node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
1,085
3
Genghis_Khan_II:_Clan_of_the_Gray_Wolf:genghis khan ii clan gray wolf genghis khan ii clan gray wolf originally released 1992 video game developed koei part koei historical simulation series games sequel genghis khan though third game series genghis khan ii developed published msx2 nintendo entertainment system dos x68000 pc-9801 pc-8801 mega drive/genesis super nes sega cd pc engine later playstation super nes version also made available wii virtual console north america june 8 2009 japan may 11 2010 player given option conquer either country mongolia temujin man would one day become genghis khan one three rivals region take known world time one several rulers throughout europe mainland asia north africa conquests made balance economy population buying selling manufactured goods family relations promoting demoting generals developing military turn-based fashion actions happen within given number turn points actions given priority others overlooked game also includes turn-based battle sequence allowing specific control player delegated general first scenario year 1184 ad mongolia player option controlling four different characters job become ruler mongolian steppes basically control mongolia end scenario beat 1212 ad take rest world fourth scenario world conquest get lead fight ruler chose choice eight generals advisor playable factions players also given option leading various nations worldwide scenarios nations suffer lack relatives generals significantly weaker leaders also absent ability hire elite mongol units largely viewed powerful units game scenario enables player take world part world known time including europe north africa mainland asia player select lead one several countries varying strengths weaknesses example occupying japan draft samurai japan starting point kamakura shogun korean version game player able play goryeo kingdom korean dynasty mongol invasions playable factions third scenario point yuan dynasty 1274 ad kublai khan ruler mongolia china trying rule world playable factions fourth scenario world conquest unlocked year 1185 ad 've successfully completed conquest mongolia first scenario ruler chose first scenario attempts take world mongol hordes scenario genghis khan default leader mongol empire eight best generals best advisor scenarios playable factions play player expect random events including typhoons droughts epidemics sand storms blizzards also bountiful harvests countries autumn important aspect game raise family choose daughter going marry succeed ruler dies case scenario without successors game strong family-oriented empire less susceptible revolutions us version game removed harem subgame entirely raised affinity one wives much like dating simulation game appointing one son general governor marrying one daughter already appointed general governor guarantees governor province rebel declare independence player empire especially important controlling large numbers provinces multiple governors may decide declare independence time governor declares independence new country formed state troops resources state become disposal rebellious general battle control province governor already established however peasant uprising player-controlled province computer chooses general command units troops governor province appointed governor must fight pitched battle control province peasant rebellion wins province troops defend general charge victorious army forms new country province electronic games reviewed snes version 1993 scored 83 computer gaming world 1994 rated pc version four stars five approving combining tactical strategic play strong non-cheating ai easy-to-learn game play lack bugs game reviewed 1995 dragon 213 jay dee eye monitor column reviewers uncertain rate game jay giving game 2½ maybe 3 5 stars dee giving 2 3
[ 7367, 8015, 6380 ]
Test
1,086
9
Qalb_(programming_language):qalb programming language قلب transliterated qalb qlb alb functional programming language allowing programmer write programs completely arabic name means heart recursive acronym arabic meaning qlb programming language قلب لغة برمجة developed 2012 ramsey nasser computer scientist eyebeam art technology center new york city artistic endeavor response anglophone bias vast majority programming languages express fundamental concepts using english words syntax like lisp scheme consisting parenthesized lists keywords appropriate arabic terms program text laid right-to-left like arabic text language provides minimal set primitives defining functions conditionals looping list manipulation basic arithmetic expressions turing-complete fibonacci sequence conway game life implemented program text written arabic connecting strokes characters arabic script extended length possible align source code artistic patterns tradition arabic calligraphy javascript-based interpreter currently hosted herokuapp project forked github قول مرحبا يا عالم
[ 6507, 7032, 4543, 5927, 7848 ]
Train
1,087
1
DNA_Data_Bank_of_Japan:dna data bank japan dna data bank japan ddbj biological database collects dna sequences located national institute genetics nig shizuoka prefecture japan also member international nucleotide sequence database collaboration insdc exchanges data european molecular biology laboratory european bioinformatics institute genbank national center biotechnology information daily basis thus three databanks contain data given time ddbj began data bank activities 1986 nig remains nucleotide sequence data bank asia although ddbj mainly receives data japanese researchers accept data contributors country ddbj primarily funded japanese ministry education culture sports science technology mext ddbj international advisory committee consists nine members 3 members europe us japan committee advises ddbj maintenance management future plans year apart ddbj also international collaborative committee advises various technical issues related international collaboration consists working-level participants
[]
Test
1,088
1
Basic_Resident_Registry_Network:basic resident registry network national registry japanese citizens ruled constitutional supreme court japan march 6 2008 amidst strong opposition percentage popularization smartcard called juki-card low ratio view system end failure registry contains following information citizen initial phase network started august 5 2002 implemented literally three statutes online government local government executive procedure june 7 2003 full operation august 25 2003 among 1,700 local governments japan two kunitachi tokyo yamatsuri fukushima refused join network may 2009 registry opposed democratic party japan liberal party japanese communist party social democratic party
[]
Test
1,089
3
Raid_on_Bungeling_Bay:raid bungeling bay raid bungeling bay first video game designed wright published broderbund commodore 64 1984 ported msx 1985 nes 1987 commodore 64 version published uk ariolasoft nes version japan hudson soft game would inspire wright develop simcity raid bungeling bay 2d war zone shoot 'em player controls helicopter launched aircraft carrier bomb six factories scattered across islands small planetoid occupied bungeling empire frequent villains broderbund games fending escalating counterattacks gun turrets fighter jets guided missiles battleship also hidden island player reload failure means bungeling empire develops war machine take planet earth players attack infrastructure defending aircraft carrier served home base game offers insight design style wright would later go design simcity time factories grow develop new technologies use player also visible signs interdependency among islands supply boats moving order win game player must prevent escalation bombing factories quickly possible keeping advancing technology left alone long factories create enough new weaponry overwhelm player compute wrote 1985 raid possesses virtues needed appease demanding gamer amazingly detailed graphics computer gaming world 1988 approved nintendo version graphics calling high adventure realistic overtones involve dragons elves magazine named action-strategy game year nintendo writing raid rescued broderbund computer software vaults updated slightly sent challenge bright new nintendo games blew water ... delightful game experience 1996 computer gaming world declared raid bungeling bay 24th-best computer game ever released commodore 64 version sold 20,000 30,000 units us nes version sold million units japan large discrepancy attributed lack piracy nes due cartridge system along raid bungeling bay one first american games published japan sales game gave wright financial freedom create simcity wright continued develop editor game personal toy enjoyed much researched urban planning realised others might enjoy constructing building cities result advanced simulation eventually became simcity
[]
Test
1,090
9
Baby_Modula-3:baby modula-3 baby modula-3 functional programming sublanguage modula-3 safe subset programming language based ideals invented martín abadi object oriented language studying programming language design one part implicitly prototype-oriented programming language explicitly statically typed designed studying computer science type theories checked formal language metaprogramming systems comes scandinavian school object-oriented programming languages martín abadi tried give example pure object-oriented language would allow studying formal semantics objects baby modula-3 defined structured operational semantics set static type rules denotational semantics guarantees soundness definition object model shown well definiteness decidability mechanical proof n't known inventor baby modula-3 worked systems research center src digital equipment corporation dec palo alto california dec bought compaq compaq bought hewlett-packard src-report 95 made available public hp luca cardelli martín abadi wrote book theory objects 1997 laying formal calculi semantics object-oriented programming languages baby modula-3 influenced work according luca cardelli guided calculus type self types object type 'self opened way work modula-3 formal semantic checking systems object oriented type system programming languages used model formal semantics programming languages ada programming language c programming language
[ 184, 3764, 304, 3069, 1435, 6642 ]
Test
1,091
4
Window_Snyder:window snyder mwende window snyder born 1975 american computer security expert previously top security officer intel fastly apple mozilla corporation co-author threat modeling standard manual application security snyder daughter american father kenyan-born mother wayua muasa goes middle name window first name used family members graduated choate rosemary hall 1993 served board snyder director security architecture stake senior security strategist microsoft security engineering communications organization notably security lead signoff microsoft windows xp service pack 2 windows server 2003 also created blue hat microsoft hacker conference leaving microsoft 2005 worked principal founder cto matasano security joined mozilla september 2006 10 december 2008 snyder said would leaving mozilla corporation end year 1 march 2010 snyder began work apple inc 2015 snyder became chief security officer content distribution network fastly intel software services group senior vice president general manager doug fisher announced july 2018 snyder would become company platforms security division chief security officer vice president general manager since left intel may 2019 joined square inc may 2017 snyder spoke next generation threats held techworld idg stockholm sweden april 2017 snyder keynote speaker hitbsecconf held hack box amsterdam november 2017 snyder spoke o'reilly security conference april 2018 spoke rsa conference august 2018 snyder keynote speaker open source summit held linux foundation
[ 3842, 2885, 5511, 1805 ]
Test
1,092
2
AdJ:adj adj aprendiendo de jesús distribution openbsd spanish speakers source code available github learn install challenge p2pu version based corresponding version sources openbsd distribution cited number independent authors
[ 5268, 6984, 6489, 3559, 3751, 7848, 5232, 6367 ]
Test
1,093
2
RNDIS:rndis remote network driver interface specification rndis microsoft proprietary protocol used mostly top usb provides virtual ethernet link versions windows linux freebsd operating systems partial rndis specification available microsoft windows implementations observed issue requests included specification undocumented constraints protocol tightly coupled microsoft programming interfaces models notably network driver interface specification ndis alien operating systems windows complicates implementing rndis non-microsoft operating systems linux freebsd netbsd openbsd implement rndis natively usb implementers forum usb-if defines least three non-proprietary usb communications device class usb cdc protocols comparable virtual ethernet functionality one cdc-ecm predates rndis widely used interoperability non-microsoft operating systems work windows versions android include rndis usb functionality recent versions nexus 6p september 2016
[ 5637, 4759, 7029, 578 ]
Test
1,094
3
Macintosh_LC_family:macintosh lc family macintosh lc family personal computers designed manufactured sold apple computer inc. 1990 1997 introduced alongside macintosh iisi macintosh classic part new wave lower-priced macintosh computers lc offered overall performance macintosh ii half price part apple goal produce machine could sold school boards price apple ii original macintosh lc introduced october 1990 updates form lc ii lc iii 1992 early 1993 early models shared pizza box form factor joined macintosh lc 500 series all-in-one desktop machines mid-1993 total twelve different lc models produced company last power macintosh 5300 lc sale early 1997 apple co-founder steve jobs left apple 1985 product development handed jean-louis gassée formerly manager apple france gassée consistently pushed apple product line two directions towards openness terms expandability interoperability towards higher price gassée long argued apple market computers towards low end market profits thin instead concentrate high end higher profit margins illustrated concept using graph showing price/performance ratio computers low-power low-cost machines lower left high-power high-cost machines upper right high-right goal became mantra among upper management said fifty-five die referring gassée goal 55 percent profit margin policy led series ever expensive computers spite strenuous objections within company group claris started low-end mac project called drama gassée actively killed elsewhere company two engineers h.l cheung paul baker working secret pet project color macintosh prototype called spin idea produce low-cost system vein apple ii product cheung previously worked apple head design machine would effect significantly smaller macintosh ii built-in video nubus expansion matching rgb monitor similar one introduced apple iigs year prior project changed direction development executives dictating machine video capabilities processing power similar macintosh iici also development time early 1989 prototype shown apple executives liked project felt different enough existing models justify effort project shut around time apple ceo john sculley facing public scrutiny declining sales blamed large part company lack inexpensive macintosh computer amidst promises press investors new low-cost macintosh way revived spin project goal creating lowest-priced macintosh possible gassée pleaded team keep color feature project product known internally new code name elsie homonym lc i.e low-cost color name computer would later sold elsie prototypes point resembled apple iic keyboard integrated unit single 800 kb floppy drive hard drive team ended problem — machine cheap n't good computer especially 68000 cpu powerful enough display color graphics acceptable performance april 1989 decided split project three computers -- macintosh iisi would powerful 68030 cpu macintosh classic would use black white display lc would use 68020 cpu macintosh ii keep price apple cut corners performance features redesigned components less expensive example external floppy connector included iisi classic excluded lc would save couple dollars connector integrated keyboard also dropped point replaced newly designed keyboard called apple keyboard ii macintosh lc introduced market alongside macintosh classic repackaging older macintosh plus macintosh iisi new entry-level machine macintosh ii series due pent-up demand low-cost color macintosh lc strong seller 1992 original macintosh lc succeeded lc ii updated machine replaced lc motorola 68020 processor 68030 increased soldered memory 4 mb make suitable system 7 however retained original lc 16-bit system bus 10 mb ram limit 4 mb simms used extra 2 mb ram would inaccessible making performance roughly earlier model main benefit 030 processor lc ii ability use system 7 virtual memory feature spite new model sold even better lc computer gaming world 1990 criticized lc expensive stating consumers would prefer 2,000 ibm ps/1 vga graphics 3,000 lc color monitor although classic popular first may 1992 lc 560,000 sold outselling classic 1.2 million half lcs used homes schools apple claimed helped company regain educational market share lost inexpensive pc clones iie card used half schools lcs early 1993 apple introduced lc iii used 25 mhz version 68030 higher memory limit 36 mb instead 10 mb lc lc ii lc iii spawned whole series lc models later sold lc name education world consumers via traditional apple dealers performa consumer market via electronics stores department stores sears example lc 475 also known performa 475 last official lc power macintosh 5300/100 lc released august 1995 discontinued april 1996 lc 580 notable last desktop 680x0-based macintosh mid-1993 apple introduced macintosh lc 520 combined traditional all-in-one form factor popularized compact macintosh family technology platform lc iii became apple mainstream education-market macintosh featuring built-in 14 crt display cd-rom drive stereo speakers case similar recently-introduced macintosh color classic considerably larger heavier due larger screen bulging midsection house larger electronics four lc 500-series models released next two years 520 550 575 580 520 550 using different speeds motorola 68030 575 580 sharing 33mhz motorola 68lc040 processor differing rest hardware computers also sold consumer market department stores macintosh performa brand similar model numbers lc models particular became popular schools small footprint lack cable clutter durability apple also released macintosh tv variant lc/performa 520 branded lc uses black-coloured version lc 520 case logic board similar lc 550 tv tuner card compact color classic series shares many components able swap logic boards early 500 series machines power macintosh 5200 lc introduced april 1995 powerpc 603 cpu 75 mhz powerpc-based replacement lc 500 series august power macintosh 5300 lc released kept motherboard design included powerful powerpc 603e cpu well director edition similar design features macintosh tv unlike previous education models prepended model number lc 5200 5300 models use power macintosh designation apple main workstation line time lc appended end 5300 lc final model branded lc sale early 1997 replacement power macintosh 5500 continued practice building education-specific models without distinctive branding except uk-only power macintosh one/225 company produce another education model brand name emac 2002
[ 6788, 7890, 5732, 722, 2926, 5037, 5752, 6125, 2954, 7572, 6482, 6847, 6142, 4373, 7226, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 1940, 3025, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1599, 1234, ...
Test
1,095
2
RenderScript:renderscript renderscript component android operating system mobile devices offers api acceleration takes advantage heterogeneous hardware allows developers increase performance applications cost writing complex lower-level code provides developer three primary tools simple 3d rendering api compute api similar cuda c99-derived language renderscript added android 3.0 honeycomb android 4.1 renderscipt experimental 3d rendering api deprecated exists solely compute api android 4.2 added new capabilities script intrinsics blend blur well scriptgroups allow chain together related renderscript scripts execute one call recently google added filterscript subset renderscript allows developers write image processing operations filterscript using standard renderscript runtime api within stricter constraints ensure wider compatibility improved optimization across multi-core cpus gpus dsps filterscript less precise terms numeric datatype precision cross device compatible subset renderscript – mistaken renderscript replacement technology renderscript designed always run various android platforms regardless hardware type performance tuning done runtime renderscript portability depends upon device-specific drivers basic cpu-only driver provided every device exist specific chipset-provided renderscript drivers enable gpu usage e.g qualcomm specific drivers provided codice_1 android library renderscript designed tune tasks runtime efficiently split run concurrently underlying hardware android 4.2 renderscript expanded run gpu addition cpu supported systems
[ 3933, 5372, 6427, 740, 4340, 42, 3310, 2591, 5771, 5775, 7956, 5473, 474, 6183, 822, 136, 6209, 6937, 6232, 1237, 4116, 5195, 2003, 3773, 195, 6978, 7346, 561, 201, 2017, 5919, 7357, 2398, 2037, 2756, 7007, 5939, 7749, 2417, 2054, 2788,...
Test
1,096
1
H2_(DBMS):h2 dbms h2 relational database management system written java embedded java applications run client-server mode software available open source software mozilla public license 2.0 original eclipse public license subset sql structured query language standard supported main programming apis sql jdbc however database also supports using postgresql odbc driver acting like postgresql server possible create in-memory tables well disk-based tables tables persistent temporary index types hash table tree in-memory tables b-tree disk-based tables data manipulation operations transactional table level locking multiversion concurrency control implemented 2-phase commit protocol supported well standard api distributed transactions implemented security features database role based access rights encryption password using sha-256 data using aes tiny encryption algorithm xtea cryptographic features available functions inside database well ssl tls connections supported client-server mode well using console application two full text search implementations included native implementation one using lucene simple form high availability implemented used client-server mode database engine supports hot failover commonly known clustering however clustering mode must enabled manually failure database supports protection sql injection enforcing use parameterized statements h2 feature called 'disabling literals since version 1.1.111 h2 in-memory database run inside google app engine h2 documentation explains detail several ways problems underlying hardware particular power systems impact durability relational databases according h2 documentation problems related db engine design also storage caching mechanism storage devices use write cache order increase speed situation power failure data device cache lost administrators assess common trade speed data loss risks context business requirements must carefully consider design power supply ups critical servers possible cases force storage write cache frequently even immediately using fsync slows writing process one accept caching device buffer introduces risk data loss case power failure effectiveness using fsync limited fact many hdd write caching enabled factory default case nothing design settings database os level commands able completely eliminate chance lost inconsistent data event sudden power failure working os hardware settings disable caching write data real time significant impacts performance around 100 write operations per second would achievable using spinning disks h2 documentation makes effort describe detail potential problems durability part acid resulting potential data loss committed transactions case power failure considering hardware limitations regarding preservation data event sudden power loss ineffectiveness approaches commonly employed developers prevent sorts losses many database engines default call filedescriptor.sync filechannel.force fsync equivalents every commit significantly degrade system performance without significantly increasing durability hsqldb documentation references workarounds similar set issues documentation microsoft knowledge base describes impact issues power failures write caching etc performance durability knowledge base discusses trade offs performance vulnerability disk write caching well settings administrator use balance embedded web server browser based console application included well command line tools start stop server backup restore databases command line shell tool development h2 database engine started may 2004 first published december 2005 database engine written thomas mueller also developed java database engine hypersonic sql 2001 hypersonic sql project stopped hsqldb group formed continue work hypersonic sql code name h2 stands hypersonic 2 however h2 share code hypersonic sql hsqldb h2 built scratch
[ 623, 7248, 7067, 3371, 5571, 2571, 3975, 2674, 4345, 7109, 6386, 5956, 955, 3915, 1695 ]
Validation
1,097
2
Development_of_Windows_Vista:development windows vista development windows vista occurred span five half years starting earnest may 2001 prior release microsoft windows xp operating system continuing november 2006 microsoft originally expected ship new version sometime late 2003 minor step windows xp codenamed whistler windows 7 codenamed blackcomb vienna vista original codename longhorn allusion plan whistler blackcomb large ski resorts british columbia longhorn name bar two mountains whistler visitors pass reach blackcomb gradually windows longhorn assimilated many important new features technologies slated blackcomb resulting release date pushed back times many microsoft developers also re-tasked improving security windows xp faced ongoing delays concerns feature creep microsoft announced august 27 2004 making significant changes longhorn development started afresh building windows server 2003 codebase re-incorporating features would intended actual operating system release previously announced features winfs ngscb dropped postponed longhorn named windows vista mid-2005 unprecedented beta-test program started involved hundreds thousands volunteers companies september 2005 october 2006 microsoft released regular community technology previews ctp beta testers two release candidates general public development windows vista came conclusion november 8 2006 announcement completion co-president windows development jim allchin early development stages longhorn generally characterized incremental improvements updates windows xp period microsoft fairly quiet worked marketing public relations focus strongly focused windows xp windows server 2003 released april 2003 occasional builds longhorn leaked onto popular file sharing networks irc bittorrent edonkey various newsgroups known builds prior first sanctioned development release longhorn may 2003 derived builds builds longhorn vista identified label always displayed bottom-right corner desktop typical build label would look like longhorn build 3663.lab06_n.020728-1728 higher build numbers n't automatically mean latest features every development team microsoft included typically team working certain feature subsystem would generate working builds developers would test code deemed stable changes would incorporated back main development tree microsoft number build labs exist compilation entirety windows performed team lab given build originated shown part build label date time build follows builds beta 1 beta 2 display build label version information dialog winver icons windows xp installing milestone 2 builds oobe setup process windows xp different music build 3663 build date july 28 2002 first known build leaked screenshots first sighting plex style microsoft regarded place-holder theme development versions ready demonstrate aero build 3670 build date august 19 2002 screenshots build showed variation device manager implemented inside windows explorer feature later appeared windows 7 build 3683 build date september 23 2002 leaked october 20 2002 first longhorn build leaked internet build first several working title longhorn xp professional visually significantly different windows xp one notable changes windows logo white colored like versions windows also templates documents pictures notably different well open save dialog boxes also included template incorporating aesthetic changes new user interface options new sidebar also present contained many gadgets would much later seen windows sidebar analog clock slide show search capability option version sidebar also made possible move start button disable traditional taskbar entirely early revision winfs also included little way user interface included appeared early testers nothing service consumed large amounts memory processor time display properties control panel first significant departure built new avalon api build 3706 build date october 29 2002 leaked may 22 2006 one first builds include desktop composition engine dce later became desktop window manager dwm build appeared internet long builds time period included several changes first reported part later milestone builds including internet explorer 6.05 plex theme build 3718 build date november 19 2002 leaked april 30 2004 included dce early hardware-accelerated alpha transparency transition effects demonstration dce capabilities programs literally flipped taskbar twisted minimized several months relatively little news activity microsoft longhorn build 4008 build date february 19 2003 made appearance internet around february 28 2003 also privately handed select group software developers evolutionary release build 3683 contained number small improvements including modified blue plex theme new simplified windows image-based installer operates graphical mode outset completed install operating system approximately one third time windows xp hardware optional new taskbar introduced thinner previous build displayed time differently notable visual functional difference however came windows explorer incorporation plex theme made blue dominant color entire application windows xp-style task pane almost completely replaced large horizontal pane appeared toolbars new search interface allowed filtering results searching windows help natural-language queries would used integrate winfs animated search characters also removed view modes also replaced single slider would resize icons real-time list thumbnail details mode depending slider file metadata also made visible easily editable active encouragement fill missing pieces information also note conversion windows explorer .net application build 4015 build date march 28 2003 leaked internet april 28 2003 number features microsoft working rolled build range parental controls also moved enlarged windows logo left side start button lot additional configurability sidebar including able put start bar bottom screen notion libraries later known virtual folders files libraries collected content around hard drive user could filter content save folder microsoft originally intended replace special shell folders documents music etc virtual folders however change deemed drastic dropped beta 1 release mid-2005 libraries later included windows 7 build also notable debut boot screen progress bar seen final release though 4015 version blue green new download manager shell location suggested internet explorer would get mozilla-style download manager though functionality apparent significant memory leak problems windows explorer sidebar made build difficult use resulted third-party hacks mitigate problem back-end database outlook express changed completely became dependent winfs store email winfs still significant performance memory usage issues became common testers disable winfs entirely thus rendering outlook express inoperative windows hardware engineering conference winhec conference may 2003 microsoft gave first public demonstrations new desktop window manager aero demonstrations done revised build 4015 never released number sessions developers hardware engineers conference focused new features well next-generation secure computing base previously known palladium time microsoft proposed solution creating secure computing environment also conference microsoft reiterated roadmap delivering longhorn pointing early 2005 release date build 4028 build date july 1 2003 first known server build based windows server.net rc1 later became windows server 2003 traditional client bits visual style look present disabled default build 4029 build date june 19 2003 leaked september 23 2003 build contained technologies new build 4015 windows explorer went number changes larger image video previews displayed tooltip mouse hovered file column-level filtering results introduced overall performance explorer somewhat improved build 4015 though memory leak issues entirely resolved also new analog clock user interface batch image processing images also introduced making possible user rotate number images build 4029 name displayed onghornlay rofessionalpay ersionvay 2003 pig latin longhorn professional version 2003 various places around operating system presumed screenshots build fake seemingly obvious mistake microsoft later explained merely test new code locate reduce number places operating system code name defined build 4033 build date july 17 2003 similar 4029 contained ui improvements including updated plex theme build 4039 build date august 27 2003 leaked august 22 2007 build includes phodeo 3d view displaying photos full dwm glass last build contain plex visual style build 4042 build date september 9 2003 probably earliest build slate theme lab06 instead plex theme winmain seen previous builds however aero glass build 4039 still present word removed computer network places build 4050 build date september 28 2003 shown teched 2004 israel one many 4050-numbered builds used microsoft demos notably 2003 professional developers conference official pdc 2003 build build date october 1 2003 build number 4051 released general public leak october 20 2003 introduced slate theme debuted 4042.lab06 build also contained updated version internet explorer version number 6.05 new features noted reviewers included download manager pop-up blocker add-on manager tool clear browsing history exception download manager eventually discarded features appeared builds internet explorer included preview builds windows xp service pack 2 months later windows sidebar enabled word start removed start button development used later windows vista build 4053 build date october 22 2003 leaked march 2 2004 minor changes build 4066 build date february 26 2004 although build identified server build contained many features ever seen associated desktop builds updated version phodeo included well sidebar mini-windows media player associated sidebar tiles functioning build desktop window manager jade theme build also replaced many xp icons new longhorn icons greatly resemble icons final version vista build leaked december 20 2008 may 2004 microsoft changed plans include next-generation secure computing base technology longhorn technology better known original code-name palladium garnered much criticism analysts security specialists researchers often cited advocates non-microsoft operating systems reason migrate preferred platform ross anderson example published paper collating many concerns criticisms part larger analysis trusted computing light large amount negative response analysts enterprise customers software developers microsoft shelved many aspects ngscb project indefinite period time aspect ngscb included final release operating system bitlocker make use trusted platform module chip facilitate secure startup full-drive encryption build 4067 build date february 12 2004 private beta shown jim allchin keynote winhec 2004 build 4074 build date april 25 2004 official winhec 2004 preview build leaked may 2004 build introduced improved jade theme although slate theme retained default also font segoe ui introduced jade theme also familiar pre-reset build build 4083 build date may 16 2004 – leaked november 10 2004 sidebar winfs dropped release considered highly unstable including absence programs start menu driver installation issues build 4093 build date august 19 2004 – one last builds compiled development reset considered highly unstable contained sidebar winfs avalon-based windows movie maker preliminary version windows anytime upgrade microsoft anna speech synthesizer avalon-based display properties control panel applet hidden \windows\system32 folder similar one build 3683 2004 become obvious windows team microsoft losing sight needed done complete next version windows ship customers internally microsoft employees describing longhorn project another cairo cairo.net referring cairo development project company embarked first half 1990s never resulted shipping operating system though nearly technologies developed time end windows 95 windows nt microsoft shocked 2005 apple release mac os x tiger offered limited subset features planned longhorn particular fast file searching integrated graphics sound processing appeared impressive reliability performance compared contemporary longhorn builds longhorn builds major explorer.exe system leaks prevented os performing well added confusion development teams later builds code developed failed reach stability september 23 2005 front-page article wall street journal microsoft co-president jim allchin overall responsibility development delivery windows explained development longhorn crashing ground due large part haphazard methods features introduced integrated core operating system without clear focus end-product december 2003 allchin enlisted help two senior executives brian valentine amitabh srivastava former experienced shipping software microsoft notably windows server 2003 latter spent career microsoft researching developing methods producing high-quality testing systems srivastava employed team core architects visually map entirety windows operating system proactively work towards development process would enforce high levels code quality reduce interdependencies components general make things worse vista things conjunction fact many microsoft skilled developers engineers working windows server 2003 led decision reset development longhorn building code would become windows server 2003 service pack 1 instead older windows.net server release candidate 1 build 3663 change announced internally microsoft employees august 26 2004 began earnest september though would take several months new development process build methodology would used development teams number complaints came individual developers bill gates new development process going prohibitively difficult work within changes build labs also resulted period time several months builds longhorn leaked onto internet build 3790.1232 build date august 19 2004 notable first build longhorn based server 2003 code base windows xp interface successive internal builds several months gradually integrated lot fundamental work done previous three years much stricter rules code could brought main builds builds period time described variously longhorn d1 milestone 8 9 depending whether new old build tree worked evidence similar build marked build 5000 built september 8 2004 also found build 5001 build date september 12 2004 windows longhorn build also windows xp interface wallpaper windows xp bull long horns boot screen also windows xp lh replacing xp lh represents longhorn build 5048 built april 1 2005 official winhec 2005 preview build described longhorn developer preview made available winhec attendees april 24 2005 build time period made available microsoft officially distributed outside winhec build quickly appeared file sharing networks aero visual style made first appearance build desktop window manager present disabled hidden default keynote presentation bill gates also announced many winfx developer apis originally planned exclusively longhorn going backported windows xp server 2003 final user interface longhorn would seen longer features device-independent resolutions rasterized icons virtual folders registry virtualization discussed well build 5048 closer resemblance windows xp prior longhorn builds 2003 2004 surprised many leading well-known windows enthusiast paul thurrott write thoughts positive positive painful build deal year waiting step back ways hope microsoft surprises sleeves makings train wreck months later thurrott stated vista development process since recovered recent builds build 5060 build date april 17 2005 major difference build 5048 except new style logon screen desktop wallpaper changed microsoft considered several names new operating system end microsoft chose windows vista confirmed july 22 2005 believing wonderful intersection product really windows stands resonates customers needs group project manager greg sullivan told paul thurrott— want pc adapt help cut clutter focus ’ important windows vista bringing clarity world reference three marketing points vista—clear connected confident focus matters microsoft co-president jim allchin also liked name saying vista creates right imagery new product capabilities inspires imagination possibilities done windows—making people ’ passions come alive windows vista beta 1 build 5112 build date july 20 2005 released july 27 2005 first longhorn build called windows vista available microsoft developer network msdn technet subscribers well select group microsoft beta testers compared winhec build released earlier year vista beta 1 large advancement introducing new user interface features windows shell drastically changed yet introducing virtual folders new search interface number new high-resolution icons revamped windows explorer interface away menus toolbar buttons present previous versions beta 1 also introduced many underlying technologies slated vista including new networking audio stacks parental controls fairly complete working build .net framework 3.0 still referred winfx build 5219 build date august 30 2005 microsoft started releasing regular community technical previews ctp beta testers less stability work made actual betas build 5219 also known ctp1 september ctp distributed among 2005 pdc attendees september 13 2005 released microsoft beta testers msdn subscribers first public ultimate edition build included super fetch although enabled default refresh saw return windows sidebar removed part development reset introduction desktop gadgets part microsoft gadgets line mini-applications microsoft stated intended make additional gadgets available download web site time build also supported new version windows media center code-named diamond although microsoft stated winfs make debut windows vista users build 5219 noticed winfs fact included version several windows 'rumor sites newsgroups neowin paul thurrott supersite windows speculated winfs would fact ready time windows vista release build 5231 build date october 4 2005 also known ctp2 october 2005 ctp released msdn subscribers microsoft beta testers october 17 2005 ultimate build introduced windows media player version 11 updated volume control utility added control volume level every running program build 5259 built november 17 2005 released microsoft technology adoption program tap members november 22 2005 originally announced released november 18 november ctp microsoft cancelled november ctp due instability however released build tap members sidebar temporarily removed build new ui changes including ability change color clarity ui windows antispyware soon windows defender integrated outlook express renamed windows mail idw build therefore gone ctp testing process leaked internet december 7 2005 december ctp built december 14 2005 build number 5270 released testers msdn december 19 2005 close feature complete since feature complete build delayed late january 2006 build windows antispyware renamed windows defender ie7 new icon/logo minor ui changes december ctp also last build windows vista supported bypassing wddm driver model requirement hence allowing desktop window manager uxss time build run using software vertex emulation change post 5270 builds well known keys 'usemachinecheck 'enablemachinecheck allow running desktop window manager software emulation mode february ctp built february 17 2006 build number 5308 released february 22 2006 first feature-complete ctp build meant enterprises also first build upgrade compatibility build according microsoft one feature appear next ctp customers see final release however later builds brought improvements previously expected unstaged revision made build released february 28 2006 build 5308.60 built february 23 released result windows server longhorn many issues february ctp also incorporated numerous virtual folders including attachments favorite music fresh tracks important e-mail last 7 days e-mail last 30 days documents last 30 days pictures videos recently changed shared unread e-mail user files intel developer forum march 9 2006 microsoft announced change plans support efi windows vista uefi 2.0 specification replaces efi 1.10 completed early 2006 time microsoft announcement firmware manufacturers completed production implementation could used testing result decision made postpone introduction uefi support windows support uefi 64-bit platforms postponed vista service pack 1 windows server 2008 32-bit uefi supported microsoft expect many systems built market moves 64-bit processors february ctp refresh built march 21 2006 build number 5342 released march 24 2006 build shipped technical beta testers corporate customers microsoft used testing board extensive feedback got february ctp described release external developer workstation intent providing interim build ctps microsoft claimed still track deliver next ctp second quarter build last beta 2 fork build included minor ui changes notably improvements media center new aero aurora effects faster setup process new sidebar gadgets slight improvements overall performance stability paint also slightly improved new screenshot snapping/saving tool included slightly redesigned network center build meet ctp quality measurements available ultimate edition 32-bit x86 64-bit x64 systems april edw built april 19 2006 build number 5365 released april 21 2006 introduced changes visual user interface elements behavior user account control number new backgrounds also introduced two new screensavers added well sidebar enabled default automatic defragmentation hard drive hold'em game shipped previous ctps dropped due apparent political sensitivity issues microsoft offers separate web download windows vista ultimate users windows vista beta 2 preview built may 1 2006 build number 5381 leaked may 2 2006 officially released may 6 2006 microsoft technical beta testers featured mostly performance tweaks minor changes compared build 5365 build microsoft entered beta 2 escrow windows vista beta 2 built may 18 2006 build number 5384 released microsoft developer network subscribers first since 5308 microsoft connect testers may 23 2006 conjunction bill gates keynote presentation winhec 2006 conference june 6 microsoft extended availability beta 2 users making vista available free download several languages web site technology web sites described release largest download event software history june microsoft made two significant changes plans windows vista one issue inclusion xml paper specification support vista microsoft office 2007 become major point dispute adobe systems first introduced may 2005 xps known time metro characterized pdf-killer adobe representative stated threatened addition longhorn however year later adobe changed stance saw inclusion new document format anti-competitive attack portable document format microsoft refused remove xps altogether noting core vista print spooling system offered ability system builders oems remove user-visible aspects document format operating system days later announced pc-to-pc sync would ship windows vista june 14 2006 windows developer philip su posted blog entry decried development process windows vista stating code way complicated pace coding tremendously slowed overbearing process. post also described windows vista approximately 50 million lines code 2,000 developers working product build 5456 build date june 20 2006 released june 24 2006 new features included revamped aero subsystem completely overhauled significantly less obtrusive user account control interface list view windows explorer brought back removed beta 1 microsoft developer ben betz later explained blog entry felt removing list mode made sense based usability research inability support windows explorer new grouping feature feature restored based great deal feedback beta testers release notes build state time zone bug plagued almost previous builds windows vista patched quite issues regional settings ime also resolved new windows aero mouse pointer scheme introduced introduced anti-aliasing mouse pointer first time many remaining windows xp-style icons replaced new icons disk space used clean installation also significantly reduced build 5472 build date july 13 2006 released july 17 2006 aside incorporating number bug fixes localization improvements build also introduced revised basic theme replaces gray theme seen previous builds light blue theme network center significantly revised well collating status information one place reducing number steps get configuration options desktop backgrounds icons introduced flip3d saw layout tweaks new windows aero mouse cursor set default build huge performance improvement beta 2 comparable possibly even faster windows xp demonstration speech recognition feature new windows vista microsoft financial analyst meeting july 27 2006 software recognized phrase dear mom dear aunt several failed attempts correct error sentence eventually became dear aunt let set double killer delete select developer vista speech recognition team later explained bug build vista causing microphone gain level set high resulting audio received speech recognition software incredibly distorted august 8 2006 microsoft security response center provided critical security fixes windows vista beta 2 making first microsoft product get security updates still beta build 5536 build date august 21 2006 released august 24 2006 august 29 august 31 first 100,000 users downloaded microsoft site among notable changes featured new ties windows live online services new icons welcome center minor updates aero appearance slightly bluish tint glass effect big speed improvements including setup speed many bug fixes tweaked anti-aliasing flip 3d feature released publicly august 29 2006 release candidate 1 rc1 built august 29 2006 build number 5600.16384 released select group beta testers september 1 2006 september 6 rc1 released msdn technet subscribers well registered customer preview program cpp members beta 2 pid september 14 microsoft re-opened cpp new members cpp ended november 26 2006 public release release candidate 1 resulted number extensive reviews analyses various technology news web sites immediately release weeks following ars technica ken fisher wrote performance improved significantly beta 2 suggesting faster machines may perform better windows xp also criticised usefulness windows sidebar continued intrusiveness user account control crn review noted five specific categories improvements release candidate 1 installation speed device driver support performance improvements several components security multimedia capabilities criticism vista user interface arose well chris pirillo describing near-final state sloppy build 5700 build date august 10 2006 first build rtm branch shown student day presentation microsoft tech-ed 2006 australia appeared run faster previous pre-rc1 build 5472 ui improvements higher build number necessarily indicate newer build microsoft began work rtm branch time wrapping rc1 branch allowing mainstream rc1 developers easily flow new development stage parallel development helps explain build 5700 older even pre-rc1 builds build 5728 build date september 17 2006 released september 22 2006 technical beta participants following day microsoft released 32-bit version build public 64-bit version arriving september 25 october 1 microsoft reached goals program participation longer offered build public response significant amount feedback rc1 testers 5728 contained many improvements one inclusion check box sound properties allowed user disable windows vista startup sound welcome center also improved new icons eliminating use one icon several different items old icons user folder replaced build microsoft neared goal vista installing 15 minutes reviewers reporting 5728 took little 16 minutes clean install however performing upgrade installation windows xp still slow sometimes taking hour complete release candidate 2 rc2 built october 3 2006 build number 5744.16384 released cpp members tap testers msdn/technet subscribers technical beta testers friday october 6 2006 available download october 9 aggressive development schedule final build would officially released general public testing nevertheless pre-release product keys work final rtm build several testers reported rc2 faster stable build 5728 however rc2 regular interim build major milestone name suggests rigorously tested rc1 rc1 may stable certain situations build fixed many compatibility issues plagued previous builds vista gui continued improved contained minor tweaks one prominent new ability customize color transparency maximized windows previous builds windows became predominantly black maximized effect could altered users control panel icon windows sideshow also added release manufacturing rtm build final version code shipped retailers distributors purpose pre-rtm build eliminate last show-stopper bugs may prevent code responsibly shipped customers well anything else consumers may find annoying thus unlikely major new features introduced instead work focus vista fit-and-finish days developers managed drop vista bug count 2470 september 22 1400 time rc2 shipped early october however still way go vista ready rtm microsoft internal processes required vista bug count drop 500 fewer product could go escrow rtm builds 32-bit versions released build 5808 build date october 12 2006 released tap testers october 19 2006 build notable first build released testers since microsoft entered rtm escrow build 5800 explains build numbers jumped 57xx 58xx build 5824 build date october 17 2006 released wide number internal testers later day hope build would become final rtm however catastrophic show-stopper bug found destroyed system upgraded windows xp completely reinstalling windows would fix computer build 5840 build date october 18 2006 made available internal testers according paul thurrott build contain major bug build 5824 testing produced positive feedback build contained large number new final icons well new set final wallpapers including new default wallpaper based aurora swoosh seen prior builds also last build feature windows xp sound scheme release manufacturing rtm built november 1 2006 build number 6000.16386 version windows vista ships customers microsoft announced build finalized november 8 2006 five years development rtm build number jumped 6000 reflect vista internal version number nt 6.0 jumping rtm build numbers common practice among consumer-oriented windows versions like windows 98 build 1998 windows 98 se build 2222 windows b.3000 windows xp b.2600 compared business-oriented versions like windows 2000 b.2195 server 2003 b.3790 november 16 2006 microsoft made final build available msdn technet plus subscribers business-oriented enterprise edition made available volume license customers november 30 windows vista launched general customer availability january 30 2007 service pack 1 beta released microsoft connect selected testers september 24 2007 build offered optionally windows update registry key installed tester key later leaked net resulting deactivation microsoft release build number vista jumped 6001.16659.070916-1443 build also removed group policy management console gpmc client computers replaced downloadable version later date also removed search menu option right hand bar start menu including option re-add start menu customization list build broke hp touch smart family applications also caused bugs resuming sleep cases rendered 64-bit pcs trusted platform module tpm chips unable finish booting build also contained unspecified improvements speed responsiveness os service pack 1 release candidate preview released microsoft connect selected testers november 12 2007 release build number vista increased 6001.17042.071107.1618 changes build covered microsoft connect non-disclosure agreement nda service pack 1 release candidate first released microsoft connect testers december 4 2007 build released msdn technet several weeks later days build released public officially microsoft download center public preview sp1 release build number vista increased 6001.17052.071129.2315 build contained number notable changes enhancements service pack 1 release candidate refresh released microsoft connect selected testers january 9 2008 released public january 11 2008 release build number 6001.17128.080101.1935 service pack 1 release candidate refresh 2 released microsoft connect selected testers january 24 2008- windows update release build number 6001.18000 details build covered microsoft connect non-disclosure agreement nda service pack 1 released manufacturing monday february 4 2008 final build service pack 1 went live tuesday march 18 2008 microsoft download center windows update build confirmed sources microsoft exactly code rc refresh 2 also giving exactly build number full build string release refresh 2 6001.18000.longhorn_rtm.080118-1840 build 6001.18063 release date june 24 2008 microsoft released kb952709 reliability performance update windows vista build notable two reasons first first publicly released update increases vista build number beyond 6001.18000 final build service pack 1 second build replaces 6001 longhorn _rtm.080118-1840 build string sp1 6001. vistasp1 _gdr.080425-1930 longhorn build string present early development vista seen official release build update reintroduced sp1 beta left sp1 released build marks removal release version vista contain longhorn codename prominent manner microsoft started work service pack 2 soon service pack 1 released windows server 2008 uses codebase windows vista service pack 1 service pack 2 first service pack released windows server 2008 windows vista simultaneously sharing binary windows vista service pack 2 pre-beta build number 6002.16489.lh_sp2beta.080924-1740 version 105 released october 2008 windows vista service pack 2 beta build number 6002.16497.081017-1605 version 113 released december 4 2008 download became available microsoft download center windows vista service pack 2 rc escrow build number 6002.16659.090114-1728 version 275 released january 2009 windows vista service pack 2 release candidate build number 6002.16670.090130-1715 version 286 released february 2009 windows vista service pack 2 rtm escrow build connect beta testers build number 6002.17043.090312-1835 version released march 2009 available installed via windows update windows vista service pack 2 rtm escrow build number 6002.17506.090313-1730 version released march 2009 leak file sharing websites windows vista service pack 2 rtm build number 6002.18005.090410-1830 released 28 april 2009 officially released microsoft via windows update 26 may 2009 – find build revision number windows vista windows server 2008 installed
[ 448, 2452, 458, 4759, 5637, 6256, 7616, 1536, 3180, 6618, 2920, 3187, 2472, 4500, 4687, 6962, 4880, 5313, 224, 930, 5850, 2769, 7660, 2326, 8118, 2329, 3048, 6136, 3907, 2066, 5781, 432, 2885, 1418, 6580, 3585, 7685, 5442, 2530, 4377, 5...
Validation
1,098
4
Molecular_marker:molecular marker molecular marker molecule contained within sample taken organism biological markers matter used reveal certain characteristics respective source dna example molecular marker containing information genetic disorders genealogy evolutionary history life specific regions dna genetic markers used diagnosing autosomal recessive genetic disorder cystic fibrosis taxonomic affinity phylogenetics identity dna barcoding life forms known shed unique chemicals including dna environment evidence presence particular location biological markers like proteins used diagnostic tests complex neurodegenerative disorders alzheimer disease non-biological molecular markers also used example environmental studies genetics molecular marker identified genetic marker fragment dna associated certain location within genome molecular markers used molecular biology biotechnology identify particular sequence dna pool unknown dna many types genetic markers particular limitations strengths within genetic markers three different categories first generation markers second generation markers new generation markers types markers may also identify dominance co-dominance within genome identifying dominance co-dominance marker may help identify heterozygotes homozygotes within organism co-dominant markers beneficial identify one allele thus enabling someone follow particular trait mapping techniques markers allow amplification particular sequence within genome comparison analysis molecular markers effective identify abundance genetic linkage identifiable locations within chromosome able repeated verification identify small changes within mapping population enabling distinction mapping species allowing segregation traits identity identify particular locations chromosome allowing physical maps created lastly identify many alleles organism particular trait bi allelic poly allelic genomic markers mentioned particular strengths weakness consideration knowledge markers necessary use instance rapd marker dominant identifying one band distinction may sensitive reproducible results typically due conditions produced rapd used also assumption two samples share locus sample produced different markers may also require different amounts dna rapd may need 0.02ug dna rflp marker may require 10ug dna extracted produce identifiable results currently snp markers turned potential tool breeding programs several crops molecular mapping aids identifying location particular markers within genome two types maps may created analysis genetic material first physical map helps identify location chromosome well chromosome secondly linkage map identifies particular genes linked genes chromosome linkage map may identify distances genes using cm centimorgans unit measurement co-dominant markers used mapping identify particular locations within genome represent differences phenotype linkage markers help identify particular polymorphisms within genome polymorphisms indicate slight changes within genome may present nucleotide substitutions rearrangement sequence developing map beneficial identify several polymorphic distinctions two species well identify similar sequence two species using molecular markers study genetics particular crop must remembered markers restrictions first assessed genetic variability within organism studied analyze identifiable particular genomic sequence near candidate genes maps created determine distances genes differentiation species genetic markers aid development new novel traits put mass production novel traits identified using molecular markers maps particular traits color may controlled genes qualitative traits requires less 2 genes color identified using mas marker assisted selection desired marker found able followed within different filial generations identifiable marker may help follow particular traits interest crossing different genus species hopes transferring particular traits offspring one example using molecular markers identifying particular trait within plant fusarium head blight wheat fusarium head blight devastating disease cereal crops certain varieties offspring varieties may resistant disease resistance inferred particular gene followed using mas marker assisted selection qtl quantitative trait loci qtl identify particular variants within phenotypes traits typically identify goi gene interest located cross made sampling offspring may taken evaluated determine offspring inherited traits offspring type selection becoming beneficial breeders farmers reducing amount pesticides fungicides insecticides another way insert goi mechanical bacterial transmission difficult may save time money 5 applications fisheries aquaculture biochemical markers generally protein marker based change sequence amino acids protein molecule important protein marker alloenzyme alloenzymes variant forms enzyme coded different alleles locus alloenzymes differs species species detecting variation alloenzymes used markers type-i markers advantages disadvantages applications
[ 5390 ]
Test
1,099
8
Mod_gzip:mod gzip mod_gzip external extension module apache http server v1 v2 allows using gzip compression method significant reduction volume web page content served http protocol mod_gzip compiled apache either static dynamic module possible check server see sending compressed data compression compatibility browser example textual content compressed using mod_gzip maintain mime-type according recommended media type one earliest apache 1.3 versions introduced internal function regular expression evaluation function used mod_gzip evaluating filter rules therefore mod_gzip would work together apache 1.2.x earlier versions compatibility apache 1.3.x mod_gzip 1.3.y granted general apache 1.3 api n't change mod_gzip would even work together old apache 1.3 versions mod_deflate module similar mod_gzip usable apache v2 early versions mod_deflate provided lesser amount compression mod_gzip starting apache 2.0.45 compression level mod_deflate configurable using deflatecompressionlevel directive difference disappeared mod_gz module independently developed ian holsman module implements gzip compression filter apache 2.0 providing similar functionality mod_gzip one important difference two modules mod_gzip includes gzip implementation whereas mod_gz relies external zlib library php similar effect achievable output php scripts cherrypy offers gzip filter uses zlib module python standard library mod_gzip module licensed apache license module level content compression apache started mod_gzip written kevin kiley konstantin balashow autumn 2000 documented michael schröpl published remote communications inc. rci rci purchased hyperspace communications rci released code public domain developers apache 2.0.x servers included mod_deflate module codebase server perform similar gzip-encoding function mod_gzip remained external extension module
[ 6029, 166, 3219, 8168 ]
Train
1,100
3
Native_POSIX_Thread_Library:native posix thread library native posix thread library nptl implementation posix threads specification linux operating system 2.6 version linux kernel processes schedulable entities special facilities threads however system call — clone — creates copy calling process copy shares address space caller linuxthreads project used system call provide kernel-level threads previous thread implementations linux worked entirely userland unfortunately partially complied posix particularly areas signal handling scheduling inter-process synchronization primitives improve upon linuxthreads clear kernel support new threading library would required two competing projects started address requirement ngpt next generation posix threads worked team included developers ibm nptl developers red hat ngpt team collaborated closely nptl team combined best features implementations nptl ngpt project subsequently abandoned mid-2003 merging best features nptl nptl first released red hat linux 9 old-style linux posix threading known trouble threads refuse yield system occasionally take opportunity preempt arises something windows known better time red hat claimed nptl fixed problem article java website java red hat linux 9 nptl part red hat enterprise linux since version 3 linux kernel since version 2.6 fully integrated part gnu c library exists tracing tool nptl called posix thread trace tool ptt open posix test suite opts written testing nptl library posix standard nptl uses similar approach linuxthreads primary abstraction known kernel still process new threads created clone system call called nptl library however nptl requires specialized kernel support implement example contended case synchronisation primitives might require threads sleep wake primitive used known futex nptl so-called 1×1 threads library threads created user via codice_1 library function 1-1 correspondence schedulable entities kernel tasks linux case simplest possible threading implementation alternative nptl 1×1 model
[ 5540, 5453, 5803, 3174, 1535, 3690, 1260, 7528, 1176, 2559, 6725, 578, 6736, 7555, 3559, 1227, 6586, 1989, 7787 ]
Test
1,101
7
AstroPrint:astroprint astroprint cloud platform application marketplace designed consumer 3d printing 3dagogo inc. private san diego based technology company astroprint develops software enable management desktop 3d printers web enabled device without requiring technical expertise astroprint claims unifying software platform fragmented consumer 3d printing space may 2014 part betaspring seed accelerator astroprint successfully raised 40,314 met funding goal single day using crowdfunding website kickstarter subsequently astroprint attended graduated 500 startups seed accelerator mountain view ca astroprint maintains partnerships national institutes health 3d hubs i.materialise 3d slash 3d printer manufacturer airwolf 3d ships 3d printers astroprint software integrated investors astroprint include dave mcclure bunker dave hodson co-founder cto messagecast inc. christine tsai may 8th 2017 astroprint successfully met funding goal 3 hours crowdfunding website kickstarter astrobox touch cloud-enabled touchscreen desktop 3d printing campaign ended 603 backers raising 74,781 bring astrobox touch life kickstarter astroprint also released desktop mobile apps along public api enhance 3d printing experience platform january 15 2015 astroprint covered techcrunch may 18 2015 astroprint editors choice award maker faire make magazine july 27 2015 san diego business journal wrote astroprint instrumental enabling dr. peter manning national institutes health printing 3-dimensional models two-year-old boy heart network vessels caused breathing problems astroprint reduced hundreds settings usually required 3d printers three tech cocktail named astroprint 3d printing top 5 technologies vcs fund 2015 january 5 2016 astroprint unveiled joint project 3 billion technology giant marvell ces 2016 las vegas nevada project involved designing consumer-friendly 3d printer containing embedded software astroprint using kinoma platform according journalists media personnel printer accessible invite-only basis private ballroom within ces may 2017 astroprint second successful crowdfunding campaign covered san diego business journal solidsmack nbc fabbaloo inside3dprinting 3dprint.com all3dp october 2017 astroprint released cross-platform mobile desktop apps desktop 3d printing november 10th 2017 astroprint released toy maker mobile app allows children 3d print toys home toy maker also used demonstrate content delivery capabilities astroprint platform astroprint works taking user uploaded stl file adding supports slicing saving g-code user account online user access download modify print models wirelessly via 3d printer astroprint built combination 3d printing software cura repetier-host slic3r octoprint astroprint also allows users remotely monitor 3d printer real time web-enabled device astroprint compatible consumer 3d printers astrobox gateway open source software run raspberry pi astroprint also released cross-platform mobile desktop software manage 3d printers addition developers able use astroprint api develop third party applications 3d printer owners astroprint platform astroprint aimed general non-technical consumer plug play inclusive platform 3d printing require technical understanding
[ 1284, 3915 ]
Test
1,102
9
Dynamic_programming_language:dynamic programming language dynamic programming language computer science class high-level programming languages runtime execute many common programming behaviours static programming languages perform compilation behaviors could include extension program adding new code extending objects definitions modifying type system although similar behaviors emulated nearly language varying degrees difficulty complexity performance costs dynamic languages provide direct tools make use many features first implemented native features lisp programming language dynamic languages also dynamically typed dynamic languages frequently always referred scripting languages although term scripting language narrowest sense refers languages specific given run-time environment dynamic languages offer eval function function takes string parameter containing code language executes code stands expression resulting value returned however erik meijer peter drayton suggests programmers use eval poor man substitute higher-order functions type object system typically modified runtime dynamic language mean generating new objects runtime definition based mixins existing types objects also refer changing inheritance type tree thus altering way existing types behave especially respect invocation methods reflection common many dynamic languages typically involves analysis types metadata generic polymorphic data however also include full evaluation modification program code data features lisp provides analyzing s-expressions limited number dynamic programming languages provide features combine code introspection ability examine classes functions keywords know know eval feature called macros programmers today aware term macro encountered c c++ static feature built small subset language capable string substitutions text program dynamic languages however provide access inner workings compiler full access interpreter virtual machine runtime allowing definition language-like constructs optimize code modify syntax grammar language assembly c c++ early java fortran generally fit category following examples show dynamic features using language common lisp common lisp object system clos example shows function modified runtime computed source code example shows existing instance changed include new slot class changes existing method replaced new version next example class person gets new superclass print method gets redefined assembles several methods effective method effective method gets assembled based class argument runtime available applicable methods popular dynamic programming languages include javascript python ruby php lua perl following generally considered dynamic languages many use term scripting languages
[ 1445, 4302, 3944, 718, 6428, 3966, 4705, 7557, 3981, 5077, 6497, 6498, 1901, 6507, 1908, 2986, 4758, 6888, 6172, 5117, 3368, 486, 4067, 4070, 4078, 5171, 5173, 5878, 6585, 5190, 3772, 4853, 6980, 8082, 5217, 4864, 8085, 8097, 578, 244, ...
Test
1,103
2
Mac_OS_memory_management:mac os memory management historically classic mac os used form memory management fallen favor modern systems criticism approach one key areas addressed change original problem engineers macintosh make optimum use 128 kb ram machine equipped motorola 68000-based computer hardware support virtual memory since time machine could run one application program time fixed secondary storage engineers implemented simple scheme worked well particular constraints design choice scale well development machine creating various difficulties programmers users primary concern original engineers appears fragmentation repeated allocation deallocation memory pointers leading many small isolated areas memory used small even though total free memory may sufficient satisfy particular request memory solve apple engineers used concept relocatable handle reference memory allowed actual data referred moved without invalidating handle apple scheme simple handle simply pointer non relocatable table pointers turn pointed data memory request required compaction memory done table called master pointer block updated machine implemented two areas memory available scheme system heap used os application heap long one application time run system worked well since entire application heap dissolved application quit fragmentation minimized memory management system weaknesses system heap protected errant applications would possible system architecture supported memory protection frequently cause system problems crashes addition handle-based approach also opened source programming errors pointers data within relocatable blocks could guaranteed remain valid across calls might cause memory move real problem almost every system api existed transparency system-owned data structures time apis could little solve thus onus programmer create pointers least manage carefully dereferencing handles every api call since many programmers generally familiar approach early mac programs suffered frequently faults arising palm os 16-bit windows use similar scheme memory management palm windows versions make programmer error difficult instance mac os convert handle pointer program de-references handle directly handle locked pointer become invalid quickly calls lock unlock handles balanced ten calls hlock undone single call hunlock palm os windows handles opaque type must de-referenced memhandlelock palm os global/locallock windows palm windows application finished handle calls memhandleunlock global/localunlock palm os windows keep lock count blocks three calls memhandlelock block become unlocked three calls memhandleunlock addressing problem nested locks unlocks straightforward although tedious employing various methods intrude upon readability associated code block require awareness discipline part coder awareness discipline also necessary avoid memory leaks failure deallocate within scope allocation avoid references stale handles release usually resulted hard crash—annoying single-tasking system potentially disastrous programs running situation worsened advent switcher way mac 512kb memory run multiple applications necessary step forward users found one-app-at-a-time approach limiting apple committed memory management model well compatibility existing applications forced adopt scheme application allocated heap available ram amount actual ram allocated heap set value coded metadata application set programmer sometimes value n't enough particular kinds work value setting exposed user allow tweak heap size suit requirements popular among power users exposure technical implementation detail grain mac user philosophy apart exposing users esoteric technicalities inefficient since application would made grab allotted ram even left subsequently unused another application might memory starved would unable utilize free memory owned another application application could beneficially utilize sister application heap could certainly destroy typically inadvertently writing nonsense address application accidentally treating fragment text image unassigned location pointer could easily overwrite code data applications even os leaving lurkers even program exited problems could extremely difficult analyze correct switcher evolved multifinder system 4.2 became process manager system 7 scheme long entrenched apple made attempts work around obvious limitations – temporary memory one application could borrow free ram lay outside heap short periods unpopular programmers largely failed solve problems apple system 7 tune-up addon added minimum memory size preferred size—if preferred amount memory available program could launch minimum space possibly reduced functionality incorporated standard os starting system 7.1 still n't address root problem virtual memory schemes made memory available paging unused portions memory disk made available third-party utilities like connectix virtual apple system 7 increased macintosh memory capacity performance cost add protected memory prevent memory manager heap compaction would invalidate pointers originally macintosh 128 kb ram limit 512 kb increased 4 mb upon introduction macintosh plus macintosh computers used 68000 cpu 32-bit processor 24 physical address lines 24 lines allowed processor address 16 mb memory 2 bytes seen sufficient amount time ram limit macintosh design 4 mb ram 4 mb rom structure memory map fixed changing memory map macintosh ii macintosh portable allowing 8 mb ram memory scarce resource authors mac os decided take advantage unused byte address original memory manager advent system 7 placed flags high 8 bits 32-bit pointer handle address contained flags locked purgeable resource stored master pointer table used actual address flags masked ignored cpu good use limited ram space design caused problems apple introduced macintosh ii used 32-bit motorola 68020 cpu 68020 32 physical address lines could address 4 gb 2 bytes memory flags memory manager stored high byte pointer handle significant could lead addressing errors theory architects macintosh system software free change flags high byte scheme avoid problem example macintosh iici later machines hlock apis rewritten implement handle locking way flagging high bits handles many macintosh application programmers great deal macintosh system software code accessed flags directly rather using apis hlock provided manipulate rendered applications incompatible true 32-bit addressing became known 32-bit clean order stop continual system crashes caused issue system 6 earlier running 68020 68030 would force machine 24-bit mode would recognize address first 8 megabytes ram obvious flaw machines whose hardware wired accept 128 mb ram – whose product literature advertised capability system 7 mac system software finally made 32-bit clean still problem dirty roms problem decision use 24-bit 32-bit addressing made early boot process rom routines initialized memory manager set basic mac environment nubus roms disk drivers loaded executed older roms 32-bit memory manager support possible boot 32-bit mode surprisingly first solution flaw published software utility company connectix whose 1991 product mode32 reinitialized memory manager repeated early parts mac boot process allowing system boot 32-bit mode enabling use ram machine apple licensed software connectix later 1991 distributed free macintosh iici later motorola based macintosh computers 32-bit clean roms quite applications updated remove 24-bit dependencies system 7 provided way switch back 24-bit mode application incompatibilities found time migration powerpc system 7.1.2 32-bit cleanliness mandatory creating native applications even later motorola 68040 based macs could support 24-bit mode rise object-oriented languages programming mac – first object pascal later c++ – also caused problems memory model adopted first would seem natural objects would implemented via handles gain advantage relocatable languages originally designed used pointers objects would lead fragmentation issues solution implemented think later symantec compilers use handles internally objects use pointer syntax access seemed good idea first soon deep problems emerged since programmers could tell whether dealing relocatable fixed block way know whether take task locking objects needless say led huge numbers bugs problems early object implementations later compilers attempt used real pointers often implementing memory allocation schemes work around mac os memory model mac os memory model inherent problems remained way right mac os 9 due severe application compatibility constraints increasing availability cheap ram meant large users could upgrade way corner memory n't used efficiently abundant enough issue never became critical ironic given purpose original design maximise use limited amounts memory finally away whole scheme implementing modern sparse virtual memory scheme subset older memory model apis still exist compatibility part carbon map modern memory manager threadsafe malloc implementation underneath apple recommends code use malloc free almost exclusively
[ 8153, 3346, 1069, 5100, 2547, 8066, 1361, 5477, 7814, 3459, 5660, 6814, 405, 502, 3390, 6295, 1670, 1964, 149, 6765, 5079, 5962, 4453, 3412, 3920, 2357 ]
Test
1,104
2
Single-level_store:single-level store single-level storage sls single-level memory computer storage term two meanings two meanings related pages memory may primary storage ram secondary storage disk however current actual physical location page unimportant process originally meant usually called virtual memory introduced 1962 atlas system manchester usually refers organization computing system files persistent objects sometimes called segments mapped processes address spaces consist entirely collection mapped objects entire storage computer thought single two-dimensional plane addresses segment address within segment persistent object concept first introduced multics mid-1960s project shared mit general electric bell labs also implemented virtual memory actual physical implementation including number levels storage types multics instance three levels originally main memory high-speed drum disks sls often associated ibm formerly known i5/os os/400 operating system ibm system although ibm first implemented sls 1978 system/38 control program facility cpf operating system predecessor ibm single-level storage entire storage computer thought single two-dimensional plane addresses pointing pages pages may primary storage ram secondary storage disk however current location address unimportant process operating system takes responsibility locating pages making available processing page primary storage immediately available page disk page fault occurs operating system brings page primary storage explicit i/o secondary storage done processes instead reads secondary storage done result page faults writes secondary storage done pages modified since read secondary storage primary storage written back location secondary storage ibm design single-level storage originally conceived pioneered frank soltis glenn henry late 1970s way build transitional implementation computers 100 solid state memory thinking time disk drives would become obsolete would replaced entirely form solid state memory system/38 designed independent form hardware memory used secondary storage come however solid state memory become exponentially cheaper disk drives also become similarly cheaper thus price ratio favour disk drives continues much higher capacities solid state memory much slower access much less expensive ibm operating system believes access almost unlimited storage array 'real memory i.e. primary storage address translator maps available real memory physical memory residing disk drives either 'spinning solid-state san server v7000 operating system simply places object address memory space os n't know care object physically memory slower disk-storage device licensed internal code atop os runs handles page faults object pages physical memory reading page available page frame primary storage ibm implementation single-level storage page faults divided two categories database faults non-database faults database faults occur page associated relational database object like table view index currently primary storage non-database faults occur type object currently primary storage ibm treats secondary storage single pool data rather collection multiple pools file systems usually done operating systems systems like unix-like systems microsoft windows intentionally scatters pages objects across disks objects stored retrieved much rapidly result ibm server rarely becomes disk bound single-level storage operating systems also allow cpu memory disk resources freely substituted run time smooth performance bottlenecks
[ 1710, 1254, 4759, 8066, 2097, 5571, 6015, 8111, 3905, 1989 ]
Test
1,105
1
Berkeley_DB:berkeley db berkeley db bdb software library intended provide high-performance embedded database key/value data berkeley db written c api bindings c++ c java perl php python ruby smalltalk tcl many programming languages bdb stores arbitrary key/data pairs byte arrays supports multiple data items single key berkeley db relational database bdb support thousands simultaneous threads control concurrent processes manipulating databases large 256 terabytes wide variety operating systems including unix-like windows systems real-time operating systems bdb commercially supported developed sleepycat software 1996 2006 company acquired oracle corporation february 2006 continues develop sell berkeley db oracle stewardship berkeley db become common brand name three distinct products oracle berkeley db berkeley db java edition berkeley db xml three products share common ancestry currently active development berkeley db originated university california berkeley part bsd berkeley version unix operating system 4.3bsd 1986 bsd developers attempted remove replace code originating original unix bsd derived needed rewrite unix database package seltzer yigit created new database unencumbered patents on-disk hash table outperformed existing dbm libraries berkeley db first released 1991 later included 4.4bsd 1996 netscape requested authors berkeley db improve extend library version 1.86 suit netscape requirements ldap server use netscape browser request led creation sleepycat software company acquired oracle corporation february 2006 continues develop sell berkeley db since initial release berkeley db gone various versions major release cycle introduced single new major feature generally layering top earlier features add functionality product 1.x releases focused managing key/value data storage referred data store ds 2.x releases added locking system enabling concurrent access data known concurrent data store cds 3.x releases added logging system transactions recovery called transactional data store tds 4.x releases added ability replicate log records create distributed highly available single-master multi-replica database called high availability ha feature set berkeley db evolution sometimes led minor api changes log format changes rarely database formats changed berkeley db ha supports online upgrades one version next maintaining ability read apply prior release log records freebsd openbsd operating systems continue use berkeley db 1.8x compatibility reasons linux-based operating systems commonly include several versions accommodate applications still using older interfaces/files starting 6.0/12c releases berkeley db products licensed gnu agpl berkeley db je 7.3.7 licensed apache license version 2.0 previously berkeley db redistributed 4-clause bsd license version 2.0 sleepycat public license osi-approved open-source license well fsf-approved free software license product ships complete source code build script test suite documentation code quality general utility along licensing terms led use multitude free open-source software wish abide terms gnu agpl use older version sleepycat public license option purchasing another proprietary license redistribution oracle corporation technique called dual licensing different versions berkeley db db je xml may different licensing terms berkeley db includes compatibility interfaces historic unix database libraries dbm ndbm hsearch system v library creating in-memory hash tables berkeley db architecture notably simpler database systems like relational database management systems example like sqlite provide support network access programs access database using in-process api calls oracle added support sql 11g r2 release based popular sqlite api including version sqlite berkeley db uses berkley db storage third party support pl/sql berkeley db via commercial product named metatranz stepsqlite program accessing database free decide data stored record berkeley db puts constraints record data record key four gigabytes long despite simple architecture berkeley db supports many advanced database features acid transactions fine-grained locking hot backups replication name berkeley db given three different products edition separate database libraries despite common branding first traditional berkeley db written c. contains several database implementations including b-tree one built around extensible hashing supports multiple language bindings including c/c++ java via jni c .net perl python berkeley db java edition je pure java database management library design resembles berkeley db without replicating exactly feature set includes many found traditional berkeley db others specific java edition log structured storage architecture gives different performance concurrency characteristics three apis available direct persistence layer plain old java objects pojo one based java collections framework object persistence approach one based traditional berkeley db api berkeley db java edition high availability option replication available note traditional berkeley db also supports java api via jni thus requires installed native library berkeley db xml database specializes storage xml documents supporting xquery via xqilla implemented additional layer top legacy version berkeley db xerces library db xml written c++ supports multiple language bindings including c++ java via jni perl python berkeley db provides underlying storage retrieval system several ldap servers database systems many proprietary free/open source applications notable software use berkeley db data storage include berkeley db v2.0 higher available dual license
[ 6506, 3683, 7148, 5983, 4759, 1923, 2097, 6260, 901, 6428, 6270, 2390, 4743, 6184, 3863, 1185, 5126, 1006, 5571, 6279, 2118, 486, 6281, 7182, 3463, 3873, 7368, 6367, 1390, 4427, 6029, 6462, 5852, 7468, 418, 1223, 1590, 4444, 4447, 2429, ...
Test
1,106
2
2015_Windows_10_400:2015 windows 10 400 2015 windows 10 400 nascar sprint cup series race held august 2 2015 pocono raceway long pond pennsylvania contested 160 laps 2.5 mile 4 km triangular superspeedway 21st race 2015 nascar sprint cup series season matt kenseth race second season brad keselowski finished second jeff gordon finished third dale earnhardt jr. greg biffle rounded top five kyle busch pole race led 19 laps leading race running fuel final lap finished 21st joey logano led race high 97 laps running fuel three laps go finished 20th race 18 lead changes among 13 different drivers eight caution flag periods 32 laps one red flag period lasted 14 minutes 32 seconds 33rd career victory matt kenseth second season first pocono raceway tenth track joe gibbs racing kenseth left pocono trailing kevin harvick 118–points points standings despite winning manufacturer toyota left pocono trailing chevrolet 75–points manufacturer standings pulled within one–point ford second standings windows 10 400 carried nbc sports cable/satellite nbcsn network american television audience radio broadcast race carried motor racing network sirius xm nascar radio pocono raceway formerly pocono international raceway also known tricky triangle superspeedway located pocono mountains pennsylvania long pond site two annual nascar sprint cup series races held weeks apart june august one nascar camping world truck series event august since 2013 track also host verizon indycar series race pocono one nascar tracks owned either speedway motorsports inc. international speedway corporation dominant track owners nascar run igdalsky siblings brandon nicholas sister ashley cousins joseph iv chase mattioli third-generation members family-owned mattco inc started joseph ii rose mattioli mattco also owns south boston speedway south boston virginia outside nascar races pocono used throughout year sports car club america scca motorcycle clubs well racing schools triangular oval also three separate infield sections racetrack – north course east course south course infield sections use separate portion tri-oval complete track regular non-race weekends multiple clubs use track running different infield sections also infield sections run either direction multiple infield sections put together – running north course south course using tri-oval connect two kevin harvick entered pocono 69-point lead joey logano dale earnhardt jr. entered 100 back jimmie johnson entered 102 back martin truex jr. entered 109 back following axalta paint winners 400 june section tunnel turn – turn 2 – milled leveled repaved done eliminate bumps develop foundation track surface goes tunnel team haulers use get track settles ground entry list windows 10 400 released monday july 27 11:20 a.m. eastern time forty-three drivers entered race entered previous week race indianapolis three driver changes race 33 hillman-circle sport llc chevrolet driven alex kennedy premium motorsports duo swapped rides weekend timmy hill driving 62 chevrolet reed sorenson driving 98 ford brad keselowski fastest first practice session time 50.961 speed kyle busch pole time 50.444 speed “ told fast car ’ sure could get balance right ” busch said winning pole “ crew chief adam stevens guys again. ” “ lot lies putting lap together something ’ done last couple months ” kevin harvick said qualifying second “ feel like good job made good adjustments feel like probably gave little bit turn 1 got little bit tight center corner all-in-all good lap ’ glad ran fastest speed last round do. ” “ bad ” tony stewart said qualifying fifth “ crew chief chad johnston came practice session qualifying showed stuff losing time focused qualifying worked. ” “ pretty good final round quite good enough get pole ” said brad keselowski qualifying ninth “ missing little bit one corners all-in-all good effort fastest car practice feel pretty good similar brickyard really strong needed little win optimistic sure. ” “ really struggled whatever reason turn 1 today ” said martin truex jr. qualifying 13th “ ’ seem get balance right either tight loose matter fought thing big deal though think okay ’ got plenty time figure tomorrow ’ got cars pass 13th bad last week. ” carl edwards fastest second practice session time 51.191 speed kyle busch fastest final practice session time 51.358 speed jeb burton forced go backup car wrecking inside pit road wall change took place qualifying started race rear field race scheduled start 1:46 p.m. started four minutes later kyle busch led field green flag first caution race flew fifth lap kasey kahne got loose frontstretch coming turn 3 slid track slammed inside wall lining pit road almost identical manner happened jeb burton final practice day “ well first ’ believe clear late corner way left heading towards pit wall ” kahne said “ saw people thought guys need take running get way ’ know ’ done anything like kind crazy way happened. ” kahne uninjured released infield care center minutes later car damaged beyond repair finished dead last race red-flagged allow nascar evaluate repair wall 14-minute 43 second delay red flag withdrawn field continued caution race restarted lap 10 second caution race flew lap 16 scheduled competition caution section track washed following previous day arca race cars opted pit kevin harvick assumed race lead a. j. allmendinger tagged uncontrolled tire restarted race tail-end field race restarted lap 20 third caution race flew lap harvick blew engine turn 3 first dnf since last year duck commander 500 texas motor speedway “ coming turn 2 knew issues n't realize going big really proud team harvick said car fast 'll days like race restarted lap 24 fourth caution race flew lap 28 sam hornish jr. cut left-front tire turn 1 got rear-ended ricky stenhouse jr. slammed wall everything happening real fast said stenhouse walked away uninjured saw 9 hornish turn 3 run track thought got loose everything fine getting turn 1 car front ducked last minute 9 sitting got brakes really hard think got splitter could n't go left right ran right good day us guess 9 missed shift something n't aware 35 cole whitt one cars pulled real quick 9 sitting time reacted late ran right back one days hornish said missed shift restart n't good tire come apart got hit deal right busch kurt trying hold saw got straightened back one things everything stops smoking long enough think back control wobbling around unfortunate us sure ... love coming pocono good runs led laps felt like could win races n't us year hopefully n't carry watkins glen next weekend race restarted lap 34 defending pocono winner martin truex jr. front made first stop lap 39 gave lead joey logano jimmie johnson pitted second lap 44 logano ducked onto pit road lap 52 handed lead kyle busch surrendered lead pit next lap handed teammate denny hamlin dale earnhardt jr. tagged speeding pit road forced serve drive-through penalty hamlin pitted lead lap 55 handed brad keselowski pitted lap 57 handed lead jeff gordon 2 tagged uncontrolled tire colliding tire carrier forced serve drive-through penalty gordon pitted lap 59 handed lead danica patrick uncontrolled tire 2 pit stall brought fifth caution race lap 62 pitted caution lead cycled back joey logano jeb burton tagged speeding pit road restarted race tail-end field race restarted lap 66 sixth caution race flew lap kurt busch got turned paul menard t-boned sam hornish jr race restarted lap 72 seventh caution race flew lap dale earnhardt jr. made contact cole whitt turn 1 went spinning race restarted lap 76 busch pitted second lap 88 started round green flag stops logano pitted next lap gave lead matt kenseth gave lead pit next lap handed kyle larson eighth caution race flew lap 91 alex kennedy backed wall turn 1 clint bowyer caught caution pitted pit road closed result restarted race tail-end field larson pitted caution handed lead joey logano race restarted lap 98 field settled green flag run lap 123 joey logano surrendered lead pit handed lead denny hamlin pitted next lap handed lead david ragan ducked onto pit road 35 laps go handed lead greg biffle brett moffitt tagged speeding pit road forced serve drive-through penalty biffle hit pit road 34 laps go handed lead jeff gordon casey mears tagged many men wall forced serve drive-through penalty gordon surrendered lead pit 33 laps go lead cycled back joey logano logano maintained one-second lead kyle busch ten laps go chance short fuel ultimately ran fuel long pond straightaway three go busch took lead lap later truex ran fuel well last lap busch ran fuel front–stretch passed matt kenseth – taken white flag 15 seconds behind busch – turn 2 went take checkered flag “ feels good get one today ” said kenseth “ ’ nothing like wins never thought ’ ever win pocono never thought ’ win fuel mileage race today. ” “ guess numbers crew chief todd gordon said good enough make half lap ” said joey logano running gas finishing 20th “ saving fuel cushion thought going good started running knew ’ going make tough everything right today. ” running tire carrier lap 57 serving drive–through penalty uncontrolled tire sent back 37th brad keselowski rallied back runner–up finish fuel came play end able take care bring home second respectable day keselowski said certainly going finish without fuel sometimes works think teammate team phenomenal job heartbroken win race jeff gordon running 16th four laps go took advantage cars running fuel finish third – matching best finish season – 46th final career start pocono raceway thought trying get maybe 10th 12th sudden said 'you 're third think probably shocked person racetrack found gordon said race knew cars peeling n't realize many either running coming pit road teammate dale earnhardt jr. 17th four go rallied fourth-place finish 've got work harder said car n't good weekend corner lot balance issues never really cured held us n't good earlier year still top-10 top-five car barely top-five car thought good enough car win came earlier summer lost little balance nbc sports covered race television side rick allen jeff burton steve letarte call booth race dave burns mike massaro marty snider kelli stavast handled pit road television side mrn radio call race simulcast sirius xm nascar radio joe moore jeff striegle four time pocono winner rusty wallace called race booth field racing front stretch dave moody called race billboard outside turn 1 field racing turn 1 mike bagley called race billboard outside turn 2 field racing turn 2 kyle rickey called race billboard outside turn 3 field racing turn 3 woody cain glenn jarrett steve post worked pit road radio side
[]
Validation
1,107
3
SunPCi:sunpci sunpci series single board computers pci connector adds hardware enables sun workstations act 'pc compatible computer includes x86 processor ram expansion ports onboard graphics controller allowing complete x86 operating environments sun workstations present incarnation sunpci iiipro based mobile 1.6-ghz amd athlon xp 2100+ processor cards successor sunpc series sbus cards sun pci iipro currently supported solaris 7 8 9 using tricks work solaris 10 sun pci iii iiipro supported solaris 9 10 appropriate updates recent opensolaris releases
[ 5587, 3673, 352 ]
Validation
1,108
7
Mobile_cloud_computing:mobile cloud computing mobile cloud computing mcc combination cloud computing mobile computing wireless networks bring rich computational resources mobile users network operators well cloud computing providers ultimate goal mcc enable execution rich mobile applications plethora mobile devices rich user experience mcc provides business opportunities mobile network operators well cloud providers comprehensively mcc defined rich mobile computing technology leverages unified elastic resources varied clouds network technologies toward unrestricted functionality storage mobility serve multitude mobile devices anywhere anytime channel ethernet internet regardless heterogeneous environments platforms based pay-as-you-use principle mcc uses computational augmentation approaches computations executed remotely instead device resource-constraint mobile devices utilize computational resources varied cloud-based resources mcc four types cloud-based resources namely distant immobile clouds proximate immobile computing entities proximate mobile computing entities hybrid combination three model giant clouds amazon ec2 distant immobile groups whereas cloudlet surrogates member 9apps proximate immobile computing entities smartphones tablets handheld devices wearable computing devices part third group cloud-based resources proximate mobile computing entities vodafone orange verizon started offer cloud computing services companies mcc landscape amalgam mobile computing cloud computing communication networks augment smartphones creates several complex challenges mobile computation offloading seamless connectivity long wan latency mobility management context-processing energy constraint vendor/data lock-in security privacy elasticity hinder mcc success adoption although significant research development mcc available literature efforts following domains still lacking several academic industrial research groups mcc emerging since last years mcc research groups academia large number researchers publications include cloud computing mobail network
[ 2961, 4610, 5236, 3933, 2, 2564, 6515, 1582, 4101, 2240, 740, 4400, 7956 ]
Test
1,109
2
Home_screen:home screen home screen homescreen start screen main screen mobile operating system computer program home screens identical users rearrange icons please home screens often differ across mobile operating systems almost every smartphone form home screen typically displays links applications settings notifications home screens usually consist grid application links shortcuts often arranged multiple pages serve user main method accessing phone functions home screens also tend include dock along edge screen application links stored accessed page home screen operating systems allow users add folders home screen order organize application links home screens may also include pane push notifications displayed select system settings accessed addition applications links many home screens also capable displaying ambient information live tiles windows phone widgets android tiles widgets may link applications however differ traditional links show current dynamic information instead static icon however increased relevance information come cost device battery life bandwidth ease recognition afforded static application icons although home screens similar structure designed common two notable examples less-common home screens paradigms include siri webos former apple natural language user interface performs functions similar traditional home screens opening applications displaying relevant data managing phone settings latter notable use entirely dynamic application icons mimic current state application similar task managers mobile operating systems although mobile operating systems include default home screen devices also allow user replace native home screen different application third-party home screen allowing additional home screen paradigms one first examples home screen found palmpilot debuted 1997 early home screens often less customizable current iterations example early versions ios allow users rearrange applications home screen change background image home screens often serve main method interacting mobile operating systems tend change slowly across updates operating system
[ 2017, 4186, 5612, 1582, 740 ]
Test
1,110
3
Samsung_DP900:samsung dp900 dp900a7a-s01 all-in-one desktop computer 27 3d display developed samsung samsung dp900 features intel core i7-2600s 2.8 ghz cpu 8 gb ddr3 ram 1 tb sata 7200rpm hdd blu-ray/dvd combo drive wireless keyboard mouse 27 3d led display 16:9 widescreen aspect ratio full hd resolution 1920 x 1080 high quality sound optimized jbl graphics card amd radeon hd 6730m dp900 several ports including headphone microphone 4 usb 2.0 2 usb 3.0 ports multicard slot antenna hdmi lan port computer also supports wi-fi ieee 802.11b ieee 802.11g ieee 802.11n bluetooth dp900 released 64-bit windows 7 home premium operating system
[ 5571 ]
Test
1,111
8
ProBiS:probis probis computer software allows prediction binding sites corresponding ligands given protein structure initially probis developed probis algorithm janez konc dušanka janežič 2010 available probis server probis charmming server probis algorithm probis plugin name probis originates purpose software predict given protein structure binding sites corresponding ligands probis software started probis algorithm detects structurally similar sites protein surfaces local surface structure alignment using fast maximum clique algorithm probis algorithm followed probis server provides access program probis detects protein binding sites based local structural alignments two probis servers available probis server probis charmming server latter connects probis charmming servers one functional unit enables prediction protein−ligand complexes allows geometry optimization interaction energy calculation probis charmming server additional functions used national institutes health usa otherwise acts regular probis server additionally probis pymol plugin probis ucsf chimera plugin made plugins connected via internet newly prepared database pre-calculated binding site comparisons allow fast prediction binding sites existing proteins protein data bank enable viewing predicted binding sites ligands poses three-dimensional graphics
[ 6029, 5571, 2054 ]
Test
1,112
3
Tandem_Computers:tandem computers tandem computers inc. dominant manufacturer fault-tolerant computer systems atm networks banks stock exchanges telephone switching centers similar commercial transaction processing applications requiring maximum uptime zero data loss company founded jimmy treybig 1974 cupertino california remained independent 1997 became server division within compaq server division within hewlett packard enterprise following hewlett-packard acquisition compaq split hewlett packard hp inc. hewlett packard enterprise tandem nonstop systems use number independent identical processors redundant storage devices controllers provide automatic high-speed failover case hardware software failure contain scope failures corrupted data multi-computer systems shared central components even main memory conventional multi-computer systems use shared memories work directly shared data objects instead nonstop processors cooperate exchanging messages across reliable fabric software takes periodic snapshots possible rollback program memory state besides handling failures well shared-nothing messaging system design also scales extremely well largest commercial workloads doubling total number processors would double system throughput maximum configuration 4000 processors contrast performance conventional multiprocessor systems limited speed shared memory bus switch adding 4–8 processors manner gives system speedup nonstop systems often bought meet scaling requirements extreme fault tolerance compete well ibm largest mainframes despite built simpler minicomputer technology tandem computers founded 1974 james jimmy treybig treybig first saw market need fault tolerance oltp online transaction processing systems running marketing team hewlett packard hp 3000 computer division hp interested developing niche joined venture capital firm kleiner perkins developed tandem business plan treybig pulled together core engineering team hired away hp 3000 division mike green jim katzman dave mackie jack loustaunou business plan called ultra-reliable systems never outages never lost corrupted data modular new way safe single-point failures yet would marginally expensive conventional non-fault-tolerant systems would less expensive support throughput existing ad-hoc toughened systems used redundant usually required hot spares engineer confident could quickly pull part tricky new design doubted others areas could worked parts hardware software design different largely based incremental improvements familiar hardware software designs hp 3000 many subsequent engineers programmers also came hp tandem headquarters cupertino california quarter mile away hp offices initial venture capital investment tandem computers came tom perkins formerly general manager hp 3000 division business plan included detailed ideas building unique corporate culture reflecting treybig values design initial tandem/16 hardware completed 1975 first system shipped citibank may 1976 company enjoyed uninterrupted exponential growth 1983 inc. magazine ranked tandem fastest-growing public company america 40 years tandem main nonstop product line grown evolved upward-compatible way initial t/16 fault-tolerant system three major changes date top-level modular architecture programming-level instruction set architecture within series several major re-implementations chip technology progressed conventional systems era including large mainframes mean-time-between-failures mtbf order days nonstop system designed failure intervals 100 times longer uptimes measured years nevertheless nonstop designed price-competitive conventional systems simple 2-cpu system priced twice competing single-processor mainframe opposed four times fault-tolerant solutions first system tandem/16 t/16 later re-branded nonstop machine consisted two 16 cpus organized fault-tolerant computer cluster packaged single rack cpu private unshared memory i/o processor private i/o bus connect i/o controllers dual connections cpus custom inter-cpu backplane bus called dynabus disk controller network controller duplicated dual connections cpus devices disk mirrored separate connections two independent disk controllers disk failed data still available mirrored copy cpu controller bus failed disk still reachable alternative cpu controller and/or bus disk network controller connected two independent cpus power supplies wired one side pair cpus controllers buses system would keep running well without loss connections one power supply failed careful complex arrangement parts connections customers larger configurations documented mackie diagram named lead salesman david mackie invented notation none duplicated parts wasted hot spares everything added system throughput normal operations besides recovering well failed parts t/16 also designed detect many kinds intermittent failures possible soon possible prompt detection called fail fast point find isolate corrupted data permanently written databases disk files t/16 error detection added custom circuits added little cost total design major parts duplicated get error detection t/16 cpu proprietary design greatly influenced hp 3000 minicomputer microprogrammed 16-bit stack-based machines segmented 16-bit virtual addressing intended programmed exclusively high-level languages use assembler initially implemented via standard low-density ttl chips holding 4-bit slice 16-bit alu small number top-of-stack 16-bit data registers plus extra address registers accessing memory stack used huffman encoding operand address offsets fit large variety address modes offset sizes 16-bit instruction format good code density relied heavily pools indirect addresses overcome short instruction format supported larger 32- 64-bit operands via multiple alu cycles memory-to-memory string operations used big-endian addressing long versus short memory operands features inspired burroughs b5500-b6800 mainframe stack machines t/16 instruction set changed several features hp 3000 design t/16 supported paged virtual memory beginning hp 3000 series add paging pa-risc generation 10 years later although mpe v form paging via apl firmware 1978 tandem added support 32-bit addressing second machine hp 3000 lacked pa-risc generation paging long addresses critical supporting complex system software large applications t/16 treated top-of-stack registers novel way compiler microcode responsible deciding full registers spilled memory stack empty registers re-filled memory stack hp 3000 decision took extra microcode cycles every instruction hp 3000 supported cobol several instructions calculating directly arbitrary-length bcd binary-coded decimal strings digits t/16 simplified single instructions converting bcd strings 64-bit binary integers t/16 cpu consisted two boards ttl logic srams ran 0.7 mips instant could access four virtual memory segments system data system code user data user code limited 128 kb size 16-bit address spaces already small major applications shipped first release t/16 single programming language transaction application language tal efficient machine-dependent systems programming language operating systems compilers etc could also used non-portable applications derived hp 3000 system programming language spl semantics similar c syntax based burroughs algol subsequent releases added support cobol74 fortran mumps tandem nonstop series ran custom operating system significantly different unix hp 3000 mpe initially called t/tos tandem transactional operating system soon named guardian ability protect data machine faults software faults contrast commercial operating systems guardian based message passing basic way processes interact without shared memory regardless processes running approach easily scaled multiple-computer clusters helped isolate corrupted data propagated file system processes transactional application processes structured master/slave pairs processes running separate cpus slave process periodically took snapshots master memory state took workload master process ran trouble allowed application survive failures cpu associated devices without data loss allowed recovery intermittent-style software failures failures monitoring slave process added performance overhead far less 100 duplication system designs major early applications directly coded checkpoint style instead used various tandem software layers hid details semi-portable way 1981 t/16 cpus replaced nonstop ii main difference t/16 support occasional 32-bit addressing via user-switchable extended data segment supported next ten years growth software huge advantage t/16 hp 3000 unfortunately visible registers remained 16-bit unplanned addition instruction set required executing many instructions per memory reference compared 32-bit minicomputers subsequent tns computers hampered instruction set inefficiency also nonstop ii lacked wider internal data paths required additional microcode steps 32-bit addresses nonstop ii cpu three boards using chips design similar t/16 nonstop ii also replaced core memory battery-backed dram memory 1983 nonstop txp cpu first entirely new implementation tns instruction set architecture built standard ttl chips programmed array logic chips four boards per cpu module tandem first use cache memory direct implementation 32-bit addressing still sent 16-bit adders wider microcode store allowed major reduction cycles executed per instruction speed increased 2.0 mips used rack packaging controllers backplane buses dynabus i/o buses overdesigned t/16 would work several generations upgrades 14 txp nonstop ii systems could combined via fox long-distance fault-tolerant fibre optic bus connecting tns clusters across business campus cluster clusters total 224 cpus allowed scale-up taking largest mainframe applications like cpu modules within computers guardian could failover entire task sets machines network worldwide clusters 4000 cpus could also built via conventional long-haul network links 1986 tandem introduced third generation cpu nonstop vlx 32-bit datapaths wider microcode 12 mhz cycle time peak rate one instruction per microcycle built three boards ecl gate array chips ttl pinout revised dynabus speed raised 20 mbytes/sec per link 40 mbytes/sec total fox ii increased physical diameter tns clusters 4 kilometers tandem initial database support hierarchical non-relational databases via enscribe file system extended relational database called encompass 1986 tandem introduced first fault-tolerant sql database nonstop sql developed totally in-house nonstop sql includes number features based guardian ensure data validity across nodes nonstop sql famous scaling linearly performance number nodes added system whereas databases performance plateaued quite quickly often two cpus later version released 1989 added transactions could spread nodes feature remained unique time nonstop sql continued evolve first sql/mp sql/mx transitioned tandem compaq hp code remains use hp sql/mx apache trafodion incubating project 1987 tandem introduced nonstop clx low-cost less-expandable minicomputer system role growing low end fault-tolerant market deploying remote edges large tandem networks initial performance roughly similar txp later versions 20 slower vlx small cabinet could installed copier room office environment clx cpu one board containing six compiled silicon asic cmos chips cpu core chip duplicated lock stepped maximal error detection pinout main limitation chip technology microcode cache tlb external cpu core shared single bus single sram memory bank result clx required least two machine cycles per instruction 1989 tandem introduced nonstop cyclone fast expensive system mainframe end market self-checking cpu took three boards full hot-running ecl gate array chips plus memory boards despite microprogrammed cpu superscalar often completing two instructions per cache cycle accomplished separate microcode routine every common pair instructions fused pair stack instructions generally accomplished work single instruction normal 32-bit minicomputers cyclone processors packaged sections four cpus sections joined fiber optic version dynabus like tandem prior high end machines cyclone cabinets styled lots angular black suggest strength power advertising videos directly compared cyclone sr-71 blackbird mach 3 spy plane cyclone name supposed represent unstoppable speed roaring oltp workloads announcement day october 17 press came town afternoon region struck magnitude 6.9 loma prieta earthquake causing freeway collapses oakland major fires san francisco tandem offices shaken one badly hurt site first last time tandem named products natural disaster 1980–1983 tandem attempted re-design entire hardware software stack put nonstop methods stronger foundation inherited hp 3000 traits rainbow hardware 32-bit register-file machine aimed better vax reliable programming main programming language tpl subset ada time people barely understood compile ada unoptimized code migration path existing nonstop system software coded tal os database cobol compilers entirely redesigned customers would see totally disjoint product line requiring all-new software software side ambitious project took much longer planned hardware already obsolete out-performed txp software ready rainbow project abandoned subsequent efforts emphasized upward compatibility easy migration paths development rainbow advanced client/server application development framework called crystal continued awhile longer spun ellipse product cooperative systems inc 1985 tandem attempted grab piece rapidly growing personal computer market introduction ms-dos based dynamite pc/workstation sadly numerous design compromises including unique 8086-based hardware platform incompatible expansion cards day extremely limited compatibility ibm-based pcs relegated dynamite serving primarily smart terminal quietly quickly withdrawn market tandem message-based nonstop operating system advantages scaling extreme reliability efficiently using expensive spare resources many potential customers wanted good-enough reliability small system using familiar unix operating system industry-standard programs tandem various fault-tolerant competitors adopted simpler hardware-only memory-centric design recovery done switching hot spares successful competitor stratus technologies whose machines re-marketed ibm ibm system/88 systems spare processors contribute system throughput failures merely redundantly execute exactly data thread active processor instant lock step faults detected seeing cloned processors outputs diverged detect failures system must two physical processors logical active processor also implement automatic failover recovery system must three four physical processors logical processor triple quadruple cost sparing practical duplicated parts commodity single-chip microprocessors tandem products market began integrity line 1989 using mips processors nonstop ux variant unix developed austin tx 1991 integrity s2 used tmr triple modular redundancy logical cpu used three mips r2000 microprocessors execute data thread voting find lock failed part fast clocks could synchronized strict lock stepping voting instead happened interrupt version integrity used 4x pair spares redundancy pairs processors ran lock-step check disagreed processors marked untrusted workload taken hot-spare pair processors whose state already current 1995 integrity s4000 first use servernet moved toward sharing peripherals nonstop line 1995–1997 tandem partnered microsoft implement high-availability features advanced sql configurations clusters commodity windows nt machines project called wolfpack first shipped microsoft cluster server 1997 microsoft benefited greatly partnership tandem tandem formed 1974 every computer company design build cpus basic circuits using proprietary instruction set compilers etc year semiconductor progress moore law cpu core circuits could fit single chips run faster much cheaper result became increasingly expensive computer company design advanced custom chips build plants fabricate chips 1991 biggest companies could continue design build competitive cpus tandem big enough needed move nonstop product line customer base onto advanced microprocessor chip set designed built others hp hp 3000 division similar roadmap problems found clever way forward 1986 hp labs designed pa-risc computer core stripped non-essentials could soon fit one chip efficiently pipelined ran even faster ecl mainframes time many times faster microprogrammed cmos stack machines rest hp designing migrate vendor customer third-party software existing product lines software portable could directly recompiled new instruction set software easily recompiled hp labs invented efficient ways run old binaries software new machine emulation automatic translation binary object code told everyone similar object code translation techniques subsequently used apple computers move macintosh software m68000 machines powerpc machines digital equipment corporation move vms users vaxes alpha machines one flaw hp 3000 migration plan hp also ambitiously tried rewrite entire mpe operating system new language time n't plan use emulation techniques primary code rewrite native mode took years longer complete expected hp first generation risc hardware already obsolete mpe software ready release tandem learned mistake tandem could use hp pa-risc sun sparc cpus business reasons instead tandem partnered mips adopted r3000 successor chipsets advanced optimizing compiler subsequent nonstop guardian machines using mips architecture known programmers tns/r machines variety marketing names 1991 tandem released cyclone/r also known clx/r low cost mid-range system based clx components used r3000 microprocessors instead much slower clx stack machine board minimize time market machine initially shipped without mips native-mode software everything including nsk operating system sql database compiled tns stack machine code object code translated equivalent partially optimized mips instruction sequences kernel install time tool called accelerator less-important programs could also executed directly without pre-translation via tns code interpreter migration techniques successful still use today everyone software brought without extra work performance good enough mid-range machines programmers could ignore instruction differences even debugging machine code level cyclone/r machines updated faster native-mode nsk follow-up release r3000 later microprocessors typical amount internal error checking insufficient tandem needs cyclone/r ran pairs r3000 processors lock step running data thread used curious variation lock stepping checker processor ran 1 cycle behind primary processor allowed share single copy external code data caches without putting excessive pinout load sysbus lowering system clock rate successfully run microprocessors lock step chips must designed fully deterministic hidden internal state must cleared chip reset mechanism otherwise matched chips sometimes get sync visible reason without faults long chips restarted chip designers agree good principles helps test chips manufacturing time new microprocessor chips seemed bugs area required months shared work mips tandem eliminate work around final subtle bugs 1993 tandem released nonstop himalaya k-series faster mips r4400 native mode nsk fully expandable cyclone system components still connected dynabus dynabus+ original i/o bus running performance headroom 1994 nonstop kernel extended unix-like posix environment called open system services original guardian shell abi remained available 1997 tandem introduced nonstop himalaya s-series new top-level system architecture based servernet connections servernet replaced obsolete dynabus fox i/o buses much faster general could extended two-way redundancy via arbitrary fabric point-to-point connections tandem designed servernet needs promoted use others evolved infiniband industry standard s-series machines used mips processors including r4400 r10000 r12000 r14000 design later faster mips cores primarily funded silicon graphics inc intel pentium pro overtook performance risc designs also sgi graphics business shrunk r10000 investment significant new mips core designs high-end servers tandem needed eventually move nonstop product line yet onto microprocessor architecture competitive fast chips jimmy treybig remained ceo company founded downturn 1996 next ceo roel pieper joined company 1996 president ceo re-branding promote true wintel windows/intel platform conducted in-house brand creative team led ronald may later went co-found silicon valley brand forum 1999 concept worked shortly thereafter company acquired compaq compaq x86-based server division early outside adopter tandem servernet/infiniband interconnect technology 1997 compaq acquired tandem computers company nonstop customer base balance compaq heavy focus low-end pcs 1998 compaq also acquired much larger digital equipment corporation inherited dec alpha risc servers openvms tru64 unix customer bases tandem midway porting nonstop product line mips r12000 microprocessors intel new itanium merced microprocessors project restarted alpha new target align nonstop compaq large server lines 2001 compaq terminated alpha engineering investments favor itanium microprocessors 2001 hewlett packard similarly made choice abdicate successful pa-risc product lines favor intel itanium microprocessors hp helped design shortly thereafter compaq hp announced plan merge consolidate similar product lines contentious merger became official may 2002 consolidations painful destroyed dec hp way engineer-oriented cultures combined company know sell complex systems enterprises profit improvement surviving nonstop division customers ways tandem journey hp-inspired start-up hp-inspired competitor hp division bringing tandem back original roots definitely hp re-port nsk-based nonstop product line mips processors itanium-based processors finally completed branded hp integrity nonstop servers nsk integrity nonstop unrelated tandem original integrity series unix possible run itanium mckinley chips clock-level lock stepping integrity nonstop machines instead use comparisons chip states longer time scales interrupt points various software sync points interrupts intermediate sync points automatically triggered every n'th taken branch instruction also explicitly inserted long loop bodies nonstop compilers machine design supports dual triple redundancy either two three physical microprocessors per logical itanium processor triple version sold customers needing utmost reliability new checking approach called nsaa nonstop advanced architecture earlier migration stack machines mips microprocessors customer software carried forward without source changes native mode source code compiled directly mips machine code simply recompiled itanium older non native software still tns stack machine form automatically ported onto itanium via object code translation techniques people working tandem/hp long history porting kernel onto new hardware latest endeavor move itanium intel x86 architecture completed 2014 first systems already commercially available inclusion fault-tolerant 4x fdr fourteen data rate infiniband double-wide switches provides 25 times increase system interconnect capacity responding business growth nsk guardian also became base hp neoview os operating system used hp neoview systems tailored use business intelligence enterprise data warehouse use nonstop sql/mx also starting point neoview sql tailored business intelligence use code also ported linux served basis apache trafodion project
[ 5012, 3764, 4387, 3849, 1727, 4670, 3951, 4946, 5735, 1180, 5738, 5571, 7990, 1015, 5055, 7010, 2226, 6462, 6748, 6380, 3396, 8117, 5447, 5772, 336, 1134, 4365, 4368, 4370, 4195, 6236, 3156, 971, 2803, 2442, 4747, 879 ]
Test
1,113
9
Dvips:dvips dvips computer program converts device independent file format dvi output tex typography printable otherwise presentable form dvips written tomas rokicki produce printable postscript files dvi input commonly used general dvi conversion tex typesetting system outputs dvi files intended independent output device particular understood printers lack information font shapes thus converter i.e. backend needed translate dvi file printer language although dvi backends dvilj exist dvips stated earlier one common ways printing dvi files another recent solution use pdftex directly generate pdf files readers platforms given importance dvips standard part tex distributions tetex tex live using tex codice_1 commands possible directly insert literal postscript dvi file snippets postscript appear final file generated dvips flexibility allows user include say watermarks document especially via use proper packages postprocess postscript file producing postscript files dvips embeds fonts inside file recent distributions normally embed scalable fonts also known type 1 fonts files generated older distributions however may embed raster fonts substitute raster scalable fonts postscript file situation original dvi file unavailable use utility called pkfix
[ 6016, 4881 ]
Test
1,114
9
ALGOL_60:algol 60 algol 60 short algorithmic language 1960 member algol family computer programming languages followed algol 58 introduced code blocks codice_1 codice_2 pairs delimiting algol 60 first language implementing nested function definitions lexical scope gave rise many programming languages including cpl simula bcpl b pascal c. niklaus wirth based algol w algol 60 moving develop pascal algol-w intended next generation algol algol 68 committee decided design complex advanced rather cleaned simplified algol 60 official algol versions named year first published algol 68 substantially different algol 60 criticised partially general algol refers dialects algol 60 algol 60 — cobol — first languages seek standardization algol 60 used mostly research computer scientists united states europe use commercial applications hindered absence standard input/output facilities description lack interest language large computer vendors algol 60 however become standard publication algorithms profound effect future language development john backus developed backus normal form method describing programming languages specifically algol 58 revised expanded peter naur algol 60 donald knuth suggestion renamed backus–naur form peter naur editor algol bulletin drawn international discussions language selected member european language design group november 1959 capacity editor algol 60 report produced result algol 60 meeting paris january 1960 following people attended meeting paris january 11 16 alan perlis gave vivid description meeting meetings exhausting interminable exhilarating one became aggravated one good ideas discarded along bad ones others nevertheless diligence persisted entire period chemistry 13 excellent language originally include recursion inserted specification last minute wishes committee algol 60 inspired many languages followed tony hoare remarked language far ahead time improvement predecessors also nearly successors scheme programming language variant lisp adopted block structure lexical scope algol also adopted wording revised report algorithmic language scheme standards documents homage algol date least 70 augmentations extensions derivations sublanguages algol 60 burroughs dialects included special system programming dialects espol newp algol 60 officially defined i/o facilities implementations defined ways rarely compatible contrast algol 68 offered extensive library transput algol 68 parlance input/output facilities algol 60 allowed two evaluation strategies parameter passing common call-by-value call-by-name call-by-name certain effects contrast call-by-reference example without specifying parameters value reference impossible develop procedure swap values two parameters actual parameters passed integer variable array indexed integer variable think passing pointer swap function every time swap referenced reevaluated say 1 2 every time swap referenced 'll return combination values 1,2 2,1 1,2 similar situation occurs random function passed actual argument call-by-name known many compiler designers interesting thunks used implement donald knuth devised man boy test separate compilers correctly implemented recursion non-local references test contains example call-by-name 35 reserved words standard burroughs large systems sub-language 71 restricted identifiers standard burroughs large systems sub-language also names intrinsic functions procedure absmax size n result subscripts k implementations differ text bold must written word 'integer including quotation marks must used implementations place integer thereby designating special keyword following example produce table using elliott 803 algol since algol 60 i/o facilities portable hello world program algol following program could still compile run algol implementation unisys a-series mainframe straightforward simplification code taken language guide university michigan-dearborn computer information science department hello world algol example program page simpler program using inline format even simpler program using display statement alternative example using elliott algol i/o follows elliott algol used different characters open-string-quote close-string-quote represented ‘ ’ version elliott 803 algol a104 standard elliott 803 used 5 hole paper tape thus upper case code lacked quote characters £ uk pound sign used open quote question mark close quote special sequences placed double quotes e.g ££l produced new line teleprinter ict 1900 series algol i/o version allowed input paper tape punched card paper tape 'full mode allowed lower case output line printer note use
[ 3252, 3944, 3620, 6428, 2214, 737, 6466, 3990, 7204, 5424, 6485, 6497, 6507, 1157, 1158, 6172, 4039, 2641, 1543, 7255, 1180, 4053, 2661, 6208, 5855, 5510, 8032, 1600, 3437, 7333, 7721, 6275, 6277, 7732, 920, 4152, 7005, 5583, 4884, 7375, ...
Test
1,115
7
Oracle_Enterprise_Resource_Planning_Cloud:oracle enterprise resource planning cloud oracle enterprise resource planning cloud cloud-based software application suite introduced oracle corporation 2012 oracle erp cloud manages enterprise functions including accounting financial management project management procurement oracle erp cloud end-to-end software service suite manages enterprise operations suite runs oracle technology stack oracle ’ cloud centers oracle erp cloud accessible public private cloud implementation supports hybrid deployment oracle supplies updates oracle erp cloud least twice annually according company ’ website seven different software modules make oracle erp cloud suite march 2017 oracle erp cloud received hipaa certification software suite designed support international enterprise functions includes multi-gaap multi-currency multi-language multi-subsidiary capabilities oracle erp cloud based originally oracle fusion applications oracle ’ enterprise resource planning software suite developed oracle fusion architecture oracle fusion middleware released 2011 june 2012 oracle cto chairman board larry ellison announced oracle erp cloud application suite part oracle cloud company ’ broad set cloud-based applications oracle announced preview availability oracle erp cloud oracle openworld 2012 october 2015 company reported oracle erp cloud surpassed 1,300 customers august 2 2017 oracle announced release 13 oracle erp cloud 2017 oracle ceo safra catz announced availability oracle erp cloud india assist country preparation goods services tax reforms march 2017 oracle reported oracle erp cloud grown 280 fiscal quarter 3 september 2017 reported oracle ’ cloud erp business grew 156 first quarter 2017-18 reached annual run rate 1.2 billion oracle erp cloud available north america south america asia emea regions oracle offers certifications software service saas specializations oracle erp cloud oracle financials cloud oracle procurement cloud oracle project portfolio management cloud oracle risk management cloud oracle openworld annual technology conference hosted oracle featured announcements updates oracle erp cloud collaborate annual technology forum hosted independent oracle users groups including international oracle users group ioug oracle applications users group oaug quest oracle community provides training oracle products including oracle erp cloud 2017 oracle erp cloud listed leader gartner ’ “ magic quadrant cloud core financial management suites midsize large global enterprises. ” product positioned highest completeness vision ability execute
[ 2961, 2965, 7766, 7332, 330, 5908, 7368 ]
Test
1,116
9
Guy_L._Steele_Jr.:guy l. steele jr guy lewis steele jr. born october 2 1954 american computer scientist played important role designing documenting several computer programming languages technical standards steele born missouri graduated boston latin school 1972 received bachelor arts b.a applied mathematics harvard university 1975 master degree m.s doctor philosophy ph.d. massachusetts institute technology mit computer science 1977 1980 worked assistant professor computer science carnegie mellon university compiler implementer tartan laboratories joined supercomputer company thinking machines helped define promote parallel computing version programming language named lisp named *lisp star lisp parallel version language c named c* 1994 steele joined sun microsystems invited bill joy become member java team language designed since track record writing good specifications extant languages named sun fellow 2003 steele joined oracle 2010 oracle acquired sun microsystems mit steele published two dozen papers gerald jay sussman subject language lisp implementation lambda papers one notable contributions design language scheme steele also designed original command set emacs first port tex waits published papers subjects including compilers parallel processing constraint languages one song composed published official journal association computing machinery communications acm cacm telnet song april 1984 parody behavior series pdp-10 telnet implementations written mark crispin steele served accredited technical standards committees including ecma international formerly european computer manufacturers association ecma tc39 language ecmascript editor first edition x3j11 c x3j3 fortran chairman x3j13 common lisp also member institute electrical electronics engineers ieee working group produced ieee standard language scheme ieee std 1178-1990 represented sun microsystems high performance fortran forum produced high performance fortran specification may 1993 addition specifications language java steele work sun microsystems included research parallel algorithms implementation strategies architecture software support 2005 steele began leading team researchers sun developing new language named fortress high-performance language designed obsolete fortran 1982 steele edited hacker dictionary harper row 1983 print version jargon file steele samuel p. harbison wrote c reference manual prentice-hall 1984 provide precise description language c tartan laboratories trying implement wide range systems authors participated american national standards institute ansi c standardization process several revisions book issued reflect new standard 16 march 1984 steele published common lisp language digital press 465 pages first edition original specification common lisp cltl1 served basis ansi standard steele released greatly expanded second edition 1990 1029 pages documented near-final version ansi standard steele along charles h. koelbel david b. loveman robert s. schreiber mary e. zosel wrote high performance fortran handbook mit press 1994 steele also coauthored three editions java language specification addison-wesley third ed 2005 james gosling bill joy gilad bracha steele received acm grace murray hopper award 1988 named acm fellow 1994 member national academy engineering united states america 2001 fellow american academy arts sciences 2002 received dr. dobb excellence programming award 2005 steele modern western square dancer caller mainstream c3a member tech squares member callerlab pseudonym great quux old student nickname boston latin school mit published light verse crunchly cartoons latter appeared new hacker dictionary also used initialism gls 1998 steele solved game teeko via computer showing must occur players play wisely found neither player force win steele also showed advanced teeko variant win black assuming perfect play one variant fourteen variants draws
[ 7878, 1445, 4302, 1820, 5019, 6796, 6087, 2915, 5734, 1478, 4332, 2218, 4704, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 2249, 1889, 1890, 4737, 785, 795, 6876, 2638, 6172, 6888, 3370, 1557, 6191, 5494, 2315, 5501, 6210, 144, 4074, ...
Test
1,117
2
Input–output_memory_management_unit:input–output memory management unit computing input–output memory management unit iommu memory management unit mmu connects direct-memory-access–capable dma-capable i/o bus main memory like traditional mmu translates cpu-visible virtual addresses physical addresses iommu maps device-visible virtual addresses also called device addresses i/o addresses context physical addresses units also provide memory protection faulty malicious devices example iommu graphics address remapping table gart used agp pci express graphics cards intel architecture amd computers x86 architecture prior splitting functionality northbridge southbridge cpu platform controller hub pch i/o virtualization performed cpu instead chipset advantages iommu compared direct physical addressing memory dma include system architectures port i/o distinct address space memory address space iommu used cpu communicates devices via i/o ports system architectures port i/o memory mapped suitable address space iommu translate port i/o accesses disadvantages iommu compared direct physical addressing memory include operating system running inside virtual machine including systems use paravirtualization xen usually know host-physical addresses memory accesses makes providing direct access computer hardware difficult guest os tried instruct hardware perform direct memory access dma using guest-physical addresses would likely corrupt memory hardware know mapping guest-physical host-physical addresses given virtual machine corruption avoided hypervisor host os intervenes i/o operation apply translations incurring delay i/o operation iommu solve problem re-mapping addresses accessed hardware according compatible translation table used map guest-physical address host-physical addresses
[ 6793, 1833, 7442, 4694, 5939, 240, 4537, 8024, 5962, 959, 1237, 2617, 357, 4920 ]
Validation
1,118
5
Group_Domain_of_Interpretation:group domain interpretation group domain interpretation gdoi cryptographic protocol group key management gdoi protocol specified ietf standard rfc 6407 based internet security association key management protocol isakmp rfc 2408 internet key exchange version 1 ike whereas ike run two peers establish pair-wise security association gdoi protocol run group member group controller/key server controller establishes security association among two group members gdoi interprets ike isakmp group security domain addition pair-wise security associations gdoi uses ike v1 phase 1 security association authenticating gdoi member gdoi controller ike/gdoi phase 1 cryptographic protocol exchange protects new type phase 2 exchange member requests pulls group state controller group key important state gdoi member group key encrypts keys decrypt application data thus group key also called key encrypting key gdoi group key-encrypting key used rekey security association rekey-sa established gdoi controller send push unsolicited updates group security association members multicast broadcast unicast channels gdoi called multicast key management system uses supports multicast messaging large groups multicast messages unsolicited messages therefore called push messages unsolicited messages sent controller members explicit requests member controller called pull messages gdoi thus gdoi group key updates pushed reach number group members single efficient transmission controller gdoi group key updates also serve remove members groups rfc 2627 describes one group membership management protocol allows selective key updates members efficiently remove member group efficiency evaluated terms space time message complexity rfc 2627 algorithms subset-difference logarithmic space time message complexity thus rfc 2627 supports efficient group membership management gdoi practical implementation gdoi group membership management separate function controller aaa function invokes remove de-authorized group member aaa authorization authentication accounting might run kind aaa protocol aaa function could also customer care function service provider subscriber management system media services provider provider aaa function must credential infrastructure public key infrastructure using x.509 digital certificates spki credential x.509 environment provider aaa function install certificate allow member join group group controller queries pki gdoi registration exchange member attempts join group pull group state group state stored group member keys key metadata conceptually group member keys structured set 1 n relationships often called key ladder member credential x.509 certificate proves authorized join one groups default group policy private authentication key 2048-bit rsa key policies possible similarly default group key key encrypting key 128-bit aes key policies possible finally data encryption key application-dependent commonly 128-bit aes key groups member sender generates data encryption key encrypts key encrypting key long two share group key group sender use key encrypting key encrypt key media files streams serves gdoi groups make distinction sender receiver however whether group members may send matter group policy type keys key ladder also determined group policy group policy cryptography key lifetime member behavior
[ 979, 6533, 7626, 38 ]
Test
1,119
2
Driver_wrapper:driver wrapper driver wrapper subroutine software library functions adapter operating system driver device driver designed operating system enable use devices drivers particular operating system available particular microsoft windows dominant family operating systems ibm pc compatible computers many devices supplied drivers windows operating systems several open source software projects allow using microsoft windows drivers another operating system linux examples include network drivers wireless cards ndiswrapper linux project evil freebsd ntfs file system see captive ntfs common thread among examples use wrapper technology allows execution drivers foreign environment limitations driver wrappers include lack ability function real time example limitation includes latency problems associated attempts make compatible linux zoomr16 audio daw sound recorder control surface
[ 4759, 5571, 1534, 4277, 6278, 578, 7029 ]
Test
1,120
2
Angry_Birds_Rio:angry birds rio angry birds rio third puzzle video game angry birds series developed published rovio mobile based angry birds angry birds rio released devices using apple ios mac os x well google android march 2011 game released marketing tie-in 20th century fox blue sky studios animated films rio rio 2 promoted movies utilizing basic gameplay original game angry birds rio added number new elements notably first use boss levels rio angry birds kidnapped taken rio original angry birds players use slingshot launch birds nearby structures intent hitting targets located within instead pigs stolen eggs players must rescue caged exotic birds defeat nigel marmosets depending level played game setting several characters rio make appearances blu jewel feature types bird exclusive game along existing birds series game also includes first boss fights appear series player uses birds defeat nigel main antagonist film well mauro leader marmosets levels luiz helps defeat marmosets destroys materials blocks get player extra points well hidden items collect player progresses game angry birds rio initially included two chapters smugglers den jungle escape 30 levels since game expanded three additional 30-level chapters called beach volley released may 2011 carnival upheaval released june 2011 airfield chase released august 2011 along 15-level chapter golden beachball unlocked finding hidden item beach volley ios android entering redeem code rio dvd pc mac final chapter named smugglers plane released november 2011 released initially 15 levels final 15 levels released later january 2012 chapter special fruit may rarely found gold smugglers den pineapples jungle escape bananas beach volley watermelons carnival upheaval papayas airfield chase apples smugglers plane mangoes market mayhem strawberries rocket rumble golden rockets july 2013 golden beachball episode received 15 levels golden cherries new background episode available start game march 2012 trophy room update released 12 new levels unlocked player finishes chapter collects 15 certain golden fruit update first released android amazon appstore ad-free version making way ios december 18 2012 new update landed ios android adding 24 new levels levels earned getting 30 70 stars episode earning 10 mighty eagles feathers episode 4 extra levels episode episode also added power-ups power-ups super seeds sling scope angry birds original app 2 new power-ups samba burst tnt drop seen previous angry birds friends christmas tournament march 11 2013 another update released adding market mayhem episode 34 levels 3 stars levels 1 mighty eagle level july 25 2013 ab rio app icon updated golden beachball added golden fruit 15 new levels addition trophy room levels combined episode earned four angry birds rio episodes — visually tied rio 2 released december 2013 july 2014 episodes featured refreshed graphics timber tumble episode adds hint feature tells sling bird july 2015 game update added bird coins allow players unlock levels previously locked 2012 electronic entertainment expo los angeles california rovio distribution partner activision announced plans bring angry birds rio two games original angry birds angry birds seasons playstation 3 xbox 360 nintendo 3ds systems bundled together angry birds trilogy games built specifically respectively angry bird consoles taking advantage unique features support playstation move kinect high-definition displays glasses-free 3d visuals also available wii wii u part angry birds trilogy game received generally favorable reviews metacritic score 87/100 based 18 reviews ryan rigney gamepro saying ios version boasts notable improvements predecessors levi buchanan ign review android version calling game smart snappy new chapter series jim squires gamezebo complimented game attempts add new material mechanics saying evolution needs happen wants long term staying power mario pac-man however squires take issue new boss battles calling little anti-climactic tracy erickson pocket gamer noted angry birds rio lacks new ideas freshness makes quality gameplay good value since release angry birds rio downloaded 10 million times one top downloaded games apple app store google play
[ 6312, 4759, 34, 2148 ]
Test
1,121
2
Conflict_Resolver:conflict resolver conflict resolver application used apple sync services data synced services like mobileme gmail devices like macs pcs mobile devices sync services utilized several applications including address book ical mail conflict resolver executed event sync service decide version data use creating conflict user prompted choose version data use mobileme local whether user wishes apply changes conflicts review individually conflict resolver resides /system/library/privateframeworks/syncservicesui.framework/versions/a/resources/conflict resolver.app versions mac os x since 10.5 mac os x 10.4 application located /system/library/coreservices/conflict resolver.app
[ 5571 ]
Train
1,122
4
Facebook_malware:facebook malware social media platform social networking service facebook affected multiple times history intentionally harmful software known malware pose particular challenges users platform well personnel tech-company fighting entities create topic ongoing malware analysis attacks known phishing attacker pretends trustworthy entity order solicit private information increased exponentially 2010s posed frustrating challenges facebook particular tricks involving urls common attackers maliciously use similar website nowiki http //faceb0ok.com/ /nowiki instead correct nowiki http //facebook.com/ /nowiki example 11th international conference detection intrusions malware vulnerability assessment dimva held july 2014 issued report condemning one common tricks mobile computing users especially vulnerable terms applications facebook also visually copied phishing attackers aim confuse individuals thinking something else legitimate facebook log-in screen 2013 variant dorkbot malware caused alarm spreading facebook internal chat service suspected efforts cybercriminals harvest users passwords affecting individuals nations germany india portugal united kingdom antivirus organization bitdefender discovered several thousand malicious links taking place twenty-four hour period contacted facebook administration problem infection contained unusual nature sparked interest given attackers exploited flaw file-sharing site mediafire proliferate phony applications among victims facebook friends real computer worm koobface surfaced 2008 via messages sent facebook myspace later became subject inflated grandiose claims effects spread point internet hoax later commentary claimed link malware messages barack obama administration never actually existed david mikkelson snopes.com discussed matter fact-checking article vein actions google microsoft company administration willing hire grey hat hackers acted legally ambiguously past assist various functions programmer social activist george hotz also known nickname geohot example july 29 2011 facebook announced effort called bug bounty program certain security researchers paid minimum 500 reporting security holes facebook website company official page security researchers stated give us reasonable time respond report making information public make good faith effort avoid privacy violations destruction data interruption degradation service research bring lawsuit ask law enforcement investigate effort attracted notice publications pc magazine noted individuals must first report security glitch must also find problem native facebook rather entity merely associated farmville late 2017 facebook systematically disabled accounts operated north koreans response government use state-sponsored malware attacks microsoft similar actions north korean government attracted widespread condemnation u.s. elsewhere alleged proliferation wannacry malware said computer worm affected 230,000 computers 150 countries throughout 2017
[ 4, 5274, 3726, 6628, 4391, 7087, 3795, 6526 ]
Test
1,123
2
IOS_10:ios 10 ios 10 tenth major release ios mobile operating system developed apple inc. successor ios 9 announced company worldwide developers conference june 13 2016 released september 13 2016 succeeded ios 11 september 19 2017. ios 10 incorporates changes 3d touch lock screen new features apps messages additional emojis third-party apps extend functionality imessage maps redesigned interface additional third-party functions home app manages homekit -enabled accessories photos algorithmic search categorization media known memories siri compatible third-party app-specific requests starting workouts apps sending ims using lyft uber use payment functions reviews ios 10 mostly positive reviewers highlighted significant updates imessage siri photos 3d touch lock screen welcome changes third-party extension support imessage meant becoming platform although user interface criticized difficult understand third-party integration siri great although voice assistant criticized become smarter reviewers impressed image recognition technology photos although noting still work progress higher error rate competition 3d touch finally feels useful works almost every part os lock screen far customizable reviewers enjoyed notification bubbles could expanded see information without needing unlock phone month release ios 10 installed 54 ios devices slightly slower migration release ios 9 speculated caused early release issue may put users downloading update user adoption ios 10 steadily increased following months eventually totaling 89 active devices september 2017. ios 10 introduced apple worldwide developers conference keynote address june 13 2016 first beta release made available registered developers following keynote apple released first public beta release july 7 2016. ios 10 officially released september 13 2016. ios 10.0.1 released september 13 2016 first update ios 10 released 10.0 contained bug causing devices brick updating ios 10.0.2 released september 23 2016 update contained bug fixes specifically fixing bug temporarily disabled headphone controls lightning earpods ship iphone 7 fixing bug preventing app extensions enabled fixing unexpected crash photos app activating icloud photo library ios 10.0.3 released october 17 2016 exclusively iphone 7 iphone 7 plus models fix connectivity issues ios 10.1 released october 24 2016 new portrait camera mode iphone 7 plus transit directions japan apple maps ability replay bubble screen effects imessage well lots bug fixes ios 10.1 also features warning message launching 32-bit app says app may slow iphone ios 10.1 also allows users use imessage effects even reduce motion setting turned ios 10.1.1 released october 31 2016 fix issue health data could viewed users november 9 2016 apple released new version ios 10.1.1 available users n't yet updated previous 10.1.1 update information new update given ios 10.2 released december 12 2016 update included new tv app u.s. unifies content different video apps recommends new tv shows movies watch update also added new redesigned emoji stabilization photo grouping accuracy changes photos new love celebration messages screen effects notification support homekit-accessories well revamped sorting options design tweaks music app ios 10.2 also adds telemetry diagnostic tool apple use report battery consumption diagnosing reported issues 30 battery shutdowns iphone models ios 10.2 also includes three new wallpapers iphone 7 iphone 7 plus specifically wallpapers featured marketing phones ios 10.2.1 released january 23 2017 bug fixes security improvements december 28 2017 apple acknowledged update changed power management peak workloads avoid unexpected shutdowns iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se customers upset update thought ploy get people upgrade new devices number people filed lawsuits feature seeking class action status ios 10.3 released march 27 2017 update introduced find airpods feature lost airpods headphones changed default file system hfs+ apfs improved performance encryption also increases usable storage device support additional siri actions including status bills payment apps scheduling ride-booking apps new apple id view settings ability developers respond reviews app store well helpful helpful review labels improved overview icloud storage usage bug fixes stability improvements users also give app ratings inside app ios 10.3 also features significant security patch fixing issue javascript exploit link would cause devices repeatedly call 9-1-1 emergency phone number update also added podcasts widget made app transitions smoother extended support wi-fi calling carriers carplay update added quick-access multitasking screen three recently used apps added functionality maps app find electric vehicle charging stations ios 10.3.1 released april 3 2017 bug fixes security improvements including fix wi-fi vulnerability discovered google project zero team security researchers ios 10.3.2 released may 15 2017 bug fixes security improvements ios 10.3.3 released july 19 2017 new wallpapers 12.9-inch ipad pro along bug fixes security improvements including fix wi-fi vulnerability devices searching signal open hackers ios 10.3.4 released july 22 2019 address issue could impact gps location performance could cause system date time incorrect available exclusively iphone 5 cellular model ipad 4th generation control center redesigned split three pages one general settings quick toggles airplane mode orientation lock one audio controls one controlling homekit internet things appliances used 3d touch capabilities added several toggles apps show widget home-screen icon accessed 3d touch default apps included ios devices hidden home screen 're-downloaded app store upon sandbox respective app removed contains user data settings caches app also hidden places today view settings app share sheets user interact app within another app feature first hinted interview september 2015 apple ceo tim cook stated apple looking allowing customers remove unused stock apps ios 10 allows users prioritize certain app downloads using 3d touch quicktype virtual keyboards provide word-completion capabilities predict answers questions suggest relevant information based location calendar availability contacts define feature previous ios versions replaced look expands use providing definitions retrieving information locations web browsing history downloaded apps suggested websites quicktype keyboard allow user type multiple languages user selects desired languages dictionary keyboard settings menus user ability change keyboard settings specifically physical keyboards autocorrect auto-capitalization slide unlock mechanism lock screen removed favor pressing home button similar feature apple watch raise wake wakes device user lifts function requires device m9 motion coprocessor newer today view notification center replaced widgets accessible swiping left right ipad widgets displayed two-column layout notification center longer today view notifications larger expand display information unread notifications cleared using 3d touch apps need updated frequently notifications update live notification center contains spotlight search bar new magnifier setting added allows users triple-click home button ios open camera app magnification also new color filters settings compensate user color blindness color filters options include grayscale red/green filter protanopia green/red filter deuteranopia blue/yellow filter tritanopia messages application users turn low quality image mode saves poor iphone stuffing full images based new animated stickers gifs sent imessage wi-fi menu settings shows warnings security network network connected internet shown user small subtext wi-fi network name raise wake enabled disabled settings ios 10.2 preserve settings feature allows users set camera app launch certain settings default options include launching video square mode rather photo mode preserving last used filter preserving capture settings live photos music added apple music one device automatically downloaded devices using automatic downloads setting settings allows user option routes maps app avoid toll roads and/or highways ios 10.3 settings updated feature information relating user apple id account main menu features section allows users see old unmaintained apps wo n't work future versions ios additionally users see breakdown icloud storage user enable setting siri announce calling options always headphones car headphones never ios 10 allows users rearrange remove apps carplay display settings ios 10.3 maps carplay added electric vehicle charging stations part overall continuity features introduced ios 8 new universal clipboard feature allows users mac personal computers running macos sierra ios devices running ios 10 easily copy material different devices icloud part continuity new continuity keyboard feature allows users type text iphone text appear apple tv running tvos 10 avoiding siri remote text input ios 10 features new sound effects locking device keyboard clicks whenever device detects liquid lightning port notice warns user disconnect lightning cable allow port dry ios 10 also allows tty calls made without additional hardware ios 10 allows users find apple watch using find iphone spotlight search contents users icloud drive storage reported user base 10 1 kilobyte equals 1000 bytes format instead base 2 used older ios versions ios 10 allows developers buy advertisement spots app store users search content also adds back categories section replaces explore section introduced ios 8 ios 10.3 developers able respond user reviews helpful helpful review labels help surface relevant customer reviews ios 10 users change day week calendar starts well alert settings birthdays events calendar type gregorian chinese hebrew islamic music longer stop playing camera app launched unless users decide record video take live photo.live photos taken filters previously available still photos ios 10.1 iphone 7 plus received new depth field portrait camera mode using wide-angle telephoto lenses phone create shallow depth field portrait photos blurred backgrounds clock app dark theme new bedtime feature reminds user go bed get desired amount sleep also new stopwatch face accessed swiping left contacts app ios 10 allows users set default phone numbers email addresses contacts multiple numbers addresses app also allows user add remove contacts favorite contacts list home new app allows users manage appliances compatible homekit apple api home automation app users add compatible homekit accessories locks lights thermostats directly control appliances app scenes panel allows many devices controlled fit mood setting geo-fencing activates scheduled sequences following user location mail app allows users unsubscribe mailing lists unsubscribe button users dismiss message unsubscribe particular mailing list tapping x top right corner preventing mail app displaying unsubscribe button mailing list later apple added back support html5 video mail previously stopped ios 8 mail filter messages either unread/read categories ios 10 also changes email threading works placing oldest email top default option settings lets users revert previous threading system recent message top additionally new threaded conversations allow users tap message see scrollable stream messages inside thread maps redesigned updated additional features including scanning calendar events locations learning user typical actions redesigned driving view marker automatically placed indicate user parked car marker also tell user last parked car notes field allows user enter information parking garage number app app helps users find nearest gas station fast-food restaurant coffee shop swiping bottom screen maps also estimates long detour take users add third-party extensions maps app enable additional functionality restaurant-booking extension help user reserve table inside maps app users pan zoom navigation mode app displays current temperature weather conditions bottom right corner ios 10.3 app also allows user see weather forecast using 3d touch current temperature functionality allows users see hour-by-hour breakdown area looking messages app incorporates app store lets users download third-party imessage apps accessed within imessage conversations users use send stickers play games send rich content media previews recipients messages app store three navigation fields featured categories manage app updated include many visual effects chat bubbles example sent loud gentle animation recipient sees upon receiving invisible ink effect obscures message recipient swipes across full-screen effects like balloons confetti fireworks sent also support interactions similar apple watch sending quick sketches recording sending user heartbeat order use screen bubble effects reduce motion setting needs turned messages allows users send handwritten notes done turning device landscape mode iphones landscape portrait ipad users tapping handwriting squiggle messages app automatically saves recently used notes make easier send handwritten message deleted way app deleted holding message pressing delete message also saved picture file new emojis added well additional features related emoji emojis appear 3x bigger messages sent three emojis text keyboard predict emojis use emoji replacement feature attempts match words messages replace emojis meaning since game center app removed messages handles actions inviting friends game read receipts turned individual contacts rather contacts music app redesigned emphasis placed usability section reorganized playlist offering daily music recommendations new tab renamed browse new tab music downloaded called downloaded music added lyrics viewable songs in-app ios 10 search tab includes recent trending searches optimized storage option removes downloaded music user n't played news app taking cues music layout redesigned incorporate bold headings newspaper-esque layout redesigned tab news also features support subscriptions provides notifications breaking news notes collaboration feature allows users share note collaborate users add remove text note users tap round yellow badge person plus sign send invitations text email link apple added deep learning capabilities sorting searching photos app new memories feature automatically recognize compile related photos create short shareable music videos local facial recognition functionality added bundle together pictures certain people ios 10 allows users add doodles text photo using new markup feature user edits live photo using markup image turned still image live photos edited photos app allows users trim clip change still frame add filter add digital image stabilization live photo buttery smooth app also upgraded auto-enhance feature adds brilliance slider phone app transcribe received visual voicemails siri announce name phone number incoming calls system mark suspected spam callers call screen upon incoming calls contacts enabled emergency bypass phone always make sounds vibrations receiving notifications chosen contacts even disturb mode favorites screen users customize action favorited contact enable click including call facetime sms email users save voicemails airdrop imessage icloud drive apps share menu apple pay available safari app limit many tabs users open time supported ipads safari unique split view viewing two safari browser tabs 50/50 mode next users also search keywords specific tabs close tabs single click reopen recently closed tabs long-pressing plus icon users also search items bookmarks reading list included ios 10.2 update tv app app available united states offers simple unified experience content different video apps long service supports feature new app replaces videos app found previous ios versions ios 10 gives third-party developers access apis three major ios system apps services siri imessage maps developers ios 10 allows third-party camera apps capture raw image format pictures support shooting photos adobe dng raw format limited devices least 12mp camera third-party app supports apple enable feature native camera app ios 10 allows voip apps functionality interface phone facetime apps use callkit api native support vpn protocol pptp removed apple recommends alternatives considers secure options group notifications app notification center customize order notifications removed game center app removed case macos sierra review verge dieter bohn wrote new features introduced ios 10 evolution design interaction ideas apple working couple years wrote imessage becoming platform although liked extensions mean access information apps without needing open respective apps wrote new imessage interface difficult understand use third-party apps stickers crazy confetti effects emoji place nightmare although finishing maybe wonderland nightmare call regarding third-party support siri called great noting limited class apps calls messaging payments photos ride-sharing apps carplay systems workouts sometimes button press required complete process beyond app integrations criticized siri writing siri n't seem gotten whole lot smarter remember bohn enjoyed new machine learning technology present photos app writing impressed apple image recognition technology noted done locally device criticize error rate compares technology google photos step ahead bohn liked new designs music maps apps saying redesigns better bohn particularly enjoyed new lock screen highlighted notification bubbles 3d touch-ed access information without needing unlock phone small bits new features liked included deletable apps upgraded widgets 3d touch-ing home screen icon breaking news notifications apple news overall bohn referred ios 10 still walled garden doors engadget devindra hardawar wrote ios 10 apple basically polishing pearl hardawar noted major changes release focus features rather visual interface wrote lock screen far customizable praised new features added 3d touch writing finally feels useful likes 3d touch works almost every part os regard imessage wrote new features particularly useful including invisible ink obscures text conversation others might looking criticized user interface writing needs work memories feature new photos app usually turned well wrote 're still clearly work progress hardawar praised new apple music app added really anything better last iteration also liked lyrics support wrote siri third-party support actually starting get useful run accuracy issues finished writing although ios 10 add features seen google android operating system mobile industry shamelessly getting inspired competition summary states ios 10 collection useful changes already solid os october 2016 month initial release 54 ios devices running ios 10 slightly slower migration release ios 9 preceding year result speculated macrumors tim hardwick caused early release issue disabled devices may put users downloading update user adoption increased 76 active devices january 2017 79 february 2017 86 june 2017 87 july 2017 89 september 2017 release ios 11 initial public release ios 10 september 13 2016 saw many iphones ipads temporarily disabled bricked over-the-air update requiring bricked devices connected mac pc itunes order retry update restore device factory settings apple quickly released ios 10.0.1 issued statement experienced brief issue software update process affecting small number users first hour availability problem quickly resolved apologize customers september 2016 discovered encryption local ios backups made itunes weaker ios 10 devices devices running ios 9 russian software firm elcomsoft discovered ios 10 backup process skips several security checks making approximately 2,500 times faster try passwords enabling 6 million password tries per second compared 2,400 password tries per second process elcomsoft used ios 9 firm stated impact severe apple acknowledged problem said planned issue security update also stated icloud backups affected ios 10.1 update subsequently fixed issue next web juan buis wrote late november 2016 complaints shared apple support forums various iphone models turning battery falls certain percentage blames ios 10.1.1 update wrote original post support forums explains phone dies ’ 30 percent charge left many others since replied ’ experiencing ios 10.2 released december 2016 adds telemetry diagnostic tool apple use report battery consumption diagnosing reported issues 30 battery shutdowns february 2017 apple released statement techcrunch saying ios 10.2.1 update released january 23 reduced occurrence battery shutdowns 80 iphone 6s devices 70 iphone 6 devices full statement read ios 10.2.1 apple made improvements reduce occurrences unexpected shutdowns small number users experiencing iphone ios 10.2.1 already 50 active ios devices upgraded diagnostic data 've received upgraders shows small percentage users experiencing issue 're seeing 80 reduction iphone 6s 70 reduction iphone 6 devices unexpectedly shutting also added ability phone restart without needing connect power user still encounters unexpected shutdown important note unexpected shutdowns safety issue understand inconvenience wanted fix issue quickly possible customer issues device contact applecare release apple dropped support devices either a5 a5x chip iphone 4s ipad 2 ipad 3rd generation ipad mini 1st generation ipod touch 5th generation
[ 6788, 3940, 7161, 4670, 7890, 6092, 4320, 2926, 4690, 2566, 734, 3640, 5752, 6113, 405, 6119, 6125, 2954, 6479, 6847, 6142, 2609, 1895, 4014, 5091, 4749, 7601, 4759, 2284, 7259, 2294, 1940, 2300, 3025, 2665, 1582, 2327, 6565, 2331, 3050, ...
Test
1,124
4
Warzapping:warzapping warzapping act searching remote disable features electronics computing devices generally motion using portable computer pda warzapping named term wardialing 1983 film wargames involved searching computer systems software dialed numbers sequentially see ones connected fax machine computer devices laptops begun ship features allow rendered unusable data deleted disabling device activated unauthorized manner consequences victim could severe including economic losses loss personally important data medical records family photos vehicles also include systems unauthorized shutdowns could leave someone stranded without supplies strand children waiting picked activity prevent someone getting performing work prevent someone transported medical treatment many jurisdictions criminal civil legal action could taken perpetrator computer trespass trespass chattels addition claims charges relating negative consequences laws concerning denial-of-service attack types cybercrime might also apply point unlike wardriving software techniques publicly available enable warzapping casual computer users predicted rise popularity remote disabling devices software soon become available
[ 3480, 1691, 4699, 5046 ]
Test
1,125
7
Message_queuing_service:message queuing service message queueing service message-oriented middleware mom deployed compute cloud using software service model service subscribers access queues topics exchange data using point-to-point publish subscribe patterns message queueing service aims eliminate traditional overhead associated operating in-house messaging infrastructures operating overheads include besides reducing cost message queueing service seeks simplify access messaging resources therefore facilitate integration efforts within organizations message queueing service also creates new value providing reduced costs enhanced performance reliability order provide benefits message queueing service leverages cloud computing resources storage network memory processing capacity using virtually unlimited cloud computing resources message queueing service provides internet scale messaging platform message queueing service accessible variety protocols java message service amqp rest-style apis web services ibm mq offers managed service used ibm cloud amazon web services
[ 2961, 6986, 2517, 6415, 2988, 5064, 330, 4014, 7722 ]
Test
1,126
5
Network_Data_Representation:network data representation network data representation ndr implementation presentation layer osi model
[ 6989 ]
Test
1,127
5
Demultiplexer_(media_file):demultiplexer media file demultiplexer digital media files media demultiplexer also called file splitter laymen consumer software providers software demultiplexes individual elementary streams media file e.g audio video subtitles sends respective decoders actual decoding media demultiplexers decoders format container handlers separate program streams file supply respective audio video subtitles decoders playback difficulties playback audio video may result several legacy file splitters particular file format installed operating system causes decoder-to-file-splitter mismatch resulting playback failure media players
[ 1710, 4213, 7058, 985, 4759, 1352, 6992, 1374, 307, 5571, 2117, 4700, 1955, 7746, 3032, 7201, 7387, 3219, 510, 8126, 2334, 6940, 4732, 5256, 3152, 169, 5349, 4461, 2897, 87, 619 ]
Test
1,128
2
Wine_(software):wine software wine recursive backronym wine emulator free open-source compatibility layer aims allow computer programs application software computer games developed microsoft windows run unix-like operating systems wine also provides software library known winelib developers compile windows applications help port unix-like systems wine provides windows runtime environment translates windows system calls posix-compliant system calls recreating directory structure windows systems providing alternative implementations windows system libraries system services codice_1 various components internet explorer windows registry editor msiexec wine predominantly written using black-box testing reverse-engineering avoid copyright issues selection wine emulator name wine project result naming discussion august 1993 credited david niemi confusion caused early faq using windows emulator invalid sources appear wine project name set code emulation virtualization occurs running windows application wine emulation usually would refer execution compiled code intended one processor x86 interpreting/recompiling software running different processor powerpc name sometimes appears forms wine wine project developers agreed standardize form wine wine primarily developed linux macos well-maintained packages available platforms 2007 survey desktoplinux.com 38,500 linux desktop users 31.5 respondents reported using wine run windows applications plurality larger x86 virtualization programs combined well larger 27.9 reported running windows applications bob amstadt initial project leader eric youngdale started wine project 1993 way run windows applications linux inspired two sun microsystems products wabi solaris operating system public windows initiative attempt get windows api fully reimplemented public domain iso standard rejected due pressure microsoft 1996 wine originally targeted 16-bit applications windows 3.x focuses 32-bit 64-bit versions become standard newer operating systems project originated discussions usenet comp.os.linux june 1993 alexandre julliard led project since 1994 project proven time-consuming difficult developers mostly incomplete incorrect documentation windows api microsoft extensively documents win32 functions areas file formats protocols publicly available specification microsoft windows also includes undocumented low-level functions undocumented behavior obscure bugs wine must duplicate precisely order allow applications work properly consequently wine team reverse-engineered many function calls file formats areas thunking wine project originally released wine mit license x window system owing concern proprietary versions wine contributing changes back core project work march 2002 used lgpl licensing wine officially entered beta version 0.9 25 october 2005 version 1.0 released 17 june 2008 15 years development version 1.2 released 16 july 2010 version 1.4 7 march 2012 version 1.6 18 july 2013. version 1.8 19 december 2015 development versions released roughly every two weeks wine-staging relatively independently maintained set relatively aggressive patches deemed ready winehq developers merging wine repository still considered useful wine-compholio fork mainly covers experimental functions bug fixes since january 2017 patches wine-staging begins actively merged winehq upstream wine-compholio transferred project alistair leslie-hughes key winehq developer main corporate sponsor wine codeweavers employs julliard many wine developers work wine crossover codeweavers supported version wine crossover includes application-specific tweaks considered suitable winehq version well additional proprietary components involvement corel time assisted project chiefly employing julliard others work corel interest porting wordperfect office office suite linux especially corel linux corel later cancelled linux-related projects microsoft made major investments corel stopping wine effort corporate sponsors include google hired codeweavers fix wine picasa ran well enough ported directly linux using binary windows google later paid improvements wine support adobe photoshop cs2 wine also regular beneficiary google summer code program goal wine implement windows apis fully partially required programs users wine wish run top unix-like system programming interfaces microsoft windows family oses consist largely dynamic-link libraries dlls contain huge number wrapper sub-routines system calls kernel ntos kernel-mode program ntoskrnl.exe typical windows program calls windows dlls turn calls user-mode gdi/user32 libraries turn uses kernel32.dll win32 subsystem responsible dealing kernel system calls system-call layer considered private microsoft programmers documentation publicly available published interfaces rely subsystems running top kernel besides number programming interfaces implemented services run separate processes applications communicate user-mode services rpcs wine implements windows application binary interface abi entirely user space rather kernel module wine mostly mirrors hierarchy services normally provided kernel windows instead provided daemon known wineserver whose task implement basic windows functionality well integration x window system translation signals native windows exceptions although wineserver implements aspects windows kernel possible use native windows drivers due wine underlying architecture prevents certain applications games working example using starforce copy-protection requires virtual device drivers installed wine allows loading windows dlls unix shared objects windows programs builtin implementation basic windows dlls namely ntdll kernel32 gdi32 user32 uses shared object method must use functions host operating system well higher-level libraries wined3d free use dll format many cases users choose load dll windows instead one implemented wine provide functionalities yet implemented wine may also cause malfunctions relies something else present wine wine tracks state implementation automated unit testing done every git commit office software make use complex gpu-accelerated graphics apis computer games run games properly wine would forward drawing instructions host os even translate something host understand directx collection microsoft apis rendering audio input 2019 wine 4.0 contains directx 12 implementation vulkan api directx 11.2 opengl wine 4.0 also allows wine run vulkan applications handing draw commands host os case macos translating metal api moltenvk much wine directx effort goes building wined3d translation layer direct3d directdraw api calls opengl 2019 component supports directx 11 wine good enough run overwatch d3d11 besides used wine wined3d dlls also useful windows operating system allowing older graphic cards run games using newer directx versions old ddraw-based games render correctly work ongoing move direct3d backend vulkan api direct3d 12 support 4.0 provided vkd3d subproject wined3d 2019 experimentally ported use vulkan api wine patched alternatively run direct3d 9 without translation via free open-source gallium3d state tracker dx9 gallium3d layer allows direct pass-through drawing commands wine usually invoked command-line interpreter codice_2 utility codice_3 starts graphical user interface controls adjusting basic options gui configuration utility included wine winecfg makes configuring wine easier making unnecessary edit registry directly although needed done included registry editor similar windows regedit applications require tweaking simply installing application order work properly manually configuring wine use certain windows dlls wine project integrate workarounds wine codebase instead preferring focus solely improving wine implementation windows api approach focuses wine development long-term compatibility makes difficult users run applications require workarounds consequently many third-party applications created ease use applications n't work box within wine wine wiki maintains page current obsolete third-party applications developers direct3d portions wine continued implement new features pixel shaders increase game support wine also use native dlls directly thus increasing functionality license windows needed unless dlls distributed application wine also includes open-source implementations several windows programs notepad wordpad control iexplore explorer wine application database appdb community-maintained on-line database windows programs works wine well work wine ensures good backward compatibility legacy windows applications including written windows 3.1x wine mimic different windows versions required programs going far back windows version 2.0 however windows 1.x windows 2.x support removed wine development version 1.3.12 dosbox installed system see ms-dos wine development version 1.3.12 later nevertheless show windows 2.0 option windows version mimic wine still wo n't run windows 2.0 programs ms-dos windows functions currently integrated backward compatibility wine superior windows newer versions windows force users upgrade legacy windows applications many cases wine offer better legacy support newer versions windows compatibility mode wine run 16-bit windows programs 64-bit operating system uses x86-64 64-bit cpu functionality found 64-bit versions microsoft windows wine partially supports windows console applications user choose backend use manage console choices include raw streams curses user32 using raw streams curses backends windows applications run unix terminal preliminary support 64-bit windows applications added wine 1.1.10 december 2008. support considered stable two versions wine built separately result building wine64 produces environment capable running x86-64 applications wine stable support wow64 build allows 32-bit 64-bit windows applications run inside wine instance perform build one must first build 64-bit version build 32-bit version referencing 64-bit version like microsoft wow64 32-bit build process add parts necessary handling 32-bit programs 64-bit build functionality seen least 2010 early versions microsoft windows run top ms-dos windows programs may depend ms-dos programs runnable wine good support ms-dos starting development version 1.3.12 wine tries running ms-dos programs dosbox dosbox available system however due bug current versions wine incorrectly identify windows 1.x windows 2.x programs ms-dos programs attempting run dosbox work wine provides winelib allows shared-object implementations windows api used actual libraries unix program allows windows code built native unix executables since october 2010 winelib also works arm platform support solaris sparc dropped version 1.5.26 wine provides support arm well arm64/aarch64 processors windows flavors run wine run arm/win32 applications intended unlocked windows rt devices windows rt programs windows ce support either x86 arm missing unofficial pre-alpha proof-of-concept version called winece allows support 4 3 february 2013 fosdem talk brussels alexandre julliard demonstrated early demo wine running google android operating system experimental builds wine android x86 arm released late 2017 routinely updated official developers ever since default builds implement cross-architecture emulation via qemu result arm versions run arm applications use win32 api wine default uses specialized windows builds gecko mono substitute microsoft internet explorer .net framework wine built-in implementations jscript vbscript possible download run microsoft installers programs winetricks manually wine known good support versions internet explorer reasonably recent versions internet explorer 8 windows xp version reports usable rating wine appdb out-of-the-box winetricks offer auto-installation internet explorer 6 8 versions reasonably expected work built-in workarounds alternative installing internet explorer directly use now-defunct ies4linux compatible latest versions wine development ies4linux inactive core wine development aims correct implementation windows api whole sometimes lagged areas compatibility certain applications direct3d example remained unimplemented 1998 although newer releases increasingly complete implementation codeweavers markets crossover specifically running microsoft office major windows applications including games codeweavers employs alexandre julliard work wine contributes code wine project lgpl codeweavers also released new version called crossover mac intel-based apple macintosh computers 10 january 2007 crossover includes functionality crossover games crossover pro lines therefore crossover games crossover pro longer available single products crossover games optimized running windows video games unlike crossover n't focus providing stable version wine instead experimental features provided support newer games findev inc. produced proprietary cedega software formerly known winex cedega represented fork last mit-licensed version wine 2002 much like crossover games findev cedega targeted towards running windows video games 7 january 2011 findev inc. announced continued development cedega technology gametree developer program findev inc. allowed members keep using cedega id password 28 february 2011 findev also produced cider library apple–intel architecture macintoshes instead end-user product cider like winelib wrapper allowing developers adapt games run natively intel mac without changes source code russian company etersoft developing proprietary version wine since 2006 wine etersoft supports popular russian applications example 1c enterprise 1c company etersoft going issue wine etersoft cad oriented towards cad systems autocad bricscad compass-3d darwine port wine libraries darwin macos powerpc intel x86 architectures patches x86 version merged back main branch wine 2009 development ppc version abandoned mike kronenberg previously created winehelper darwine add gui macos style app interacting wine later replaced winebottler darwine provides macos compatible packages compiled wine repository pipelight team produced custom version wine wine-compholio acts wrapper windows npapi plugins within linux browsers tool permits linux users run microsoft silverlight microsoft equivalent adobe flash unity web plugin along variety npapi plugins project provides extensive set patches upstream wine project occasionally get approved added upstream wine pipelight largely obsolete modern browsers longer support npapi plugins silverlight deprecated microsoft 21 august 2018 valve announced new variation wine named proton designed integrate linux version company steam software including steam installations built linux-based steamos operating system steam machine computers valve goal proton enable steam users linux play games lack native linux port particularly back-catalog games ultimately integration steam well improvements game support relative mainline wine give users simple plug-and-play experience would get playing game natively linux proton entered public beta immediately upon announced valve already collaborating codeweavers since 2016 develop improvements wine gaming performance already merged upstream wine project specific improvements incorporated proton include vulkan-based direct3d 10 11 12 implementations via vkd3d dxvk multi-threaded performance improvements via esync improved handling fullscreen games better automatic game controller hardware support proton fully open-source available via github projects using wine source code include wine project received number technical philosophical complaints concerns years wine ability run windows binary code concerns raised native windows viruses malware affecting unix-like operating systems wine run malware programs running wine confined current user privileges restricting undesirable consequences reason developers wine recommend never running superuser malware research software zerowine runs wine linux virtual machine keep malware completely isolated host system alternative improve security without slowness using virtual machine run wine lxc container like anbox software default android another security concern implemented specifications ill-designed allow security compromise wine implements specs also implement security vulnerabilities contain instance problem 2006 windows metafile vulnerability saw wine implementing vulnerable setabortproc escape common concern wine existence means vendors less likely write native linux macos bsd applications example worth considering ibm 1994 operating system os/2 warp article describes weaknesses os/2 killed first one wine project responds complaints one wiki pages also wine wiki page claims wine help break chicken-and-egg problem linux desktop use wine gaming proved specifically controversial linux community feel preventing least hindering growth native linux gaming platform microsoft made public statements wine however windows update software block updates microsoft applications running wine 16 february 2005 ivan leo puoti discovered microsoft started checking windows registry wine configuration key would block windows update component puoti noted also first time microsoft acknowledges existence wine wine ceo frank ruben
[ 7912, 5401, 5413, 422, 7933, 1128, 7598, 4017, 1523, 1909, 4028, 4759, 2290, 1941, 5137, 1571, 4438, 4441, 7669, 3738, 1227, 1237, 7310, 1989, 6244, 6256, 5904, 2379, 6984, 6989, 8085, 6991, 5571, 6634, 578, 1652, 224, 4167, 2420, 3133, ...
Validation
1,129
2
Nokia_N75:nokia n75 nokia n75 smartphone nokia uses series 60 3rd edition symbian os mobility carrier n75 united states made specifically north american 3g market supporting wcdma 850/1900 frequencies however also available countries uk cnet gave 3/5 liking call quality display disliking battery life camera mobile tech review gave 4/5 pcmag gave 2.5/5 similar praise criticism
[ 1066, 5979, 2271, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 4407, 118, 23, 2564, 3703, 7261, 7545, 5044, 5493, 740, 7372, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 3039, 3653, 1582, 4894, 506...
Validation
1,130
4
Trusted_Information_Systems:trusted information systems trusted information systems tis computer security research development company 1980s 1990s performing computer communications information security research organizations nsa darpa arl afrl spawar others tis founded 1983 nsa veteran steve walker various times employed notable information security experts including david elliott bell martha branstad john pescatore marv schaefer steve crocker marcus ranum wei xu john williams steve lipner carl ellison tis headquartered glenwood maryland surprisingly rural location company started walker basement shady lane glenwood md company grew rather move baltimore washington d.c. suburbs small office building constructed land next walker new home route 97 tis projects included following tis operating system work directly affected bsd/os gauntlet firewall ipsec based well linux freebsd hp ux sun os darwin others company went public 1996 soon afterwards attempted acquire pgp inc. instead acquired 1998 network associates nai later became mcafee already bought pgp inc. 1997 security research organization became nai labs gauntlet engineering development organization folded network associates engineering development nai labs went couple branding changes complemented network associates branding efforts 2001 name changed network associates laboratories better match corporate identity 2002-2003 major branding initiative network associates culminating selection flag brand mcafee result security research organization became mcafee research 2003 sparta inc. employee-owned company acquired network security branch mcafee research 2005 sparta acquired remaining branches mcafee research organized security research division srd information systems security operation isso 2008 cobham plc british aerospace company acquired sparta organizational changes srd isso affect security research separate path tis primary commercial product gauntlet firewall acquired 1999 mcafee secure computing corporation scc used one tis major competitors time mcafee n't interested firewall vendor code base integrated secure computing firewall product branded sidewinder firewall returned mcafee secure computing acquired 2008 re-branded mcafee enterprise firewall end product line came 2013 following mcafee acquisition another major firewall vendor finland-based stonesoft mcafee announced october 2013 intention migrate existing installed base firewalls stonesoft stonegate
[ 3838, 4751, 900, 7626, 2644, 6533, 5571, 578, 1382, 2219, 496, 2043, 6842, 5773, 4741, 1805 ]
Test
1,131
3
Titan_(microprocessor):titan microprocessor titan supposed family 32-bit power isa-based microprocessor cores designed applied micro circuits corporation amcc scrapped 2010 according reports applied micro chose continue development powerpc 400 core instead 40 nm fabrication process designed foundation embedded processors system-on-a-chip soc solutions high performance reaching speeds 2 ghz would remain extremely power efficient drawing 2.5 w per core usually trade-off performance power amcc used fast14 technology intrinsity build extremely efficient microprocessor design leveraging high performance combined low power comparably cheap bulk 90 nm cmos manufacturing using nmos transistors latches design results chip fewer transistors traditional design thus reducing cost design allows dual core soc implementations consuming less 15 w. plans single dual quad-core versions titan new superscalar order 8-9 stage core novel three-stage cpu cache design small 4/4 kib instruction data caches level 0 sit traditional 32/32 kib l1 caches 1 mb l2 cache shared cores supporting four titan compliant power isa v.2.04
[ 7327, 2719, 3348, 4661, 3936, 1075, 1346, 2458, 3440, 1083, 4408, 5652, 912, 7361, 2845, 3708, 5665, 4702, 1199, 1386, 1388, 7099, 234, 2501, 239, 6474, 8125, 4815, 6226, 608, 7499, 2257, 3674, 5622 ]
Test
1,132
1
VoltDB:voltdb voltdb in-memory database designed michael stonebraker earlier designed ingres postgresql sam madden daniel abadi acid-compliant rdbms uses shared nothing architecture includes enterprise community editions community edition licensed gnu affero general public license voltdb newsql relational database supports sql access within pre-compiled java stored procedures unit transaction stored procedure written java interspersed sql voltdb relies horizontal partitioning individual hardware thread scale k-safety synchronous replication provide high availability combination continuous snapshots command logging durability crash recovery voltdb based h-store uses shared-nothing architecture scale data processing associated distributed across cpu cores within servers composing single voltdb cluster extending shared-nothing foundation per-core level voltdb scales increasing core-per-cpu counts multi-core servers making stored procedures unit transaction executing partition containing necessary data possible eliminate round trip messaging sql statements stored procedures executed serially completion single thread without locking latching similar lmax architecture data memory local partition stored procedure execute microseconds voltdb stored procedure initiation scheme allows nodes initiate stored procedures avoiding single serializable global order voltdb acid compliant data written durable storage durability ensured continuous snapshots asynchronous command logging creates snapshots log transactions snapshots synchronous command logging logs transactions transaction completes committed database ensures transactions committed logged transactions lost applications must designed data altered single stored procedure stored partition voltdb v5.0 introduced database monitoring management tool voltdb management center vmc short vmc provides browser-based one-stop monitoring configuration management voltdb database including graphs cluster throughput latency well cpu memory usage current server voltdb version 5.1 released march 2015 introduce database replication functionality removing single point failure dr provides simultaneous parallel replication multiple partitions binary logs transaction results saving replica replay transaction
[ 1438, 6462, 4274, 3371, 5571, 3396, 7248, 578, 6386, 5956, 4747, 5289 ]
Test
1,133
2
Hw.sensors:hw.sensors sysctl hw.sensors framework kernel-level hardware sensors framework originating openbsd uses sysctl kernel interface transport layer kernel userland framework used hundred device drivers openbsd export various environmental sensors temperature sensors common type consumption monitoring sensors done userland help sysctl systat sensorsd ntpd snmpd ports/sysutils/symon gkrellm openbsd framework integrated dell esm ipmi i²c addition number popular super i/o chips major difference compared solutions like lm_sensors simplicity works-by-default approach drivers n't require support configurability installation configuration actions required system administrator order get sensors going coupled fine-tuned ad-hoc read-only scan procedure i²c bus written theo de raadt centralised way cache making possible leave enabled default times unlike competing solutions support automatic monitoring raid drives also provided sensors framework concept sensors codice_1 type backported netbsd back envsys openntpd uses sensors type codice_3 order synchronise time provided nmea drivers framework originally devised 2003 alexander yurchenko porting several envsys-based drivers netbsd instead porting netbsd envsys simpler sysctl-based mechanism developed framework received major uptick usage device drivers release openbsd 3.9 period merely 6 months number individual drivers using framework went 9 openbsd 3.8 released 33 openbsd 3.9 released framework used 44 devices drivers time patchset committed converting simple one-level addressing scheme stable multi-layer addressing 2007 framework ported freebsd part google summer code grant adopted dragonfly bsd later year usability sensors monitoring daemon vastly improved 2007 partly due gsoc grant total number drivers stood 68 openbsd 4.4 growing 7 drivers 6-month release cycle level growth one new driver per month average common throughout history framework since openbsd 3.9 values exported drivers framework read-only however external patch exists implements fan control functionality framework well one drivers popular family super i/o chips patchset provided openbsd dragonfly bsd
[ 875, 6414, 1254, 2001, 2453, 6972, 1534, 191, 5373, 6984, 4498, 732, 5571, 6278, 6630, 8194, 2219, 1572, 1394, 6211, 3986, 7752, 594, 5865, 3572, 5250, 5958, 1315, 4990, 5518, 2883, 8135, 1052, 1697, 1793, 3751, 972, 1245, 6242, 1435 ]
Test
1,134
7
Hewlett_Packard_Enterprise:hewlett packard enterprise hewlett packard enterprise company commonly referred hpe american multinational enterprise information technology company based san jose california founded 1 november 2015 part splitting hewlett-packard company hpe business-focused organization two divisions enterprise group works servers storage networking consulting support financial services 4 december hpe reported fy2018 net revenue 30.9 billion 7 prior year period split structured former hewlett-packard company would change name hp inc. spin hewlett packard enterprise newly created company hp inc. retained old hp personal computer printing business well stock-price history original nyse ticker symbol hewlett-packard enterprise trades ticker symbol hpe according notes 2015 hpe revenue slightly less hp inc 2017 spun enterprise services business merged computer sciences corporation become dxc technology also spun software business merged micro focus hpe ranked 107 2018 fortune 500 list largest united states corporations total revenue full name company hewlett packard enterprise company drops hyphen previously existed hewlett packard former hewlett-packard company since separation many media outlets incorrectly named new organization using hp enterprises hp enterprise may 2016 company announced would sell enterprise services division one competitors computer sciences corporation deal valued merger hpe enterprise services csc form new company dxc technology completed 10 march 2017 approximately 100,000 current hpe employees affected 30,000 services employees areas hpe business remain hpe including technology services support consulting well software professional services august 2016 company announced plans acquire silicon graphics international sgi known capabilities high performance computing 1 november 2016 hpe announced completed acquisition per share cash transaction valued approximately net cash debt 7 september 2016 hpe announced spin-merge micro focus micro focus would acquire non-core software hpe shareholders would 50.1 percent merged company would retain current name merger concluded 1 september 2017 november 2016 pc world wrote hpe hewlett-packard failed develop middleware tools really make dent software market companies like ibm sap oracle excelling without major software product lines hpe ’ integrated offerings ’ strong competitors like dell software hardware assets adding hpe point focusing largely hardware ask end game september 2016 hewlett packard enterprise transferred two patents texas-based wholly owned shell company plectrum llc two patents originated 3com corporation bought hp 2010 along 1,400 patents us patent entitled quality service control mechanism apparatus us patent describes use high speed cache management unit replaces software-based systems hardware order reduce latency time 11 april 2017 reported synack raised round funding included hewlett packard enterprise january 2017 company acquired data management platform simplivity developer omnicube hyper-converged infrastructure appliance us 650m april 2017 hewlett packard enterprise completed acquisition hybrid flash flash manufacturer nimble storage inc per share october reuters reported company allowed russian defense agency examine cyber-defense system used pentagon report noted six former u.s. intelligence officials well former arcsight hewlett packard enterprise employees independent security experts said source code review could help moscow discover weaknesses software potentially helping attackers blind u.s. military cyber attack november 2017 meg whitman announced stepping ceo six years helm hp hpe noted 1 february 2018 antonio neri officially became hpe ’ president chief executive officer announcement created controversy leading 6 drop stock price quickly recovered next days june 2018 hewlett packard enterprise launched hybrid cloud service called greenlake hybrid cloud built top hpe onesphere cloud management saas offering greenlake hybrid cloud designed provide cloud management cost control compliance control capabilities run aws microsoft azure february 2019 meg whitman announced seeking re-election board directors ending professional involvement hpe may 2019 hewlett packard enterprise announced plans acquire cray nearly per share soon cray landed us department energy contract supply frontier supercomputer oak ridge national laboratory 2021
[ 6874, 1527, 3764, 4295, 2278, 2372, 3849, 900, 3358, 3692, 7165, 6430, 5822, 5735, 1556, 4783, 6817, 7189, 3882, 1112, 8005, 4802, 5060, 7845, 5064, 1581, 679, 5071, 7482, 3139, 7759, 7396, 2961, 4736, 4195, 6586, 4199, 6321, 7415, 972, ...
Validation
1,135
4
Misuse_detection:misuse detection misuse detection actively works potential insider threats vulnerable computer data misuse detection approach detecting computer attacks misuse detection approach abnormal system behaviour defined first behaviour defined normal stands anomaly detection approach utilizes reverse defining normal system behaviour first defining behaviour abnormal misuse detection anything known normal example misuse detection use attack signatures intrusion detection system misuse detection also used generally refer kinds computer misuse theory misuse detection assumes abnormal behaviour simple-to-define model advantage simplicity adding known attacks model disadvantage inability recognize unknown attacks information misuse detection including papers written subject consider following
[ 429, 3932, 3997, 3680 ]
Test
1,136
9
Puffin_Browser:puffin browser puffin browser web browser developed cloudmosa american-based mobile technology company founded shioupyn shen puffin browser initially released 2010 utilizes encrypted cloud servers content processing puffin renders webpages cloud could according benchmark tests make page loading content rendering javascript execution faster local device processing however result web pages processed cloud servers user ip address browsing world wide web puffin web browser reflects cloud server ip address causes websites detect puffin browser proxy server puffin browser comes adobe flash player play adobe flash content including mobile devices flash discontinued due security issues features also include virtual trackpad gamepad on-screen keyboard functions cloudmosa comprehensive product family puffin products run many different platforms puffin browser android puffin secure browser windows macos puffin internet terminal linux puffin tv browser smart tv puffin os main stream smart phones also known run resource-limited hardware like raspberry pi set-top box tv stick etc may 2019 cloudmosa announced discontinuing puffin web browser app ios devices due apple app store policies puffin browser released paid version puffin web browser pro google play december 2010 apple app store november 2010 2013 cloudmosa introduced puffin academy free mobile browser built-in adobe flash k-12 students teachers parents however ios version puffin academy discontinued ios platform july 1 2019 2015 cloudmosa released new product puffin facebook 2017 puffin browser top utility application app store across 58 countries including france united kingdom japan italy south korea besides puffin web browser pro puffin browser also ad-supported lite version ad blocking features added pro version exist lite version puffin tv special edition puffin browser optimized android google play tv users ranked best browser android tv makeuseof thailand largest gsm mobile phone operator advanced info service ais ships customized puffin tv browser set-top box—ais playbox 2018 puffin browser product family available mobile devices starting 2018 puffin browser released desktop version puffin secure browser windows may 2019 puffin secure browser mac os released october 24 2018 puffin browser reached 50 million users android november 2018 puffin browser reached 100 million accumulated users worldwide ios+android right opening ces 2019 cloudmosa announced new puffin browser product family member—puffin internet terminal desktop virtualization app running raspbian internet surfing designed raspberry pi puffin internet terminal selected ces 2019 innovation awards honoree computer hardware components product category may 2019 puffin browser introduced new family member—puffin os additionally cloudmosa announced discontinuing puffin web browser apps july 1 2019 ios devices cloudmosa reason discontinuing app app updated past two years met apple app store policies puffin web browser standard puffin browser application android puffin web browser includes support adobe flash content features mouse cursor emulation virtual gamepad users able choose save downloaded file either users devices directly storage drive web browser also allows users reduce amount data used sources flash games often consume lot data
[ 4655, 6802, 5378, 7537, 6809, 393, 3291, 2574, 2577, 6452, 4352, 4725, 6858, 3338, 84, 445, 1152, 1525, 7628, 5821, 5127, 6540, 3383, 8006, 8009, 3043, 1970, 6221, 520, 3057, 5887, 6966, 5542, 1276, 5571, 1284, 7015, 7749, 2049, 4565, 2...
Test
1,137
8
TinyURL:tinyurl tinyurl url shortening web service provides short aliases redirection long urls kevin gilbertson web developer launched service january 2002 way post links newsgroup postings frequently long cumbersome addresses tinyurl homepage includes form used submit long url shortening url entered server adds new alias hashed database returns short url tinyurl offers api allows applications automatically create short urls done simply reading result returned codice_1 short url aliases seen useful easier written remembered distributed also fit text boxes limited number characters allowed examples limited text boxes irc channel topics email signatures microblogs certain printed newspapers .net magazine even nature email clients impose line breaks messages certain length starting 2008 tinyurl allowed users create custom meaningful aliases means user create descriptive urls rather randomly generated address example codice_2 leads wikipedia article website ability preview full url present tinyurl user previously enabled previews visits url preview.tinyurl.com place tinyurl.com site display target url hyperlink instead redirecting automatically feature well documented tinyurl site alternative shortened url preview capability offered option time creation popularity tinyurls influenced creation least 100 similar websites simply domain alternatives offer additional features people posting twitter often made extensive use shortened urls keep tweets within service-imposed 140 character limit twitter used tinyurl 2009 switching bit.ly twitter uses t.co domain purpose though twitter extended limit 280 characters automatically shortens links longer 31 characters using t.co domain tinyurl method allocating shorter web addresses inspired action known tinyurl-whacking random letters numbers placed first forward slash attempt hit interesting sites without knowing
[ 5151, 7249, 518 ]
Test
1,138
5
X-Video_Motion_Compensation:x-video motion compensation x-video motion compensation xvmc extension x video extension xv x window system xvmc api allows video programs offload portions video decoding process gpu video-hardware theory process also reduce bus bandwidth requirements currently supported portions offloaded xvmc onto gpu motion compensation mo comp inverse discrete cosine transform idct mpeg-2 video xvmc also supports offloading decoding mo comp idct vld variable-length decoding commonly known slice level acceleration mpeg-2 also mpeg-4 asp video via unichrome s3 graphics chrome series hardware xvmc first unix equivalent microsoft windows directx video acceleration dxva api popular software applications known take advantage xvmc include mplayer mythtv xine hardware video gpu capable xvmc video acceleration requires x11 software device driver enable features currently three x11 nvidia drivers available 2d-only open source obfuscated driver maintained nvidia called nv proprietary binary driver nvidia open source driver based reverse engineering binary driver developed linux community called nouveau nouveau pursuing xvmc support 2d nv driver support xvmc official proprietary binary driver nvidia supports mpeg-2 offloading mo comp idct hardware including geforce 7000 series via provides open source device drivers via unichrome s3 graphics chrome series hardware supporting offloading mpeg-2 mpeg-4 asp video thanks vld level decoding via offloads much decoding tasks cpu gpus supporting idct mo comp levels keep mind devices supported caveats intel provides official open source device drivers supports mpeg-2 offloading mo comp idct intel 8xx/9xx range integrated graphics chips although ati first manufacturer provide mpeg2 acceleration graphic boards rage 128 gpu never provided documentation use xvmc available probably never xvmc supported radeon-4000 cards uvd catalyst driver 8.10 higher experimental level meaning n't work box see also x-video bitstream acceleration motion compensation support ati/amd hardware planned future hardware support mpeg-2 acceleration idct mo comp levels device drivers support xvmc matrox hardware although matrox parhelia hardware support mpeg-2 acceleration mo comp level binary device driver s3 supports mpeg-2 offloading initial 2.0.16 driver chrome 20 gpus x-video motion compensation api specification v. 1.0 xvmc extends x video extension xv makes use familiar concept xvport ports attributes set queried xv xvmc ports also hardware motion compensation contexts created use ports support xvimages i.e xv_image port encoding described xv version 2.2 api addendum queried list xvmcsurface types support support xvmcsurface types xvmccontext created port xvmccontext describes state motion compensation pipeline individual xvmccontext created use single port surface type motion compensation type width height combination example context might created particular port mpeg-2 motion compensation 720 x 480 4:2:0 surfaces context created referencing implies port surface type size motion compensation type contexts may direct indirect indirect contexts x display server renders video using data passed client direct contexts client libraries render video little interaction x display server xvmcsurfaces buffers motion compensation hardware render data buffers client accessible may stored hardware-specific format number buffers created use particular context resources permitting xvmc provides video acceleration starting one two places video pipeline acceleration starting first point shall call motion compensation level begins inverse quantization idct place motion compensation applied second point shall call idct level begins idct inverse quantization rendering done presenting library target xvmcsurface two reference xvmcsurfaces motion compensation buffer 8x8 blocks command buffer describes use 8x8 blocks along motion compensation vectors construct data target xvmcsurface pipeline starts idct level xv perform idct blocks performing motion compensation function provided copy/overlay portion xvmcsurface drawable arbitrary scaling xvmcsubpictures separate surfaces may blended target surface number xvmcsubpictures may created use context resources permitting backend frontend subpicture behavior supported xvmc acceleration supported even though xvmc currently supports hardware acceleration motion compensation mo comp inverse discrete cosine transform idct variable-length decoding via unichrome gpu additional video decoding processes could passed modern gpus could accelerated via gpu fragment programs xvmc could extended future support processes newer competing hardware video acceleration apis like vdpau xvba vaapi besides matching features function dxva microsoft equivalent api windows lacking support video formats mpeg-2 linux device drivers intel nvidia xvmc api specification version 1.0 currently also limitations project called va api underway develop modern video acceleration api support video acceleration features modern gpus xvideo
[ 950, 7442, 6414, 1232, 4096, 6055, 305, 4759, 5103, 1822, 7912, 8022 ]
Test
1,139
6
Libzip:libzip libzip open source library handling zip archives written portable c thus used multiple operating systems based zlib used php zip extension zip file support mysql workbench also used kde ark archiving tool zip archive support libzip supports reading writing zip archives particular allows extracting single multiple files querying attributes including extra fields comments writing allows replacing files adding new ones data come buffers files even zip archives without recompression extra field data comments file archive added modified deleted changes finalized closing archive on-disk archive always self-consistent zip64 extension large files also supported version 1.2.0 added support encryption decryption using aes version 1.3.0 added support compression using bzip2 opening existing archives strict consistency check requested libzip written c used c++ since version 1.1 libzip contains ziptool tool modifying zip archives command line
[ 2810, 4213, 7058, 985, 1352, 6992, 5571, 2026, 4700, 1955, 6029, 7746, 3032, 753, 6211, 7201, 7387, 3219, 510, 7669, 8126, 2334, 6940, 7581, 4732, 6489, 5256, 3152, 3915, 169, 5349, 1989, 4461, 2897, 1435, 619 ]
Test
1,140
4
PathPing:pathping codice_1 command command-line network utility supplied windows 2000 beyond combines functionality ping tracert used locate spots network latency network loss command provides details path two hosts ping-like statistics node path based samples taken time period depending many nodes start end host advantages codice_1 codice_3 codice_4 node pinged result single command behavior nodes studied extended time period rather default ping sample four messages default traceroute single route trace disadvantage takes total 25 seconds per hop show ping statistics command-syntax options pathping wikipedia.org -q 10
[ 2811, 1812, 4387, 4759, 2999, 6088, 2834, 5119, 5480, 2653, 5571, 4955, 6997, 1382, 5138, 3797, 5234, 7272, 5942, 1213, 7494, 4547, 6773, 1793, 3417, 5181, 6062, 7868, 4464 ]
Test
1,141
0
Filtered-popping_recursive_transition_network:filtered-popping recursive transition network filtered-popping recursive transition network fprtn simply filtered-popping network fpn recursive transition network rtn extended map states keys returning subroutine jump requires acceptor return states mapped key rtns finite-state machines seen finite-state automata extended stack return states well consuming transitions formula_1-transitions rtns may define call transitions transitions perform subroutine jump pushing transition target state onto stack bringing machine called state time acceptor state reached return state top stack popped provided stack empty machine brought state throughout article refer filtered-popping recursive transition networks fpns though acronym ambiguous e.g fuzzy petri nets filtered-popping networks fprtns unambiguous alternatives fpn structure formula_2 transitions represent possibility bringing fpn source state formula_11 target state formula_12 possibly performing additional action depending action distinguish following types explicitly -defined transitions behaviour call transitions governed two kinds implicitly -defined transitions push transitions initialize subroutine jumps pop transitions equivalent return statements natural language text enriched meta-information application rtn output instance rtn inserting xml tags used transforming plain text structured xml document rtn output representing natural language grammar would delimit add syntactic structure text sentence see parsing rtns output could simply mark text segments containing relevant information see information extraction application rtn output representing ambiguous grammar results set possible translations interpretations input computing set exponential worst-case cost even earley parser rtns output due cases number translations increases exponentially w.r.t input length instance number interpretations natural language sentence increases exponentially w.r.t number unresolved prepositional phrase attachments fpns serve compact representation set translations allowing compute cubic time means earley-like parser fpn states correspond execution states see instruction steps earley-parser rtns without output fpn transitions correspond possible translations input symbols formula_30 map resulting fpn gives correspondence represented output segments recognized input segments given recognized input sequence formula_31 fpn path formula_32 starting state formula_33 ending state formula_34 formula_32 represents possible translation input segment formula_36 filtered-popping feature required order avoid fpn paths represent translations disconnected overlapping input segments fpn call may contain several translation paths called state acceptor state input segments correspond share start point necessarily length return states corresponding input point acceptor state finishing call valid return states
[]
Test
1,142
4
China_Internet_Network_Information_Center:china internet network information center china internet network information center cnnic administrative agency responsible internet affairs ministry industry information technology people republic china based zhongguancun high tech district beijing founded june 3 1997 government department disguise non-profit organization cnnic responsible operating administering china ’ domain name registry cnnic manages .cn country code top level domain chinese domain name system internationalized domain names contain chinese characters june 2015 total number chinese domain names 22,310,000 january 2009 cnnic opens cn domain registered businesses requires supporting documentations domain registration business license personal id suspended overseas registrars even domestic registrants cnnic denies mandates existing personal domain names transferred businesses trend micro suggests move still enough stop modern security threats .cn domain cnnic allocates internet protocol ip addresses numbers domestic isps users cnnic national internet registry nir acknowledged asia-pacific network information center apnic late 2004 cnnic launched “ ip allocation alliance ” simplified procedures obtaining ip addresses cnnic responsible creation maintenance state top-level network catalog database database provides information internet users web addresses domain names numbers cnnic conducts technical research undertakes state technical projects based administrative practical network technology experience cnnic conducted continues conduct surveys internet information resources cnnic maintains statistics topics internet bandwidth china domain name registrations internet development china national network information center nic cnnic maintains cooperative relationships international internet communities works closely nics countries cnnic serves secretariat internet society china ’ internet policy resource committee policy resource committee charge tasks providing policy legislation oriented suggestions promote growth china ’ internet facilitating development application internet resources relevant technologies actively participating research work domestic internet development administration policies july 2008 broad alliance chinese online commerce stakeholders including cnnic major chinese commercial banks web hosting companies founded anti-phishing alliance china apac order tackle phishing activities abuse .cn sub-domain names cnnic also functions secretariat apac october 2009 alliance announced cooperation two new members netcraft maxthon help alliance process verify various phishing reports add confirmed phishing urls netcraft phishing site feed maxthon phishing blacklist 2015 google discovered cnnic issued intermediate ca certificate egypt-based firm used cnnic keys impersonate google domains google responded removing cnnic root certificate certificate store google chrome google products mozilla responded incident stating mozilla ca team believes cnnic ’ actions amount egregious behaviour ... cnnic ’ decision violate certification practice statement especially serious raises concerns go beyond immediate scope misissued intermediate certificate public discussion ... planning change firefox ’ certificate validation code refuses trust certificate issued cnnic root notbefore date 1 april 2015
[ 978, 363, 1443, 6348, 6179, 4948, 5387, 1375, 2117, 740, 7189, 1762, 2054, 3821, 4196, 1988, 84, 88 ]
Test
1,143
3
Socket_563:socket 563 socket 563 micropga cpu socket used exclusively low-power 16 w 25 w tdp athlon xp-m processors models 8 10 socket usually found laptops requires low-power mobile part special 563-pin µpga package different socket 462 pin package used athlon processors desktop computer motherboards equipped socket 563 pcchips known marketed board m863g ver3 actually made ecs bundled socket 563 processor heatsink
[ 2539, 6599, 2541, 5895, 4931, 7163, 2997, 3362, 1735, 5377, 6351, 913, 7826, 2751, 6545, 6373, 5063, 6655, 6562, 3145, 4090, 866, 694, 5436, 1237 ]
Test
1,144
0
SCIgen:scigen scigen computer program uses context-free grammar randomly generate nonsense form computer science research papers elements papers formed including graphs diagrams citations created scientists massachusetts institute technology stated aim maximize amusement rather coherence opening abstract rooter methodology typical unification access points redundancy 2005 paper generated scigen rooter methodology typical unification access points redundancy accepted non-reviewed paper 2005 world multiconference systemics cybernetics informatics wmsci authors invited speak authors scigen described hoax website soon received great publicity picked slashdot wmsci withdrew invitation scigen team went anyway renting space hotel separately conference delivering series randomly generated talks track organizer wmsci conferences professor nagib callaos 2000 2005 wmsci also sponsored institute electrical electronics engineers ieee stopped granting sponsorship callaos 2006 2008 submitting paper deliberate attempt embarrass wmsci authors claim accepts low-quality papers sends unsolicited requests submissions bulk academics scigen website states computing writer stan kelly-bootle noted acm queue many sentences rooter paper individually plausible regarded posing problem automated detection hoax articles suggested even human readers might taken effective use jargon pun root/router par mit-graduate humor least one occurrence methodology mandatory attribute paper apparent incoherence limited knowledge conclusion reliable gibberish filter requires careful holistic review several peer domain experts pseudonym herbert schlangemann used publish fake scientific articles international conferences claimed practice peer review name taken swedish short film der schlangemann cases published papers withdrawn conferences proceedings conference organizing committee well names keynote speakers removed websites refereeing performed behalf institute electrical electronics engineers also subject criticism fake papers discovered conference publications notably labbé researcher using pseudonym schlangemann cyril labbé grenoble university demonstrated vulnerability h-index calculations based google scholar output feeding large set scigen-generated documents citing effectively academic link farm 2010 paper using method author managed rank ike antkare ahead albert einstein instance
[ 5983, 3581, 7397 ]
Test
1,145
4
SpamBayes:spambayes spambayes bayesian spam filter written python uses techniques laid paul graham essay plan spam subsequently improved gary robinson tim peters among others notable difference conventional bayesian filter filter used spambayes three classifications rather two spam non-spam called ham spambayes unsure user trains message either ham spam filtering message spam filters generate one score ham another spam spam score high ham score low message classified spam spam score low ham score high message classified ham scores high low message classified unsure approach leads low number false positives false negatives may result number unsures need human decision work gone applying spambayes filter internet content via proxy web server
[ 2366, 4734, 5965, 3915, 6102, 3017, 3338 ]
Test
1,146
4
Differential-linear_attack:differential-linear attack introduced martin hellman susan k. langford 1994 differential-linear attack mix linear cryptanalysis differential cryptanalysis attack utilises differential characteristic part cipher probability 1 rounds—this probability would much lower whole cipher rounds immediately following differential characteristic linear approximation defined expect chosen plaintext pair probability linear approximation holding one chosen plaintext lower correct key hellman langford shown attack recover 10 key bits 8-round des 512 chosen plaintexts 80 chance success attack generalised eli biham et al use differential characteristics probability less 1 besides des applied feal idea serpent camellia even stream cipher phelix
[ 1811, 4930, 464, 807, 1353, 2918, 3100, 119, 6015, 6016, 7548, 1283, 6637, 1480, 6647, 7200, 4805, 5765, 5327, 6657, 7928, 1587, 5333, 6763, 6049, 161, 433, 1320, 613, 4917 ]
Test
1,147
8
SoapUI:soapui soapui open-source web service testing application service-oriented architectures soa representational state transfers rest functionality covers web service inspection invoking development simulation mocking functional testing load compliance testing commercial version soapui pro mainly focuses features designed enhance productivity also developed eviware software 2011 smartbear software acquired eviware soapui initially released sourceforge september 2005 free software licensed terms european union public license since initial release soapui downloaded 2,000,000 times built entirely java platform uses swing user interface means soapui cross-platform today soapui also supports idea eclipse netbeans soapui test soap rest web services jms amf well make http jdbc calls core features include soapui pro commercial enterprise version soapui pro adds number productivity enhancements soapui core designed ease many recurring tasks working soapui soapui given number awards include
[ 6986, 2517, 3915, 7315 ]
Test
1,148
4
Context_filtering:context filtering context filtering anti-spam mail policy method deal contents mail rather uses context smtp connection decide whether mail accepted method usually prevents reception e-mail first place thus common anti-spam features like quarantine redirect delete applied method also distorts statistics anti-spam programs usually unknown many mails spam otherwise would received certain connection filtering context includes methods like dnsbl lookups domain ip blacklists etc method extremely low rate false positives false negatives plus side method usually saving bandwidth server utilization common context filter dnsbl filtering efficiency method depends blacklist used high volume mail sites recommended set local copies dnsbls choice fill dns zone transfers reduces permanent traffic external dns lookups dnsbls also allow certain amount queries day every ip address keep expenses bandwidth low
[ 5733, 5673, 2043, 5722, 6908, 3379 ]
Test
1,149
6
USN_Journal:usn journal usn journal update sequence number journal change journal feature ntfs maintains record changes made volume confused journal used ntfs file system journaling windows 2000 released microsoft created ntfs version 3.0 included several new features improvements older versions file system one new system management feature useful certain types applications windows 2000 ntfs 3.0 partitions set keep track changes files directories volume providing record done various objects enabled system records changes made volume usn journal name also used describe feature one journal maintained ntfs volume stored ntfs metafile named extend\ usnjrnl begins empty file whenever change made volume record added file record identified 64-bit update sequence number usn reason change journals sometimes called usn journals record change journal contains usn name file information change change journal describes changes took place using bit flags e.g usn_reason_data_overwrite therefore include data details associated change reason change journal used undo operations files within ntfs usn journal used file history feature introduced windows 8 determine files changed since last backup files changed added history
[ 1710, 6558, 1534 ]
Validation
1,150
3
Non-maskable_interrupt:non-maskable interrupt computing non-maskable interrupt nmi hardware interrupt standard interrupt-masking techniques system ignore typically occurs signal attention non-recoverable hardware errors nmis may masked using proprietary methods specific particular nmi nmi often used response time critical interrupt never disabled normal system operation uses include reporting non-recoverable hardware errors system debugging profiling handling special cases like system resets modern computer architectures typically use nmis handle non-recoverable errors need immediate attention therefore interrupts masked normal operation system errors include non-recoverable internal system chipset errors corruption system memory parity ecc errors data corruption detected system peripheral buses systems computer user trigger nmi hardware software debugging interfaces system reset buttons programmers typically use debugging nmis diagnose fix faulty code cases nmi execute interrupt handler transfers control special monitor program program developer inspect machine memory examine internal state program instant interruption also allows debugging diagnosing computers appear hung older architectures nmis used interrupts typically never disabled required response time hidden signals examples include floppy disk controller amstrad pcw 8087 coprocessor x86 used ibm pc compatibles even though intel recommended connecting normal interrupt low battery signal hp 95lx original ibm pc nmi triggered parity error detected system memory reported external device either case pc would display error message halt later pc clones used nmi conceal hardware differences standard pc computers nmi would generated program attempted access incompatible hardware bios interrupt handler would translate program request match hardware actually present smm 386sl better way 8-bit home computers used nmi line permit warm start system locked typically would restore control registers known good values stored rom without destroying whatever data user might currently loaded commodore 8-bit machines restore key hooked directly indirectly nmi line 6502-series cpu reset would take place nmi handler routine rom detected run/stop also held restore struck combination commodore version three finger salute commodore also connected mos technology 6526 cia 2 c64 c128 processor nmi line part means software emulation 6551 acia accomplished atari 8-bit line used system reset button purpose debugging nmis appeared number forms including apple macintosh programmers button certain key combinations sun workstations introduction windows 2000 microsoft allowed use nmi cause system either break debugger dump contents memory disk reboot debugging nmis also used devices allow leisure users gamers manipulate running programs devices added button generate nmi romantic robot multiface popular accessory 1980s 8-bit 16-bit home computers peripherals small amount rom nmi button pressing button transferred control software peripheral rom allowing suspended program saved disk useful tape-based games disk support also saving games progress screenshots saved printed values memory manipulated—a cheating technique acquire extra lives example computers provide mechanism triggering nmis however many machines typically rackmount servers provide physical button specifically purpose machines may expose functionality via expansion card miles gordon technology disciple +d products zx spectrum featured nmi-producing magic button nintendo entertainment system nmi generated vertical blanking interval nmis often referred vblank interrupts occur frequent regular intervals code manipulates game graphics audio often executed inside nmi handler routine clearing 7th bit ppu 2000 register disables vblank interrupts setting enables
[ 3511, 4479, 6338, 4767, 810, 3365, 4061, 6823, 5060, 6922, 2237, 6753, 7668, 421, 3319, 2332, 5079, 2155, 1052, 3918, 4277, 352, 5087 ]
Test
1,151
5
WTCP:wtcp wtcp wireless transmission control protocol proxy-based modification tcp preserves end-to-end semantics tcp name suggests used wireless networks improve performance tcp wtcp replace tcp hosts placed proxy two communicating hosts wireless systems wtcp placed base station intermediate gateway source host mobile wireless host base station wireless transmitter receiver mobile host acts gateway internet host following highly simplified example happens mobile host source host tcp connection mobile host uses tcp send segment wtcp base station receives sends network eventually reaches awaiting host awaiting host might send acknowledgment back network base station transmits mobile host despite handling wireless-related errors wtcp effectively exactly regular tcp two edge hosts n't even aware wtcp exists instead replacing tcp completely wtcp works enhance tcp performance wireless accomplishes handling negative effects wireless channel including high bit error rates known occur bursts wireless medium detects wireless-related problems lost corrupted segments due multipath fading high ber use timeouts duplicate acknowledgments wtcp attempts mitigate problem retransmitting lost segment receives acknowledgment back mobile host received lost segments wait wtcp buffer first one confirmed received times packets sit wtcp buffer many milliseconds order avoid either tcp end host go congestion avoidance mode due tcp looking segment timestamp determining took long time arrive therefore wrongly assuming due congestion wtcp uniquely hides time spent packets wtcp proxy rtt estimation affected one study wtcp performance wireless wans wtcp showed improvement 20 -200 comparable tcp algorithms new reno vegas snoop
[ 7637, 4561 ]
Validation
1,152
5
Pale_Moon_(web_browser):pale moon web browser pale moon open-source web browser emphasis customizability motto browser way official releases microsoft windows linux unofficial build macos contributed builds various platforms pale moon fork firefox substantial divergence main differences user interface add-on support running single-process mode pale moon retains highly customizable user interface firefox version 4–28 era also continues support types add-ons longer supported firefox pale moon diverged firefox number ways version 26.5 final official release support windows xp version 27.9 final official release support windows vista end xp support quickly followed pale moon getting least two forks take recent pale moon code recompile xp new moon roytam1 mypal feodor2 official releases support older processors without sse2 instruction set however contributed build linux available supports older processors pale moon source code released mozilla public license 2.0 except parts relating branding ensure quality redistribution officially branded pale moon binaries permissible specific circumstances name logo trademarked project founder used without prior permission m.c straver project founder lead developer straver first official release pale moon 2009 rebuild firefox 3.5.2 tweaked compiler settings eventually scope project grew version 24 became true fork firefox 24 esr starting version 25 pale moon uses completely independent versioning scheme pale moon 27 major re-fork core browser code firefox 38 esr added http/2 directx 11 mse/dash javascript es6 capabilities add-on support remained almost entirely unchanged slight reduction jetpack compatibility 2017 team behind pale moon began unified xul platform uxp project uxp actively maintained fork historical fork point mozilla code firefox 52 esr significant modifications codebase updated web technology support creating number xul-based applications demonstrate develop refine platform straver used create new browser basilisk pale moon 28 released august 2018 first version built uxp thereby providing improved support web standards video pale moon android distinct development effort longer maintained first released 2014 straver announced following year would likely abandoned due lack community involvement final release 25.9.6 straver remarked role benchmark tests questionable stating ca n't used draw hard regularly even conclusions plain simple indication nothing serve well compare closely related siblings e.g firefox iceweasel different builds exact browser get relative performance difference two limited subset actually tested far goes br questionable role confirmed leading technology experts example google announced retiring octane benchmark 2017 2013 pale moon bit slower firefox clubcompy real-world benchmark browsers respectively scoring 8,168 9,344 points possible 50,000 2016 browser comparison test ghacks pale moon version 25 smallest memory footprint opening 10 different websites separate tabs however report pale moon scored bottom mozilla kraken google octane 32-bit robohornet tests second-to-last 64-bit robohornet benchmarks whilst browsers hung tests pale moon hung jetstream javascript benchmark current uxp versions pale moon score comparatively browsers benchmarks showing e.g significant difference sunspider benchmark compared firefox quantum
[ 4655, 6802, 5378, 7537, 6809, 1840, 393, 735, 1475, 3291, 2574, 2577, 6452, 6458, 6116, 3655, 4352, 5070, 7573, 4725, 4357, 1136, 7587, 5786, 5787, 6858, 84, 4017, 445, 1152, 1154, 1525, 4755, 4759, 6172, 7975, 7628, 5821, 5127, 1190, 6...
Test
1,153
4
Ruby_Nealon:ruby nealon ruby nealon english computer security researcher age 14 left high school pursue full-time bachelor degree university salford nealon best known publishing 45-second-long video game called watch paint dry onto steam database without approval verification march 2016 born manchester united kingdom nealon enrolled modules open university whilst studying elementary school enabling leave high school early start bachelor degree computer science university salford 14 nealon said interest computer security young age first vulnerability acknowledgement dating back 11 march 2016 nealon exploited chain technical social engineering vulnerabilities steam digital distribution platform allowing release content service store immediately bypassing review procedures put place valve developers service nealon released watch paint dry short rpg maker game featuring picture bedroom wall requiring skill decisions player nealon claimed emailed valve january responsibly disclose issues received response game quickly removed storefront nealon releasing technical details vulnerabilities used expressing discontent valve handled issue nealon able retain product keys game steam publicly sold platform high 40 despite typical gameplay lasting minute length
[ 1805 ]
Test
1,154
2
MacApp:macapp macapp apple computer object oriented application framework classic mac os released 1985 transitioned object pascal c++ 1991 version 3.0 release offered support much system 7 new functionality macapp used variety major applications including adobe photoshop softpress freeway microsoft mfc borland owl based directly macapp concepts period ten years product periods little development followed spurts activity period symantec think class library/think pascal become serious competitor macapp offering simpler model much higher-performance integrated development environment ide symantec slow respond move powerpc platform early 1990s metrowerks first introduced codewarrior/powerplant system 1994 rapidly displaced macapp think primary development platforms mac even apple used codewarrior primary development platform copland era mid-1990s macapp brief reprieve 2000 2001 system transitioning carbon system macos x however demonstrating version worldwide developers conference wwdc june 2001 development cancelled october macapp direct descendant lisa toolkit apple first effort designing object-oriented application framework led larry tesler engineering team toolkit included larry rosenstein scott wallace ken doyle toolkit written custom language known clascal added object-oriented techniques pascal language initially development mac carried using cross-compiler lisa workshop mac sales effectively ended lisa sales effort began build new development platform mac became macintosh programmer workshop mpw part process clascal updated become object pascal lisa toolkit offered design notes became macapp writing mac program without application framework easy task time object-oriented programming field still relatively new considered somewhat suspect many developers early frameworks tended confirm suspicion large slow typically inflexible macapp perhaps first truly usable framework meanings term compiled applications quite reasonable terms size memory footprint performance bad enough make developers shy although simple first releases number follow-up versions quickly addressed main problems point around 1987 system matured useful tool number developers started using major projects point late 1980s market moving towards c++ time apple deep effort release system 7 number major new features decision made transition entirely new version macapp 3.0 would use c++ place object pascal move subject long heated debate proponents object pascal c++ usenet forums nevertheless 3.0 managed garner reasonable following release 1991 even though developer suite mpw growing outdated apple downsized entire developer tools group leaving macapp mpw understaffed one reasons downsizing apple long saga attempting introduce next great platform development almost always form cross-platform system sort first attempt bedrock class library created partnership symantec ran mac windows died lingering death parties eventually gave working one reasons problems creation opendoc developed cross-platform system competed directly bedrock attempts position bedrock opendoc platform nothing ever came developments taking place mpw macapp largely ignored important put developer resources new projects help reach market sooner bedrock failed opendoc found lukewarm reception mac left tools almost decade old could compete newer products third parties early 1990s competing frameworks grew real competitors macapp first symantec tcl garnered following metrowerks powerplant generally took entire market core developers macapp continued work system low activity level throughout 1990s apple official cross-platform projects collapsed late 1996 team announced would providing cross-platform version macapp soon apple purchased next announced openstep would apple primary development platform moving forward name cocoa cocoa already cross-platform time already ported six platforms far advanced macapp led strong protests existing mac programmers protested programs sent penalty box effectively abandoned wwdc'98 steve jobs announced negative feedback move cocoa addressed introduction carbon system carbon would allow existing mac programs run natively new operating system conversion metrowerks announced would porting powerplant framework carbon similar announcement made apple regarding macapp period remained core loyal macapp users grew increasingly frustrated apple behaviour late 1990s introduction cocoa grown outright dismissal product things bad group macapp users went far organize meeting wwdc '98 assumed name order avoid apple staffers refuse room meet ongoing support noticed within apple late 1999 new macapp team consisting members worked along tasked releasing new version included new apple class suites acs thinner layer c++ wrappers many new mac os features introduced openstep macapp 3.0 release xv released 28 august 2001 delight many however october product killed time forever support existing versions macapp officially ended carbon-compliant powerplant x ship 2004 today cocoa almost universal macos ios programming macapp kept alive dedicated group developers maintained enhanced framework since apple stopped supporting 2001 macapp updated fully support carbon events universal binaries unicode text mlte control databrowser control fsrefs xml parsing custom controls composite window drawer window hiview window custom windows macapp also c++ wrapper classes hiobject hiview also pascal version based mainly macapp-2 ported mac os x xcode features long unicode filenames streamed documents automatic byte-swapping macapp supports xcode ide fact wwdc 2005 apple announced transition intel cpus took single developer 48 hours update macapp macapp example apps support universal binaries mac os simple event handing system event structure passed operating system application event type like keypress mouseclick details location modifier keys held application decode simple information action user carried instance clicking menu command decoding could difficult running lists on-screen objects checking event took place within bounds macapp provided solution problem using command pattern user actions encapsulated objects containing event details sent proper object carry logic mapping event proper object handled entirely within framework runtime greatly decreasing complexity task role macapp internal machinery take basic os events translate semantically higher-level commands route command proper object macapp relieve author write code every program requires also side-effect design cleanly separated code commands user-facing actions handlers internal code work instance one might commands turn green turn red handled single function codice_1 program cleanly separated commands handlers known apple parlance factored factoring program particularly important later versions mac os starting system 7 system 7 introduced apple events system expanded original mac os event system much richer one could sent applications os particular application combined applescript system allowed events generated scripting code macapp 3.0 apple events decoded commands initiated direct user actions meaning developer n't write much code directly handle apple events major problem developers using earlier systems including macapp 2.0 separation often led apple event support left keeping role application framework macapp also included number pre-rolled objects covering basic mac gui—windows menus dialogs similar widgets represented within system unfortunately apple typically supplied lightweight wrappers existing internal mac os code instead providing systems usable real world instance codice_2 class offered standard text editor widget underlying textedit implementation severely limited apple often stated used professional applications result developers often forced buy add-on objects address sorts needs roll lack set professional quality gui objects considered one macapp biggest problems problem addressed release macapp r16 macapp r16 uses standard carbon controls macapp gui objects instance carbon introduced multilingual text engine mlte full unicode text long-document support r16 original codice_2 class superseded codice_4 uses mlte control
[ 1152, 2451, 5983, 5101, 4759, 1445, 2379, 2639, 6428, 7438, 2740, 8085, 6352, 3368, 6009, 1840, 2568, 486, 405, 930, 6029, 3212, 6116, 5948, 5321, 149, 3398, 6933, 7573, 4453, 1599, 5965, 3915, 6674, 7308, 5786, 1895, 5787, 7310, 4017, ...
Test
1,155
6
Concurrent_Versions_System:concurrent versions system concurrent versions system cvs also known concurrent versioning system free client-server revision control system field software development version control system keeps track work changes set files allows several developers potentially widely separated space time collaborate dick grune developed cvs series shell scripts july 1986 addition proprietary software developers cvs became popular open-source software world released gnu general public license regular development add features fix bugs past including regular builds test results new releases since 2008 cvs uses client–server architecture server stores current version project history clients connect server order check complete copy project work copy later check changes typically client server connect lan internet client server may run machine cvs task keeping track version history project local developers server software normally runs unix although least cvsnt server also supports various flavours microsoft windows cvs clients may run major operating-system platform several developers may work project concurrently one editing files within working copy project sending checking modifications server avoid conflicts server accepts changes made recent version file developers therefore expected keep working copy up-to-date incorporating people changes regular basis task mostly handled automatically cvs client requiring manual intervention edit conflict arises checked-in modification yet-unchecked local version file check operation succeeds version numbers files involved automatically increment cvs-server writes user-supplied description line date author name log files cvs also run external user-specified log processing scripts following commit scripts installed entry cvs loginfo file trigger email notification convert log data web-based format clients also compare versions request complete history changes check historical snapshot project given date revision number project-wide revision number cvs servers allow anonymous read access wherein clients may check compare versions either blank simple published password e.g. anoncvs check-in changes requires personal account password scenarios clients also use update command bring local copies up-to-date newest version server eliminates need repeated downloading whole project cvs also maintain different branches project instance released version software project may form one branch used bug fixes version current development major changes new features form separate branch cvs uses delta compression efficient storage different versions file works well large text files changes one version next usually case source code files hand cvs told store file binary keep individual version server storing files binary important order avoid corruption binary files cvs labels single project set related files manages module cvs server stores modules manages repository programmers acquire copies modules checking checked-out files serve working copy sandbox workspace changes working copy reflected repository committing update acquire merge changes repository working copy cvs designed dick grune developed cvs front end revision control system rcs older version control system manages individual files whole projects grune publicly released code june 23 1986 code eventually evolved current version cvs started brian berliner april 1989 later input jeff polk many contributors brian berliner wrote paper introducing improvements cvs program—which describes tool extended used internally prisma third-party developer working sunos kernel released benefit community gpl november 19 1990 cvs version 1.0 submitted free software foundation development distribution cvs supports distributed multi-site offline operations due unreliability computer networks existed time cvs evolved official recent announcements indicating project status development microsoft windows linux solaris hpux i5os mac os x port cvs split separate project named cvsnt current active development relationship cvs gnu project long somewhat ambiguous gnu web site distributed program labelling gnu package one page gpl-licensed project another 2008 development cvs transferred old website cvshome.org gnu savannah hosting platform placed non-gnu section gnu ftp download server cvs distributed non-gnu directory time developers created new version control systems based cvs order add features alter operational model improve developers productivity cvs replacement projects include cvsnt first released 1998 subversion initially released 2004 evs first released 2008
[ 1906, 6414, 4028, 4296, 4759, 7516, 2379, 5373, 2011, 5912, 1737, 3534, 5571, 6630, 574, 3110, 3463, 578, 4562, 7656, 6743, 4070, 6386, 7933, 7308, 5348, 5882, 1991, 6785, 1435 ]
Test
1,156
4
Pwdump:pwdump pwdump name various windows programs output lm ntlm password hashes local user accounts security account manager sam order work must run administrator account able access administrator account computer hashes dumped pwdump could said compromise security could allow malicious administrator access user passwords initial program called pwdump written jeremy allison published source code 1997 see open-source since developments programmers
[ 5410, 3512 ]
Test
1,157
9
Van_Wijngaarden_grammar:van wijngaarden grammar computer science van wijngaarden grammar also vw-grammar w-grammar two-level grammar provides technique define potentially infinite context-free grammars finite number rules formalism invented adriaan van wijngaarden define rigorously syntactic restrictions previously formulated natural language despite essentially syntactical content typical applications treatment gender number natural language syntax well-definedness identifiers programming languages example one person two people grammatically correct one person incorrect context-sensitive reasons w-grammar could represent technique used developed definition programming language algol 68 example larger class affix grammars w-grammar consists finite set meta-rules used derive possibly infinitely many production rules finite set hyper-rules meta-rules restricted defined context-free grammar hyper-rules restrict admissible contexts upper level essentially consistent substitution used derivation process equivalent unification prolog noted alain colmerauer example assignment codice_1 valid variable x contain integer therefore context-free syntax codice_2 incomplete two-level grammar might specified context-sensitive manner codice_3 codice_4 could production rule codice_5 possible production rule also means assigning incompatible types becomes syntax error caught compile-time similarly allows codice_6 codice_7 codice_8 prior algol 68 language algol 60 formalised using context-free backus–naur form appearance new context-sensitive two-level grammar presented challenge readers 1968 algol 68 final report subsequently final report revised wijngaarden colleagues published 1973 algol 68 revised report grammar algol 68 officially defined two-level van wijngaarden grammar subset done one-level backus–naur form compare program open symbol standard prelude program strong void new closed clause yo-yo parser van wijngaarden grammars example grammars expressions eva sal pascal actual iso 7185 standard pascal uses extended backus–naur form w-grammars based idea providing nonterminal symbols context-free grammars attributes affixes pass information nodes parse tree used constrain syntax specify semantics idea well known time e.g donald knuth visited algol 68 design committee developing version attribute grammars quite peculiar w-grammars strict treatment attributes strings defined context-free grammar concatenation possible operation attribute grammars attributes data type kind operation applied introduction algol 68 report w-grammars widely considered powerful unconstrained practical partly consequence way applied revised algol 68 report contained much readable grammar without modifying w-grammar formalism meanwhile became clear w-grammars indeed powerful describe precisely recursively enumerable languages makes parsing impossible general undecidable problem decide whether given string generated given w-grammar use must seriously constrained used automatic parsing translation restricted modified variants w-grammars developed address e.g anthony fisher written parser large class w-grammars dick grune created c program would generate possible productions 2-level grammar applications eags mentioned effectively regarded applications w-grammars since eags close w-grammars w-grammars also proposed description complex human actions ergonomics
[ 7375, 1365, 5498, 1114, 5948, 4302, 6466, 5326, 2852, 1435 ]
Test
1,158
9
Rosetta_Code:rosetta code rosetta code wiki-based programming chrestomathy website implementations common algorithms solutions various programming problems many different programming languages rosetta code created 2007 michael mol site content licensed gnu free documentation license 1.2 though components may dual-licensed permissive terms rosetta code web repository illustrates desired functionality implemented differently various programming paradigms task accomplished different programming languages rosetta code rosetta code site organized browsable cross-section tasks specific programming problems considerations computer programming languages task page displays visitor-contributed solutions various computer languages allowing viewer compare language approach task stated problem task pages included per-language listings based languages provided solutions task solution c programming language appear listing c. task solution ruby task appear listing ruby well computer programming languages found rosetta code include complete list computer programming languages examples entries/solutions rosetta code tasks available tasks found rosetta code include
[ 361, 2451, 5983, 1445, 12, 4039, 993, 6428, 5117, 2740, 304, 486, 5932, 5137, 4705, 6029, 3981, 4070, 1114, 5948, 5506, 1774, 8122, 7032, 3410, 1889, 5965, 1892, 2803, 2619, 5091, 1435 ]
Test
1,159
8
Orb_(software):orb software orb freeware streaming software enabled users remotely access personal digital media files including pictures music videos television could used internet-enabled device including laptops pocket pc smartphones ps3 xbox 360 wii video game consoles 2013 orb networks inc. announced acquired strategic partner would shutting operations also 2013 co-founder luc julia indicated orb networks technology acquired qualcomm accompanying press release issued orb website accessed may 2014 announced ... year ago orb team technology acquired qualcomm connected experiences inc. orb networks longer offering orb software downloads support web based products orblive mycast statement invited people check qualcomm allplay media platform specify orb software may utilized orb available windows media center pcs users create online account remotely access computer music pictures video files stored home computer made available streaming provided computer connected internet media files transcoded streamed directly pc available download use file explorer plug-in current version orb used replacement microsoft windows media connect software computers running windows operating system allows xbox 360 playstation 3 consoles access videos audios images computer orb installed natively allows user also watch videos windows media video format without previously re-transcoded videos orb transcode video files computer fly requested long computer running orb correct codec tv tuner card installed pc live tv also available streaming furthermore orb offers dvr functionality like tivo one schedule tv recordings stream recorded video files remotely via web-based interface true webcam also webcam surveillance feature orb also allows user share photos videos without upload online service one select files one wants share enter email address person access data person receive email link view files orb supports streaming windows media realplayer 3gp flash format supporting wide range 3g cell phones including iphone orb detect type device used adapt stream according player availability network quality example nokia n80 orb use native web browser realplayer device used connect local network pc orb running connect directly stream pc without going internet provided firewall blocks connection provides much higher bit rate quality streaming inside lan orb 2.0 beta ajax-based offers home page similar google personalized homepage netvibes organized tabs tab containing user-defined modules tv guide personal media files rss/atom feeds youtube videos local weather forecast etc ... similar solutions synology slingbox require pc comes hardware another similar solution remote access ifunpix additionally includes tools create upload content personal mini-site support video well audio music unlike orb ifunpix uses proxy storage server user home computer help prevent attacks source computer ifunpix able stream live television also tversity another freeware program much like orb similar solution remote access via mobile younity well orbweb.me products enable mobile access digital files computer
[ 6788, 6874, 1159, 3915, 4759, 5571, 2591, 3615, 578, 5668, 7169 ]
Test
1,160
3
Sun_Fire_15K:sun fire 15k sun fire 15k codenamed starcat enterprise-class server computer sun microsystems based sparc v9 processor architecture announced september 25 2001 new york city superseding sun enterprise 10000 general availability january 2002 last shipped may 2005 sun fire 15k supported 106 ultrasparc iii processors 1.2 ghz 72 ultrasparc ivs 1.35 ghz installed across 18 system boards uniboards containing cpu sockets ram slots ultrasparc iii sun supported 17 dual-socket maxcpu processor cards place i/o mezzanine cards configuration supported ultrasparc iv maximum physical ram per system 576 gb maximum 72 pci i/o slots available system divided maximum 18 secure independent domains separate machine filesystems root password ability run different versions solaris e15k along enterprise sun servers dynamic reconfiguration feature administrators could dynamically change assignment ram processors different domains meet changes business needs addition 15k contains two system controllers duplicated redundancy embedded sparc computers running solaris used manage 15k perform tasks booting shutting domains assigning uniboards domains 15k contains minimal storage system controller boot disks connected via san separate storage array sun fire 12k codenamed starkitty reduced configuration version 15k introduced april 2002 supported maximum 52 processors intended fill position sun server product line 15k sun fire 6800 sun fire e25k codenamed amazon 25 e denoting enterprise announced february 2004 base cabinet identical 15k difference two systems processor boards installed reached end-of-life january 2009 superseded sun sparc enterprise m9000 server e25k supports 72 dual-core ultrasparc iv+ processors 1.95 ghz ultrasparc iv-based 15k systems maxcpu option offered e25k systems overall system bandwidth claimed 172.8 gb/s aggregate 115.2 gb/s peak 43.2 gb/s sustained overall i/o bandwidth 35.8-gb/s sustained 64 gb ram per board possible maximum 1.15 tb ram single domain 72 hot swappable pci-x i/o slots 54 slots 90 mhz 18 slots 33 mhz also supports 10/100 baset ethernet gigabit ethernet ultrascsi lvd hvd atm fc-al hsi sci
[ 4515, 7037, 1185, 2299, 4199, 8145, 418, 971 ]
Test
1,161
2
Windows.h:windows.h windows.h windows-specific header file c c++ programming languages contains declarations functions windows api common macros used windows programmers data types used various functions subsystems defines large number windows specific functions used c. win32 api added c programming project including windows.h header file linking appropriate libraries use functions xxxx .dll program must linked xxxx .lib lib xxxx .dll.a mingw headers associated .dll static library e.g scrnsave.h needs scrnsave.lib number child header files automatically included windows.h many files simply included self-contained dependencies windows.h may include following header files several macros affect behavior windows.h
[ 3407, 2769, 4759, 6256, 6840, 5910, 4017, 1435 ]
Test
1,162
3
WinChip:winchip winchip series low-power socket 7-based x86 processor designed centaur technology marketed parent company idt design winchip quite different processors time instead large gate count die area idt using experience risc processor market created small electrically efficient processor similar 80486 single pipeline in-order execution microarchitecture much simpler design socket 7 competitors amd k5/k6 intel pentium superscalar based dynamic translation buffered micro-operations advanced instruction reordering order execution winchip general designed perform well popular applications n't many floating point calculations included operating systems time majority software used businesses also designed drop-in replacement complex thus expensive processors competing allowed idt/centaur take advantage established system platform intel socket 7 winchip 2 update c6 retained simple in-order execution pipeline predecessor added dual mmx/3dnow processing units could operate superscalar execution made non-amd cpu socket 7 support 3dnow instructions winchip 2a added fractional multipliers adopted 100 mhz front side bus improve memory access l2 cache performance also adopted performance rating nomenclature instead reporting real clock speed similar contemporary amd cyrix processors another revision winchip 2b also planned featured die shrink 0.25 μm shipped limited numbers third model winchip 3 planned well meant receive doubled l1 cache w3 cpu never made market although small die size low power-usage made processor notably inexpensive manufacture never gained much market share winchip c6 competitor intel pentium pentium mmx cyrix 6x86 amd k5/k6 performed adequately applications used little floating point math floating point performance simply well pentium k6 even slower cyrix 6x86 industry move away socket 7 release intel celeron processor signalled end winchip 1999 centaur technology division idt sold via although via branded processors cyrix company initially used technology similar winchip cyrix iii line
[ 2449, 2541, 6170, 3002, 2744, 5571, 5750, 5669, 3385, 7280, 5947, 6772, 866, 7499, 1237, 352, 441, 2263 ]
Test
1,163
7
KVH_Co._Ltd.:kvh co. ltd. kvh co. ltd. previously known kvh telecom founded fidelity investments 1999 asia-pacific it/communications service provider facility-based optical fiber networks data centers cloud services platform kvh information delivery platform providing integrated communication solutions enterprise businesses kvh serves media manufacturing carrier financial services key customer segments offers customers bilingual support japanese english kvh specializes operating developing low latency networks financial services industry provides low latency connectivity major japanese exchanges kvh fiber backbone features flat network hierarchy media converters network devices making lowest latency network metropolitan japan headquartered tokyo japan kvh also points presence pops osaka hong kong singapore chicago new york sydney seoul busan partner networks europe asia pacific region edward ted higase appointed kvh president chief executive officer representative director may 16 2012 november 12 2014 colt london-based telecom firm announced acquisition kvh kvh part colt group s.a. acquisition combined kvh colt colt group operates 28 countries across europe asia u.s. metropolitan area networks 47 major cities connections 200 cities globally established fidelity investments april 1999 kvh began constructing low latency fiber optic networks tokyo osaka following dot-com crisis 2000 kvh one foreign-owned carriers continued invest business japan 2001 kvh introduced first 2.4 gbit/s leased line services japan opened first data center osaka following year kvh opened second data center japan first tokyo kvh tokyo data center 1 tdc1 tdc1 second largest data center tokyo accompanied launch kvh ethernet services voice tdm services co-location data center operational services within year since kvh expanding portfolio services well presence across asia-pacific region today kvh network extends beyond japan connects chicago singapore hong kong february 2011 kvh opened tokyo data center 2 tdc2 located inzai city chiba 2012 kvh singapore pte ltd. kvh services llc kvh hong kong ltd. kvh korea ltd. established march 2013 kvh launched japan ’ first 100g metro ethernet network service april 2013 kvh expanded business asia pacific launched two data centers hong kong singapore kvh hong kong data center 1 hkdc1 kvh singapore data center 1 sgdc1 10-site cloud platform reaching across europe asia november 12 2014 colt london-based telecom firm announced acquisition kvh
[ 2961 ]
Test
1,164
3
Teenage_Mutant_Ninja_Turtles_(NES_video_game):teenage mutant ninja turtles nes video game teenage mutant ninja turtles 1989 side-scrolling platform game nintendo entertainment system released konami north america published ultra games imprint usa equivalent palcom brand europe/australia alongside arcade game also developed konami one first video games based 1987 teenage mutant ninja turtles animated series released show second season ninja turtles leonardo raphael michelangelo donatello mission retrieve life transformer gun shredder device could restore sensei splinter back human form turtles first objective rescue reporter friend april o'neil held captive bebop rocksteady somewhere city rescuing april turtles must swim underwater disarm series bombs set destroy dam rescue splinter mecha turtle destroy giant mouser find technodrome eventually defeat shredder teenage mutant ninja turtles single-player action game player starts game leonardo switch turtles time pressing start button access information screen information screen shows turtle health whatever special weapon obtained map grid current area messages either splinter april turtle unique primary weapon different speed power reach player current character runs health falls fatal trap run roller car captured enemy forcing player change one remaining turtles player loses game four turtles captured opportunity rescue captured turtle stage beginning stage 3 total six stages game player navigates mission map overhead view travel doors manholes entrances side-scrolling interior levels represent primary gameplay overhead view player move four cardinal directions use primary weapon single type attack game progresses obstacles enemies appear overhead maps side-scrolling levels turtles jump crouch attack either primary weapons jumping walking crouching use one alternate weapons picked along way special weapons include single shurikens throwing stars triple shurikens launches three stars simultaneously spreading pattern boomerangs kiai scroll expands crescent-shaped beam inflicts devastating damage even boss characters items occasionally dropped enemies special weapons obtained limited quantities although boomerangs reused player catches return primary weapon aimed upwards downwards levels specific objective obtaining item defeating boss etc. however levels goal reach exit return overhead map previously inaccessible location player encounters enemy characters acquires weapons special items collects pizza restore health second half stage 2 turtles dive hudson river using underwater version side-scrolling gameplay level turtles must navigate number traps time limit two minutes twenty seconds find disarm eight time bombs game released family computer famicom japan months earlier american nes version title first t.m.n.t product released country predating japanese dub first film animated series subsequent t.m.n.t video games released japan kept franchise original title graphics gameplay virtually identical nes counterpart japanese localization changed plot bit turning april o'neil acquaintance turtles splinter daughter game released teenage mutant hero turtles european territories australian version released series original title australia always used ninja title different box game ported various home computer platforms 1990 including commodore 64 zx spectrum atari st amiga game uk number 1 selling spectrum game 6 months march august 1991 dos amiga versions infamous contain gap impossible cross without cheating glitch also released 2007 wii virtual console released wii europe australia 500 points later raised 600 wii points north america released wii april 2 2007 price 600 points—100 points average nes game—due licensing issue first licensed game appear north american european virtual console due licensing issues later removed wii shop channel japan january 24 2012 north america europe january 26 2012 game mixed reviews gamespot frank provo gave teenage mutant ninja turtles 2.7 10 citing game hard difficulty game unpolished unfun nature reasons rating provo also stated game music upbeat music game general lacks recognizable traits teenage mutant ninja turtles franchise mark birnbaum ign gave teenage mutant ninja turtles 5.5 10 pointing game dated nostalgic hardcore fans birnbaum stated controls poor enemies bland level design characters negatives game sinclair gave game 90 rating praising game colorful cartoonish graphics move sets also criticizing game swimming level game got 3 sequels 1990 1991 1992
[ 8015, 1508 ]
Test
1,165
7
Aplos_Software:aplos software aplos software privately held company specializes software service nonprofit organizations primary focus simple software manage essential nonprofit tasks fund accounting nonprofit tax preparation donor management small mid-sized large non-profit organizations aplos software founded 2009 fresno california dan kelly tim goetz certified public accountant tim goetz previously served executive pastor church helped found two nonprofits could n't find low-cost fund accounting solution wanted nonprofits joined fresno-based investor shared vision serve nonprofit sector simple affordable software founded aplos software aplos software focused software simplifying primary back office tasks required manage nonprofit private foundation foundation nonprofit charitable organization church nonprofit fund accounting differs business accounting often necessary track restricted unrestricted funds separately often occurs donor grant specifies organization must use funds specific purpose accounting software must track funds used much available aplos first launched online fund accounting software aplos accounting 2011 popular competitive accounting product small mid-sized nonprofits quickbooks october 2012 aplos software launched aplos oversight online software provides administrator accountant real-time access accounting multiple organizations summer 2012 aplos software approved irs efile provider submit irs tax forms behalf tax-exempt organizations october 2012 launched aplos e-file tax preparation filing software irs form 990-n. irs form 990-n annual electronic irs filing tax-exempt organizations less 50,000 annual gross receipts 2013 aplos added tax preparation e-file software irs form 990-ez required schedules aplos e-file irs form 990-ez short form full form 990 irs tax forms available organizations 200,000 gross receipts 500,000 assets aplos software also focused expanding fundraising donation tracking aspects software since 2012 make successful vertical market nonprofits launched contributions management module 2012 tracked donations within aplos accounting created contribution statements annual giving receipts required irs july 2013 began offering donor management module may 2017 expanded module launch stand-alone product aplos donor management according chronicle philanthropy nonprofits increasingly creating initiatives accept donations online growth online giving outpaced traditional methods 2012 keep pace growing popularity requests customers online giving platform aplos software expanded fundraising functionality january 2014 partnering wepay online payment portal add ability nonprofits accept online donations
[ 3668, 7766, 5258, 7332, 696, 330 ]
Test
1,166
4
M³AAWG:m³aawg messaging malware mobile anti-abuse working group m3aawg usually spelled m³aawg international information technology industry forum works reduce threat bots malware spam viruses dos attacks online exploitations one largest global organizations working forms messaging abuse represents billion mailboxes among global membership started group internet service providers mobile network operators telecommunications companies infrastructure vendors anti-spam technology vendors early 2004 fight spam help protect end-users spirit collaboration expanded include email service providers vetted parties interested safeguarding online ecosystem organization initially started maawg messaging anti-abuse working group spam morphed widely recognized vector spreading malware threats organization changed name messaging malware mobile anti-abuse working group 2012 better reflect scope work m3aawg three levels membership role m3aawg bring various aspects industry together discuss related anti-abuse issues based cooperative effort produce best practices public policy comments white papers materials also provides opportunity professionals share abuse information experience peers among currently available published best practices document help hosting service providers prevent abuse jointly published i2coalition anti-abuse recommendations messaging service providers best practices high-volume email marketing senders email service providers updated white paper email authentication m3aawg published first best practices mitigating bot infections residential networks july 2009 incorporated ietf rfc 6561 years later although m3aawg lobby government public policy matters supply factual information government organizations develop relevant policy legislation example anti-abuse issues proposed m3aawg holds three members-only meetings year two north america one europe four-day long meetings organized around multi-track conference sessions colleagues public policy representatives best practices document working sessions training courses global networking opportunities meetings often held conjunction relevant organizations past m3aawg hosted london action plan lap gsm association security group gsma-sg anti-phishing working group associations meetings june 2015 m3aawg jointly published global operation safety-net best practices london action plan cooperative global effort industry government experts written plain language describes common online threats currently facing businesses governments end-users along proven best practices mitigate m3aawg also publishes email metrics reports tracking volume abusive email using aggregated data provided m3aawg member isps email providers network operators bot metrics report detailing number subscribers identified system infected malware also known bot also conducted two surveys looking consumers email practices 2009 published survey north american users titled course never click spam except sometimes 2010 expanded survey cover north america europe youtube channel 70 training industry keynote short topical videos wide range computer security cybercrime topics training videos range isps identify clean malware customers systems tutorial using bettercrypto guide easily implement encryption keynotes include presentations state industry renowned security experts dan geer brian snow among others among many industry partners eastwest institute presented ewi 2013 cybersecurity award m3aawg recognition anti-abuse outreach india china facilitating cybersecurity global collaboration
[ 5401, 1766, 1898 ]
Validation
1,167
3
Gumstix:gumstix gumstix american multinational corporation headquartered redwood city california develops manufactures small system boards comparable size stick gum 2003 first fully functional used arm architecture system chip soc operating system based linux 2.6 kernel online tool called geppetto allows users design boards august 2013 started crowd-funding service allow group users want get custom design manufactured share setup costs also runs windows embedded compact
[ 1066, 2538, 4846, 289, 469, 3524, 4400, 4317, 203, 5740, 6443, 578, 1284, 5750, 6910, 1202, 7654, 5055, 5236, 2765, 7919, 1864, 6378, 4627, 3734, 1779, 1973, 950, 1977, 2338, 352, 1702, 7049 ]
Test
1,168
4
Random_number_generator_attack:random number generator attack security cryptographic systems depends secret data known authorized persons unknown unpredictable others achieve unpredictability randomization typically employed modern cryptographic protocols often require frequent generation random quantities cryptographic attacks subvert exploit weaknesses process known random number generator attacks high quality random number generation rng process almost always required security lack quality generally provides attack vulnerabilities leads lack security even complete compromise cryptographic systems rng process particularly attractive attackers typically single isolated hardware software component easy locate attacker substitute pseudo-random bits generated way predict security totally compromised yet generally undetectable upstream test bits furthermore attacks require single access system compromised data need sent back contrast say computer virus steals keys e-mails drop point humans generally poorly generating random quantities magicians professional gamblers con artists depend predictability human behavior world war ii german code clerks instructed select three letters random initial rotor setting enigma machine message instead chose predictable values like girlfriend initials greatly aiding allied breaking encryption systems another example often predictable ways computer users choose passwords see password cracking nevertheless specific case playing mixed strategy games use human gameplay entropy randomness generation studied ran halprin moni naor components cryptosystem software random number generator designed resist certain attacks attacks possible rng include number attacks hardware random number generators possible including trying capture radio-frequency emissions computer obtaining hard drive interrupt times motor noise example trying feed controlled signals supposedly random source turning lights lava lamp feeding strong known signal sound card subverted random numbers created using cryptographically secure pseudorandom number generator seed value known attacker concealed software relatively short say 24 40 bit portion seed truly random prevent tell-tale repetitions long enough prevent attacker recovering say randomly produced key random numbers typically go several layers hardware software used bits may generated peripheral device sent serial cable collected operating system utility retrieved system call subverted bits substituted point process little likelihood detection hardware circuit produce subverted bits built integrated circuit millimeters square sophisticated hardware random number generator subverted placing chip anywhere upstream source randomness digitized say output driver chip even cable connecting rng computer subversion chip include clock limit start operation time unit first turned run acceptance tests contain radio receiver on/off control could installed manufacturer behest national signals intelligence service added later anyone physical access cpu chips built-in hardware random number generators replaced compatible chips subverted rng chips firmware designing secure random number generator requires least high level care designing elements cryptographic system early versions netscape secure socket layer ssl encryption protocol used pseudo-random quantities derived prng seeded three variable values time day process id parent process id quantities often relatively predictable little entropy less random version ssl found insecure result problem reported netscape 1994 phillip hallam-baker researcher cern web team fixed prior release problem running code discovered 1995 ian goldberg david wagner reverse engineer object code netscape refused reveal details random number generation security obscurity rng fixed later releases version 2 higher robust i.e. random higher entropy attacker perspective seeding microsoft uses unpublished algorithm generate random values windows operating system random quantities made available users via cryptgenrandom utility november 2007 leo dorrendorf et al hebrew university jerusalem university haifa published paper titled cryptanalysis random number generator windows operating system paper presented serious weaknesses microsoft approach time paper conclusions based disassembly code windows 2000 according microsoft applied windows xp well microsoft stated problems described paper addressed subsequent releases windows use different rng implementation u.s. national institute standards technology published collection deterministic random bit generators recommends nist special publication 800-90 one generators dual_ec_drbg favored national security agency dual_ec_drbg uses elliptic curve technology includes set recommended constants august 2007 dan shumow niels ferguson microsoft showed constants could constructed way create kleptographic backdoor algorithm september 2013 new york times wrote n.s.a inserted back door 2006 standard adopted n.i.s.t ... called dual ec drbg standard thereby revealing nsa carried malware attack american people december 2013 reuters reported documents released edward snowden indicated nsa paid rsa security 10 million make dual_ec_drbg default encryption software raised concerns algorithm might contain backdoor nsa due concerns 2014 nist withdrew dual ec drbg draft guidance random number generators recommending current users dual_ec_drbg transition one three remaining approved algorithms quickly possible crypto-1 cryptosystem developed nxp use mifare chips system proprietary originally algorithm published upon reverse engineering chip researchers university virginia chaos computer club found attack crypto-1 exploiting poorly initialized random number generator may 2008 security researcher luciano bello revealed discovery changes made 2006 random number generator version openssl package distributed debian gnu/linux debian-based distributions ubuntu dramatically reduced entropy generated values made variety security keys vulnerable attack security weakness caused changes made openssl code debian developer response compiler warnings apparently redundant code caused massive worldwide regeneration keys despite attention issue got could assumed many old keys still use key types affected include ssh keys openvpn keys dnssec keys key material use x.509 certificates session keys used ssl/tls connections keys generated gnupg gnutls affected programs used different methods generate random numbers keys generated non-debian-based linux distributions also unaffected weak-key-generation vulnerability promptly patched reported services still using keys generated old code remain vulnerable number software packages contain checks weak key blacklist attempt prevent use remaining weak keys researchers continue find weak key implementations december 2010 group calling fail0verflow announced recovery elliptic curve digital signature algorithm ecdsa private key used sony sign software playstation 3 game console attack made possible sony failed generate new random nonce signature analysis comparing millions rsa public keys gathered internet announced 2012 lenstra hughes augier bos kleinjung wachter able factor 0.2 keys using euclid algorithm exploited weakness unique cryptosystems based integer factorization one public key another chance simple computation factors n n ′ totally compromising keys nadia heninger part group similar experiment said bad keys occurred almost entirely embedded applications explains one-shared-prime problem uncovered two groups results situations pseudorandom number generator poorly seeded initially reseeded generation first second primes august 2013 revealed bugs java class securerandom could generate collisions k nonce values used ecdsa implementations bitcoin android occurred private key could recovered turn allowing stealing bitcoins containing wallet
[ 363, 794, 887, 4759, 6795, 1173, 1460, 5824, 8189, 8093, 6540, 1559, 5399, 5401, 7093, 744, 6458, 6553, 2587, 4071, 7282, 7567, 7925, 762, 2691, 6046, 6049, 4990, 5606, 7214, 1505, 74, 1237, 3588, 1059, 1513, 2620, 359 ]
Test
1,169
3
HardBall!:hardball hardball baseball video game published accolade released variety home computers 1985 1987 sega genesis version published 1991 game followed sequels hardball ii hardball iii hardball iv hardball 5 hardball 6 play controlled joystick arrow keys action button one four cardinal directions used choose pitch aim towards low high inside towards batter outside away batter directions used aim swing batting fielding hit defensive player closest ball flash show one currently control four directions used throw one four bases hardball one first baseball video games incorporate perspective pitcher mound similar mlb broadcasts also managerial options available player selection pitchers choose team member statistics affect performance rearranged desired prior hardball release managerial baseball games available microleague baseball hardball first integrate aspect arcade control game action hardball accolade best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 info rated hardball four-plus stars five stating easily best baseball simulation seen date 64/128 praising graphics analog computing praised atari 8-bit version gameplay graphic animation criticizing computer opponent low difficulty level magazine concluded game league atari sports games—simulations included overview statistics-oriented baseball games computer gaming world stated hardball would probably disappointing anyone avid arcade fan compute apple applications stated apple ii macintosh versions almost everything could want baseball simulation good support playing manager player statistician exceptionally clear precise graphics magazine concluded hardball realism outstanding—at level unmatched baseball software date game reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars entertainment weekly picked game 11 greatest game available 1991 saying oversaturated colors ultrarealistic sound effects umpire shouts 'play ball sounds ’ room detailed managerial options hardball closest may ever get playing real major-league ballpark game appears opening scene 1987 film princess bride played fred savage
[ 6380 ]
Test
1,170
9
Metacompilation:metacompilation metacompilation computation involves metasystem transitions mst computing machine metamachine controls analyzes imitates work semantics-based program transformation partial evaluation supercompilation scp metacomputation metasystem transitions may repeated program transformer gets transformed manner mst hierarchies height formed fox paper reviews one strain research started russia valentin turchin refal system late 1960s-early 1970s became known development supercompilation distinct method program transformation brief description history research line paper concentrates results problems supercompilation combined repeated metasystem transitions
[ 1361, 3499, 7416 ]
Test
1,171
2
Internet_Connect:internet connect internet connect program mac os x allows user activate dial-up connections internet via isp vpn also provides simple way connect airport network latest version mac os x 10.4 internet connect application provides general tools detailed network pane system preferences allows user configure control systemwide network settings however mac os x 10.5 internet connect functions incorporated network pane system preferences application longer included use internet connect generally necessary macintosh connected internet ethernet device dsl cable internet service except manage connections subordinate bluetooth equipment
[ 8051, 2627, 7609, 3940, 7335, 713, 6342, 5109, 3445, 2284, 997, 569, 1187, 4690, 5571, 6188, 734, 7000, 1562, 6909, 6548, 502, 6557, 6295, 2679, 4975, 3989, 2597, 6565, 2145, 3322, 2880, 1502, 163, 3151, 6582, 5786, 4740, 1897, 4014, 55...
Test
1,172
2
Carbide.c++:carbide.c++ carbide.c++ software development tool c++ development symbian os used develop phones use os well applications run phones based eclipse ide platform enhanced extra plug-ins support symbian os development product provided symbian foundation open source model april 2009 nokia transferred carbide.c++ many software developer tools symbian foundation members symbian community manage contribute code carbide.c++ product carbide.c++ provided symbian foundation two different tool packages adt pdt basic installers include carbide.c++ several eclipse-based plug-ins several stand-alone tools adt/pdt v1 contains carbide.c++ v2.0.4 br adt/pdt v2 q4 2009 targeted contain carbide.c++ v2.2 carbide.c++ based latest versions eclipse ide eclipse cdt extended symbian os -specific features currently supports winscw x86 c++ compiler found codewarrior production emulator binaries target binaries supports gcc arm rvct compilers sold separately winscw gcc compilers actually provided sdk explicitly included carbide ide carbide.c++ branched parts cdt nearly contained within added plug-ins added top eclipse branches mostly relate different semantics codewarrior debugger engine compared gdb eclipse previously supported carbide.c++ similar standard eclipse installation still used types development java perl provided correct plug-ins installed using eclipse self-update mechanism similarly ought possible produce product similar functionality carbide.c++ moving carbide.c++ plug-ins standard eclipse installation currently facility offered nokia carbide.c++ supports symbian build system v1 v2 aka raptor former perl-based build system latter built using python supports next generation symbian os operating systems main advantage supporting sbsv1 v2 carbide users create command-line builds parallel ide builds manage two different workspaces disadvantage sbsv1 dependency checking automatic every build re-building large projects take carbide.c++ built short cuts starting v1.3 speed rebuilds early versions carbide v1.0 1.1 supported different build method many problems carbide.c++ development tools family created replace codewarrior symbian os primary development environment symbian os adoption tool slow codewarrior usage diminishing since older tool longer supports latest changes symbian os s60 platforms carbide provided three commercial products one free product today product part symbian foundation offering completely free products ranged price 300 8000 euros depending features set licensing model carbide slow reception symbian community developers generally fond moving new tools early versions carbide problems several frequently cited complaints example lack symbian-os-style code indenting lack easy find files facility speed import symbian os build files mmps difficulties using on-device debugging addition much-anticipated managed build system work properly rather offering true incremental build frequently deleted everything started otherwise reception warm development environment preferred codewarrior ide based java speed memory concerns ide often slow pretty big memory foot print trademarks java environment carbide.c++ made steady progress addressing issues brought developer community codewarrior usage dropped significantly due improvements carbide codewarrior lack support newer versions symbian os symbian os c++ development need carbide.c++ ide symbian os-based sdk sdk contains emulator also libraries header files required symbian os development development kits available forum nokia symbian foundation web sites please note kits may different names reflecting additional capabilities cust kits developer kits pdk issk
[ 7511, 4759, 7881, 1737, 6622, 2564, 6440, 5571, 5062, 3039, 5068, 4896, 5872 ]
Test
1,173
4
DROWN_attack:drown attack drown decrypting rsa obsolete weakened encryption attack cross-protocol security bug attacks servers supporting modern tls protocol suites using support obsolete insecure ssl v2 protocol leverage attack connections using up-to-date protocols would otherwise secure drown affect types servers offer services encrypted tls yet still support sslv2 provided share public key credentials two protocols additionally public key certificate used different server supports sslv2 tls server also vulnerable due sslv2 server leaking key information used tls server full details drown announced march 2016 along patch disables sslv2 openssl vulnerability assigned id patch alone sufficient mitigate attack certificate found another sslv2 host viable countermeasure disable sslv2 servers researchers estimated 33 https sites affected vulnerability march 1 2016 drown acronym decrypting rsa obsolete weakened encryption exploits vulnerability combination protocols used configuration server rather specific implementation error according discoverers exploit fixed making changes client software web browsers exploit includes chosen-ciphertext attack use sslv2 server bleichenbacher oracle proof-of-concept attack demonstrated multi-gpu configurations commercial cloud computing could perform part codebreaking calculations cost around 18,000 gpu setup per-attack cost 400 cloud successful attack provide session key captured tls handshake investigators described attack general drown attack also found specific weakness openssl implementation sslv2 allowed called special drown attack vastly reduced effort required break encryption making real-time man-in-the-middle attacks possible required modest computing resources original reporters bug security researchers nimrod aviram sebastian schinzel protect drown server operators need ensure private keys used anywhere server software allows sslv2 connections includes web servers smtp servers imap pop servers software supports ssl/tls openssl group released security advisory set patches intended mitigate vulnerability removing support obsolete protocols ciphers however server certificate used servers support sslv2 still vulnerable patched servers numerous sources recommended vulnerability patched soon possible site operators
[ 704, 3932, 363, 6795, 2912, 376, 1460, 3277, 2923, 5399, 6458, 2587, 7567, 7925, 3323, 2961, 5779, 7214, 1513, 2620, 7600, 4025, 794, 1528, 2991, 1168, 1173, 2644, 6526, 113, 5824, 6904, 125, 6540, 6541, 6194, 6553, 4071, 2678, 3726, 30...
Test
1,174
4
Parasoft:parasoft parasoft officially parasoft corporation independent software vendor specializing automated software testing application security headquarters monrovia california founded 1987 four graduates california institute technology planned commercialize parallel computing software tools working caltech cosmic cube first working hypercube computer built 90 parasoft leveraged technology parallel software toolkit create software test automation tools traditional software development well parallel starting runtime error detection c c++ insure++ product also added capabilities static code analysis unit testing ultimately expanded include application security functional testing service virtualization parasoft develops automated defect prevention technologies support automated defect prevention methodology developed adam kolawa technologies automate number defect prevention practices java c c++ .net static code analysis practice identifies coding issues lead security reliability performance maintainability issues later 1996 parasoft submitted patent application rule-based static code analysis since original static analysis technology extended include security static analysis data flow analysis software metrics 1996 parasoft submitted patent applications technology automatically generates unit test cases since original unit testing technology extended include code coverage analysis regression testing traceability peer code review practice involves manually inspecting source code examine algorithms review design search subtle errors automated tools detect although peer inspection automated peer code reviews preparation notification tracking automated cloud soa apis enterprise environments parasoft technologies automate practices api testing integration testing system testing load testing penetration testing parasoft service soa quality technology first developed 2002 parasoft also develops memory error detection technology finds run-time errors c c++ programs patents submitted technology 1995 1996 service virtualization parasoft technologies used automatically capture emulate dependent system behavior mainframes third-party components system component unavailable difficult access development testing purposes parasoft various technologies used demonstrating industry regulatory compliance adopting agile software development devops continuous delivery continuous testing test automation parasoft joined eclipse consortium board stewards 2002 several analyst reports software industry publications mentioned company service virtualization technology embedded system software development tools parasoft c/c++test comprehensive software testing tool contains functionality test find software defects includes static code analysis functionality 2,000 rules support major standards safety-critical software security misra jsf ul-2900 cwe cert also functionality software metrics unit test generation execution well code coverage analysis c/c++test integrates parasoft dtp provide full reporting analytics needed software development especially embedded safety-critical systems devices parasoft jtest static analysis unit testing tool java parasoft started shipping 1997 since jtest numerous awards including multiple jolt awards dr. dobb journal well multiple codies jtest 1100 coding rules support major standards owasp top 10 cwe jsf pci-dss ul-2900 jtest works standalone product via eclipse visual studio plugin also work command line tool lightweight engine used ci systems jenkins continuous testing jtest integrates parasoft dtp full reporting analytics including industry specific reports owasp cwe jtest unit test assistant called uta helps create unit tests including support mocks stubs also integrates running applications help create meaningful tests advice expanding improving existing tests parasoft dottest set tools testing .net applications works plugin visual studio supports development testing practices static code analysis unit test creation execution code coverage software metrics configurations coding standards like cwe owasp ul-2900 available dottest connected parasoft dtp provide full traceability assist compliance related software industry fda medical devices need able prove practices testing performed part audit parasoft insure++ automated runtime debugger memory error detection tool parasoft began selling 1993 insure++ often used find common memory problems c c++ programs memory leaks memory underruns overflows numeric overflows performs dynamic analysis using source code instrumentation allows catch many kinds errors including static heap errors well parasoft soatest automated api testing tool allows developers testers also perform functional testing end-to-end testing security testing load performance testing supports 100 common protocols web services rest json mq jms tibco http xml edi tests created either programmatically graphically allowing testers developers create share tests soatest functionality intelligent stubs also integrates parasoft virtualize full api protocol simulation service virtualization help shift testing earlier development process soatest integrates parasoft continuous testing platform allow users create manage execute test cases via browser well providing reports analytics parasoft virtualize service virtualization tool sometimes also called api simulation provides users ability create deploy manage simulated test environments well simplify test data management primarily facilitate testing earlier well improve access systems may scheduling constraints expensive maintain dedicated versions integrates parasoft soatest provide full end-to-end testing capabilities virtualize integrates parasoft continuous testing platform allows users create manage deploy virtual test assets environments web interface well integrated continuous integration system parasoft dtp hub development testing released 2003 name parasoft concerto 2012 dtp best show embeddy award vdc research dtp collects data various software development activities testing static analysis code coverage metrics well integrating sdlc systems bug-tracking peer review requirements data collected used create detailed reports software quality well compliance variety industry standards like fda misra do-178b/c also supports security standards cert owasp cwe security reports include data standard risk frameworks like “ common weakness risk analysis framework ” cwe help measure so-called technical impact finding means instead simply reporting software defect like buffer overflow data include information kinds security problems occur overflow exposure private data ddos information helps developers security testers prioritize findings important addition reporting dashboards dtp analytics engine called “ process intelligence engine ” “ pie ” users take advantage pre-build analytics modules tasks like change-based testing also use graphical tool web interface create analytics parasoft received customers choice award gartner march 2019 best software test automation software 2019 reviewed customers parasoft soatest recognized leader forrester 2018 forrester wave omnichannel functional test tools reported said parasoft shined evaluation specifically around effective test maintenance strong ci/cd application lifecycle management alm platform integration parasoft received best show software development award testing category sd times 2018 part sd times 100 list parasoft global provider software test automation tools analytics global headquarters monrovia california headquarters building heart monrovia high tech corridor home marketing development sales solution architects technical support professional services parasoft distributors canada latin america provide local sales technical support parasoft strong presence emea centers around offices krakow poland hague netherlands krakow full range capabilities development technical support professional services sales solution architects variety languages hague staff marketing sales solution architects professional services technical support parasoft subsidiaries berlin germany london uk stockholm sweden distributors france italy israel south africa early corporate history parasoft strong ties asia shanghai china parasoft subsidiary full staff marketing sales solution architects professional services technical support parasoft also subsidiaries sales staff solution architects professional services technical support bangalore india singapore techmatrix distributor parasoft japan two companies relationship going back two decades parasoft also distributors south korea australia new zealand
[ 2153, 572, 5051, 4896, 1435 ]
Test
1,175
4
Internet_censorship_circumvention:internet censorship circumvention internet censorship circumvention use various methods tools bypass internet censorship various techniques methods used bypass internet censorship differing ease use speed security risks methods use alternate dns servers evade blocking using alternate address address lookup system access site techniques using website mirrors archive sites rely copies site available different locations additionally solutions rely gaining access internet connection subject filtering often different jurisdiction subject censorship laws using technologies proxying virtual private networks anonymization networks arms race developed censors developers circumvention software resulting sophisticated blocking techniques censors development harder-to-detect tools researchers estimates adoption circumvention tools vary substantially disputed barriers adoption include usability issues difficulty finding reliable trustworthy information circumvention lack desire access censored content risks breaking law many methods available may allow circumvention internet filtering widely vary terms implementation difficulty effectiveness resistance detection filters may block specific domain names either using dns hijacking url filtering sites sometimes accessible alternate names addresses may blocked websites may offer content multiple pages domain names example english wikipedia available https //en.wikipedia.org/ also mobile-formatted version https //en.m.wikipedia.org/ dns resolution disrupted site blocked ways may possible access site directly ip address using alternative dns servers public recursive name servers may bypass dns-based blocking censors may block specific ip addresses depending filtering implemented may possible use different forms ip address specifing address different base example following urls access site although browsers recognize forms http //208.80.152.2 dotted decimal http //3494942722 decimal http //0320.0120.0230.02 dotted octal http //0xd0509802 hexadecimal http //0xd0.0x50.0x98.0x2 dotted hexadecimal cached pages search engines keep copies previously indexed webpages cached pages often hosted search engines may blocked example google allows retrieval cached pages entering cache some-url search request mirror archive sites copies web sites pages may available mirror archive sites internet archive wayback machine rss aggregators rss aggregators feedly may able receive pass rss feeds blocked accessed directly web proxies proxy websites configured allow users load external web pages proxy server permitting user load page coming proxy server blocked source however depending proxy configured censor may able determine pages loaded and/or determine user using proxy server example mobile opera mini browser uses proxy-based approach employing encryption compression order speed downloads side effect allowing circumvent several approaches internet censorship 2009 led government china ban special chinese versions browser domain fronting circumvention software implement technique called domain fronting destination connection hidden passing initial requests content delivery network popular site technique used messaging applications including signal telegram large cloud providers amazon web services google cloud longer permit use ssh tunneling establishing ssh tunnel user forward traffic encrypted channel outgoing requests blocked sites response sites hidden censors appears unreadable ssh traffic virtual private network vpn using vpn user experiences internet censorship create secure connection permissive country browse internet situated country services offered monthly fee others ad-supported according globalwebindex 400 million people use virtual private networks circumvent censorship increased level privacy tor advanced tools tor route encrypted traffic multiple servers make source destination traffic less traceable cases used avoid censorship especially configured use traffic obfuscation techniques censor may able detect block use circumvention tools efforts make circumvention tools less detectable randomizing traffic attempting mimic non-blocked protocol tunneling traffic whitelisted service using techniques including domain fronting tor circumvention tools adopted multiple obfuscation techniques users use depending nature connection sometimes called pluggable transports sneakernet transfer electronic information especially computer files physically carrying data storage media one place another sneakernet move data regardless network restrictions simply using network one example widely adopted sneakernet network el paquete semanal cuba circumvention tools seen spikes adoption response high-profile blocking attempts however studies measuring adoption circumvention tools countries persistent widespread censorship report mixed results measures estimates circumvention tool adoption reported widely divergent results 2010 study harvard university researchers estimated users use censorship circumvention tools—likely less 3 users even countries consistently implement widespread censorship studies reported substantially larger estimates disputed china anecdotal reports suggest adoption circumvention tools particularly high certain communities universities survey freedom house found users generally find circumvention tools difficult use market research firm globalwebindex reported 35 million twitter users 63 million facebook users china services blocked however estimates disputed facebook advertising platform estimates 1 million users china reports twitter adoption estimate 10 million users studies pointed efforts block circumvention tools china reduced adoption tools tor network previously 30,000 users connecting china 2014 approximately 3,000 chinese users thailand internet censorship existed since 2002 sporadic inconsistent filtering small-scale survey 229 thai internet users research group university washington found 63 surveyed users attempted use circumvention tools 90 successful using tools users often made on-the-spot decisions use circumvention tools based limited unreliable information variety perceived threats abstract others concrete based personal experiences response 2014 blocking twitter turkey information alternate dns servers widely shared using another dns server google public dns allowed users access twitter day block total number posts made turkey 138 according brandwatch internet measurement firm april 2018 ban telegram messaging app iran web searches vpn circumvention software increased much 48x search terms evidence users downloading unsafe software many third iranian internet users used psiphon tool days immediately following block june 2018 many 3.5 million iranian users continued use tool circumvention anonymity different circumvention systems designed bypass blocking usually protect identities anonymous systems protect user identity contribute circumvention primary function important understand open public proxy sites provide anonymity view record location computers making requests well websites accessed many jurisdictions accessing blocked content serious crime particularly content considered child pornography threat national security incitement violence thus important understand circumvention technologies protections provide use tools appropriate particular context great care must taken install configure use circumvention tools properly individuals associated high-profile rights organizations dissident protest reform groups take extra precautions protect online identities circumvention sites tools provided operated trusted third parties located outside censoring jurisdiction collect identities personal information best trusted family friends personally known circumventor family friends available sites tools provided individuals organizations known reputations recommendations endorsement others may need used commercial circumvention services may provide anonymity surfing internet could compelled law make records users personal information available law enforcement five general types internet censorship circumvention software cgi proxies use script running web server perform proxying function cgi proxy client sends requested url embedded within data portion http request cgi proxy server cgi proxy server pulls ultimate destination information data embedded http request sends http request ultimate destination returns result proxy client cgi proxy tool security trusted far operator proxy server trusted cgi proxy tools require manual configuration browser client software installation require user use alternative potentially confusing browser interface within existing browser http proxies send http requests intermediate proxying server client connecting http proxy sends exactly http request proxy would send destination server unproxied http proxy parses http request sends http request ultimate destination server returns response back proxy client http proxy tool security trusted far operator proxy server trusted http proxy tools require either manual configuration browser client side software configure browser user configured http proxy tool allows user transparently use normal browser interface application proxies similar http proxies support wider range online applications peer-to-peer systems store content across range participating volunteer servers combined technical techniques re-routing reduce amount trust placed volunteer servers social networks establish trust relationships server client users peer-to-peer system trusted far operators various servers trusted extent architecture peer-to-peer system limits amount information available single server server operators trusted cooperate combine information hold re-routing systems send requests responses series proxying servers encrypting data proxy given proxy knows either data came going decreases amount trust required individual proxy hosts list different internet censorship circumvention software
[ 7232, 96, 6879, 803, 6419, 6348, 909, 2563, 731, 8191, 4783, 3383, 6025, 5495, 2043, 5064, 7848, 3573, 1886, 7214, 431, 6398, 4196, 3338, 4014, 5619, 4111 ]
Test
1,176
3
Linux_kernel_oops:linux kernel oops computing oops deviation correct behavior linux kernel one produces certain error log better-known kernel panic condition results many kinds oops instances oops event may allow continued operation compromised reliability term stand anything simple mistake kernel detects problem kills offending processes prints oops message linux kernel engineers use debugging condition created oops fixing underlying programming error system experienced oops internal resources may longer operational thus even system appears work correctly undesirable side effects may resulted active task killed kernel oops often leads kernel panic system attempts use resources lost official linux kernel documentation regarding oops messages resides file kernel sources logger configurations may affect ability collect oops messages codice_1 software collect submit kernel oopses repository www.kerneloops.org website provides statistics public access reported oopses person familiar technical details computers operating systems oops message might look confusing unlike operating systems windows macos linux chooses present details explaining crash kernel rather display simplified user-friendly message bsod windows simplified crash screen proposed times however currently none development
[ 1807, 3256, 2182, 1815, 3938, 3613, 6422, 7528, 3271, 7532, 2559, 1100, 5744, 6443, 2942, 7555, 6117, 4341, 5762, 412, 415, 2240, 3666, 2970, 4009, 5441, 7956, 5453, 5803, 4759, 5460, 7242, 462, 1535, 1924, 6892, 4400, 1933, 5829, 4415, ...
Test
1,177
9
JavaScript_framework:javascript framework javascript framework application framework written javascript differs javascript library control flow library offers functions called parent code whereas framework defines entire application design developer call framework instead framework call use code particular way javascript frameworks follow model–view–controller paradigm designed segregate web application orthogonal units improve code quality maintainability examples angularjs ember.js meteor.js
[ 5629, 2451, 4755, 4296, 5998, 4315, 562, 831, 313, 3719, 3559, 237, 2870, 6660, 6221, 6400, 3584, 7687, 7505 ]
Test
1,178
2
Printer_Setup_Utility:printer setup utility printer setup utility application mac os x served allow user configure printers physically connected computer connected via network utility provided specific tools user friendly printers pane system preferences mac os x 10.5 leopard printer setup utility removed features placed print fax system preferences pane viewing individual printers queues moved printer proxy application
[ 8051, 2627, 7609, 3940, 7335, 713, 6342, 5109, 3445, 2284, 997, 569, 1187, 4690, 5571, 6188, 734, 7000, 1562, 6909, 6548, 502, 6295, 6557, 2679, 4975, 3989, 2597, 6565, 2145, 3322, 2880, 1502, 163, 3151, 6582, 5786, 4740, 1897, 5535, 51...
Test
1,179
2
LinHES:linhes linhes linux home entertainment server linux distribution designed use home theater pcs htpcs version 6 called knoppmyth recent release r8 64-bit machines based arch linux though previous versions based knoppix debian linhes includes custom scripts install configure mythtv pvr software well number add-ons standard htpc hardware supported much even configured automatically making often complex installation configuration process relatively easy pain-free cecil watson developed maintains linhes operating system linhes linux distribution equivalent windows media center linhes comes cd-rom software distribution automates setup popular mythtv package well several htpc-related add-ons ultimately linhes used create home theater pc htpcs commonly plugged standard-definition television sdtv high-definition television hdtv rather monitors complete home theater experience htpcs bring power pcs living room one device common complaint mythtv difficult time-consuming install configure goal linhes make creating maintaining home theater pc simple possible blank system transformed fully functional htpc around 20 minutes 20 minutes system capable linhes used install full mythtv client server system means front-end stored device back-end front-end software required visual elements gui regular user utilize find play manipulate media files etc back-end server media files actually stored full front-end back-end system may advantage 'portability i.e standalone device dependent separate server like video game console example alternatively linhes used install mythtv client front-end-only system example users may central storage device server house server accessed numerous devices throughout house devices needing front-end installation devices containing minimal hardware linhes also run directly cd-rom i.e without installation providing network connection pc 'complete installation mythtv back-end server using 'server separate one front-end units obvious advantages multiple simultaneous access shared media files server used would generally hardware relatively high specification would kept outside main living room advantage keeping server pc outside living room cooling fan required accommodate 'fast processor quite noisy certain hard drives expensive invest fanless/heat sinking equipment avoid noise problems linhes also used upgrade existing linhes knoppmyth installations linhes users generally discuss ideas help others official forum website linhes r7.4 last 32-bit release
[ 5200, 4759, 1629, 3444, 7251, 474, 7075, 1941, 578, 314, 5668, 2758, 1663, 2864, 3559, 6209, 2591, 6761, 2063, 343, 4824, 5523, 3915, 4455, 1893, 5259, 5530, 5704, 6317, 7587, 7954, 6244 ]
Test
1,180
3
Burroughs_large_systems:burroughs large systems 1970s burroughs corporation organized three divisions different product line architectures high-end mid-range entry-level business computer systems division product line grew different concept optimize computer instruction set particular programming languages burroughs large systems group designed large mainframes using stack machine instruction sets dense syllables 48-bit data words first design b5000 1961 optimized running algol 60 extremely well using simple compilers evolved b5500 subsequent major redesigns include b6500/b6700 line successors separate b8500 line 'burroughs large systems referred product lines together contrast cobol-optimized medium systems b2000 b3000 b4000 flexible-architecture small systems b1000 founded 1880s burroughs oldest continuously operating entity computing late 1950s computing equipment still limited electromechanical accounting machines sensimatic nothing compete traditional rivals ibm ncr started produce larger-scale computers recently founded univac 1956 branded b205 machine produced company bought first internally developed machine b5000 designed 1961 burroughs sought address late entry market strategy completely different design based advanced computing ideas available time b5000 architecture dead inspired b6500 subsequent b6700 b7700 computers using architecture still production unisys clearpath libra servers run evolved compatible version mcp operating system first introduced b6700 third largest line b8500 commercial success addition proprietary cmos processor design unisys also uses intel xeon processors runs mcp microsoft windows linux operating systems libra servers use custom chips gradually eliminated 2018 libra servers strictly commodity intel years first member first series b5000 designed beginning 1961 team leadership robert bob barton unique machine well ahead time listed influential computing scientist john mashey one architectures admires always thought one innovative examples combined hardware/software design 've seen far ahead time b5000 succeeded b5500 used disks rather drum storage b5700 allowed multiple cpus clustered around shared disk successor b5700 b5000 line heavily influenced design b6500 burroughs ported master control program mcp machine b5000 revolutionary time architecture instruction set designed needs software taken consideration large departure computer system design time processor instruction set would designed handed software people still instruction sets ibm system/360 instruction set era later instruction set designs x86 ppc arm instruction set architectures essentially traditional instruction set based architectures rather holistic designs like original burroughs systems b5000 b5500 b5700 word mode two different addressing modes depending whether executing main program salf subroutine salf main program field operand call descriptor call syllable relative program reference table prt subroutines type addressing dependent high three bits mark stack flipflop msff shown b5x00 relative addressing b5000 designed exclusively support high-level languages time languages coming prominence fortran cobol fortran cobol considered weaker languages comes modern software techniques newer mostly untried language adopted algol-60 algol dialect chosen b5000 elliott algol first designed implemented c.a.r hoare elliott 503 practical extension algol io instructions algol ignored powerful string processing instructions hoare famous turing award lecture subject thus b5000 based powerful language vendors could dream implementing algol compiler industry dismissed algol unimplementable however bright young student named donald knuth previously implemented algol 58 earlier burroughs machine three months summer break peripherally involved b5000 design consultant many wrote algol mistakenly believing high-level languages could power assembler thus realizing algol potential systems programming language burroughs algol compiler fast — impressed dutch scientist edsger dijkstra submitted program compiled b5000 pasadena plant deck cards compiled almost immediately immediately wanted several machines university eindhoven university technology netherlands compiler fast several reasons primary reason one-pass compiler early computers enough memory store source code compilers even assemblers usually needed read source code burroughs algol syntax unlike official language requires variable object declared used feasible write algol compiler reads data concept profound theoretical implications also permits fast compiling burroughs large systems could compile fast could read source code punched cards fastest card readers industry powerful burroughs cobol compiler also one-pass compiler equally fast 4000-card cobol program compiled fast 1000-card/minute readers could read code program ready use soon cards went reader b6500 delivery 1969 b7500 first computers line burroughs systems survive present day inspired b5000 totally new architecture among important differences b8500 line derives d825 military computer inspired b5000 b8500 designed 1960s attempt merge b5500 d825 designs system used monolithic integrated circuits magnetic thin-film memory architecture employed 48-bit word stack descriptors like b5500 advertised upward-compatible b8500 could never gotten work reliably project canceled 1970 never delivered completed system first burroughs large systems b5000 designed 1961 second-generation computer using discrete transistor logic magnetic core memory first machines replace b5000 architecture b6500 b7500 successor machines followed hardware development trends re-implement architectures new logic next 25 years b5500 b6500 b5700 b6700 b7700 b6800 b7800 finally burroughs series merger burroughs acquired sperry corporation changed name unisys company continued develop new machines based mcp cmos asic machines libra 100 libra 500 libra 590 announced 2005 later libras including 590 also incorporate intel xeon processors run burroughs large systems architecture emulation well mcp cmos processors unclear unisys continue development new mcp cmos asics hardware software design development manufacturing split two primary locations orange county california outskirts philadelphia initial large systems plant developed b5000 b5500 located pasadena california moved city industry california developed b6500 orange county location based plant mission viejo california times included facilities nearby irvine lake forest responsible smaller b6x00 line east coast operations based tredyffrin pennsylvania handled larger b7x00 line machines lines fully object-compatible meaning program compiled one could executed another newer larger models instructions supported older slower models hardware encountering unrecognized instruction invoked operating system function interpreted differences include process switching i/o handled maintenance cold-starting functionality larger systems included hardware process scheduling capable input/output modules highly functional maintenance processors bxx00 models replaced series models differences retained longer readily identifiable model number burroughs large systems implement algol-derived stack architecture unlike linear architectures pdp-11 motorola m68k itanium segmented architectures x86 texas instruments refers layout memory program uses b5000 specifically designed support algol starting point business-oriented languages cobol also well supported notably powerful string operators included development fast compilers algol used b5000 extended algol subset includes powerful string manipulation instructions excludes certain algol constructs notably unspecified formal parameters define mechanism serves similar purpose defines found c fully integrated language rather preprocessor event data type facilitates coordination processes fault blocks enable handling program faults user level algol include many insecure constructs needed operating system system software two levels language extensions provide additional constructs espol newp writing mcp closely related software dcalgol dmalgol provide specific extensions specific kinds system software originally b5000 mcp operating system written extension extended algol called espol executive systems programming oriented language replaced mid-to-late 70s language called newp though newp probably meant new programming language legends surround name common perhaps apocryphal story within burroughs time suggested came “ executive washroom privileges ” another story circa 1976 john mcclintock burroughs software engineer developing newp named language newp asked yet name yet answering nyoooop adopted name newp subset algol extension secure espol dropped little-used complexities algol fact unsafe constructs rejected newp compiler unless block specifically marked allow instructions marking blocks provide multi-level protection mechanism newp programs contain unsafe constructs initially non-executable security administrator system able bless programs make executable normal users able even privileged users normally essentially root privilege may unable depending configuration chosen site newp used write general programs number features designed large software projects support everything algol newp number facilities enable large-scale software projects operating system including named interfaces functions data groups interfaces modules super-modules modules group data functions together allowing easy access data global within module interfaces allow module import export functions data super-modules allow modules grouped second intermediate level security operating system code newp user programs algol middleware programs written dcalgol data comms algol used message reception dispatching remove messages input queues places queues processes system handle middleware coms introduced around 1984 receive messages around network dispatch messages specific handling processes mcs message control system cande command edit program development environment mcss items software worth noting – control user sessions provide keeping track user state without run per-user processes since single mcs stack shared many users load balancing also achieved mcs level example saying want handle 30 users per stack case 31 60 users two stacks 61 90 users three stacks etc gives b5000 machines great performance advantage server since n't need start another user process thus create new stack time user attaches system thus efficiently service users whether require state mcss mcss also provide backbone large-scale transaction processing mcs talked external co-processor dcp datacomm control processor 24-bit minicomputer conventional register architecture hardware i/o capability handle thousands remote terminals dcp b6500 communicated messages memory essentially packets today terms mcs b6500-side processing messages early years dcp assembler dacoma application program called dcpprogen written b6500 algol later ndl network definition language compiler generated dcp code ndf network definition file one algol function kind dcp instruction called function corresponding dcp instruction bits would emitted output dcp program algol program comprising nothing long list calls functions one assembly language statement essentially algol acted like macro pass macro assembler first pass algol compiler second pass running resulting program b6500 would emit binary dcp another variant algol dmalgol data management algol dmalgol algol extended compiling dmsii database software database description files created dasdl data access structure definition language compiler database designers administrators compile database descriptions generate dmalgol code tailored tables indexes specified administrators never need write dmalgol normal user-level programs obtain database access using code written application languages mainly algol cobol extended database instructions transaction processing directives notable feature dmalgol preprocessing mechanisms generate code handling tables indices dmalgol preprocessing includes variables loops generate names based compile-time variables enables tailoring far beyond done preprocessing facilities lack loops dmalgol used provide tailored access routines dmsii databases database defined using data access structure definition language dasdl schema translated preprocessor tailored dmalgol access routines compiled means unlike dbms implementations often need database-specific if/then/else code run-time 1970s tailoring used extensively reduce code footprint execution time became much less used later years partly low-level fine tuning memory speed became less critical partly eliminating preprocessing made coding simpler thus enabled important optimizations dmalgol included verbs like find lock store also verbs begintransaction endtransaction included solving deadlock situation multiple processes accessed updated structures roy guck burroughs one main developers dmsii later years compiler code size less concern preprocessing constructs made available user level algol unsafe constructs direct processing database description file remain restricted dmalgol many early systems languages programmers often told make routines small procedure calls returns expensive number operations performed maintain stack b5000 designed stack machine – program data except arrays include strings objects kept stack meant stack operations optimized efficiency stack-oriented machine programmer addressable registers multitasking also efficient b5000 machines one specific instruction perform process switches – mvst move stack stack represents process task thread tasks become blocked waiting resource requests includes waiting processor run task interrupted preemptive multitasking user programs issue mvst one line code operating system done process switch proceeds something like – process requests resource immediately available maybe read record file block currently memory system timer triggered interrupt operating system code entered run top user stack turns user process timers current process placed appropriate queue resource requested ready queue waiting processor preemptive context switch operating system determines first process ready queue invokes instruction move_stack makes process head ready queue active detractors b5000 architecture believed stack architecture inherently slow compared register-based architectures trick system speed keep data close processor possible b5000 stack done assigning top two positions stack two registers b operations performed two top stack positions faster machines past b5000 stack may kept registers cache near processor thus designers current successors b5000 systems optimize whatever latest technique programmers adjust code run faster – even need recompile thus protecting software investment programs known run years many processor upgrades speed limited register-based machines another point speed promoted risc designers processor speed considerably faster everything single chip valid point 1970s complex architectures b5000 required many transistors fit single chip however case today every b5000 successor machine fits single chip well performance support techniques caches instruction pipelines fact series line b5000 successors included first single chip mainframe micro-a late 1980s mainframe chip named scamp single-chip a-series mainframe processor sat intel-based plug-in pc board example programs map stack structure stack frame corresponds lexical level current execution environment see lexical level static textual nesting program dynamic call nesting visibility rules algol language designed single pass compilers mean variables declared current position visible part code thus requirement forward declarations variables declared enclosing blocks visible another case variables name may declared inner blocks effectively hide outer variables become inaccessible lexical nesting static unrelated execution nesting recursion etc rare find procedure nested five levels deep could argued programs would poorly structured b5000 machines allow nesting 32 levels could cause difficulty systems generated algol source output tailored solve special problem generation method frequently nested procedure within procedure procedures invoked four ways – normal call process run normal invocation invokes procedure normal way language invokes routine suspending calling routine invoked procedure returns call mechanism invokes procedure coroutine coroutines partner tasks control explicitly passed tasks means continue instruction synchronous processes process mechanism invokes procedure asynchronous task case separate stack set starting lexical level processed procedure asynchronous task control exactly control passed tasks unlike coroutines note also processed procedure still access enclosing environment efficient ipc inter process communication mechanism since two tasks access common variables tasks must synchronized prevent race conditions handled event data type processes wait event caused another cooperating process events also allow mutual exclusion synchronization procure liberate functions reason child task dies calling task continue – however parent process dies child processes automatically terminated machine one processor processes may run simultaneously event mechanism basic enabler multiprocessing addition multitasking last invocation type run runs procedure independent task continue originating process terminates reason child process access variables parent environment parameters passed invoked procedure must call-by-value thus burroughs extended algol multi-processing synchronization features later languages like ada made use support asynchronous processes built hardware one last possibility procedure may declared inline compiler sees reference code procedure generated inline save overhead procedure call best done small pieces code inline functions similar parameterized macros c defines except n't get problems parameters macros facility available newp example program normal calls used information single stack asynchronous calls stack would split multiple stacks processes share data run asynchronously stack hardware optimization provision display registers registers point start called stack frame registers updated automatically procedures entered exited accessible software 32 registers limits 32 levels lexical nesting consider would access lexical level 2 2 global variable lexical level 5 5 suppose variable 6 words away base lexical level 2 thus represented address couple 2 6 n't registers look control word base 5 frame points frame containing 4 environment look control word base environment find 3 environment continue fashion followed links back required lexical level note path return path back procedures called order get point architecture keeps data stack call stack structure uses control words tell apart see quite inefficient access variable registers 2 register points base lexical level 2 environment need generate address variable add offset stack frame base frame base address register efficient linked list search operator lllu could search stack fashion register approach still going faster registers access entities outer global environments efficient local variable access invoked procedure p coroutine process instruction 3 environment would become separate 3 -based stack note means asynchronous processes still access 2 environment implied algol program code taking one step totally different program could call another program ’ code creating 3 stack frame pointing another process ’ 2 environment top process stack instant whole address space code ’ execution environment changes making 2 environment process stack directly addressable instead make 2 environment another process stack directly addressable library calls implemented cross-stack call calling code called code could even originate programs written different source languages compiled different compilers note 1 0 environments occur current process stack 1 environment code segment dictionary shared processes running code 0 environment represents entities exported operating system stack frames actually ’ even exist process stack feature used early file io optimization fib file information block linked display registers 1 io operations early nineties ability implemented language feature structure blocks – combined library technology connection blocks ability link data structure display register address scope implemented object orientation thus b5000 actually used form object orientation long term ever used systems compiler might build symbol table similar manner eventually storage requirements would collated machine code would written use flat memory addresses 16-bits 32-bits even 64-bits addresses might contain anything write wrong address could damage anything instead two-part address scheme implemented hardware lexical level variables placed displacements base level stack typically occupying one word double precision complex variables would occupy two arrays stored area one word descriptor array thus lexical level total storage requirement great dozens hundreds thousand extreme cases certainly count requiring 32-bits indeed reflected form valc instruction value call loaded operand onto stack op-code two bits long rest byte bits concatenated following byte give fourteen-bit addressing field code executed would lexical level say six meant lexical levels zero six valid three bits needed specify lexical level desired address part valc operation thus reserved three bits purpose remainder available referring entities lower levels deeply nested procedure thus high lexical level would fewer bits available identify entities level sixteen upwards number restricted deepest nesting five bits would needed specify choice levels 0–31 thus leaving nine bits identify 512 entities severe constraint much compact addressing entities literal memory address 32-bit addressing space valc opcode loaded data opcodes add mult forth addressing working entirely top elements stack much important method meant many errors available systems employing flat addressing could occur simply unspeakable even machine code level task way corrupt memory use another task way develop address similarly within task array descriptor contained information array bounds indexing operation checked hardware put another way array formed address space case tagging memory words provided second level protection misdirected assignment value could go data-holding location one holding pointer array descriptor etc certainly location holding machine code arrays stored contiguous memory variables granted address space located via descriptor access mechanism calculate stack index variable therefore full integer range potential fourteen bits use offset array address space bound checking provided hardware array length exceed 1,024 words array would segmented index converted segment index offset indexed segment algol case multidimensional array would employ multiple levels addressing reference j first index would array descriptors one descriptor rows row would indexed j single-dimensional array higher dimensions hardware checking known bounds array indices would prevent erroneous indexing fortran however regards multidimensional arrays equivalent single-dimensional array size multidimensional array simple integer arithmetic used calculate offset element j k would found single sequence single-dimensional equivalent array possibly segmented large enough would accessed manner single-dimensional array algol although accessing outside array would prevented wrong value one index combined suitably wrong value another index might result bounds violation single sequence array words indices checked individually array storage bounded side storage items easy system resize array though changing number dimensions precluded compilers required references number dimensions algol case enabled development ragged arrays rather usual fixed rectangular higher dimension arrays thus two dimensions ragged array would rows different sizes instance given large array 100,100 mostly-zero values sparse array representation declared sa 100,0 could row resized exactly enough elements hold non-zero values along row arrays larger 1024 words segmented smaller arrays system short real memory increasing declared size collection scratchpad arrays 1,000 say 1,050 could mean program would run far less thrashing smaller individual segments use needed memory actual storage array segment would allocated run time element segment accessed elements created segment would initialised zero initialising array zero start therefore encouraged normally unwise omission one nice thing stack structure program happen fail stack dump taken easy programmer find exactly state running program compare core dumps exchange packages systems another thing stack structure programs implicitly recursive fortran expected support recursion perhaps one stumbling block people understanding algol implemented implement recursion b5000 problem – fact reverse problem stop programs recursive end n't bother burroughs fortran compiler allowed recursive calls every fortran compiler unlike many computers stack-based system returns calls succeeded well could odd effects system formal manipulation mathematical expressions whose central subroutines repeatedly invoked without ever returning large jobs ended stack overflow thus burroughs fortran better error checking contemporary implementation fortran instance subroutines functions checked invoked correct number parameters normal algol-style compilers computers mismatches common causes crashes similarly array-bound checking programs used years systems embarrassingly often would fail run burroughs system fact burroughs became known superior compilers implementation languages including object-oriented simula superset algol iverson designer apl declared burroughs implementation apl best 'd seen john mccarthy language designer lisp disagreed since lisp based modifiable code like unmodifiable code b5000 lisp implementations would run interpretive environment anyway note also storage required multiple processes came system memory pool needed need sysgens burroughs systems competing systems order preconfigure memory partitions run tasks defining aspect b5000 stack machine treated however two important features architecture tag-based descriptor-based original b5000 flag bit control numeric word set aside identify word control word numeric word partially security mechanism stop programs able corrupt control words stack later b6500 designed realized 1-bit control word/numeric distinction powerful idea extended three bits outside 48 bit word tag data bits bits 0–47 tag bits 48–50 bit 48 read-only bit thus odd tags indicated control words could written user-level program code words given tag 3 list tags function note internally machines 60 bit words extra bits used engineering purposes hamming code error-correction field never seen programmers note current incarnation machines unisys clearpath extended tags four bit tag microcode level specified four bit tags referred level gamma even-tagged words user data modified user program user state odd-tagged words created used directly hardware represent program execution state since words created consumed specific instructions hardware exact format words change hardware implementation user programs need recompiled since code stream produce results even though system word format may changed tag 1 words represent on-stack data addresses normal irw simply stores address couple data current stack sirw references data stack including stack number address tag 5 words descriptors fully described next section tag 5 words represent off-stack data addresses tag 7 program control word describes procedure entry point operators hit pcw procedure entered entr operator explicitly enters procedure non-value-returning routine functions value-returning routines implicitly entered operators value call valc note global routines stored 2 environment sirws point pcw stored code segment dictionary 1 environment 1 environment stored current stack referenced processes sharing code thus code reentrant shared tag 3 represents code words wo n't occur stack tag 3 also used stack control words mscw rcw toscw figure left shows burroughs large system architecture fundamentally hardware architecture object-oriented programming something still n't exist conventional architectures b5000 line also pioneers multiple processors connected together high-speed bus b7000 line could eight processors long least one i/o module note rdlk low-level way synchronizing processors high level used user programs event data type event data type system overhead avoid overhead special locking technique called dahm locks named burroughs software guru dave dahm used notable operators heyu — send interrupt another processor rdlk — low-level semaphore operator load register memory location given register place value b register memory location single uninterruptible cycle algol compiler produced code invoke operator via special function enabled swap operation single-word data without explicit temporary value codice_1 whoi — processor identification idle — idle interrupt received two processors could infrequently simultaneously send 'heyu command resulting lockup known deadly embrace direct influence b5000 seen current unisys clearpath range mainframes direct descendants b5000 still mcp operating system 40 years consistent development architecture called emode emulation mode since b5000 architecture implemented machines built intel xeon processors running x86 instruction set native instruction set code running processors emulating b5000 instruction set machines also going nmode native mode dropped may often hear b5000 successor machines referred emode machines b5000 machines programmed exclusively high-level languages assembler b5000 stack architecture inspired chuck moore designer programming language forth encountered b5500 mit forth early years moore described influence noting forth dup drop swap came corresponding b5500 instructions dupl dlet exch b5000 machines stack-based architecture tagged memory also heavily influenced soviet elbrus series mainframes supercomputers first two generations series featured tagged memory stack-based cpus programmed high-level languages existed kind assembly language called el-76 less modification algol 68 supported structured programming first-class procedures later generations series though switched away architecture epic-like vliw cpus hewlett-packard designers hp 3000 business system used b5500 greatly impressed hardware software aimed build 16-bit minicomputer similar software several hp divisions created similar minicomputer microprocessor stack machines bob barton work reverse polish notation rpn also found way hp calculators beginning 9100a notably hp-35 subsequent calculators nonstop systems designed tandem computers late 1970s early 1980s also 16-bit stack machines influenced b5000 indirectly hp 3000 connection several early tandem engineers formerly hp around 1990 systems migrated mips risc architecture continued support execution stack machine binaries object code translation direct emulation sometime 2000 systems migrated itanium architecture continued run legacy stack machine binaries bob barton also influential alan kay kay also impressed data-driven tagged architecture b5000 influenced thinking developments object-oriented programming smalltalk another facet b5000 architecture secure architecture runs directly hardware technique descendants virtual machines today attempts provide secure environments one notable product java jvm provides secure sandbox applications run value hardware-architecture binding existed emode would substantially preserved x86-based machines extent mcp one control program support provided machines still inferior provided machines b5000 instruction set native instruction set little-known intel processor architecture actually preceded 32-bit implementations x86 instruction set intel iapx 432 would provided equivalent physical basis essentially object-oriented architecture
[ 4566, 3764, 7331, 4759, 3849, 2379, 1265, 3836, 3624, 304, 1743, 5571, 7449, 7733, 578, 5666, 1015, 1855, 1112, 1023, 1114, 3557, 6922, 7382, 1400, 3990, 1774, 336, 6480, 949, 1785, 4543, 5082, 3746, 1600, 6497, 352, 6498, 7870, 2803, 1...
Test
1,181
2
Microsoft_Transaction_Server:microsoft transaction server microsoft transaction server mts software provided services component object model com software components make easier create large distributed applications major services provided mts automated transaction management instance management just-in-time activation role-based security mts considered first major software implement aspect-oriented programming mts first offered windows nt 4.0 option pack windows 2000 mts enhanced better integrated operating system com renamed com+ com+ added object pooling loosely-coupled events user-defined simple transactions compensating resource managers features mts com+ still provided windows server 2003 windows server 2008 microsoft .net framework provides wrapper com+ enterpriseservices namespace windows communication foundation wcf provides way calling com+ applications web services however com+ based com microsoft strategic software architecture web services .net com pure .net-based alternatives many features provided com+ long term likely com+ phased basic mts architecture comprises com components run control mts executive called mts components com+ referred com+ applications mts components in-process dlls mts components deployed run mts executive manages com components object implementing iclassfactory interface serves factory object create new instances components mts inserts factory wrapper object object wrapper actual mts object client interposing wrappers called interception whenever client makes call mts component wrappers factory object intercept call inject instance-management algorithm called just-in-time activation jita call wrapper makes call actual mts component interception considered difficult time due lack extensible metadata addition based information component deployment properties transaction logic security checks also take place wrapper objects every mts-hosted object also exists context object implements iobjectcontext interface context object maintains specific information object transactional information security information deployment information methods mts component call context object iobjectcontext interface mts create actual middle-tier mts object call client reaches container since object running time use lot system resources even though object wrapper skeleton object persist soon call comes client mts wrapper process activates instance management algorithm called jita actual mts object created time service request wrapper request serviced reply sent back client component either calls setcomplete /setabort transaction ends client calls release reference object actual mts object destroyed short mts uses stateless component model generally client requests services typical mts component following sequence occurs server thus possible implement high-latency resources asynchronous resource pools take advantage stateless jit activation afforded middleware server
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, 3407, ...
Test
1,182
7
Stackdriver:stackdriver google stackdriver freemium credit card required cloud computing systems management service offered google provides performance diagnostics data form monitoring logging tracing error reporting alerting public cloud users stackdriver hybrid cloud solution providing support google cloud aws cloud environments stackdriver company created 2012 founders dan belcher izzy azeri company goal provide consistent monitoring across cloud computing multiple service layers using single saas solution stackdriver secured 5 million funding bain capital ventures july 2012 beta version product became publicly available april 30 2013 may 2014 stackdriver company acquired google expanded version product adding support logs analysis hybrid cloud support deep integration google cloud rebranded google stackdriver launched general availability october 2016 stackdriver focus improving performance availability large complex applications running public cloud provides metrics detailing every layer 'stack form charts graphs supports multi-cloud environments provides single pane glass users cloud services provides views logs generated allows users generate metrics logs allows users receive alerts metrics breach normal levels
[ 5064, 2961 ]
Test
1,183
7
PerfKitBenchmarker:perfkitbenchmarker perfkit benchmarker open source benchmarking tool used measure compare cloud offerings perfkit benchmarker licensed apache 2 license terms perfkit benchmarker community effort involving 500 participants including researchers academic institutions companies together originator google perfkit benchmarker pkb community effort deliver repeatable consistent open way measuring cloud performance supports growing list cloud providers including alibaba cloud amazon web services cloudstack digitalocean google cloud platform kubernetes microsoft azure openstack rackspace ibm bluemix softlayer addition cloud providers supports container orchestration including kubernetes mesos local static workstations clusters computers goal create open source living benchmark framework represents cloud developers building applications evaluating cloud alternatives learning architect applications cloud living change morph quickly developers change perfkit benchmarker measures end end time provision resources cloud addition reporting standard metrics peak performance e.g latency throughput time-to-complete iops perfkit benchmarker reduces complexity running benchmarks supported cloud providers unified simple commands designed operate via vendor provided command line tools perfkit benchmarker contains canonical set public benchmarks benchmarks running default/initial state configuration tuned favor providers provides way benchmark across cloud platforms getting transparent view application throughput latency variance overhead perfkit benchmarker pkb started anthony f. voellm alain hamel eric hankland google 2014 initial alpha place anthony f. voellm ivan santa maria filho built community including arm broadcom canonical centurylink cisco cloudharmony cloudspectator ecocloud epfl intel mellanox microsoft qualcomm technologies inc. rackspace red hat tradeworx inc. thesys technologies llc community worked together behind scenes private github project create open way measure cloud performance community released first public beta released february 11 2015 announced blog post point github project open everyone almost year large adaption 600+ participants github v1.0.0 released along detailed architectural design december 10 2015 many members made significant contributions pkb community appreciative particular carlos torres rackspace mateusz blaszkowski intel made significant contributions became first members outside google committer rights find pkb community github participate list available benchmarks perfkitbenchmarker latest set benchmarks found github readme file since google open sourced perfkitbenchmarker became community effort 30 leading researchers academic schools industry companies organizations include arm broadcom canonical centurylink cisco cloudharmony cloud spectator ecocloud epfl intel mellanox microsoft qualcomm technologies rackspace red hat thesys technologies addition stanford mit leading quarterly discussions default benchmarks settings proposed community ecocloud epfl integrating cloudsuite perfkit benchmarker example run google cloud platform example run aws example run azure example run rackspace example run local machine
[ 320, 1458, 6874, 2700, 3706, 5064, 6586, 6062 ]
Test
1,184
8
Web_Bot:web bot web bot internet bot computer program whose developers claim able predict future events tracking keywords entered internet developed 1997 originally predict stock market trends creator web bot project clif high along associate george ure keep technology algorithms largely secret sell predictions via website internet bots monitor news articles blogs forums forms internet chatter words lexicon assigned numeric values emotional quantifiers duration impact immediacy intensity others lexicon dynamic changes according shifts emotional tension humans communicate changes using internet 2008 300,000 keywords lexicon along emotional context fed computer-generated modelspace operators web bot interpret bot results make report called alta report available website paying subscribers alta stands asymmetric language trend analysis many believe predictions pseudoscientific vague meaningful despite creators made many claims fact reports predicted important events history channel discussed web bot special doomsday 2012 shows feature predictions end world nostradamus effect globe mail journalist noted tom chivers daily telegraph notes three criticisms project
[]
Test