node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
885
2
Tnftp:tnftp tnftp formerly lukemftp ftp client unix-like operating systems based original bsd ftp client default ftp client included netbsd freebsd openbsd dragonfly bsd darwin midnightbsd maintained luke mewburn notable support server-side tab completion feature ftp client gnu inetutils lacks
[ 1254, 6972, 191, 732, 5571, 8194, 6367, 6743, 1394, 6211, 5065, 5518, 3915, 1697, 6149, 1793, 8037, 6505 ]
Test
886
0
North_Side_Inc:north side inc north side montreal-based software company founded 2000 developing natural language understanding natural language generation together dialogue software since 2001 company founded eugene joseph 2000 first company virtual prototypes inc. went public toronto stock exchange july 1999 company currently operates presagis wholly owned subsidiary cae early 2000 north side r work funded part canadian department national defence national research council telefilm canada 2007 north side embarked development bot colony first video game making coherent english dialogue characters integral part gameplay game development financed part canada media fund first two episodes bot colony launched steam june 17 2014 work bot colony started 2007 preliminary work parsing ontologies reasoning started much earlier 2001 peak 2014 team 45 members company spent cumulative 23m project 20m went towards r natural language understanding company launched verbalaccess finovate new york city september 16 2015 verbalaccess provides english interface financial services enabling transactions interactive faq english ability banking transactions completely hands-off enables person bank speech driving walking etc technology also supports transactions via text-messages knowledge base verbalaccess spans financial services encompassing banking credit cards creditworthiness loans savings limited extent insurance investments bot colony north side improved natural language understanding pipeline adding semantic reasoner able reason logical axioms expressed english equivalent prolog predicates english formalized procedural knowledge expressed english key feature distinguishing north side technology intelligent personal assistant based machine learning apple siri google microsoft cortana nuance nina ibm watson ability clarify ambiguous incomplete input handle paraphrases using deterministic rule-based approach north side relies advances parsing disambiguation understand language precisely making financial transactions voice text-messaging feasible underlying database technology supporting north side nlu technology versant object database actian
[ 1718 ]
Test
887
4
Offline_root_certificate_authority:offline root certificate authority offline root certificate authority certificate authority defined x.509 standard isolated network access often kept powered-down state public key infrastructure chain trusted authorities begins root certificate authority root ca root ca installed root certificate created next action taken administrator root ca issue certificates authorizing intermediate subordinate cas creates ability issue distribute revoke digital certificates without direct action root ca consequences compromised root ca great including need re-issue every certificate pki root cas must kept safe unauthorized access common method ensure security integrity root ca keep offline state brought online needed specific infrequent tasks typically limited issuance re-issuance certificates authorizing intermediate cas drawback offline operation hosting certificate revocation list root ca possible unable respond crl requests via protocols http ldap ocsp however possible move certificate validation functionality dedicated validation authority authorized offline root ca better understand offline root ca greatly improve security integrity pki important realize crl specific ca issued certificates list therefore ca root intermediate responsible tracking revocation certificates alone issued consider scenario root ca issues certificates three intermediate cas b c. newly created intermediate cas issue certificates intermediate ca revoke certificates issue maximum size crl specific intermediate ca would however root ca issued three certificates intermediate cas maximum size crl therefore overall burden maintaining hosting crl specific root ca minimized use intermediate cas well burden maintaining associated validation authority
[ 363, 794, 6795, 1168, 1173, 2644, 1460, 5824, 8189, 8093, 6540, 5399, 3383, 5052, 6458, 6553, 2587, 4071, 7567, 7925, 3899, 2691, 6049, 4990, 7214, 3588, 353, 1059, 354, 1513, 2620, 359, 3426 ]
Validation
888
0
Georgetown–IBM_experiment:georgetown–ibm experiment georgetown–ibm experiment influential demonstration machine translation performed january 7 1954 developed jointly georgetown university ibm experiment involved completely automatic translation sixty russian sentences english conceived performed primarily order attract governmental public interest funding showing possibilities machine translation means fully featured system six grammar rules 250 lexical items vocabulary stems endings complete dictionary never fully shown extended one garvin article apart general topics system specialised domain organic chemistry translation carried using ibm 701 mainframe computer launched april 1953 sentences punched onto cards georgetown-ibm experiment best-known result mit conference june 1952 active researchers machine translation field invited conference duncan harkin us department defense suggested department would finance new machine translation project jerome weisner supported idea offered finance research laboratory electronics mit leon dostert invited project previous experience automatic correction translations back 'mechanical translation interpretation system strong impact nuremberg war crimes tribunal linguistics part demonstration carried part linguist paul garvin also good knowledge russian 60 romanized russian statements wide range political legal mathematical scientific topics entered machine computer operator knew russian resulting english translations appeared printer sentences translated carefully selected many operations demonstration fitted specific words sentences addition relational sentence analysis could recognize sentence structure approach mostly 'lexicographical based dictionary specific word connection specific rules steps well publicized journalists perceived success experiment encourage governments invest computational linguistics authors claimed within three five years machine translation could well solved problem however real progress much slower alpac report 1966 found ten years long research failed fulfill expectations funding reduced dramatically demonstration given widespread coverage foreign press small fraction journalists drew attention previous machine translation attempts
[ 1314, 5429, 5008 ]
Test
889
2
IPhone_6S:iphone 6s iphone 6s iphone 6s plus stylized marketed iphone 6s iphone 6s plus smartphones designed developed marketed apple inc ninth generation iphone announced september 9 2015 bill graham civic auditorium san francisco apple ceo tim cook pre-orders beginning september 12 official release september 25 2015 iphone 6s 6s plus succeeded iphone 7 iphone 7 plus september 7 2016 discontinued announcement iphone xs iphone xs max iphone xr september 12 2018 iphone 6s similar design iphone 6 includes updated hardware including strengthened chassis upgraded system-on-chip 12-megapixel camera improved fingerprint recognition sensor lte advanced support hey siri capabilities without needing plugged iphone 6s also introduces new hardware feature known 3d touch enables pressure-sensitive touch inputs iphone 6s mostly positive reception performance camera quality praised reviewers addition 3d touch liked one critic potential entirely new interface interactions disliked another critic providing users expected intuitive response actually using feature battery life criticized one reviewer asserted phone camera significantly better rest industry iphone 6s set new first-weekend sales record selling 13 million models 10 million iphone 6 previous year however apple saw first-ever quarterly year-over-year decline iphone sales months launch credited saturated smartphone market apple biggest countries lack iphone purchases developing countries official unveiling several aspects iphone 6s rumored including base model 16 gigabytes storage pressure-sensitive display technology known 3d touch new rose gold color option iphone 6s iphone 6s plus officially unveiled september 9 2015 press event bill graham civic auditorium san francisco pre-orders began september 12 official release september 25 september 7 2016 apple announced iphone 7 iphone 7 plus successors iphone 6s 6s plus although continued sold reduced price point entry-level options iphone lineup march 31 2017 iphone 6s 6s plus released indonesia alongside iphone 7 7 plus following apple research development investment country iphone 6s iphone 6s plus iphone se last iphone models feature standard 3.5 mm stereo headphone jack discontinued september 12 2018 release iphone xs iphone xs max iphone 6s nearly identical design iphone 6 response bendgate design flaws previous model changes made improve durability chassis 6s constructed stronger 7000 series aluminum alloy key points rear casing strengthened reinforced touchscreen integrated circuits re-located display assembly alongside existing gold silver space gray options new rose gold color option also introduced iphone 6s powered apple a9 system-on-chip company stated 70 faster apple a8 90 better graphics performance iphone 6s 2 gb ram previous iphone also supports lte advanced touch id sensor 6s also updated new version improved fingerprint scanning performance previous version capacities batteries slightly smaller apple rates iphone 6s 6s plus average battery life respective predecessors a9 system-on-chip dual-sourced tsmc samsung although speculated samsung version worse battery performance tsmc version multiple independent tests shown appreciable difference two chips although device promoted iphone 6s degree water resistance change internal design places silicone seal around components logic board adhesive gasket around display assembly prevent shorted accidental exposure water displays sizes iphone 6 coming 4.7-inch 750p 5.5-inch 1080p plus sizes iphone 6s features technology known 3d touch sensors embedded screen backlight layer measure firmness user touch input distance cover glass allowing device distinguish normal forceful presses 3d touch combined taptic engine vibrator provide associated haptic feedback although similar distinct force touch technology used apple watch trackpad retina macbook sensitive recognize levels touch pressure force touch due hardware needed implement 3d touch iphone 6s heavier predecessor iphone 6s features 12-megapixel rear-facing camera upgrade 8-megapixel unit previous models well 5-megapixel front-facing camera record 4k video well 1080p video 30 60 120 frames per second camera well received many critics phone camera takes 4k video recording use storage phone rapidly 16 gigabyte version phone capable holding 40 min 4k video iphone 6s 6s plus originally offered models 16 64 128 gb internal storage following release iphone 7 september 2016 16 64 gb models dropped replaced new 32 gb option improved storage performance iphone 6s utilizes nvm express nvme resulting maximum average read speed 1,840 megabytes per second iphone 6s originally shipped ios 9 operating system leverages 3d touch hardware allow recognition new gestures commands including peeking content light touch popping view pressing harder accessing context menus links commonly used functions within apps harder presses home screen icons camera app retina flash feature allows display brightness used makeshift flash images taken front camera live photos captures short video alongside photo taken iphone 6s supports ios 12 first released september 17 2018 iphone 6s iphone 6s plus also support ios 13 coming soon unveiled june 3 2019 released fully later year supports main features update including new dark mode nilay patel verge 2015 described 6s particular plus model right best phone market ... n't companies roll feature like 3d touch make work way suggests creation entirely new interface paradigms every phone maker needs figure exactly apple cameras consistent really compete samuel gibbs guardian commented phone potential best smaller smartphone market short battery life deeply frustrating described camera leagues ahead competition anymore tom salinger register praised performance noting 're using phones performance current pcs described 3d touch glorified vibrator good ... still n't know quite going happen try ryan smith joshua ho anandtech awarded iphone 6s 6s plus editors choice gold award based largely phone performance addition 3d touch monday following iphone 6s launch weekend apple announced sold 13 million models record-breaking number exceeded 10 million launch sales iphone 6 2014 months following launch apple saw first-ever quarterly year-over-year decline iphone sales attributed saturated smartphone market apple biggest sales countries consumers developing countries buying iphones november 2016 apple announced small number iphone 6s devices manufactured september october 2015 faulty batteries unexpectedly shut apple noted battery problems safety issue announced battery replacement program affected devices customers affected devices span limited serial number range able check device serial number apple website affected receive battery replacement free charge apple stores authorized apple service providers december 2016 apple revealed new details issue stating affected devices contained battery component exposed controlled ambient air longer assembled battery packs statement also said customers outside affected range may also experience unexpected shutdowns though clarifying shutdowns occur normal conditions iphone tries protect electronics provided highly discounted battery replacement customers year apple also said upcoming update ios operating system would include additional diagnostic tools help apple find information different kinds battery issues february 2017 apple released statement techcrunch saying ios 10.2.1 update released january 23 reduced occurrence battery shutdowns 80 iphone 6s devices december 28 2017 apple decreased price out-of-warranty battery replacement iphone 6 later 79 29 one year december 31 2018 promised ios update would provide information iphone battery health eventually turned ios 11.3
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 740, 5752, 405, 6125, 2954, 1123, 7572, 6482, 6847, 6142, 2609, 1895, 4373, 7226, 4376, 2978, 5091, 4749, 5450, 7601, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3001, 2284, 3...
Validation
890
6
Enterprise_Volume_Management_System:enterprise volume management system enterprise volume management system evms flexible integrated volume management software used manage storage systems linux features include evms licensed gnu general public license version 2 later evms supported linux distributions among others 2008 suse debian gentoo lvm evms competing inclusion mainline kernel evms features better userland tools internals lvm attractive kernel developers end lvm battle inclusion response evms team decided concentrate porting evms userland tools work lvm kernelspace sometime release version 2.5.5 february 26 2006 ibm discontinued development project releases 2008 novell announced company would moving evms lvm future editions suse products continuing fully support customers using evms
[ 1438, 2182, 3613, 7528, 7532, 5744, 6443, 4341, 5762, 7581, 3666, 5453, 7242, 1534, 1535, 1924, 6892, 1176, 1933, 1208, 6211, 2680, 5865, 7669, 1227, 1596, 165, 7312, 1607, 5884, 1991, 6984, 5571, 578, 4877, 5580, 2765, 3134, 4174, 7038, ...
Validation
891
4
Obnam:obnam obnam free open-source backup software 2017 project retired based official site faq page obnam acronym stands obligatory name important features
[ 6289, 4386, 5571, 578 ]
Test
892
1
Simple_Object_Database_Access:simple object database access simple object database access also known s.o.d.a soda api database queries
[ 5571, 4759, 578 ]
Test
893
8
PDF.js:pdf.js pdf.js pdf.js javascript library renders portable document format pdf files using web standards-compliance html5 canvas project led mozilla foundation andreas gal launched initially experiment 2011 pdf.js work part website browser originally created firefox extension included mozilla firefox since 2012 version 15 enabled default since 2013 version 19 also included owncloud browser extension google chrome chromium firefox android pale moon seamonkey
[ 1152, 2451, 4755, 5549, 7975, 6802, 1267, 4045, 562, 1190, 3548, 5263, 6368, 6458, 7015, 6557, 2049, 1769, 5506, 237, 4352, 7028, 340, 5699, 7587, 2706, 84, 5887, 445, 4287 ]
Test
894
7
Apache_Giraph:apache giraph apache giraph apache project perform graph processing big data giraph utilizes apache hadoop mapreduce implementation process graphs facebook used giraph performance improvements analyze one trillion edges using 200 machines 4 minutes giraph based paper published google graph processing system called pregel compared big graph processing libraries cassovary
[ 7238, 4303, 5728, 901, 7805, 2741, 7444, 7896, 917, 5571, 3463, 3542, 3204, 1286, 6821, 5054, 840, 1392, 3031, 5408, 3558, 5677, 3479, 5863, 6387, 5075, 6137, 7488, 7857, 5874, 3915, 1511, 4742, 5007, 1333, 702 ]
Test
895
3
SuperH:superh superh sh 32-bit reduced instruction set computing risc instruction set architecture isa developed hitachi currently produced renesas implemented microcontrollers microprocessors embedded systems many original patents superh architecture expiring sh2 cpu reimplemented open source hardware name j2 superh processor core family first developed hitachi early 1990s hitachi developed complete group upward compatible instruction set cpu cores sh-1 sh-2 used sega saturn sega 32x capcom cps-3 cores 16-bit instructions better code density 32-bit instructions great benefit time due high cost main memory years later sh-3 core added sh cpu family new features included another interrupt concept memory management unit mmu modified cache concept sh-3 core also got dsp extension called sh-3-dsp extended data paths efficient dsp processing special accumulators dedicated mac-type dsp engine core unifying dsp risc processor world derivative also used original sh-2 core 1994 1996 35.1 million superh devices shipped worldwide dreamcast hitachi developed sh-4 architecture superscalar 2-way instruction execution vector floating point unit particularly suited 3d graphics highlights architecture sh-4 based standard chips introduced around 1998 sh-3 sh-4 architectures support big-endian little-endian byte ordering bi-endian hitachi stmicroelectronics started collaborating early 1997 design sh-4 early 2001 formed ip company superh inc. going license sh-4 core companies developing sh-5 architecture first move superh 64-bit area 2003 hitachi mitsubishi electric formed joint-venture called renesas technology hitachi controlling 55 2004 renesas technology bought stmicroelectronics share ownership superh inc. licence sh cores renesas technology later became renesas electronics following merger nec electronics sh-5 design supported two modes operation shcompact mode equivalent user-mode instructions sh-4 instruction set shmedia mode different using 32-bit instructions sixty-four 64-bit integer registers simd instructions shmedia mode destination branch jump loaded branch register separately actual branch instruction allows processor prefetch instructions branch without snoop instruction stream combination compact 16-bit instruction encoding powerful 32-bit instruction encoding unique sh-5 arm processors 16-bit thumb mode arm licensed several patents superh thumb mips processors mips-16 mode however sh-5 differs backward compatibility mode 16-bit encoding rather 32-bit encoding evolution superh architecture still continues latest evolutionary step happened around 2003 cores sh-2 sh-4 getting unified superscalar sh-x core forms kind instruction set superset previous architectures today superh cpu cores architecture products renesas electronics merger hitachi mitsubishi semiconductor groups architecture consolidated around sh-2 sh-2a sh-3 sh-4 sh-4a platforms giving scalable family last sh-2 patents expired 2014 linuxcon japan 2015 j-core developers presented cleanroom reimplemention sh-2 isa extensions known j2 core due unexpired trademarks subsequently design walkthrough presented elc 2016 open source bsd licensed vhdl code j2 core proven xilinx fpgas asics manufactured tsmc 180 nm process capable booting µclinux j2 backwards isa compatible sh-2 implemented 5-stage pipeline separate instruction data memory interfaces machine generated instruction decoder supporting densely packed complex relative risc machines isa additional instructions easy add j2 implements instructions dynamic shift using sh-3 later instruction patterns extended atomic operations used threading primitives locking/interfaces symmetric multiprocessor support plans implement sh-2a j2+ sh-4 j4 instruction sets relevant patents expire 2016-2017 several features superh cited motivations designing new cores based architecture family superh cpu cores includes sh-2 32-bit risc architecture 16-bit fixed instruction length high code density features hardware multiply–accumulate mac block dsp algorithms five-stage pipeline sh-2 cache rom-less devices provides 16 general purpose registers vector-base-register global-base-register procedure register today sh-2 family stretches 32 kb on-board flash rom-less devices used variety different devices differing peripherals ethernet motor-control timer unit fast adc others sh-2a upgrade sh-2 core announced early 2006 launch 2007 sh-2a based sh7211 world fastest embedded flash microcontroller running 160 mhz later superseded several newer superh devices running 200 mhz new features sh-2a core include sh-2a family today spans wide memory field 16 kb includes many rom-less variations devices feature standard peripherals ethernet usb well application specific peripherals motor control timers tft controllers peripherals dedicated automotive powertrain applications sh-4 32-bit risc cpu developed primary use multimedia applications sega dreamcast naomi game systems includes much powerful floating point unit additional built-in functions along standard 32-bit integer processing 16-bit instruction size sh-4 features include fpu custom sh4 made casio sh7305 sh-5 64-bit risc cpu almost non-simulated sh-5 hardware ever released unlike still live sh-4 support sh-5 dropped gcc
[ 5012, 1447, 5371, 3948, 7527, 7529, 7533, 5737, 7541, 2567, 2929, 4694, 5042, 4336, 1481, 5055, 2226, 5762, 1867, 7581, 2248, 6148, 441, 2266, 5095, 7251, 6177, 4047, 4408, 5483, 3014, 1556, 2659, 5487, 7990, 6198, 1959, 6922, 7666, 515, ...
Test
896
4
XcodeGhost:xcodeghost xcodeghost variant xcodeghost modified versions apple xcode development environment considered malware software first gained widespread attention september 2015 number apps originating china harbored malicious code thought first large-scale attack apple app store according bbc problems first identified researchers alibaba leading e-commerce firm china 4000 apps infected according fireeye far 25 initially acknowledged apple including apps authors outside china security firm palo alto networks surmised network speeds slower china developers country looked local copies apple xcode development environment encountered altered versions posted domestic web sites opened door malware inserted high profile apps used ios devices even two months initial reports security firm fireeye reported hundreds enterprises still using infected apps xcodeghost remained persistent security risk firm also identified new variant malware dubbed xcodeghost among apps infected popular messaging app wechat netease app music 163 september 16 2015 chinese ios developer mentioned social network sina weibo malware xcode injects third party code apps compiled alibaba researchers published detailed information malware called xcodeghost september 17 2015 palo alto networks published several reports malware slow download speed apple servers chinese ios developers would download xcode third party websites baidu yun called baidu wangpan cloud storage service hosted baidu get copies co-workers attackers took advantage situation distributing compromised versions file hosting websites palo alto networks suspects malware available march 2015 attacker used compiler backdoor attack novelty attack modification xcode compiler however according documents leaked edward snowden cia security researchers sandia national laboratories claimed created modified version apple ’ proprietary software development tool xcode could sneak surveillance backdoors apps programs created using tool known versions xcodeghost add extra files original xcode application xcodeghost also modified linker link malicious files compiled app step reported compiling log xcode ide ios os x apps vulnerable xcodeghost xcodeghost compromised coreservices layer contains highly used features frameworks used app developer compiles application compromised version xcode malicious coreservices automatically integrated app without developer knowledge malicious files add extra code uiwindow class uidevice class uiwindow class object manages coordinates views app displays device screen uidevice class provides singleton instance representing current device instance attacker obtain information device assigned name device model operating-system name version xcodeghost remotely controlled via commands sent attacker command control server http data encrypted using des algorithm ecb mode encryption mode known weak encryption keys also found using reverse engineering attacker could perform man middle attack transmit fake http traffic device open dialog box open specific app example infected app launched either using iphone simulator inside xcode xcodeghost automatically collect device information malware encrypt data send command control server server differs version version xcodeghost palo alto networks able find three server urls last domain also used ios malware keyraider xcodeghost also able time infected app launched store data written ios clipboard malware also able modify data particularly dangerous user uses password management app xcodeghost also able open specific urls infected app launched since apple ios os x work inter-app communication url mechanism e.g 'whatsapp // 'facebook // 'itunes // attacker open apps installed compromised phone computer case infected os x app mechanism could harmful password management apps even phishing websites current known version xcodeghost prompt alert dialogs user device however since requires minor changes using uialertview class uialertviewstyleloginandpasswordinput property infected app display fake alert dialog box looks like normal apple id user credential check send input command control server among chinese apps ims app banking apps mobile carrier app maps stock trading apps sns apps games infected popular apps used world also infected wechat popular instant messaging app camscanner app scan document using smartphone camera winzip pangu team claimed counted 3,418 infected apps fox-it netherland-based security company reports found thousand malicious traffic outside china since article alibaba palo alto networks amazon took servers used xcodeghost baidu also removed malicious xcode installers cloud storage service september 18 2015 apple admitted existence malware began asking developers compromised apps compile apps clean version xcode submitting review pangu team released tool detect infected apps device like antivirus apps wo n't run device n't jailbroken apple allow antivirus apps ios app store apple advises xcode developers verify version xcode always gatekeeper activated machine
[ 4662, 6312, 1787, 74, 120, 7308, 8100, 6348, 3426 ]
Train
897
9
NetLogo:netlogo netlogo programming language integrated development environment ide modeling agent-based netlogo designed uri wilensky spirit programming language logo low threshold ceiling teaches programming concepts using agents form turtles patches links observer netlogo designed multiple audiences mind particular teaching children education community domain experts without programming background model related phenomena many scientific articles published using netlogo netlogo environment enables exploration emergent phenomena comes extensive models library including models variety domains economics biology physics chemistry psychology system dynamics netlogo allows exploration modifying switches sliders choosers inputs interface elements beyond exploring netlogo allows authoring new models modifying extant models netlogo open source freely available netlogo website use wide variety educational contexts elementary school graduate school many teachers make use netlogo curricula netlogo designed authored uri wilensky director northwestern university center connected learning computer-based modeling ccl several books published netlogo books available print include books available online include several massive open online courses offered use netlogo assignments and/or demonstrations netlogo free open-source software released gnu general public license gpl commercial licenses also available written scala java runs java virtual machine jvm core hybrid interpreter/compiler partially compiles user code jvm bytecode netlogo web version runs javascript instead jvm models may run web browser features desktop version simple multiagent model netlogo wolf-sheep predation model shown screenshot models population growth predator/prey system time following characteristics hubnet technology uses netlogo run participatory simulations classroom participatory simulation whole group users takes part enacting behavior system using individual device networked computer texas instruments graphing calculator user acts separate independent agent one example hubnet activity tragedy commons models economic problem called tragedy commons
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 45, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 2619, 6507, 795, 6876, 4033, 6888, 1557, 5494, 5501, 6210, 144, 4074, 154, 4085, 7298, 5515, 8025, 3749, 5883, 6...
Validation
898
8
PDFescape:pdfescape pdfescape advertising- fee-supported web-based pdf editor program written javascript html css asp features pdf editing form filling page arrangement printing saving form publishing premium ad free version available fee form publishing requires additional fees pdfescape offers online storage pdf documents pdfescape used common browsers firefox internet explorer safari chrome opera first release published february 20 2007 pdfescape reviewed websites cnet lifehacker pdf documents opened within application imported web interface open documents modified using set tools similar limited found pdf applications adobe acrobat following features available
[ 2451, 5984, 3915, 5571, 6015, 84 ]
Test
899
5
Multi-link_trunking:multi-link trunking multi-link trunking mlt link aggregation port trunking technology developed nortel 1999 allows grouping several physical ethernet links one logical ethernet link provide fault-tolerance high-speed links routers switches servers using technology allows enables use several links 2 8 combined create increased bandwidth several fail-over paths produces server switch switch switch connections 8 times faster past redundant links unused due spanning tree ’ loop protection fault-tolerant design important aspect multi-link trunking technology one one link fail mlt technology automatically redistribute traffic across remaining links automatic redistribution accomplished less half second typically less 100 millisecond outage noticed end users high speed recovery required many critical networks outages cause loss life large monetary losses critical networks combining mlt technology distributed split multi-link trunking dsmlt split multi-link trunking smlt r-smlt technologies create networks support critical applications general limitation standard mlt physical ports link aggregation group must reside switch smlt dsmlt r-smlt technologies removes limitation allowing physical ports split two switches split multi-link trunking smlt layer-2 link aggregation technology computer networking originally developed nortel enhancement standard multi-link trunking mlt defined ieee 802.3ad link aggregation mlt allows multiple physical network links two network switches another device could another switch network device server treated single logical link load balance traffic across available links packet needs transmitted one physical links selected based load-balancing algorithm usually involving hash function operating source destination media access control mac address information real-world network traffic generally results effective bandwidth logical link equal sum bandwidth individual physical links redundant links unused due spanning tree ’ loop protection used full potential general limitation standard link aggregation mlt etherchannel physical ports link aggregation group must reside switch smlt dsmlt rsmlt protocols remove limitation allowing physical ports split two switches allowing creation active load sharing high availability network designs meet five nines availability requirements two switches smlt split known aggregation switches form logical cluster appears end smlt link single switch split may one ends mlt ends link split resulting topology referred smlt square cross-connect diagonally opposite aggregation switches smlt mesh aggregation switch smlt connection aggregation switches pair one end split topology referred smlt triangle smlt triangle end link split need support smlt allows non-avaya devices including third-party switches servers benefit smlt requirement ieee 802.3ad static mode must supported key operation smlt inter-switch trunk ist ist standard mlt connection aggregation switches allows exchange information regarding traffic forwarding status individual smlt links smlt connection aggregation switches standard mlt individual port smlt identifier associated given smlt connection smlt id must configured peer aggregation switches example one switch receives response arp request end station port part smlt inform peer switch across ist request peer update arp table record pointing connection corresponding smlt id general normal network traffic traverse ist unless path reach host connected peer switch ensuring devices smlt connections aggregation switches traffic never needs traverse ist total forwarding capacity switches cluster also aggregated communication peer switches across ist allows unicast multicast routing information exchanged allowing protocols open shortest path first ospf protocol independent multicast-sparse mode pim-sm operate correctly use smlt allows traffic load-balanced across links aggregation group also allows traffic redistributed quickly event link switch failure general failure one component results traffic disruption lasting less half second normal less 100 millisecond making smlt appropriate environments running time- loss-sensitive applications voice video network using smlt often longer necessary run spanning tree protocol kind since logical bridging loops introduced presence ist eliminates need spanning tree reconvergence root-bridge failovers failure scenarios causes interruptions network traffic longer time-sensitive applications able cater smlt supported within following avaya ethernet routing switch ers virtual services platform vsp product families ers 1600 ers 5500 ers 5600 ers 7000 ers 8300 ers 8800 ers 8600 mers 8600 vsp 9000 smlt fully interoperable devices supporting standard mlt ieee 802.3ad static mode routed-smlt r-smlt computer networking protocol developed nortel enhancement split multi-link trunking smlt enabling exchange layer 3 information peer nodes switch cluster resiliency simplicity l3 l2 many cases core network convergence time failure dependent length time routing protocol requires successfully converge change re-route traffic around fault depending specific routing protocol convergence time cause network interruptions ranging seconds minutes r-smlt protocol works smlt distributed split multi-link trunking dsmlt technologies provide sub-second failover normally less 100 milliseconds outage noticed end users high speed recovery required many critical networks outages cause loss life large monetary losses critical networks rsmlt routing topologies providing active-active router concept core smlt networks protocol supports networks designed smlt dsmlt triangles squares smlt dsmlt full mesh topologies routing enabled core vlans r-smlt takes care packet forwarding core router failures works following protocol types ip unicast static routes rip1 rip2 ospf bgp ipx rip r-smlt supported avaya ethernet routing switch ers 8600 ers 8800 vsp9000 ers 8300 mers 8600 products distributed multi-link trunking dmlt distributed mlt proprietary computer networking protocol designed nortel networks owned extreme networks used load balance network traffic across connections also across multiple switches modules chassis protocol enhancement multi-link trunking mlt protocol dmlt allows ports trunk mlt span multiple units stack switches span multiple cards chassis preventing network outages one switch stack fails card chassis fails united states patent 6496502 distributed split multi-link trunking dsmlt distributed smlt computer networking technology developed nortel enhance split multi-link trunking smlt protocol dsmlt allows ports trunk span multiple units stack switches span multiple cards chassis preventing network outages one switch stack fails one card chassis fails fault-tolerance important aspect distributed split multi-link trunking dsmlt technology one switch port one link fail dsmlt technology automatically redistribute traffic across remaining links automatic redistribution accomplished less half second typically less 100 milliseconds outage noticed end users high speed recovery required many critical networks outages cause loss life large monetary losses critical networks combining multi-link trunking mlt dmlt smlt dsmlt r-smlt technologies create networks support critical networks smlt supported avaya ethernet routing switch 1600 5500 8300 ers 8600 mers 8600 vsp-7000 vsp-9000 products
[ 6691, 883, 2650, 4926, 6927, 7888, 899, 2534, 3797, 7095 ]
Test
900
2
HP-UX:hp-ux hp-ux hewlett packard unix hewlett packard enterprise proprietary implementation unix operating system based unix system v initially system iii first released 1984 recent versions support hp 9000 series computer systems based pa-risc instruction set architecture hp integrity systems based intel itanium architecture earlier versions hp-ux supported hp integral pc hp 9000 series 200 300 400 computer systems based motorola 68000 series processors well hp 9000 series 500 computers based hp proprietary focus architecture hp-ux first unix offer access control lists file access permissions alternative standard unix permissions system hp-ux also among first unix systems include built-in logical volume manager hp long partnership veritas software uses vxfs primary file system one six commercial operating systems versions certified open group unix 03 standard others macos solaris inspur k-ux huawei euleros aix hp-ux 11i offers common shared disks clustered file system hp serviceguard cluster solution hp-ux hp global workload management adjusts workloads optimize performance integrates instant capacity demand installed resources paid 30-minute increments needed peak workload demands hp-ux offers operating system-level virtualization features hardware partitions isolated os virtual partitions cell-based servers hp integrity virtual machines hpvm integrity servers hpvm supports guests running hp-ux 11i v3 hosts – guests run linux windows openvms 8.4 hp-ux hp supports online vm guest migration encryption secure guest contents migration hp-ux 11i v3 scales follows superdome 2 32 intel itanium 9560 processors 11i v2 release introduced kernel-based intrusion detection strong random number generation stack buffer overflow protection security partitioning role-based access management various open-source security tools hp classifies operating system security features three categories data system identity release 6.x together 3.x introduced context dependent files cdf feature method allowing fileserver serve different configurations binaries even architectures different client machines heterogeneous environment directory containing files suid bit set made hidden ordinary root processes normal use scheme sometimes exploited intruders hide malicious programs data cdfs cdf filesystem dropped release 10.0 hp-ux operating systems supports variety pa-risc systems 11.0 added support integrity-based servers transition pa-risc itanium hp-ux 11i v1.5 first version supported itanium introduction hp-ux 11i v2 operating system supported architectures hp-ux 11i supports hp integrity servers hp bl server blade family servers use intel itanium architecture hp-ux 11i v2 11i v3 support hp cx series servers cx stands carrier grade used mainly telco industry -48v dc support nebs certified systems contain itanium mad6m processors discontinued hp-ux supports hp rx series servers prior release hp-ux version 11.11 hp used decimal version numbering scheme first number giving major release number following decimal showing minor release 11.11 hp made marketing decision name releases 11 followed v decimal-number version intended indicate os internet-enabled effective result dual version-numbering scheme hp bundles hp-ux 11i programs packages call operating environments oes following lists currently available hp-ux 11i v3 oes
[ 1807, 5362, 4659, 1077, 4670, 6085, 1081, 5735, 726, 26, 5048, 6457, 4344, 2589, 5060, 1493, 759, 7930, 3998, 1882, 1130, 7581, 7213, 2246, 1134, 5079, 4733, 6854, 4736, 6149, 5789, 443, 5447, 4018, 3680, 1522, 4751, 99, 2278, 1923, 264...
Test
901
7
JanusGraph:janusgraph janusgraph open source distributed graph database linux foundation janusgraph available apache license 2.0 project supported ibm google hortonworks janusgraph supports various storage backends apache cassandra apache hbase google cloud bigtable oracle berkeleydb scalability janusgraph depends underlying technologies used janusgraph example using apache cassandra storage backend scaling multiple datacenters provided box janusgraph supports global graph data analytics reporting etl integration big data platforms apache spark apache giraph apache hadoop janusgraph supports geo numeric range full-text search via external index storages elasticsearch apache solr apache lucene janusgraph native integration apache tinkerpop graph stack gremlin graph query language gremlin graph server gremlin applications janusgraph fork titandb graph database developed since 2012 janusgraph available apache software license 2.0 contributions individual organisation must sign cla paper
[ 5455, 4511, 894, 4303, 3542, 5863, 1105 ]
Validation
902
6
Comparison_of_encrypted_external_drives:comparison encrypted external drives technical feature comparison commercial encrypted external drives
[ 2529, 2399, 578 ]
Test
903
3
Perry_Mason:_The_Case_of_the_Mandarin_Murder:perry mason case mandarin murder perry mason case mandarin murder interactive fiction computer game graphics game published telarium formerly known trillium subsidiary spinnaker software 1985 game based popular tv series perry mason starring raymond burr played fictional defense attorney name created erle stanley gardner player must save client laura knapp convicted murder husband victor antic amiga 1985 called perry mason major breakthrough interactive fiction
[ 6380, 4473 ]
Test
904
4
Howard_Schmidt:howard schmidt howard anthony schmidt october 5 1949 – march 2 2017 partner tom ridge ridge schmidt cyber llc consultancy company field cybersecurity cyber-security coordinator obama administration operating executive office president united states announced retirement position may 17 2012 effective end month one schmidt leading policy objectives development national strategy trusted identities cyberspace sought enable private industry create electronic identities relied upon cyberspace similar way businesses rely combination driver licenses credit cards authenticate identities physical space prior joining obama administration schmidt served president information security forum president ceo r h security consulting llc founded may 2005 also international president information systems security association chairman board finnish security company codenomicon american security company fortify software international information systems security certification consortium commonly known isc ² october 2008 named one 50 influential people business readers editors baseline magazine schmidt died brain cancer march 2 2017 home muskego wisconsin schmidt held bachelor science degree business administration 1994 master arts degree organizational management 1998 university phoenix also holds honorary doctorate degree humane letters schmidt certifications include cissp cism professor practice georgia institute technology gtisc professor research idaho state university adjunct distinguished fellow carnegie mellon cylab distinguished fellow ponemon institute schmidt began government service united states air force 1967 studied chemical weapons high explosives nuclear weapons attending munitions school 1968 1974 schmidt completed three tours duty southeast asia vietnam war left active military duty 1974 started civil service career gila bend air force auxiliary field since renamed barry m. goldwater air force range served chief transportation deputy director resource management 1982 served arizona air national guard 161st communications squadron based phoenix international airport 1989 1998 schmidt city police officer 1983 1994 chandler police department arizona served swat team organized crime drug enforcement unit formed led special enforcement team 1994 took position fbi national drug intelligence center headed computer exploitation team working fbi 1994 schmidt joined air force office special investigations afosi computer forensic lab computer crime information warfare division supervisory special agent director 1996 serving position established first dedicated computer forensic lab government basis formation defense computer forensic laboratory dcfl 1998 schmidt transferred u.s. army reserves special agent criminal investigation division assigned computer crime investigations unit cciu also served 315th mp det cid ft. lawton washington testified expert witness federal military courts areas computer crime computer forensics internet crime may 2003 schmidt retired white house 31 years public service local federal government 9/11 attacks appointed president bush vice chair president critical infrastructure protection board special adviser cyberspace security white house december 2001 white house assisted creation us national strategy secure cyberspace assumed role chair january 2003 retirement may 2003 joined ebay tuesday december 22 2009 schmidt named united states top computer security advisor president barack obama previously schmidt served cyber-adviser president george w. bush white house served chief security strategist us cert partners program national cyber security division carnegie mellon university support department homeland security served vice president chief information security officer chief security strategist ebay may 2012 schmidt announced would stepping white house cybersecurity coordinator end month citing desire focus family pursue teaching cyber field replaced michael daniel chief white house budget office intelligence branch schmidt also active career private industry professional organizations 1997 schmidt joined microsoft director information security chief information security officer ciso chief security officer cso co-founder trustworthy computing security strategies group schmidt served executive committee information technology sector coordination council memberships include high technology crime investigation association american academy forensic sciences international association chiefs police testified congressional committees computer security cyber crime featured various worldwide television radio shows including bbc abc cnn cnbc fox tv talking cyber-security investigations technology co-author black book corporate security author patrolling cyberspace lessons learned lifetime data security schmidt first president information technology information sharing analysis center former executive board member international organization computer evidence served co-chairman federal computer investigations committee served board member cybercrime advisory board national white collar crime center distinguished special lecturer university new conn. teaching graduate certificate course forensic computing also taught courses fbi dea use computers law enforcement investigations served augmented member president committee advisors science technology formation institute information infrastructure protection schmidt appointed information security privacy advisory board advise national institute standards technology secretary commerce director office management budget information security privacy issues pertaining federal government information systems schmidt also international multilateral partnership cyber threats impact international advisory board see list computing information-security related articles
[ 4969, 7192, 6004, 6143, 1888, 6488, 284, 2140, 6756, 7486 ]
Test
905
9
Hume_(programming_language):hume programming language hume functionally based programming language developed university st andrews heriot-watt university scotland since year 2000 language name acronym meaning 'higher-order unified meta-environment honorific 18th century philosopher david hume targets real-time embedded systems aiming produce design highly abstract yet still allow precise extraction time space execution costs allows programmers guarantee bounded time space demands executing programs hume combines functional programming ideas ideas finite state automata automata used structure communicating programs series boxes box maps inputs outputs purely functional way using high-level pattern-matching structured series levels exposes different machine properties hume language design attempts maintain essential properties features required embedded systems domain especially transparent time space costing whilst incorporating high level program abstraction possible aims target applications ranging simple micro-controllers complex real-time systems smartphones ambitious goal requires incorporating low-level notions interrupt handling high-level ones data structure abstraction etc course systems programmed widely differing ways language design accommodate varying requirements hume three-layer language outer static declaration/metaprogramming layer intermediate coordination layer describing static layout dynamic processes associated devices inner layer describing process dynamic mapping patterns expressions inner layer stateless purely functional rather attempting apply cost modeling correctness proving technology existing language framework either directly altering general language e.g rtsj approach taken hume designers design hume way formal models proofs definitely constructed hume structured series overlapping language levels level adds expressibility expression semantics either loses desirable property increases technical difficulty providing formal correctness/cost models interpreter compiler versions differ bit coordination system wires boxes dataflow programming style expression language haskell-like message passing concurrency system remembers jocaml join patterns polyphonic c sharp chords channels asynchronous scheduler built-in continuously checks pattern-matching boxes turn putting hold boxes copy outputs busy input destinations
[ 740, 2740 ]
Test
906
1
Database_security:database security database security concerns use broad range information security controls protect databases potentially including data database applications stored functions database systems database servers associated network links compromises confidentiality integrity availability involves various types categories controls technical procedural/administrative physical database security specialist topic within broader realms computer security information security risk management security risks database systems include example ross j. anderson often said nature large databases never free abuse breaches security large system designed ease access becomes insecure made watertight becomes impossible use sometimes known anderson rule many layers types information security control appropriate databases including databases largely secured hackers network security measures firewalls network-based intrusion detection systems network security controls remain valuable regard securing database systems programs/functions data within arguably become critical networks increasingly opened wider access particular access internet furthermore system program function data access controls along associated user identification authentication rights management functions always important limit cases log activities authorized users administrators words complementary approaches database security working outside-in inside-out many organizations develop baseline security standards designs detailing basic security control measures database systems may reflect general information security requirements obligations imposed corporate information security policies applicable laws regulations e.g concerning privacy financial management reporting systems along generally accepted good database security practices appropriate hardening underlying systems perhaps security recommendations relevant database system software vendors security designs specific database systems typically specify security administration management functions administration reporting user access rights log management analysis database replication/synchronization backups along various business-driven information security controls within database programs functions e.g data entry validation audit trails furthermore various security-related activities manual controls normally incorporated procedures guidelines etc relating design development configuration use management maintenance databases two types privileges important relating database security within database environment system privileges object privileges system privileges allow user perform administrative actions database object privileges allow use certain operations database objects authorized another user examples include usage select insert update references principal least privilege separation duties databases fall internal controls data used public reporting annual reports etc subject separation duties meaning must segregation tasks development production task validated via code walk-through/fresh eyes third person writing actual code database developer able execute anything production without independent review documentation/code work performed typically role developer pass code dba however given cutbacks resulted economic downturn dba might readily available dba involved important minimum peer conduct code review ensures role developer clearly separate another point internal control adherence principle providing least amount privileges especially production allow developers access get work done much safer use impersonation exceptions require elevated privileges e.g execute sudo temporarily often developers may dismiss “ overhead ” path coding glory please aware however dbas must considered responsible de facto data stewards organization must comply regulations law one technique evaluating database security involves performing vulnerability assessments penetration tests database testers attempt find security vulnerabilities could used defeat bypass security controls break database compromise system etc database administrators information security administrators may example use automated vulnerability scans search misconfiguration controls often referred 'drift within layers mentioned along known vulnerabilities within database software results scans used harden database improve security close specific vulnerabilities identified vulnerabilities often remain unrecognized unaddressed database environments security critical continual monitoring compliance standards improves security security compliance requires amongst procedures patch management review management permissions especially public granted objects within database database objects may include table objects listed table link permissions granted sql language commands objects considered process compliance monitoring similar vulnerability assessment except results vulnerability assessments generally drive security standards lead continuous monitoring program essentially vulnerability assessment preliminary procedure determine risk compliance program process on-going risk assessment compliance program take consideration dependencies application software level changes database level may effects application software application server application level authentication authorization mechanisms may effective means providing abstraction database layer primary benefit abstraction single sign-on capability across multiple databases platforms single sign-on system stores database user credentials authenticates database behalf user another security layer sophisticated nature includes real-time database activity monitoring either analyzing protocol traffic sql network observing local database activity server using software agents use agents native logging required capture activities executed database server typically include activities database administrator agents allow information captured fashion disabled database administrator ability disable modify native audit logs analysis performed identify known exploits policy breaches baselines captured time build normal pattern used detection anomalous activity could indicative intrusion systems provide comprehensive database audit trail addition intrusion detection mechanisms systems also provide protection terminating user sessions and/or quarantining users demonstrating suspicious behavior systems designed support separation duties sod typical requirement auditors sod requires database administrators typically monitored part dam able disable alter dam functionality requires dam audit trail securely stored separate system administered database administration group addition using external tools monitoring auditing native database audit capabilities also available many database platforms native audit trails extracted regular basis transferred designated security system database administrators do/should access ensures certain level segregation duties may provide evidence native audit trails modified authenticated administrators conducted security-oriented senior dba group read rights production turning native impacts performance server generally native audit trails databases provide sufficient controls enforce separation duties therefore network and/or kernel module level host based monitoring capabilities provides higher degree confidence forensics preservation evidence good database security program includes regular review privileges granted user accounts accounts used immediate processes individual accounts two-factor authentication system improves security adds complexity cost accounts used automated processes require appropriate controls around password storage sufficient encryption access controls reduce risk compromise conjunction sound database security program appropriate disaster recovery program ensure service interrupted security incident incident results outage primary database environment example replication primary databases sites located different geographical regions incident occurs database forensics employed determine scope breach identify appropriate changes systems processes
[ 1905, 3932, 6604, 7330, 7341, 3691, 6345, 5561, 298, 5217, 2390, 6098, 651, 2566, 4054, 6636, 2663, 3794, 2124, 6737, 6739, 3119, 3801, 7999, 5943, 5149, 3727, 2054, 6932, 6386, 6042, 684, 6390, 7937, 7303, 6144, 4457, 6320, 4554, 1902, ...
Validation
907
4
Bruce_Schneier:bruce schneier bruce schneier born january 15 1963 american cryptographer computer security professional privacy specialist writer schneier fellow berkman center internet society harvard law school program fellow new america foundation open technology institute working ibm since acquired resilient systems schneier cto left end june 2019 author several books general security topics computer security cryptography schneier also contributing writer guardian news organization bruce schneier son martin schneier brooklyn supreme court judge grew flatbush neighborhood brooklyn new york attending p.s 139 hunter high school receiving physics bachelor degree university rochester 1984 went american university washington d.c. got master degree computer science 1988 awarded honorary ph.d university westminster london england november 2011 award made department electronics computer science recognition schneier 'hard work contribution industry public life schneier founder chief technology officer bt managed security solutions formerly counterpane internet security inc 1994 schneier published applied cryptography details design use implementation cryptographic algorithms 2010 published cryptography engineering focused use cryptography real systems less internal design also written books security broader audience 2000 schneier published secrets lies digital security networked world 2003 2012 liars outliers enabling trust society needs thrive 2015 data goliath hidden battles collect data control world schneier writes freely available monthly internet newsletter computer security issues crypto-gram well security weblog schneier security blog focuses latest threats thoughts weblog started way publish essays appeared crypto-gram making possible others comment stories still current time newsletter became monthly email version blog re-edited re-organized schneier frequently quoted press computer security issues pointing flaws security cryptographic implementations ranging biometrics airline security september 11 attacks schneier revealed blog december 2004 issue sigcse bulletin three pakistani academics khawaja amer hayat umar waqar anis s. tauseef-ur-rehman international islamic university islamabad pakistan plagiarized article written schneier got published academics subsequently plagiarized another article ville hallivuori real-time transport protocol rtp security well schneier complained editors periodical generated minor controversy editor sigcse bulletin removed paper website demanded official letters admission apology schneier noted blog international islamic university personnel requested close comments blog entry schneier refused close comments blog delete posts deemed incoherent hostile schneier warns misplaced trust blockchain lack use cases calling blockchain solution search problem blockchain shift trust people institutions trust technology need trust cryptography protocols software computers network need trust absolutely ’ often single points failure goes say cryptocurrencies useless used speculators looking quick riches schneier peer review expert analysis important security cryptographic systems mathematical cryptography usually weakest link security chain effective security requires cryptography combined things term schneier law coined cory doctorow 2004 speech law phrased attributes bruce schneier wrote 1998 anyone clueless amateur best cryptographer create algorithm ca n't break even hard hard creating algorithm one else break even years analysis similar sentiments expressed others codebreakers david kahn states false ideas firmly gripped minds many intelligent men one tried could invent cipher one could break words secret writing july 1841 edgar allan poe stated persons made believe quite easy thing invent method secret writing shall baffle investigation yet may roundly asserted human ingenuity concoct cipher human ingenuity resolve schneier critical digital rights management drm said allows vendor increase lock-in proper implementation control-based security user via trusted computing difficult security thing control schneier proponent full disclosure i.e making security issues public schneier said homeland security money spent intelligence investigation emergency response defending broad threat terrorism generally better focusing specific potential terrorist plots according schneier analysis intelligence data difficult one better ways deal global terrorism human intelligence advantages automated computerized analysis increasing amount intelligence data gathered help improve analysis process agencies designed around fighting cold war may culture inhibits sharing information practice sharing information important less security threat dealing decentralized poorly funded adversaries al qaeda regarding petn—the explosive become terrorists weapon choice—schneier written swabs dogs detect also believes changes airport security since 11 september 2001 done harm good defeated kip hawley former head transportation security administration economist online debate 87 13 regarding issue widely credited coining term security theater describe changes fellow berkman center internet society harvard university schneier exploring intersection security technology people emphasis power movie-plot threat term schneier coined refers specific dramatic terrorist attack scenarios reminiscent behavior terrorists movies rather terrorists actually real world security measures created protect movie plot threats provide higher level real security preparation pays terrorists choose one particular avenue attack may even feasible real-world terrorists would also likely notice highly specific security measures simply attack way specificity movie plot threats gives power public imagination however even extremely unrealistic security theater countermeasures may receive strong support public legislators among many examples movie plot threats schneier described banning baby carriers subways fear may contain explosives starting april 2006 schneier annual contest create fantastic movie-plot threat schneier criticized security approaches try prevent malicious incursion instead arguing designing systems fail well important designer system underestimate capabilities attacker technology may make possible future things possible present kerckhoffs principle need one parts cryptographic system remain secret increases fragility system whether details system obscured depends upon availability persons make use information beneficial uses versus potential attackers misuse information schneier karen cooper nominated 2000 hugo award category best related book minicon 34 restaurant guide work originally published minneapolis science fiction convention minicon gained readership internationally science fiction fandom wit good humor schneier involved creation many cryptographic algorithms schneier board member electronic frontier foundation
[ 1811, 4759, 2823, 4930, 1821, 1078, 1353, 2912, 6411, 1455, 1827, 6894, 4772, 6430, 208, 1647, 2303, 1651, 1480, 6823, 7282, 753, 3037, 4805, 7662, 5600, 1587, 762, 5333, 5773, 6938, 7120, 1043, 2961, 6049, 5254, 7493, 2883, 433, 1320, ...
Validation
908
2
Bill_Joy:bill joy william nelson joy born november 8 1954 american computer engineer co-founded sun microsystems 1982 along scott mcnealy vinod khosla andy bechtolsheim served chief scientist company 2003 played integral role early development bsd unix graduate student berkeley original author vi text editor also wrote 2000 essay future n't need us expressed deep concerns development modern technologies joy born detroit suburb farmington hills michigan william joy school vice-principal counselor ruth joy earned bachelor science electrical engineering university michigan master science electrical engineering computer science university california berkeley 1979 uc berkeley graduate student worked fabry computer systems research group csrg berkeley software distribution bsd version unix operating system initially worked pascal compiler left berkeley ken thompson visiting university joy started graduate work later moved improving unix kernel also handled bsd distributions notable contributions ex vi editors c shell joy prowess computer programmer legendary oft-told anecdote wrote vi editor weekend joy denies assertion accomplishments also sometimes exaggerated eric schmidt ceo novell time inaccurately reported interview pbs documentary nerds 2.0.1 joy personally rewritten bsd kernel weekend according salon article early 1980s darpa contracted company bolt beranek newman bbn add tcp/ip berkeley unix joy instructed plug bbn stack berkeley unix refused low opinion bbn tcp/ip joy wrote high-performance tcp/ip stack according john gage rob gurwitz working bbn time disputes version events 1982 firm going six months joy brought full co-founder status sun microsystems sun joy inspiration development nfs sparc microprocessors java programming language jini/javaspaces jxta 1986 joy awarded grace murray hopper award acm work berkeley unix operating system september 9 2003 sun announced joy leaving company taking time consider next move definite plans 1999 joy co-founded venture capital firm highbar ventures two sun colleagues andy bechtolsheim roy thiele-sardiña january 2005 named partner venture capital firm kleiner perkins caufield byers joy made several investments green energy industries even though credentials field said method look something seems like good idea assume true 2011 inducted fellow computer history museum work berkeley software distribution bsd unix system co-founding sun microsystems 2000 joy gained notoriety publication article wired magazine future n't need us declared described neo-luddite position convinced growing advances genetic engineering nanotechnology would bring risks humanity argued intelligent robots would replace humanity least intellectual social dominance relatively near future supports promotes idea abandonment gnr genetics nanotechnology robotics technologies instead going arms race negative uses technology defense negative uses good nano-machines patrolling defending grey goo bad nano-machines stance broad relinquishment criticized technologists technological-singularity thinker ray kurzweil instead advocates fine-grained relinquishment ethical guidelines joy also criticized american spectator characterized joy essay possibly unwitting rationale statism bar-room discussion technologies ray kurzweil started set joy thinking along path states essay conversation became surprised serious scientists considering possibilities likely even astounded felt lack consideration contingencies bringing subject acquaintances states alarmed felt fact although many people considered futures possible probable shared serious concern dangers seemed concern led in-depth examination issue positions others scientific community eventually current activities regarding despite venture capitalist investing gnr technology companies also raised specialty venture fund address dangers pandemic diseases h5n1 avian influenza biological weapons 2013 book makers author chris anderson credited joy establishing joy law based quip matter smartest people work someone else argument companies use inefficient process hiring best employees able hire law continuation friedrich hayek use knowledge society warned competition outside company would always potential greater company
[ 7514, 6794, 6085, 7535, 738, 2583, 1116, 418, 6477, 424, 6489, 3673, 443, 6505, 1923, 1185, 481, 2299, 4418, 1193, 7993, 2315, 6918, 851, 4441, 6577, 7678, 6583, 3751, 3077, 1258, 6977, 6263, 6270, 3457, 1279, 922, 2033, 6285, 5587, 594...
Test
909
4
Internet_censorship_and_surveillance_by_country:internet censorship surveillance country list internet censorship surveillance country provides information types levels internet censorship surveillance occurring countries around world detailed country country information internet censorship surveillance provided freedom net reports freedom house opennet initiative reporters without borders country reports human rights practices u.s. state department bureau democracy human rights labor ratings produced several organizations summarized well censorship country article freedom net reports provide analytical reports numerical ratings regarding state internet freedom countries worldwide countries surveyed represent sample broad range geographical diversity levels economic development well varying levels political media freedom surveys ask set questions designed measure country level internet digital media freedom well access openness digital means transmitting information particularly mobile phones text messaging services results presented three areas results three areas combined total score country 0 best 100 worst countries rated free 0 30 partly free 31 60 free 61 100 based totals starting 2009 freedom house produced nine editions report report 2010 reports generally cover period june may series reports issued 2007 2013 opennet initiative oni classified magnitude censorship filtering occurring country four areas activity magnitude level censorship classified follows classifications done following areas activity due legal concerns opennet initiative check filtering child pornography classifications focus technical filtering include types censorship 2010 opennet initiative documented internet filtering governments forty countries worldwide level filtering classified 26 countries 2007 25 countries 2009 41 separate countries classified two years seven found show evidence filtering egypt france germany india united kingdom united states one found engage pervasive filtering areas china 13 found engage pervasive filtering one areas 34 found engage level filtering one areas 10 countries classified 2007 2009 one reduced level filtering pakistan five increased level filtering azerbaijan belarus kazakhstan south korea uzbekistan four maintained level filtering china iran myanmar tajikistan december 2014 oni announced oni summarized global internet filtering data last updated 20 september 2013 12 march 2013 reporters without borders published special report internet surveillance report includes two new lists five state enemies internet named march 2013 bahrain china iran syria vietnam five corporate enemies internet named march 2013 amesys france blue coat systems u.s. gamma uk germany hacking team italy trovicor germany country reports human rights practices annual series reports human rights conditions countries throughout world among topics reports include information freedom speech press including internet freedom freedom assembly association arbitrary interference privacy family home correspondence reports prepared bureau democracy human rights labor within united states department state reports cover internationally recognized individual civil political worker rights set forth universal declaration human rights first report issued 1977 covering year 1976
[ 2488, 431, 5700, 731, 8191, 4196, 803, 4783, 6419, 1175 ]
Validation
910
4
Qihoo_360:qihoo 360 qihoo 360 approximate pronunciation chee-hoo full name qihoo 360 technology co. ltd. chinese internet security company known antivirus software 360 safeguard 360 mobile safe web browser mobile application store 360 mobile assistant founded zhou hongyi qi xiangdong june 2005 qihoo 360 claimed ≈500 million users internet security products 600 million users mobile antivirus products june 2014 company head office chaoyang district beijing qihoo 360 initiated business operations selling third-party antivirus software online soon afterwards realized potential freemium business model chinese market started providing antivirus products free charge short period time qihoo 360 security products gained popularity market share china current revenues generated leveraging massive user base online advertising services online games remote technical support system integration qihoo 360 main revenue sources include advertising space 360 startup page well revenue sharing independent games developers published games 360 mobile assistant revenue breakdown 2012 split revenue streams follows 67 advertising 31 internet value added services less 1 selling third party software revenues increased 96.0 167.9 million 2011 329.0 million 2012 january 2014 market cap 11.42b summer 2012 qihoo 360 entered smartphone market launching battleship phone together haier large chinese consumer electronics company qihoo 360 said haier provide hardware qihoo 360 focus customising software albeit main operating system android qihoo 360 received 220,000 pre-orders phone first day later 2012 qihoo 360 entered search market launching so.com thereby directly competing baidu dominant search engine china qihoo share unique visitors grew 10.52 sōu 搜 chinese means search july 18 2013 qihoo launched new search engine leidian.com aimed increasing presence mobile market end july 2013 qihoo early talks acquire sohu.com ’ sogou.com search engine around 1.4 billion early 2015 qihoo rebranded so.com search engine redirect haosou.com hao chinese means good haosou directly translated english means good search engine december 2013 company increased stake brazilian tech company psafe july 11 2014 company set venture capital vc fund silicon valley december 18 2015 qihoo 360 said agreed acquired group investors deal valued 9.3 billion july 15 2016 qihoo 360 announced finalization take-private transaction july 18 2016 qihoo 360 bought opera software us 600 million 4 november 2016 golden brick capital qihoo included completed acquisition qihoo described forbes confrontational litigious company due involvement various anti-competition lawsuits company involved lawsuits tencent starting 360 v. tencent dispute well companies baidu emiage sogou company accused anonymous overstating volume traffic site order attract advertisers antivirus testing companies av-comparatives austria germany av-test virus bulletin uk accused qihoo providing testing anti-virus equipped bitdefender engine consumer version uses qihoo qvm engine according documents released mozilla corporation qihoo appears acquired controlling interest previously israeli-run certificate authority startcom chain acquisitions including chinese-owned company wosign wosign also ca business wosign accused poor control misissuing certificates furthermore mozilla alleges wosign startcom violation obligations certificate authorities respect failure disclose change ownership startcom mozilla threatening take action protect users google stated chrome product longer trust default certificates signed startcom wosign roots starting chrome 61 mozilla stated firefox product longer trust default certificates signed startcom wosign roots starting firefox version 58 2012 whistleblower reported hidden backdoor 360 secure browser product director 360 secure browser tao weihua responded whoever mind beat dog always able find stick accused whistleblower smearing 360 behalf baidu whistleblower said worst professional response history independent analysis claim showed browser undeclared mechanism i.e. via extsmartwiz.dll connects server regular basis e.g. every 5 minutes allows download files type including executables server december 2017 chinese government acted curtail widespread webcasting live security-company-cameras private webcams ip camera footage voicing concerns violations privacy portrait rights sanctioning qihoo
[ 5452, 91, 4115, 5984, 5546, 7425, 3089, 4492, 1931, 4138, 385, 6005, 1838, 6006, 2296, 4689, 4783, 3111, 6540, 7087, 496, 6644, 5144, 7193, 3123, 142, 935, 1395, 3561, 7478, 5601, 6043, 6305, 8134, 4456, 6777, 4645, 7597, 1805, 88 ]
Test
911
5
Subcarrier_multiplexing:subcarrier multiplexing subcarrier multiplexing scm method combining multiplexing many different communications signals transmitted along single optical fiber scm also known scma subcarrier multiple access used passive optical network pon access infrastructures variant wavelength division multiplexing wdm scm follows different approach compared wdm wdm optical carrier modulated baseband signal typically hundred mbit/s scma infrastructure baseband data first modulated ghz wide subcarrier subsequently modulated optical carrier way signal occupies different portion optical spectrum surrounding centre frequency optical carrier receiving side normally happens commercial radio service receiver tuned correct subcarrier frequency filtering subcarriers operation multiplexing demultiplexing single subcarriers carried electronically conversion optical carrier done multiplexer side gives advantage pure wdm access due lower cost electrical components compared optical multiplexer scm disadvantage limited maximum subcarrier frequencies data rates available bandwidth electrical optical components therefore scm must used conjunction wdm order take advantage available fiber bandwidth used effectively lower-speed lower-cost multiuser systems
[ 5994, 3724, 2117 ]
Test
912
3
IBM_RS64:ibm rs64 ibm rs64 family microprocessors used late 1990s ibm rs/6000 as/400 servers microprocessors implement amazon powerpc-as instruction set architecture isa amazon superset powerpc instruction set addition special features powerpc specification mainly derived power2 original as/400 processor 64-bit start processors family optimized commercial workloads integer performance large caches branches feature strong floating point performance processors ibm power microprocessors family sibling rs64 family phased soon introduction power4 developed unite rs64 power families 1990 amazon project started create common architecture would host aix os/400 as/400 engineering team ibm designing risc instruction set replace cisc instruction set existing as/400 computers original design variant existing impi instruction set extended 64 bits given risc instructions speed computationally intensive commercial applications put as/400s ibm management wanted use powerpc resisted arguing existing 32/64-bit powerpc instruction set would enable viable transition os/400 software existing instruction set required extensions commercial applications as/400 eventually extension powerpc instruction set called amazon developed time rs/6000 developers broadly expanding product line include systems spanned low-end workstations mainframe competitor-large enterprise smp systems clustered rs/6000-sp2 supercomputing systems powerpc processors developed aim alliance suited low-end risc workstation small server space well mainframe large clustered supercomputing systems required performance reliability availability serviceability features processors designed apple power macs multiple processor designs required simultaneously meet requirements cost-focused apple power mac high-performance ras rs/6000 systems as/400 transition powerpc amazon extended support features well processors could designed use high-end rs/6000 as/400 machines project develop first processor bellatrix name star orion constellation also called amazon star bellatrix project extremely ambitious pervasive use self-timed pulse based circuits eda tools required support design strategy eventually terminated address technical workstation supercomputer engineering/scientific markets ibm austin home rs/6000s started developing time-to-market single-chip version power2 p2sc parallel development sophisticated 64-bit powerpc processor power2 extensions twin sophisticated maf floating point units power3/630 address rs/6000 commercial applications as/400 systems ibm rochester home as/400s started developing first high-end 64-bit powerpc processors as/400 extensions ibm endicott started developing low-end single-chip powerpc processor as/400 extensions 1995 ibm released cobra a10 processor first implementation powerpc as/400 advanced series systems single-chip processor running 50-77 mhz designed semi-custom methodology consequence time-to-market constraints die contains 4.7 million transistors measures 14.6 mm 14.6 mm 213 mm fabricated ibm cmos 5l process 0.5 µm four-layer-metal cmos process used 3.0 v power supply dissipated 17.7 w maximum 13.4 w minimum 77 mhz packaged 625-contact ceramic ball grid array cbga measured 32 mm 32 mm 1996 ibm released high-end 4-way smp multi-chip version called muskie a25 a30 as/400 systems ran 125-154 mhz manufactured bicmos fabrication process processors used as/400 machines rs64 apache introduced 1997 developed cobra muskie included complete powerpc isa therefore set used rs/6000 machines well as/400 systems featured 128 kb total on-die l1 cache 4 mb full speed off-chip l2 128 bit bus clock 125 mhz scaled 12 processor smp configuration ibm machines rs64 called a35 as/400 one time referred powerpc 625 defunct powerpc 620 powerpc 630 later renamed power3 manufactured bicmos fabrication process rs64-ii northstar introduced 262 mhz 1998 8 mb full speed l2 256 bit 6xx bus also used powerpc 620 power3 processor boards containing 4 rs64-ii could swapped machines designed similar 4-way rs64 boards avoiding fork lift upgrade rs64-ii contained 12.5 million transistors 162 mm² large drew 27 watts maximum power manufacturing changed 0.35 μm cmos fabrication rs64-ii first mass-market processor implement multithreading essentially chip stores state information 2 threads given time appears two processors os one logical processor runs called foreground thread thread encounters high latency event l2 cache miss etc background thread switched second logical processor os point view event less long latency event l1 miss etc thread switching occur background thread ready execute background thread also waiting miss thread switching occur ibm calls scheme coarse grained multithreading exactly thing simultaneous multithreading found later pentium 4 processors ibm paper notes coarse grained scheme better fit in-order architecture like rs64 rs64-ii called a50 as/400 systems rs64-iii pulsar introduced 1999 450 mhz key changes included larger 128 kib l1 instruction data caches improved branch prediction accuracy reduced branch misprediction penalties zero one cycle rs64-iii five-stage pipeline 256 bit wide l2 cache bus provided processor 14.4 gb/s bandwidth 8 mib l2 cache implemented 225 mhz ddr srams rs64-iii 34 million transistors die size 140 mm² manufactured 0.22 μm cmos 7s process six levels copper interconnect 2000 ibm launched refined version called istar manufactured soi fabrication process copper interconnects increased processor clock frequency 600 mhz first processor implemented process architecturally however istar identical pulsar rs64-iv sstar introduced 2000 600 mhz later increased 750 mhz 16 gb ddr l2 supported manner rs64-iii 19.2 gb/s bandwidth rs64-iv 44 million transistors 128 mm² large manufactured 0.18 μm process unlike power energy consumption remained low 15 watts per core time power line stagnated half clock speed competitors rs64 family top ibm large smp unix server line integer commercial workload performance rs-64 iv similar sun microsystems processors competed though floating point power comparable contemporary power3-ii remained reasonably competitive throughout lifecycle
[ 7327, 2719, 3348, 4661, 3936, 1075, 1346, 2458, 3440, 1083, 4408, 5652, 5737, 7361, 2845, 3708, 5042, 5665, 4702, 1199, 1386, 1388, 7099, 234, 2501, 239, 6474, 8125, 4815, 1131, 608, 3747, 2257, 3674, 5622 ]
Test
913
3
Socket_SP3:socket sp3 socket sp3 land grid array cpu socket designed amd supporting zen-based epyc server processors launched june 20 2017 socket tr4 also known socket sp3r2 used high-end desktop cpus physically identical normal sp3 socket tr4 socket prevent use cpus designed socket sp3 id pin
[ 2539, 6599, 2541, 5895, 4931, 7163, 3362, 1735, 5377, 6351, 7826, 2751, 6545, 6373, 5063, 6655, 6562, 3145, 4090, 866, 5436, 1143 ]
Test
914
3
Columbia_Data_Products:columbia data products columbia data products cdp company produced first ibm pc clones faltered market years later reinvented software development company columbia data products founded 1976 columbia maryland 1980 columbia data products made z80-based computers notably commander 900 series several models multiprocessors graphics capabilities cdp introduced mpc 1600 multi personal computer designed david howse june 1982 exact functional copy ibm pc model 5150 except bios clean roomed ibm published bus bios specifications wrongly assuming would enough encourage add-on market enough facilitate unlicensed copying design cdp advertisements stated mpc use software hardware originally intended ibm personal computer multi name hinted fact could also run multi-user operating system mp/m-86 mpc first ibm pc clone actually superior ibm original came 128 kib ram standard compared ibm 64 kib maximum mpc eight pc expansion slots one filled video card floppy disk drive interface built motherboard ibm pc contrast five expansion slots video card floppy disk controller taking two mpc also included two floppy disk drives one parallel two serial ports optional original ibm pc mpc followed portable pc 32 pound 15 kg luggable columbia vp 1983 may 1983 future computing ranked columbia compaq computers best category operationally compatible highest tier pc compatibility pc magazine june 1983 criticized mpc documentation reported good hardware software compatibility ibm pc byte november 1984 approved portable mpc-vp pc compatibility reporting ran microsoft flight simulator wordstar lotus 1-2-3 dbase ii popular applications without problems concluded computer one best overall bargains market today success mpc successors built cdp revenue us 9.4 million 1982 us 56 million 1983 ipo us 11 january 1983 february 1984 ibm announced introduction first portable pc thus putting pressure competitors niche well besides cdp already included compaq market leader segment well kaypro televideo corporation eagle computer columbia also released upgraded desktop models order compete ibm pc xt mpc 1600-4 briefly reviewed pc magazine april 1984 found worthy competitor xt without major compatibility problems even though hard drive controller quite different ibm xt based z80 microprocessor 64 kb ram emulating asic used ibm may 1984 richard t. gralton formerly vice-chairman savin corporation became president chief operating officer cdp competition pc market became intense june–july 1984 several companies including ibm announcing price cuts entering pc market well besides cdp pc clone companies like eagle also hard time result discussing perspectives smaller pc firms like cdp eagle corona data systems one morgan stanley analyst quoted june 9 1984 issue new york times saying operating 5 percent pretax margins room price cuts august 1984 cdp sales faltering cdp announced layoffs 114 employees maryland headquarters 189 employees second factory puerto rico april 1985 stock dropped us 0.50 delisted company filed chapter 11 protection may 1985 company taken private 1986 continues operate name 1987 cdp shifted emphasis hardware software developed licensed small computer system interface scsi software western digital wd supplier hard drive controllers 1991 wd sold scsi business future domain languished cdp headquartered altamonte springs florida company currently specializes data backup
[ 4751, 2983, 7467, 2390, 3255, 1052, 5784, 6380, 4277, 396, 3755 ]
Test
915
8
RESTHeart:restheart restheart java open source web api server built top mongodb database restheart exposes restful application programming interface crud operations following hypertext application language standard restheart leverages mongodb document-oriented nature creating automatic mapping mongodb internal storage data graph externally accessible http resources implementing model interaction compliant hateoas hypermedia engine application state representation state client process entirely driven http verbs like get post put patch delete etc restheart naturally fits architecture need invoke document-oriented data services top mongodb via http programmers n't want waste time building repetitive crud logic hand imagine following scenario want develop web application top data model following simple crud operations data modeled hierarchy documents mongodb perfect fit job already data mongodb instance want quickly build user interface restheart allows deploy run specialized independent micro-services already available via docker containers restheart fully implemented java 8 embeds undertow non-blocking http server one core components wildfly application server undertow flexible performant web server written java providing blocking non-blocking api ’ based nio undertow composition based architecture allows build web server combining small single purpose handlers gives flexibility choose full java ee servlet 3.1 container low level non-blocking handler anything undertow designed fully embeddable easy use fluent builder apis undertow ’ lifecycle completely controlled embedding application undertow sponsored jboss default web server wildfly application server multi-threaded process connects mongodb server exposes data operations via restful interface http protocol data clients interact database management system without need low level database driver mongodb resources databases collections documents automatically represented json variant hypertext application language restheart inherits undertow pipeline architecture specialized handlers chained together serve requests order provide additional application logic custom handlers bound /_logic url restheart also supports mongodb gridfs allows storing retrieving large binary files via http sitting client database restheart also provides gateway services authentication authorization data transformation validation
[ 3915, 5571, 3383 ]
Test
916
3
Rendezvous_with_Rama_(video_game):rendezvous rama video game rendezvous rama interactive fiction computer game graphics published telarium formerly known trillium subsidiary spinnaker software year 1984 developed cooperation arthur c. clarke based upon science fiction novel rendezvous rama german reviewers recognized complexity storyline various possibilities interaction non-player characters
[ 6380, 4473 ]
Test
917
4
Apache_Fortress:apache fortress apache fortress open source project apache software foundation subproject apache directory standards-based access management system written java provides role-based access control delegated administration password policy services ldap standards implemented fortress four separate components fortress first contributed 2011 openldap foundation moved apache directory project 2014
[ 7238, 894, 5728, 7805, 2741, 7444, 7896, 5571, 3463, 3542, 3204, 1286, 6821, 5054, 840, 1392, 3031, 5149, 3558, 5408, 5677, 3479, 5863, 6387, 5075, 6137, 7488, 7857, 5874, 3915, 1511, 5007, 1333 ]
Test
918
2
Michael_Meeks_(software_developer):michael meeks software developer michael meeks british software developer primarily known work gnome openoffice.org libreoffice major contributor gnome project long time working infrastructure associated applications particularly corba bonobo nautilus gnome accessibility hired ximian developer nat friedman miguel de icaza mid-2000 continuing novell suse collabora meeks free software hacker contributed lot time decreasing program load time created direct binding hashvals dynsort implementations gnu binutils glibc work focused making openoffice.org fork libreoffice start faster later subsumed -hash-style=gnu linking optimization work iogrind also allows applications profiled optimized first-time 'cold start far rapidly supports libreoffice evolution free software solutions document editing groupware previously worked quantel gaining expertise real time av editing playback achieved high performance focused hardware/software solutions meeks christian says made think moral aspects illegal use non-free software converted finally free software
[ 4662, 1227, 5690 ]
Test
919
4
Commission_on_Enhancing_National_Cybersecurity:commission enhancing national cybersecurity president commission enhancing national cybersecurity presidential commission formed april 13 2016 develop plan protecting cyberspace america economic reliance commission released final report december 2016 report made recommendations regarding intertwining roles military government administration private sector providing cyber security chairman donilon said report coverage unusual breadth issues deals report made sixteen major recommendations fifty-three specific action items broadly grouped six areas commission found strong authentication systems mandatory adequate cybersecurity government commercial systems private individuals commission also stressed remote identity proofing security internet things iot finding technicians know cybersecurity protect systems short supply commission recommended nationally supported training programs produce adequate workforce well increasing level expertise existing workforce commission highlighted importance partnerships government private sector powerful tool encouraging technology policies practices need secure grow digital economy page 2 criticised commission work lacking understanding cybersecurity cognizant cyber reality cost action items others found report constructive meaningful initial members commission incoming president trump indicated wants full review u.s. cyber protection policy
[ 1805, 5412 ]
Validation
920
9
ISWIM:iswim iswim abstract computer programming language family programming languages devised peter j. landin first described article next 700 programming languages published communications acm 1966 acronym stands see mean although implemented proved influential development programming languages especially functional programming languages sasl miranda ml haskell successors dataflow programming languages like lucid iswim imperative language functional core consisting syntactic sugaring lambda calculus added mutable variables assignment powerful control mechanism program point operator based lambda calculus iswim higher order functions lexically scoped variables operational semantics iswim defined using landin secd machine use call-by-value eager evaluation goal iswim look like mathematical notation landin abandoned algol semicolons statements codice_1 blocks replaced off-side rule scoping based indentation notationally distinctive feature iswim use “ ” clauses iswim program single expression qualified “ ” clauses auxiliary definitions including equations among variables conditional expressions function definitions along cpl iswim one first programming languages use “ ” clauses notable semantic feature ability define new data types possibly recursive sum products – done using somewhat verbose natural language style description apart notation amounts exactly algebraic data types found modern functional languages iswim variables explicit type declarations seems likely although explicitly stated 1966 paper landin intended language dynamically typed like lisp unlike algol also possible mind develop form type inference direct implementation iswim attempted art evan pal john c. reynolds gedanken captured landin concepts including powerful transfer-of-control operations dynamically typed milner ml may considered equivalent without j operator type inference another line descent iswim strip imperative features assignment j operator leaving purely functional language becomes possible switch lazy evaluation path led programming languages sasl krc kent recursive calculator hope miranda haskell clean
[ 6507, 7152, 4573, 3944, 4405, 7256, 2740, 7277, 2764, 1114, 3895, 7391, 5164, 5073, 7032, 4543, 7417 ]
Test
921
2
Delegated_administration:delegated administration computing delegated administration delegation control describes decentralization role-based-access-control systems many enterprises use centralized model access control large organizations model scales poorly teams become burdened menial role-change requests requests — often used hire fire role-change events occur organization — incur high latency times suffer weak security practices delegation involves assigning person group specific administrative permissions organizational unit information management used create teams perform specific limited tasks changing information within user directory database goal delegation create groups minimum permissions grant ability carry authorized tasks granting extraneous/superfluous permissions would create abilities beyond authorized scope work one best practice enterprise role management entails use ldap groups delegated administration refers decentralized model role group management model application process owner creates manages delegates management roles centralized team simply operates service directory metadirectory web interface administration related components allowing application business process owner create manage delegate groups supports much scalable approach administration access rights metadirectory environment roles groups could also pushed synchronized platforms example groups synchronized native operating systems microsoft windows use access control list protects folder file metadirectory distributing groups central directory central repository groups enterprise applications e.g. peoplesoft support ldap groups inherently applications capable using ldap call directory authorization activities web-based group management tools — used delegated administration — therefore provide following capabilities using directory group repository microsoft active directory administrative permissions accomplished using delegation control wizard types permissions include managing viewing user accounts managing groups managing group policy links generating resultant set policy managing viewing inorgperson accounts use delegation control could give managers complete control users department arrangement managers create new users groups computer objects ou
[ 644, 2489, 4759, 2185 ]
Test
922
2
Ken_Arnold:ken arnold kenneth cutts richard cabot arnold born 1958 american computer programmer well known one developers 1980s dungeon-crawling video game rogue contributions original berkeley bsd distribution unix books articles c c++ e.g 1980s–1990s unix review column c advisor high-profile work java platform arnold attended university california berkeley worked lawrence berkeley national laboratory computer labs year receiving a.b computer science 1985 berkeley president berkeley computer club computer science undergraduates association made many contributions 2bsd 4bsd berkeley unix distributions including additionally arnold served member student senate president arnold part hewlett-packard team designed corba also worked apollo computer molecular graphics programmer computer graphics lab u.c san francisco member unix review software review board arnold worked senior engineer sun microsystems laboratories areas object-oriented design implementation c c++ java distributed computing one architects jini technology main implementer sun javaspaces technology implemented tuple spaces java platform worked jim waldo remote method invocation object serialization
[ 908, 3764, 1435, 6367 ]
Test
923
6
Umask:umask computing umask command determines settings mask controls file permissions set newly created files may also affects file permissions changed explicitly umask may also refer function sets mask may refer mask formally known file mode creation mask mask grouping bits restricts corresponding permission set newly created files bits mask may changed invoking umask command unix-like systems file set attributes control read write execute program creates file file permissions restricted mask mask bit set 1 corresponding initial file permission disabled bit set 0 mask means corresponding permission determined program file system words mask acts last-stage filter strips away permissions file created bit set 1 strips away corresponding permission permissions may changed later users programs using chmod program technically called process mask able change settings using function call process shell mask set umask command shell process launches new process child process inherits mask parent process generally mask affects file permissions creation new files effect file permissions changed existing files however chmod command check mask chmod options specified using symbolic mode reference class users specified mask stored group bits may represented binary octal symbolic notation umask command allows mask set octal e.g 0754 symbolic e.g u= g=w o=wx notation umask command used unix-like operating systems umask function defined posix.1 specification mask umask command umask function part original implementation unix operating system evolved relatively small computer-center environment security issue eventually grew serve hundreds users different organizations first developers made creation modes key files restrictive especially cases actual security breaches general solution mask umask command introduced around 1978 seventh edition operating system could allow sites groups individuals choose defaults mask since implemented contemporary implementations unix-like operating systems shell mask set using umask command syntax command umask command invoked without arguments display current mask output either octal symbolic notation depending os shells csh -s argument i.e umask -s force umask display using symbolic notation example umask command invoked octal argument directly set bits mask argument fewer 4 digits entered leading zeros assumed error result argument valid octal number 4 digits three rightmost octal digits address owner group user classes respectively fourth digit present leftmost high-order digit addresses three additional attributes setuid bit setgid bit sticky bit umask invoked using symbolic notation modify set flags specified maskexpression syntax note syntax work using csh due different behaviour built-in umask command multiple maskexpressions separated commas space terminates maskexpression example prohibit write permission set user rest flags mask unchanged example multiple changes would set mask would examples using umask command change mask example showing effect umask mask applied whenever file created mask bit set 1 means corresponding file permission always disabled files subsequently created bit set 0 mask means corresponding permission determined requesting process os files subsequently created words mask acts last-stage filter strips away permissions file created bit set 1 strips away corresponding permission file truth table masking logic bit requesting process file permission mode operated mask using logic yield permission mode applied file created p bit requested file permission mode process creating file q bit mask r resulting bit created file permission mode programmatically mask applied os first negating complementing mask performing logical requested file mode probably first unix manual describe function manual says boolean logic application mask represented c p ~q says file permission mode c result logical operation negation mask q process requested permission mode setting p note many operating systems allow file created execute permissions environments newly created files always execute permission disabled users mask generally applied functions create new file however exceptions example using unix gnu versions chmod set permissions file symbolic notation used user specified mask applied requested permissions applied file example process mask applied whenever process creates new file shell process spawns new process child process inherits mask parent process process shell mask changed umask command processes process launched shell inherits shell mask linux kernel fat hfs hpfs ntfs udf file system drivers support umask mount option controls disk information mapped permissions per-process umask described although permissions calculated similar way file system drivers also support separate umasks files directories using mount options fmask
[ 361, 6789, 2817, 366, 3685, 4387, 4662, 8165, 3085, 1537, 5116, 2834, 4283, 1837, 5480, 3456, 3106, 5571, 5933, 5138, 1389, 667, 1572, 5942, 6648, 3984, 2589, 5946, 1213, 759, 7667, 6050, 6577, 1047, 7035, 7494, 6242, 7868, 3417, 3587, ...
Test
924
4
Alureon:alureon alureon also known tdss tdl-4 trojan bootkit created steal data intercepting system network traffic searching banking usernames passwords credit card data paypal information social security numbers sensitive user data following series customer complaints microsoft determined alureon caused wave bsods 32-bit microsoft windows systems update ms10-015 triggered crashes breaking assumptions made malware author according research conducted microsoft alureon second active botnet second quarter 2010 allure boot first identified around 2007 personal computers usually infected users manually download install trojan software alureon known bundled rogue security software security essentials 2010 dropper executed first hijacks print spooler service spoolsv.exe update master boot record execute modified bootstrap routine infects low-level system drivers responsible pata operations atapi.sys implement rootkit installed alureon manipulates windows registry block access windows task manager windows update desktop also attempts disable anti-virus software alureon also known redirect search engines commit click fraud google taken steps mitigate users scanning malicious activity warning users case positive detection malware drew considerable public attention software bug code caused 32-bit windows systems crash upon installation security update ms10-015 malware using hard-coded memory address kernel changed installation hotfix microsoft subsequently modified hotfix prevent installation alureon infection present malware author also fixed bug code november 2010 press reported rootkit evolved point able bypass mandatory kernel-mode driver signing requirement 64-bit editions windows 7 subverting master boot record made particularly resistant systems detection removal anti-virus software tdl-4 sometimes used synonymously alureon also name rootkit runs botnet first appeared 2008 tdl-1 detected kaspersky lab april 2008 later version two appeared known tdl-2 early 2009 time tdl-2 became known emerged version three titled tdl-3 lead eventually tdl-4 often noted journalists indestructible 2011 although removable tools kaspersky tdsskiller infects master boot record target machine making harder detect remove major advancements include encrypting communications decentralized controls using kad network well deleting malware rootkit generally able avoid detection circumstantial evidence infection may found examination network traffic packet analyzer inspection outbound connections tool netstat although existing security software computer occasionally report rootkit often goes undetected may useful perform offline scan infected system booting alternative operating system winpe malware attempt prevent security software updating fixmbr command windows recovery console manual replacement atapi.sys could possibly required disable rootkit functionality anti-virus tools able find clean infection various companies created standalone tools attempt remove alureon two popular tools microsoft windows defender offline kaspersky tdsskiller november 9 2011 united states attorney southern district new york announced charges six estonian nationals arrested estonian authorities one russian national conjunction operation ghost click february 6 2012 two individuals extradited new york running sophisticated operation used alureon infect millions computers
[ 704, 376, 3277, 2923, 7186, 6823, 2587, 5066, 3323, 5779, 7600, 5452, 4025, 1528, 4759, 2991, 1173, 6526, 6904, 6541, 6194, 7657, 2678, 3038, 2326, 3047, 6569, 2693, 6574, 862, 7307, 6589, 1996, 7328, 2733, 2021, 5922, 6628, 8103, 4531, ...
Train
925
3
John_Couleur:john couleur john francis couleur july 7 1925 chicago – august 25 2007 scottsdale arizona american computer engineer executive recipient 40 patents world war ii couleur enrolled v-12 navy college training program graduated summa cum laude southern methodist university houston texas 1946 korean war served lieutenant united states air force couleur joined general electric company 1953 ge heavy military electronics department hmed syracuse new york served lead architect development mistram tracking system atlas missile later ge responsible development ge-635 computer system request mit project mac couleur ted glaser designed modifications turn 635 system became ge-645 multics operating system 1972
[]
Test
926
2
Motorsport_Manager:motorsport manager motorsport manager racing management-simulation strategy video game developed british video game developer playsport games game released ios august 2014 android 2015 desktop version game published sega macos microsoft windows linux operating systems november 2016 game received regular updates patches including downloadable content pc versions since release latest iteration game pc version released 1 november 2017 player begin later option continue career places control motorsport racing team starting new career user customise team name colour selecting racing series enter four tiers racing series successive tier unlocked winning respective racing series per tier game features hints tips tutorial system represented sprite textbox written character moustached man named nigel homage former british racing car driver nigel mansell provides first-time advice throughout game user also ability invest young driver development programme appointing head engineers drivers improving team headquarters well developing car get edge competition vary quality depending investment level cash required investment things acquired signing sponsorship deals completing challenges appointed sponsors earn bonus payments may vary quality difficulty quantity contract duration depending success popularity user racing team secondary method earning money end racing season based team championship scores game also includes random events system may provide choices player compromise player popularity manager one group sake another may provide optional upgrade choices three research segments game cost cash manufacturing determines car reliability tyre wear design generally affects aspects car aerodynamics affects car downforce acceleration trigger time end racing season user choices behind-the-scenes ultimately affect team racing performances pivotal success game serves main gameplay element motorsport manager dozen race tracks featured in-game share likeness real-life counterparts split respective racing series game track used racing series roster split two parts one-time qualifying session final race team qualifying performance determines starting positions final race challenges set sponsors may offer player considerable sum cash achieve set position leaderboards prove useful apply changes team order give better chance success race day exclusive mobile version micro-transactions supply customers set amounts cash also accelerate rate team improve reducing time challenge required develop fully-fledged racing team game largely similar mobile version game player option either create racing team additional option join fictional motorsport racing team motorsport manager originally released mobile ios 21 august 2014 following considerable success critically commercially upon release game released android 2015 subsequent macos microsoft windows linux desktop versions published sega following financial backing developer playsport games released 9 november 2016 23 november 2016 respectively desktop versions game significantly expanded upon gameplay mechanics mobile version alleviating previous hardware constraints put forward mobile devices allowed in-depth gameplay experience enhanced graphical fidelity relative mobile versions game ios version motorsport manager received positive reviews critics j. d. cohen toucharcade awarded game score 4.5 5 writing ’ never overwhelming light maintain interest motorsport manager finds nice spot complexity spectrum wherein requires frequent decision-making without ever inducing paralysis presenting many options simultaneously pocket gamer harry slater writes ice cold nature motorsport manager one second flying high first place next tyres fail slip back fifth cursing ... things get little repetitive huge game work way gets claws unlikely let go good long motorsport manager manages walk line number-juggling sims softer end spectrum creates strategy game almost anyone crack website awarded score 9/10 game sold 1.6 million copies ios android websites early-tested game gave positive reviews may 2016 pc gamer sean clever wrote ’ niche subgenre one ’ expect see outside fia licence seems like decent first effort put racing management games back grid august 2016 ign luke reilly stated ’ incredibly nuanced experience ’ initially rather intimidating motorsport manager successfully got tentacles around several sessions early version game ... also like pressure race day genuinely stressful situations arise game received positive reviews also release eurogamer.net martin robinson reports lack ability save copy racing set-ups writes approachable veneer disguises otherwise complex sometimes cruel little often abstruse experience managing strategies two cars micromanaging driver boot prove taxing task satisfying execute perfect strategy n't quite enough tools disposal balance frustration often accompanies raceday feedback 're given drivers little obscure ability read lap times deltas little sparse make chasing perfect set-up anything dark art ... motorsport manager couple tweaks away greatness far disappointment gamestar benjamin danneberg says motorsport manager hardcore management game put every screw correctly instead game healthy way strategy fun motorsport.com valentin khorounzhiy writes motorsport manager great game merit roaring success subgenre seems waking long hiatus price tag may seem steep got enough content variety justify ... potential improvement yes playsport done admirable job first installment – hopefully move enough copies justify many many follow-ups james swinbanks pc powerplay writes always something going behind scenes motorsport manager always adds experience never felt cheated even things ’ go way ... ’ perfect setup quirks like increasing rear wing angle adding understeer ’ make sense scratching head trying work might design way grand scheme things motorsport manager want puts pit wall thick website gave score 8/10 sequel mobile version motorsport manager released positive reception 13 july 2017 motorsport manager mobile 2 praised technical first game providing many settings choose compared original mobile version main additions original aside enhancements graphical fidelity include ability player control individual car part design engine modes extra tyre compounds downforce options expanded sponsorship system
[ 6943, 4759, 5571, 2377, 578 ]
Test
927
1
Probabilistic_database:probabilistic database real databases contain data whose correctness uncertain order work data need quantify integrity data achieved using probabilistic databases probabilistic database uncertain database possible worlds associated probabilities probabilistic database management systems currently active area research currently commercial probabilistic database systems several research prototypes exist ... probabilistic databases distinguish logical data model physical representation data much like relational databases ansi-sparc architecture probabilistic databases even crucial since databases represent large numbers possible worlds often exponential size one world classical database succinctly probabilistic database data item←relation tuple value attribute take—is associated probability ∈ 0,1 0 representing data certainly incorrect 1 representing certainly correct probabilistic database could exist multiple states example uncertain existence tuple database database could two different states respect tuple—the first state contains tuple second one similarly attribute take one values x z database three different states respect attribute states called possible world consider following database actual state database may may contain first tuple depending whether correct similarly value attribute b may b3 b3′ b3′′ consequently possible worlds corresponding database follows essentially two kinds uncertainties could exist probabilistic database described table assigning values random variables associated data items represent different possible worlds
[ 1449, 7248, 5209, 1730, 3951, 3776, 3011, 4950, 6543, 2124, 4793, 6462, 2054, 7205, 684, 7303, 4274, 1891, 4457, 1792, 784 ]
Test
928
4
Turingery:turingery turingery turing method playfully dubbed turingismus peter ericsson peter hilton donald michie hand codebreaking method devised july 1942 mathematician cryptanalyst alan turing british government code cypher school bletchley park world war ii use cryptanalysis lorenz cipher produced sz40 sz42 teleprinter rotor stream cipher machines one germans geheimschreiber secret writer machines british codenamed non-morse traffic fish machine tunny reading tunny message required firstly logical structure system known secondly periodically changed pattern active cams wheels derived thirdly starting positions scrambler wheels message—the message key—was established logical structure tunny worked william tutte colleagues several months ending january 1942 deriving message key called setting bletchley park derivation cam patterns—which known wheel breaking —that target turingery german operator errors transmitting one message key producing depth allowed derivation key turingery applied key stream derive cam settings logical functioning tunny system worked well bletchley park cryptanalysts saw one machines—which happened 1945 shortly allied victory europe sz machines 12-wheel rotor cipher machines implemented vernam stream cipher attached in-line standard lorenz teleprinters message characters encoded 5-bit international telegraphy alphabet 2 ita2 output ciphertext characters generated combining pseudorandom character-by-character key stream input characters using exclusive xor function symbolised ⊕ similarly deciphering ciphertext combined key give plaintext produces essential reciprocity allow machine settings used enciphering deciphering five bits key character generated relevant wheels two parts machine termed chi formula_1 wheels psi formula_2 wheels chi wheels moved one position character psi wheels also moved together character movement controlled two mu formula_3 motor wheels key stream generated sz machines thus chi component psi component combined together xor function key combined plaintext enciphering—or ciphertext deciphering—can represented follows symbolically twelve wheels series cams pins around cams could set raised lowered position raised position generated mark x 1 binary lowered position generated space • 0 binary number cams wheel equalled number impulses needed cause complete full rotation numbers co-prime giving longest possible time pattern repeated total 501 cams equals 2 approximately 10 astronomically large number however five impulses considered independently numbers much manageable product rotation period pair chi wheels gives numbers 41×31=1271 26×23=598 cryptanalysis often involves finding patterns sort provide way eliminating range key possibilities bletchley park xor combination values two adjacent letters key ciphertext called difference symbolised greek letter delta δ xor modulo 2 subtraction without borrow —and incidentally modulo 2 addition without carry characters key k difference δk obtained follows underline indicates succeeding character relationship amongst applies differenced example well case plaintext represented p cipertext z following also hold true reason differencing provided way tunny although frequency distribution characters ciphertext could distinguished random stream true version ciphertext chi element key removed plaintext contained repeated character psi wheels move differenced psi character δformula_2 would null character ••••• 00000 bletchley park terminology '/ xor-ed character null character effect circumstances δformula_1 δk repeated characters plaintext frequent characteristics german ee tt ss relatively common telegraphists frequently repeated figures-shift letters-shift characters loss ordinary telegraph message could lead gibberish quote general report tunny turingery introduced principle key differenced one called δκ could yield information unobtainable ordinary key δ principle fundamental basis nearly statistical methods wheel-breaking setting well applying differencing full 5-bit characters ita2 code also applied individual impulses bits first impulse enciphered wheels formula_1 formula_2 differenced one second impulse also worth noting periodicity chi psi wheels impulse 41 43 respectively first one reflected pattern δk however given psi wheels advance every input character chi wheels simply repetition pattern every 41 × 43 1763 characters δk complex sequence july 1942 turing spent weeks research section become interested problem breaking tunny keys obtained depths july developed method deriving cam settings length key involved iterative almost trial-and-error process relied fact differenced psi character null character ••••• 00000 xor-ing character change thus delta key character gives character five chi wheels i.e δformula_1 δk given delta psi character null character half time average assumption δk δformula_1 50 chance correct process started treating particular δk character δformula_1 position resulting putative bit pattern x • chi wheel recorded sheet paper contained many columns characters key five rows representing five impulses δformula_1 given knowledge tutte work periodicity wheels allowed propagation values appropriate positions rest key set five sheets one chi wheels also prepared contained set columns corresponding number cams appropriate chi wheel referred 'cage formula_1 cage 29 columns successive 'guesses δformula_1 values produced putative cam state values might either agree disagree previous assumptions count agreements disagreements made sheets disagreements substantially outweighed agreements assumption made δformula_2 character null character relevant assumption discounted progressively cam settings chi wheels deduced psi motor wheel cam settings experience method developed improvements made allowed used much shorter lengths key original 500 characters
[ 1353, 5796 ]
Test
929
3
Badlands_(1984_video_game):badlands 1984 video game game plot remarkably darker games time player assumes role buck hardworking family man whose wife children murdered band outlaws one one revenge buck tracks various outlaws earning higher higher bounties progresses final foe outlaw leader landolf outlaws ranked order bounties follows despite game apparent old west setting storyline sent hero buck noticeably non-realistic settings example one point buck walks cave ends prehistoric jungle populated dinosaurs also game provided buck three lives lost lives player would see limp humorously crutches humorously carried away stretcher — noticeable break game otherwise dark mature themes player lost his/her last life buck would turn super deformed angel time game text would appear addition game miss sequences occur player loses life humorous well including limited scorpion giving buck mohawk buck cut half axe end buck could kill landolph henches player would see ride sunset badlands earned rarity rank 16 according video game preservation society means existing arcade cabinets game fairly uncommon
[]
Test
930
2
Windows_Presentation_Foundation:windows presentation foundation windows presentation foundation wpf graphical subsystem similar winforms microsoft rendering user interfaces windows-based applications wpf previously known avalon initially released part .net framework 3.0 2006 wpf uses directx attempts provide consistent programming model building applications separates user interface business logic resembles similar xml-oriented object models implemented xul svg wpf employs xaml xml-based language define link various interface elements wpf applications deployed standalone desktop programs hosted embedded object website wpf aims unify number common user interface elements 2d/3d rendering fixed adaptive documents typography vector graphics runtime animation pre-rendered media elements linked manipulated based various events user interactions data bindings wpf runtime libraries included versions microsoft windows since windows vista windows server 2008 users windows xp sp2/sp3 windows server 2003 optionally install necessary libraries microsoft silverlight provided functionality mostly subset wpf provide embedded web controls comparable adobe flash 3d runtime rendering supported silverlight since silverlight 5 microsoft connect event december 4 2018 microsoft announced releasing wpf open source project github released mit license windows presentation foundation become available projects targeting .net core framework however system cross-platform still available windows graphics including desktop items like windows rendered using direct3d allows display complex graphics custom themes cost gdi wider range support uniform control theming allows windows offload graphics tasks gpu reduces workload computer cpu gpus optimized parallel pixel computations tends speed screen refreshes cost decreased compatibility markets gpus necessarily powerful netbook market windows presentation foundation wpf microsoft ui framework create applications rich user experience part .net framework 3.0 higher wpf emphasis vector graphics allows controls elements scaled without loss quality pixelization thus increasing accessibility exception silverlight direct3d integration allows streamlined 3d rendering addition interactive 2d content overlaid 3d surfaces natively control templates data templates enable use winforms developer executes wpf c code system.windows.forms.integration.windowsformshost.enablewindowsformsinterop following success markup languages web development wpf introduces extensible application markup language xaml based xml xaml designed efficient method developing application user interfaces specific advantage xaml brings wpf xaml completely declarative language allowing developer designer describe behavior integration components without use procedural programming although rare entire application built completely xaml introduction xaml allows application designers effectively contribute application development cycle using xaml develop user interfaces also allows separation model view considered good architectural principle xaml elements attributes map classes properties underlying apis web development layouts specific themes well suited markup xaml required either indeed elements wpf may coded .net language c vb.net xaml code ultimately compiled managed assembly way .net languages architecture wpf spans managed code native code components however public api exposed available via managed code majority wpf managed code composition engine renders wpf applications native component named media integration layer mil resides codice_5 interfaces directly directx provides basic support 2d 3d surfaces timer-controlled manipulation contents surface view exposing animation constructs higher level compositing individual elements wpf application final 3d scene represents ui application renders screen desktop window manager also uses mil desktop window composition media codecs also implemented unmanaged code shipped codice_6 managed world presentationcore codice_7 provides managed wrapper mil implements core services wpf including property system aware dependencies setters consumers property message dispatching system means codice_8 object implement specialized event system services implement layout system measurement ui elements presentationframework codice_9 implements end-user presentational features including layouts time-dependent story-board based animations data binding wpf exposes property system objects inherit codice_10 aware dependencies consumers property trigger actions based changes properties properties either hard coded values expressions specific expressions evaluate result initial release however set expressions supported closed value properties inherited parent objects well wpf properties support change notifications invoke bound behaviors whenever property element changed custom behaviors used propagate property change notification across set wpf objects used layout system trigger recalculation layout property-changes thus exposing declarative programming style wpf whereby almost everything setting colors positions animating elements achieved setting properties allows wpf applications written xaml declarative mark-up language binding keywords attributes directly wpf classes properties interface elements wpf application maintained class codice_11 objects visual objects provide managed interface composition tree maintained media integration layer mil element wpf creates adds one composition nodes tree composition nodes contain rendering instructions clipping transformation instructions along visual attributes thus entire application represented collection composition nodes stored buffer system memory periodically mil walks tree executes rendering instructions node thus compositing element directx surface rendered screen mil uses painter algorithm components rendered back screen front allows complex effects like transparencies easily achieved rendering process hardware accelerated using gpu composition tree cached mil creating retained mode graphics changes composition tree needs incrementally communicated mil also frees applications managing repainting screen mil information necessary animations implemented time-triggered changes composition tree user visible side animations specified declaratively setting animation effect element via property specifying duration code-behind updates specific nodes tree via codice_11 objects represent intermediate states specified time intervals well final state element mil render changes element automatically wpf applications start two threads one managing ui another background thread handling rendering repainting rendering repainting managed wpf without developer intervention ui thread houses dispatcher via instance codice_13 maintains queue ui operations need performed tree codice_11 objects sorted priority ui events including changing property affects layout user interaction events raised queued dispatcher invokes handlers events microsoft recommends event handlers update properties reflect new content application responsiveness new content generated retrieved background thread render thread picks copy visual tree walks tree calculating components visible renders direct3d surfaces render thread also caches visual tree changes tree need communicated result updating changed pixels wpf supports extensible layout model layout divided two phases measure arrange measure phase recursively calls elements determines size take arrange phase child elements recursively arranged parents invoking layout algorithm layout module use number development tools available developing windows presentation foundation applications wpf deployment model offers standalone xaml browser applications xbap pronounced ex-bap flavors programming model building either type application similar standalone applications locally installed computer using software clickonce windows installer msi run desktop standalone applications considered full trust full access computer resources xaml browser applications xbaps programs hosted inside web browser pre-.net4 xbap applications run partial trust sandbox environment given full access computer resources wpf functionality available hosted environment intended protect computer malicious applications xbaps run fully trusted applications .net 4 full access computer resources starting xbap html page vice versa seamless security installation prompt although one gets perception application running browser actually runs out-of-process executable different browser release .net framework 3.0 xbaps would run ie release .net framework 3.5 sp1 xbap also runs mozilla firefox using included extension october 16 2009 mozilla added firefox plugin extension add-ons blocklist remotely exploitable serious security vulnerability agreement microsoft two days later block removed windows 7 firefox plugin run default reinstallation .net framework 3.5 sp1 install plugin add support xbap applications firefox alternatively hard-copying plugin dlls working windows xp/vista installation plugin directory mozilla firefox also reinstate support xbap applications wpf plugin dlls reside following directories depending framework version silverlight codenamed wpf/e deprecated cross-browser browser plugin contained wpf-based technology including xaml provided features video vector graphics animations multiple operating systems including windows 7 windows vista windows xp mac os x. microsoft sanctioned limited number 3rd party developers work ports certain linux distributions specifically provided add-on mozilla firefox internet explorer 6 google chrome 42 apple safari .net micro framework includes gui object model loosely based wpf although without support xaml
[ 7149, 1445, 6420, 714, 6428, 720, 3623, 1460, 1840, 1097, 2568, 2928, 7907, 4697, 5747, 405, 6116, 2953, 53, 6840, 7573, 422, 4001, 425, 5786, 1895, 5787, 4017, 5091, 6504, 1152, 4022, 1154, 4026, 7607, 1526, 2986, 3687, 4759, 7619, 263...
Validation
931
9
BCPL:bcpl bcpl basic combined programming language procedural imperative structured computer programming language originally intended writing compilers languages bcpl longer common use however influence still felt stripped syntactically changed version bcpl called b language c programming language based bcpl introduced several features many modern programming languages including using curly braces delimit code blocks bcpl designed small simple compilers could written reputedly compilers could run 16 kilobytes original compiler written bcpl easily portable bcpl thus popular choice bootstrapping system major reason compiler portability lay structure split two parts front end parsed source generated o-code back end took o-code translated code target machine 1/5 compiler code needed rewritten support new machine task usually took 2 5 man-months approach became common practice later e.g pascal java language unusual one data type word fixed number bits usually chosen align architecture machine word adequate capacity represent valid storage address many machines time data type 16-bit word choice later proved significant problem bcpl used machines smallest addressable item word byte machines larger word sizes 32-bit 64-bit interpretation value determined operators used process values example codice_1 added two values together treating integers codice_2 indirected value effectively treating pointer order work implementation provided type checking hungarian notation developed help programmers avoid inadvertent type errors mismatch bcpl word orientation byte-oriented hardware addressed several ways one providing standard library routines packing unpacking words byte strings later two language features added bit-field selection operator infix byte indirection operator denoted codice_3 bcpl handles bindings spanning separate compilation units unique way user-declarable global variables instead global vector similar blank common fortran data shared different compilation units comprises scalars pointers vectors stored pre-arranged place global vector thus header files files included compilation using get directive become primary means synchronizing global data compilation units containing global directives present lists symbolic names paired number associates name corresponding numerically addressed word global vector well variables global vector contains bindings external procedures makes dynamic loading compilation units simple achieve instead relying link loader underlying implementation effectively bcpl gives programmer control linking process global vector also made simple replace augment standard library routines program could save pointer global vector original routine replace pointer alternative version alternative might call original part processing could used quick ad hoc debugging aid bcpl first brace programming language braces survived syntactical changes become common means denoting program source code statements practice limited keyboards day source programs often used sequences codice_4 codice_5 place symbols codice_6 codice_7 single-line codice_8 comments bcpl adopted c reappeared c++ later c99 book bcpl language compiler describes philosophy bcpl follows programs run using martin richards current version cintsys december 2018 libhdr start writef must changed lower case avoid errors print factorials count solutions n queens problem bcpl first implemented martin richards university cambridge 1967 bcpl response difficulties predecessor cambridge programming language later renamed combined programming language cpl designed early 1960s richards created bcpl removing features full language make compilation difficult first compiler implementation ibm 7094 compatible time-sharing system ctss written richards visiting project mac massachusetts institute technology mit spring 1967 language first described paper presented 1969 spring joint computer conference bcpl rumored originally stood bootstrap cambridge programming language cpl never created since development stopped bcpl acronym later reinterpreted bcpl book bcpl language original hello world program written first mud also written bcpl mud1 several operating systems written partially wholly bcpl example tripos earliest versions amigados bcpl also initial language used seminal xerox parc alto project first modern personal computer among projects bravo document preparation system written bcpl early compiler bootstrapped 1969 starting paper tape o-code martin richards atlas 2 compiler targeted ict 1900 series two machines different word-lengths 48 vs 24 bits different character encodings different packed string representations—and successful bootstrapping increased confidence practicality method late 1970 implementations existed honeywell 635 honeywell 645 ibm 360 pdp-10 tx-2 cdc 6400 univac 1108 pdp-9 kdf 9 atlas 2 1974 dialect bcpl implemented bbn without using intermediate o-code initial implementation cross-compiler hosted bbn tenex pdp-10s directly targeted pdp-11s used bbn implementation second generation imps used arpanet also version produced bbc micro mid-1980s richards computer products company started john richards brother dr. martin richards bbc domesday project made use language versions bcpl amstrad cpc amstrad pcw computers also released 1986 uk software house arnor ltd. macbcpl released apple macintosh 1985 topexpress ltd kensington england design philosophy bcpl strongly influenced b turn influenced c. programmers time debated whether eventual successor c would called next letter alphabet p next letter parent language name language accepted c successor c++ codice_9 c increment operator although programming language also exists 1979 implementations bcpl existed least 25 architectures language gradually fell favour c became popular non-unix systems martin richards maintains modern version bcpl website last updated 2018 set run various systems including linux freebsd mac os x raspberry pi latest distribution includes graphics sound libraries comprehensive manual pdf format continues program including research musical automated score following
[ 6507, 3931, 3509, 7426, 7710, 4302, 4670, 5911, 993, 1361, 7071, 6181, 5571, 5833, 4244, 1114, 5678, 5948, 7474, 4354, 4361, 4366, 4906, 5877, 352, 6498, 5006, 2803, 1435 ]
Test
932
3
Nine_Princes_in_Amber_(video_game):nine princes amber video game nine princes amber interactive fiction computer game graphics game published telarium subsidiary spinnaker software 1985 game based upon fantasy novels nine princes amber guns avalon roger zelazny single-player adventure controlled via typed keyboard commands words sentences entered text parser player uses action commands e.g take sit communication commands e.g ask demand hug interaction non-player characters 40 different possible solutions end game plot takes place fictional fantasy world player prince corwin son king oberon rules kingdom amber corwin wants become king eight brothers especially brother eric also interested throne amber prince corwin must escape assassination attempts intrigues enacted siblings yet must forge alliances siblings become reigning king amber adventure static 2d graphics theme song sound effects implemented c 64 dos atari st msx2 apple ii msx2 version translation spanish nueve principes en amber new illustrations game based upon fantasy novels nine princes amber doubleday 1970 guns avalon doubleday 1972 roger zelazny developed group 20 people spinnaker software published telarium 1985 design writing game coding done andrea bird year 1986 german reviewer called nine princes amber precious adventure edel-adventure praised intelligent writings suspenseful storyline text parser 2006 study history interactive fiction maintained one hand nine princes amber bad game – fact one telarium ’ best working conversational 'puzzles actually oddly satisfying times hand authors seemed aiming much higher wanted create ambitious gameplay hardware constraints 1980s general limitations character interaction interactive fiction able actualize aim completely antic 1987 stated game uneven plot pacing content ranging exciting banal magazine criticized port 8-bit computers fully using atari st powerful graphics sound substandard text parser reviewer described game essentially computerized 'classics illustrated adaptation books rather adventure game infocom even scott adams tradition stating finished two interrupted hours finishing game however found reloading saved games see another 40 endings interesting reviewer concluded game comes short simply interesting well-executed enough recommended suggesting readers buy pawn instead
[ 4473 ]
Test
933
5
Joomla:joomla joomla free open-source content management system cms publishing web content developed open source matters inc built model–view–controller web application framework used independently cms joomla written php uses object-oriented programming techniques since version 1.5 software design patterns stores data mysql ms sql since version 2.5 postgresql since version 3.0 database includes features page caching rss feeds printable versions pages news flashes blogs search support language internationalization 8,000 free commercial extensions available official joomla extensions directory available sources estimated second used content management system internet wordpress joomla result fork mambo august 17 2005 time mambo name trademark miro international pvt ltd formed non-profit foundation stated purpose funding project protecting lawsuits joomla development team claimed many provisions foundation structure violated previous agreements made elected mambo steering committee lacked necessary consultation key stakeholders included provisions violated core open source values joomla developers created website called opensourcematters.org osm distribute information software community project leader andrew eddie wrote letter appeared announcements section public forum mamboserver.com one thousand people joined opensourcematters.org within day posting words encouragement support miro ceo peter lamont responded publicly development team article titled mambo open source controversy — 20 questions miro event created controversy within free software community definition open source forums open-source projects active postings actions sides two weeks following eddie announcement teams re-organized community continued grow eben moglen software freedom law center sflc assisted joomla core team beginning august 2005 indicated moglen blog entry date related osm announcement sflc continue provide legal guidance joomla project august 18 andrew eddie called community input suggest name project core team reserved right final naming decision chose name suggested community september 22 new name joomla announced anglicised spelling swahili word meaning together whole also similar meaning least amharic arabic urdu september 26 development team called logo submissions community invited community vote logo team announced community decision september 29 october 2 brand guidelines brand manual set logo resources published joomla thousands verified third party extensions found joomla extensions directory extensions.joomla.org also thousands high end templates available many free paid templates also available come support many templates provide graphical user interface allow change colors fonts layouts features joomla seo tools built includes metadata keywords mod_rewrite support sef urls menu creation clear consistent sitemaps april 25 2014 joomla production leadership team announced started following 'semantic versioning scheme new joomla builds earlier lts long term support sts short term support lifecycle policy longer observed joomla version 3.3.1 first version released new development strategy like many web applications joomla may run lamp stack many web hosts control panels automatic installation joomla windows joomla installed using microsoft web platform installer automatically detects installs dependencies php mysql joomla utilises configuration file configuration.php usually located root joomla installation control various settings including limited database connection settings due use configuration file migrating one server another relatively simple two large joomla conferences year joomla beyond conference largely aimed joomla developers site integrators hosted europe around may year joomla world conference brings together developers designers site administrators business owners community members held latter half year year joomla communities hold country regional joomladays joomla also like many coding communities hosts many regional user groups well joomla extensions extend functionality joomla websites eight types extensions may distinguished components modules plugins templates languages libraries files packages extensions handles specific function many extensions built joomla community free require payment download joomla cms received many awards recognitions since created 2005
[ 2810, 2451, 5983, 4296, 629, 1445, 6701, 1819, 7969, 103, 6428, 2645, 7347, 1737, 1640, 2740, 6095, 3368, 2840, 5571, 2570, 5575, 486, 6015, 6191, 3543, 6453, 6029, 417, 54, 2870, 5956, 3320, 4535, 7933, 5433, 5965, 74, 3915, 4998, 2255...
Train
934
8
Really_Simple_Discovery:really simple discovery really simple discovery rsd xml format publishing convention making services exposed blog web software discoverable client software way reduce information required set editing/blogging software three well known elements critical settings either defined rsd file related website discoverable using information provided rsd authored daniel berlinger really simple discoverability 1.0 specification make use rsd owner site places link tag head section homepage indicates location rsd file example mediawiki uses tag missing file found clients look default location file named rsd.xml webroot example codice_1 sample rsd file really simple discoverability 1.0 mediawiki example
[ 302, 5631 ]
Test
935
4
AhnLab,_Inc.:ahnlab inc. ahnlab inc. founded 1995 security software provider south korea ahnlab sells computer software antivirus software online security network security appliances advanced threat malware detection remediation including apt type cyber attack firewalls ips utm security software online games mobile web ahn cheol-soo founder found computer infected computer virus called c brain developed program find remove named vaccine since anti-virus software called vaccine software korea distributed antivirus program public without charge established ahnlab 1995 dr. ahn promoted new company 1995 since founding 1995 ahnlab become one largest security software companies 50 market share korean security market alone approximately 500 distributors worldwide september 2001 ahnlab listed headquartered seongnam-si gyeonggi-do south korea ahnlab traded kosdaq symbol ahnlab tenth anniversary company founding 2005 ahn cheol-soo resigned position ceo kim cheol-soo appointed successor current ceo hongsun kim appointed 2008 ahnlab selected one korea admired company five years 2004 2010 4 october 2011 ahnlab headquarters moved seongnam-si gyeonggi-do 29 march 2012 ahnlab korean company name changed 주 안철수연구소 주 안랩 annual meeting shareholders ahnlab many security software products pc network mobile including hackshield hacking cheating prevention software suite service mmos used games nexon ncsoft available korean game developers since 2001 american game developers since 2005
[ 5452, 91, 4115, 6515, 7425, 3089, 4492, 1931, 4138, 385, 910, 1838, 6005, 651, 2296, 4689, 6006, 4783, 3111, 7087, 496, 6644, 5144, 7193, 3123, 142, 935, 1395, 3561, 7478, 5601, 6043, 6305, 8134, 4456, 6777, 4645, 7503, 7597, 1805, 88 ]
Test
936
4
William_Genovese:william genovese william genovese former greyhat hacker turned security professional goes alias illwill early 2000 genovese former figure loose-knit group computer hackers called illmob illmob.org security community website ran genovese time many high-profile incidents related genovese works private security consultant involved computer security industry penetration testing phishing osint threat intel mitigation also contributor metasploit project 2003 genovese website first release 0day code exploited ms03-026 windows rpc vulnerability later used unknown hackers create variants w32/blaster worm response genovese released tool coded remove worm infected windows pc 2004 federal authorities charged genovese theft trade secret us code title 18 section 1832 selling incomplete windowsnt/2000 microsoft source code microsoft investigators federal agents even though code sold already widely distributed internet prior sale authorities used obscure law enacted economic espionage act 1996 traditionally adjudicated private civil litigation 2005 illmob.org site posted leaked images phone book paris hilton t-mobile sidekick phone obtained fellow hacker reportedly data obtained social engineering exploiting vulnerability bea weblogic server database function allowed attacker remotely read replace file system feeding specially-crafted web request bea produced patch bug march 2003 t-mobile failed apply website also mentioned news articles connection fred durst sex tape leak stolen personal email account 2010 resignation 2016 genovese co-founded board member 501 3 c non-profit hackerspace connecticut called nesit helped local community offering free classes various network security topics personal internet safety reverse engineering embedded electronic projects 3-d printing design helped build virtualized pen-testing lab large server farm donation pharmaceutical company users simulate attacking penetrating machines safe lab environment since 2008 genovese reinvented security consultant public speaker teacher security consulting performs penetration testing services worldwide companies also co-founder speaker security conferences excon bsides connecticut bsidesct 2011 2014 2016 2017 2018 2015 panelist def_con 23 las vegas charity fundraiser help fellow hacker stricken terminal cancer
[ 936 ]
Test
937
3
Compaq_Presario_5460:compaq presario 5460 compaq presario 5460 ibm compatible pc first launched 1999 bundled 15 crt monitor keyboard mouse jbl stereo speakers 5460 typical new range multimedia pcs debuted around turn millennium 5460 preinstalled microsoft windows 98 first edition available reinstallation via supplied quickrestore disc
[ 4736 ]
Test
938
2
CMS_Pipelines:cms pipelines cms pipelines implements pipeline concept vm/cms operating system programs pipeline operate sequential stream records program writes records read next program pipeline program combined reading writing done device independent interface cms pipelines provides cms command pipe argument string pipe command pipeline specification pipe selects programs run chains together pipeline pump data cms programs utilities n't provide device independent stdin stdout interface cms pipelines built-in library programs called pipeline specification built-in programs interface operating system perform many utility functions data cms structured logical records rather stream bytes textual data line text corresponds logical record cms pipelines data passed stages logical records cms pipelines users issue pipeline commands terminal exec procedures users write programs rexx used addition built-in programs simple example reads disk file separates records containing string hello selected records modified appending string world records translated upper case two streams combined records written new output file example codice_1 stage reads input disk file passes records next stage pipeline codice_2 stage separates input stream two output streams primary output codice_2 records containing hello passes records codice_4 stage codice_4 stage modifies input records specified arguments passes output output connected codice_6 combines records input streams form single output stream output written new disk file secondary output codice_2 marked second occurrence codice_8 label contains records meet selection criterion records translated upper case codice_9 stage passed secondary input stream codice_6 marked second occurrence codice_11 label pipeline topology example consists two connected pipelines end character codice_12 example separates individual pipelines pipeline set records read input file pass either two routes pipeline topology neither routes contain stages need buffer records cms pipelines ensures records arrive codice_6 order passed codice_2 example pipeline presented 'portrait form individual stages separate lines pipeline typed cms command stages written single line concept simple pipeline extended ways cms pipelines offers several features improve robustness programs john hartmann ibm denmark started development cms pipelines 1980 product marketed ibm separate product 80 integrated vm/esa late 1991 release vm cms pipelines code upgraded well functionally frozen 1.1.10 level vm/esa 2.3 1997 since latest level cms pipelines available download cms pipelines homepage users wish explore new function current level cms pipelines included z/vm 6.4 available since november 11 2016 implementation cms pipelines tso released 1995 batchpipeworks batchpipes/mvs product up-to-date tso implementation available service offering ibm denmark 2010 versions maintained single source code base commonly referred cms/tso pipelines specification available author edition
[ 3120, 6507, 5947, 5571, 5931, 5396 ]
Validation
939
2
Stephen_C._Johnson:stephen c. johnson stephen curtis johnson known steve johnson computer scientist worked bell labs nearly 20 years best known yacc lint spell portable c compiler contributed spread unix c. also contributed fields diverse computer music psychometrics vlsi design johnson passion computing started age five grandfather took along work bureau standards computer saw size small house made strong impression decided wanted work computers never looked back computer science classes college studied mathematics eventually earned phd johnson joined bell labs 1960s worked unix tools nearly 20 years alongside computer scientists like jeffrey ullman dennis ritchie alfred aho best known writing yacc lint portable c compiler mid-1970s johnson bell colleague dennis ritchie co-authored first unix port also demonstrated unix portable ritchie considers spark led unix becoming widespread mid-1980s served head unix languages department unix system v johnson developed yacc early '70s wanted insert exclusive operator ritchie b language compiler bell labs colleague alfred aho suggested look donald knuth work lr parsing served basis yacc 2008 interview johnson reflected contribution yacc made spread unix c 'm proudest lint developed 1978 johnson debugging yacc grammar writing c struggling portability issues stemming porting unix 32-bit machine 1986 johnson moved silicon valley joined several startups worked mostly compilers also 2d 3d graphics massively parallel computing embedded systems startups included dana computer inc. melismatic software transmeta made low-power intel-compatible microprocessors johnson served usenix board ten years including four years president early 1990s serves usenix representative computing research association 2002 moved boston work mathworks helped maintain front end matlab programming language also built lint product called m-lint met mathworks founder cleve moler working silicon valley startup developed long-distance consulting relationship 1990s johnson currently lives morgan hill california works machine learning wave computing startup develops energy-efficient computers machine learning
[ 1361, 1506, 2455, 2118, 1435, 5117, 6046 ]
Validation
940
9
Corman_Common_Lisp:corman common lisp corman common lisp commercial implementation common lisp programming language featuring support windows operating system corman common lisp commercial software 2013 roger corman author indicated considering converting open source january 2015 published source code corman lisp github repository mit license corman common lisp designed implemented corman technologies 1995 previously developed powerlisp mac corman cl complete rewrite windows powerlisp longer developed supported developed maintained corman cl new major releases every 18 months minor updates often 2006 clos implementation originally art metaobject protocol closette extensively rewritten add missing common lisp features improve performance january 2015 roger corman permission corman common lisp copied github made open source mit license future development corman common lisp done location
[ 7878, 1445, 6796, 6087, 2915, 5734, 1478, 4332, 4704, 5757, 6116, 1116, 6471, 2600, 5077, 2249, 1889, 1890, 6876, 4759, 6888, 3370, 1557, 6191, 5494, 5501, 6210, 144, 7298, 5515, 8025, 3749, 5883, 4837, 897, 6981, 2734, 5571, 218, 4878, ...
Test
941
1
SQL_Server_Reporting_Services:sql server reporting services sql server reporting services ssrs server-based report generating software system microsoft part suite microsoft sql server services including ssas sql server analysis services ssis sql server integration services administered via web interface used prepare deliver variety interactive printed reports ssrs service provides interface microsoft visual studio developers well sql administrators connect sql databases use ssrs tools format sql reports many complex ways also provides 'report builder tool less technical users format sql reports lesser complexity ssrs competes crystal reports business intelligence tools reporting services first released 2004 add-on sql server 2000 subsequent versions sql server data tools business intelligence ssdt bi reduces rdl report definition language component graphic icons gui graphical user interface way instead writing code user drag-and-drop graphic icons ssrs report format aspects ssrs report reports defined rdl downloaded variety formats including excel pdf csv xml tiff image formats html web archive sql server 2008 2012 ssrs also prepare reports microsoft word doc format third-party report generators offer additional output formats users interact report server web service directly instead use report manager web-based application interfaces report server web service report manager users view subscribe manage reports well manage maintain data sources security settings report manager also deliver sql reports e-mail place file share security role-based assigned individual item report data source folder items site wide security roles rights inherited overloaded rdl reports viewed using standalone report server comes microsoft sql server using asp.net reportviewer web control using reportviewer windows forms control latter method allows reports embedded directly web pages .net windows applications reportviewer control process reports server processing report rendered report server b local processing control renders rdl file sql server reporting services also support ad hoc reports designer develops report schema deploys reporting server user choose relevant fields/data generate reports users download reports locally microsoft sql server 2012 sp1 expands microsoft support viewing reports mobile platforms including microsoft surface apple ios 6 windows phone 8
[ 7619, 7621, 7715, 2283, 4936, 7971, 8183, 8085, 2840, 1840, 1371, 7080, 8094, 6015, 4697, 5747, 5234, 3303, 930, 53, 422, 425, 1684, 5694, 5252, 2341, 2702, 7687, 2530, 84, 4017, 1805, 2085 ]
Validation
942
8
Oracle_HTTP_Server:oracle http server oracle http server ohs web server based apache http server created oracle technology network web server based apache version 2.2 ohs like apache 2.2 includes support ipv6 web tier component oracle fusion middleware features
[ 6270, 7368 ]
Train
943
4
Countermeasure_(computer):countermeasure computer computer security countermeasure action device procedure technique reduces threat vulnerability attack eliminating preventing minimizing harm cause discovering reporting corrective action taken definition ietf rfc 2828 cnss instruction 4009 dated 26 april 2010 committee national security systems united states america according glossary infosectoday meaning countermeasure synonym security control telecommunications communication countermeasures defined security services part osi reference model itu-t x.800 recommendation x.800 iso iso 7498-2 information processing systems – open systems interconnection – basic reference model – part 2 security architecture technically aligned following picture explain relationships concepts terms resource physical logical one vulnerabilities exploited threat agent threat action result potentially compromises confidentiality integrity availability properties resources potentially different vulnerable one organization others involved parties customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromises integrity availability passive attack attempts learn make use information system affect system resources compromising confidentiality threat potential violation security exists circumstance capability action event could breach security cause harm threat possible danger enabling exploitation vulnerability threat either intentional i.e. intelligent e.g. individual cracker criminal organization accidental e.g. possibility computer malfunctioning possibility act god earthquake fire tornado set policies concerned information security management information security management systems isms developed manage according risk management principles countermeasures order accomplish security strategy set following rules regulations applicable country potential malicious actor physical access computer system greater chance inflicting harm upon devices usb killer may used damage render completely unusable anything connection motherboard computer usb port video port ethernet port serial port without proper protection devices may result destruction ports adapter cards storage devices ram motherboards cpus anything physically connected device attacked monitors flash drives wired switches types devices even used damage smartphones cars well threat mitigated installing restricting physical access easily accessible ports situations necessary port-closing lock permanently disables access port short actual port disassembled necessary port accessible optocoupler allow port send receive data computer device without direct electrical connection preventing computer device receiving dangerous voltage external device unsecured scenario malicious actor may steal destroy storage devices hard drives ssds resulting destruction theft valuable data data storage device longer necessary data theft best prevented physically destroying shredding storage device data storage device use must secured one use encryption encrypt contents storage device even encrypt whole storage device save master boot record device unlocked password biometric authentication physical dongle network interchange one-time password combination thereof device boot drive however must unencrypted pre-boot environment operating system accessed striping breaking data chunks stored upon multiple drives must assemble order access data possible solution physical drive theft provided drives stored multiple individually secured locations enough number one drive used piece together meaningful information neglected process adding physical barriers storage devices locked cases physically hidden drives limited amount personnel knowledge access keys locations may prove good first line physical theft
[ 3932, 2912, 5568, 8091, 6189, 8109, 1670, 6756, 2875, 7120, 2513, 429, 5255, 7039, 5440, 1805 ]
Validation
944
3
Maziacs:maziacs maziacs action adventure maze game published dk'tronics 1983 zx spectrum commodore 64 msx maziacs written priestley based earlier zx81 game mazogs published bug byte 1982 mazogs one successful zx81 games priestley adapted higher-resolution colour-screen zx spectrum msx commodore 64 port written andy french maziacs takes place randomly generated scrolling overhead-view maze player-controlled protagonist must find gold exit level gold placed least 200 moves start position maze patrolled monsters called maziacs prisoners sometimes found walls maze highlight path gold short period time moving maze fighting maziacs decreases player energy replenished finding food main game screen shows one fiftieth maze view mode expands view show one twelfth whilst mode useful scouting purposes player move whilst viewing maziacs killed effectively swords several found maze used sword carried time gold last two factors lead tactic avoiding groups maziacs killing many possible collecting gold maziacs supported currah microspeech peripheral maziacs published critical reception good crash magazine awarded 82 highlighting appealing graphics animation retrospective later year crash criticized slightly unresponsive keyboard controls felt less addictive continued praise animation techniques maziacs ranked number 99 sinclair official top 100 zx spectrum games time game claustrophobic atmosphere choreographed animation general character
[]
Test
945
1
Copac:copac copac originally acronym consortium online public access catalogues union catalogue provided free access merged online catalogues many major research libraries specialist libraries united kingdom ireland plus british library national library scotland national library wales 40 million records around 90 libraries representing wide range materials across subject areas copac freely available widely used users mainly coming higher education institutions united kingdom also worldwide copac valued users research tool copac searchable web browser z39.50 client also accessible openurl search/retrieve via url sru interfaces interfaces used provide links items copac external sites used institute historical research website copac jisc service provided uk community basis agreement research libraries uk rluk service uses records supplied rluk members well increasing range specialist libraries collections national research interest full list contributors available including national trust places historic interest natural beauty royal botanic gardens kew middle temple library institution mechanical engineers imeche library july 2019 jisc replaced copac library hub discover
[ 2819, 98 ]
Validation
946
4
Norwegian_Cyber_Defence_Force:norwegian cyber defence force norwegian cyber defence force branch norwegian armed forces responsible military communications defensive cyberwarfare norway force employs 1,500 people located 60 locations main base jørstadmoen lillehammer secondary base kolsås outside oslo cyber defence established branch 18 september 2012
[ 3415, 6756 ]
Test
947
3
KDL:kdl kdl term used beos/haiku possibly operating systems serious kernel error causes computer drop kernel debugger kdl stands kernel debug ger land kdl brought buggy driver crucial filesystem driver escaped command 'es usually leaves user needing reboot
[ 5571, 2568, 6525 ]
Test
948
9
POSXML:posxml posxml acronym point sale extended markup language programming language based xml used create applications pos terminal normally programming language used develop applications c c++ main purpose posxml simplify development applications pos terminals contains set instructions pre-programmed commands allow direct interaction machine resulting large reduction application development time posxml organized structured form tags showing levels subsets set commands instructions form logical structure posxml application example similar vast majority existing programming languages posxml compiled specific format reduce file size allows application run pos terminal using framework virtual machine compiled program written posxml becomes set bytecodes interpreted virtual machine pos terminal results implementation pos terminal example compiled bytecode commands instructions posxml compliance use capital letters lowercase letters case sensitive acquired training commands belong language require parameters unlike commands need input interact machine examples commands require instructions parameters commands require instructions parameters interact equipment names given functions variables pages also obey rules written capital letters lowercase letters developer creates function called calcula_digito able call variable via calcula_digito call function variable page must meet exact name assigned programmer structured language based xml posxml language constantly evolving new commands instructions added library time initially language two dozen basic commands create functional application pos terminal using resources basic display lcd keypad magnetic card reader printer evolution language almost one hundred commands instructions available deal files pictures mathematical operators functions manipulate variables string type definition variables logical operators classes working protocol iso 8583 protocol standard exchanging information transactions credit cards among others tens commands instructions complete set language variables posxml typed two types integer string posxml limits number declared variables 512 variables declared global i.e shared throughout scheduled pages posxml program runtime process examples string type variable integer type variable call variable declared memory made name_of_the_variable regardless type also possible convert variable one type type posxml commands inttostring stringtoint used examples writing application pos terminal developer faced need write specific file system equipment posxml language works files type walk dbfile file system defined framework interprets program compiled posxml file system walk dbfile uses format key buffer n key buffer n basically format text files unix environment n used wrap 8 basic commands posxml language work files pos terminal examples
[ 5181, 1435 ]
Validation
949
3
History_of_general-purpose_CPUs:history general-purpose cpus history general-purpose cpus continuation earlier history computing hardware early 1950s computer design unique upward-compatible machines computer architectures multiple differing implementations programs written one machine would run kind even kinds company major drawback large body software developed run computers starting programming scratch seen large barrier design freedom time important designers constrained cost electronics starting explore computer could best organized basic features introduced period included index registers ferranti mark 1 return address saving instruction univac immediate operands ibm 704 detecting invalid operations ibm 650 end 1950s commercial builders developed factory-constructed truck-deliverable computers widely installed computer ibm 650 used drum memory onto programs loaded using either paper punched tape punched cards high-end machines also included core memory provided higher speeds hard disks also starting grow popular computer automatic abacus type number system affects way works early 1950s computers built specific numerical processing tasks many machines used decimal numbers basic number system mathematical functions machines worked base-10 instead base-2 common today merely binary coded decimal bcd machines ten vacuum tubes per digit processor register early soviet computer designers implemented systems based ternary logic bit could three states +1 0 -1 corresponding positive zero negative voltage early project u.s. air force binac attempted make lightweight simple computer using binary arithmetic deeply impressed industry late 1970 major computer languages unable standardize numeric behavior decimal computers groups users large alienate even designers used binary system still many odd ideas used sign-magnitude arithmetic -1 10001 ones complement -1 11110 rather modern two complement arithmetic -1 11111 computers used six-bit character sets adequately encoded hollerith punched cards major revelation designers period realize data word multiple character size began design computers 12- 24- 36-bit data words e.g. see tx-2 era grosch law dominated computer design computer cost increased square speed one major problem early computers program one would work others computer companies found customers little reason remain loyal given brand next computer bought would incompatible anyway point concerns usually price performance 1962 ibm tried new approach designing computers plan make family computers could run software different performances different prices users needs grew could move larger computers still keep investment programs data storage media designed one reference computer named system/360 s/360 virtual computer reference instruction set abilities machines family would support provide different classes machines computer family would use less hardware emulation less microprogram emulation create machine able run full s/360 instruction set instance low-end machine could include simple processor low cost however would require use larger microcode emulator provide rest instruction set would slow high-end machine would use much complex processor could directly process s/360 design thus running much simpler faster emulator ibm chose consciously make reference instruction set quite complex capable even though computer complex control store holding microprogram would stay relatively small could made fast memory another important effect one instruction could describe quite complex sequence operations thus computers would generally fetch fewer instructions main memory could made slower smaller less costly given mix speed price s/360 successor scientific machines like 7090 data processing machines like 1401 needed design could reasonably support forms processing hence instruction set designed manipulate simple binary numbers text scientific floating-point similar numbers used calculator binary coded decimal arithmetic needed accounting systems almost following computers included innovations form basic set features called complex instruction set computing cisc pronounced sisk term invented many years later reduced instruction set computing risc began get market share many ciscs instruction could access either registers memory usually several different ways made ciscs easier program programmer could remember thirty hundred instructions set three ten addressing modes rather thousands distinct instructions called orthogonal instruction set pdp-11 motorola 68000 architecture examples nearly orthogonal instruction sets also bunch burroughs univac ncr control data corporation honeywell competed ibm time however ibm dominated era s/360 burroughs corporation later merged sperry/univac form unisys offered alternative s/360 burroughs large systems b5000 series 1961 b5000 virtual memory symmetric multiprocessing multiprogramming operating system master control program mcp written algol 60 industry first recursive-descent compilers early 1963 mosfet metal-oxide-semiconductor field-effect transistor also known mos transistor invented mohamed atalla dawon kahng bell labs 1959 demonstrated 1960 led development metal-oxide-semiconductor mos integrated circuit ic proposed kahng 1961 fabricated fred heiman steven hofstein rca 1962 high scalability much lower power consumption higher density bipolar junction transistors mosfet made possible build high-density integrated circuits advances mos integrated circuit technology led development large-scale integration lsi chips late 1960s eventually invention microprocessor early 1970s 1960s development electronic calculators electronic clocks apollo guidance computer minuteman missile helped make mos integrated circuits economical practical late 1960s first calculator clock chips began show small computers might possible large-scale integration lsi culminated invention microprocessor single-chip cpu intel 4004 released 1971 first commercial microprocessor origins 4004 date back busicom project began japanese calculator company busicom april 1968 engineer masatoshi shima tasked designing special-purpose lsi chipset along supervisor tadashi tanba use busicom 141-pf desktop calculator integrated printer initial design consisted seven lsi chips including three-chip cpu design included arithmetic units adders multiplier units registers read-only memory macro-instruction set control decimal computer system busicom wanted general-purpose lsi chipset desktop calculators also equipment teller machine cash register billing machine shima thus began work general-purpose lsi chipset late 1968 sharp engineer tadashi sasaki also became involved development conceived single-chip microprocessor 1968 discussed concept brainstorming meeting held japan sasaki attributes basic invention break calculator chipset four parts rom 4001 ram 4002 shift registers 4003 cpu 4004 unnamed woman software engineering researcher nara women college present meeting sasaki first meeting robert noyce intel 1968 presented woman four-division chipset concept intel busicom busicom approached american company intel manufacturing help 1969 intel memory company back facilities manufacture high density silicon gate mos chip busicom required shima went intel june 1969 present design proposal due intel lacking logic engineers understand logic schematics circuit engineers convert intel asked shima simplify logic intel wanted single-chip cpu design influenced sharp tadashi sasaki presented concept busicom intel 1968 single-chip microprocessor design formulated intel marcian ted hoff 1969 simplifying shima initial design four chips including single-chip cpu due hoff formulation lacking key details shima came ideas find solutions implementation shima responsible adding 10-bit static shift register make useful printer buffer keyboard interface many improvements instruction set making ram organization suitable calculator memory address information transfer key program area performance program capacity functional specification decimal computer idea software desktop calculator logic real-time i/o control data exchange instruction accumulator general purpose register hoff shima eventually realized 4-bit microprocessor concept together help intel stanley mazor interpret ideas shima hoff specifications four chips developed period months 1969 intel team led hoff busicom team led shima late 1969 shima returned japan intel done work project early 1970 shima returned intel early 1970 found work done 4004 since left hoff moved projects week shima returned intel federico faggin joined intel become project leader shima explained project faggin worked together design 4004 thus chief designers chip faggin created design methodology silicon-based chip design hoff formulated architecture moving projects shima produced initial busicom design assisted development final intel design 4004 first introduced japan microprocessor busicom 141-pf calculator march 1971 north america first public mention 4004 advertisement november 15 1971 edition electronic news nec released μpd707 μpd708 two-chip 4-bit cpu 1971 followed nec first single-chip microprocessor μpd700 april 1972 prototype μcom-4 μpd751 released april 1973 combining μpd707 μpd708 single microprocessor 1973 toshiba released tlcs-12 first 12-bit microprocessor first commercial microprocessor binary coded decimal bcd based intel 4004 released busicom intel 1971 march 1972 intel introduced microprocessor 8-bit architecture 8008 integrated pmos logic re-implementation transistor–transistor logic ttl based datapoint 2200 cpu 4004 designers federico masatoshi shima went design successor intel 8080 slightly mini computer-like microprocessor largely based customer feedback limited 8008 much like 8008 used applications terminals printers cash registers industrial robots however able 8080 also became original target cpu early de facto standard personal computer operating system called cp/m used demanding control tasks cruise missiles many uses released 1974 8080 became one first really widespread microprocessors mid-1970s use integrated circuits computers common decade marked market upheavals caused shrinking price transistors became possible put entire cpu one printed circuit board result minicomputers usually 16-bit words 4k 64k memory became common ciscs believed powerful types computers microcode small could stored high-speed memory cisc architecture also addressed semantic gap perceived defined distance machine language higher level programming languages used program machine felt compilers could better job richer instruction set custom ciscs commonly constructed using bit slice computer logic amd 2900 chips custom microcode bit slice component piece arithmetic logic unit alu register file microsequencer bit-slice integrated circuits 4-bits wide early 1970s pdp-11 developed arguably advanced small computer day almost immediately wider-word ciscs introduced 32-bit vax 36-bit pdp-10 ibm continued make large fast computers however definition large fast meant megabyte ram clock speeds near one megahertz tens megabytes disk drives ibm system 370 version 360 tweaked run virtual computing environments virtual computer developed reduce chances unrecoverable software failure burroughs large systems b5000 b6000 b7000 series reached largest market share stack computer whose os programmed dialect algol different developments competed market share first single-chip 16-bit microprocessor introduced 1975 panafacom conglomerate formed japanese companies fujitsu fuji electric matsushita introduced mn1610 commercial 16-bit microprocessor according fujitsu world first 16-bit microcomputer single chip intel 8080 basis 16-bit intel 8086 direct ancestor today ubiquitous x86 family including pentium core i7 every instruction 8080 direct equivalent large x86 instruction set although opcode values different latter early 1980s researchers uc berkeley ibm discovered computer language compilers interpreters used small subset instructions complex instruction set computing cisc much power cpu ignored real-world use realized making computer simpler less orthogonal could make faster less costly time time cpu calculation became faster relation time needed memory accesses designers also experimented using large sets internal registers goal cache intermediate results registers control compiler also reduced number addressing modes orthogonality computer designs based theory called reduced instruction set computing risc riscs usually larger numbers registers accessed simpler instructions instructions specifically load store data memory result simple core cpu running high speed supporting sorts operations compilers using anyway common variant risc design employs harvard architecture versus von neumann architecture stored program architecture common designs harvard architecture machine program data occupy separate memory devices accessed simultaneously von neumann machines data programs mixed one memory device requiring sequential accessing produces so-called von neumann bottleneck one downside risc design programs run tend larger compilers must generate longer sequences simpler instructions perform results since instructions must loaded memory anyway larger code offsets risc design fast memory handling early 1990s engineers japan hitachi found ways compress reduced instruction sets fit even smaller memory systems ciscs compression schemes used instruction set superh series microprocessors introduced 1992 superh instruction set later adapted arm architecture thumb instruction set applications need run older binary software compressed riscs growing dominate sales another approach riscs minimal instruction set computer misc niladic zero-operand instruction set approach realized space instruction used identify operands instruction machines placed operands push-down last-in first stack instruction set supplemented instructions fetch store memory used simple caching provide extremely fast risc machines compact code another benefit interrupt latencies small smaller cisc machines rare trait risc machines burroughs large systems architecture used approach b5000 designed 1961 long term risc invented architecture puts six 8-bit instructions 48-bit word precursor long instruction word vliw design see burroughs architecture one inspirations charles h. moore programming language forth turn inspired later misc chip designs example f20 cores 31 5-bit instructions fit four 20-bit word risc chips dominate market 32-bit embedded systems smaller risc chips even growing common cost-sensitive 8-bit embedded-system market main market risc cpus systems need low power small size even cisc processors based architectures created risc grew dominant newer x86 processors translate instructions internally risc-like instruction set numbers may surprise many market perceived desktop computers x86 designs dominate desktop notebook computer sales computers tiny fraction computers sold people industrialised countries computers embedded systems car house desks mid-to-late 1980s designers began using technique termed instruction pipelining processor works multiple instructions different stages completion example processor retrieve operands next instruction calculating result current one modern cpus may use dozen stages pipelining originally developed late 1950s international business machines ibm 7030 stretch mainframe computer minimal instruction set computers misc execute instructions one cycle need pipelining similar idea introduced years later execute multiple instructions parallel separate arithmetic logic units alus instead operating one instruction time cpu look several similar instructions depend execute parallel approach called superscalar processor design methods limited degree instruction level parallelism ilp number non-dependent instructions program code programs run well superscalar processors due inherent high ilp notably graphics however general problems far less ilp thus lowering possible speedups methods branching one major culprit example program may add two numbers branch different code segment number bigger third number case even branch operation sent second alu processing still must wait results addition thus runs faster one alu common solution type problem use type branch prediction efficiency multiple functional units available superscalar designs operand register dependencies found another limiting factor minimize dependencies out-of-order execution instructions introduced scheme instruction results complete out-of-order must re-ordered program order processor program restartable exception out-of-order execution main advance computer industry 1990s similar concept speculative execution instructions one direction branch predicted direction executed branch direction known branch direction known predicted direction actual direction compared predicted direction correct speculatively executed instructions results kept incorrect instructions results erased speculative execution coupled accurate branch predictor gives large performance gain advances originally developed research risc-style designs allow modern cisc processors execute twelve instructions per clock cycle traditional cisc designs could take twelve cycles execute one instruction resulting instruction scheduling logic processors large complex difficult verify higher complexity needs transistors raising power consumption heat risc superior instructions simpler less interdependence make superscalar implementations easier however intel demonstrated concepts applied complex instruction set computing cisc design given enough time money instruction scheduling logic makes superscalar processor boolean logic early 1990s significant innovation realize coordination multi-alu computer could moved compiler software translates programmer instructions machine-level instructions type computer called long instruction word vliw computer scheduling instructions statically compiler versus scheduling dynamically processor reduce cpu complexity improve performance reduce heat cost unfortunately compiler lacks accurate knowledge runtime scheduling issues merely changing cpu core frequency multiplier effect scheduling operation program determined input data major effects scheduling overcome severe problems vliw system may enhanced adding normal dynamic scheduling losing vliw advantages static scheduling compiler also assumes dynamically generated code uncommon creation java java virtual machine true reasonable assume slow compiles would affect software developers just-in-time compilation jit virtual machines used many languages slow code generation affects users also several unsuccessful attempts commercialize vliw basic problem vliw computer scale different price performance points dynamically scheduled computer another issue compiler design vliw computers difficult compilers 2005 often emit suboptimal code platforms also vliw computers optimise throughput low latency unattractive engineers designing controllers computers embedded machinery embedded systems markets often pioneered computer improvements providing large market unconcerned compatibility older software january 2000 transmeta corporation took novel step placing compiler central processing unit making compiler translate reference byte code case x86 instructions internal vliw instruction set method combines hardware simplicity low power speed vliw risc compact main memory system software reverse-compatibility provided popular cisc intel itanium chip based call explicitly parallel instruction computing epic design design supposedly provides vliw advantage increased instruction throughput however avoids issues scaling complexity explicitly providing bundle instructions information concerning dependencies information calculated compiler would vliw design early versions also backward-compatible newer x86 software means on-chip emulator mode integer performance disappointing despite improvements sales volume markets continue low current designs work best computer running one program however nearly modern operating systems allow running multiple programs together cpu change work another program needs costly context switching contrast multi-threaded cpus handle instructions multiple programs cpus include several sets registers context switch occurs contents working registers simply copied one set registers purpose designs often include thousands registers instead hundreds typical design downside registers tend somewhat costly chip space needed implement chip space might used otherwise purpose intel calls technology hyperthreading offers two threads per core current core i3 core i7 core i9 desktop lineup well core i3 core i5 core i7 mobile lineup well offering four threads per core high-end xeon phi processors multi-core cpus typically multiple cpu cores die connected via shared l2 l3 cache on-die bus on-die crossbar switch cpu cores die share interconnect components interface processors rest system components may include front side bus interface memory controller interface dynamic random access memory dram cache coherent link processors non-coherent link southbridge i/o devices terms multi-core microprocessor unit mpu come general use one die multiple cpu cores one way work around von neumann bottleneck mix processor dram one chip another track development combine reconfigurable logic general-purpose cpu scheme special computer language compiles fast-running subroutines bit-mask configure logic slower less-critical parts program run sharing time cpu process allows creating devices software radios using digital signal processing perform functions usually performed analog electronics lines hardware software increasingly blur due progress design methodology availability chips field-programmable gate arrays fpga cheaper production processes even open source hardware begun appear loosely knit communities like opencores risc-v recently announced fully open cpu architectures openrisc readily implemented fpgas custom produced chips anyone license fees even established processor makers like sun microsystems released processor designs e.g. opensparc open-source licenses yet another option clockless asynchronous cpu unlike conventional processors clockless processors central clock coordinate progress data pipeline instead stages cpu coordinated using logic devices called pipe line controls fifo sequencers basically pipeline controller clocks next stage logic existing stage complete thus central clock unneeded relative clocked logic may easier implement high performance devices asynchronous logic asynchronous logic proponents believe abilities would benefits biggest disadvantage clockless cpu cpu design tools assume clocked cpu synchronous circuit making clockless cpu designing asynchronous circuit involves modifying design tools handle clockless logic extra testing ensure design avoids metastability problems even several asynchronous cpus built including one promising option eliminate front side bus modern vertical laser diodes enable change theory optical computer components could directly connect holographic phased open-air switching system would provide large increase effective speed design flexibility large reduction cost since computer connectors also likely failure points busless system may reliable 2010 modern processors use 64- 128-bit logic optical wavelength superposition could allow data lanes logic many orders magnitude higher electronics added space copper wires another long-term option use light instead electricity digital logic theory could run 30 faster use less power allow direct interface quantum computing devices main problems approach foreseeable future electronic computing elements faster smaller cheaper reliable elements already smaller wavelengths light thus even waveguide-based optical logic may uneconomic relative electronic logic 2016 development effort electronic circuitry early experimental work done using ion based chemical reactions instead electronic photonic actions implement elements logic processor relative conventional register machine stack machine architecture yet similar intel itanium architecture temporal register addressing scheme proposed ivan godard company intended greatly reduce complexity cpu hardware specifically number internal registers resulting huge multiplexer trees somewhat harder read debug general-purpose register names aids understanding view belt moving conveyor belt oldest values drop belt vanish implemented mill architecture
[ 4654, 708, 5012, 1447, 5371, 3948, 7527, 7529, 7535, 5737, 2567, 7178, 4694, 5041, 5042, 1481, 5055, 2226, 1114, 1867, 5079, 2248, 4368, 6148, 441, 2266, 6170, 4047, 5822, 1180, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, ...
Test
950
3
OMAP:omap omap open multimedia applications platform family developed texas instruments series image/video processors proprietary system chips socs portable mobile multimedia applications omap devices generally include general-purpose arm architecture processor core plus one specialized co-processors earlier omap variants commonly featured variant texas instruments tms320 series digital signal processor platform created december 12 2002 stmicroelectronics texas instruments jointly announced initiative open mobile application processor interfaces omapi intended used 2.5 3g mobile phones going produced 2003 later merged larger initiative renamed mipi alliance omap texas instruments implementation standard stmicroelectronics implementation named nomadik omap enjoy success smartphone tablet market 2011 lost ground qualcomm snapdragon september 26 2012 texas instruments announced would wind operations smartphone tablet oriented chips instead focus embedded platforms november 14 2012 texas instruments announced would cut 1,700 jobs due shift mobile embedded platforms last omap5 chips released q2 2013 omap family consists three product groups classified performance intended application two main distribution channels exist parts available channels genesis omap product line partnership cell phone vendors main distribution channel involves sales directly wireless handset vendors parts developed suit evolving cell phone requirements flexible powerful enough support sales less specialized catalog channels omap 1 parts many omap 3 parts catalog versions different sales support models parts obsolete perspective handset vendors may still needed support products developed using catalog parts distributor-based inventory management parts originally intended use application processors smartphones processors powerful enough run significant operating systems linux android symbian support connectivity personal computers support various audio video applications omap 1 family started ti-enhanced arm core changed standard arm926 core included many variants easily distinguished according manufacturing technology 130 nm except omap171x series cpu peripheral set distribution channel direct large handset vendors catalog-based distributors march 2009 omap1710 family chips still available handset vendors products using omap 1 processors include hundreds cell phone models nokia 770 internet tablets parts marketed handset vendors products using include internet tablets mobile phones 3rd generation omap omap 3 broken 3 distinct groups omap34x omap35x omap36x omap34x omap36x distributed directly large handset cell phone manufacturers omap35x variant omap34x intended catalog distribution channels omap36x 45 nm version 65 nm omap34x higher clock speed omap 3611 found devices like bookeen cybook odyssey licensed crippled version omap 3621 silicon marking officially 3611 sold able drive e-ink screen access iva dsp video technology higher end omap 3 parts derived part davinci product line first packaged higher end c64x+ dsps image processing controllers arm9 processors last seen older omap 1 generation arm cortex-a8 highlighted list omap 3 soc image video audio iva2 accelerator units capabilities devices support 12 megapixel camera images though support 5 3 megapixels support hd imaging 4th generation omaps omap 4430 used google glass 4460 formerly named 4440 4470 use dual-core arm cortex-a9 cpu two arm cortex-m3 cores part ducati sub-system off-loading low-level tasks 4430 4460 use powervr sgx540 integrated 3d graphics accelerator running clock frequency 304 384 mhz respectively 4470 powervr sgx544 gpu supports directx 9 enables use windows 8 well dedicated 2d graphics core increased power efficiency 50-90 omap 4 come iva3 multimedia hardware accelerator programmable dsp enables 1080p full hd multi-standard video encode/decode omap 4 uses arm cortex-a9 arm simd engine media processing engine aka neon may significant performance advantage cases nvidia tegra 2 arm cortex-a9s non-vector floating point units also uses dual-channel lpddr2 memory controller compared nvidia tegra 2 single-channel memory controller 5th generation omap omap 5 soc uses dual-core arm cortex-a15 cpu two additional cortex-m4 cores offload a15s less computationally intensive tasks increase power efficiency two powervr sgx544mp graphics cores dedicated ti 2d bitblt graphics accelerator multi-pipe display sub-system signal processor respectively support 24 20 megapixel cameras front rear 3d hd video recording chip also supports 8 gb dual channel lpddr2/ddr3 memory output four hd 3d displays 3d hdmi 1.4 video output omap 5 also includes three usb 2.0 ports one lowspeed usb 3.0 otg port sata 2.0 controller marketed handset manufacturers intended highly integrated low cost chips consumer products omap-dm series intended used digital media coprocessors mobile devices high megapixel digital still video cameras image signal processor isp used accelerate processing camera images marketed handset manufacturers many newer versions highly integrated use low cost cell phones omap l-1x parts marketed catalog channels different technological heritage omap parts rather deriving directly cell phone product lines grew video-oriented davinci product line removing video-specific features using upgraded davinci peripherals notable feature use floating point dsp instead customary fixed point one hawkboard uses omap-l138 many mobile phones use omap socs including nokia n9 n90 n91 n92 n95 n82 e61 e62 e63 e90 mobile phones well nokia 770 n800 n810 n900 internet tablets motorola droid samsung galaxy tab 2 7.0 droid x droid 2 palm pre pandora touch book also use omap soc omap3430 others use omap soc include sony ericsson satio idou vivaz samsung phones running symbian including omnia hd nook color archos tablets archos 80 gen 9 archos 101 gen 9 kindle fire hd blackberry playbook kobo arc b n nook hd also all-in-one smart displays using omap 4 socs viewsonic vsd220 omap 4430 omap socs also used basis number hobbyist prototyping evaluation boards beagleboard pandaboard omap3 board gumstix presonus digital mixing boards
[ 2538, 6082, 6421, 7890, 722, 2926, 5740, 1473, 4694, 5750, 740, 5752, 7189, 5405, 5406, 7919, 1864, 67, 1138, 446, 451, 6874, 6165, 463, 804, 1167, 5472, 469, 4041, 3008, 3009, 3365, 6910, 5845, 1202, 6550, 7654, 6919, 3397, 8022, 1977,...
Test
951
2
Write_barrier:write barrier operating systems write barrier mechanism enforcing particular ordering sequence writes storage system computer system example write barrier file system mechanism program logic ensures in-memory file system state written persistent storage correct order write barrier garbage collector fragment code emitted compiler immediately every store operation ensure e.g generational invariants maintained write barrier memory system also known memory barrier hardware-specific compiler intrinsic ensures preceding memory operations happen subsequent ones
[ 1616, 1782, 6053, 1254, 5571, 1447 ]
Test
952
2
Homebrew_(package_management_software):homebrew package management software homebrew free open-source software package management system simplifies installation software apple macos operating system linux name intended suggest idea building software mac depending user taste originally written max howell package manager gained popularity ruby rails community earned praise extensibility homebrew recommended ease use well integration command line homebrew non-profit project member software freedom conservancy run entirely unpaid volunteers homebrew made extensive use github expand support several packages user contributions 2010 homebrew third-most-forked repository github 2012 homebrew largest number new contributors github 2013 homebrew largest number contributors issues closed project github homebrew spawned several sub-projects linuxbrew linux port officially merged homebrew homebrew cask builds upon homebrew focuses installation gui applications taps dedicated specific areas programming languages like php homebrew written max howell 2009 march 2013 homebrew successfully completed kickstarter campaign raise funds servers test build formulae managed raise december 13 2013 homebrew repository migrated howell github account project account february 2015 due downtime sourceforge resulted binaries unavailable homebrew moved hosting bintray september 21 2016 homebrew version 1.0.0 released december 2018 homebrew maintained team 21 people january 2019 linuxbrew merged back homebrew adding beta support linux windows subsystem linux homebrew ’ feature set february 2 2019 homebrew version 2.0.0 released homebrew written ruby programming language targets version ruby comes installed macos operating system default installed codice_1 consists git repository allowing user update homebrew pulling updated repository github package manager builds software source using formulae ruby scripts constructed homebrew domain specific language dsl managing dependencies downloading source files configuring compiling software binary packages called bottles provide pre-built formulae default options homebrew honor default privileges codice_1 directory ownership changed root group permissions wheel group installing user admin group specifically mode changes codice_3 codice_4 files directories ownership changed installer considered major security flaw homebrew collects installation build error operating system version statistics via google analytics possible opt command codice_5 users view analytics data last 30 90 365 days homebrew website
[ 4655, 5369, 5726, 4675, 6428, 5386, 397, 7555, 2594, 781, 5449, 5092, 4759, 1532, 7619, 7251, 3366, 4778, 3021, 4059, 3036, 1582, 4441, 7671, 523, 163, 1598, 1989, 8055, 5200, 5545, 6609, 1260, 5912, 569, 5571, 578, 2034, 4151, 1287, 27...
Train
953
3
IBM_ThinkPad_UltraPort:ibm thinkpad ultraport ibm ultraport nonstandard usb 1.1 port used ibm range thinkpad laptop computers electronically ultraport connector identical standard usb port ultraport uses proprietary mechanical connection ultraport devices plugged normal usb interface however ultraport devices shipped adapter allowed attached regular usb port select thinkpad models 2000 2002 came ultraport connector top edge laptop screen ibm sold variety laptop-relevant ultraport devices including webcams speakers microphone arrays ultraport designed 1999 response proliferation many laptop computers sony fujitsu others built-in cameras
[ 2342 ]
Test
954
4
Samy_Kamkar:samy kamkar samy kamkar born december 10 1985 american privacy security researcher computer hacker whistleblower entrepreneur age 16 kamkar dropped high school one year later co-founded fonality unified communications company based open source software raised 46 million private funding possibly best known creating releasing fastest spreading virus time myspace worm samy subsequently raided united states secret service patriot act also known creating skyjack custom drone hacks nearby parrot drones allowing controlled operator creating evercookie appeared top-secret nsa document revealed edward snowden front page new york times also known work wall street journal discovery illicit mobile phone tracking apple iphone google android microsoft windows phone mobile devices transmit gps wi-fi information parent companies mobile research led series class-action lawsuits companies privacy hearing capitol hill 2005 kamkar released samy worm first publicly released self-propagating cross-site scripting worm onto myspace worm carried payload would display string samy hero victim profile cause victim unknowingly send friend request kamkar user viewed profile would payload planted page within 20 hours october 4 2005 release one million users run payload making fastest spreading virus time myspace team temporarily shut myspace fix problem allowed worm operate 2006 kamkar raided united states secret service electronic crimes task force expanded patriot act releasing worm presented plea bargain prison time paying fine 20,000 usd serving three years probation working 720 hours community service kamkar pled guilty felony charge computer hacking los angeles superior court also per aforementioned agreement kamkar allowed keep single unnetworked computer explicitly prohibited internet access sentence since 2008 kamkar independent computer security privacy research consulting 2008 kamkar restriction computers lifted demonstrated weaknesses visa mastercard europay credit cards near field communication nfc radio-frequency identification rfid chips built released software demonstrating ability steal credit card information including name credit card number expiration date wirelessly cards also released code demonstrating wireless identity theft physical access control cards including hid global cards using rfid use credit card sized device removing need computer connected 2010 kamkar traveled dozen countries speaking mobile security research weaknesses discovered cryptanalysis php programming language including speaking largest annual hacker conventions world def con black hat briefings toorcon late 2010 kamkar traveled bratislava attend faraday hack day help expose political corporate corruption within slovakia government early 2011 kamkar joined board directors brave new software non-profit organization originally funded multimillion-dollar u.s. state department grant nonprofit responsible creating uproxy university washington google ideas browser extension intended allow users repressive regimes access internet without monitored nonprofit also created lantern network designed circumvent internet censorship defeat suppression digital information freedom speech addition releasing evercookie free open source software exposing surreptitious collection data apple google microsoft 2011 kamkar also exposed kissmetrics hulu recreating tracking cookies consumers deleted storing unique tracking identifiers flash cookies html5 local storage automatically deleted consumers cleared browser cookies several companies identified performing cookie respawning subsequently sued class-action lawyers january 2013 kissmetrics online advertising network settled cookie respawning related lawsuit 500,000 early 2010 kamkar discovered major flaw versions php programming language specifically pseudorandom number generator allowed attacker hijack session id user take session kamkar released patch fixed released exploit code demonstrating attack possible major banks social networks forums 2010 kamkar released evercookie cookie apparently deleted subsequently documented front page new york times 2013 top-secret nsa document leaked edward snowden citing evercookie method tracking tor users 2011 kamkar discovered iphone android windows phone mobile devices continuously sending gps coordinates correlated wi-fi mac addresses back apple google microsoft respectively released research several front page wall street journal articles iphone would continue send location data even location services turned windows phone would also continue send location data even user given app permission discovered data exposed google released androidmap tool exposing google database wi-fi mac addresses correlated physical coordinates populated android phones 2013 kamkar created skyjack combination open source software hardware run unmanned aerial vehicle engineered autonomously seek hack wirelessly take parrot drones within wifi distance creating army zombie drones entire software hardware specification released open source detailed website software released one day amazon.com announced amazon prime air possible future delivery service using drones deliver small packages early 2015 july 30 2015 kamkar introduced ownstar small electronic device could concealed near general motors vehicle interpose vehicle onstar link driver onstar remotelink app classic man-in-the-middle attack kamkar unauthorized user could substitute onstar commands locate unlock start vehicle august 11 general motors released upgrades onstar server software remotelink app block attacks 2015 reported kamkar built inexpensive electronic device size wallet could concealed near locked vehicle capture single keyless entry code used later time unlock vehicle device transmits jamming signal block vehicle reception rolling code signals owner fob recording signals two attempts needed unlock vehicle recorded first code sent vehicle owner makes second attempt recorded second code retained future use kamkar stated vulnerability widely known years present many vehicle types previously undemonstrated demonstration announced def con 23 november 24 2015 samy kamkar released magspoof portable device spoof/emulate magnetic stripe credit card wirelessly even standard magstripe readers generating strong electromagnetic field emulates traditional magnetic stripe card words magspoof used traditional credit card simply store credit cards modification technically disable chip requirements various form factors used security research area would traditionally require magstripe readers credit cards drivers licenses hotel room keys automated parking lot tickets etc november 16 2016 samy kamkar released poisontap usb ethernet emulator used hijack internet traffic target machine even computer password protected locked backdoored device remotely forced make request user cookies http unsecured websites security flags meaning attacker remotely impersonate local user
[ 6788, 2724, 1353, 5485, 6541, 5401, 2128, 6029, 2618, 3046, 3575, 1500, 1594, 862, 5611, 3426 ]
Test
955
1
SQuirreL_SQL_Client:squirrel sql client squirrel sql client database administration tool uses jdbc allow users explore interact databases via jdbc driver provides editor offers code completion syntax highlighting standard sql also provides plugin architecture allows plugin writers modify much application behavior provide database-specific functionality features database-independent desktop application written entirely java swing ui components run platform jvm squirrel sql client free open source software distributed gnu lesser general public license squirrel sql project developed team java developers around world led colin bell hosted sourceforge project since 2001 still developed today
[ 187, 7715, 3776, 1096, 6538, 5571, 4505, 4798, 6386, 5956, 5252, 7213, 3915, 1695, 4747 ]
Validation
956
7
Aum_Programming_Language:aum programming language aum programming language multi-paradigm programming language internal research project adapter since 2004 somewhat similar modern c feature set adding aspect-oriented-programming message passing pattern matching la objective-c embarcadero delphi erlang programming language main idea build everything around abstract syntax tree intermediate code a-la java bytecode cil dalvik software code aum modules compiled assemblies .dll/.class files analogue generically serialized abstract-syntax-trees aum supports aspect oriented programming ast pattern matching aspects may injected compiled code currently constructed lexer parser semantic analyzer first code gen basically ast-walking interpreter plans keep working project start using llvm machine code jit compilation one compilation targets native executable vm like c/c++ aum cross-platform development paradigm based 100 written scratch runtime library released open source software targeting linux windows android operating system platforms
[ 3623, 7357, 3915, 578 ]
Test
957
2
LIRS_caching_algorithm:lirs caching algorithm lirs low inter-reference recency set page replacement algorithm improved performance lru least recently used many newer replacement algorithms achieved using reuse distance metric dynamically ranking accessed pages make replacement decision algorithm developed song jiang xiaodong zhang page replacement algorithms rely existence reference locality function major difference among different replacement algorithms locality qualified lirs uses reuse distance page number distinct pages accessed two consecutive references page quantify locality specifically lirs uses last second-to-last references purpose page accessed first time reuse distance infinite contrast lru uses recency page number distinctive pages accessed reference page quantify locality take account up-to-date access history implementation lirs actually uses larger reuse distance recency page metric quantify locality denoted rd-r assuming cache capacity c pages lirs algorithm rank recently accessed pages according rd-r values retain c highly ranked pages cache concepts reuse distance recency visualized t1 t2 page b ’ second-to-last last reference times respectively t3 current time lirs organizes metadata cached pages uncached pages conducts replacement operations described also illustrated example graph lirs deployed mysql since version 5.1 also adopted infinispan data grid platform approximation lirs clock-pro adopted netbsd
[ 1575, 1564 ]
Test
958
2
Input/Output_Control_System:input/output control system input/output control system iocs several packages early ibm entry-level mainframe computers provided low level access records peripheral equipment iocs provides functionality similar file control processor fcp rca 3301 realcom operating system gefrc gecos computers 1950s 1960s typically dealt data organized records either nature media e.g. lines print application requirements iocs intended allow assembler language programmers read write records without worry details various devices blocking logical records physical records iocs provided run time i/o support several compilers computers era often operating systems modern sense application programs called iocs routines resident monitor included macro instructions expanded iocs routines cases iocs designed coexist simultaneous peripheral operations on-line spool software level access higher level provided bios bdos pc world fact iocs support character-oriented i/o versions iocs existed ibm 705 iii 1401/1440/1460 1410/7010 7070/7072/7074 7080 7040/7044/7090/7094 systems heavily influenced data management components operating systems system/360 name iocs carried dos/360 z/vse distinction logical iocs liocs physical iocs piocs although technical details nomenclature different among various iocs packages fundamental concepts concreteness discussion examples article mostly terms 7070 iocs also multiple continuation lines shown ellipses ... n't serve illustrate narrative iocs program must three things discussed subsection 7070 done using 7070 autocoder declarative statements macro instructions iocs supported several classes i/o equipment services offered iocs needed applications e.g. checkpoints label processing iocs program must identify particular devices types services uses 7070 iocs program must specify one diocs statements declarative statements identify index registers reserved use iocs indicate channels used indicate whether program coexist spool provide processing options end diocs statement causes assembly iocs unless preassembled version requested first general form omitted d729 form used iocs packages similar functions provided control cards iocs program must create control block file specifying information unique file 7070 iocs entries file specification table tape files generated dtf statement separate control blocks generated ddf duf statements iocs packages similar functions provided control cards code defines tape file channel 1 called sequential 1301/1302 disk file called dafile card file called consfile iocs program must specify actions wishes perform 7070 iocs done processing macros iocs packages similar functions provided explicit subroutine calls
[ 607, 1052, 2769, 5571, 6498, 6838 ]
Validation
959
7
GPU_cluster:gpu cluster gpu cluster computer cluster node equipped graphics processing unit gpu harnessing computational power modern gpus via general-purpose computing graphics processing units gpgpu fast calculations performed gpu cluster hardware classification gpu clusters fall two categories heterogeneous homogeneous heterogeneous hardware major ihv used amd nvidia even different models gpu used e.g 8800gt mixed 8800gtx gpu cluster considered heterogeneous homogeneous every single gpu hardware class make model i.e homogeneous cluster comprising 100 8800gts amount memory classifying gpu cluster according semantics largely directs software development cluster different gpus different capabilities utilized interconnect addition computer nodes respective gpus fast enough interconnect needed order shuttle data amongst nodes type interconnect largely depends number nodes present examples interconnects include gigabit ethernet infiniband vendors nvidia provides list dedicated tesla preferred partners tpp capability building delivering fully configured gpu cluster using tesla 20-series gpgpus amax information technologies dell hewlett-packard silicon graphics companies provide complete line gpu clusters systems software components required make many gpu-equipped machines act one include mapping algorithm run gpu cluster somewhat similar mapping algorithm run traditional computer cluster example rather distributing pieces array ram texture divided amongst nodes gpu cluster
[ 1833, 972, 5939, 3764, 7010, 7442, 8024, 6793, 1117, 240, 357, 4537 ]
Test
960
9
Applicative_programming_language:applicative programming language classification programming languages applicative programming language designed support development programs giving result function combined variables successive functional transformations applied data arrive result language program control total state kept background may also known functional language rather loose sense term lisp ml application programming languages haskell programming paradigm developed applicative functor extends higher-order functional abstraction beyond monad
[ 6507, 2740, 7750, 1445, 3570 ]
Test
961
2
Bill_Atkinson:bill atkinson bill atkinson born 1951 american computer engineer photographer atkinson worked apple computer 1978 1990 atkinson principal designer developer graphical user interface gui apple lisa later one first thirty members original apple macintosh development team creator ground-breaking macpaint application fulfilled vision using computer creative tool also designed implemented quickdraw fundamental toolbox lisa macintosh used graphics quickdraw performance essential success macintosh gui also one main designers lisa macintosh user interfaces atkinson also conceived designed implemented hypercard first popular hypermedia system hypercard put power computer programming database design hands nonprogrammers 1994 atkinson received eff pioneer award contributions received undergraduate degree university california san diego apple macintosh developer jef raskin one professors atkinson continued studies graduate student neurochemistry university washington raskin invited atkinson visit apple computer steve jobs persuaded join company immediately employee 51 atkinson never finished phd around 1990 general magic founding bill atkinson one three cofounders met following press byte magazine obstacles general magic success may appear daunting general magic typical start-up company partners include biggest players worlds computing communications consumer electronics loaded top-notch engineers given clean slate reinvent traditional approaches ubiquitous worldwide communications 2007 atkinson began working outside developer numenta startup working computer intelligence work atkinson said numenta fundamentally important society personal computer rise internet currently atkinson combined passion computer programming love nature photography create art images takes close-up photographs stones cut polished works highly regarded resemblance miniature landscapes hidden within stones atkinson 2004 book within stone features collection close-up photographs highly intricate detailed images creates made possible accuracy creative control digital printing process helped create atkinson noteworthy contributions field computing include atkinson works nature photographer actor nelson franklin portrayed 2013 film jobs
[ 405, 6765, 4355, 3169, 1599, 3412, 6971, 6814, 7245, 35, 3001, 3503, 360 ]
Test
962
9
Extempore_(software):extempore software extempore live coding environment focused real-time audiovisual software development designed accommodate demands cyber-physical computing extempore consists two integrated languages scheme extensions extempore language uses llvm cross-language compiler achieve performant digital signal processing related low-level features on-the-fly extempore shares use scheme syntax real-time audiovisual emphasis lead developer andrew sorenson older related project impromptu runs linux mac os x bindings apple libraries absent environment interface dynamic libraries
[ 6507, 7032, 4759, 5571, 7848, 578, 4981, 6408 ]
Test
963
5
Exterior_gateway_protocol:exterior gateway protocol exterior gateway protocol routing protocol used exchange routing information autonomous systems exchange crucial communications across internet notable exterior gateway protocols include exterior gateway protocol egp obsolete border gateway protocol bgp contrast interior gateway protocol type protocol used exchanging routing information gateways commonly routers within autonomous system example system corporate local area networks routing information used route network-level protocols like ip
[ 3821, 6178, 1462, 1543 ]
Test
964
9
Klaus_Samelson:klaus samelson klaus samelson december 21 1918 – may 25 1980 german mathematician physicist computer pioneer area programming language translation push-pop stack algorithms sequential formula translation computers born strasbourg alsace-lorraine lived breslau early childhood years elder brother mathematician hans samelson due political circumstances waited 1946 study mathematics physics ludwig maximilian university munich munich graduating worked briefly high school teacher returned university completed doctorate degree physics fritz bopp dissertation quantum mechanical problem posed arnold sommerfeld related unipolar induction dr samelson became interested numerical analysis hans piloty electrical engineer robert sauer professor mathematics began working together joined got involved early computers research associate mathematical institute technical university munich changed scientific career first publications came sauer interests dealing supersonic flow precision problems digital computations numerical calculations eigenvalues soon samelson strong influence began development computer science informatics new scientific discipline friedrich l. bauer also fritz bopp ph.d. advisor studied structure programming languages order develop efficient algorithms translation implementation research led bracketed structures became clear samelson principle govern translation programming languages run-time system stack models block structure fundamental breakthrough computer systems modeled designed piloty bauer samelson also worked design perm computer based partially whirlwind concept 1955 perm completed continued work bauer begun 1951 concepts automatic programming samelson played key role design algol 58 algol 60 1958 accepted chair mathematics university mainz since 1963 held chair technical university munich f.l bauer began develop university curriculum informatics computer science involved international standards programming informatics ifip became editor journal acta informatica began 1971
[ 1361, 3252, 7680, 1114, 3580, 6146, 1243 ]
Validation
965
4
Webattacker:webattacker webattacker do-it-yourself malware creation kit includes scripts simplify task infecting computers spam-sending techniques lure victims specially rigged websites allegedly created group russian programmers kit demands minimal technical sophistication manipulated used crackers sophos reported webattacker sold hacker web sites network individual resellers includes technical support malware code currently delivered least seven exploits including threats aimed microsoft mdac software mozilla firefox web browser sun microsystems java virtual machine programs exploitation process usually consists following steps software appears updated regularly exploit new flaws flaw discovered september 2006 internet explorer handles certain graphics files
[ 519, 6305 ]
Test
966
2
Bradley_M._Kuhn:bradley m. kuhn bradley m. kuhn born 1973 free software activist united states kuhn currently president software freedom conservancy previously executive director 2010 floss community liaison technology director software freedom law center sflc previously served executive director free software foundation fsf 2001 march 2005 elected fsf board directors march 2010 best known efforts gpl enforcement fsf sflc creator fsf license list original author affero general public license long proponent non-profit structures floss development leads efforts direction software freedom conservancy recipient 2012 o'reilly open source award kuhn attended loyola blakefield followed loyola college maryland graduating may 1995 summa cum laude bachelor science computer science kuhn attended graduate school computer science university cincinnati received master science degree 2001 direction graduate advisor john franco kuhn received usenix student grant scholarship thesis work. focused dynamic interoperability free software languages using port perl java virtual machine example larry wall served kuhn thesis committee kuhn thesis showed various problems regarding use stack-based virtual machines perl discovery became part justification launch parrot project kuhn active participant perl6 rfc process headed perl6-licensing committee process rfcs licensing written kuhn taught ap computer science walnut hills high school 1998-1999 academic year using linux-based lab built students kuhn volunteered free software foundation throughout graduate school hired part-time richard stallman assistant january 2000 kuhn seen posting lists professional capacity around time early employment fsf kuhn suggested creation maintained fsf license list page argued license proliferation kuhn also early active member cincinnati linux user group period serving board directors 1998 giving numerous presentations bradley kuhn computer science career briefly involved proprietary software development high school sour experience area one motivations sticking career non-profit work since graduate school kuhn worked non-profits hired full-time work fsf late 2000 promoted executive director march 2001 kuhn launched fsf associate membership campaign formalized gnu general public license gpl enforcement efforts gpl compliance labs led fsf response sco lawsuit authored affero clause original version agpl taught numerous cle classes lawyers gpl kuhn left fsf march 2005 join founding team software freedom law center eben moglen daniel ravicher subsequently established software freedom conservancy april 2006 fsf sflc kuhn involved major efforts united states enforce gpl sflc assisted eben moglen richard stallman richard fontana drafting gplv3 managed production software system gplv3 comment process called stet advocated strongly inclusion affero clause gplv3 assisted production agplv3 fsf decided write separate affero version gplv3 prior 2010 kuhn floss community liaison technical director software freedom law center president software freedom conservancy october 2010 became conservancy first executive director leadership change serves president distinguished technologist karen sandler holds executive director position 2010 kuhn founded replicant project together aaron williamson graziano sorbaioli denis ‘ gnutoo ’ carikli aiming replacing proprietary android components free software counterparts kuhn fact registrant replicant.us domain since october 2010 kuhn co-hosted sandler free freedom podcast covers legal policy issues floss world kuhn sandler previously co-hosted similar podcast software freedom law show kuhn avid poker player played professionally part-time basis 2002-2007 since january 2008 contributor pokersource gpl 'd online poker system written maintained loïc dachary
[ 707, 3938, 1822, 7528, 2559, 389, 7555, 5757, 7559, 3981, 5759, 412, 761, 2599, 5787, 2260, 4020, 6505, 1523, 5453, 2985, 5803, 6876, 462, 1535, 1176, 4401, 1934, 5829, 1192, 1563, 4070, 4435, 2689, 3404, 5515, 1227, 2698, 5540, 3084, 1...
Test
967
5
Port_Aggregation_Protocol:port aggregation protocol port aggregation protocol pagp cisco systems proprietary networking protocol used automated logical aggregation ethernet switch ports known etherchannel pagp proprietary cisco systems similar protocol known lacp — released ieee known 802.3ad 802.1ax recently — industry standard tied specific vendor pagp configured cisco switch operate three different modes cisco network devices running catos single switch module may configured run either lacp pagp modes cisco devices run ios native and/or non-hybrid mode boxes support individual port configuration lacp restricted per module settings catos pagp messages always sent well known cisco multicast address 01-00-0c-cc-cc-cc protocol type code 0x0104 pagp uses multicast group mac address cdp limitation port aggregation protocol physical ports aggregation group must reside switch cisco 6500 4500e platforms remove limitation using virtual switching system vss allows port channels split two chassis port aggregation protocol line speed agport total line speeds physical ports automatically means single transfer use aggregated interfaces bandwidth rather depend distribution method choice cisco switches use src/dst mac address hash distribution method meaning single session use bandwidth single interface cisco switches uses proprietary distribution method enable true frame round-robin enabling maximum link speed sum interfaces composing aggregation group mean packet order altered however plain etherchannel load-balancing works switch assign hash result 0-7 based configured hash method load-balancing algorithm type traffic hash result commonly called result bundle hash rbh divided available links therefore single flow exceed speed physical port however pagp-enabled switches negotiate maximize load balancing preserve ordering link former give maximum aggregated bandwidth expense packet ordering latter assures packet reordering occur limit single transfer bandwidth single interface
[ 4926, 4783, 5181 ]
Validation
968
2
Jono_Bacon:jono bacon jono bacon full name jonathan edward james bacon writer software engineer originally united kingdom based california works consultant community strategy bacon started work linux community created linux uk website left project moved join kde team created kde :enterprise website kde usability study bacon started career linux journalist moving 2006 work openadvantage help move organizations open source solutions 4 september 2006 28 may 2014 worked canonical ltd. ubuntu community manager 29 may 2014 30 october 2015 worked xprize senior director community 14 november 2015 may 2016 bacon worked director community github currently works consultant community strategy bacon written variety publications including linux user developer linux format linux magazine mactech macformat pc plus addition magazines also written number books including art community linux desktop hacks php mysql web applications building eight dynamic web sites also co-wrote official ubuntu book benjamin mako hill corey burger jonathan jesse bacon co-founder lugradio bad voltage podcasts co-host floss weekly bacon played several metal bands singer guitarist 2008 2012 defiance guitarist jim adams ran metal band severed fifth released three albums distributed music freely creative commons license
[ 3938, 1822, 7528, 2559, 7555, 2585, 5759, 7559, 412, 2260, 5453, 5803, 462, 1535, 1176, 4401, 5829, 2297, 1192, 4435, 2689, 3404, 3738, 1227, 5523, 6951, 4465, 5540, 3084, 1260, 5912, 3780, 578, 7740, 4165, 589, 3133, 4187, 966, 2074, 8...
Test
969
9
Bill_Schelter:bill schelter william frederick schelter 1947 – july 30 2001 professor mathematics university texas austin lisp developer programmer schelter credited development gnu common lisp gcl implementation common lisp gpl 'd version computer algebra system macsyma called maxima schelter authored austin kyoto common lisp akcl contract ibm akcl formed foundation axiom another computer algebra system akcl eventually became gnu common lisp also credited first port gnu c compiler intel 386 architecture used original implementation linux kernel schelter obtained ph.d. mcgill university 1972 mathematical specialties noncommutative ring theory computational algebra applications including automated theorem proving geometry summer 2001 age 54 died suddenly heart attack traveling russia
[ 6876, 1445, 1243, 4332 ]
Validation
970
2
David_J._Brown:david j brown david j brown american computer scientist one small group helped develop system stanford later resulted sun microsystems later founder silicon graphics 1982 brown received primary secondary school education new york city studied university pennsylvania moore school electrical engineering received b.s.e 1979 m.s.e tutelage ruzena bajcsy 1980 1984 brown introduced david wheeler invited join university cambridge computer laboratory doctoral candidate october 1986 matriculated st john college university cambridge england pursue ph.d. dissertation introduced concept unified memory architecture idea subsequently widely applied — notably intel processors platform architecture late 1990s onward brown became member research staff computer science department stanford university 1981 helped develop research edition sun workstation andreas bechtolsheim prior establishment sun microsystems 1982 brown one group seven technical staff stanford along kurt akeley tom davis rocky rhodes mark hannah mark grossman charles herb kuta joined jim clark form silicon graphics brown stephen r. bourne formed workstation systems engineering group digital equipment corporation together built group responsible introduction decstation line computer systems 1992 brown joined sun microsystems helped establish process used company system software architecture went define application binary interface solaris sun principal system software product later brown worked solaris adoption open-source software practices technologies energy-efficient computing 1998 brown elected council association computing machinery later became founding editor acm queue magazine
[ 4362, 7010, 4121, 4802, 5104, 4099, 3567, 3614, 3692, 156, 787 ]
Validation
971
3
SPARC:sparc sparc scalable processor architecture reduced instruction set computing risc instruction set architecture isa originally developed sun microsystems fujitsu design strongly influenced experimental berkeley risc system developed early 1980s first developed 1986 released 1987 sparc one successful early commercial risc systems success led introduction similar risc designs number vendors 1980s 90s first implementation original 32-bit architecture sparc v7 used sun sun-4 workstation server systems replacing earlier sun-3 systems based motorola 68000 series processors sparc v8 added number improvements part supersparc series processors released 1992 sparc v9 released 1993 introduced 64-bit architecture first released sun ultrasparc processors 1995 later sparc processors used symmetric multiprocessing smp non-uniform memory access cc-numa servers produced sun solbourne fujitsu among others design turned sparc international trade group 1989 since architecture developed members sparc international also responsible licensing promoting sparc architecture managing sparc trademarks including sparc owns providing conformance testing sparc international intended grow sparc architecture create larger ecosystem sparc licensed several manufacturers including atmel bipolar integrated technology cypress semiconductor fujitsu matsushita texas instruments due sparc international sparc fully open non-proprietary royalty-free september 2017 latest commercial high-end sparc processors fujitsu sparc64 xii introduced 2017 sparc m12 server sparc64 xifx introduced 2015 primehpc fx100 supercomputer oracle sparc m8 introduced september 2017 high-end servers friday september 1 2017 round layoffs started oracle labs november 2016 oracle terminated sparc design completion m8 much processor core development group austin texas dismissed teams santa clara california burlington massachusetts sparc development continues fujitsu returning role leading provider sparc servers new cpu due 2020 time frame sparc architecture heavily influenced earlier risc designs including risc ii university california berkeley ibm 801 original risc designs minimalist including features op-codes possible aiming execute instructions rate almost one instruction per clock cycle made similar mips architecture many ways including lack instructions multiply divide another feature sparc influenced early risc movement branch delay slot sparc processor usually contains many 160 general purpose registers according oracle sparc architecture 2015 specification implementation may contain 72 640 general-purpose 64-bit registers point 32 immediately visible software — 8 set global registers one g0 hard-wired zero seven usable registers 24 stack registers 24 registers form called register window function call/return window moved register stack window 8 local registers shares 8 registers adjacent windows shared registers used passing function parameters returning values local registers used retaining local values across function calls scalable sparc comes fact sparc specification allows implementations scale embedded processors large server processors sharing core non-privileged instruction set one architectural parameters scale number implemented register windows specification allows three 32 windows implemented implementation choose implement 32 provide maximum call stack efficiency implement three reduce cost complexity design implement number architectures include similar register file features include intel i960 ia-64 amd 29000 architecture gone several revisions gained hardware multiply divide functionality version 8 64-bit addressing data added version 9 sparc specification published 1994 sparc version 8 floating point register file 16 double-precision registers used two single-precision registers providing total 32 single precision registers odd-even number pair double precision registers used quad-precision register thus allowing 8 quad precision registers sparc version 9 added 16 double precision registers also accessed 8 quad precision registers additional registers accessed single precision registers sparc cpu implements quad-precision operations hardware 2004 tagged add subtract instructions perform adds subtracts values checking bottom two bits operands 0 reporting overflow useful implementation run time ml lisp similar languages might use tagged integer format endianness 32-bit sparc v8 architecture purely big-endian 64-bit sparc v9 architecture uses big-endian instructions access data either big-endian little-endian byte order chosen either application instruction load-store level memory page level via mmu setting latter often used accessing data inherently little-endian devices pci buses three major revisions architecture first published version 32-bit sparc version 7 v7 1986 sparc version 8 v8 enhanced sparc architecture definition released 1990 main differences v7 v8 addition integer multiply divide instructions upgrade 80-bit extended precision floating-point arithmetic 128-bit quad-precision arithmetic sparc v8 served basis ieee standard 1754-1994 ieee standard 32-bit microprocessor architecture sparc version 9 64-bit sparc architecture released sparc international 1993 developed sparc architecture committee consisting amdahl corporation fujitsu icl lsi logic matsushita philips ross technology sun microsystems texas instruments newer specifications always remain compliant full sparc v9 level 1 specification 2002 sparc joint programming specification 1 jps1 released fujitsu sun describing processor functions identically implemented cpus companies commonality first cpus conforming jps1 ultrasparc iii sun sparc64 v fujitsu functionalities covered jps1 documented processor implementation supplements end 2003 jps2 released support multicore cpus first cpus conforming jps2 ultrasparc iv sun sparc64 vi fujitsu early 2006 sun released extended architecture specification ultrasparc architecture 2005 includes non-privileged privileged portions sparc v9 also architectural extensions developed processor generations ultrasparc iii iv iv+ well cmt extensions starting ultrasparc t1 implementation 2007 sun released updated specification ultrasparc architecture 2007 ultrasparc t2 implementation complied august 2012 oracle corporation made available new specification oracle sparc architecture 2011 besides overall update reference adds vis 3 instruction set extensions hyperprivileged mode 2007 specification october 2015 oracle released sparc m7 first processor based new oracle sparc architecture 2015 specification.- revision includes vis 4 instruction set extensions hardware-assisted encryption silicon secured memory ssm sparc architecture provided continuous application binary compatibility first sparc v7 implementation 1987 sun ultrasparc architecture implementations among various implementations sparc sun supersparc ultrasparc-i popular used reference systems spec cpu95 cpu2000 benchmarks 296 mhz ultrasparc-ii reference system spec cpu2006 benchmark following organizations licensed sparc architecture notes sparc machines generally used sun sunos solaris opensolaris including derivatives illumos openindiana operating systems also used nextstep rtems freebsd openbsd netbsd linux 1993 intergraph announced port windows nt sparc architecture later cancelled october 2015 oracle announced linux sparc reference platform several fully open source implementations sparc architecture exist fully open source simulator sparc architecture also exists hpc loads fujitsu builds specialized sparc64 fx processors new instruction extensions set called hpc-ace high performance computing – arithmetic computational extensions fujitsu k computer ranked top500 june 2011 november 2011 lists combines 88,128 sparc64 viiifx cpus eight cores total 705,024 cores—almost twice many system top500 time k computer powerful next five systems list combined highest performance-to-power ratio supercomputer system also ranked green500 june 2011 list score 824.56 mflops/w november 2012 release top500 k computer ranked using far power top three ranked corresponding green500 release newer hpc processors ixfx xifx included recent primehpc fx10 fx100 supercomputers tianhe-2 top500 november 2014 number nodes galaxy ft-1500 opensparc-based processors developed china however processors contribute linpack score
[ 1447, 5737, 1465, 2929, 7180, 1478, 4336, 1481, 2950, 7213, 1502, 4363, 2989, 99, 2992, 3005, 4408, 3014, 1556, 4418, 3026, 1568, 1570, 4427, 1590, 7298, 5882, 5883, 7313, 7314, 5893, 4479, 3098, 1640, 216, 7368, 5934, 5936, 4515, 5939, ...
Test
972
7
Dell:dell dell us multinational computer technology company develops sells repairs supports computers related products services named founder michael dell company one largest technological corporations world employing 145,000 people u.s. around world annual report 2018 dell sells personal computers pcs servers data storage devices network switches software computer peripherals hdtvs cameras printers mp3 players electronics built manufacturers company well known innovations supply chain management electronic commerce particularly direct-sales model build-to-order configure order approach manufacturing—delivering individual pcs configured customer specifications dell pure hardware vendor much existence acquisition 2009 perot systems dell entered market services company since made additional acquisitions storage networking systems aim expanding portfolio offering computers delivering complete solutions enterprise customers dell listed number 51 fortune 500 list 2014 going private 2013 newly confidential nature financial information prevents company ranked fortune 2015 third largest pc vendor world lenovo hp dell largest shipper pc monitors worldwide dell sixth largest company texas total revenue according fortune magazine second largest non-oil company texas – behind – largest company greater austin area publicly traded company well component nasdaq-100 p 500 taken private leveraged buyout closed october 30 2013 2015 dell acquired enterprise technology firm emc corporation following completion purchase dell emc became divisions dell technologies dell traces origins 1984 michael dell created dell computer corporation time business pc limited student university texas austin dorm-room headquartered company sold ibm pc-compatible computers built stock components dell dropped school focus full-time fledgling business getting 1,000 expansion-capital family 1985 company produced first computer design turbo pc sold 795 pc limited advertised systems national computer magazines sale directly consumers custom assembled ordered unit according selection options company grossed 73 million first year operation 1986 michael dell brought lee walker 51-year-old venture capitalist president chief operating officer serve dell mentor implement dell ideas growing company walker also instrumental recruiting members board directors company went public 1988 walker retired 1990 due health michael dell hired morton meyerson former ceo president electronic data systems transform company fast-growing medium-sized firm billion-dollar enterprise company dropped pc limited name 1987 become dell computer corporation began expanding globally june 1988 dell market capitalization grew 30 million 80 million june 22 initial public offering 3.5 million shares 8.50 share 1992 fortune magazine included dell computer corporation list world 500 largest companies making michael dell youngest ceo fortune 500 company ever 1993 complement direct sales channel dell planned sell pcs big-box retail outlets wal-mart would brought additional 125 million annual revenue bain consultant kevin rollins persuaded michael dell pull deals believing would money losers long run margins retail thin best dell left reseller channel 1994 rollins would soon join dell full-time eventually become company president ceo originally dell emphasize consumer market due higher costs unacceptably-low profit margins selling individuals households changed company internet site took 1996 1997 industry average selling price individuals going dell going second- third-time computer buyers wanted powerful computers multiple features need much technical support choosing dell dell found opportunity among pc-savvy individuals liked convenience buying direct customizing pc means delivered days early 1997 dell created internal sales marketing group dedicated serving home market introduced product line designed especially individual users 1997 2004 dell enjoyed steady growth gained market share competitors even industry slumps period rival pc vendors compaq gateway ibm packard bell ast research struggled eventually left market bought dell surpassed compaq become largest pc manufacturer 1999 operating costs made 10 percent dell 35 billion revenue 2002 compared 21 percent revenue hewlett-packard 25 percent gateway 46 percent cisco 2002 compaq merged hewlett packard fourth-place pc maker newly combined hewlett packard took top spot struggled dell soon regained lead dell grew fastest early 2000s dell attained maintained top rating pc reliability customer service/technical support according consumer reports year year mid-to-late 90 2001 right windows xp released 1996 dell began selling computers website mid-1990s dell expanded beyond desktop computers laptops selling servers starting low-end servers major three providers servers time ibm hewlett packard compaq many based proprietary technology ibm power4 microprocessors various proprietary versions unix operating system dell new poweredge servers require major investment proprietary technologies ran microsoft windows nt intel chips could built cheaper competitors consequently dell enterprise revenues almost nonexistent 1994 accounted 13 percent company total intake 1998 three years later dell passed compaq top provider intel-based servers 31 percent market dell first acquisition occurred 1999 purchase convergenet technologies 332 million dell failed develop enterprise storage system in-house convergenet elegant complex technology fit dell commodity-producer business model forcing dell write entire value acquisition 2002 dell expanded product line include televisions handhelds digital audio players printers chairman ceo michael dell repeatedly blocked president coo kevin rollins attempt lessen company heavy dependency pcs rollins wanted fix acquiring emc corporation 2003 company rebranded simply dell inc. recognize company expansion beyond computers 2004 michael dell resigned ceo retaining position chairman handing ceo title kevin rollins president coo since 2001 despite longer holding ceo title dell essentially acted de facto co-ceo rollins rollins dell acquired alienware manufacturer high-end pcs targeted mainly towards gaming market 2005 earnings sales continued rise sales growth slowed considerably company stock lost 25 value year june 2006 stock traded around us 25 40 july 2005—the high-water mark company post-dotcom era slowing sales growth attributed maturing pc market constituted 66 dell sales analysts suggested dell needed make inroads non-pc businesses segments storage services servers dell price advantage tied ultra-lean manufacturing desktop pcs became less important savings became harder find inside company supply chain competitors hewlett-packard acer made pc manufacturing operations efficient match dell weakening dell traditional price differentiation throughout entire pc industry declines prices along commensurate increases performance meant dell fewer opportunities upsell customers lucrative strategy encouraging buyers upgrade processor memory result company selling greater proportion inexpensive pcs eroded profit margins laptop segment become fastest-growing pc market dell produced low-cost notebooks china like pc manufacturers eliminated dell manufacturing cost advantages plus dell reliance internet sales meant missed growing notebook sales big box stores cnet suggested dell getting trapped increasing commoditization high volume low margin computers prevented offering exciting devices consumers demanded despite plans expanding global regions product segments dell heavily dependent u.s. corporate pc market desktop pcs sold commercial corporate customers accounted 32 percent revenue 85 percent revenue comes businesses sixty-four percent revenue comes north south america according 2006 third-quarter results u.s. shipments desktop pcs shrinking corporate pc market purchases pcs upgrade cycles largely decided take break buying new systems last cycle started around 2002 three years companies started buying pcs ahead perceived y2k problems corporate clients expected upgrade extensive testing microsoft windows vista expected early 2007 putting next upgrade cycle around 2008 heavily depending pcs dell slash prices boost sales volumes demanding deep cuts suppliers dell long stuck direct sales model consumers become main drivers pc sales recent years yet decline consumers purchasing pcs web phone increasing numbers visiting consumer electronics retail stores try devices first dell rivals pc industry hp gateway acer long retail presence well poised take advantage consumer shift lack retail presence stymied dell attempts offer consumer electronics flat-panel tvs mp3 players dell responded experimenting mall kiosks plus quasi-retail stores texas new york dell reputation company relied upon supply chain efficiencies sell established technologies low prices instead innovator mid-2000s many analysts looking innovating companies next source growth technology sector dell low spending r relative revenue compared ibm hewlett packard apple inc. —which worked well commoditized pc market—prevented making inroads lucrative segments mp3 players later mobile devices increasing spending r would cut operating margins company emphasized dell done well horizontal organization focused pcs computing industry moved horizontal mix-and-match layers 1980s mid-2000 industry shifted vertically integrated stacks deliver complete solutions dell lagged far behind competitors like hewlett packard oracle dell reputation poor customer service since 2002 exacerbated moved call centers offshore growth outstripped technical support infrastructure came increasing scrutiny web original dell model known high customer satisfaction pcs sold thousands 2000s company could justify level service computers lineup sold hundreds rollins responded shifting dick hunter head manufacturing head customer service hunter noted dell dna cost-cutting got way aimed reduce call transfer times call center representatives resolve inquiries one call 2006 dell spent 100 million months improve rolled dellconnect answer customer inquiries quickly july 2006 company started direct2dell blog february 2007 michael dell launched ideastorm.com asking customers advice including selling linux computers reducing promotional bloatware pcs initiatives manage cut negative blog posts 49 22 well reduce dell hell prominent internet search engines also criticism dell used faulty components pcs particularly 11.8 million optiplex desktop computers sold businesses governments may 2003 july 2005 suffered faulty capacitors battery recall august 2006 result dell laptop catching fire caused much negative attention company though later sony found responsible faulty batteries 2006 marked first year dell growth slower pc industry whole fourth quarter 2006 dell lost title largest pc manufacturer rival hewlett packard whose personal systems group invigorated thanks restructuring initiated ceo mark hurd four five quarterly earnings reports expectations rollins resigned president ceo january 31 2007 founder michael dell assumed role ceo dell announced change campaign called dell 2.0 reducing number employees diversifying company products chairman board relinquishing ceo position michael dell still significant input company rollins years ceo return michael dell ceo company saw immediate changes operations exodus many senior vice-presidents new personnel brought outside company michael dell announced number initiatives plans part dell 2.0 initiative improve company financial performance include elimination 2006 bonuses employees discretionary awards reduction number managers reporting directly michael dell 20 12 reduction bureaucracy jim schneider retired cfo replaced donald carty company came sec probe accounting practices april 23 2008 dell announced closure one biggest canadian call-centers kanata ontario terminating approximately 1100 employees 500 redundancies effective spot official closure center scheduled summer call-center opened 2006 city ottawa bid host less year later dell planned double workforce nearly 3,000 workers add new building plans reversed due high canadian dollar made ottawa staff relatively expensive also part dell turnaround involved moving call-center jobs offshore cut costs company also announced shutdown edmonton alberta office losing 900 jobs total dell announced ending 8,800 jobs 2007–2008 — 10 workforce late 2000s dell configure order approach manufacturing—delivering individual pcs configured customer specifications us facilities longer efficient competitive high-volume asian contract manufacturers pcs became powerful low-cost commodities dell closed plants produced desktop computers north american market including mort topfer manufacturing center austin texas original location lebanon tennessee opened 1999 2008 early 2009 respectively desktop production plant winston-salem north carolina received us 280 million incentives state opened 2005 ceased operations november 2010 dell contract state required repay incentives failing meet conditions sold north carolina plant herbalife work used take place dell u.s. plants transferred contract manufacturers asia mexico dell factories overseas miami florida facility alienware subsidiary remains operation dell continues produce servers profitable products austin texas january 8 2009 dell announced closure manufacturing plant limerick ireland loss 1,900 jobs transfer production plant łodź poland release apple ipad tablet computer negative impact dell major pc vendors consumers switched away desktop laptop pcs dell mobility division managed success developing smartphones tablets whether running windows google android dell streak failure commercially critically due outdated os numerous bugs low resolution screen infoworld suggested dell oems saw tablets short-term low-investment opportunity running google android approach neglected user interface failed gain long term market traction consumers dell responded pushing higher-end pcs xps line notebooks compete apple ipad kindle fire tablets growing popularity smartphones tablet computers instead pcs drove dell consumer segment operating loss q3 2012 december 2012 dell suffered first decline holiday sales five years despite introduction windows 8 shrinking pc industry dell continued lose market share dropped lenovo 2011 fall number three world dell fellow american contemporary hewlett packard came pressure asian pc manufacturers lenovo asus acer lower production costs willing accept lower profit margins addition asian pc vendors improving quality design instance lenovo thinkpad series winning corporate customers away dell laptops dell customer service reputation slipping dell remained second-most profitable pc vendor took 13 percent operating profits pc industry q4 2012 behind apple inc. macintosh took 45 percent seven percent hewlett packard six percent lenovo asus one percent acer dell attempting offset declining pc business still accounted half revenue generates steady cash flow expanding enterprise market servers networking software services avoided many acquisition writedowns management turnover plagued chief rival hewlett packard dell also managed success taking advantage high-touch direct sales heritage establish close relationships design solutions clients despite spending 13 billion acquisitions diversify portfolio beyond hardware company unable convince market could thrive made transformation post-pc world suffered continued declines revenue share price dell market share corporate segment previously moat rivals longer case sales profits fallen precipitously several weeks rumors started around january 11 2013 dell announced february 5 2013 struck 24.4 billion leveraged buyout deal would delisted shares nasdaq hong kong stock exchange taken private reuters reported michael dell silver lake partners aided 2 billion loan microsoft would acquire public shares 13.65 apiece 24.4 billion buyout projected largest leveraged buyout backed private equity since 2007 financial crisis also largest technology buyout ever surpassing 2006 buyout freescale semiconductor 17.5 billion founder dell michael dell said february offer believe transaction open exciting new chapter dell customers team members dell rival lenovo reacted buyout saying financial actions traditional competitors substantially change outlook march 2013 blackstone group carl icahn expressed interest purchasing dell april 2013 blackstone withdrew offer citing deteriorating business private equity firms kkr co. tpg capital declined submit alternative bids dell citing uncertain market personal computers competitive pressures wide-open bidding war never materialized analysts said biggest challenge facing silver lake would find “ exit strategy ” profit investment would company would hold ipo go public one warned “ even get 25bn enterprise value dell take years get out. ” may 2013 dell joined board voting offer following august reached deal special committee board 13.88 raised price 13.75 plus special dividend 13 cents per share well change voting rules 13.88 cash offer plus .08 per share dividend third fiscal quarter accepted september 12 closed october 30 2013 ending dell 25-year run publicly traded company buyout newly private dell offered voluntary separation programme expected reduce workforce seven percent reception program exceeded expectations dell may forced hire new staff make losses november 19 2015 dell alongside arm holdings cisco systems intel microsoft princeton university founded openfog consortium promote interests development fog computing july 2018 dell announced intentions become publicly traded company paying 21.7 billion cash stock buy back shares stake vmware november 2018 carl icahn 9.3 owner dell sued company plans go public october 12 2015 dell announced intent acquire enterprise software storage company emc corporation 67 billion labeled highest-valued tech acquisition history announcement came two years dell inc. returned private ownership claiming faced bleak prospects would need several years public eye rebuild business thought company value roughly doubled since emc pressured elliott management hedge fund holding 2.2 emc stock reorganize unusual federation structure emc divisions effectively run independent companies elliott argued structure deeply undervalued emc core emc ii data storage business increasing competition emc ii vmware products confusing market hindering companies wall street journal estimated 2014 dell revenue 27.3billion personal computers 8.9bn servers emc 16.5bn emc ii 1bn rsa security 6bn vmware 230million pivotal software emc owns around 80 percent stock vmware proposed acquisition maintain vmware separate company held via new tracking stock parts emc rolled dell acquisition closes dell publish quarterly financial results ceased going private 2013 combined business expected address markets scale-out architecture converged infrastructure private cloud computing playing strengths emc dell commentators questioned deal fbr capital markets saying though makes ton sense dell nightmare scenario would lack strategic synergies emc fortune said lot dell like emc portfolio add enough justify tens billions dollars entire package probably register reported view william blair company merger would blow current chess board forcing infrastructure vendors restructure achieve scale vertical integration value vmware stock fell 10 announcement valuing deal around 63–64bn rather 67bn originally reported key investors backing deal besides dell singapore temasek holdings silver lake partners september 7 2016 dell completed acquisition emc post-acquisition dell re-organized new parent company dell technologies dell consumer workstation businesses internally referred dell client solutions group one company three main business divisions alongside dell emc vmware dell headquarters located round rock texas company employed 14,000 people central texas region largest private employer space 1999 almost half general fund city round rock originated sales taxes generated dell headquarters dell previously headquarters arboretum complex northern austin texas 1989 dell occupied arboretum complex 1990 dell 1,200 employees headquarters 1993 dell submitted document round rock officials titled dell computer corporate headquarters round rock texas may 1993 schematic design despite filing year company said going move headquarters 1994 dell announced moving employees arboretum going continue occupy top floor arboretum company official headquarters address would continue arboretum top floor continued hold dell board room demonstration center visitor meeting room less one month prior august 29 1994 dell moved 1,100 customer support telephone sales employees round rock dell lease arboretum scheduled expire 1994 1996 dell moving headquarters round rock january 1996 3,500 people still worked current dell headquarters one building round rock headquarters round rock 3 space 6,400 employees scheduled completed november 1996 1998 dell announced going add two buildings round rock complex adding office space complex 2000 dell announced would lease space las cimas office complex unincorporated travis county texas austin west lake hills house company executive offices corporate headquarters 100 senior executives scheduled work building end 2000 january 2001 company leased space las cimas 2 located along loop 360 las cimas 2 housed dell executives investment operations corporate functions dell also option space las cimas 3 slowdown business required reducing employees production capacity dell decided sublease offices two buildings las cimas office complex 2002 dell announced planned sublease space another tenant company planned move headquarters back round rock tenant secured 2003 dell moved headquarters back round rock leased las cimas ii total seven-year period 2003 year roughly space absorbed new subtenants 2008 dell switched power sources round rock headquarters environmentally friendly ones 60 total power coming txu energy wind farms 40 coming austin community landfill gas-to-energy plant operated waste management inc. dell facilities united states located austin texas nashua new hampshire nashville tennessee oklahoma city oklahoma peoria illinois hillsboro oregon portland area winston-salem north carolina eden prairie minnesota dell compellent bowling green kentucky lincoln nebraska miami florida facilities located abroad include penang malaysia xiamen china bracknell uk manila philippines chennai india hyderabad india noida india hortolandia porto alegre brazil bratislava slovakia łódź poland panama city panama dublin limerick ireland casablanca morocco montpellier france us india countries dell business functions provide support globally research development manufacturing finance analysis customer care early beginnings dell operated pioneer configure order approach manufacturing—delivering individual pcs configured customer specifications contrast pc manufacturers times delivered large orders intermediaries quarterly basis minimize delay purchase delivery dell general policy manufacturing products close customers also allows implementing just-in-time jit manufacturing approach minimizes inventory costs low inventory another signature dell business model—a critical consideration industry components depreciate rapidly dell manufacturing process covers assembly software installation functional testing including burn-in quality control throughout company history dell manufactured desktop machines in-house contracted manufacturing base notebooks configuration in-house company approach changed cited 2006 annual report states continuing expand use original design manufacturing partnerships manufacturing outsourcing relationships wall street journal reported september 2008 dell approached contract computer manufacturers offers sell plants late 2000s dell configure order approach manufacturing—delivering individual pcs configured customer specifications us facilities longer efficient competitive high-volume asian contract manufacturers pcs became powerful low-cost commodities assembly desktop computers north american market formerly took place dell plants austin texas original location lebanon tennessee opened 1999 closed 2008 early 2009 respectively plant winston-salem north carolina received us 280 million incentives state opened 2005 ceased operations november 2010 dell contract state requires repay incentives failing meet conditions work used take place dell u.s. plants transferred contract manufacturers asia mexico dell factories overseas miami florida facility alienware subsidiary remains operation dell continues produce servers profitable products austin texas dell assembled computers emea market limerick facility republic ireland employed 4,500 people country dell began manufacturing limerick 1991 went become ireland largest exporter goods second-largest company foreign investor january 8 2009 dell announced would move dell manufacturing limerick dell new plant polish city łódź january 2010 european union officials said would investigate €52.7million aid package polish government used attract dell away ireland european manufacturing facility 1 emf1 opened 1990 emf3 form part raheen industrial estate near limerick emf2 previously wang facility later occupied flextronics situated castletroy closed 2002 dell inc. consolidated production emf3 emf1 contains offices subsidies polish government keep dell long time ending assembly limerick plant cherrywood technology campus dublin largest dell office republic 1200 people sales mainly uk ireland support enterprise support emea research development cloud computing manufacturing except dell alienware subsidiary manufactures pcs athlone ireland plant whether facility remain ireland certain construction emf4 łódź poland dell started production autumn 2007 dell opened plants penang malaysia 1995 xiamen china 1999 facilities serve asian market assemble 95 dell notebooks dell inc. invested estimated 60 million new manufacturing unit chennai india support sales products indian subcontinent indian-made products bear made india mark 2007 chennai facility target producing 400,000 desktop pcs plans envisaged starting produce notebook pcs products second half 2007 dell moved desktop notebook poweredge server manufacturing south american market eldorado sul plant opened 1999 new plant hortolandia brazil 2007 corporation markets specific brand names different market segments business/corporate class represent brands company advertising emphasizes long life-cycles reliability serviceability brands include dell home office/consumer class emphasizes value performance expandability brands include dell peripherals class includes usb keydrives lcd televisions printers dell monitors includes lcd tvs plasma tvs projectors hdtv monitors dell ultrasharp high-end brand monitors dell service support brands include dell solution station extended domestic support services previously dell call dell support center extended support services abroad dell business support commercial service-contract provides industry-certified technician lower call-volume normal queues dell everdream desktop management software service remote-desktop management originally saas company founded elon musk cousin lyndon rive dell bought 2007 tech team support-queue available home users purchased systems either dell website dell phone-centers discontinued products brands include axim pda discontinued april 9 2007 dimension home small office desktop computers discontinued july 2007 dell digital jukebox mp3 player discontinued august 2006 dell powerapp application-based servers dell optiplex desktop tower computers previously supported run server desktop operating systems november 2015 emerged several dell computers shipped identical pre-installed root certificate known edellroot raised security risks attackers impersonating https-protected websites google bank america malware signed certificate bypass microsoft software filtering dell apologised offered removal tool also november 2015 researcher discovered customers diagnostic program dell foundation services could digitally tracked using unique service tag number assigned program possible even customer enabled private browsing deleted browser cookies ars technica recommended dell customers uninstall program issue addressed board consists nine directors michael dell founder company serves chairman board chief executive officer board members include carty judy lewent klaus luft alex mandl sam nunn shareholders elect nine board members meetings board members get majority votes must submit resignation board subsequently choose whether accept resignation board directors usually sets five committees oversight specific matters committees include audit committee handles accounting issues including auditing reporting compensation committee approves compensation ceo employees company finance committee handles financial matters proposed mergers acquisitions governance nominating committee handles various corporate matters including nomination board antitrust compliance committee attempts prevent company practices violating antitrust laws day-to-day operations company run global executive management committee sets strategic direction dell regional senior vice-presidents countries united states including david marmonti emea stephen j. felice asia/japan officers included martin garvin senior vice president worldwide procurement susan sheskey vice president chief information officer dell advertisements appeared several types media including television internet magazines catalogs newspapers dell inc marketing strategies include lowering prices times year free bonus products dell printers free shipping encourage sales stave competitors 2006 dell cut prices effort maintain 19.2 market share also cut profit margins half 8.7 4.3 percent maintain low prices dell continues accept purchases products via internet telephone network move customer-care division india el salvador popular united states television print ad campaign early 2000s featured actor ben curtis playing part steven lightly mischievous blond-haired youth came assistance bereft computer purchasers television advertisement usually ended steven catch-phrase dude 're gettin dell subsequent advertising campaign featured interns dell headquarters curtis character appearing small cameo end one first commercials particular campaign 2007 dell switched advertising agencies us bbdo working mother media july 2007 dell released new advertising created working mother support inspiron xps lines ads featured music flaming lips devo re-formed especially record song ad work also 2007 dell began using slogan say customizes computers fit customers requirements beginning 2011 dell began hosting conference austin texas austin convention center titled dell world event featured new technology services provided dell dell partners 2011 event held october 12–14 2012 event held december 11–13 2013 event held december 11–13 2014 event held november 4–6 2015 event held october 20–23 late 2007 dell inc. announced planned expand program value-added resellers vars giving official name dell partner direct new website dell india started online ecommerce website dell partner www.compuindia.com gng electronics pvt ltd termed dell express ship affiliate desa main objective reduce delivery time customers visit dell india official site given option buy online redirected dell affiliate website compuindia.com dell also operates captive analytics division supports pricing web analytics supply chain operations dga operates single centralized entity global view dell business activities firm supports 500 internal customers worldwide created quantified impact 500 million 2008 dell received press coverage claim world secure laptops specifically latitude d630 latitude d830 lenovo request u.s. national advertising division nad evaluated claim reported dell enough evidence support dell first opened retail stores india early 1990s dell sold products best buy costco sam club stores united states dell stopped practice 1994 citing low profit margins business exclusively distributing direct-sales model next decade 2003 dell briefly sold products sears stores u.s 2007 dell started shipping products major retailers u.s. starting sam club wal-mart staples largest office-supply retailer u.s. best buy largest electronics retailer u.s. became dell retail partners later year starting 2002 dell opened kiosk locations united states allow customers examine products buying directly company starting 2005 dell expanded kiosk locations include shopping malls across australia canada singapore hong kong january 30 2008 dell announced would shut 140 kiosks u.s. due expansion retail stores june 3 2010 dell also shut mall kiosks australia dell products shipped one largest office-supply retailers canada staples business depot april 2008 future shop best buy began carrying subset dell products certain desktops laptops printers monitors since shoppers certain markets show reluctance purchase technological products phone internet dell looked opening retail operations countries central europe russia april 2007 dell opened retail store budapest october year dell opened retail store moscow uk hmv flagship trocadero store sold dell xps pcs since december 2007 january 2008 uk stores dsgi sold dell products particular currys pc world stores 2008 large supermarket-chain tesco sold dell laptops desktops outlets throughout uk may 2008 dell reached agreement office supply chain officeworks part coles group stock modified models inspiron desktop notebook range models slightly different model numbers almost replicate ones available dell store dell continued retail push australian market partnership harris technology another part coles group november year addition dell expanded retail distributions australia agreement discount electrical retailer good guys known slashing prices dell agreed distribute variety makes desktops notebooks including studio xps systems late 2008 dell dick smith electronics owned woolworths limited reached agreement expand within dick smith 400 stores throughout australia new zealand may 2009 1 year since officeworks—owned coles group—reached deal retailer agreed distribute variety inspiron studio notebooks minimal studio desktops dell range dell continues run operate various kiosks 18 shopping centres throughout australia march 31 2010 dell announced australian kiosk employees shutting australian/new zealand dell kiosk program germany dell selling selected smartphones notebooks via media markt saturn well shopping websites dell major competitors include hewlett-packard hp hasee acer fujitsu toshiba gateway sony asus lenovo ibm msi panasonic samsung apple dell subsidiary alienware compete enthusiast market avadirect falcon northwest voodoopc subsidiary hp manufacturers second quarter 2006 dell 18 19 share worldwide personal computer market compared hp roughly 15 dell lost lead pc-business hewlett-packard gartner idc estimated third quarter 2006 hp shipped units worldwide dell dell 3.6 growth paled comparison hp 15 growth period problem got worse fourth quarter gartner estimated dell pc shipments declined 8.9 versus hp 23.9 growth result end 2006 dell overall pc market-share stood 13.9 versus hp 17.4 idc reported dell lost server market share top four competitors arena idc q4 2006 estimates show dell share server market 8.1 9.5 previous year represents 8.8 loss year-over-year primarily competitors emc ibm 2001 dell emc entered partnership whereby companies jointly design products dell provided support certain emc products including midrange storage systems fibre channel iscsi storage area networks relationship also promotes sells oem versions backup recovery replication archiving software december 9 2008 dell emc announced multi-year extension 2013 strategic partnership emc addition dell expanded product lineup adding emc celerra nx4 storage system portfolio dell/emc family networked storage systems partnered new line data deduplication products part tierdisk family data storage devices october 17 2011 dell discontinued reselling emc storage products ending partnership 2 years early dell committed reducing greenhouse gas emissions global activities 40 2015 2008 fiscal year baseline year listed greenpeace ’ guide greener electronics scores leading electronics manufacturers according policies sustainability climate energy green products november 2011 dell ranked 2nd 15 listed electronics makers increasing score 5.1 4.9 gained previous ranking october 2010 dell first company publicly state timeline elimination toxic polyvinyl chloride pvc brominated flame retardants bfrs planned phase end 2009 revised commitment aims remove toxics end 2011 computing products march 2010 greenpeace activists protested dell offices bangalore amsterdam copenhagen calling dell ’ founder ceo michael dell ‘ drop toxics ’ claiming dell aspiration ‘ greenest technology company planet ’ ‘ hypocritical ’ dell launched first products completely free pvc bfrs g-series monitors g2210 g2410 2009 2012 report progress relating conflict minerals enough project rated dell eighth highest 24 consumer electronics companies dell became first company information technology industry establish product-recycling goal 2004 completed implementation global consumer recycling-program 2006 february 6 2007 national recycling coalition awarded dell recycling works award efforts promote producer responsibility july 19 2007 dell announced exceeded targets working achieve multi-year goal recovering 275 million pounds computer equipment 2009 company reported recovery 78 million pounds nearly 40,000 tons equipment customers 2006 93-percent increase 2005 12.4 equipment dell sold seven years earlier june 5 2007 dell set goal becoming greenest technology company earth long term company launched zero-carbon initiative includes company introduced term re-generation round table london commemorating 2007 world environment day re-generation refers people ages throughout world want make difference improving world environment dell also talked plans take lead setting environmental standard technology industry maintaining leadership future dell reports environmental performance annual corporate social responsibility csr report follows global reporting initiative gri protocol dell 2008 csr report ranked application level b checked gri company aims reduce external environmental impact energy-efficient evolution products also reduce direct operational impact energy-efficiency programs internal energy-efficiency programs reportedly save company 3 million annually energy-cost savings largest component company internal energy-efficiency savings comes pc power management company expects save 1.8 million energy costs using specialized energy-management software network 50,000 pcs 1990s dell switched using primarily atx motherboards psu using boards power supplies mechanically identical differently wired connectors meant customers wishing upgrade hardware would replace parts scarce dell-compatible parts instead commonly available parts motherboard power connections reverted industry standard 2003 dell remains secretive motherboard pin-outs peripherals mmc readers power on/off switches leds 2005 complaints dell doubled 1,533 earnings grew 52 year 2006 dell acknowledged problems customer service issues included call transfers 45 calls long wait times dell blog detailed response 're spending 100 million—and lot blood sweat tears talented people—to fix later year company increased spending customer service 150 million since 2018 dell seen significant increase consumer satisfaction moreover customer service praised prompt accurate answers questions especially directed social media support august 17 2007 dell inc. announced internal investigation accounting practices would restate reduce earnings 2003 first quarter 2007 total amount 50 million 150 million 2 cents 7 cents per share investigation begun november 2006 resulted concerns raised u.s. securities exchange commission documents information dell inc. submitted alleged dell disclosed large exclusivity payments received intel agreeing buy processors rival manufacturer amd 2010 dell finally paid 100 million settle sec charges fraud michael dell executives also paid penalties suffered sanctions without admitting denying charges july 2009 dell apologized drawing ire taiwanese consumer protection commission twice refusing honour flood orders unusually low prices offered taiwanese website first instance dell offered 19 lcd panel 15 second instance dell offered latitude e4300 notebook nt 18,558 us 580 70 lower usual price nt 60,900 us 1900 concerning e4300 rather honour discount taking significant loss firm withdrew orders offered voucher nt 20,000 us 625 customer compensation consumer rights authorities taiwan fined dell nt 1 million us 31250 customer rights infringements many consumers sued firm unfair compensation court southern taiwan ordered firm deliver 18 laptops 76 flat-panel monitors 31 consumers nt 490,000 us 15,120 less third normal price court said event could hardly regarded mistakes prestigious firm said company mispriced products twice taiwanese website within 3 weeks michael dell made 24.4 billion buyout bid august 2013 activist shareholder carl icahn sued company board attempt derail bid promote forthcoming offer
[ 7879, 710, 4295, 2550, 1081, 6089, 7528, 7172, 32, 3973, 740, 7189, 6130, 2240, 6132, 7212, 2961, 1133, 1134, 1505, 7221, 84, 5794, 5450, 6506, 7956, 5804, 6874, 5459, 7242, 5463, 3009, 5822, 6899, 2657, 4783, 1561, 136, 4429, 3395, 158...
Validation
973
3
Cycles_per_instruction:cycles per instruction computer architecture cycles per instruction aka clock cycles per instruction clocks per instruction cpi one aspect processor performance average number clock cycles per instruction program program fragment multiplicative inverse instructions per cycle average cycles per instruction given process defined following formula_1 formula_2 number instructions given instruction type formula_3 formula_4 clock-cycles instruction type formula_5 total instruction count summation sums instruction types given benchmarking process let us assume classic risc pipeline following five stages stage requires one clock cycle instruction passes stages sequentially without pipelining new instruction fetched stage 1 previous instruction finishes stage 5 therefore number clock cycles takes execute instruction five cpi 5 1 case processor said subscalar pipelining new instruction fetched every clock cycle exploiting instruction-level parallelism therefore since one could theoretically five instructions five pipeline stages one instruction per stage different instruction would complete stage 5 every clock cycle average number clock cycles takes execute instruction 1 cpi 1 case processor said scalar single-execution-unit processor best cpi attainable 1 however multiple-execution-unit processor one may achieve even better cpi values cpi 1 case processor said superscalar get better cpi values without pipelining number execution units must greater number stages example six executions units six new instructions fetched stage 1 six previous instructions finish stage 5 therefore average number clock cycles takes execute instruction 5/6 cpi 5/6 1 get better cpi values pipelining must least two execution units example two executions units two new instructions fetched every clock cycle exploiting instruction-level parallelism therefore two different instructions would complete stage 5 every clock cycle average number clock cycles takes execute instruction 1/2 cpi 1/2 1 multi-cycle mips five types instructions program cpi formula_6 433mhz processor used execute benchmark program following instruction mix clock cycle count determine effective cpi mips millions instructions per second rate execution time program formula_7 formula_8 since formula_9 formula_10 formula_11 therefore formula_12
[ 5012, 1447, 5021, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 441, 2266, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4847, 4479, ...
Test
974
3
Texas_Instruments_TMS9918:texas instruments tms9918 tms9918 video display controller vdc manufactured texas instruments introduced 1979 tms9918 variants used colecovision creativision memotech mtx msx sg-1000/sc-3000 spectravideo sord m5 tatung einstein texas instruments ti-99/4 casio pv-2000 tomy tutor tms9918 supports generation grid-based character graphics used display text background images sprites used moving foreground objects several variants called tms9918 tms9918a tms9928a tms9929a indicates second version chip added new features prominently addition bitmap mode graphic ii non-a version used ti-99/4 ti-99/4a computers version vdc tms9918a tms9928a output 60 hz video signal tms9929a outputs 50 hz difference 1 2 'tms9918a 'tms9928a 1 version outputs composite ntsc video 2 versions including tms9929a outputs ypbpr precisely r-y b-y colour differences luminance colour difference signals need latter predominant 50 hz world including europe due different video signal standards pal secam cost-effective output r-y b-y encode pal secam rf modulator try different console every different color standard 1 version also features external composite video input made handy chip use video titlers could overlay text graphics video 2 version later variant tms9918 series chips tms9118 tms9128 tms9129 released mid-late 1980s never popular function one pin changed different mapping 16k × 8 bit block video memory supported otherwise chips completely identical tms9918a tms9928a tms9929a respectively ics family usually referred tms9918 name sometimes postfix vdc 16k × 8 bits external video memory memory outside address space cpu separate address space means cpu work write read memory also means vdc n't slow cpu periodically reads memory generate display additionally leaves address space available cpu memory memory-mapped hardware depending screen mode used video memory may needed generate display cases cpu may use extra video memory purposes example one use scratch-pad uncompressing graphics sound data stored cartridge rom another popular use create second copy display data eliminate flickering tearing technique known double buffering cpu communicates vdc 8-bit bus pin controlled cpu separates bus two ports control port data port write read byte video memory cpu first write two bytes vdc control port vdc internal address register next cpu performs actual write read vdc data port data byte written read tms9918 automatically increments internal address register auto-increment feature accelerates writes reads blocks data control port also used access various internal registers tms9918 two separate distinct graphics types characters sprites characters typically used create text background images appear behind sprites tms9918 number screen modes control characteristics characters four documented screen modes available tms9918a mentioned tms9918 lacks mode graphic 2 texas instruments originally documented four modes listed however bit enables mode 2 interesting initially let best described modifier bit modes enabling three things mind three additional modes possible note although genuine tms9918a chips support modes clones emulators may technically mode 2 character mode colorful character set screen horizontally divided three 256×64 pixel areas gets character set sequentially printing characters 0 255 three areas program simulate graphics mode pixel set individually however resulting framebuffer non-linear program also use three identical character sets deal screen like text mode colorful character set background patterns sprites consist colorful characters commonly used games 32x24 bytes would moved fill scroll entire screen graphics drawn 8×8 pixel borders obvious art konami particularly well known excellence challenge using tms9918 mode 2 every 8×1 pixel area could two colors foreground background could freely picked 16 color palette 8x1 area two colors could exist manipulating screen basic line command one easily could exceed maximum 2 colors per 8×1 area end color spill tms9918 scroll registers scrolling must done software furthermore scrolling done characters boundaries sprites typically used create moving foreground objects appear front characters tiles modes 1 2 3 render sprites 32 monochrome sprites either 8×8 16×16 pixels screen sprite single color illusion multicolor sprites created stacking multiple sprites top 4 sprites single scanline additional sprites horizontal pixels dropped sprites higher priority drawn first vdp reports status register number first dropped sprite cpu get around limitation rotating sprite priorities different set sprites drawn every frame instead disappearing entirely sprites flicker technique known sprite multiplexing automatic sprite movement handled vdc instead practice cpu pick vdc 'vertical interrupt standard vdc output triggered automatically every 50th 60th second depending chip variant start vbi vertical blanking interval cpu jumps sprite-handling routine software turn tells vdc reposition sprites two non-transparent pixels pair sprites collide sprite collision flag set useful triggering advanced collision detection routines inside software determine exact location collision act upon vdc incapable reporting two sprites collided tms9918 fixed 16-color palette composed 15 displayed colors transparent color texas instruments tms9918a succeeded yamaha v9938 added additional bitmap modes colorful sprites vertical full-screen scroll register vertical horizontal offset registers hardware blitter customizable palette v9938 designed msx2 standard computers later used third-party upgrade ti-99/4a — geneve 9640 'computer-on-a-card v9938 turn succeeded v9958 added additional high-colour modes horizontal two-page scroll register chips used msx2+/turbor systems well tim upgrade card ti-99/4a although rumor v9958 also used generation photo play arcades yamaha also produced v9990 considered follow-up v9958 backwards compatible toshiba made clone called t6950 support undocumented pattern colour table masking feature graphics 2 mode later toshiba released t7937a msx-engine built-in vdp fixed masking features vdps toshiba feature slightly different palette texas vdps vivid colors tms9918 basis vdp chips sega master system game gear mega drive used additional display modes registers added hardware scrolling capabilities advanced features
[ 1545, 4922, 8003, 5298, 3605, 824, 1237, 6970, 3296, 6936 ]
Test
975
3
DTACK_Grounded:dtack grounded dtack grounded computer hobbyist newsletter published july 1981 september 1985 hal w. hardenberg subtitled journal simple 68000 systems newsletter dedicated proposition motorola 68000 cpu could used build simple fast computers 1981 revolutionary idea 68000-based personal computers like apple macintosh commodore amiga atari st created 1981 motorola marketing 68000 solely cpu high-end unix workstations hal believed 68000 could used simple embedded microprocessor well used newsletter explain hal editor newsletter wrote almost content ostensible purpose newsletter promote hal company line 68000-based hardware software however hal never let get way telling good story explaining design build fast computer hardware engineer businessman also knew write software newsletter full amusing educational stories way personal computer hardware business worked strong opinions best way design personal computer hardware software dtack name pin motorola 68000 cpu informed cpu data ready read memory stands data transfer acknowledge system fast enough memory pin connected directly ground plane grounded produce fastest-possible memory read/write time however complex system would almost certainly several different types devices ram rom various peripherals would support different speeds access large system would normally accommodated using dtack line insert wait states —delays—into bus cycles 68000 separate i/o address space i/o devices must memory-mapped logic circuitry required pulse dtack high add delays could fairly complex therefore typically relatively simple systems use design dtack grounded i.e dtack always asserted many different peripherals different maximum speed capabilities must used small system another solution keep dtack grounded slow clock rate cpu memory peripheral devices transfer data reduced maximum speed cpu turn using lower cpu clock frequency enables simpler less expensive circuit board design fewer layers used successfully like limiting system peripherals low diversity design strategy typically applied small embedded systems would appropriate high-performance workstations many microprocessors including intel 8086 8088 80286 80386 8080 8085 zilog z80 6502 family input pin serves similar function dtack usually named ready rdy z80 named wait therefore reference dtack distinctively implies 68000 family cpus order discourage photocopying newsletter portion dtack grounded newsletter printed dark red paper made harder photocopy pages section newsletter called redlands typically contained assembly source code high performance math subroutines major topic later years newsletter dbasic interpreter hal produced fast basic interpreter atari st computer written hand-tuned assembly language ran fast compared basics non-standard could n't run microsoft basic programs could n't read write ms-dos format floppy disks unfortunately result popular 1990s hal revived dtack grounded occasional column dr. dobb journal called dtack revisited
[ 5079, 6380, 3563 ]
Test
976
2
Linux_Terminal_Server_Project:linux terminal server project linux terminal server project ltsp free open source terminal server linux allows many people simultaneously use computer applications run server terminal known thin client also known x terminal handling input output generally terminals low-powered lack hard disk quieter reliable desktop computers moving parts technology becoming popular schools allows school provide pupils access computers without purchasing upgrading expensive desktop machines improving access computers becomes less costly thin client machines older computers longer suitable running full desktop os even relatively slow cpu little 128 mb ram deliver excellent performance thin client addition use centralized computing resources means performance gained less money upgrades single server rather across fleet computers converting existing computers thin clients educational institution also gain control students using computing resources user sessions monitored server see epoptes lab management tool current form v5.x ltsp relies distributions integrate ltsp architecture respective products v4.x series ltsp add-on package distribution several distributions integrate ltsp either mainline ubuntu debian separate product edubuntu ubuntu k12ltsp centos skolelinux debian kiwi-ltsp suse ltsp registered trademark disklessworkstations.com llc founder project leader ltsp jim mcquillan ltsp distributed terms gnu general public license initially mille-xterm project funded canadian public agencies school districts province quebec created version ltsp integrating four subprojects portal based uportal open-source middleware stack cd free software windows/mac finally mille-xterm mille-xterm project goal provide scalable infrastructure massive x-terminal deployment mille means modèle d'infrastructure logiciel libre en éducation free software infrastructure model education targeted educational institutions 2009 mille-xterm integrated back ltsp ltsp-cluster project specializing large scale deployment ltsp one main differences ltsp ltsp-cluster integration web-based central control center replaces traditional one configuration file per thin client method client customization ltsp lts.conf file main ltsp ltsp-cluster allows organizations centrally manage thousands thin clients parameters central location ltsp-cluster high-availability high-performance thin-clients specified optional use redundant components services load-balanced made highly available ltsp-cluster support linux application servers well windows application servers provides similar level support centralized management high-availability load-balancing features platforms also included support virtual desktops remote users using nx technology nx protocol allow remote windows linux sessions accessed web browser low bandwidth 40 kbit/s requirements tolerance high-latency connections nx client runs various operating systems including linux mac windows ltsp v5.x added support thin client type known fat clients advent inexpensive relatively powerful computer hardware idea run applications locally thin client offering manageability thin client solution became reality case ltsp fat client root filesystem rudimentary chroot full linux installation chroot fat client uses ldm authenticate ltsp server mounts user home directories using ssh fuse local cpu ram used fat clients provides benefits ltsp unique offering ability computer mount root filesystem network run applications locally windows platform closest equivalent solution use technology like intel vpro run client-side hypervisor mount root filesystem image using iscsi
[ 3256, 2182, 7528, 7532, 2559, 5744, 2942, 7555, 6117, 4341, 5762, 412, 415, 7214, 3666, 2970, 7956, 5453, 5803, 6879, 5460, 7242, 2636, 1535, 1924, 6892, 1176, 1933, 5829, 7639, 7267, 1208, 4435, 6572, 3404, 1227, 1596, 165, 7312, 5884, ...
Test
977
2
Microsoft_Interface_Definition_Language:microsoft interface definition language microsoft interface definition language midl text-based interface description language microsoft based dce/rpc idl extends use microsoft component object model compiler also called midl
[ 7299, 4759, 150, 5910, 6686 ]
Validation
978
5
AlternC:alternc alternc set open-source web hosting server management software linux/unix-like systems whose aim promote self hosting individuals small structures provide users easy web-based interface manage web mail server internet-based services main specificity provide users non-technical web interface anybody without specific knowledge host web services also advanced options technical-savvy users still fine-tune also features documentation french english 2000 french free hosting provider altern.org stopped service complaint trial estelle hallyday effectively cutting 47634 websites later valentin lacambre gave hosting control panel free software hoping people take independent big hosting structures favor free speech alternative hosting may 2001 valentin source code abandoned rewrite started technical team l ’ autre net non-profit hosting provider organized self-managed association gave birth alternc wanted follow guidelines valentin panel mostly usability design today non-profit hosting providers using developing software suite lautre net founder project also globenet structures belgium québec africa professional web hosting companies also using alternc participate actively code octopuce neuronnexion webelys poll 2010 estimated least 110 servers running alternc total 3500 accounts hosting 9500 domain names 25000 pop/imap email accounts 2200 domain names around thousand users l ’ autre net poll counting people actively helping project project still actively developed long series 0.9.prexx 0.9.x versions version 1.0 published june 2011 new web interface design current usable paperback book french also published time effectively making 2011 milestone software history next version released february 2013 version 3.0 mainly plugins different version numbers development team wanted make coherent main software version mailman plugin version 2.1 already many new features bugfixes present version notable one migration courier dovecot email service separation security reasons web hosted services using distincts unix user accounts thanks itk module apache http server latest versions alternc 3.1.10 squeeze 3.2.10 wheezy 3.3.10 jessie released january 18 2016 3.1.9 squeeze 3.2.9 wheezy released november 17 2015 3.1.8 squeeze 3.2.8 wheezy released august 3 2015 alternc based debian gnu/linux using standard debian packages therefore used level security debian standard configuration tools allows system administrator manage server alternc services machine
[ 6179, 4948, 2043, 1762, 5571, 1142, 578 ]
Test
979
5
IP_multicast:ip multicast ip multicast method sending internet protocol ip datagrams group interested receivers single transmission ip-specific form multicast used streaming media network applications uses specially reserved multicast address blocks ipv4 ipv6 protocols associated ip multicast include internet group management protocol protocol independent multicast multicast vlan registration igmp snooping used manage ip multicast traffic layer-2 networks ip multicast described ip multicast first standardized 1986 specifications augmented rfc 4604 include group management include administratively scoped addresses ip multicast technique one-to-many many-to-many real-time communication ip infrastructure network scales larger receiver population requiring neither prior knowledge receiver identity prior knowledge number receivers multicast uses network infrastructure efficiently requiring source send packet even needs delivered large number receivers nodes network typically network switches routers take care replicating packet reach multiple receivers messages sent link network common transport layer protocol use multicast addressing user datagram protocol udp nature udp reliable—messages may lost delivered order reliable multicast protocols pragmatic general multicast pgm developed add loss detection retransmission top ip multicast key concepts ip multicast include ip multicast group address multicast distribution tree receiver driven tree creation ip multicast group address used sources receivers send receive multicast messages sources use group address ip destination address data packets receivers use group address inform network interested receiving packets sent group example content associated group 239.1.1.1 source send data packets destined 239.1.1.1 receivers content inform network interested receiving data packets sent group 239.1.1.1 receiver joins 239.1.1.1 protocol typically used receivers join group called internet group management protocol igmp routing protocols based shared trees receivers join particular ip multicast group multicast distribution tree constructed group protocol widely used protocol independent multicast pim sets multicast distribution trees data packets senders multicast group reach receivers joined group variations pim implementations sparse mode sm dense mode dm source specific mode ssm bidirectional mode bidir sparse-dense mode sdm pim-sm widely deployed ssm bidir simpler scalable variations developed recently gaining popularity ip multicast operation require active source know receivers group multicast tree construction receiver driven initiated network nodes close receivers ip multicast scales large receiver population ip multicast model described internet architect dave clark put packets one end network conspires deliver anyone asks ip multicast creates state information per multicast distribution tree network router part 1000 multicast trees 1000 multicast routing forwarding entries hand multicast router need know reach multicast trees internet needs know multicast trees downstream receivers key scaling multicast-addressed services contrast unicast router needs know reach unicast addresses internet even using default route reason aggregation key scaling unicast routing also core routers carry routes hundreds thousands contain internet routing table host fact application host wants receiving member multicast group i.e receive data corresponding particular multicast address must use internet group management protocol igmp join adjacent routers also use protocol communicate unicast routing router examines destination address incoming packet looks destination table determine interface use order packet get closer destination source address irrelevant router however multicast routing source address simple unicast address used determine data stream direction source multicast traffic considered upstream router determines downstream interfaces destinations multicast group destination address sends packet appropriate interfaces term reverse path forwarding used describe concept routing packets away source rather towards destination number errors happen packets intended unicast accidentally sent multicast address particular sending icmp packets multicast address used context dos attacks way achieving packet amplification local network multicast delivery controlled igmp ipv4 network mld ipv6 network inside routing domain pim mospf used routing domains one uses inter-domain multicast routing protocols mbgp following common delivery routing protocols used multicast distribution unicast packets delivered specific recipient ethernet ieee 802.3 subnet setting specific layer 2 mac address ethernet packet address broadcast packets make use broadcast mac address ff ff ff ff ff ff ipv4 multicast packets delivered using ethernet mac address range 01:00:5e:00:00:00–01:00:5e:7f ff ff oui owned iana range 23 bits available address space first octet 01 includes broadcast/multicast bit lower 23 bits 28-bit multicast ip address mapped 23 bits available ethernet address space means ambiguity delivering packets two hosts subnet subscribe different multicast group whose address differs first 5 bits ethernet packets multicast groups delivered hosts requiring network software hosts discard unrequired packets ipv6 multicast addresses ethernet mac derived four low-order octets or'ed mac 33:33:00:00:00:00 example ipv6 address ff02 dead beef :1:3 would map ethernet mac address 33:33:00:01:00:03 switch understand multicast addresses flood traffic members lan case system network card operating system filter packets sent multicast groups subscribed switches listen igmp traffic maintain state table network systems subscribed given multicast group table used forward traffic destined given group limited set hosts ports process listening igmp traffic called igmp snooping additionally switches layer 3 capabilities act igmp querier networks router present act multicast router switch igmp snooping querier enabled used generate needed igmp messages get users subscribe multicast traffic like ethernet 802.11 uses range mac addresses map ip multicast addresses however 802.11 wireless network handle multicast traffic differently depending configuration delivery traffic indication message dtim beacon interval settings stations within basic service set power save mode multicast packets sent immediately arrive one stations power save mode access points deliver multicast traffic dtim interval transmit one supported rates basic rate set retail wireless access points/routers interval either 102.4 ms beacon interval 100ms dtim 1 204.8 ms beacon interval 100ms dtim 2 transmit rate either 1 mbit/s 6 mbit/s depending operating band protection mode result dtim beacon interval settings adjusted optimum performance implementing multicast wireless networks unlike ethernet traffic 802.11 sent reliably using acks nacks radio interference n't cause unbearably high packet loss however multicast packets sent acknowledged subject much higher loss rates various methods coping choosing unicast multicast data repeatedly client requesting acks client methods require modification access point supported enterprise-class devices improvements would require modifications clients therefore seen widespread adoption ip multicast internet communication method single data packet transmitted sender replicated set receivers replication techniques somewhat dependent upon media used transmit data transmission multicast inherent broadcast media ethernet satellite link automatically allows data packet received receivers directly attached media contrast transmission multicast media point-to-point point-to-multipoint requires packet replicated link replication process occur optimal manner distribution tree built within network packet replicated branches tree mitigates requirement sender replicate packet recipient use ipsec communication link requires point-to-point connection establishment usually security required sender receiver implies sender must replicate packet secure connections one receiver number receivers grows sender must scale replicating packet receivers processing load placed sender high limits scalability sender new method required securely transmit multicast referred secure multicast multicast security internet engineering task force ietf created new internet protocol ip securely transmit multicast traffic across packet network protocol definition developed multicast security workgroup led several request comments rfc used standards securing ip multicast traffic protocol allowed sender encrypt multicast packet forward packet network optimal distribution tree packet may replicated optimal locations network delivered receivers receivers capable decrypting packet forwarding packet secure network environment sender multicast packet know potential receivers therefore creation pair-wise encryption keys one receiver impossible sender must encrypt packets using shared key legitimate receivers use decrypt packets security system based ability control distribution keys legitimate receivers ietf created group domain interpretation gdoi protocol defined rfc-6407 protocol allows sender receiver join key server policies keys encrypted distributed members secure multicast group key server authenticate authorize senders receivers specific group shared key used encrypt decrypt traffic members group multicast nature connection-oriented mechanism protocols tcp allows retransmission missing packets appropriate applications streaming audio video occasional dropped packet problem distribution critical data mechanism required requesting retransmission one scheme proposed cisco pgm originally pretty good multicasting changed trademark reasons pragmatic general multicast documented rfc 3208 scheme multicast packets sequence numbers packet missed recipient request packet re-multicast members multicast group ignoring replacement data needed expanded version pgm-cc attempted make ip multicasting tcp friendly stepping entire group bandwidth available worst receiver two schemes documented internet engineering task force ietf standards-track protocol nack-oriented reliable multicast norm documented rfc 5740 rfc 5401 protocol file delivery unidirectional transport flute documented rfc 6726 open-source addition proprietary implementations exist protocols exist scalable reliable multicast defined variety sources protocols vary means error detection mechanisms used error recovery scalability recovery underlying ideas involved means reliable list reliable multicast protocols acm sigcomm multicast workshop august 27 1996 documents number approaches problem independent groups like internet protocol multicast standards initiative ipmsi claimed lack truly scalable secure reliable ip multicast protocol like proposed secure multicast advanced repeating television smart hampered adoption ip multicast inter-domain routing lack widely adopted system aes level security scalable reliability kept mass media transmissions sporting events like super bowl and/or breaking news events transmitted public internet reliable ip multicasting protocols pgm smart experimental standards-track protocol norm standards-track revision rfc 3941 specified rfc 5401 standards-track revision rfc 3940 specified rfc 5740 since multicast different transmission mode unicast protocols designed multicast sensibly used multicast existing application protocols use multicast run top user datagram protocol udp many applications real-time transport protocol rtp used framing multimedia content multicast resource reservation protocol rsvp may used bandwidth reservation network supporting multicast distribution multicast dns mdns used resolve domain host names without dedicated dns server using multicast ip multicast widely deployed enterprises commercial stock exchanges multimedia content delivery networks common enterprise use ip multicast iptv applications live television distribution televised company meetings hospitality industry ip multicast become common iptv distribution hotels retail sector ip multicast widely used tv distribution video advertising applications pay-tv operators educational institutions significant on-campus student housing deployed ip multicast deliver one-way streaming media high-speed video large groups receivers additionally uses audio video conferencing using multicast technologies far less prevalent often relegated research education institutions often greater degree network capacity handle demands technical conferences meetings transmitted using ip multicast recently many sessions ietf meetings delivered using multicast another use multicast within campus commercial networks file distribution particularly deliver operating system images updates remote hosts key advantage multicast boot images unicasting boot images significantly lower network bandwidth usage ip multicast also seen deployment within financial sector applications stock tickers hoot-n-holler systems ip multicast seen success areas multicast services generally available average end-user two major related factors lack widespread deployment first forwarding multicast traffic imposes great deal protocol complexity network service providers second core network infrastructure exposes far greater attack surface particular vulnerability denial-of-service attacks large state requirements routers make applications using large number trees unable work using ip multicast take presence information example person needs keep least one tree subscribers several mechanism yet demonstrated would allow ip multicast model scale millions senders millions multicast groups thus yet possible make fully general multicast applications practical reasons also reasons economics ip multicast general used commercial internet backbones rfc 3170 ip multicast applications challenges solutions provides overview deployment issues ip multicasting first developed steve deering stanford university received ieee internet award mbone long-running experimental approach enabling multicast sites use tunnels mbone longer operational renewed interest tunneling multicast traffic order make service available wide array end users castgate attempt etro-tele research group vrije universiteit brussel adopt ip multicast internet although multicast would allowed internet user receive rich media content without placing high burden net still unavailable internet users castgate project tried fix allowing end users connect automatically configured ip tunnel networks natively support ip multicast idea users multicast capability content providers would see benefit streaming content multicast hope enough content providers users used service internet service providers would enable ip multicast natively customers castgate supplied software client microsoft windows linux connect castgate tunnel network also supplied tools add tunnel servers tools receive session announcement protocol announcements multicast network video audio streams project maintained web site 2007 starting 2005 bbc began encouraging uk-based internet service providers adopt multicast-addressable services networks providing bbc radio higher quality available via unicast-addressed services also supported variety commercial radio networks including bbc gcap media emap virgin radio german public-service broadcasters ard zdf franco-german network arte offer tv program multicasted several networks austrian internet service provider telekom austria offers digital subscriber line dsl customers tv set-top box uses multicast addressing receiving tv radio broadcasts germany t-home brand deutsche telekom offers similar service
[ 6415, 4759, 3946, 2644, 7169, 7173, 302, 3105, 827, 7637, 6015, 578, 5492, 7091, 1118, 4622, 3819, 7297, 3821, 5519, 259, 5181 ]
Test
980
6
File_copying:file copying digital file management file copying creation new file content existing file computer operating systems include file copying methods users operating systems graphical user interfaces guis often providing copy-and-paste drag-and-drop methods file copying operating systems may specialized file copying apis usually able tell server perform copying locally without sending file contents network thus greatly improving performance file copying creation new copy file content existing file several different technologies use term file shadowing intent file shadowing within technologies provide exact copy mirror set data file shadowing effective shadow needs exist separate physical location original data depending reasons behind shadow operation location may close second harddrive chassis far away side globe computer operating systems include file copying provisions user interface like command cp unix copy ms-dos operating systems graphical user interface gui usually provide copy-and-paste drag-and-drop methods file copying file manager applications provide easy way copying files internally however systems specialized application programming interfaces apis copying files like copyfile copyfileex windows api others like unix ms-dos fall back simply reading contents old file writing new file makes little difference local files computer hard drive provides interesting situation source target files located remote file server operating systems specialized file copying apis usually able tell server perform copying locally without sending file contents network thus greatly improving performance systems comparable apis however read file contents network send back network sometimes remote file copying performed specialized command like ncopy ms-dos clients novell netware even complicated situation arises one needs copy files two remote servers simple way read data one server write data second server
[ 1710, 1391, 2390, 6380, 5571, 2160, 7046, 1537, 5933, 4017, 6264 ]
Test
981
4
Salami_slicing:salami slicing salami slicing refers series many small actions often performed clandestine means accumulated whole produces much larger action result would difficult unlawful perform term typically used pejoratively although salami slicing often used carry illegal activities strategy gaining advantage time accumulating small increments used legal ways well example salami slicing also known penny shaving fraudulent practice stealing money repeatedly extremely small quantities usually taking advantage rounding nearest cent monetary unit financial transactions would done always rounding putting fractions cent another account idea make change small enough single transaction go undetected information security salami attack series minor attacks together results larger attack computers ideally suited automating type attack politics term salami tactics used since 1940s refer divide conquer process threats alliances used overcome opposition academia salami slicing refers practice creating several short publications material could perhaps validly published single article journal review see also least publishable unit january 1993 four executives rental-car franchise florida charged defrauding least 47,000 customers using salami technique los angeles october 1998 district attorneys charged four men fraud allegedly installing computer chips gasoline pumps cheated consumers overstating amounts pumped 2008 man arrested fraudulently creating 58,000 accounts used collect money verification deposits online brokerage firms cents time 6 september 2018 british mp tom tugendhat house commons speech accused russian government salami slicing tactics salami slicing played key role plots several films including superman iii office space latter title characters reference superman iii inspiration 1972 episode tv series m*a*s*h radar attempts ship entire jeep home korea one piece time hawkeye commented mailman would retroactive hernia found 1987 tv movie perry mason case murdered madam features murder trial involving transfer fractional cents bank employees johnny cash one piece time similar plot m*a*s*h episode cadillac parts model years 1949 1973
[]
Test
982
6
ULLtraDIMM:ulltradimm ulltradimm solid state storage device sandisk connects flash storage directly onto ddr3 memory bus unlike traditional pcie flash storage devices ulltradimm plugged directly industry standard rdimm memory bus slot server design connection location provides deterministic consistent known latency enable applications streamlined improved performance ulltradimm compatible jedec mo-269 ddr3 rdimm specification ulltradimm supports support 1.35 v 1.5 v operation 800–1333 mhz 1.5 v 1600 mhz ddr3 transfer rates ddr3 ecc bits used verify integrity data sent across memory bus ulltradimm verify correct ecc received errors device driver re-run transfer cpu treats ecc ulltradimm manner ecc memory dimm single symbol errors corrected ddr3 ecc bits stored flash array separate ecc scheme used protecting data flash array memory interleaving standard ram affected presence ulltradimms uefi/bios updates required properly recognize ulltradimm system block device halt bootstrap sequence
[ 4221, 1052, 1992 ]
Test
983
2
K12LTSP:k12ltsp k12ltsp modification centos operating system linux terminal server project ltsp packages integrated designed easy install configure k12ltsp offshoot linux school project k12linux k-12 often used united states refer grade school kindergarten high school 12th grade
[ 5200, 1629, 3444, 7251, 474, 7075, 5571, 1941, 314, 2758, 1663, 2864, 6209, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 7954, 6244, 976 ]
Train
984
4
MailScanner:mailscanner mailscanner open source email security system use unix email gateways first released 2001 protects viruses spam malware phishing distributed gnu general public license original author julian field 2004 open source award ukuug product worldwide software estimated process eighty billion emails per month millions downloads isps mobile telephone networks included list users recently anti-phishing measures introduced software spots attempts obfuscating urls example lure user thinking signing bank reality using impostor web site modifies email suitable warning january 2014 project sponsored lead developer jerry benton founder mailborder systems january 2018 primary developer shawn iverson efa project project major contributor mark sapiro gnu mailman project mailscanner implemented around 50,000 lines perl links software packages order fulfill duties complex software platform performance results vary wildly depending wide variety factors 2009 evidence suggested quad xeon pc 2 gb ram 15 krpm scsi disks process something area 2.2 million messages per day number would dwarfed modern hardware
[ 3031, 5983, 3915, 5571, 5401 ]
Test