight kernels high-end hpc systems sandia university new mexico researchers began work sunmos intel paragon early 1990s operating system evolved puma cougar catamount operating systems deployed asci red red storm sandia continues work lwks new r effort called kitten design goals operating systems lwk implementations vary strive provide applications predictable maximum access central processing unit cpu system resources achieve simplified algorithms scheduling memory management usually included system services e.g. daemons limited absolute minimum available services job launch constructed hierarchical fashion ensure scalability thousands nodes networking protocols communication nodes system also carefully selected implemented ensure scalability one example portals network programming application programming interface api lightweight kernel operating systems assume access small set nodes running full-service operating systems offload necessary services login access compiling environments batch job submission file i/o restricting services absolutely necessary streamlining provided overhead sometimes called noise lightweight operating system minimized allows significant predictable amount processor cycles given parallel application since application make consistent progress processor reach synchronization points faster ideally time lost wait time reduced
[ 1251, 1023, 1346, 5571, 1237, 5744, 5161 ]
Train
803
1
Mass_surveillance:mass surveillance mass surveillance intricate surveillance entire substantial fraction population order monitor group citizens surveillance often carried local federal governments governmental organisations organizations like nsa fbi may also carried corporations either behalf governments initiative depending nation laws judicial systems legality permission required engage mass surveillance varies single indicative distinguishing trait totalitarian regimes also often distinguished targeted surveillance mass surveillance often cited necessary fight terrorism prevent crime social unrest protect national security control population conversely mass surveillance equally often criticized violating privacy rights limiting civil political rights freedoms illegal legal constitutional systems another criticism increasing mass surveillance could lead development surveillance state electronic police state civil liberties infringed political dissent undermined cointelpro-like programs state could referred totalitarian state 2013 practice mass surveillance world governments called question edward snowden ‘ 2013 global surveillance disclosure reporting based documents snowden leaked various media outlets triggered debate civil liberties right privacy digital age mass surveillance considered global issue privacy international 2007 survey covering 47 countries indicated increase surveillance decline performance privacy safeguards compared previous year balancing factors eight countries rated 'endemic surveillance societies eight china malaysia russia scored lowest followed jointly singapore united kingdom jointly taiwan thailand united states best ranking given greece judged 'adequate safeguards abuse many countries throughout world already adding thousands surveillance cameras urban suburban even rural areas example september 2007 american civil liberties union aclu stated danger tipping genuine surveillance society completely alien american values potential dark future every move every transaction every communication recorded compiled stored away ready examined used us authorities whenever want 12 march 2013 reporters without borders published special report internet surveillance report included list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights five countries placed initial list bahrain china iran syria vietnam bahrain one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights level internet filtering surveillance bahrain one highest world royal family represented areas internet management sophisticated tools disposal spying subjects online activities dissidents news providers closely monitored surveillance increasing china one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights internet access china owned controlled state communist party many foreign journalists china said take granted telephones tapped email monitored tools put place filter monitor internet collectively known great firewall china besides usual routing regulations allow access ip address particular domain name blocked great firewall makes large-scale use deep packet inspection dpi technology monitor block access based keyword detection great firewall ability dynamically block encrypted connections one country main isps china unicom automatically cuts connection soon used transmit encrypted content monitoring system developed china confined great firewall monitoring also built social networks chat services voip private companies directly responsible chinese authorities surveillance networks ensure banned messages circulated qq application owned firm tencent allows authorities monitor detail exchanges internet users seeking certain keywords expressions author message identified user number qq application effectively giant trojan horse since march 2012 new legislation requires new users micro-blogging sites register using name telephone number skype one world popular internet telephone platforms closely monitored skype services china available local partner tom media group chinese-language version skype known tom-skype slightly different downloadable versions countries report opennet initiative asia says everyday conversations captured servers interception storage conversation may triggered sender recipient name keywords occur conversation 30 january new york times reported target attacks chinese government first breach took place 13 september 2012 newspaper preparing publish article fortune amassed family outgoing prime minister wen jiabao newspaper said purpose attacks identify sources supplied newspaper information corruption among prime minister entourage wall street journal cnn also said targets cyber attacks china february twitter disclosed accounts 250,000 subscribers victims attacks china similar carried new york times mandiant company engaged nyt secure network identified source attacks group hackers called advanced persistent threat 1 unit people liberation army operating 12-story building suburbs shanghai hundreds possibly thousands staff direct support chinese government newest form mass surveillance china social credit system citizens businesses given deducted good behavior points depending choices digital revolution one world biggest mass surveillance operations carried stasi secret police former east germany time state collapsed 1989 stasi built estimated civilian network 300,000 informants approximately one fifty population monitored even minute hints political dissent among citizens many west germans visiting friends family east germany also subject stasi spying well many high-ranking west german politicians persons public eye east german citizens well aware government spying led culture mistrust touchy political issues discussed comfort four walls closest friends family members widely maintaining façade unquestioning followership public right privacy highly developed area law europe data protection directive regulates processing personal data within european union comparison us data protection law comparable instead us regulates data protection sectoral basis since early 2012 european union working general data protection regulation replace data protection directive harmonise data protection privacy law 20 october 2013 committee european parliament backed measure enacted could require american companies seek clearance european officials complying united states warrants seeking private data vote part efforts europe shield citizens online surveillance wake revelations far-reaching spying program u.s. national security agency european union justice rights commissioner viviane reding said question arisen whether large-scale collection processing personal information us surveillance programmes necessary proportionate meet interests national security eu also asking us changes us legislation match legal redress offered europe american citizens europe go courts feel rights infringed europeans without right residence america eu us arrangement implement international safe harbor privacy principles struck european court justice new framework transatlantic data flows called eu-us privacy shield adopted july 2016 april 2014 european court justice declared invalid eu data retention directive court said violates two basic rights respect private life protection personal data legislative body european union passed data retention directive 15 december 2005 requires telecommunication operators retain metadata telephone internet telecommunication services periods less six months two years date communication determined eu member state upon request make data available various governmental bodies access information limited investigation serious crimes warrant required access undertaken seventh framework programme research technological development fp7 science society multidisciplinary mission oriented mass surveillance activities example indect hide funded european commission association industrial partners indect project intelligent information system supporting observation searching detection security citizens urban environment develops intelligent urban environment observation system register exchange operational data automatic detection recognition intelligent processing information abnormal behaviour violence main expected results indect project hide homeland security biometric identification personal detection ethics research project funded european commission within scope seventh rtd framework programme fp7 consortium coordinated emilio mordini explored ethical privacy implications biometrics personal detection technologies focusing continuum personal detection authentication identification mass surveillance 2002 german citizens tipped wiretapping software error led phone number allocated german secret service listed mobile telephone bills indian parliament passed information technology act 2008 debate giving government fiat power tap communications without court order warrant section 69 act states section 69 empowers central government/state government/ authorized agency intercept monitor decrypt information generated transmitted received stored computer resource necessary expedient interest sovereignty integrity india defence india security state friendly relations foreign states public order preventing incitement commission cognizable offence investigation offence india setting national intelligence grid called natgrid would fully set may 2011 individual data ranging land records internet logs air rail pnr phone records gun records driving license property records insurance income tax records would available real time oversight uid unique identification authority india given every indian february 2011 government would able track people real time national population registry citizens established 2011 census fingerprints iris scans would taken along gps records household per initial plan access combined data given 11 agencies including research analysis wing intelligence bureau enforcement directorate national investigation agency central bureau investigation directorate revenue intelligence narcotics control bureau several states within india already installed cctv surveillance systems face matching capabilities using biometrics aadhaar andhra pradesh telangana using information linked aadhaar across different agencies create 360-degree profile person calling integration information hub states planning follow model iran one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved naturally active efforts news providers government runs controls almost country institutions regulating managing legislating telecommunications supreme council cyberspace headed president ahmadinejad established march 2012 determines digital policy construction parallel iranian internet high connection speed fully monitored censored almost complete tools used iranian authorities monitor control internet include data interception tools capable deep packet inspection interception products leading chinese companies zte huawei use products provided huawei mobin net leading national provider mobile broadband used analyze email content track browsing history block access sites products zta sold telecommunication company iran tci offer similar services plus possibility monitoring mobile network european companies source spying data analysis tools products designed ericsson nokia siemens networks later trovicor use companies sold sms interception user location products mobile communication company iran irancell iran two biggest mobile phone companies 2009 used identify iranian citizens post-election uprising 2009 use israeli surveillance devices also detected iran network traffic management surveillance device netenforcer provided israel denmark resold iran similarly us equipment found way iran via chinese company zte july 2018 malaysian police announced creation malaysian internet crime children investigation unit micac equipped real-time mass internet surveillance software developed united states tasked monitoring malaysian internet users focus pornography child pornography system creates data library users includes details ip addresses websites locations duration frequency use files uploaded downloaded struggling drug trafficking criminal groups decades mexico strengthening military mass surveillance approximately half population mexico support democracy form government believe authoritarian system better social matters solved relevance political beliefs may make easier mass surveillance take spread within country necessarily mean end democratic institutions whole—such free elections permanence critical mass media—but means strengthening mechanisms exercising power exclude dialogue transparency social agreement developing intelligence agencies mexico radar means security according 2004 report government netherlands carries clandestine wire-taps intercepts country per capita world dutch military intelligence service mivd operates satellite ground station intercept foreign satellite links also facility eavesdrop foreign high-frequency radio traffic attained nickname ‘ surveillance state ’ north korea government complete control forms telecommunications internet routine sent prison camp communicating outside world government enforces restrictions around types appliances north koreans may home case radio tv sets pick signals nearby south korea china russia attempt mask way government actively spies citizens north korea increasing number citizens smartphones however devices heavily controlled used censor observe everything north koreans phones reuters reported 2015 koryolink north korea official mobile phone network around 3 million subscribers country 24 million obviously order digital data draw citizens must access phones things online sorm sorm-2 laws enable complete monitoring communication electronic traditional eight state agencies without warrant laws seem conflict article 23 constitution russia states 2015 european court human rights ruled legislation violated article 8 european convention human rights zakharov v. russia yarovaya law required storage unconditional access private communication data law enforcement singapore known city sensors singapore surveillance structure spreads widely closed-circuit television public areas even around neighbourhood internet monitoring/ traffic monitoring use surveillance metadata government initiatives singapore sim card registration mandatory even prepaid card singapore government rights access communication data singapore largest telecompany singtel close relations government singapore laws broadly phrased allow government obtain sensitive data text-messages email call logs web surfing history people without need court permission installation mass surveillance cameras singapore effort act deterrence terror attacks also public security loan sharks illegal parking part singapore smart nation initiative build network sensors collect connect data city life including citizen movement singapore government rolled 1000 sensors ranging computer chips surveillance cameras track almost everything singapore air quality public safety 2014 2016 bid increase security singapore police force installed 62,000 police cameras 10,000 housing development board hdb blocks covering lifts multi-storey car parks rising security concerns number cctv cameras public areas monitoring public transport system commercial/ government buildings singapore set increase 2018 singapore government would rolling new advanced surveillance systems starting singapore maritime borders new panoramic electro-optic sensors put place north south coasts monitoring 360-degree view area tethered unmanned aerial vehicle uav also operational used search rescue operations including hostage situations public order incidents according 2017 report privacy international spain may part group 21 european countries withholding information also known data retention 2014 many defense lawyers tried overturn multiple cases used mass storage evidence convict according european agency fundamental rights prior 2009 national defence radio establishment fra limited wireless signals intelligence sigint although left largely unregulated december 2009 new legislation went effect allowing fra monitor cable bound signals passing swedish border communications service providers legally required confidentiality transfer cable communications crossing swedish borders specific interaction points data may accessed court order fra contested since change legislation mainly public perception change would enable mass surveillance fra categorically deny allegation allowed initialize surveillance direct access communication lines sigint authorized special court meet set narrow requirements something minister defence sten tolgfors quoted saying render debate mass surveillance invalid due architecture internet backbones nordic area large portion norwegian finnish traffic also affected swedish wiretapping syria one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights syria stepped web censorship cyber-monitoring country civil war intensified least 13 blue coat proxy servers use skype calls intercepted social engineering techniques phishing malware attacks use failed coup attempt june 15 2016 led authoritarian shift uses mass surveillance suppress opposite views digital surveillance part everyday life due box government puts turkish citizens increasingly difficult release academic knowledge beyond turkish government wants released digital physical strong hold knowledge goes regime today surveillance academicians goes along state oppression turkey hard say happen next years turkey become increasingly authoritarian centralization state power along digitalization expands scope state surveillance digitalization centralization state power closely related regime power becomes prominent conjuncture national security terrorism turkey main explanations world topic although clearly happening according report human rights joint platform published february 23 2017 nine months period state emergency number dismissed academicians reached 4,811 increasing 7,619 addition academicians working universities closed failed coup attempt extended surveillance turkey helped control population massive scale state surveillance united kingdom formed part public consciousness since 19th century postal espionage crisis 1844 sparked first panic privacy citizens however 20th century electronic surveillance capabilities grew wartime signal intelligence pioneering code breaking 1946 government communications headquarters gchq formed united kingdom united states signed bilateral ukusa agreement 1948 later broadened include canada australia new zealand well cooperation several third-party nations became cornerstone western intelligence gathering special relationship uk usa growth internet development world wide web series media reports 2013 revealed recent programs techniques involving gchq tempora use capabilities controlled laws made uk parliament particular access content private messages interception communication must authorized warrant signed secretary state addition european union data privacy law applies uk law uk exhibits governance safeguards well use electronic surveillance investigatory powers tribunal judicial oversight body intelligence agencies ruled december 2014 legislative framework united kingdom breach european convention human rights however tribunal stated february 2015 one particular aspect data-sharing arrangement allowed uk intelligence services request data us surveillance programs prism upstream contravention human rights law prior two paragraphs additional information providing details procedures safeguards disclosed public december 2014 december 2014 ruling investigatory powers tribunal found legislative framework united kingdom permit mass surveillance gchq collects analyses data bulk practice mass surveillance report privacy security published intelligence security committee parliament also came view although found past shortcomings oversight said legal framework simplified improve transparency view supported independent reports interception communications commissioner however notable civil liberties groups continue express strong views contrary plan appeal ruling european court human rights others criticised viewpoints turn regulation investigatory powers act 2000 rip ripa significant piece legislation granted regulated powers public bodies carry surveillance investigation 2002 uk government announced plans extend regulation investigatory powers act least 28 government departments would given powers access metadata citizens web e-mail telephone fax records without warrant without subject knowledge protection freedoms act 2012 includes several provisions related controlling restricting collection storage retention use information government databases supported three major political parties uk parliament passed data retention investigatory powers act july 2014 ensure police security services retain existing powers access phone internet records superseded investigatory powers act 2016 comprehensive statute made public number previously secret powers equipment interference bulk retention metadata intelligence agency use bulk personal datasets enables government require internet service providers mobile phone companies maintain records content customers internet connections 12 months addition created new safeguards including requirement judges approve warrants authorised secretary state come force act informed two reports david anderson qc uk independent reviewer terrorism legislation question trust 2015 report bulk powers review 2016 contains detailed appraisal 60 case studies operational case powers often characterised mass surveillance may yet require amendment consequence legal cases brought court justice european union european court human rights many advanced nation-states implemented laws partially protect citizens unwarranted intrusion human rights act 1998 data protection act 1998 united kingdom laws require formal warrant private data may gathered government uk member european union participates programs subject eu policies directives surveillance vast majority video surveillance cameras uk operated government bodies private individuals companies especially monitor interiors shops businesses according 2011 freedom information act requests total number local government operated cctv cameras around 52,000 entirety uk prevalence video surveillance uk often overstated due unreliable estimates requoted example one report 2002 extrapolated small sample estimate number cameras uk 4.2 million 500,000 london reliable estimates put number private local government operated cameras united kingdom around 1.85 million 2011 historically mass surveillance used part wartime censorship control communications could damage war effort aid enemy example world wars every international telegram united states sent companies western union reviewed us military wars surveillance continued programs black chamber following world war project shamrock following world war ii cointelpro projects conducted u.s. federal bureau investigation fbi 1956 1971 targeted various subversive organizations including peaceful anti-war racial equality activists albert einstein martin luther king jr billions dollars per year spent agencies national security agency nsa federal bureau investigation fbi develop purchase implement operate systems carnivore echelon narusinsight intercept analyze immense amount data traverses internet telephone system every day since september 11 2001 terrorist attacks vast domestic intelligence apparatus built collect information using nsa fbi local police state homeland security offices military criminal investigators intelligence apparatus collects analyzes stores information millions american citizens many accused wrongdoing mail isolation control tracking program u.s postal service photographs exterior every piece paper mail processed united states — 160 billion pieces 2012 u.s. postmaster general stated system primarily used mail sorting images available possible use law enforcement agencies created 2001 following anthrax attacks killed five people sweeping expansion 100-year-old program called mail cover targets people suspected crimes fbi developed computer programs magic lantern cipav remotely install computer system order monitor person computer activity nsa gathering information financial records internet surfing habits monitoring e-mails also performed extensive analysis social networks myspace prism special source operation system legally immunized private companies cooperate voluntarily u.s. intelligence collection according register fisa amendments act 2008 specifically authorizes intelligence agencies monitor phone email communications u.s. citizens week without obtaining warrant one parties outside u.s. prism first publicly revealed 6 june 2013 classified documents program leaked washington post guardian american edward snowden communications assistance law enforcement act calea requires u.s. telecommunications internet service providers modify networks allow easy wiretapping telephone voip broadband internet traffic early 2006 usa today reported several major telephone companies providing telephone call records u.s. citizens national security agency nsa storing large database known nsa call database report came heels allegations u.s. government conducting electronic surveillance domestic telephone calls without warrants 2013 existence hemisphere project provides telephone call data federal agencies became publicly known traffic cameras meant help enforce traffic laws intersections may used law enforcement agencies purposes unrelated traffic violations cameras allow identification individuals inside vehicle license plate data collected time stamped cross reference data used police department homeland security funding networks surveillance cameras cities towns part efforts combat terrorism new york city police department infiltrated compiled dossiers protest groups 2004 republican national convention leading 1,800 arrests modern surveillance united states thought wartime effort snowden disclosed depth information national security agency june 2013 constant development improvements internet technology made easier mass surveillance take hold revelations allow critical commentators raise questions scrutinize implementation use abuse networking technologies devices software systems partake “ global surveillant assemblage ” bogard 2006 collier ong 2004 haggerty ericson 2000 murakami wood 2013 nsa collected millions verizon user telephone records 2013-2014 nsa also collected data google facebook program called 'prism journalists snowden published nearly 7,000 top-secret documents since yet information disclosed seems less 1 entire information access every individual private records seems directly contradict fourth amendment vietnam one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights country 16 service providers directly indirectly controlled vietnamese communist party industry leader vietnam posts telecommunications group controls 74 per cent market state-owned viettel enterprise vietnamese armed forces fpt telecom private firm accountable party depends market leaders bandwidth service providers major instruments control surveillance bloggers monitored government frequently undergo man-in-the-middle attacks designed intercept data meant sent secure https sites allowing passwords communication intercepted according july 2012 freedom house report 91 percent survey respondents connected internet mobile devices government monitors conversations tracks calls activists reactionaries result digital revolution many aspects life captured stored digital form concern expressed governments may use information conduct mass surveillance populations commercial mass surveillance often makes use copyright laws user agreements obtain typically uninformed 'consent surveillance consumers use software related materials allows gathering information would technically illegal performed government agencies data often shared government agencies thereby practice defeating purpose privacy protections one common forms mass surveillance carried commercial organizations many people willing join supermarket grocery loyalty card programs trading personal information surveillance shopping habits exchange discount groceries although base prices might increased encourage participation program programs like google adsense opensocial increasing pool so-called web gadgets social gadgets google-hosted services many web sites internet effectively feeding user information sites visited users also social connections google facebook also keep information although acquisition limited page views within facebook data valuable authorities advertisers others interested profiling users trends web site marketing performance google facebook others increasingly becoming guarded data reach increases data becomes inclusive making valuable new features like geolocation give even increased admission monitoring capabilities large service providers like google also enabled track one physical movements users using mobile devices especially syncing without user interaction google gmail service increasingly employing features work stand-alone application also might activate web browser even active synchronizing feature mentioned google i/o 2009 developer conference showing upcoming html5 features google others actively defining promoting 2008 world economic forum davos google ceo eric schmidt said arrival truly mobile web offering new generation location-based advertising set unleash 'huge revolution mobile world congress barcelona 16 february 2010 google presented vision new business model mobile operators trying convince mobile operators embrace location-based services advertising google advertising provider would mean every mobile operator using location-based advertising service would revealing location mobile customers google organizations like electronic frontier foundation constantly informing users importance privacy considerations technologies like geolocation computer company microsoft patented 2011 product distribution system camera capture device monitors viewers consume product allowing provider take remedial action actual viewers match distribution license reporters without borders march 2013 special report internet surveillance contained list corporate enemies internet companies sell products liable used governments violate human rights freedom information five companies initial list amesys france blue coat systems u.s. gamma group uk germany hacking team italy trovicor germany list exhaustive likely expanded future surveillance state country government engages pervasive surveillance large numbers citizens visitors widespread surveillance usually justified necessary national security prevent crime acts terrorism may also used stifle criticism opposition government examples early surveillance states include former soviet union former east germany large network informers advanced technology base computing spy-camera technology states today technologies mass surveillance use databases pattern recognition software cross-correlate information obtained wire tapping including speech recognition telecommunications traffic analysis monitoring financial transactions automatic number plate recognition tracking position mobile telephones facial recognition systems like recognize people appearance gait dna profiling etc development smart cities seen increased adoption surveillance technologies governments although primary purpose surveillance cities use information communication technologies improve urban environment implementation technology number cities resulted increased efficiencies urban infrastructure well improved community participation sensors systems monitor smart city infrastructure operations activities aim help run efficiently example city could use less electricity traffic run smoothly fewer delays citizens use city safety hazards dealt faster citizen infractions rules prevented city infrastructure power distribution roads traffic lights example dynamically adjusted respond differing circumstances development smart city technology also led increase potential unwarranted intrusions privacy restrictions upon autonomy widespread incorporation information communication technologies within daily life urban residents results increases surveillance capacity states extent individuals may unaware information accessed access occurs purpose possible conditions could give rise development electronic police state shanghai amsterdam san jose dubai barcelona madrid stockholm new york cities use various techniques smart city technology electronic police state state government aggressively uses electronic technologies record collect store organize analyze search distribute information citizens electronic police states also engage mass government surveillance landline cellular telephone traffic mail email web surfing internet searches radio forms electronic communication well widespread use video surveillance information usually collected secret crucial elements politically based long government afford technology populace permit used electronic police state form continual use electronic mass surveillance result constant low-level fear within population lead self-censorship exerts powerful coercive force upon populace seventeen factors judging development electronic police state suggested electronic police state 2008 national rankings list includes factors apply forms police states use identity documents police enforcement go considerably beyond emphasize use technology gather process information collected concept monitored government collects large audience curious citizens mass surveillance prominently featured wide array books films media advances technology last century led possible social control internet conditions late capitalism many directors writers enthralled potential stories could come mass surveillance perhaps iconic example fictional mass surveillance george orwell 1949 novel nineteen eighty-four depicts dystopian surveillance state works focus mass surveillance
[ 1998, 1344, 3609, 2548, 803, 2727, 6419, 6974, 1353, 1175, 6092, 3528, 820, 909, 5654, 7725, 6438, 2566, 731, 8191, 2572, 7646, 7372, 7836, 7189, 2488, 2489, 137, 5412, 147, 3480, 7754, 2054, 5509, 5689, 3573, 7120, 4821, 431, 4196, 324...
Train
804
3
NXP_LPC:nxp lpc lpc family 32-bit microcontroller integrated circuits nxp semiconductors formerly philips semiconductors lpc chips grouped related series based around 32-bit arm processor core cortex-m4f cortex-m3 cortex-m0+ cortex-m0 internally microcontroller consists processor core static ram memory flash memory debugging interface various peripherals earliest lpc series based intel 8-bit 80c51 core february 2011 nxp shipped one billion arm processor-based chips recent lpc families based arm cores nxp semiconductors licenses arm holdings adds peripherals converting design silicon die nxp vendor shipping arm cortex-m core dual in-line package lpc810 dip8 0.3-inch width lpc1114 dip28 0.6-inch width following tables summarize nxp lpc microcontroller families lpc4xxx series based arm cortex-m4f core lpc4300 series two three arm cores one arm cortex-m4f one two arm cortex-m0 lpc4350 chips pin-compatible lpc1850 chips lpc4330-xplorer development board available nxp summary series lpc4000 series based single arm cortex-m4f processor core lpc408x chips pin-compatible lpc178x chips summary series lpc3xxx series based arm926ej-s core first 90 nm arm9 family lpc3200 series based arm926ej-s processor core lpc3100 series based arm926ej-s processor core lpc3154 used nxp implement lpc-link debugger lpcxpresso boards lpc3180 core operates 208 mhz features interfaces sdram usb 2.0 full-speed nand flash secure digital sd i²c lpc2000 series based 1.8-volt arm7tdmi-s core operating 80 mhz together variety peripherals including serial interfaces 10-bit adc/dac timers capture compare pwm usb interface external bus options flash memory ranges 32 kb 512 kb ram ranges 4 kb 96 kb nxp two related series without lpc name lh7 series based arm7tdmi-s arm720t cores lh7a series based arm9tdmi core lpc2900 series based arm968e-s processor core lpc2400 series based arm7tdmi-s processor core lpc2300 series based arm7tdmi-s processor core lpc2364/66/68 lpc2378 full-speed usb 2.0 devices 2 interfaces 10/100 ethernet mac lqfp100 lqfp144 packages multiple peripherals supported including 10-bit 8-channel adc 10-bit dac lpc2200 series based arm7tdmi-s processor core lpc2100 series based arm7tdmi-s processor core lpc2141 lpc2142 lpc2144 lpc2146 lpc2148 full-speed usb 2.0 devices lqfp64 packages multiple peripherals supported including one two 10-bit adcs optional 10-bit dac nxp lpc1000 family consists six series microcontrollers lpc1800 lpc1700 lpc1500 lpc1300 lpc1200 lpc1100 lpc1800 lpc1700 lpc1500 lpc1300 series based cortex-m3 arm processor core lpc1200 lpc1100 based cortex-m0 arm processor core nxp lpc1800-series based arm cortex-m3 core lpc1850 pin-compatible lpc4350 parts available packages tbga100 lqfp144 bga180 lqfp208 bga256 lpc4330-xplorer development board available nxp apple m7 m8 motion co-processor chips likely based lpc1800 series lpc18a1 lpc18b1 nxp lpc1700-series based arm cortex-m3 core lpc178x pin-compatible lpc408x parts available packages lqfp80 lqfp100 tfbga100 lqfp144 tfbga180 lqfp208 tfbga208 lpc1769-lpcxpresso development board available nxp mbed lpc1768 board also available emcrafts lpc-lnx-evb lpc1788 based board μclinux available nxp lpc1500-series based arm cortex-m3 core available packages lqfp48 lqfp64 lqfp100 lpc1549-lpcxpresso development board available nxp along motor control kit nxp lpc1300-series based arm cortex-m3 core available packages hvqfn33 lqfp48 lqfp64 lpc1343-lpcxpresso lpc1347-lpcxpresso development board available nxp nxp lpc1200-family based arm cortex-m0 core consists 2 series lpc1200 lpc12d00 available packages lqfp48 lqfp64 lqfp100 lpc1227-lpcxpresso development board available nxp nxp lpc1100-family based arm cortex-m0 core consists 8 series lpc1100 miniature lpc1100 x l lpc1100lv lpc11a00 lpc11c00 lpc11d00 lpc11e00 lpc11u00 lpc1100 series primarily targets ultra tiny footprint available package wlcsp16 2.17 mm x 2.32 mm lpc1104-lpcxpresso development board available nxp lpc1100 x l-series consists three subseries lpc111x lpc111xl lpc111xxl lpc111xl lpc111xxl include power profiles windowed watchdog timer configurable open-drain mode lpc1110xl adds non-maskable interrupt nmi 256-byte page flash erase function lpc1114-lpcxpresso lpc1115-lpcxpresso development board available nxp summary series lpc1100lv series primarily targets low operating voltage range 1.65 1.95 volt power i²c limited 400 khz available two power supply options 1.8 volt single power supply wlcsp25 hvqfn24 packages 1.8 volt core 3.3 volt io/analog dual power supply 5 volt tolerant i/o hvqfn33 package available packages wlcsp25 2.17 mm × 2.32 mm hvqfn24 hvqfn33 lpc11a00 series primarily targets analog features 10-bit adc 10-bit dac analog comparators analog voltage reference temperature sensor eeprom memory available packages wlcsp20 2.5 mm x 2.5 mm hvqfn33 5 mm x 5 mm hvqfn33 7 mm x 7 mm lqfp48 lpc11c00 series primarily targets bus features one mcan controller lpc11c22 lpc11c24 parts include on-chip high-speed transceiver available package lqfp48 lpc11c24-lpcxpresso development board available nxp lpc11d00 series primarily targets lcd display features 4 x 40 segment lcd driver available package lqfp100 lpc11e00 series primarily targets eeprom memory smart card features lpc11u00 series primarily targets usb features usb 2.0 full-speed controller first cortex-m0 integrated drivers rom series pin-compatible lpc134x series lpc11u14-lpcxpresso development board available nxp mbed lpc11u24 board also available nxp lpc800 microcontroller family based cortex-m0+ arm processor core unique features include pin switch matrix state configurable timer clockless wake-up controller single-cycle gpio dip8 package lpc812-lpcxpresso development board available nxp summary series lpc900 series legacy devices based 8-bit 80c51 processor core lpc700 series legacy devices based 8-bit 80c51 processor core lpcxpresso boards sold nxp provide quick easy way engineers evaluate microcontroller chips lpcxpresso boards jointly developed nxp code red technologies embedded artists lpcxpresso board following common features following lpcxpresso boards exist following mbed boards exist following baseboards compatible lpcxpresso mbed boards lpc microcontrollers rom'ed bootloader supports loading binary image flash memory using one peripherals varies family since lpc bootloaders support loading uart peripheral boards connect uart rs-232 usb-to-uart adapter ic thus universal method program lpc microcontrollers microcontrollers requires target board way enable/disable booting rom'ed bootloader i.e jumper switch button amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer nxp semiconductors documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set nxp additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official nxp arm documents
[ 7960, 4759, 4846, 6082, 7519, 463, 5208, 469, 4041, 3182, 3365, 6720, 2926, 2024, 7730, 1556, 7905, 7990, 6910, 2036, 5752, 4061, 4336, 5845, 5055, 6371, 7654, 6919, 1864, 4166, 5762, 6378, 5323, 1772, 3397, 6753, 1779, 4537, 950, 1977, ...
Validation
805
7
Kami_(app):kami app kami formerly known notable pdf auckland-based cloud-based company known document files reader editor collaborative tool also available google marketplace headquartered auckland kami founded 2012 alliv samson jordan thoms hengjie wang sam altman investor kami built upon html5 app browsers make easy approachable tool working online 2014 kami announced management partnering google google work partner program order target education users online use kami targets facilitate web users chrome extension allows users annotate pdf files .docx .pptx image files within browser basic task tool make online documents easily usable real life applications app leverages easy read edit approach documents thus replacing outdated arduous printing marking scanning processes kami finds uniqueness provision web services editing pdf documents local level result tool able offer offline editing enhance value application company management plans extend tool compatibility formats autocad photoshop extension includes introduction relevant annotation tools support desired document extensions app
[ 6015 ]
Validation
806
4
PeerGuardian:peerguardian peerguardian free open source program developed phoenix labs capable blocking incoming outgoing connections based ip blacklists aim use block peers torrent download visibility peer connection using ip lists system also capable blocking custom ranges depending upon user preferences windows version program discontinued favor applications phoenix labs encourage current peerguardian users migrate peerblock based peerguardian 2 development peerguardian started late 2002 led programmer tim leonard first public version released 2003 time music industry started sue individual file sharing users change previous stance would target consumers copyright infringement lawsuits original peerguardian 1.0 programmed visual basic quickly became popular among p2p users despite blocking common tcp protocol known high ram cpu usage connected p2p networks december 2003 downloaded 1 million times original version released free source code made available open source license due version 1.0 blocking tcp ports peerguardian.net shifted bluetack.co.uk protowall blocklist manager b.i.m.s hosts manager developed 7 months development february 2005 version 2 peerguardian released beta development version 2.0 led cory nelson aimed resolve many shortcomings version 1 version 2 enabled support protocols tcp udp icmp etc multiple block lists automatic updates installation procedure also simplified longer requiring system restart driver installation speed resource inefficiencies fixed re-designing re-coding version 2.0 c++ consume less processing power memory desktop firewall software windows version 2.0 installed kernel-level filter windows 2000 later giving application direct access windows networking stack improving performance support windows vista ipv6 release candidate phase may 2009 blacklist stored number different formats binary formats known p2b created release first beta version peerguardian 2 order create smallest possible blocklist original format peerguardian version 1.x simple plaintext format unfortunately meant lists became large cost lot bandwidth distribute heralding construction smaller binary formats format follows example format also used emule safepeer vuze plugin protowall ktorrent transmission since least 2006 p2p blocklist used peerguardian provided bluetack internet security solutions bluetack name member original peerguardian team owned previous domain peerguardian.net created block list manager used maintain list bluetack.co.uk developed application called bluetack internet management system b.i.m.s would spider whois servers create map internet ip addresses database admins site seraphielx moore firstaid tozanno deathangel r00ted would search names anti-p2p companies set status code entry make blocklists would downloaded blocklist manager import peerguardian protowall applications would block anti-p2p traffic accessing download would also obtain logs people sent letters downloading illegal software music videos figure list belong flag entry safe peerguardian developers state control bluetack list promote link alternative lists criticized overly broad blocking based unsubstantiated evidence peerguardian acknowledges battlefield 2 blizzard steam arenanet connectivity blocked creates problems many online gaming users aware peerguardian break game connectivity thus directed read manual blocklist manager application users add sites safe list allowing continue using games websites without interference peerguardian 2007 bluetack/peerguardian 2 criticized blocking denis.stalker.h3q.com second largest bittorrent tracker december 2007 anti-p2p address claiming maintainers whose tracking software opentracker also used pirate bay conspiring mpaa mediadefender maintainers members chaos computer club ccc long-standing association hackers freedom information activists also briefly run tracker ccc network bluetack also blocked ccc accusing anti-p2p work threat file sharers others pointed fact ccc publicly defending p2p years even called boycotting music industry protest file sharing lawsuits although ip addresses government business entities easily added list ip addresses blocked means peerguardian block access government business using undocumented ip address identify people engaged copyright infringement possibly unlawful activity peerguardian lite derivative peerguardian 2 made consume little cpu ram possible ui options consists single tray icon longer developed latest version released april 22 2005 also open-source allowing future derivatives party developers reported online peerguardian lite continued project program peerblock peerguardian lite users recommended around 2008 switch peerblock peerblock options uses almost little cpu peerguardian lite besides original criticism version 1 slow buggy criticism peerguardian around actual technique used block peers critics pointed blocklists open public thus parties may wish circumvent peerguardian actively check list see ip addresses blocked blocklists also managed public fool-proof method checking reporting ip address range bad checking blocked ip addresses still remain bad list relies public make submissions thus vulnerable attack see section blocklist management issues vista 64 bit windows 7 64 bit listed application compatibility require work around involving disabling driver signing may require degree computer skill
[ 1249, 3165, 1809, 798, 4759, 7714, 994, 3185, 4492, 7351, 4138, 385, 7536, 2296, 2746, 5571, 6107, 578, 3637, 8100, 6456, 6025, 3551, 1291, 7275, 499, 7744, 3394, 6560, 3219, 4977, 7289, 7478, 3223, 3484, 4091, 2790, 7683, 6235, 6149, 6...
Test
807
4
Truncated_differential_cryptanalysis:truncated differential cryptanalysis cryptography truncated differential cryptanalysis generalization differential cryptanalysis attack block ciphers lars knudsen developed technique 1994 whereas ordinary differential cryptanalysis analyzes full difference two texts truncated variant considers differences partially determined attack makes predictions bits instead full block technique applied safer idea skipjack e2 twofish camellia crypton even stream cipher salsa20
[ 1811, 4930, 464, 1353, 2918, 3100, 119, 6015, 6016, 7548, 1283, 6637, 1480, 6647, 7200, 4805, 3219, 5765, 5327, 6657, 7928, 1587, 762, 5333, 6763, 6049, 161, 433, 1320, 613, 1146, 4917 ]
Test
808
1
Distributional–relational_database:distributional–relational database distributional–relational database word-vector database database management system dbms uses distributional word-vector representations enrich semantics structured data distributional word-vectors automatically built automatically large-scale corpora enrichment supports construction databases embed large-scale commonsense background knowledge operations distributional-relational models applied construction schema-agnostic databases databases users query data without aware schema semantic search schema-integration inductive abductive reasoners well different applications semantically flexible knowledge representation model needed main advantage distributional–relational models purely logical semantic web models fact core semantic associations automatically captured corpora contrast definition manually curated ontologies rule knowledge bases distributional–relational models first formalized mechanism cope vocabulary/semantic gap users schema behind data scenario distributional semantic relatedness measures combined semantic pivoting heuristics support approximation user queries expressed vocabulary data expressed vocabulary dataset designer model database symbols entities relations embedded distributional semantic space geometric interpretation latent explicit semantic space geometric aspect supports semantic approximation entities different databases query term database entity distributional relational model becomes double layered model semantics structured data provides fine-grained semantics intended database designer extended distributional semantic model contains semantic associations expressed broader use models support generalization closed communication scenario database designers users live context e.g organization open communication scenario e.g different organizations web creating abstraction layer users specific representation conceptual model
[ 3330, 7290 ]
Test
809
3
PIC_instruction_listings:pic instruction listings pic instruction set refers set instructions microchip technology pic dspic microcontroller supports instructions usually programmed flash memory processor automatically executed microcontroller startup picmicro chips harvard architecture instruction words unusual sizes originally 12-bit instructions included 5 address bits specify memory operand 9-bit branch destinations later revisions added opcode bits allowing additional address bits instruction set tables follow register numbers referred f constants referred k bit numbers 0–7 selected b bit selects destination 0 indicates w 1 indicates result written back source register f. c z status flags may set based result otherwise unmodified add subtract rotate instructions set c also set dc digit carry flag carry bit 3 bit 4 useful bcd arithmetic memory operands also referred registers simply general-purpose storage ram locations reserved special function registers except single accumulator called codice_1 almost registers memory-mapped even registers like program counter alu status register exceptions memory-mapped return address stack tri-state registers used configure gpio pins instruction set contain conditional branch instructions instead contains conditional skip instructions cause following instruction ignored conditional skip followed unconditional branch performs conditional branch skip instructions test bit register alu status register one possibility memory operands specified absolute address location fixed compile time provide indirect addressing pair special function registers provided mechanism also allows 256 bytes memory addressed even instruction set allows 5- 7-bit memory operands models registers special function registers plus ram fit instruction provide multiple banks memory use one two mechanisms accessing pic processors 256 words program use paged memory internal program counter return stack wide necessary address memory low 8 bits visible software codice_5 pc low register additional codice_6 pc latch high register modified software operation specify full destination address 9-bit codice_7 8-bit write pc register fills additional high bits corresponding part pclath pic18 processors extend beyond 16 bits pclatu register supply bits 16–23 † extended instruction available enhanced baseline pics models 16f527 16f570 mcv20a interrupt support 4-level stack include instructions models also include movlb elan microelectronics corp. make series picmicro-like microcontrollers 13-bit instruction word instructions mostly compatible mid-range 14-bit instruction set limited 6-bit register address 16 special-purpose registers 48 bytes ram 10-bit 1024 word program space 10-bit program counter accessible r2 reads access low bits writes clear high bits exception tbl instruction modifies low byte preserving bits 8 9 7 accumulator-immediate instructions renumbered relative 14-bit picmicro fit 3 opcode bits rather 4 well additional software interrupt instruction additional miscellaneous instructions changes terminology picmicro option register called control register picmicro tris registers 1–3 called i/o control registers 5–7 equivalents obvious † instruction unique em78 instruction set pic equivalent models support multiple rom ram banks manner similar pic microcontrollers also 15-bit variant instruction set almost identical except register numbers enlarged 8 bits call jump addresses enlarged 12 bits differences second generation 15-bit instruction set includes several additional instructions † em89f768n operands results special registers ‡ em88f794n mtf213 mtf351 devices feature 14-bit wide code memory improved 8 level deep call stack instruction set differs little baseline devices 2 additional opcode bits allow 128 registers 2048 words code directly addressed additional miscellaneous instructions two additional 8-bit literal instructions add subtract mid-range core available majority devices labeled pic12 pic16 enhanced mid-range core devices introduce deeper hardware stack additional reset methods 14 additional instructions c programming language optimizations particular two codice_8 codice_9 codice_10 two corresponding codice_2 register pairs codice_12 codice_13 special instructions use codice_14 registers like address registers variety addressing modes holtek make numerous 8-bit microcontrollers 14-bit instruction word equivalent non-enhanced mid-range core instruction encodings fit 14 bits provide 7-bit operand addresses models 4k 8k words program rom provide 15- 16-bit wide rom extend basic 11-bit destination address using bits 14–15 instruction bits 11–12 address models extend 7-bit ram addresses using bit 14 instruction bit 7 operand address instruction format identical microchip opcodes assigned different order manufacturer uses different instruction mnemonics accumulator called acc rather w destination specified suffix instruction mnemonic rather operand addition opcode assignment semantic differences instructions several operations added 14-bit picmicro repertoire 2000 microchip introduced pic18 architecture unlike 17 series proven popular large number device variants presently manufacture contrast earlier devices often programmed assembly c become predominant development language pic18 12-bit ram address space divided 16 pages 256 bytes 8-bit codice_15 field determines address combination codice_16 bit 4-bit bank select register codice_17 codice_16=0 codice_17 ignored codice_15 field sign-extended range 0x000–0x07f global ram 0xf80–0xfff special function registers codice_16=1 codice_15 field extended codice_17 generate 12-bit address pic18 extends codice_2/codice_3 mechanism used previous picmicro processors indirect addressing two ways first provides three file select registers codice_14 registers 12 bits long split two 8-bit portions codice_27 codice_28 access corresponding codice_29 register codice_9 codice_31 acts alias addressed byte second addressing modes three one codice_29 register five one used determines addressing mode also instructions directly load fsr pair 12-bit address codice_46 instruction moves byte two 12-bit addresses 2001 microchip introduced dspic series chips entered mass production late 2004 microchip first inherently 16-bit microcontrollers pic24 devices designed general purpose microcontrollers dspic devices include digital signal processing capabilities addition instructions come two main varieties one like classic one-operand pic instructions operation w0 value specified f register i.e first 8k ram destination select bit selecting updated result w registers memory-mapped f operand may specify w register form new pic24 specifies three w register operands two allow 3-bit addressing mode specification register offset addressing mode available codice_48 instruction ww register may used register offset source destination instructions use encoding unsigned 5-bit immediate source instead operands codice_49 codice_50 access program memory indirect modes allowed refer addresses code memory instructions 2 words long second word nop includes 16 bits additional immediate operand
[ 8033, 2567, 6299, 5208, 4128, 6982 ]
Test
810
3
Inter-processor_interrupt:inter-processor interrupt inter-processor interrupt ipi special type interrupt one processor may interrupt another processor multiprocessor system interrupting processor requires action processor actions might requested include m65mp option os/360 used direct control feature s/360 generate interrupt another processor s/370 successors including z/architecture signal processor instruction provides formalized interface ibm pc compatible computers use advanced programmable interrupt controller apic ipi signalling often performed using apic cpu wishes send interrupt another cpu stores interrupt vector identifier target local apic interrupt command register icr local apic message sent via apic bus target local apic therefore issues corresponding interrupt cpu multiprocessor system running microsoft windows processor may interrupt another processor following reasons addition ones listed ipis given irql 29
[ 607, 7331, 4759, 4277, 6338, 1150, 2332, 4061 ]
Validation
811
1
Kdb+:kdb+ kdb+ column-based relational time series database tsdb in-memory imdb abilities developed marketed kx systems database commonly used high-frequency trading hft store analyze process retrieve large data sets high speed kdb+ ability handle billions records analyzes data within database database available 32-bit 64-bit versions several operating systems financial institutions use kdb+ analyze time series data stock commodity exchange data database also used time-sensitive data applications including commodity markets energy trading telecommunications sensor data log data machine computer network usage monitoring kdb+ high-performance column-store database designed process store large amounts data commonly accessed data pushed random-access memory ram faster access data disk storage created financial institutions mind database developed central repository store time series data supports real-time analysis billions records kdb+ ability analyze data time responds queries similar structured query language sql columnar databases return answers queries efficient way row-based database management systems kdb+ dictionaries tables nanosecond time stamps native data types used store time series data core kdb+ built-in programming language q concise expressive query array language dialect language apl q manipulate streaming real-time historical data kdb+ uses q aggregate analyze data perform statistical functions join data sets supports sql queries vector language q built speed expressiveness eliminates need looping structures kdb+ includes interfaces c c++ java c python 1998 kx systems released kdb database built language k written arthur whitney 2003 kdb+ released 64-bit version kdb 2004 kdb+ tick market database framework released along kdb+ taq loader new york stock exchange nyse taq data kdb+ created arthur whitney building prior work array languages april 2007 kx systems announced releasing version kdb+ mac os x time kdb+ also available operating systems linux windows solaris september 2012 version 3.0 released optimized intel upgraded processors support websockets globally unique identifiers guid universally unique identifiers uuid intel advanced vector extensions avx streaming simd extensions 4 sse4 4.2 sandy bridge processors time allowed enhanced support kdb+ system june 2013 version 3.1 released benchmarks 8 times faster older versions
[ 4759, 470, 6263, 1465, 5571, 578, 3464, 6285, 584, 6462, 752, 5322, 1670, 3565, 2054, 1774, 5419, 1308, 7758, 6846, 6064, 8137, 5965, 3060, 1892, 971, 356, 1435 ]
Test
812
4
Automated_threat:automated threat automated threat type computer security threat computer network web application characterised malicious use automated tools internet bots automated threats popular internet complete large amounts repetitive tasks almost cost execute owasp automated threat handbook provides threat ontology list classifying automated threats enumerated
[ 1805, 429, 1584 ]
Test
813
9
David_Gries:david gries david gries born 26 april 1939 flushing queens new york american computer scientist cornell university united states primarily known books science programming 1981 logical approach discrete math 1993 fred b. schneider currently associate dean undergraduate programs cornell university college engineering research interests include programming methodology related areas programming languages programming language semantics logic son paul gries co-author introductory textbook computer programming using python professor teaching stream department computer science university toronto gries graduated queens college 1960 spent following two years working programmer-mathematician u.s naval weapons laboratory met wife elaine gries earned master degree mathematics university illinois urbana-champaign 1963 illinois gries worked manfred paul ruediger wiehle write full algol compiler ibm 7090 computer earned dr. rer nat 1966 munich university technology studying friedrich l. bauer joseph stoer gries assistant professor stanford university 1966–1969 became associate professor cornell university ithaca new york spent next 30 years including stint chair computer science department 1982–1987 guggenheim fellowship 1984–1985 spent 1999–2002 university georgia athens returned cornell january 2003 author co-author editor seven textbooks 75 research papers david gries currently lives ithaca new york gries recipient four major educator awards computer science holds two honorary doctorates among first ten cornell faculty awarded cornell weiss presidential fellowship contributions undergraduate education 1994 inducted fellow association computing machinery co-authoring axiomatic proof technique parallel programs
[ 1243 ]
Validation
814
3
Fixstars_Solutions:fixstars solutions fixstars solutions inc software services company specializing multi-core processors particularly nvidia gpu cuda environment ibm power7 cell also specialize solid-state drives currently manufacture world largest sata drives early part 2010 fixstars developed strong relationship nvidia focused linux distribution gpu computing yellow dog enterprise linux cuda first enterprise linux os optimized gpu computing offers end users developers integrators faster reliable less complex gpu computing experience november 11 2008 japanese company fixstars announced acquired essentially terra soft assets terra soft former founder ceo kai staats appointed coo fixstars new american subsidiary fixstars solutions based irvine california fixstars solutions retained terra soft product line staff regional offices loveland colorado terra soft provided software services powerpc/power isa linux os platform former terra soft solutions produced yellow dog linux ydl yellow dog enterprise linux included cluster construction tools customers included argonne sandia lawrence livermore los alamos national labs several department defense contractors including boeing lockheed martin saic u.s. airforce navy army nasa many top universities around world including california institute technology mit stanford university apple value-added reseller ibm business partner terra soft solutions provided turnkey build-to-order desktop workstations servers high performance computing clusters terra soft made yellow dog linux distribution solely powerpc/power isa optimizing distributions altivec cell terra soft first support variety apple computers linux pre-installed unique license apple apple abandoned powerpc cpus favor intel core chips terra soft able concentrate high-performance computing cell broadband engine working closely ibm sony playstation 3 products 2006 terra soft contracted sony provide linux operating system playstation 3 used several university researchers inexpensive powerful cluster compute node today fixstars tokyo japan carries forward yellow dog linux yellow dog enterprise linux product line primary focus heterogeneous multi-core cpus cell broadband engine nvidia gpu
[ 4408, 5571, 7453, 5665 ]
Test
815
4
Hacker_Halted:hacker halted hacker halted global series computer information security conferences presented ec-council objective hacker halted conferences raise international awareness towards increased education ethics security event currently 14th year also present hacker halted ec-council h cker halted academy trainings workshops led ec-council instructors trainers hacker halted malaysia held 2004 2007 2018 new delhi hacker halted conference held egypt 13 14 december 2018 hacker halted dubai held 2005 2006 dubai united hacker halted singapore held 2005 singapore hacker halted mexico held 2005 mexico hacker halted japan held november 11 2008 tokyo japan hacker halted usa held 2008 myrtle beach south carolina hacker halted usa held september 20–24 2009 miami florida hilton head hotel include events include capture flag event hacker halted usa held 2010 miami hacker halted usa held miami 25 27 october 2011 theme 2011 stop data leaks secure code hacker halted usa held miami october 29–31 2012 hacker halted usa held atlanta 2013 2014 2015 2016 2017 2018 hacker halted usa 2019 returns atlanta ga talks include tracks include hacker halted usa 2009 launch hacker halted academy hacker halted academy series classes presented ec-council partners many classes include ec-council training certification including certified ethical hacker licensed penetration tester well vendor specific certification including certified information systems security professional cissp nsa nsa information security assessment methodology iam /information security evaluation methodology iem training
[ 2206, 7192 ]
Test
816
9
Interpress:interpress interpress page description language developed xerox parc based forth programming language earlier graphics language called jam parc unable commercialize interpress two creators chuck geschke john warnock left xerox formed adobe systems produced similar language called postscript interpress used xerox printers supported xerox ventura publisher interpress also used output format parc interscript system editable word processor format rich text documents
[ 6016 ]
Validation
817
7
Grid_MP:grid mp grid mp commercial distributed computing software package developed sold univa formerly known united devices privately held company based primarily austin texas formerly known metaprocessor prior release version 4.0 however letters mp grid mp officially stand anything grid mp provides job scheduling prioritization user security restrictions selective application exclusion user-activity detection time-of-day execution controls grid mp used manage computational devices consisting corporate desktop pcs departmental servers dedicated cluster nodes computational devices arranged device groups organizational security administrative control grid mp demonstrated capable managing grids large numbers nodes use infrastructure grid.org world community grid projects world community grid project migrated open-source berkeley open infrastructure network computing software 2007 despite ability scale seamlessly hundreds thousands device nodes also suitable smaller clusters enterprise servers workstations mp grid services interface simply mgsi offers web service api via soap xml-rpc protocols http enables developers back-end application services access manipulate objects within system access api objects access controlled security restricted per-object basis since mgsi web service protocol programming language soap xml-rpc library available used interface although commonly c++ java perl php used web-based mp management console simply mpmc provides administrators simplified easy-to-use interface monitor system activity control security settings manage system objects mpmc written php programming language uses mgsi web service interactions system mp agent known ud agent versions 4.0 software agent must installed computer participate grid mp installation running jobs mp agent installed computer officially recognized grid mp device grid mp enterprise version 5.5 mp agent supported following platforms
[ 6690, 5983, 4759, 1256, 4484, 900, 6986, 5571, 578, 4159, 6029, 4985, 352, 1989, 7315, 971, 2441 ]
Test
818
3
IBM_ThinkPad_600:ibm thinkpad 600 ibm thinkpad 600 series series notebook computers introduced 1998 ibm immediate predecessor t-series still exists today lenovo ownership three models produced 600 600e 600x series succeeded 2000 thinkpad t20 series 600 series designed portable version 770 series featuring slimmer dimensions weight around 5 pounds 2.3 kg using lightweight strong carbon fiber composite plastics 600 series also introduced new ultraslimbay confused ultrabay slim found later t40/t60 series well easily interchangeable ram hard drives 600 series machines shipped 32 64mb ram integrated motherboard factory 600 series originally shipped either windows 95 windows nt 4.0 later models shipping windows 98 windows 2000 600 models could also run windows 3.x os/2 warp 4 windows windows xp well various linux distributions none 600 series models included wireless adapters ethernet ports option could added third-party pcmcia/cardbus card one common problem 600 series battery defect battery would discharge rapidly otherwise poor battery life use third-party battery well bios update help alleviate problem
[ 2342, 2472, 6170, 7670 ]
Validation
819
4
Sir_Dystic:sir dystic josh buchbinder better known sir dystic member cult dead cow cdc since may 1997 author back orifice also written several hacker tools including smbrelay nete nbname sir dystic appeared multiple hacker conventions member panels speaking also interviewed several television radio programs award-winning short film hacker culture general cdc particular dystic pseudonym taken somewhat obscure 1930s bondage comic character named sir dystic d'arcy according cdc sir dystic namesake tried evil things always bungles ends good inadvertently back orifice often shortened bo controversial computer program designed remote system administration enables user control computer running microsoft windows operating system remote location name pun microsoft backoffice server software program debuted def con 6 august 1 1998 brainchild sir dystic member u.s. hacker organization cult dead cow according group purpose demonstrate lack security microsoft operating system windows 98 according sir dystic bo supposed statement fact people feel secure safe although wide gaping holes operating system 're using means defense 're using hostile code mean message bo2k really different message vnunet.com reported sir dystic claim message privately commended employees microsoft smbrelay smbrelay2 computer programs used carry smb man middle mitm attacks windows machines written sir dystic released 21 march 2001 lantacon convention atlanta georgia nbname computer program used carry denial-of-service attacks disable netbios services windows machines written sir dystic released 29 july 2000 def con 8 convention las vegas sir dystic reported issue nbname exploits microsoft acknowledged security bulletin
[ 7175, 1691, 4759, 3592, 6411, 3426 ]
Validation
820
4
Michael_S._Rogers:michael s. rogers michael s. rogers born october 31 1959 former united states navy admiral served second commander u.s. cyber command uscybercom concurrently served 17th director national security agency nsa chief central security service css april 3 2014 prior rogers served commander tenth fleet commander u.s. fleet cyber command tenure helped transform elevate u.s. cyber command unified combatant command relinquished command may 4 2018 successor paul nakasone retired active duty united states navy june 1 2018 rogers born october 31 1959 native chicago illinois graduated new trier high school 1977 graduate auburn university 1981 naval war college rogers received commission naval reserve officers training corps nrotc program served united states navy since graduating auburn university 1981 started career surface warfare officer working naval gunfire support operations grenada beirut maritime surveillance operations el salvador board uss caron dd-970 1986 selected transfer unrestricted line officer restricted line officer re-designation cryptology officer 2003 u.s. invasion iraq rogers joined military joint staff works joint chiefs staff specialized computer network attacks 2007 onward served director intelligence military pacific command 2009 became director intelligence joint chiefs staff subsequently named commander u.s. fleet cyber command commander u.s. 10th fleet responsibility navy cyberwarfare efforts rogers first restricted line officer serve numbered fleet commander first information warfare community iwc officer achieve rank vice admiral january 2014 obama administration announced rogers nomination director national security agency commander united states offensive cyberoperations unit department defense rogers succeeded general keith b. alexander served nsa director nine years became first iwc officer achieve rank admiral although nsa directorship require senate approval rogers confirmed senate head united states cyber command senate unanimously confirmed first public remarks nsa director rogers stated believed nsa whistleblower edward snowden probably working foreign intelligence agency despite frequent speculation assertion nsa allies contrary rogers added clearly believes question n't agree fundamentally disagree believe wrong believe illegal tenure nsa director subject controversy number occasions notably including apparent recommendation part secretary defense remove post president barak obama congressional testimony suggesting president donald trump taking sufficient action russian influence january 2018 rogers announced would retiring nsa spring early 2019 rogers became chairman board advisors claroty cybersecurity firm
[ 4210, 1344, 803, 6419, 5654, 6627, 1278, 7646, 3716, 4429, 7917, 5412, 5767, 5509, 6756, 4988, 2343, 4996, 1701, 4201 ]
Test
821
6
Extended_file_system:extended file system extended file system ext implemented april 1992 first file system created specifically linux kernel metadata structure inspired traditional unix file system ufs designed rémy card overcome certain limitations minix file system first implementation used virtual file system vfs support added linux kernel version 0.96c could handle file systems 2 gigabytes gb size ext first series extended file systems 1993 superseded ext2 xiafs competed time ext2 long-term viability ext2 remedied issues ext immutability inodes fragmentation members extended file system family
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 5783, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 4...
Test
822
2
Droid_fonts:droid fonts droid font family first released 2007 created ascender corporation use open handset alliance platform android licensed apache license fonts intended use small screens mobile handsets designed steve matteson ascender corporation name derived open handset alliance platform named android nowiki /nowiki unlike sans fonts capital letter retains serifs droid font family consists droid sans droid sans mono droid serif typeface extensive character set including coverage western european eastern/central european baltic cyrillic greek turkish languages 12 february 2009 ascender corporation announced retail version droid fonts droid pro family fonts sold opentype truetype font format planned droid pro family consists droid sans pro regular bold droid sans pro condensed regular bold droid sans pro mono regular bold droid serif pro regular italic bold bold italic droid sans fallback initial releases include droid sans pro droid serif pro opentype features include old style figures droid sans pro mono went sale beginning 2009-07-31 handset condensed 2010 handset condensed condensed version droid sans pro designed ascender corp steve matteson released 1 march 2013 compatible droid family fonts without opentype features similar droid sans pro family includes 2 fonts bold regular weights without italics supports wgl character set 2009 ascender corporation designed specially customed fonts google fonts api language support arabic persian languages fonts released available google fonts website droid arabic naskh bold regular weights droid arabic kufi bold regular weights variations found recently includes droid persian naskh specific font persian farsi language distributed open font library may 2014 found android smartphones operate android 4.2 jellybean os following fonts found fonts folder phone rooted 'systems folder fonts include variations droid font aimed depict android 'robot image logo include droid robot regular font droid robot japanese regular font japanese language support aims specific language font designers adapt fonts particular southern asian languages include droid hindi support hindi language droid telugu support telugu language droid india support indian languages india fonts could found github xda developers forum android smartphones
[ 4116, 3933, 5195, 6697, 2003, 3848, 5372, 7431, 195, 6978, 993, 5473, 6427, 561, 7346, 201, 474, 2107, 2017, 5919, 822, 6183, 649, 1095, 4234, 5302, 2927, 7357, 5571, 2037, 2756, 7007, 7274, 136, 42, 4340, 7749, 3310, 2591, 1399, 2417, ...
Test
823
5
ALOHAnet:alohanet alohanet also known aloha system simply aloha pioneering computer networking system developed university hawaii alohanet became operational june 1971 providing first public demonstration wireless packet data network aloha originally stood additive links on-line hawaii area alohanet used new method medium access aloha random access experimental ultra high frequency uhf operation since frequency assignments communications computer available commercial applications 1970s even frequencies assigned two media available application aloha channel – cables satellites 1970s aloha random access employed nascent ethernet cable based network marisat inmarsat satellite network early 1980s frequencies mobile networks became available 1985 frequencies suitable became known wi-fi allocated us regulatory developments made possible use aloha random-access techniques wi-fi mobile telephone networks aloha channels used limited way 1980s 1g mobile phones signaling control purposes late 1980s european standardisation group gsm worked pan-european digital mobile communication system gsm greatly expanded use aloha channels access radio channels mobile telephony addition sms message texting implemented 2g mobile phones early 2000s additional aloha channels added 2.5g 3g mobile phones widespread introduction gprs using slotted-aloha random-access channel combined version reservation aloha scheme first analyzed group bbn one early computer networking designs development aloha network begun september 1968 university hawaii leadership norman abramson along thomas gaarder franklin kuo shu lin wesley peterson edward ned weldon goal use low-cost commercial radio equipment connect users oahu hawaiian islands central time-sharing computer main oahu campus first packet broadcasting unit went operation june 1971 terminals connected special purpose terminal connection unit using rs-232 9600 bit/s original version aloha used two distinct frequencies hub configuration hub machine broadcasting packets everyone outbound channel various client machines sending data packets hub inbound channel data received correctly hub short acknowledgment packet sent client acknowledgment received client machine short wait time would automatically retransmit data packet waiting randomly selected time interval acknowledgment mechanism used detect correct collisions created two client machines attempted send packet time alohanet primary importance use shared medium client transmissions unlike arpanet node could talk directly node end wire satellite circuit alohanet client nodes communicated hub frequency meant sort mechanism needed control could talk time alohanet solution allow client send data without controlling sent acknowledgment/retransmission scheme used deal collisions approach radically reduced complexity protocol networking hardware since nodes need negotiate allowed speak see token ring solution became known pure aloha random-access channel basis subsequent ethernet development later wi-fi networks various versions aloha protocol slotted aloha also appeared later satellite communications used wireless data networks ardis mobitex cdpd gsm also important alohanet use outgoing hub channel broadcast packets directly clients second shared frequency using address packet allow selective receipt client node two frequencies used device could receive acknowledgments regardless transmissions aloha network introduced mechanism randomized multiple access resolved device transmission collisions transmitting package immediately acknowledgement present acknowledgment received transmission repeated random waiting time version protocol called pure aloha one implemented alohanet quite simple note first step implies pure aloha check whether channel busy transmitting since collisions occur data may sent aloha use 100 capacity communications channel long station waits transmits likelihood collision occurs interrelated affect efficiently channel used means concept transmit later critical aspect quality backoff scheme chosen significantly influences efficiency protocol ultimate channel capacity predictability behavior assess pure aloha need predict throughput rate successful transmission frames discussion pure aloha performance follows tanenbaum first let make simplifying assumptions let refer time needed transmit one frame channel let define frame-time unit time equal let g refer mean used poisson distribution transmission-attempt amounts average g transmission-attempts per frame-time consider needs happen frame transmitted successfully let refer time intended send frame preferable use channel one frame-time beginning stations refrain transmitting time frame-time probability k transmission-attempts frame-time formula_1 average amount transmission-attempts 2 consecutive frame-times 2 g hence pair consecutive frame-times probability k transmission-attempts two frame-times formula_2 therefore probability formula_3 zero transmission-attempts t-t t+t thus successful transmission us formula_4 throughput calculated rate transmission-attempts multiplied probability success concluded throughput formula_5 formula_6 vulnerable time=2*t. maximum throughput 0.5/e frames per frame-time reached g 0.5 approximately 0.184 frames per frame-time means pure aloha 18.4 time used successful transmissions another simple mathematical way establish equation throughput pure aloha slotted aloha follows consider needs happen frames transmitted successfully let represent frame time simplicity assumed contention begins t=0 exactly one node sends interval t=0 t=t node tries t=t t=2t frame transmitted successfully similarly next time intervals t=2nt t= 2n+1 exactly one node sends t= 2n+1 t= 2n+2 node tries send n=1,2,3 ... frames successfully transmitted pure aloha nodes begin transmission whenever want without checking nodes time thus sending frames independent events transmission particular node neither affects affected time start transmission nodes let g average number nodes begin transmission within period frame time large number nodes trying transmit using poisson distribution probability exactly x nodes begin transmission period formula_7 therefore probability particular period t=2nt t= 2n+1 particular non-zero integer value n exactly one node begin transmission formula_8 probability particular period t= 2n+1 t= 2n+2 node begin transmission formula_9 successful transmission frame events occur simultaneously period t=2nt t= 2n+1 exactly one node begins transmission t= 2n+1 t= 2n+2 node begins transmission hence probability independent events occur simultaneously formula_10 throughput throughput intended mean probability successful transmission minimum possible period therefore throughput pure aloha formula_6 suppose: 1 n nodes attempt send data time t. 2 probability successful transmission one node formula_12 probability successful transmission like following formula_13 similarly slotted aloha frame successfully transmitted exactly one node begin transmission beginning particular time slot equal frame time probability one node begin particular time slot formula_14 throughput slotted aloha thus formula_15 disadvantages pure aloha 1 time wasted 2 data lost improvement original aloha protocol slotted aloha introduced discrete timeslots increased maximum throughput station start transmission beginning timeslot thus collisions reduced case transmission-attempts within 1 frame-time 2 consecutive frame-times need considered since collisions occur timeslot thus probability zero transmission-attempts stations single timeslot formula_16 probability transmission requiring exactly k attempts k-1 collisions 1 success formula_17 throughput formula_18 maximum throughput 1/e frames per frame-time reached g 1 approximately 0.368 frames per frame-time 36.8 slotted aloha used low-data-rate tactical satellite communications networks military forces subscriber-based satellite communications networks mobile telephony call setup set-top box communications contactless rfid technologies use random-access channel alohanet led development carrier sense multiple access csma listen send random-access protocol used nodes send receive channel first implementation csma ethernet csma radio channels extensively modeled ax.25 packet radio protocol based csma approach collision recovery based experience gained alohanet aloha random-access protocols inherent variability throughput delay performance characteristics reason applications need highly deterministic load behavior sometimes used polling token-passing schemes token ring instead contention systems instance arcnet popular embedded data applications 1980 network two fundamental choices dictated much alohanet design two-channel star configuration network use random accessing user transmissions two-channel configuration primarily chosen allow efficient transmission relatively dense total traffic stream returned users central time-sharing computer additional reason star configuration desire centralize many communication functions possible central network node menehune minimizing cost original all-hardware terminal control unit tcu user node random-access channel communication users menehune designed specifically traffic characteristics interactive computing conventional communication system user might assigned portion channel either frequency-division multiple access fdma time-division multiple access tdma basis since well known time-sharing systems circa 1970 computer user data bursty fixed assignments generally wasteful bandwidth high peak-to-average data rates characterize traffic achieve efficient use bandwidth bursty traffic alohanet developed random-access packet switching method come known pure aloha channel approach effectively dynamically allocates bandwidth immediately user data send using acknowledgment/retransmission mechanism described earlier deal occasional access collisions average channel loading must kept 10 maintain low collision rate still results better bandwidth efficiency fixed allocations used bursty traffic context two 100 khz channels experimental uhf band used implemented system one user-to-computer random-access channel one computer-to-user broadcast channel system configured star network allowing central node receive transmissions random-access channel user tcus received transmission made central node broadcast channel transmissions made bursts 9600 bit/s data control information encapsulated packets packet consisted 32-bit header 16-bit header parity check word followed 80 bytes data 16-bit parity check word data header contained address information identifying particular user menehune broadcast packet intended user node would accept central node communications processor hp 2100 minicomputer called menehune hawaiian language word imp dwarf people named similar role original arpanet interface message processor imp deployed time original system menehune forwarded correctly received user data uh central computer ibm system 360/65 time-sharing system outgoing messages 360 converted packets menehune queued broadcast remote users data rate 9600 bit/s unlike half-duplex radios user tcus menehune interfaced radio channels full-duplex radio equipment original user interface developed system all-hardware unit called alohanet terminal control unit tcu sole piece equipment necessary connect terminal aloha channel tcu composed uhf antenna transceiver modem buffer control unit buffer designed full line length 80 characters allowed handling 40- 80-character fixed-length packets defined system typical user terminal original system consisted teletype model 33 dumb crt user terminal connected tcu using standard rs-232c interface shortly original aloha network went operation tcu redesigned one first intel microprocessors resulting upgrade called pcu programmable control unit additional basic functions performed tcu pcu generation cyclic-parity-check code vector decoding received packets packet error-detection purposes generation packet retransmissions using simple random interval generator acknowledgment received menehune prescribed number automatic retransmissions flashing light used indicator human user also since tcu pcu send acknowledgments menehune steady warning light displayed human user error detected received packet thus seen considerable simplification incorporated initial design tcu well pcu making use fact interfacing human user network later versions system simple radio relays placed operation connect main network island oahu islands hawaii menehune routing capabilities expanded allow user nodes exchange packets user nodes arpanet experimental satellite network details available technical reports listed reading section
[ 7052, 1618, 6071, 4294, 823, 5387, 7824, 5492, 3724, 2061, 1974, 4093, 3064, 1988, 6687 ]
Test
824
3
Gradiente_Expert:gradiente expert expert made gradiente eletrônica date best known game console hi-fi equipment company second last msx home computer launched brazilian market mid-1980s presented public 5th international computing fair nicknamed informatica '85 event took place anhembi exhibition center city são paulo september 23 29 1985 announcement computer priced 65 ortn s. market release date 1 december 1985 one week epcom hotbit time 1985 christmas massive media campaign magazines newspapers tv newspapers ads initial offer price cr 4.640.000,00 us 493,62 usd value time us 1150 modern u.s. dollars 2019 machine clone national cf-3000 computer case resembling stereo system detached keyboard proprietary connector caps lock led reset key although soft-reset could achieved pushing either cartridge slot covers expert xp-800 followed expert gpc-1 gradiente personal computer 1987 expert plus expert dd plus system built-in 720 kb 3½ floppy disk drive 1989 expert users waited msx2 machine gradiente never produced discontinued msx line 1990 two first versions graphite case socketed chips caused chronic problem machine heated chips frequently pulled system froze also gpc-1 released 1987 rom slightly modified solve ascii table compatibility issue popular brazilian msx sharp hotbit last two versions black case problematic socketed chips replaced asic nevertheless ram mapped secondary slot although straight msx standards caused lot crashes programs searched memory wrong place contribute popularity plus versions
[ 768, 5298, 5571, 1237, 974 ]
Test
825
7
Peer-to-peer_SIP:peer-to-peer sip peer-to-peer sip p2p-sip implementation distributed voice internet protocol voip instant messaging communications application using peer-to-peer p2p architecture session control communication end points facilitated session initiation protocol sip pure peer-to-peer application architecture central servers required whereas traditional sip telephony networks relied using centrally deployed managed sip servers analogy centralized switching architecture public switched telephone network pstn p2p application design improve scalability survivability event central network outages session initiation protocol principle client-server protocol however described analogy p2p relationship called dialog defined unique combination sip protocol parameters to-tag from-tag call-id endpoints communication session implement user-agent server user-agent client enables two user agents communicate directly one another without mediation another central switching system sip also provides facilities registering register request network location user agent sip elements subscription subscribe request notification notify request features event tracking user agents based inherent sip features possible construct peer-to-peer network sip nodes another approach sip p2p sip location service replaced conventional p2p overlay networking approach oversim framework model overlay network used service node discovery rendezvous search key mechanism uniform resource identifier uri user agent uri requires resolution particular device uniform resource locator url must performed real time p2p-sip systems may employ structured peer-to-peer approaches well unstructured peer-to-peer architectures internet engineering task force ietf conducting working group p2psip develops standards-track specifications p2p-sip effort based using resource location discovery reload base protocol peer-to-peer p2p signaling protocol use internet p2p signaling protocol provides network nodes form overlay network abstract storage messaging security services
[ 6025, 7170 ]
Validation
826
7
Bring_your_own_encryption:bring encryption bring encryption byoe —also called bring key byok —refers cloud computing security marketing model purports help cloud service customers use encryption software manage encryption keys byoe allows cloud service customers use virtualized example encryption software together business applications hosting cloud order encrypt data business applications hosted set data processed encryption software writes ciphertext version data cloud service provider physical data store readily decrypts ciphertext data upon retrieval requests gives enterprise perceived control keys producing master key relying internal hardware security modules hsm transmitted hsm within cloud data owners may believe data secured master key lies enterprise hsm cloud service provider data longer needed i.e cloud users choose abandon cloud service keys simply deleted practice called crypto-shredding
[ 6326, 2566 ]
Train
827
3
Reliable_multicast:reliable multicast reliable multicast protocol computer networking protocol provides reliable sequence packets multiple recipients simultaneously making suitable applications multi-receiver file transfer multicast network addressing method delivery information group destinations simultaneously using efficient strategy deliver messages link network creating copies links multiple destinations split typically network switches routers however like user datagram protocol multicast guarantee delivery message stream messages may dropped delivered multiple times delivered order reliable multicast protocol adds ability receivers detect lost and/or out-of-order messages take corrective action similar principle tcp resulting gap-free in-order message stream exact meaning reliability depends specific protocol instance minimal definition reliable multicast eventual delivery data group members without enforcing particular delivery order however reliable multicast protocols ensure level reliability many trade efficiency reliability different ways example tcp makes sender responsible transmission reliability multicast nak-based protocols shift responsibility receivers sender never knows sure receivers fact received data rfc- 2887 explores design space bulk data transfer brief discussion various issues hints possible different meanings reliable reliable group data delivery rgdd form multicasting object moved single source fixed set receivers known transmission begins variety applications may need delivery hadoop distributed file system hdfs replicates chunk data two additional times specific servers vm replication multiple servers may required scale applications data replication multiple servers may necessary load balancing allowing multiple servers serve data local cached copies delivery frequent within datacenters due plethora servers communicating running highly distributed applications rgdd may also occur across datacenters sometimes referred inter-datacenter point multipoint p2mp transfers transfers deliver huge volumes data one datacenter multiple datacenters various applications search engines distribute search index updates periodically e.g every 24 hours social media applications push new content many cache locations across world e.g youtube facebook backup services make several geographically dispersed copies increased fault tolerance maximize bandwidth utilization reduce completion times bulk transfers variety techniques proposed selection multicast forwarding trees modern systems like spread toolkit quicksilver corosync achieve data rates 10,000 multicasts per second scale large networks huge numbers groups processes distributed computing platforms support one models example widely supported object-oriented corba platforms support transactions corba products support transactional replication one-copy-serializability model corba fault tolerant objects standard based virtual synchrony model virtual synchrony also used developing new york stock exchange fault-tolerance architecture french air traffic control system us navy aegis system ibm business process replication architecture websphere microsoft windows clustering architecture windows longhorn enterprise servers virtual synchrony first supported cornell university called isis toolkit cornell current version vsync released 2013 name isis2 name changed isis2 vsync 2015 wake terrorist attack paris extremist organization called isis periodic updates revisions since time current stable release v2.2.2020 released november 14 2015 v2.2.2048 release currently available beta form vsync aims massive data centers support cloud computing systems include horus system transis system totem system ibm system called phoenix distributed security key management system called rampart ensemble system quicksilver system openais project derivative corosync cluster engine number products including ibm microsoft ones mentioned earlier
[ 5143, 2961, 979, 7632, 7637, 3563, 3946, 7462 ]
Test
828
3
Cowloop:cowloop cowloop copy-on-write loop driver linux kernel driver allows read-only filesystems made writable using kernel module cowloop.ko cowloop worked writing modified blocks separate file known cowfile created using cowdev command associate block device cd writable file cowloop largely deprecated favor device-mapper snapshot target provides functionality also integrated lvm2 linux logical volume manager version 2 cowloop provided somewhat similar functionality unionfs newer aufs operates block level instead operating file system level free software released terms gnu general public license v2 later
[ 3599, 1561, 6892 ]
Test
829
7
Anaqua_(company):anaqua company anaqua boston based provider intellectual asset management iam saas software services anaqua ’ enterprise iam solution supports ia lifecycle idea monetization ia categories including inventions patents trade secrets brands trademarks anaqua express designed smaller ip teams anaqua element cloud-based solution ip professionals managing small portfolios anaqua essential helps law firms manage intellectual assets behalf clients anaqua formed 2004 bought beacon equity partners 2005 2006 anaqua received 4 million northstar global partners used relocate headquarters london boston hire staff 2010 anaqua merged sga2 iso 9000-certified supplier global patent annuity trademark renewal services 2013 beacon equity partners sold anaqua insight venture partners priya iyer joined anaqua chief operating officer 2005 became ceo 2007 anaqua merged lecorpio llc announced july 25 2017
[ 330 ]
Validation
830
3
MBC-550:mbc-550 mbc-550 small inexpensive personal computer pizza-box style featuring intel 8088 microprocessor running version ms-dos lowest-cost early ibm pc compatibles produced sanyo much better video display possibilities average cga card 8 colors 640x200 resolution vs cga 4 colors 320x200 2 colors 640x200 completely compatible ibm-pc lacked standard bios minimal bootloader rom accessed hardware directly load ram-based bios fm rather mfm diskette format used completely compatible ibm pc special software original pc pc/xt pc/at could read write diskettes software expecting standard 18.2 hz clock interrupt rewritten mbc-550 also computer choice nri training starting building computer nri promised would qualified service repair virtually every major brand computer advertised popular mechanics popular science throughout 1985 august 1985 infoworld reported sanyo initiated campaign sell mbc-550 inventory company newer computers executive claimed 99 pc compatible
[ 7467, 1052, 6380, 5571, 1237, 4277 ]
Test
831
9
Dart_(programming_language):dart programming language dart client-optimized programming language fast apps multiple platforms developed google used build mobile desktop backend web applications dart object-oriented class defined garbage-collected language using c-style syntax transcompiles optionally javascript supports interfaces mixins abstract classes reified generics static typing sound type system dart unveiled goto conference aarhus denmark october 10–12 2011 project founded lars bak kasper lund dart 1.0 released november 14th 2013 august 2018 dart 2.0 released language changes including sound type system ecma international formed technical committee tc52 work standardizing dart inasmuch dart compiled standard javascript works effectively modern browser ecma international approved dart language specification first edition july 2014 107th general assembly second edition december 2014 latest specification available dart language specification three main ways run dart code achieve concurrency dart uses isolates independent workers share memory instead use message passing similar erlang processes see also actor model every dart program uses least one isolate main isolate since dart 2 dart web platform longer supports isolates suggests developers use web workers instead snapshots core part dart vm snapshots files store objects runtime data google introduced flutter native mobile app development android ios flutter mobile app sdk complete framework widgets tools gives developers way build deploy mobile apps written dart flutter works firebase mobile app sdks open source dart sdk contains two dart-to-javascript compilers development dartdevc supports quick refresh cycles final version app dart2js produces deployable javascript first compiler generate javascript dart code dartc deprecated second dart-to-javascript compiler frog written dart never implemented full semantics language third dart-to-javascript compiler dart2js evolution earlier compilers dart2js written dart intended implement full dart language specification semantics march 28 2013 dart team posted update blog addressing dart code compiled javascript dart2js compiler stating runs faster handwritten javascript chrome v8 javascript engine deltablue benchmark november 18 2011 google released dart editor open-source program based eclipse components mac os x windows linux-based operating systems editor supports syntax highlighting code completion javascript compiling running web server dart applications debugging august 13 2012 google announced release eclipse plugin dart development april 18 2015 google announced dart editor would retired favor jetbrains integrated development environment ide recommended ide language dart plugin available intellij idea pycharm phpstorm webstorm plugin supports many features syntax highlighting code completion analysis refactoring debugging plugins available editors like sublime text atom emacs vim visual studio code 2013 chromium team began work open source chrome app-based development environment reusable library gui widgets codenamed spark project later renamed chrome dev editor built dart contained spark powered polymer june 2015 google transferred cde project github free software project ceased active investment cde april 2019 chrome dev editor longer active development dart team created dartpad start 2015 provide easier way start using dart fully online editor users experiment dart application programming interfaces apis run dart code provides syntax highlighting code analysis code completion documentation html css editing 2013 john mccutchan announced created performant interface single instruction multiple data simd instruction sets dart interface consists two types instances types immutable optimized code mapped directly simd registers operations expressed dart typically compiled one instruction overhead similar c c++ intrinsics benchmarks 4×4 matrix multiplication 3d vertex transformation mandelbrot set visualization show near 400 speedup compared scalar code written dart hello world example main function calculate nth fibonacci number int fib int n n 2 fib n 1 fib n 2 1 // fibonacci function implementation ternary operator dart // code shall read // int n 2 return fib n 1 fib n 2 // otherwise return int 1 result void main simple class // import math library get access sqrt function import 'dart math math // create class point class point // dart programs start main void main dart descendant algol language family alongside c java c javascript others method cascade syntax provides syntactic shortcut invoking several methods one another object adopted smalltalk dart mixins influenced strongtalk ruby dart makes use isolates concurrency security unit structuring applications isolate concept builds upon actor model famously implemented erlang mirror api performing controlled secure reflection first proposed paper gilad bracha member dart team david ungar originally implemented self dart initially mixed reception dart initiative criticized fragmenting web due original plans include dart vm chrome plans dropped focus instead compiling dart javascript
[ 2902, 1438, 4296, 5372, 6427, 6428, 4315, 2569, 4705, 3309, 7924, 2591, 7569, 5775, 6489, 6153, 2619, 5091, 6507, 3684, 4755, 5455, 4758, 4759, 6882, 4762, 7967, 7246, 6172, 6176, 109, 5117, 5476, 1177, 3368, 3719, 5141, 136, 2317, 2673, ...
Train
832
3
Soul_of_a_Robot:soul robot soul robot computer game sequel nonterraqueous zx spectrum amstrad cpc msx released mastertronic 1985 sometimes called nonterraqueous 2 attempt destroy rogue computer nonterraqueous failed computer threatens self-destruct old age taking planet nonterraqueous people planet create another robot one mind man kamikaze mission computer core must locate three keys allow transport next section self-destructing inside computer core gameplay rather different prequel nonterraqueous robot controlled player fly like previous game leaps rather like ordinary platform game however ability fly available game necessary complete robot still psyche value must allowed decrease zero decreases certain actions laser previous game also remains game considered much difficult prequel relying perfectly timed aimed jumps player able choose five strengths jump order progress enjoyed much less commercial success gameplay much slower jumps flying take lot time effort perform correctly also seems certain influence underwurlde gameplay sounds used game soul robot also much smaller game map containing third many individual screens prequel 256 rooms
[]
Test
833
8
Rewrite_engine:rewrite engine rewrite engine software component performs rewriting uniform resource locators modifying appearance modification called url rewriting way implementing url mapping routing within web application engine typically component web server web application framework rewritten urls sometimes known short pretty fancy urls search engine friendly sef urls slugs used provide shorter relevant-looking links web pages technique adds layer abstraction files used generate web page url presented outside world web sites dynamic content use urls generate pages server using query string parameters often rewritten resemble urls static pages site subdirectory hierarchy example url wiki page might rewritten blog might url encodes dates entry altered like also allows user change url see postings available december simply removing text encoding day '19 though navigating directory site pass specialized terms url search engine search term would allow users search directly browser example url entered browser location bar urlencoded browser makes http request server could rewrite several benefits using url rewriting however drawbacks well user wants modify url retrieve new data url rewriting may hinder construction custom queries due lack named variables example may difficult determine date following format case original query string useful since query variables indicated month day many web frameworks include url rewriting either directly extension modules software development perspective url rewriting aid code modularization control flow making useful feature modern web frameworks
[ 2291, 5151, 7390, 6931, 3135, 5820, 6024 ]
Validation
834
9
EICASLAB:eicaslab eicaslab software suite providing laboratory automatic control design time-series forecasting developed final output european acoduasis project ips-2001-42068 funded european community within innovation programme project lifetime aimed delivering robotic field scientific breakthrough new methodology automatic control design facilitate knowledge transfer eicaslab equipped “ automated algorithm code generation ” software engine allows obtain control algorithm algorithm even without deep knowledge theory methodology otherwise normally required traditional control design methodologies eicaslab actually adopted european research projects dealing robotics arflex ist-nmp2-016880 pisa project nmp2-ct-2006-026697 automotive hi-ceps project tip5-ct-2006-031373 ersec project fp7 247955 eicaslab used european industries research institutes academia design control systems time series forecasting documented scientific technical literature eicaslab includes tools modelling plants designing testing embedded control systems assisting phases design process control strategy system concept generation control software code final target eicaslab software suite composed main program called master able assist manage control design steps means set tools respectively eicaslab includes following features support system concept hardware architectures including multi-processors software architectures including multi-level hierarchical control considered control software subdivided functions allocated designer different processors control function sampling frequency time window execution scheduled designer means eicaslab scheduler data exchanged among control functions allocated processor among different processors belonging plant control system delay time data transmission considered final “ application software ” generated c subdivided files one related specific processor eicaslab includes specific working areas developing optimizing testing algorithms software related “ plant controller ” including “ automatic control ” “ trajectory generation ” disturbances acting plant perform task three different working areas available follows eicaslab includes following tools features support control algorithm design automatic algorithm generation tool starting “ plant simplified model ” control required performance generates control algorithm basis plant design data applied control design methodology allows design controllers guaranteed performance without requiring tuning field spite unavoidable uncertainty always exists mathematical model built basis plant design data plant actual performance fundamentals control presence uncertainty see designer choose among three control basic schemes one option selecting control algorithms different level complexity synthesis automatically generated control performed resultant three actions plant state observer task may extended estimate predict disturbance acting plant plant disturbance prediction compensation original control feature allows significant reduction control error model parameter identification tool allows identification appropriate values simplified model parameters recorded experimental data simulated trials performed using “ plant fine model ” parameter true value exist model approximated description plant parameter best value depends cost function adopted evaluate difference model plant identification method estimates best values simplified model parameters point view closed loop control design control parameter optimization tool performs control parameter tuning simulated environment optimization performed numerically predefined simulated trial given mission host command sequence disturbance acting plant potential event related plant performance given functional cost associated plant control performance eicaslab automatic code generation tool provides ansi c source code related control algorithm developed final result designer work “ application software ” ansi c debugged tested ready compiled linked plant control processors “ application software ” includes software related “ automatic control ” “ trajectory generation ” functions simulated control functions strictly one designer transfer field actual plant controller eicaslab includes following tools support control tuning slow motion view tool used phase setting plant control providing variable variable analysis control software performance experimental trials performed means actual plant plant input output host commands sent controller recorded experimental trials processed eicaslab follows recorded plant input output variables used plant area inside input output variables obtained plant simulation recorded host commands used control mission area inside host command generated control mission function simulated trial performed control function receives recorded outputs actual plant related recorded host commands inside simulated ones control function running eicaslab strictly one running actual plant controller commands resulting simulated control function sent simulated control simulated plant strictly recorded plant inputs unless numerical errors depending differences processor eicaslab running one used actual plant controller experience shown effects differences negligible recorded experimental trial performed actual plant controller completely repeated eicaslab difference process performed slow-motion useful step step using debugger program automatic code generation tool used insert controller code linux real-time operating system rtos two available versions namely linux rtai linux rt kernel preemption order test control algorithm pc environment instead final target hardware performing rapid control prototyping rcp tests eicaslab rcp includes real-time scheduler based multithreading programming techniques able run multi-core processor automatic code generation tool used insert controller code final hardware target performed operation hardware loop hil tests may performed consisting piloting – instead actual plant plant simulated eicaslab running pc suitable configured connected necessary hardware interfaces final hardware target
[ 1908, 5571, 7453, 578, 1435 ]
Test
835
4
Jump_server:jump server jump server jump host jumpbox computer network used access manage devices separate security zone common example managing host dmz trusted networks computers jump server hardened monitored device spans two dissimilar security zones provides controlled means access user access tightly controlled monitored 1990s co-location facilities became common need provide access dissimilar security zones jump server concept emerged meet need jump server would span two networks typically used conjunction proxy service socks provide access administrative desktop managed device ssh tunneling became common jump servers became de facto method access jump servers typically placed secure zone dmz provide transparent management devices dmz management session established jump server acts single audit point traffic also single place user accounts managed prospective administrator must log jump server order gain access dmz assets access logged later audit typical configuration hardened unix unix-like machine configured ssh local firewall administrator connects target machine dmz making ssh connection administrator personal computer jump server using ssh forwarding access target machine using ssh tunnel target host allows use insecure protocols manage servers without creating special firewall rules exposing traffic inside network typical configuration windows server running remote desktop services administrators connect isolates secure infrastructure configuration administrator workstation jump server potential risk network design several ways improving security jump server including high level risk jump server represent vpn may suitable higher security replacement
[ 7214, 6879, 7865, 3338, 4014, 3777 ]
Validation
836
6
StorNext_File_System:stornext file system stornext file system snfs colloquially referred stornext shared disk file system made quantum corporation stornext enables multiple windows linux apple workstations access shared block storage fibre channel network stornext file system installed computers read write storage volume time enabling known file-locking san stornext used environments large files must shared accessed simultaneously users without network delays file must available access multiple readers starting different times common use cases include multiple video editor environments feature film television general video post production original name stornext centravision file system cvfs created mountaingate imaging systems corporation provide fast data transfer windows sgi irix computers advanced digital information corporation acquired mountaingate september 1999 added additional client types changed name stornext file system first new clients solaris linux august 2006 quantum acquired adic stornext software hardware elements front end filesystem managed usually two metadata controllers primary failover metadata appliance mdc act traffic director block-level filesystem data-overhead typically associated nas configured network shares fibre channel connectivity key element stornext filesystem implementations often referred production san production storage workspace verticals oil gas infiniband connectivity sometimes used client systems required run operating system access shared filesystem containing stornext data january 2008 operating systems available client software microsoft windows macos xsan developed apple red hat linux suse linux hp-ux solaris aix irix client systems attached either directly san via ip gateway called dlc distributed lan controller two dlcs configured failover and/or load balancing dlc ip based protocol customized data traffic making efficient higher performance traditional nas environments users also used dlc infrastructure enable lower performance file sharing via nfs cifs using three capabilities customers create three tiers front-end client performance san native dlc nas leveraging common file sharing architecture quantum offers customers two choices hardware infrastructure stornext customized configurations using stornext software independently selected hardware use stornext appliances production systems set pre-configured solutions quantum said optimized particular use cases 4k editing latter solutions include embedded technical support common application television feature film post-production many multiple editors access set video data non-destructively stornext also leveraged high end motion geoscience imagery commercial public sector use cases high density forensic data cybersecurity colloquially stornext file system known 'stornext entire stornext product actually combination two technologies stornext file system optional stornext storage manager stornext storage manager policy based data management system copy migrate and/or archive data stornext file system variety storage devices multiple locations data tiered disk quantum lattus object store robotic tape library even exported offline vault regardless data resides maintained single namespace customers typically use capability three use cases media customers use storage manager policy tiering capability enable extension primary disk storage object storage high performance tape introduction lattus-m object storage 2013 quantum introduced capability archive data durably greater 11 9s disk high throughput lattus-m disk controller support 3 gbit/s single streaming performance video large files controllers scaled horizontally add performance required made combination stornext lattus-m attractive use cases rapid restore video motion imagery content distribution many customers also use storage manager create granular efficient data protection many versions policy-selected files copied second data location media without need time resource consuming 'file-walker avoiding pain backup finally administrators use storage manager hsm migrating data tiers particularly tape cost effective archive tapes created storage manager optionally written lto industry standard format ltfs enable easy interchange
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 4759, 460, 1534, 7976, 4406, 821, 7258, 1189, 5130, 1561, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5...
Test
837
0
Lexical_simplification:lexical simplification lexical simplification sub-task text simplification defined lexical substitution task reduce text complexity
[ 1314, 7138, 4037 ]
Test
838
1
4th_Dimension_(software):4th dimension software 4d 4th dimension silver surfer known early development relational database management system ide developed laurent ribardière 4d created 1984 slightly delayed public release macintosh 1987 programming language 4d product line since expanded sql back-end integrated compiler integration php several productivity plug-ins interfaces plug-ins created 4d include 4d write word processor 4d view somewhat like spreadsheet extra functionality 4d internet commands let add sorts internet related functionality database also 100 third-party plugins free commercial 4d also used web server run compiled database applications today 4d published french company 4d sas sales distribution support presence major markets united states united kingdom france primary markets product localized dozen languages including english french german japanese czech hebrew arabic korean persian silver surfer known early development developed laurent ribardière 1984 following negotiations ribardiere planned apple inc. formerly apple computer inc would publish software apple canceled plan reportedly due pressure potential database publishers claimed apple 'brand database 3rd party products would disadvantaged marketplace apple tried time ensure well known software publishers supported macintosh platform result project reverted laurent ribardière french businesswoman marylene delbourg-delphis published 4th dimension although independently published apple supported new venture used 4d extensively throughout organization projects including fitness center management cim computer integrated manufacturing number apple personnel became 4d experts including lance mcandrew apple cupertino headquarters andrew o'donoghue apple irish based european manufacturing headquarters 4th dimension application managed entire european service center administration next years 4th dimension installed base grew publisher aci established us-based subsidiary acius initially led guy kawasaki 16 years operating acius 2000 name officially changed 4d inc 1993 4d server v1.1 client/server version 4th dimension introduced along release 4th dimension v3.1 1995 4d v3.5 went cross-platform since supported microsoft windows apple macintosh operating systems 1997 4d v6 first version 4d contain fully integrated web server allowing developers translate 4d forms html fly using 4d language 2004 4d 2004 first version 4d allow developers create standalone client/server web service oriented applications soa without changing code 2008 4d v11 added sql layer 4d database engine extending native sql 4d programming language allowed 4d developers write native sql code connect either local remote servers 2010 4d v12 integrated ability execute php functions/scripts within 4d programming language version also supported new replication synchronization commands included 64 bit version 4d server 4d application run either standalone mode client-server mode standalone mode 4d application 4d.exe windows 4d.app mac used open structure file 4db/4dc file directly along associated data file 4dd client-server paradigm 4d server application 4dserver.exe windows 4dserver.app mac used open structure file 4db/4dc file directly along associated data file 4dd 4d may used remote mode connect 4d server 4d two applications 4d 4d server 4d server runs server 4d run either standalone remote mode 4d run two modes 4d single-user mode allows 1 person run application 4d remote mode used connecting 4d server 4d server used client-server connectivity application mode 4d server loads structure file 4db 4dc also datafile 4dd provides network access 4d remote workstation dynamically updated cache resources working 4d server maintains data code section include syntax examples demonstrating different programming constructs used 4d loops variable usage 4d fields variables expressions following data types info 4d data type found 4d data types documentation page local variables prefixed codice_1 like codice_2 live duration method process variables prefix like codice_3 live throughout duration process inter-process global variables prefixed codice_4 like codice_5 live throughout duration application use real integer long integer variables well inter-process process local variable counters lengthy repetitive loops especially compiled mode use local long integer variables example following example goes elements two-dimensional array following example builds array pointers date fields present database
[ 1361, 7814, 6029, 2866, 4759, 5571, 8189, 7248, 7341, 2870, 1435 ]
Test
839
2
DOS/360_and_successors:dos/360 successors disk operating system/360 also dos/360 simply dos discontinued operating system ibm mainframes announced ibm last day 1964 first delivered june 1966 time dos/360 widely used operating system world tos/360 tape operating system/360 dos called ibm operating system system/360 used early days around 1965 support system/360 model 30 similar platforms tos per tape name required tape drive shared code base manuals ibm dos/360 tos went 14 releases discontinued disks ibm 2311 ibm 2314 became affordable time system/360 whereas expensive luxury ibm 7090 dos/360 primary operating system small midsize s/360 installations dos/vs released 1972 first dos/vs release numbered release 28 signify incremental upgrade dos/360 added virtual memory support new system/370 series hardware used fixed page table mapped single address space 16 megabytes partitions combined dos/vs increased number partitions separate simultaneous programs three named background foreground 1 foreground 2 five bg f1 f4 allowed system wide total fifteen subtasks dos/vs succeeded dos/vse z/vse dos/vse introduced 1979 extended version dos/vs support new 4300 processors 4300 systems included feature called ecps vse provided single-level storage processor i/o channels dos/vse provided support ecps vse could also run system/370 without feature vse last free version dos ssx/vse small system executive attempt ibm simplify purchase installation vse providing pre-generated system containing os popular products ssx released 1982 later replaced vse/sp ssx sold ibm bundle 14 component products advanced functions/vse vse/power acf/vtame vse/vsam cics/dos/vs dos/vs sort/merge vse/iccf vse/occf vse/ipcs dos/cobol back up/restore space management vse/ditto originally would agree offer individual products separately via rpq although ibm later agreed add products individually price list pressure isvs claimed bundling violated antitrust laws 1986 ibm released vse/sp system product conjunction announcement 9370 processors vse/sp replaced ssx/vse bundled vse popular vse program products vse/af acf/vtam cics power/vs vse/sp supported 24-bit addresses despite customer requests provide xa 31 bit version vse/esa 31-bit dos/vse version released 1990 support 384 mb real storage provided twelve static partitions allowed vse/power acf/vtam run private address spaces introduced new feature called dynamic partitions could allow 150 concurrent jobs address space version 1 could run either esa 370 mode esa mode also supporting xa hardware limitations version 2 supported esa mode esa hardware ibm released z/vse 3.1 2005 change naming reflected new system z branding ibm mainframe product line represent fundamental change architecture vse/esa 2.7 preceded particular support new 64-bit z/architecture running 31-bit mode even 64-bit capable machines z/vse 4.1 released 2007 introduced support 64-bit real addressing 8 gb memory however parts supervisor run 64-bit mode provides 31-bit virtual address spaces problem state applications 2011 one estimate placed number sites using z/vse around 4000 developing new hardware generation unified system/360 s/360 computers ibm originally committed delivering single operating system os/360 also compatible low-end machines hardware already available os/360 project fell behind schedule described length fred brooks mythical man-month ibm forced quickly develop four additional systems os/360 finally released year late required least 64 kb memory dos designed use little memory could run 16 kb machines configuration available low-end s/360 model 30 unlike os/360 dos/360 initially single-job system support multitasking version multitasking supporting three memory partitions requiring 32 kb memory later released despite limitations dos/360 became widely used operating system processors less 256 kb memory system/360 hardware sold well dos/360 ran well system/360 processors medium-sized organizations could afford better operating systems customers dos/360 operating system filled time gap announcement system/360 availability intended operating system os/360 result delay number customers implemented dos systems committed significant investments run ibm expected dos/360 users would soon upgrade os/360 result investments reluctant commit conversion ibm needed continue offer dos/360 additional operating system hacker jargon file incorrectly states gecos also known gcos copied dos/360 case however xerox data systems xerox operating system xos intentionally similar dos simplify program porting dos/360 required system/360 cpu model 25 standard instruction set decimal floating-point instruction sets optional minimum memory requirement 16 kb storage protection required multiprogramming used 1052 model 7 printer-keyboard either selector multiplexor channel least one disk drive required — initially 2311 holding 7.25 mb card reader card punch line printer usually included magnetic tape drives could substituted typical configuration might consist s/360 model 30 32kb memory decimal instruction set ibm 2540 card reader/card punch ibm 1403 printer two three ibm 2311 disks two ibm 2415 magnetic tape drives 1052-7 console following description applies dos/360 except otherwise noted later versions offer additional functionality dos/360 designed run low-end models system/360 memory usage concern possible generate dos supervisor resident portion operating system small 5902 bytes detailed charts listed memory requirements sysgen option often little 100 bytes minimum system would leave 10 kb storage available single batch partition enough run utilities compilers except cobol pl/i full fortran iv keep memory usage small possible dos coded entirely assembly language reduce memory usage supervisor employed overlays called transients read one two reserved transient areas required two types transient routines called physical transients logical transients handled hardware exceptions provided program services open/close respectively transient module names began b sped loading storing names first directory often referred a-transients b-transients like system/360 operating software initial releases dos could run one program time later versions real dos able run three programs concurrently separate memory partitions supported hardware memory protection features scalable os/360 operating system identified bg background f1 foreground 1 f2 foreground 2 multiprogramming optional feature dos/360 selectable system generation dos-vs allowed seven concurrent programs although five six common number due smaller scale hardware usually hosting dos systems dos dos-vs allow number partitions set ipl initial program load ibm term boot load executable programs stored core image library running dos could reclaim space programs deleted replaced newer versions core image library became full compressed one utility programs could halt development work much half day many shops simply froze changes day compressed cil off-line ipled new core image library beginning business day relocatable library linkable object programs source statement library assembler macros include text also supported installations could define additional private relocatable source statement libraries disk volumes dos/360 set utility programs assembler compilers fortran cobol eventually pl/i supported range file organizations access methods help using sequential isam files could store either fixed-length variable-length records types could occupy one disk volume dos/360 also offered btam data communications facility primitive hard use later standards however btam could communicate almost type terminal big advantage time little standardization communications protocols simplicity api also allowed relatively easy interface external communications processors facilitated dos/360 machines becoming nodes multi-tier networks large organizations dos job control statements began card columns one two except end-of-job end-of-data comments description follows character represents single blank dos jcl designed parsing speed simplicity resulting positional syntax significantly cryptic os/360 keyword-driven job control early dos included spooling sub-system improve efficiency punched card line printer i/o late 1960s ibm aftermarket vendors began filling void ibm spooler option called power software design inc. independent software company sold spooler called grasp dos/360 relocating loader programmers link edit separate executable version program partition address space program likely run alternatively assembler-language programs could written self-relocating imposed additional complexity size penalty albeit small one large dos shops multiple machines multiple partition layouts often wrote relocating loader circumvent issue dos/360 application programming interface incompatible os/360 high level language programs written dos needed compiled linked could used os/360 minor differences compilers dos opposed os sometimes required modifications programs port direction however challenging since os/360 significantly features supported api use features would removed programs ported dos less problem programmers working high level languages cobol assembler programs hand tended utilize features often usually needed greater modification run dos
[ 4291, 4662, 4670, 5726, 7172, 3278, 5041, 7546, 5396, 402, 1855, 6838, 3664, 6849, 4366, 6497, 1516, 1522, 7605, 6511, 6518, 5481, 7264, 4421, 839, 4428, 5852, 6213, 850, 6957, 1994, 6249, 7331, 8066, 5571, 5932, 7003, 2769, 5244, 7024, ...
Test
840
7
Apache_Hive:apache hive apache hive data warehouse software project built top apache hadoop providing data query analysis hive gives sql-like interface query data stored various databases file systems integrate hadoop traditional sql queries must implemented mapreduce java api execute sql applications queries distributed data hive provides necessary sql abstraction integrate sql-like queries hiveql underlying java without need implement queries low-level java api since data warehousing applications work sql-based querying languages hive aids portability sql-based applications hadoop initially developed facebook apache hive used developed companies netflix financial industry regulatory authority finra amazon maintains software fork apache hive included amazon elastic mapreduce amazon web services apache hive supports analysis large datasets stored hadoop hdfs compatible file systems amazon s3 filesystem alluxio provides sql-like query language called hiveql schema read transparently converts queries mapreduce apache tez spark jobs three execution engines run hadoop resource negotiator yarn yet another resource negotiator accelerate queries provides indexes including bitmap indexes features hive include default hive stores metadata embedded apache derby database client/server databases like mysql optionally used first four file formats supported hive plain text sequence file optimized row columnar orc format rcfile apache parquet read via plugin versions later 0.10 natively starting 0.13 additional hive plugins support querying bitcoin blockchain major components hive architecture based sql hiveql strictly follow full sql-92 standard hiveql offers extensions sql including multitable inserts create table select offers basic support indexes hiveql lacked support transactions materialized views limited subquery support support insert update delete full acid functionality made available release 0.14 internally compiler translates hiveql statements directed acyclic graph mapreduce tez spark jobs submitted hadoop execution word count program counts number times word occurs input word count written hiveql brief explanation statements follows checks table codice_1 exists drops creates new table called codice_1 single column type codice_3 called codice_4 loads specified file directory case “ input_file ” table codice_5 specifies target table data loaded re-written otherwise data would appended query creates table called codice_6 two columns codice_7 codice_8 query draws input inner query query serves split input words different rows temporary table aliased codice_9 groups results based keys results codice_8 column holding number occurrences word codice_7 column sorts words alphabetically storage querying operations hive closely resemble traditional databases hive sql dialect lot differences structure working hive comparison relational databases differences mainly hive built top hadoop ecosystem comply restrictions hadoop mapreduce schema applied table traditional databases traditional databases table typically enforces schema data loaded table enables database make sure data entered follows representation table specified table definition design called schema write comparison hive verify data table schema write instead subsequently run time checks data read model called schema read two approaches advantages drawbacks checking data table schema load time adds extra overhead traditional databases take longer time load data quality checks performed data load time ensure data corrupt early detection corrupt data ensures early exception handling since tables forced match schema after/during data load better query time performance hive hand load data dynamically without schema check ensuring fast initial load drawback comparatively slower performance query time hive advantage schema available load time instead generated later dynamically transactions key operations traditional databases typical rdbms hive supports four properties transactions acid atomicity consistency isolation durability transactions hive introduced hive 0.13 limited partition level recent version hive 0.14 functions fully added support complete acid properties hive 0.14 later provides different row level transactions insert delete update enabling insert update delete transactions require setting appropriate values configuration properties codice_12 codice_13 codice_14 hive v0.7.0 added integration hadoop security hadoop began using kerberos authorization support provide security kerberos allows mutual authentication client server system client ’ request ticket passed along request previous versions hadoop several issues users able spoof username setting codice_15 property also mapreduce operations run user hadoop mapred hive v0.7.0 ’ integration hadoop security issues largely fixed tasktracker jobs run user launched username longer spoofed setting codice_15 property permissions newly created files hive dictated hdfs hadoop distributed file system authorization model uses three entities user group others three permissions read write execute default permissions newly created files set changing umask value hive configuration variable codice_17
[ 6506, 7238, 894, 4303, 1730, 5728, 7805, 1361, 2741, 7444, 7896, 6628, 917, 5571, 5228, 3463, 3542, 3204, 1286, 744, 5141, 5054, 6821, 3031, 1392, 5408, 7838, 3558, 5677, 7924, 3479, 5064, 1491, 4261, 5863, 6387, 5075, 517, 6137, 7488, ...
Test
841
9
Edge_Side_Includes:edge side includes edge side includes esi small markup language edge level dynamic web content assembly purpose esi tackle problem web infrastructure scaling application edge computing fairly common websites generated content could changing content like catalogs forums personalization creates problem caching systems overcome problem group companies akamai art technology group bea systems circadence corporation digital island inc. interwoven inc. open market whose esi-related technology owned fatwire software oracle corporation vignette corporation developed esi specification submitted w3c approval proposal editor mark nottingham esi language specification 1.0 submitted world wide web consortium w3c approval august 2001 w3c acknowledged receipt accepted proposal esi implemented content delivery networks akamai caching proxy servers varnish squid mongrel esi although many implement complete specification akamai also adds additional features version support esi element tags inserted html text based content creation instead displayed viewers esi tags directives instruct esi processor take action xml based esi tags indicate edge-side processing agent action needs taken complete page assembly one simple example esi element include tag used include content external page esi include tag placed in-line within html document would look like case esi processor would retrieve src url failing alt url failed nothing esi system usually caching proxy server may local copy files insert without going back server alternatively whole page esi tags may cached esi requests may made origin server allows different caching times different parts page different degrees personalisation four main features esi main alternatives esi
[ 7232, 2371, 2442, 6703, 3338, 108, 87 ]
Validation
842
7
Mendix:mendix mendix low-code software platform provides tools build test deploy iterate applications company founded 2005 1 august 2018 company ceo announced acquisition mendix siemens 730 million cash acquisition made official 1 october 2018 company founded rotterdam netherlands 2005 moved headquarters united states early 2012 october 2011 mendix raised 13 million first round venture capital funding funding led prime ventures additional participation henq invest provided unnamed sum 2006 january 2014 mendix closed 25 million series b led battery ventures company also reported triple-digit growth fifth consecutive year also 2014 mendix accelerated plans associated partner ecosystem company announced 20 new partners worldwide including bodhtree ust global pegamento pariveda solutions list complements company existing partner network including accenture capgemini among others subsequent partner additions included bizzomate mphasis blue box sogeti hp pivotal mendix also announced membership cloud foundry foundation company plans help evolve open source standard well integrate cloud foundry platform-as-a-service paas framework rapid app platform-as-a-service apaas mendix received number mentions recently forbes – listing mendix one top ten companies disrupting industries technology – always network – including mendix within top 100 onmobile private companies mendix application platform based visual model-driven software development request mendix qsm research made independent benchmark product compared average software projects qsm industry database according report mendix required smaller teams shorter projects reduced development effort respect average company offers free software community edition mendix application development tools company simultaneously announced new cloud ecosystem teams business analysts partners recently mendix announced enhancements mendix platform multi-channel app development mobile application development mendix app store also offers new widgets access native device functions contacts camera geolocation bar code scanner company also released mendix developer app test mobile apps developers scan qr code pair target devices development environments test native device functionality december 2014 mendix cited leader forrester wave enterprise public cloud platforms rapid developers q4 2014 report gartner also listed mendix visionary within 2015 magic quadrant enterprise application platforms service mendix announced reseller agreement sap sap resell mendix platform name sap cloud platform rapid application development mendix
[ 4211, 5894, 3764, 4217, 2988, 7613, 370, 632, 189, 289, 1634, 3091, 6262, 7165, 3954, 7722, 3958, 6806, 22, 1550, 5927, 2212, 6906, 5135, 7741, 320, 1757, 3028, 5940, 2317, 7838, 2866, 3309, 754, 5064, 330, 7114, 4627, 2961, 2430, 4636,...
Validation
843
4
Clark–Wilson_model:clark–wilson model clark–wilson integrity model provides foundation specifying analyzing integrity policy computing system model primarily concerned formalizing notion information integrity information integrity maintained preventing corruption data items system due either error malicious intent integrity policy describes data items system kept valid one state system next specifies capabilities various principals system model defines enforcement rules certification rules model described 1987 paper comparison commercial military computer security policies david d. clark david r. wilson paper develops model way formalize notion information integrity especially compared requirements multilevel security mls systems described orange book clark wilson argue existing integrity models biba read-up/write-down better suited enforcing data integrity rather information confidentiality biba models clearly useful example banking classification systems prevent untrusted modification information tainting information higher classification levels respectively contrast clark–wilson clearly applicable business industry processes integrity information content paramount level classification although authors stress three models obviously use government industry organizations according stewart chapple cissp study guide sixth edition clark-wilson model uses multi-faceted approach order enforce data integrity instead defining formal state machine model defines data item allows modifications small set programs model uses three-part relationship subject/program/object program interchangeable transaction known triple access control triple within relationship subjects direct access objects objects accessed programs look see differs access control models model ’ enforcement certification rules define data items processes provide basis integrity policy core model based notion transaction model contains number basic constructs represent data items processes operate data items key data type clark–wilson model constrained data item cdi integrity verification procedure ivp ensures cdis system valid certain state transactions enforce integrity policy represented transformation procedures tps tp takes input cdi unconstrained data item udi produces cdi tp must transition system one valid state another valid state udis represent system input provided user adversary tp must guarantee via certification transforms possible values udi “ safe ” cdi heart model notion relationship authenticated principal i.e. user set programs i.e. tps operate set data items e.g. udis cdis components relation taken together referred clark–wilson triple model must also ensure different entities responsible manipulating relationships principals transactions data items short example user capable certifying creating relation able execute programs specified relation model consists two sets rules certification rules c enforcement rules e nine rules ensure external internal integrity data items paraphrase since must make sure tps certified operate particular cdi must e1 e2 requires keeping track triples user tp cdis called allowed relations need authentication keep track information enters system need trusted constrained i.e udi must deal appropriately finally prevent people gaining access changing qualifications tp variant clark-wilson cw-lite model relaxes original requirement formal verification tp semantics semantic verification deferred separate model general formal proof tools
[ 2384, 2879, 8010, 2615, 7090 ]
Test
844
3
Molecule_Man_(video_game):molecule man video game molecule man isometric 3d arcade adventure game released mastertronic 1986 variety 8-bit home computers level editor included enables player design mazes molecule man trapped radioactive maze must reach escape teleport radiation kills player controls molecule man quest escape within time limit must find teleport repair using 16 circuit board pieces scattered around maze bombs must purchased blow open inaccessible areas meanwhile radiation killing health pills must purchased prolong life coins found lying around must collected taken dispensers purchase bombs pills
[ 4060 ]
Validation
845
1
World_Checklist_of_Selected_Plant_Families:world checklist selected plant families world checklist selected plant families usually abbreviated wcsp international collaborative programme provides latest peer reviewed published opinions accepted scientific names synonyms selected plant families maintained royal botanic gardens kew available online allowing searches names families genera species well ability create checklists project traces history work done 1990s kew researcher rafaël govaerts checklist genus quercus influenced global strategy plant conservation project expanded 173 families seed plants included coverage monocotyledon families complete families added complementary project called international plant names index ipni kew also involved ipni aims provide details publication aim determine accepted species names delay year newly published names automatically added ipni wcsp wcsp also one underlying databases plant list created kew missouri botanical garden unveiled 2010
[ 394, 7336, 4602 ]
Test
846
3
Keystone_Kapers:keystone kapers keystone kapers video game published activision atari 2600 april 1983 later ported atari 5200 atari 8-bit family colecovision 1984 msx inspired mack sennett slapstick keystone cops series silent films object game officer keystone kelly player catch harry hooligan escape department store keystone kapers written activision designer garry kitchen game takes place side-view display three-story department store roof store eight times wider portion main display screen scrolls left right player reaches edges movement levels accomplished escalators located alternating ends map elevator center mini-map bottom screen provides overall view store location players player controls officer keystone kelly joystick used run right left along given floor reaches escalator taken next floor kelly also use elevator center map move requires careful timing moves kelly begins game lower right first floor normally begins running left reach escalator second floor harry hooligan starts game center second floor immediately begins running right attempt reach elevator third floor hooligan continues moving floors attempt reach roof via escalator left side third floor succeeds escapes trip takes 50 seconds timer top screen counts remaining time kelly runs significantly faster hooligan normally catch time straight run penalties kelly also use elevator get levels moves ahead hooligan hooligan reverse direction start back store aided ability jump levels either end map something kelly means kelly use elevators carefully risk stuck higher floor timer runs slowing kelly progress number still moving obstacles like radios beach balls shopping carts others jump duck pushing joystick touching objects causes nine-second penalty later levels flying toy biplanes cause player lose life upon contact game begins player given three lives one lost every round hooligan remains uncaught timer runs game proceeds rounds player runs lives extra lives awarded every 10,000 points maximum three kelly catches harry player score points based amount time left levels 1-9 player score left clock multiplied 100 points levels 10-15 amount left clock multiplied 200 points afterwards amount left clock multiplied 300 points kelly also pick suitcases bags money 50 points early video games end game level gets progressively harder adding and/or faster hazards kelly loses lives atari 2600 version keystone kapers received certificate merit category 1984 videogame year less 16k rom 5th annual arkie awards antic called atari 8-bit computer version perfect game anyone remarked superb animation deseret news gave colecovision version keystone kapers 3 stars praised game graphical improvement original
[]
Validation
847
6
Microsoft_basic_data_partition:microsoft basic data partition microsoft operating systems using basic disk partitioned guid partition table gpt layout basic data partition bdp partition identified globally unique identifier guid ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 gpt scheme bdps partition types windows xp 64-bit mount normally assign drive letters according microsoft basic data partition equivalent master boot record mbr partition types 0x06 fat16b 0x07 ntfs exfat 0x0b fat32 practice equivalent 0x01 fat12 0x04 fat16 0x0c fat32 logical block addressing 0x0e fat16 logical block addressing types well basic data partition formatted filesystem although commonly bdps formatted ntfs exfat fat32 filesystems programatically determine filesystem bdp contains microsoft specifies one inspect bios parameter block contained bdp volume boot record microsoft operating system converts gpt-partitioned basic disk dynamic disk bdps combined converted single logical disk manager data partition identified guid af9b60a0-1431-4f62-bc68-3311714a69ad analogous conversion partition types 0x01 0x04 0x06 0x07 0x0b 0x0c 0x0e partition type 0x42 mbr partitioned disks linux used partition type guid basic data partition windows prior introduction linux specific data partition guid 0fc63daf-8483-4772-8e79-3d69d8477de4
[ 1254, 5571, 1534, 6131, 2710, 4941 ]
Test
848
4
OpenVAS:openvas openvas open vulnerability assessment system originally known gnessus software framework several services tools offering vulnerability scanning vulnerability management openvas products free software components licensed gnu general public license gpl plugins openvas written nessus attack scripting language nasl openvas began name gnessus fork previously open source nessus scanning tool developers tenable network security changed proprietary closed source license october 2005 openvas originally proposed pentesters securityspace discussed pentesters portcullis computer security announced tim brown slashdot openvas member project software public interest daily updated feed network vulnerability tests nvts 47,000 total june 2016 openvas protocol structure aims well-documented assist developers openvas compendium publication openvas project delivers documentation openvas
[ 3932, 3088, 4590, 1461, 5571, 5929, 1942, 5577, 5051, 6220, 5956, 5780, 3915, 5787, 1435 ]
Test
849
7
Huddle_(software):huddle software huddle privately held cloud-based collaboration software company founded london 2006 alastair mitchell andy mcloughlin company co-headquartered london san francisco additional offices washington d.c. new york city company raised approximately 40 million three funding rounds jafco ventures eden ventures matrix partners angel investors august 2017 huddle acquired turn/river capital san francisco-based private equity firm huddle used department energy climate change charity barnardo ’ september 12 2013 huddle announced desktop integrations huddle mac huddle windows huddle outlook launch huddle note followed december 2013 enabling simple content creation cloud along redesigned ios app huddle office integration launched following year 2013 company received award “ emerging star year ” uk tech awards 2013 supplier year accolade computer weekly ’ european user awards enterprise software company ’ ceo alastair mitchell selected one computer weekly ’ “ ten rising stars ” publication ’ cw tech 50 awards 2014 huddle announced secured global enterprise-wide agreement grant thornton make secure cloud collaboration technology available member firms across globe addition williams lea global business process outsourcing bpo company signed enterprise-wide agreement huddle adding suite online tools increase speed collaborates internally externally huddle used 80 central uk government departments including ministry justice moj department environment food rural affairs defra department energy climate change department business innovation skills bis end august 2014 huddle secured 206 contracts via g-cloud framework september 12 2012 huddle announced fisma-certified instance cloud-based content collaboration platform developed u.s. government agencies organizations result strategic partnership technology development agreement in-q-tel non-profit strategic investment firm identifies innovative technology solutions support missions u.s. intelligence community instance cloud collaboration services enables u.s. government community securely discover access work content people technology currently developed two iqt customer agencies department homeland security science technology directorate national geospatial-intelligence agency
[]
Validation
850
2
UNIX_System_Services:unix system services unix system services uss required included component z/os uss certified unix operating system implementation xpg4 unix 95 optimized mainframe architecture first unix 95 derived source code integration rest z/os additional time sharing option tso commands available alongside usual unix services making possible process unix files using ispf extensions jcl make possible use files batch processing unix system services allows unix applications platforms run ibm system z mainframes running z/os many cases recompile necessary although additional effort may advisable z/os integration smp/e installation support uss supports ascii unicode technical requirement modify ascii unicode unix applications many z/os users often prefer ebcdic support applications including running uss consequently uss provides application administrator services converting to/from ebcdic programs running uss full secure access internal functions z/os database access db2 via call attach one example uss access services found elsewhere z/os naturally programs ported non-mainframe platforms without rewriting use z/os-specific services conversely program adheres unix standards posix ansi c easier move different unix operating systems including z/os unix file systems uss older hfs preferred zfs support unix-style long filenames appear special vsam datasets rest z/os numerous core z/os subsystems applications rely unix system services including z/os management facility xml parsing generation services openssh ibm http server z/os z/os sdk java z/os pki services examples uss also provides shell environment omvs uss predecessor operating system component called openedition mvs first implemented mvs/esa 4.3 enhanced mvs/esa 5.1 openedition mvs supported posix standards ibm continues enhance unix system services 2007 ibm announced z/os 1.9 includes several new uss features including partial alignment newer single unix specification version 3 unix 03 typically every release z/os includes enhancements uss
[ 2717, 7605, 4478, 630, 6518, 5726, 8173, 5116, 299, 5481, 5571, 5041, 6359, 7546, 5396, 7003, 3874, 402, 839, 4428, 5244, 607, 2431, 6849, 4366, 2438, 1516, 1994 ]
Validation
851
9
Bjarne_Stroustrup:bjarne stroustrup bjarne stroustrup born 30 december 1950 danish computer scientist notable creation development c++ programming language visiting professor columbia university works morgan stanley managing director new york stroustrup master degree mathematics computer science 1975 aarhus university denmark phd computer science 1979 university cambridge england supervised david wheeler stroustrup began developing c++ 1979 called c classes words invented c++ wrote early definitions produced first implementation ... chose formulated design criteria c++ designed major facilities responsible processing extension proposals c++ standards committee stroustrup also wrote textbook language c++ programming language stroustrup head bell labs large-scale programming research department creation late 2002 stroustrup elected member national academy engineering 2004 elected fellow association computing machinery acm 1994 institute electrical electronics engineers ieee 2002 2014 stroustrup college engineering chair computer science professor texas university january 2014 stroustrup managing director technology division morgan stanley new york city visiting professor computer science columbia university stroustrup written co-written number publications including books tour c++ programming principles practice using c++ c++ programming language design evolution c++ annotated c++ reference manual stroustrup noble doctor itmo university since 2013 stroustrup senior dahl–nygaard prize 2015 year made fellow computer history museum invention c++ programming language 2017 institution engineering technology iet awarded faraday medal pioneering c++ one influential programming languages history computing january 3 2018 stroustrup announced 2018 winner charles stark draper prize engineering comes 500,000 named winner 2018 computer pioneer award ieee computer society awarded honorary doctor university carlos iii spain 25 january 2019
[ 3166, 3509, 6977, 6263, 908, 2740, 26, 6285, 5844, 2315, 7382, 1116, 7758, 5082, 5784, 615, 1243, 5621, 270, 1435 ]
Test
852
3
Upper_memory_area:upper memory area dos memory management upper memory area uma refers memory addresses 640 kb 1024 kb 0xa0000–0xfffff ibm pc compatible ibm reserved uppermost 384 kb 8088 cpu 1024 kb address space rom ram peripherals memory-mapped input/output example monochrome video memory area runs 704 736 kb 0xb0000–b7fff however even video ram rom bios i/o ports expansion cards much 384 kb address space unused 640 kb memory restriction became ever obstacle techniques found fill empty areas ram areas referred upper memory blocks umbs next stage evolution dos operating system use upper memory blocks umbs high memory area hma occurred release dr dos 5.0 1990 dr dos built-in memory manager emm386.exe could perform basic functionality qemm comparable programs advantage dr dos 5.0 combination older dos plus qemm dr dos kernel almost data structures could loaded high memory left virtually base memory free allowing configurations 620 kb 640 kb free configuration automatic free umbs identified hand manually included line loaded emm386 config.sys drivers manually loaded umbs config.sys autoexec.bat configuration trivial process largely automated installation program qemm program survived market indeed worked well dr dos hma umb support went one best-selling utilities pc functionality copied microsoft release ms-dos 5.0 june 1991 eventually even dos data structures moved conventional memory allowing 631 kb 640 kb left free starting version 6.0 ms-dos microsoft even included program called memmaker used automatically optimize conventional memory moving tsr programs upper memory period early 1990s manual optimization dos memory map became highly prized skill allowing largest applications run even complex pc configurations technique first create many umbs possible including remapping allocated unused blocks memory monochrome display area colour machines dos many subcomponents loaded umbs correct sequence use blocks memory efficiently possible tsr programs required additional memory loading freed loading complete fortunately dependencies amongst modules possible load almost sequence exceptions successfully cache cd-roms disk caches loaded cd-rom drivers modules network stacks loaded certain sequence essentially working progressively layers osi model basic yet effective method used optimize conventional memory load himem.sys device thereafter loading emm386.exe device ram auto option allows access uma loading device drivers devicehigh method effectively loads fundamental memory managers conventional memory thereafter everything else uma conventional memory glutton programs mscdex could also loaded uma similar fashion hence freeing large amount conventional memory increasing popularity windows 3.0 made necessity upper memory area less relevant windows applications directly affected dos base memory limits dos programs running windows windows acting multitasking manager still thus constrained release windows 95 became less relevant still version windows provides much functionality dos device drivers dos applications running windows cd network sound support memory map win95 dos boxes automatically optimised however dos programs could execute environment specifically programs tried directly switch real mode protected mode would work allowed virtual 8086 mode running point addressed x86 virtualization technologies intel vt-x vanderpool amd-v pacifica also programs tried making switch using virtual control program interface vcpi api introduced allow dos programs needed protected mode enter virtual 8086 mode set memory manager described n't work windows 95 dos protected mode interface dpmi api switching protected mode supported upper memory blocks created mapping extended memory upper memory area running virtual x86 mode similar expanded memory emulated using extended memory method providing upper memory blocks usually provided expanded memory manager example emm386 application programming interface managing upper memory blocks specified extended memory specification many systems including modern ones possible use memory reserved shadowing expansion card rom upper memory many chipsets reserve 384 kb ram purpose since ram generally unused may used real mode upper memory custom device driver umbpci ibm xt computers possible add memory motherboard use custom address decoder prom make appear upper memory area 386-based upper memory described extra ram could used load tsr files ram disk allcard add-on memory management unit xt-class computers allowed normal memory mapped 0xa0000-effff address range giving 952 kb dos programs programs lotus 1-2-3 accessed video memory directly needed patched handle memory layout therefore 640 kb barrier removed cost software compatibility usage upper memory area different using upper memory blocks used free conventional memory moving device drivers tsrs upper 384 kb 1 mb address space left amount addressable memory 640 kb intact
[ 3431, 1052, 4827, 5784, 6380, 1237, 5743, 126, 3905, 858 ]
Test
853
7
MRI_Software:mri software mri software llc provider real estate investment management software real estate owners investors operators company founded 1971 name management reports incorporated later known management reports international acquired intuit 2002 intuit real estate solutions ires 2009 private equity firm based san francisco vista equity partners acquired ires renamed company mri software 2015 mri software acquired private equity firm gi partners 2017 mri received additional strategic investment ta associates mri software headquartered solon ohio total ten offices north america company six offices emea region four apac including hong kong singapore mri software offers property management accounting software multi-family residential commercial property retail office corporate real estate applications
[ 2961 ]
Test
854
7
ShareFile:sharefile sharefile secure content collaboration file sharing sync solution supports document-centric tasks workflow needs small large businesses company also offers cloud-based/on-prem storage virtual data rooms client portals sharefile owned citrix systems jesse lipson self-taught programmer built launched sharefile november 2005 raleigh north carolina lipson created sharefile several website design clients asked build password-protected area could set folders exchange business files clients felt ftp sites time insufficient saw opportunity create web-based product sharefile launched without free version outside funding focused acquiring business customers 2011 sharefile 3 million users 100 countries sharefile included inc. 500 list fastest growing private companies 2010 2011 october 2011 sharefile acquired citrix systems terms agreement sharefile offered standalone service addition software becoming integrated citrix products acquisition lipson became vice president general manager new data sharing division within citrix deal 2016 lipson corporate vice president general manager cloud services includes sharefile citrix workspace cloud new 171,000-square-foot raleigh office opened october 2014 raleigh-based citrix employees april 2015 sharefile 55,000 corporate customers 40 million users sharefile secure cloud-based platform businesses store share large files businesses able create branded password-protected areas files service software client-portal feature businesses set customize allow outside vendors clients access specific projects files sharefile features include ability send obtain e-signatures documents integration rightsignature ability send encrypted email microsoft outlook plugin online portal office 365 connection access edit documents stored sharepoint online onedrive business ability individuals migrate data personal clouds sharefile also mobile app versions sharefile allow mobile editing offline editing documents sharefile users option store data data centers citrix-managed data centers use existing file storage systems via storagezone connectors allows companies host files want stored cloud cases due regulatory concerns managers manage corporate content sharefile using remote wipe encryption passcode lock poison pill features addition companies able restrict third-party editing tools employees might try install devices audit content accessed device lost stolen response updated regulations hipaa standards citrix created sharefile cloud health care 2013 private virtual cloud designed help companies stay compliant updated hipaa standards runs aws cloud sets aside specific virtual servers host protected health information phi also 2013 sharefile began offering feature called archiving financial services help organizations financial sector comply data archiving regulations put forth u.s. securities exchange commission financial industry regulatory authority
[ 2961, 2789, 7102, 3756, 5064, 3943, 5571, 7083, 5908, 1589 ]
Test
855
8
Googlebot:googlebot googlebot web crawler software used google collects documents web build searchable index google search engine name actually used refer two different types web crawlers desktop crawler simulate desktop users mobile crawler simulate mobile user website probably crawled googlebot desktop googlebot mobile subtype googlebot identified looking user agent string request however crawler types obey product token useent token robots.txt developer selectively target either googlebot mobile googlebot desktop using robots.txt webmaster wishes restrict information site available googlebot another well-behaved spider appropriate directives robots.txt file adding meta tag codice_1 web page googlebot requests web servers identifiable user-agent string containing googlebot host address containing googlebot.com currently googlebot follows href links src links increasing evidence googlebot execute javascript parse content generated ajax calls well many theories regarding advanced googlebot ability process javascript opinions ranging minimal ability derived custom interpreters currently googlebot uses web rendering service wrs based chromium rendering engine version 74 7th may 2019 googlebot discovers pages harvesting links every page finds follows links web pages new web pages must linked known pages web order crawled indexed manually submitted webmaster problem webmasters low-bandwidth web hosting plans often noted googlebot takes enormous amount bandwidth cause websites exceed bandwidth limit taken temporarily especially troublesome mirror sites host many gigabytes data google provides search console allow website owners throttle crawl rate often googlebot crawl site depends crawl budget crawl budget estimation often website updated site crawl budget determined many incoming links frequently site updated technically googlebot development team crawling indexing team uses several defined terms internally takes crawl budget stands announced may 2019 googlebot runs latest chromium rendering engine googlebot regularly update rendering engine stay date new version googlebot supports 1000+ features compared previous version important cited official google documentation
[ 2902, 5372, 7886, 6427, 2569, 6114, 3309, 7924, 2591, 5775, 80, 6153, 84, 5455, 4762, 7967, 6176, 5476, 831, 5141, 136, 2317, 2673, 503, 7285, 2683, 6937, 168, 6950, 5534, 2712, 4116, 6978, 7346, 561, 201, 2739, 2037, 7007, 8107, 6297, ...
Test
856
3
Dragonworld_(video_game):dragonworld video game dragonworld interactive fiction computer game graphics game published telarium formerly known trillium subsidiary spinnaker software year 1984 game based novel written 1979 byron preiss michael reaves text game written j. brynne stephens german reviewer recognized detailed graphics atmospheric fantasy prose text parser graphics storyline got score sehr gut good
[]
Test
857
5
Asynchronous_Layered_Coding:asynchronous layered coding asynchronous layered coding alc internet protocol content delivery reliable massively scalable multiple-rate congestion-controlled manner specified rfc 5775 ietf proposed standard protocol specifically designed provide massive scalability using ip multicast underlying network service massive scalability context means number concurrent receivers object potentially millions aggregate size objects delivered session ranges hundreds kilobytes hundreds gigabytes receiver initiate reception object asynchronously reception rate receiver session maximum fair bandwidth available receiver sender supported using single sender alc focused reliable content delivery goal deliver objects quickly possible receiver time remaining network friendly competing traffic thus congestion control used conjunction alc strive maximize use available bandwidth receivers sender time backing aggressively face competing traffic sender side alc consists generating packets based objects delivered within session sending appropriately formatted packets appropriate rates channels associated session receiver side alc consists joining appropriate channels associated session performing congestion control adjusting set joined channels associated session response detected congestion using packets reliably reconstruct objects information flow alc session form data packets sent single sender channels receivers join receive data alc specify session description needed receivers join session mechanisms receivers obtain required information outside scope alc application uses alc may require receivers report statistics reception experience back sender mechanisms receivers report back statistics outside scope alc general alc designed minimal protocol instantiation provides reliable content delivery without unnecessary limitations scalability basic protocol
[]
Validation
858
9
Protected_mode:protected mode computing protected mode also called protected virtual address mode operational mode x86-compatible central processing units cpus allows system software use features virtual memory paging safe multi-tasking designed increase operating system control application software processor supports x86 protected mode powered begins executing instructions real mode order maintain backward compatibility earlier x86 processors protected mode may entered system software sets one descriptor table enables protection enable pe bit control register 0 cr0 protected mode first added x86 architecture 1982 release intel 80286 286 processor later extended release 80386 386 1985 due enhancements added protected mode become widely adopted become foundation subsequent enhancements x86 architecture although many enhancements added instructions new registers also brought benefits real mode intel 8086 predecessor 286 originally designed 20-bit address bus memory allowed processor access 2 bytes memory equivalent 1 megabyte time 1 megabyte considered relatively large amount memory designers ibm personal computer reserved first 640 kilobytes use applications operating system remaining 384 kilobytes bios basic input/output system memory add-on devices cost memory decreased memory use increased 1 mb limitation became significant problem intel intended solve limitation along others release 286 initial protected mode released 286 widely used example used microsoft xenix around 1984 coherent minix several shortcomings inability access bios dos calls due inability switch back real mode without resetting processor prevented widespread usage acceptance additionally hampered fact 286 allowed memory access 16 bit segments via four segment registers meaning 4*2 bytes equivalent 256 kilobytes could accessed time changing segment register protected mode caused 6-byte segment descriptor loaded cpu memory segment register load instruction took many tens processor cycles making much slower 8086 therefore strategy computing segment addresses on-the-fly order access data structures larger 128 kilobytes combined size two data segments became impractical even programmers mastered 8086/8088 286 maintained backwards compatibility precursor 8086 initially entering real mode power real mode functioned virtually identically 8086 allowing vast majority existing 8086 software run unmodified newer 286 real mode also served basic mode protected mode could set solving sort chicken-and-egg problem access extended functionality 286 operating system would set tables memory controlled memory access protected mode set addresses tables special registers processor set processor protected mode enabled 24 bit addressing allowed processor access 2 bytes memory equivalent 16 megabytes release 386 1985 many issues preventing widespread adoption previous protected mode addressed 386 released address bus size 32 bits allows 2 bytes memory accessing equivalent 4 gigabytes segment sizes also increased 32 bits meaning full address space 4 gigabytes could accessed without need switch multiple segments addition increased size address bus segment registers many new features added intention increasing operational security stability protected mode used virtually modern operating systems run x86 architecture microsoft windows linux many others furthermore learning failures 286 protected mode satisfy needs multiuser dos intel added separate virtual 8086 mode allowed multiple virtualized 8086 processors emulated 386 hardware support required virtualizing protected mode however wait another 20 years release 386 following additional features added protected mode release 386 protected mode offer direct method switch back real mode protected mode entered ibm devised workaround implemented ibm involved resetting cpu via keyboard controller saving system registers stack pointer often interrupt mask real-time clock chip ram allowed bios restore cpu similar state begin executing code reset later triple fault used reset 286 cpu lot faster cleaner keyboard controller method depend ibm at-compatible hardware work 80286 cpu system enter protected mode global descriptor table gdt must first created minimum three entries null descriptor code segment descriptor data segment descriptor ibm-compatible machine a20 line 21st address line also must enabled allow use address lines cpu access beyond 1 megabyte memory first 20 allowed used power-up guarantee compatibility older software written intel 8088-based ibm pc pc/xt models performing two steps pe bit must set cr0 register far jump must made clear prefetch input queue release 386 protected mode could exited loading segment registers real mode values disabling a20 line clearing pe bit cr0 register without need perform initial setup steps required 286 protected mode number features designed enhance operating system control application software order increase security system stability additions allow operating system function way would significantly difficult even impossible without proper hardware support protected mode four privilege levels rings numbered 0 3 ring 0 privileged 3 least use rings allows system software restrict tasks accessing data call gates executing privileged instructions environments operating system device drivers run ring 0 applications run ring 3 according intel 80286 programmer reference manual part binary compatibility real-mode code ability access 16 mb physical memory 1 gb virtual memory apparent changes application programmers without limitations application utilized relied techniques would n't run reality almost dos application programs violated rules due limitations virtual 8086 mode introduced 386 despite potential setbacks windows 3.0 successors take advantage binary compatibility real mode run many windows 2.x windows 2.0 windows 2.1x applications run real mode windows 2.x protected mode release 386 protected mode offers intel manuals call virtual 8086 mode virtual 8086 mode designed allow code previously written 8086 run unmodified concurrently tasks without compromising security system stability virtual 8086 mode however completely backwards compatible programs programs require segment manipulation privileged instructions direct hardware access use self-modifying code generate exception must served operating system addition applications running virtual 8086 mode generate trap use instructions involve input/output i/o negatively impact performance due limitations programs originally designed run 8086 run virtual 8086 mode result system software forced either compromise system security backwards compatibility dealing legacy software example compromise seen release windows nt dropped backwards compatibility ill-behaved dos applications real mode logical address points directly physical memory location every logical address consists two 16 bit parts segment part logical address contains base address segment granularity 16 bytes i.e segment may start physical address 0 16 32 ... 2-16 offset part logical address contains offset inside segment i.e physical address calculated codice_1 address line a20 enabled respectively segment_part × 16 offset mod 2 a20 every segment size 2 bytes protected mode replaced 16-bit selector 13 upper bits bit 3 bit 15 contain index entry inside descriptor table next bit bit 2 specifies whether operation used gdt ldt lowest two bits bit 1 bit 0 selector combined define privilege request values 0 3 represent highest lowest privilege respectively means byte offset descriptors descriptor table 16-bit selector provided lower three bits zeroed descriptor table entry defines real linear address segment limit value segment size attribute bits flags segment address inside descriptor table entry length 24 bits every byte physical memory defined bound segment limit value inside descriptor table entry length 16 bits segment length 1 byte 2 byte calculated linear address equals physical memory address segment address inside descriptor table entry expanded 32 bits every byte physical memory defined bound segment limit value inside descriptor table entry expanded 20 bits completed granularity flag g-bit short 386 processor also uses 32 bit values address offset maintaining compatibility 286 protected mode new default flag d-bit short added d-bit code segment 0 commands inside segment interpreted 16-bit commands default 1 interpreted 32-bit commands addition adding virtual 8086 mode 386 also added paging protected mode paging system software restrict control task access pages sections memory many operating systems paging used create independent virtual address space task preventing one task manipulating memory another paging also allows pages moved primary storage onto slower larger secondary storage hard disk drive allows memory used physically available primary storage x86 architecture allows control pages two arrays page directories page tables originally page directory size one page four kilobytes contained 1,024 page directory entries pde although subsequent enhancements x86 architecture added ability use larger page sizes pde contained pointer page table page table also originally four kilobytes size contained 1,024 page table entries pte pte contained pointer actual page physical address used four-kilobyte pages used given time one page directory may active use use rings privileged call gates task state segment tss introduced 286 preemptive multitasking made possible x86 architecture tss allows general-purpose registers segment selector fields stacks modified without affecting another task tss also allows task privilege level i/o port permissions independent another task many operating systems full features tss used commonly due portability concerns due performance issues created hardware task switches result many operating systems use hardware software create multitasking system operating systems like os/2 1.x try switch processor protected real modes slow unsafe real mode program easily crash computer os/2 1.x defines restrictive programming rules allowing family api bound program run either real protected mode early unix operating systems os/2 1.x windows used mode windows 3.0 able run real mode programs 16-bit protected mode switching protected mode decided preserve single privilege level model used real mode windows applications dlls hook interrupts direct hardware access lasted windows 9x series windows 1.x 2.x program written properly avoids segment arithmetic run way real protected modes windows programs generally avoid segment arithmetic windows implements software virtual memory scheme moving program code data memory programs running manipulating absolute addresses dangerous programs keep handles memory blocks running starting old program windows 3.0 running protected mode triggers warning dialog suggesting either run windows real mode obtain updated version application updating well-behaved programs using mark utility memory parameter avoids dialog possible gui programs running 16-bit protected mode gui programs running real mode windows 3.1 real mode longer supported could accessed modern 32-bit operating systems virtual 8086 mode still used running applications e.g dpmi compatible dos extender programs virtual dos machines windows 3.x applications windows windows subsystem certain classes device drivers e.g changing screen-resolution using bios functionality os/2 2.0 later control 32-bit kernel however 64-bit operating systems run long mode longer use since virtual 8086 mode removed long mode
[ 7512, 4670, 5021, 13, 379, 3271, 3626, 729, 5041, 5743, 7550, 6823, 405, 1855, 7564, 4347, 4719, 56, 421, 3319, 1880, 65, 3664, 5783, 5088, 6500, 785, 2266, 788, 1522, 4751, 7605, 4759, 4397, 4398, 5116, 2300, 4786, 1208, 6922, 4810, ...
Test
859
4
Shibboleth:shibboleth shibboleth custom tradition usually choice phrasing even single word distinguishes one group people another shibboleths used throughout history many societies passwords simple ways self-identification signaling loyalty affinity maintaining traditional segregation protecting real perceived threats term originates hebrew word shibbólet literally means part plant containing grain head stalk wheat rye less commonly arguably appositely flood torrent modern use derives account hebrew bible pronunciation word used distinguish ephraimites whose dialect used differently sounding first consonant difference concerns hebrew letter shin pronounced shoe book judges chapter 12 inhabitants gilead inflicted military defeat upon invading tribe ephraim around 1370–1070 bce surviving ephraimites tried cross river jordan back home territory gileadites secured river fords stop identify kill ephraimites gileadites told suspected survivor say word shibboleth ephraimite dialect resulted pronunciation gileadites sounded like sibboleth king james bible anecdote appears thus word already current english spelling gileadites took passages jordan ephraimites ephraimites escaped said let go men gilead said unto art thou ephraimite said nay said unto say shibboleth said sibboleth could frame pronounce right took slew passages jordan fell time ephraimites forty two thousand modern american english shibboleth sociological meaning referring in-group word phrase distinguish members outsiders – even used hostile group also sometimes used broader sense mean jargon proper use identifies speakers members particular group subculture term shibboleth extended discipline semiotics describe non-linguistic elements culture diet fashion cultural values cultural touchstones shared experience also shibboleths sort example people age nation tend memories popular songs television shows events formative years one-hit wonders prove particularly distinctive much true alumni particular school veterans military service groups discussing memories common way bonding in-jokes similar type shared-experience shibboleth information technology shibboleth community-wide password enables members community access online resource without revealing individual identities origin server vouch identity individual user without giving target server identifying information hence individual user know password actually employed – generated internally origin server – betray outsiders term also used pejoratively suggesting original meaning symbol effect lost symbol serves merely identify allegiance described nothing shibboleth 1956 nobel prize-laureate economist paul samuelson applied term shibboleth works including foundations economic analysis idea means becomes end letter law takes precedence spirit samuelson admitted shibboleth imperfect term phenomenon shibboleths used different subcultures throughout world different times regional differences level expertise computer coding techniques several forms shibboleths taken legend goes guldensporenslag battle golden spurs may 1302 flemish slaughtered every frenchman could find city bruges act known brugse metten identified frenchmen based inability pronounce flemish phrase shield friend possibly friend guilds however many medieval flemish dialects contain cluster sch- either even today kortrijk dialect sk- medieval french rolled r flemish bûter brea en griene tsiis wa't dat net sizze kin gjin oprjochte fries means butter rye bread green cheese whoever say genuine frisian used frisian pier gerlofs donia frisian rebellion 1515–1523 ships whose crew could pronounce properly usually plundered soldiers could beheaded donia dutch used name seaside town scheveningen shibboleth tell germans dutch sch dutch analyzed letter digraph ch producing consonant cluster german analyzed trigraph sch pronounced sardinia 28 april celebrated sa dii de s'aciappa day pursuit capture sa die de sa sardigna sardinia day date 1794 people cagliari chased suspected officers ruling piedmontese king asked say nara cixidi sardinian ‘ chickpea ’ piedmontese could pronounce 514 officers thus identified sent back mainland october 1937 spanish word parsley perejil used shibboleth identify haitian immigrants living along border dominican republic president dominican republic rafael trujillo ordered execution people alleged 20,000 30,000 individuals murdered within days parsley massacre although recent scholarship lack evidence mass graves puts actual total closer 1,000 black july riots sri lanka 1983 many tamils massacred sinhalese youths many cases massacres took form boarding buses getting passengers pronounce words hard bas start word like baldiya – bucket executing people found difficult world war ii united states soldiers pacific theater used word shibboleth challenge unidentified persons premise japanese people often pronounce letter l r confuse rs ls oliver gramling free men fighting story world war ii 1942 author notes war japanese spies would often approach checkpoints posing american filipino military personnel shibboleth lollapalooza would used sentry first two syllables come back rorra would open fire without waiting hear remainder allied breakout normandy beachheads 1944 hand-to-hand fighting occurred throughout hedgerows thick undergrowth norman countryside british american troops told use word thunderer countersign thick foliage given number syllables leading th sound believed word would invariably mispronounced native german speakers troubles northern ireland use name derry londonderry province second-largest city often taken indication speaker political stance frequently implied simply naming location pronunciation name letter h related shibboleth catholics protestants often pronouncing letter differently australia new zealand words fish chips often used highlight difference country short-i vowel sound ɪ asking someone say phrase identify country australian english higher forward sound close happy city new zealand english lower backward sound ɘ slightly higher version comma thus new zealanders hear australians say feesh cheeps australians hear new zealanders say fush chups furtive shibboleth type shibboleth identifies individuals part group based ability pronounce one words ability recognize seemingly-innocuous phrase secret message example members alcoholics anonymous sometimes refer friend bill w. reference aa founder william griffith wilson unindoctrinated would seem like casual – off-topic – remark aa members would understand meaning similarly world war ii homosexual us sailor might call friend dorothy tongue-in-cheek acknowledgment stereotypical affinity judy garland wizard oz code effective even higher command learned phrase way gay sailors identify failed recognize origins purportedly invested great deal time effort hunting dorothy assumed actual woman somehow assisting organizing homosexual servicemen likewise homosexuals britain might use cant language polari mark twain used explicit shibboleth conceal furtive shibboleth innocents abroad told shibboleth story seemingly inept uninteresting detail initiated however wording revealed twain freemason colombian conceptual artist doris salcedo created work titled shibboleth tate modern london 2007–2008 piece consisted 548-foot-long crack bisected floor tate lobby space salcedo said work episode west wing titled shibboleth president bartlet discusses meaning word length advisors believe catch phrase cliche bartlet reminds earlier biblical significance later becomes certain group chinese religious asylum seekers indeed christian representative uses word refer faith meeting
[ 990, 2439 ]
Test
860
4
Data_breach:data breach data breach intentional unintentional release secure private/confidential information untrusted environment terms phenomenon include unintentional information disclosure data leak information leakage also data spill incidents range concerted attacks black hats associated organized crime political activist national governments careless disposal used computer equipment data storage media unhackable source definition data breach security incident sensitive protected confidential data copied transmitted viewed stolen used individual unauthorized data breaches may involve financial information credit card bank details personal health information phi personally identifiable information pii trade secrets corporations intellectual property data breaches involve overexposed vulnerable unstructured data – files documents sensitive information according nonprofit consumer organization privacy rights clearinghouse total 227,052,199 individual records containing sensitive personal information involved security breaches united states january 2005 may 2008 excluding incidents sensitive data apparently actually exposed many jurisdictions passed data breach notification laws requiring company subject data breach inform customers takes steps remediate possible injuries may include incidents theft loss digital media computer tapes hard drives laptop computers containing media upon information stored unencrypted posting information world wide web computer otherwise accessible internet without proper information security precautions transfer information system completely open appropriately formally accredited security approved level unencrypted e-mail transfer information information systems possibly hostile agency competing corporation foreign nation may exposed intensive decryption techniques iso/iec 27040 defines data breach compromise security leads accidental unlawful destruction loss alteration unauthorized disclosure access protected data transmitted stored otherwise processed notion trusted environment somewhat fluid departure trusted staff member access sensitive information become data breach staff member retains access data termination trust relationship distributed systems also occur breakdown web trust data quality one way reducing risk data breach partly allows owner data rate data according importance give better protection important data incidents publicized media involve private information individuals e.g social security numbers loss corporate information trade secrets sensitive corporate information details contracts government information frequently unreported compelling reason absence potential damage private citizens publicity around event may damaging loss data working inside organization major cause data breaches estimates breaches caused accidental human factor errors range 37 ponemon institute 14 verizon 2013 data breach investigations report external threat category includes hackers cybercriminal organizations state-sponsored actors professional associations asset managers work aggressively professionals educate best risk-reduction practices internal external threats assets software information security prevention may deflect high percentage attempts ultimately motivated attacker likely find way given network one top 10 quotes cisco ceo john chambers two types companies hacked n't know hacked fbi special agent cyber special operations leo taddeo warned bloomberg television notion protect perimeter falling wayside detection critical celebrities found victims inappropriate medical record access breaches albeit individual basis part typically much larger breach given series medical data breaches lack public trust countries requiring safeguards put place protect security confidentiality medical information shared electronically give patients important rights monitor medical records receive notification loss unauthorized acquisition health information united states eu imposed mandatory medical data breach notifications reportable breaches medical information increasingly common united states although incidents pose risk identity theft serious consequences cases lasting damage either breach security remedied information accessed unscrupulous people thief interested hardware stolen data contains nevertheless incidents become publicly known customary offending party attempt mitigate damages providing victim subscription credit reporting agency instance new credit cards instruments case target 2013 breach cost target significant drop profit dove estimated 40 percent 4th quarter year end 2015 target published report claiming total loss 290 million data breach related fees yahoo breach disclosed 2016 may one expensive today may lower price acquisition verizon 1 billion verizon later released renegotiation yahoo agreeing lower final price 4.8 4.48 billion cybercrime cost energy utilities companies average 12.8 million year lost business damaged equipment according dnv gl international certification body classification society based norway data breaches cost healthcare organizations 6.2 billion last two years presumably 2014 2015 according ponemon study health care 25 million people health care stolen resulting identity theft 6 million people out-of-pocket cost victims close 56 billion notoriously difficult obtain information direct indirect value loss resulting data breach common approach assess impact data breaches study market reaction incident proxy economic consequences typically conducted use event studies measure event economic impact constructed using security prices observed relatively short period time several studies studies published varying findings including works kannan rees sridhar 2007 cavusoglu mishra raghunathan 2004 campbell gordon loeb lei 2003 well schatz bashroush 2017 notable incidents include
[ 5274, 4476, 4759, 2912, 5908, 3528, 208, 6273, 7262, 730, 2566, 2844, 1337, 4783, 7050, 7319, 578, 740, 7836, 744, 6920, 7927, 7478, 5509, 6756, 2427, 4000, 6393, 69, 2072, 80, 5534, 354, 2979, 1805 ]
Train
861
2
RT-11:rt-11 rt-11 rt real-time discontinued small single-user real-time operating system digital equipment corporation pdp-11 family 16-bit computers rt-11 first implemented 1970 widely used real-time systems process control data acquisition across full line pdp-11 computers rt-11 systems support preemptive multitasking versions could run multiple simultaneous applications variants monitors provided background job fb xm zm monitors also provided foreground job well six system jobs selected via sysgen system generation program tasks fixed priorities background job lowest foreground job highest possible switch jobs system console user interface sysgen could generate monitor provided single background job sb xb zb variants rt-11 written assembly language heavy use conditional assembly macro programming features macro-11 assembler allowed significant degree configurability allowed programmers specify high-level instructions otherwise unprovided machine code rt-11 distributions included source code operating system device drivers comments removed program named sysgen would build operating system drivers according user-specified configuration developer documentation included kernel listing included comments rt-11 device drivers loadable except prior v4.0 device driver system device boot device built kernel configuration time rt-11 commonly used device control data acquisition common developers write enhance device drivers dec encouraged driver development making hardware subsystems bus structure code open documenting internals operating system encouraging third-party hardware software vendors fostering development digital equipment computer users society users generally operated rt-11 via printing terminal video terminal originally via strap-selectable current-loop conventional teletypes rs-232 later rs-422 well interface one cpu cards dec also supported vt11 vs60 graphics display devices vector graphics terminals graphic character generator displaying text light pen graphical input third-party favorite tektronix 4010 family keyboard monitor kmon interpreted commands issued user would invoke various utilities command string interpreter csi forms commands rt-11 command language many features commands device names found later dos line operating systems heavily borrowed rt-11 csi form expected input output filenames options 'switches rt-11 precise order syntax command-line switches separated sign rather used unix-like operating systems commands full form short one could contracted example rename command could contracted ren batch files batch processor could used issue series commands rudimentary control flow batch files extension .bat later releases rt-11 possible invoke series commands using .com command file would executed sequence flow control even later possible execute series commands great control use indirect command file processor ind took .cmd control files input files extension .sav sort executables known save files rt-11 save command could used save contents memory disk file could loaded executed later time allowing session saved save command along get start reenter examine deposit basic commands implemented kmon commands utilities later borrowed dos-line operating systems commands include dir copy rename assign cls delete type help others format command used physical disk formatting although capable creating file system purpose init command used analogue dos command format /q commands supported use wildcards file names physical device names specified form 'dd n 'dd two-character alphabetic device name optional n unit number 0–7 unit number omitted unit 0 assumed example tt referred console terminal lp lp0 referred parallel line printer dx0 dy1 dl4 referred disk volumes rx01 unit 0 rx02 unit 1 rl01 rl02 unit 4 respectively logical device names consisted 1–3 alphanumeric characters used place physical device name accomplished using codice_1 command example one might issue codice_2 would cause future references 'abc map 'dl0 reserved logical name dk referred current default device device included file specification dk assumed reserved logical name sy referred system device device system booted later versions rt-11 allowed specification 64 units 0–77 octal certain devices device name still limited three alphanumeric characters feature enabled sysgen selection applied du ld device handlers two cases device name form became 'dnn 'd 'd du device l ld device 'nn 00–77 octal rt-11 distributed utilities allowed user perform many actions utilities dir dup pip format allowed user manage disk volumes teco edit visual editors ked dec vt100 k52 dec vt52 allowed user create edit source data files macro link libr allowed user build executables odt vdt sd device allowed user debug programs dec version runoff allowed user produce documents finally vtcom allowed user connect use transfer files another computer system phone using modem system complete enough handle many modern personal computing tasks large amounts free user-contributed software rt-11 available digital equipment computer users society decus including implementation c. although tools develop debug assembly-language programs provided languages including c fortran pascal several versions basic available dec layered products extra cost versions programming languages also available third-party sources even possible network rt-11 machines using decnet internet protocols developed third-party sources rt-11 operating system could booted perform useful work machine consisting two 8-inch 250kb floppy disks 56kb memory could support 8 terminals boot options include rk05 2.5mb removable hard disk platter magnetic tape distributions available pre-installed punched tape magnetic tape cartridge tape floppy disk minimal complete system supporting single real-time user could run single floppy disk 8k 16-bit words 16kb ram including user programs facilitated support swapping overlaying realize operation small memory system keyboard command user interface would swapped execution user program swapped memory upon program termination system supported real-time clock printing terminal vt11 vector graphic unit 16 channel 100 khz a/d converter 2 channel d/a 9600 baud serial port 16 bit bidirectional boards etc rt-11 implemented simple fast file system employing six-character filenames three-character extensions 6.3 encoded radix-50 packed nine characters three 16-bit words six bytes files contiguous meaning file occupied consecutive blocks minimally addressable unit disk storage 512 bytes disk meant entire file could read written quickly side effect file system structure files created deleted volume time unused disk blocks would likely remain contiguous could become limiting factor creation large files remedy periodically “ squeeze ” squish disk consolidate unused portions volume one directory preallocated beginning volume directory consists array entries one per file unallocated space directory entry 8 16-bit words though sysgen option allowed extra application-specific storage many rt11 programs need specialized peripherals direct access hardware could directly executed using rt11 rts run-time system rsts/e timesharing system rtem rt emulator various releases rsx-11 vms implementation dcl rt-11 increased compatibility dec operating systems although operating system commands options unique operating system number commands command options common dec also sold rsx-11 multiuser multitasking operating system realtime features rsts/e originally named rsts-11 multiuser time-sharing system rt-11 remained operating system choice data acquisition systems real time response required unix operating system also became popular lacked real-time features extremely small size rt-11 rt-11 ran members dec pdp-11 family q-bus- unibus-based pdp-11/05 first target 1970 final pdp-11 implementations pdp-11/93 /94 addition ran professional series pdt-11 programmed data terminal systems also dec since pdp-11 architecture implemented replacement products companies e.g. m100 family mentec reverse-engineered clones countries e.g. dvk soviet union rt-11 runs machines well fuzzball routing software internet protocols capable running rt-11 programs hammondsoftware distributed number rt-11 compatible operating systems including stareleven early multi-computer system shareplus multi-process/multi-user implementation rt-11 borrowed architectural concepts vax/vms operating system rt-11 device drivers required operation transparent device access pdp-11s vax/vms supported network option limited rsx-11 application compatibility also available shareplus strongest user base europe h computing developed distributed tsx-plus multi-user multi-processing implementation rt-11 thing n't handle boot process tsx-plus machine required boot rt-11 first running tsx-plus user program tsx-plus running would take complete control machine rt-11 provided true memory protection users users provided user accounts maintained account separation disk volumes implemented superset rt-11 emt programmed requests rt-11 programs generally ran unmodified tsx-plus fact rt-11 utilities used as-is tsx-plus device drivers generally required slight modifications users could choose four variants differing levels support multitasking several specialized pdp-11 systems sold based rt-11 several clones rt-11 made ussr
[ 1807, 4297, 7157, 4670, 5021, 13, 6088, 3271, 6804, 3276, 5041, 7546, 7550, 4336, 405, 1855, 2582, 4347, 65, 3664, 771, 4733, 6853, 5088, 6500, 7950, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 5110, 4397, 6892, 126, 6907, 4786,...
Test
862
4
PLA_Unit_61398:pla unit 61398 pla unit 61398 also known apt 1 comment crew comment panda gif89a byzantine candor pinyin 61398 bùduì military unit cover designator mucd people liberation army advanced persistent threat unit alleged source chinese computer hacking attacks unit stationed pudong shanghai 19 may 2014 us department justice announced federal grand jury returned indictment five 61398 officers charges theft confidential business information intellectual property u.s. commercial firms planting malware computers five huang zhenyu 黄振宇 wen xinyu 文新宇 sun kailiang 孙凯亮 gu chunhui 顾春晖 wang dong 王东 forensic evidence traces base operations 12-story building datong road public mixed-use area pudong shanghai group also known various names including advanced persistent threat 1 apt1 comment group byzantine candor codename given us intelligence agencies since 2002 report computer security firm mandiant stated pla unit 61398 believed operate 2nd bureau people liberation army general staff department gsd third department 总参三部二局 evidence contains entity mandiant calls apt1 part advanced persistent threat attacked broad range corporations government entities around world since least 2006 apt1 described comprising four large networks shanghai two serve pudong new area one 20 apt groups origins china third fourth department responsible electronic warfare believed comprise pla units mainly responsible infiltrating manipulating computer networks group often compromises internal software comment features legitimate web pages infiltrate target computers access sites leading known comment group collective stolen trade secrets confidential information numerous foreign businesses organizations course seven years lockheed martin telvent companies shipping aeronautics arms energy manufacturing engineering electronics financial software sectors dell secureworks says believed group includes group attackers behind operation shady rat extensive computer espionage campaign uncovered 2011 70 organizations five-year period including united nations government agencies united states canada south korea taiwan vietnam targeted attacks documented summer 2011 represent fragment comment group attacks go back least 2002 according incident reports investigators fireeye inc. alone tracked hundreds targets last three years estimates group attacked 1,000 organizations activity malware embedded compromised system malware controllers takes place business hours beijing time zone suggesting group professionally hired rather private hackers inspired patriotic passions 2013 government china consistently denied involved hacking response mandiant corporation report unit 61398 hong lei spokesperson chinese foreign ministry said allegations unprofessional 2013 china changed position openly admitted secretive cyber warfare units military civilian part governmenthowever details activities left speculation show force towards rest global community chinese government openly lists abilities comes digital spying network attack capabilities
[ 704, 2173, 3932, 2912, 376, 3277, 2923, 7186, 2587, 3323, 1500, 5779, 2618, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6541, 6194, 2678, 3038, 3047, 6569, 2693, 7307, 6589, 5187, 1996, 7328, 2724, 208, 2021, 5922, 6628, 924, 4531, 600, 1...
Validation
863
3
Robustness_principle:robustness principle computing robustness principle design guideline software principle also known postel law jon postel wrote early specification tcp words programs send messages machines programs machine conform completely specifications programs receive messages accept non-conformant input long meaning clear among programmers produce compatible functions principle popularized form contravariant input type covariant output type rfc 1122 1989 expanded postel principle recommending programmers assume network filled malevolent entities send packets designed worst possible effect protocols allow addition new codes existing fields future versions protocols accepting messages unknown codes possibly logging programmers avoid sending messages legal obscure protocol features might expose deficiencies receivers design code survive misbehaving hosts also cooperate limit amount disruption hosts cause shared communication facility 2001 marshall rose characterized several deployment problems applying postel principle design new application protocol example defective implementation sends non-conforming messages might used implementations tolerate deviations specification possibly several years later connected less tolerant application rejects messages situation identifying problem often difficult deploying solution costly rose therefore recommended explicit consistency checks protocol ... even impose implementation overhead 2015 2018 series internet-drafts martin thomson argues postel robustness principle actually leads lack robustness including security 2018 paper privacy-enhancing technologies florentin rochet olivier pereira showed exploit postel robustness principle inside tor routing protocol compromise anonymity onion services tor clients unix philosophy
[ 6620, 3863, 7637, 259, 3855 ]
Test
864
9
ZeroBrane_Studio:zerobrane studio zerobrane studio lightweight open-source lua ide code completion syntax highlighting code analyzer live coding debugging support lua 5.1 lua 5.2 lua 5.3 luajit lua engines zerobrane studio cross-platform application written lua runs windows windows xp+ linux macos 10.7+ operating systems uses wxwidgets toolkit scintilla component file editing zerobrane studio created paul kulchenko september 2011 way allow inexperienced users run debug lua applications initially targeting lua applications running mobile devices based open-source estrela editor luxinia open-source 3d graphics engine estrela editor developed starting august 2008 based one sample applications included wxlua wrapper around wxwidgets first public version zerobrane studio released january 2012 first year project development estrela zerobrane studio continued parallel october 2012 estrela editor project fully merged zerobrane studio project zerobrane studio provides integration debugging support lua 5.1 lua 5.2 lua 5.3 luajit interpreters integrated various products coronasdk cocos2d moai sdk löve gideros mobile redis torch adobe lightroom nginx lua scripts several books tutorials cover using zerobrane studio various game mobile toolkits also used teaching undergraduate graduate class mobile application development zerobrane studio provides local remote cross-platform debugging applications executing lua code debugger supports following functions step code set/remove breakpoints inspect variables expressions using watch window inspect call stack local values upvalues local values defined outer scope current function using stack window suspend/resume running application run lua commands console window ide also supports on-device debugging corona sdk gideros mobile software development kits application running mobile device ide running desktop computer addition debugging lua applications zerobrane studio also supports live coding allows making changes application code application running seeing results changes application live coding supported lua interpreters several environments zerobrane studio includes support plugins written lua open source plugin repository currently lists 45 plugins range simple plugins customize environment complex ones provide real-time watches document map split screen editing packaged versions zerobrane studio distributed project website include educational materials lua 50 simple scripts examples demonstrating use lua turtle graphics spirograph scripts zerobrane studio supports markdown formatting comments supports text formatting references lua files external resources supports execution lua commands directly ide providing integration included educational materials zerobrane studio supports interface translation different languages providing lua file containing text translated 2014 user community contributed translations six languages
[ 2291, 3368, 3915, 5571, 578 ]
Validation
865
8
Thymeleaf:thymeleaf thymeleaf java xml/xhtml/html5 template engine work web servlet-based non-web environments better suited serving xhtml/html5 view layer mvc-based web applications process xml file even offline environments provides full spring framework integration web applications thymeleaf aims complete substitute javaserver pages jsp implements concept natural templates template files directly opened browsers still display correctly web pages thymeleaf open-source software licensed apache license 2.0 project website following example produces html5 table rows item list product variable called products piece code includes also fragment x html code perfectly displayed browser prototype without processed natural template
[ 7899, 3915, 5571, 6681, 7931 ]
Test
866
3
CPU_socket:cpu socket computer hardware cpu socket cpu slot contains one mechanical components providing mechanical electrical connections microprocessor printed circuit board pcb allows placing replacing central processing unit cpu without soldering common sockets retention clips apply constant force must overcome device inserted chips large number pins zero insertion force zif sockets preferred common sockets include pin grid array pga land grid array lga designs apply compression force either handle pga type surface plate lga type put place provides superior mechanical retention avoiding risk bending pins inserting chip socket certain devices use ball grid array bga sockets although require soldering generally considered user replaceable cpu sockets used motherboard desktop server computers allow easy swapping components also used prototyping new circuits laptops typically use surface-mount cpus take less space motherboard socketed part cpu socket made plastic often comes lever latch metal contacts pins lands cpu many packages keyed ensure proper insertion cpu cpus pga pin grid array package inserted socket included latch closed cpus lga land grid array package inserted socket latch plate flipped position atop cpu lever lowered locked place pressing cpu contacts firmly socket lands ensuring good connection well increased mechanical stability table legend slotkets special adapters using socket processors bus-compatible slot motherboards
[ 2539, 2541, 7163, 4314, 5377, 5379, 1841, 5404, 2226, 5063, 5436, 3333, 1143, 2977, 2263, 1162, 2997, 6173, 7974, 3002, 3362, 6545, 4423, 3385, 5853, 1961, 6562, 2685, 6935, 8021, 1590, 4090, 7302, 1237, 5886, 4108, 6599, 5895, 3764, 4123...
Test
867
5
TFI-5:tfi-5 tfi-5 standardized tdm fabric framer interface oif allow framer switch components multiple vendors inter-operate facilitating development add/drop multiplexers tdm cross connect grooming switches standard includes link integrity monitoring connection management mapping mechanisms sonet/sdh non-sonet/sdh clients ethernet fibre channel main application tfi-5 time-division multiplexing tdm contrast ofi standards spi-5 target packet/cell applications ofi level 5 standards covered interfaces 40 gbit/s
[ 881 ]
Validation
868
7
Open_Data_Center_Alliance:open data center alliance opendatacenteralliance.org appears closed open data center alliance independent organization created oct. 2010 assistance intel coordinate development standards cloud computing approximately 100 companies account 50bn spending joined alliance including bmw royal dutch shell marriott hotels alliance cloud 2015 vision aimed creating federated cloud common standards laid hardware software arena organization sees growing need solutions developed open industry-standard multi-vendor fashion thus created usage model roadmap featuring 19 prioritized usage models usage models provide detailed requirements data center cloud solutions include detailed technical documentation discussing requirements technology deployments roadmap development steering committee established five initial technical workgroups areas infrastructure management regulation ecosystem security services organization delivered 0.50 usage model roadmap open data center alliance technical workgroups oct. 2010 delivered full 1.0 roadmap public use june 2011 steering committee consists bmw capgemini china life china unicom group deutsche bank jpmorgan chase lockheed martin marriott international inc. national australia bank royal dutch shell terremark ubs members include cern ebay logica motorola mobility inc. nokia demands organisations coming alarming rate many many different solutions developed today maybe n't work need one voice one road map companies able say manufacturers clear vision developing product says marvin wheeler terremark chairman alliance unclear successful alliance least shedding spotlight cloud interoperability big emerging issue said larry dignan zdnet
[ 2961, 2477 ]
Test
869
6
NILFS:nilfs nilfs nilfs2 new implementation log-structured file system log-structured file system implementation linux kernel developed nippon telegraph telephone corporation ntt cyberspace laboratories community world nilfs released terms gnu general public license gpl nilfs log-structured filesystem storage medium treated like circular buffer new blocks always written end … log-structured filesystems often used flash media since naturally perform wear-leveling … nilfs emphasizes snapshots log-structured approach specific form copy-on-write behavior naturally lends creation filesystem snapshots nilfs developers talk creation continuous snapshots used recover user-initiated filesystem problems … using copy-on-write technique known nothing life free nilfs records data continuous log-like format appended never overwritten approach designed reduce seek times well minimize kind data loss occurs crash conventional file systems example data loss occurs ext3 file systems system crashes write operation system reboots journal notes write complete partial data writes lost file systems like ufs-derived file systems used solaris operating system bsds provide snapshot feature prevents data loss snapshot configuration lengthy large file systems nilfs contrast continuously automatically save instantaneous states file system without interrupting service according ntt labs instantaneous states nilfs continuously saves actually mounted read-only time actual file system mounted read-write — capability useful data recovery hardware failures system crashes lscp list checkpoint command interactive nilfs inspect utility first used find checkpoint address case 2048 checkpoint address used mount checkpoint nilfs provides continuous snapshotting addition versioning capability entire file system users even restore files mistakenly overwritten deleted recent time since nilfs keep consistency like conventional lfs achieves quick recovery system crashes nilfs creates number checkpoints every seconds per synchronous write basis unless change users select significant versions among continuously created checkpoints change snapshots preserved changed back checkpoints limit number snapshots volume gets full snapshot mountable read-only file system mountable concurrently writable mount snapshots feature convenient make consistent backups use possible uses nilfs include versioning tamper detection sox compliance logging data loss recovery current major version nilfs version 2 referred nilfs2 nilfs2 implements online garbage collection reclaim disk space keeping multiple snapshots nilfs features include separate bsd licensed implementation currently read-only support included netbsd january 2015 presentation sd cards filesystems embedded systems linux.conf.au stated nilfs2 filesystem utilities made available gnu public license version 2 exception lib/nilfs libraries header files made available gnu lesser general public license version 2.1 japanese primary authors major contributors codice_1 worked working labs ntt corporation major contributors
[ 3599, 1438, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 1236, 2704, 1605, 174, 2710, 1992, 1...
Test
870
1
Spectral_Database_for_Organic_Compounds:spectral database organic compounds spectral database organic compounds sdbs free online searchable database hosted national institute advanced industrial science technology aist japan contains spectral data ca 34,000 organic molecules database available english japanese includes six types spectra laser raman spectra electron ionization mass spectra ei-ms fourier-transform infrared ft-ir spectra h nuclear magnetic resonance h-nmr spectra c nuclear magnetic resonance c-nmr spectra electron paramagnetic resonance epr spectra construction database started 1982 spectra acquired recorded aist collections still updated since 1997 database accessed free charge use requires agreeing disclaimer total accumulated number times accessed reached 550 million end january 2015 database contains ca 3,500 raman spectra spectra recorded region 4,000 – 0 cm excitation wavelength 4,800 nm slit width 100 – 200 micrometers collection updated ei-ms spectra measured jeol jms-01sg jeol jms-700 spectrometers electron ionization method electronic accelerating voltage 75 ev ion accelerating voltage 8 – 10 kv direct reservoir inlet systems used accuracy mass number 0.5 collection contains ca 25,000 ei-ms spectra updated ft-ir spectra recorded using nicolet 170sx jasco ft/ir-410 spectrometer spectra recorded nicolet spectrometer data stored intervals 0.5 cm 4,000 – 2,000 cm region 0.25 cm 2,000 – 400 cm region spectral resolution 0.25 cm spectra recorded jasco spectrometer resolution well intervals 0.5 cm samples solids prepared using kbr disc nujol paste methods samples liquids prepared liquid film method collections contains ca 54,100 spectra updated h nmr spectra recorded resonance frequency 400 mhz resolution 0.0625 hz 90 mhz resolution 0.125 hz spectral acquisition carried using flip angle 22.5 – 30.0 degrees pulse repetition time 30 seconds samples prepared dissolution deuterated chloroform cdcl deuterium oxide deuterated dimethylsulfoxide dmso-d spectrum accompanied list peaks respective intensities chemical shifts reported ppm hz spectra show peak assignment collection contains ca 15,900 spectra updated c nmr spectra recorded several spectrometers resonance frequencies ranging 15 mhz 100 mhz resolution ranging 0.025 0.045 ppm spectra acquired using pulse flip angle 22.5 – 45 degrees pulse repetition time 4 – 7 seconds samples prepared dissolution cdcl dmso-d. spectrum accompanied list observed peaks respective chemical shifts ppm intensities spectra show peak assignment collection contains ca 14,200 spectra updated collection contains ca 2,000 spectra measuring conditions sample preparation described particular spectrum collection stopped updated 1987 database searched entering one following parameters chemical name possible request partial full matching molecular formula number different types atoms present molecule single value range values molecular weight single value range values cas registry number sdbs number cases “ ” “ ” used wildcards result search includes available spectra search parameters entered results sorted molecular weight number carbons sdbs number ascending descending order spectrum unknown chemical compound available reverse search carried entering values chemical shift frequency mass peaks nmr ft-ir ei-ms spectrum respectively type search affords chemical compounds database entered spectral characteristics
[ 2054 ]
Test
871
3
Ballyhoo_(video_game):ballyhoo video game ballyhoo interactive fiction computer game designed jeff o'neill published infocom 1985 released ten different 8 16-bit platforms including ms-dos atari st commodore 64 infocom nineteenth game circus-themed plot game tagline big-time suspense big top player character bedazzled spectacle circus mystery performer life attending show tomas munrab travelling circus time forgot player loiters near tents instead rushing exit maybe clowns practice new act perhaps least one trapeze artists trip ... instead player overhears strange conversation circus owner hired drunken inept detective find daughter chelsea kidnapped munrab convinced outside job surely loyal employees would never betray like player begins investigate abduction soon becomes clear circus workers n't appreciate intrusion reactions range indifference hostility attempted murder order unravel mystery player engages series actions straight circus fan dream dressing clown walking high wire taming lions infocom games contained feelies additional items related game enclosed package ballyhoo featured following feelies munrab name circus owner barnum spelled backwards ballyhoo labeled standard difficulty lost treasures infocom bundled 20 infocom releases including ballyhoo package shipped lacked information necessary complete game final page souvenir program omitted page ad classical music radio station one point game player must tune radio frequency listed ad 1170 order proceed compute gazette 1986 called ballyhoo richly evocative often exasperating clever magazine approved splendid feelies surprisingly flexible parser
[ 6380, 438 ]
Validation
872
5
Shared_Whois_Project:shared whois project shared whois project swip process used submit maintain update information ensure up-to-date efficient maintenance whois records structured rfc 1491 process updates whois contain information regarding organization using specific ip address specific block addresses additionally provides means track use organization current allocations ip addresses additional allocation ip addresses may justified usage reports case studies may done swip must used within seven days reassignment ip address space downstream customer contrast organization required submit swip template fewer eight ip addresses allocations assignments reassignments blocks 8,192 addresses greater /19 block must approved arin beforehand companies assigned block 65,536 addresses responsible maintaining in-addr.arpa domain records customers two types registration first allocation blocks ip addresses later reallocated reassigned third parties second assignment blocks reassigned recipient end-user
[ 3821 ]
Test
873
7
Pidoco:pidoco pidoco usability suite cloud-based collaboration software pidoco gmbh creating sharing testing wireframes mockups prototypes websites mobile apps enterprise software applications pidoco usability suite cloud-based collaboration software planning designing testing websites web applications mobile apps enterprise software software tool enables users quickly create clickable wireframes mockups interactive low-fidelity prototypes guis without programming using drag-and-drop placement pre-fabricated elements pidoco allows users share projects team members project stakeholders real-time online collaboration reviewing user testing web application used visualize requirements collaborate design phases software development involve end users generate optimized specifications traditional agile development processes pidoco browser-based thus compatible windows mac os linux pidoco structured several views give access various functions functions include pidoco usability suite marketed three editions pidoco usability suite browser-based application runs various operating systems including windows mac os linux supported browsers include internet explorer 7+ firefox 3.0+ chrome 4+ safari 4+ simulation testing functions allow teams collaborate prototypes gathering feedback creating editing prototypes supported firefox 3.0+ chrome 4+ safari 4+ pidoco javascript/svg-based tool uses open web standards offered software-as-a-service saas model require download installation software accessed online via application homepage broad-band internet connection web browser software necessary use pidoco software pidoco operates software-as-a-service saas model available standard hosted saas option hosted dedicated server option in-house installation attributes saas include flexibility scalability multi-tenant capability recurring subscription fees rather upfront capital cost require internal hardware
[ 5571, 578 ]
Test
874
4
Time-delay_combination_locks:time-delay combination locks time-delay combination lock commonly digital electronic combination lock equipped delay timer delays unlocking lock user-definable delay period usually less one hour unlike time lock unlocks preset time case bank vault time-delay locks operate time safe unlocked operator must wait set delay period elapse lock opened time delay safes commonly used businesses high cash transactions used banks like nationwide hsbc barclays halifax time-delay combination locks frequently incorporated money safes armed robbery deterrent many instances time-delay combination locks also equipped duress code may entered activate time delay whilst sending silent alarm monitoring centre modern time delay combination locks many functions multiple different codes pre-set time lock settings open close times pre-set vacation times e.g christmas day dual code facility full audit trail providing detailed record lock history showing opened lock long open also use non-volatile memory information lost batteries go flat allow safe opened batteries changed pre-set time correct code entered electronic combination locks time-delay feature require code entered twice start timer second unlock open safe entered delay period expired
[ 7350, 1413 ]
Test
875
4
Ipfirewall:ipfirewall ipfirewall ipfw freebsd ip stateful firewall packet filter traffic accounting facility ruleset logic similar many packet filters except ipfilter ipfw authored maintained freebsd volunteer staff members syntax enables use sophisticated filtering capabilities thus enables users satisfy advanced requirements either used loadable kernel module incorporated kernel use loadable kernel module possible highly recommended ipfw built-in firewall mac os x mac os x 10.7 lion 2011 replaced openbsd project pf like freebsd ipfw open source used many freebsd-based firewall products including m0n0wall freenas port ipfw dummynet traffic shaper available linux openwrt microsoft windows wipfw windows port old 2001 version ipfw
[ 1809, 7514, 385, 7536, 732, 6107, 3636, 3637, 6456, 5760, 3986, 5065, 6477, 424, 7581, 1133, 1502, 6149, 6860, 7597, 6505, 1523, 4759, 7246, 806, 1547, 2296, 481, 2300, 1193, 4059, 7275, 8001, 6918, 6211, 3394, 6560, 4806, 7289, 4441, 5...
Test
876
8
FAROO:faroo faroo universal web search engine based peer-to-peer technology uses distributed crawler stores search data users computers instead central server whenever user visits website automatically indexed distributed network ranking done comparing usage statistics users web pages visited amount time spent page whether pages bookmarked printed
[ 6025, 5342, 4759, 5571, 2530, 5451 ]
Train
877
4
United_Kingdom_government_security_breaches:united kingdom government security breaches page time-line published security lapses committed governmental entities uk including data security breaches article attempt capture security vulnerabilities
[ 2086, 3932, 4000 ]
Test
878
9
Command_substitution:command substitution computing command substitution facility allows command run output pasted back command line arguments another command command substitution first appeared bourne shell introduced version 7 unix 1979 remained characteristic later unix shells feature since adopted programming languages well including perl php ruby microsoft powershell windows also appears microsoft cmd.exe codice_1 command codice_2 command shells typically implement command substitution creating child process run first command standard output piped back shell reads output parsing words separated whitespace shell ca n't know output child pipe closes child dies waits starts another child process run second command c shell example shows one might search c files containing string codice_3 using codice_4 edit found using codice_5 editor syntactical notation shown codice_6 ... codice_6 using backquotes delimiters original style supported common unix shells objections raised syntax typed semantics works easy type important factor interactive command processor syntax criticized awkward nest putting one command substitution inside another left right delimiters korn shell ksh solved alternative notation codice_8 ... codice_9 borrowing notational style used variable substitution today unix shells support syntax microsoft powershell also uses notation semantics semantics breaking output words whitespace also criticized worked well early unix systems filenames never contained spaces n't work well modern windows linux systems filenames certainly contain spaces either previous examples filenames matched codice_10 wildcard contains space filename broken two separate arguments codice_5 clearly intended hamilton c shell solved double backquote notation codice_12 ... codice_12 parses words line breaks example command substitution using codice_14 operator powershell related facility expression substitution found languages common lisp scheme invoked using comma-at operator expression marked backquote quasiquote operator abc using expression enclosed backquotes inside text display string literal example abc command produces output
[ 4112, 5983, 1445, 6882, 6428, 3106, 5931, 578, 3979, 6029, 1975, 4539, 6577, 7032, 1435 ]
Test
879
2
HP_Multi-Programming_Executive:hp multi-programming executive mpe multi-programming executive discontinued business-oriented mainframe computer real-time operating system made hewlett-packard initially mini-mainframe final high-end systems supported 12 cpus 2000 simultaneous users runs hp 3000 family computers originally used hp custom 16-bit stack architecture cisc cpus later migrated pa-risc operating system called mpe xl 1983 original version mpe written language called spl system programming language mpe xl written primarily hp pascal assembly language old spl code 1992 os name changed mpe/ix indicate unix interoperability addition posix compatibility discontinuance product line announced late 2001 support hp terminating end 2010 number 3rd party companies still support hardware software 1998 hp released last version mpe/ix 6.0 among others mpe/ix supports following list common commands programs
[ 4670, 5021, 13, 3271, 3626, 5041, 7550, 35, 405, 1112, 1867, 65, 5783, 5088, 6500, 785, 2266, 788, 1522, 7605, 4759, 4397, 5116, 2300, 4786, 6922, 1213, 5161, 5865, 861, 1237, 6236, 3751, 1989, 1992, 7325, 3764, 190, 8066, 6984, 4494, ...
Test
880
4
Anti-keylogger:anti-keylogger anti-keylogger anti–keystroke logger type software specifically designed detection keystroke logger software often software also incorporate ability delete least immobilize hidden keystroke logger software computer comparison anti-virus anti-spyware software primary difference anti-keylogger make distinction legitimate keystroke-logging program illegitimate keystroke-logging program malware keystroke-logging programs flagged optionally removed whether appear legitimate keystroke-logging software keyloggers sometimes part malware packages downloaded onto computers without owners knowledge detecting presence keylogger computer difficult so-called anti- keylogging programs developed thwart keylogging systems often effective used properly anti-keyloggers used large organizations well individuals order scan remove cases simply immobilize keystroke logging software computer generally advised software developers anti-keylogging scans run regular basis order reduce amount time keylogger may record keystrokes example system scanned every three days maximum three days keylogger could hidden system recording keystrokes public computers extremely susceptible installation keystroke logging software hardware documented instances occurring public computers particularly susceptible keyloggers number people gain access machine install hardware keylogger software keylogger either secretly installed matter minutes anti-keyloggers often used daily basis ensure public computers infected keyloggers safe public use keyloggers prevalent online gaming industry used secretly record gamer access credentials user name password logging account information sent back hacker hacker sign later account change password account thus stealing world warcraft particular importance game hackers target numerous keylogging viruses anti-keyloggers used many world warcraft gaming community members order try keep gaming accounts secure financial institutions become target keyloggers particularly institutions use advanced security features pin pads screen keyboards anti-keyloggers used run regular scans computer banking client information accessed protecting passwords banking information credit card numbers identity thieves common use anti-keylogger individuals wishing protect privacy using computer uses range protecting financial information used online banking passwords personal communication virtually information may typed computer keyloggers often installed people known computer owner many times installed ex-partner hoping spy ex-partner activities particularly chat type software signature base strategic information helps uniquely identify keylogger list contains many known keyloggers possible vendors make effort availability up-to-date listing download customers time 'system scan run software compares contents hard disk drive item item list looking matches type software rather widespread one drawbacks biggest drawback signature-based anti-keyloggers one protected keyloggers found signature-base list thus staying vulnerable unknown unrecognized keyloggers criminal download one many famous keyloggers change enough anti-keylogger wo n't recognize software n't use signature bases uses checklist known features attributes methods keyloggers known use analyzes methods work modules pc thus blocking activity module similar work keyloggers though method gives better keylogging protection signature-based anti-keyloggers drawbacks one type software blocks non-keyloggers also several 'non-harmful software modules either part operating system part legitimate apps use processes keyloggers also use trigger false positive usually non signature-based keyloggers option allow user unblock selected modules cause difficulties inexperienced users unable discern good modules bad modules manually choosing block unblock
[ 2173, 4025, 5719, 454, 7151, 6417, 6515, 6419, 2996, 2733, 3698, 651, 210, 1376, 2850, 7186, 2577, 5401, 6823, 5848, 1766, 3047, 3071, 2789, 8133, 74, 6682, 2354, 3680, 1805, 3426 ]
Test
881
5
TDM_Fabric_to_Framer_Interface:tdm fabric framer interface tdm fabric framer interface abbreviated tdm commonly used tdm variants include
[ 867 ]
Test
882
9
Relevance_Language:relevance language relevance language patented language created bigfix inc. later acquired ibm use bigfix product bigfix software used monitor computers within enterprise take necessary actions bring computer compliance defined policies prominent use determine particular computer whether desktop laptop running windows mac linux mobile device running ios android needs update patch deliver fixlet bigfix term set instructions get update install device bandwidth efficient manner design software company looking language could directly retrieve properties computer cpu disk space etc unable find one appropriate task developed language meet need currently bigfix software uses language
[ 3920, 578 ]
Test
883
5
InterSwitch_Trunk:interswitch trunk interswitch trunk ist one parallel point-to-point links link aggregation connect two switches together create single logical switch ist allows two switches share addressing information forwarding tables state information permitting rapid less one second fault detection forwarding path modification link may different names depending vendor example brocade calls inter-chassis link icl cisco calls vsl virtual switch link edge switches servers pcs see two aggregate switches one large switch allows vendor equipment configured use ieee 802.3ad static link aggregation protocol connect switches take advantage load balancing redundant connections ist protocol developed nortel acquired avaya acquired extreme networks enhance capabilities link aggregation required configured prior configuring smlt dsmlt r-smlt functions two aggregate core distribution access switches edge equipment configured following multi-link trunking mlt dmlt ieee 802.3ad static link aggregation ieee 802.3ad static gigabit etherchannel gec ieee 802.3ad static fast etherchannel fec smlt dsmlt static link aggregation protocols united states patent 7173934 ist supported nortel routing switch 1600 5000 8300 ers 8600 mers 8600 products also avaya virtual services platform vsp 7000 vsp 9000
[ 6691, 4926, 6927, 7888, 899, 2534, 7095 ]
Validation
884
5
Wireless_transaction_protocol:wireless transaction protocol wireless transaction protocol wtp standard used mobile telephony layer wireless application protocol wap intended bring internet access mobile phones wtp provides functions similar tcp except wtp reduced amount information needed transaction e.g include provision rearranging out-of-order packets wtp runs top udp performs many tasks tcp way optimized wireless devices saves processing memory cost compared tcp supports 3 types transaction
[ 5172, 796, 7861, 7637, 4101, 6522 ]
Test