node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
1,485
8
SeeVolution:seevolution seevolution real-time website analytic web service shows heatmap website detailing visitors clicking mouse moves scrolls data used allow webmasters see areas website visitors using seevolution founded edo cohen 2010 company began offering service free website owners 2011 company introduced premium features also kept free platform 2011 company secured 530,000 angel financing also passed milestone installed 2,500 website investment brought total funding angel investors 730,000 order keep demand product company secured additional round angel funding 2012 seevolution uses x-ray tool capture data users interact different parts website data collected includes mouse clicks data entries navigational information data used create heatmap overlays webpage show visitors moving mouse clicking far scroll specific page allows user see data real-time also provides event notifications product works installing simple javascript website monitored logging heatmap overlay show site showing clicks page scrolls
[ 6986, 2451, 4600, 84 ]
Test
1,486
4
CESG_Claims_Tested_Mark:cesg claims tested mark cesg claims tested mark abbreviated cct mark cctm formerly csia claims tested mark uk government standard computer security cct mark based upon framework vendors make claims security attributes products and/or services independent testing laboratories evaluate products/services determine actually meet claims words cct mark provides quality assurance approach validate whether implementation computer security product services performed appropriate manner cct mark developed auspices uk government central sponsor information assurance csia part cabinet office intelligence security resilience isr function role providing specialist input cct mark fell cesg uk national technical authority nta information security assumed responsibility scheme whole 7 april 2008 testing laboratories must comply iso 17025 united kingdom accreditation service ukas carrying accreditation cct mark often compared international common criteria cc simultaneously correct incorrect september 2010 cesg announced product assurance element cct mark overtaken new commercial product assurance cpa approach unclear yet whether cct mark remain existence assurance information security services
[ 6208, 1805 ]
Test
1,487
2
Feather_Linux:feather linux feather linux created robert sullivan knoppix-based operating system fits 128 mb older versions made fit within 64 mb boots either cd usb flash drive fluxbox desktop environment wide range desktop rescue software load entirely ram enough ram available installed hard drive feather linux contains gtk+ applications abiword pidgin feather linux tried include software people would frequently using desktop available x86 architecture run 486 higher requires 16mb ram run console 24mb ram run x server according distrowatch feather linux discontinued final release 2005-07-04 feather linux home page longer available feather linux damn small linux share common goals
[ 5200, 1629, 3444, 7251, 474, 4496, 7075, 5571, 1941, 314, 2758, 1663, 2864, 6209, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 7954, 6244 ]
Test
1,488
0
Hans_Uszkoreit:hans uszkoreit hans uszkoreit german computational linguist hans uszkoreit studied linguistics computer science technical university berlin university texas austin studying austin also worked research associate large machine translation project linguistics research center received ph.d. linguistics university texas worked computer scientist artificial intelligence center affiliated center study language information stanford university nowadays teaching professor computational linguistics saarland university moreover serves scientific director german research center artificial intelligence dfki heads dfki language technology lab hans uszkoreit 1988 called position saarland university work field computational linguistics created department computational linguistics phonetics 1989 elected head language technology lab dfki uszkoreit also co-founder principal investigator special collaborative research division sfb 378 “ resource-adaptive cognitive processes ” european postgraduate program language technology cognitive systems ’ co-founder professor member international committee computational linguistics european academy sciences past president european association logic language information fellow board directors european network language speech also european language resources association
[ 1314, 6530, 5008 ]
Test
1,489
4
Piggybacking_(security):piggybacking security security piggybacking similar tailgating refers person tags along another person authorized gain entry restricted area pass certain checkpoint either electronic physical act may legal illegal authorized unauthorized depending circumstances however term often connotation illegal unauthorized act describe act unauthorized person follows someone restricted area without consent authorized person term tailgating also used tailgating implies without consent similar car tailgating another vehicle freeway piggybacking usually implies consent authorized person piggybacking came public attention particularly 1999 series weaknesses exposed airport security study showed majority undercover agents attempting pass checkpoints bring banned items planes board planes without tickets successful piggybacking revealed one methods used order enter off-limits areas piggybackers various methods breaching security may include piggybacking regarded one simpler forms social engineering
[ 7836, 5676 ]
Test
1,490
6
DCache:dcache dcache system storing retrieving huge amounts data distributed among large number heterogenous server nodes single virtual filesystem tree variety standard access methods dcache open source software built java used among others ten fourteen tier1 sites cern store data large hadron collider dcache provides methods exchanging data backend tertiary storage systems well space management pool attraction dataset replication hot spot determination recovery disk node failures connected tertiary storage system cache simulates unlimited direct access storage space data exchanges underlying hierarchical storage management system performed automatically invisibly user beside protocols specific high-energy physics data dcache accessed via nfsv4.1 well webdav
[]
Test
1,491
1
MyRocks:myrocks myrocks open-source software developed facebook order use mysql features rocksdb implementations based oracle mysql 5.6 percona making myrocks accessible users bringing percona server starting version 10.2.5 mariadb includes myrocks alpha-stage storage engine library maintained facebook database engineering team rocksdb optimized fast low-latency storage myrocks aimed keeping storage savings efficient myrock ’ efficiency focuses better space efficiency better write efficiency better read efficiency benchmark tests 3 different instances – myrocks compressed innodb uncompressed innodb compressed 8 kb page size – found ssd database storage means less space used higher endurance storage time officially supported subset platforms compiler toolsets verify builds best effort made support following oss
[ 6755, 840, 4998, 5126, 6056, 6628, 6279, 6061, 3244, 3542, 5141 ]
Test
1,492
7
Monaca_(software):monaca software monaca software tools services solution building deploying html5 mobile hybrid apps built top open source apache cordova formerly known phonegap monaca provides full-suite resources including cloud ide local development tools debugger backend support monaca cloud-based ide builds html5 hybrid mobile apps ios android windows chrome apps using html css javascript multi-platform app development utilizes native language components functionalities monaca framework agnostic provides integration onsen ui ionic framework building user interface monaca releases vue.js support onsen ui monaca html5 hybrid application advancement stage reported arrival onsen ui vue onsen ui open source ui structure building half half versatile applications dynamic web applications vue.js dynamic javascript system onsen ui engineers without much stretch form versatile ui vue.js portable applications
[ 562, 5571 ]
Test
1,493
2
PWB/UNIX:pwb/unix programmer workbench pwb/unix early discontinued version unix operating system created bell labs computer science research group stated goal provide time-sharing working environment large groups programmers writing software larger batch processing computers prior 1976 unix development project small group researchers department 1127 bell labs usefulness unix departments bell labs evident company decided develop version unix tailored support programmers production work research programmer workbench started 1973 evan ivie rudd canaday support computer center 1000-employee bell labs division would largest unix site several years pwb/unix provide tools teams programmers manage source code collaborate projects team members also introduced several stability improvements beyond research unix support nroff troff text formatters pwb users managed source code pdp-11 unix systems programs often written run legacy operating systems reason pwb included software submitting jobs ibm system/370 univac 1100 series xds sigma 5 computers 1977 pwb supported user community 1100 users business information systems programs bisp group bell labs two major releases programmer workbench produced pwb/unix 1.0 released july 1 1977 based version 6 unix pwb 2.0 based version 7 unix operating system advertised bell system software late 1981 edition 1.0 still price list educational institutions 1984 pwb/unix later incorporated commercial unix system iii unix system v releases notable firsts pwb include
[ 1522, 4751, 4478, 7710, 900, 2467, 6267, 3624, 5216, 2294, 3106, 5571, 2300, 4145, 2118, 6360, 578, 6367, 4447, 6577, 5348, 1426, 443, 1435 ]
Test
1,494
3
Lawrence_Livermore_National_Laboratory:lawrence livermore national laboratory lawrence livermore national laboratory llnl federal research facility livermore california united states founded university california berkeley 1952 originally branch lawrence berkeley national laboratory lawrence livermore laboratory became autonomous 1971 designated national laboratory 1981 federally funded research development center ffrdc lawrence livermore lab primarily funded u.s. department energy doe managed operated lawrence livermore national security llc llns partnership university california bechtel bwx technologies aecom battelle memorial institute affiliation texas university system 2012 laboratory synthetic chemical element livermorium named llnl self-described premier research development institution science technology applied national security principal responsibility ensuring safety security reliability nation nuclear weapons application advanced science engineering technology laboratory also applies special expertise multidisciplinary capabilities preventing proliferation use weapons mass destruction bolstering homeland security solving nationally important problems including energy environmental security basic science economic competitiveness laboratory located one-square-mile 2.6 km site eastern edge livermore also operates remote experimental test site called site 300 situated southeast main lab site llnl annual budget 1.5 billion staff roughly 5,800 employees llnl established 1952 university california radiation laboratory livermore offshoot existing uc radiation laboratory berkeley intended spur innovation provide competition nuclear weapon design laboratory los alamos new mexico home manhattan project developed first atomic weapons edward teller ernest lawrence director radiation laboratory berkeley regarded co-founders livermore facility new laboratory sited former naval air station world war ii already home several uc radiation laboratory projects large location berkeley hills uc campus including one first experiments magnetic approach confined thermonuclear reactions i.e fusion half hour southeast berkeley livermore site provided much greater security classified projects urban university campus lawrence tapped former graduate student herbert york age 32 run livermore york lab four main programs project sherwood magnetic-fusion program project whitney weapons-design program diagnostic weapon experiments los alamos livermore laboratories basic physics program york new lab embraced lawrence big science approach tackling challenging projects physicists chemists engineers computational scientists working together multidisciplinary teams lawrence died august 1958 shortly university board regents named laboratories lawrence radiation laboratory historically berkeley livermore laboratories close relationships research projects business operations staff livermore lab established initially branch berkeley laboratory livermore lab officially severed administratively berkeley lab 1971 day official planning documents records lawrence berkeley national laboratory designated site 100 lawrence livermore national lab site 200 llnl remote test location site 300 laboratory renamed lawrence livermore laboratory lll 1971 october 1 2007 llns assumed management llnl university california exclusively managed operated laboratory since inception 55 years laboratory honored 2012 synthetic chemical element livermorium named llns takeover laboratory controversial may 2013 alameda county jury awarded 2.7 million five former laboratory employees among 430 employees llns laid 2008 jury found llns breached contractual obligation terminate employees reasonable cause five plaintiffs also pending age discrimination claims llns heard different jury separate trial 125 co-plaintiffs awaiting trial similar claims llns may 2008 layoff first layoff laboratory nearly 40 years march 14 2011 city livermore officially expanded city boundaries annex llnl move within city limits unanimous vote livermore city council expanded livermore southeastern boundaries cover 15 land parcels covering comprise llnl site site formerly unincorporated area alameda county llnl campus continues owned federal government inception livermore focused new weapon design concepts result first three nuclear tests unsuccessful lab persevered subsequent designs proved increasingly successful 1957 livermore lab selected develop warhead navy polaris missile warhead required numerous innovations fit nuclear warhead relatively small confines missile nosecone cold war many livermore-designed warheads entered service used missiles ranging size lance surface-to-surface tactical missile megaton-class spartan antiballistic missile years llnl designed following warheads w27 regulus cruise missile 1955 joint los alamos w38 atlas/titan icbm 1959 b41 b52 bomb 1957 w45 little john/terrier missiles 1956 w47 polaris slbm 1957 w48 155-mm howitzer 1957 w55 submarine rocket 1959 w56 minuteman icbm 1960 w58 polaris slbm 1960 w62 minuteman icbm 1964 w68 poseidon slbm 1966 w70 lance missile 1969 w71 spartan missile 1968 w79 8-in artillery gun 1975 w82 155-mm howitzer 1978 b83 modern strategic bomb 1979 w87 peacekeeper/mx icbm 1982 w87 b83 llnl designs still u.s. nuclear stockpile collapse soviet union 1991 end cold war united states began moratorium nuclear testing development new nuclear weapon designs sustain existing warheads indefinite future science-based stockpile stewardship program ssp defined emphasized development application greatly improved technical capabilities assess safety security reliability existing nuclear warheads without use nuclear testing confidence performance weapons without nuclear testing maintained ongoing process stockpile surveillance assessment certification refurbishment weapon replacement new designs nuclear weapons warheads u.s. stockpile must continue function far past original expected lifetimes components materials age problems arise stockpile life extension programs extend system lifetimes also introduce performance uncertainties require maintenance outdated technologies materials concern become increasingly difficult maintain high confidence current warheads long term department energy/national nuclear security administration initiated reliable replacement warhead rrw program rrw designs could reduce uncertainties ease maintenance demands enhance safety security march 2007 llnl design chosen reliable replacement warhead since time congress allocated funding development rrw llnl conducts research properties behavior plutonium learn plutonium performs ages behaves high pressure e.g. impact high explosives plutonium seven temperature-dependent solid allotropes possesses different density crystal structure alloys plutonium even complex multiple phases present sample given time experiments conducted llnl elsewhere measure structural electrical chemical properties plutonium alloys determine materials change time measurements enable scientists better model predict plutonium long-term behavior aging stockpile lab plutonium research conducted specially designed facility called superblock emphasis safety security work highly enriched uranium also conducted march 2008 national nuclear security administration nnsa presented preferred alternative transformation nation nuclear weapons complex plan llnl would center excellence nuclear design engineering center excellence high explosive research development science magnet high-energy-density i.e. laser physics addition special nuclear material would removed consolidated central yet-to-be-named site september 30 2009 nnsa announced two thirds special nuclear material e.g. plutonium llnl requiring highest level security protection removed llnl move part nnsa efforts initiated october 2006 consolidate special nuclear material five sites 2012 significantly reduced square footage sites 2017 federally mandated project intends improve security reduce security costs part nnsa overall effort transform cold war era nuclear weapons enterprise 21st-century nuclear security enterprise original date remove high-security nuclear material llnl based equipment capability capacity 2014 nnsa llnl developed timeline remove material early possible accelerating target completion date 2012 lab work global security aims reduce mitigate dangers posed spread use weapons mass destruction threats energy environmental security livermore working global security homeland security decades predating collapse soviet union 1991 september 11 2001 terrorist attacks llnl staff heavily involved cooperative nonproliferation programs russia secure at-risk weapons materials assist former weapons workers developing peaceful applications self-sustaining job opportunities expertise technologies mid-1990s lab scientists began efforts devise improved biodetection capabilities leading miniaturized autonomous instruments detect biothreat agents minutes instead days weeks previously required dna analysis today livermore researchers address spectrum threats – radiological/nuclear chemical biological explosives cyber combine physical life sciences engineering computations analysis develop technologies solve real-world problems activities grouped five programs llnl supports capabilities broad range scientific technical disciplines applying current capabilities existing programs developing new science technologies meet future national needs lawrence livermore national laboratory worked several energy technologies field coal gasification shale oil extraction geothermal energy advanced battery research solar energy fusion energy main oil shale processing technologies worked lawrence livermore national laboratory llnl hrs hot-recycled-solid llnl rise situ extraction technology llnl radiofrequency technologies 60-year history lawrence livermore made many scientific technological achievements including july 17 2009 llnl announced laboratory received eight r 100 awards – ever received annual competition previous llnl record seven awards reached five times – 1987 1988 1997 1998 2006 also known oscars invention awards given year development cutting-edge scientific engineering technologies commercial potential awards raise llnl total number awards since 1978 129 october 12 2016 llnl released results computerized modeling mars moon phobos finding connection keeping earth safe asteroids throughout history llnl leader computers scientific computing even livermore lab opened doors e.o lawrence edward teller recognized importance computing potential computational simulation purchase one first univac computers set precedent llnl history acquiring exploiting fastest capable supercomputers world succession increasingly powerful fast computers used lab years llnl researchers use supercomputers answer questions subjects materials science simulations global warming reactions natural disasters llnl long history developing computing software systems initially commercially available software computer manufacturers considered customer responsibility develop users early computers write codes solve technical problems also routines run machines today llnl computer scientists focus creating highly complex physics models visualization codes unique applications tailored specific research requirements great deal software also written llnl personnel optimize operation management computer systems including operating system extensions chaos linux clustering resource management packages slurm llnl also initiated continues leading development zfs linux official port zfs linux operating system august 2009 joint venture announced sandia national laboratories/california campus llnl create open unclassified research development space called livermore valley open campus lvoc motivation lvoc stems current future national security challenges require increased coupling private sector understand threats deploy solutions areas high performance computing energy environmental security cyber security economic security non-proliferation lvoc modeled research development campuses found major industrial research parks u.s. department energy laboratories campus-like security set business operating rules devised enhance accelerate international scientific collaboration partnerships u.s. government agencies industry academia ultimately lvoc consist approximately 110-acre parcel along eastern edge livermore laboratory sandia sites house additional conference space collaboration facilities visitor center support educational research activities objectives lvoc llnl principal sponsor department energy/national nuclear security administration doe/nnsa office defense programs supports stockpile stewardship advanced scientific computing programs funding support llnl global security homeland security work comes doe/nnsa office defense nuclear nonproliferation well department homeland security llnl also receives funding doe office science office civilian radioactive waste management office nuclear energy addition llnl conducts work-for-others research development various defense department sponsors federal agencies including nasa nuclear regulatory commission nrc national institutes health environmental protection agency number california state agencies private industry fiscal year 2009 llnl spent 1.497 billion research laboratory operations activities research/science budget site management/operations budget llnl director appointed board governors lawrence livermore national security llc llns reports board laboratory director also serves president llns course history following scientists served llnl director llnl director supported senior executive team consisting deputy director deputy director science technology principal associate directors senior executives manage areas/functions directly reporting laboratory director directors office organized functional areas/offices laboratory organized four principal directorates headed principal associate director three directorates headed associate director reports llnl director llnl director reports lawrence livermore national security llc llns board governors group key scientific academic national security business leaders llns partner companies jointly control llns llns board governors total 16 positions six governors constituting executive committee decisions board made governors executive committee governors advisory executive committee voting rights university california entitled appoint three governors executive committee including chair bechtel also entitled appoint three governors executive committee including vice chair one bechtel governors must representative babcock wilcox b w washington division urs corporation urs nominated jointly b w urs year must approved appointed bechtel executive committee seventh governor appointed battelle non-voting advisory executive committee remaining board positions known independent governors also referred outside governors selected among individuals preferably national stature employees officers partner companies university california-appointed chair tie-breaking authority decisions executive committee board governors ultimate governing body llns charged overseeing affairs llns operations management llnl llns managers employees work llnl including president/laboratory director generally referred laboratory employees laboratory employees report directly indirectly llns president work performed llnl funded federal government laboratory employees paid llns responsible aspects employment including providing health care benefits retirement programs within board governors authority resides executive committee exercise rights powers authorities llns excepting certain decisions reserved parent companies llns executive committee free appoint officers managers llns llnl may delegate authorities deems appropriate officers employees representatives llns/llnl executive committee may also retain auditors attorneys professionals necessary part executive committee appointed senior managers llnl primary officers llns practical matter operational decisions delegated president llns also laboratory director positions president/laboratory director deputy laboratory director filled joint action chair vice chair executive committee university california nominating president/laboratory director bechtel nominating deputy laboratory director current llns chairman norman j. pattiz founder chairman westwood one america largest radio network also currently serves board regents university california vice chairman j. scott ogilvie president bechtel systems infrastructure inc. also serves board directors bechtel group inc. bgi bgi audit committee livermore action group organized many mass protests 1981 1984 nuclear weapons produced lawrence livermore national laboratory peace activists ken nightingale eldred schneider involved june 22 1982 1,300 anti-nuclear protesters arrested nonviolent demonstration recently annual protest nuclear weapons research lawrence livermore august 2003 1,000 people protested livermore labs new-generation nuclear warheads 2007 protest 64 people arrested 80 people arrested march 2008 protesting gates
[ 5363, 4841, 1346, 8163, 7428, 3849, 3521, 6435, 578, 3210, 5418, 7930, 8125, 5784, 2159, 3500, 2439, 4558, 8047, 2536, 6505 ]
Test
1,495
2
Dynamic_loading:dynamic loading dynamic loading mechanism computer program run time load library binary memory retrieve addresses functions variables contained library execute functions access variables unload library memory one 3 mechanisms computer program use software two static linking dynamic linking unlike static linking dynamic linking dynamic loading allows computer program start absence libraries discover available libraries potentially gain additional functionality dynamic loading common technique ibm operating systems system/360 os/360 particularly i/o subroutines cobol pl/i runtime libraries continues used ibm operating systems z/architecture z/os far application programmer concerned loading largely transparent since mostly handled operating system i/o subsystem main advantages ibm strategic transaction processing system cics 1970s onwards uses dynamic loading extensively kernel normal application program loading corrections application programs could made offline new copies changed programs loaded dynamically without needing restart cics frequently run 24/7 shared libraries added unix 1980s initially without ability let program load additional libraries startup dynamic loading frequently used implementing software plugins example apache web server codice_1 dynamic shared object plugin files libraries loaded runtime dynamic loading dynamic loading also used implementing computer programs multiple different libraries may supply requisite functionality user option select library libraries provide systems support dynamic loading unix-like operating systems macos linux solaris provide dynamic loading c programming language dl library windows operating system provides dynamic loading windows api loading library accomplished codice_2 codice_3 windows codice_4 unix-like operating systems examples follow unix library macos framework framework bundle contains objective-c code extracting contents dynamically loaded library achieved codice_5 windows codice_6 unix-like operating systems macos using objective-c bundles one also result codice_7 codice_8 converted desired destination used windows case conversion straightforward since farproc essentially already function pointer problematic address object retrieved rather function however usually one wants extract functions anyway normally problem according posix specification result codice_7 codice_10 pointer however function pointer required even size data object pointer therefore valid conversion type codice_11 pointer function may easy implement platforms systems use today function object pointers de facto convertible following code snippet demonstrates one workaround allows perform conversion anyway many systems snippet give warning compilers codice_12 another workaround disables warning even strict aliasing effect makes use fact reading different union member one recently written called type punning common explicitly allowed even strict aliasing force provided memory accessed union type directly however strictly case since function pointer copied used outside union note trick may work platforms size data pointers size function pointers fact remains conversion function data object pointers regarded inherently non-portable implementation extension correct way direct conversion exists since regard posix iso standards contradict problem posix documentation codice_7 outdated issue 6 stated future version may either add new function return function pointers current interface may deprecated favor two new functions one returns data pointers returns function pointers subsequent version standard issue 7 2008 problem discussed conclusion function pointers convertible codice_11 posix compliance requires compiler makers implement working cast case contents library changed i.e case custom library addition function pointer exported since pointer function pointer object pointer pointer always legally retrieved call codice_7 subsequent conversion however approach requires maintaining separate pointers functions used externally benefits usually small loading library causes memory allocated library must deallocated order avoid memory leak additionally failure unload library prevent filesystem operations computer file|file contains library unloading library accomplished codice_16 microsoft windows|windows codice_17 unix-like operating system s. however unloading dll lead program crashes objects main application refer memory allocated within dll example dll introduces new class dll closed operations instances class main application likely cause memory access violation likewise dll introduces factory function instantiating dynamically loaded classes calling dereferencing function dll closed leads undefined behaviour implementations dynamic loading unix-like operating systems microsoft windows|windows allow programmers extract symbols currently executing process unix-like operating systems allow programmers access global symbol table includes main executable subsequently loaded dynamic libraries microsoft windows|windows allows programmers access symbols exported main executable windows use global symbol table api search across multiple modules find symbol name java programming language java class|classes dynamically loaded using object example reflection mechanism also provides means load class n't already loaded uses classloader current class however simple way unload class controlled way loaded classes unloaded controlled way i.e programmer wants happen classloader used load class system class loader unloaded various details need observed ensure class really unloaded makes unloading classes tedious implicit unloading classes i.e uncontrolled way garbage collector changed times java java 1.2. garbage collector could unload class whenever felt needed space independent class loader used load class starting java 1.2 classes loaded via system classloader never unloaded classes loaded via classloaders classloader unloaded starting java 6 classes contain internal marker indicating garbage collector unloaded garbage collector desires independent classloader used load class garbage collector free ignore hint similarly libraries implementing native methods dynamically loaded using codice_18 method codice_19 method despite promulgation 1980s unix windows systems still chose add—or even remove—dynamic loading example plan 9 bell labs successor 9front consider dynamic linking harmful purposefully support go programming language |go programming language developers plan 9 also support dynamic linking plugin loading available since go 1.8 february 2017 go runtime library functions statically linked compiled binary category computer libraries category operating system technology
[ 1710, 1339, 6249, 4662, 4759, 3951, 993, 3623, 5381, 3368, 5571, 5932, 578, 7096, 757, 3664, 1989, 4017, 2266, 4287 ]
Test
1,496
8
Acid2:acid2 acid2 test page published promoted web standards project expose web page rendering flaws web browsers applications render html named acid test gold developed spirit acid1 relatively narrow test compliance cascading style sheets 1.0 css1 standard released 13 april 2005 acid1 application passes test way displays test page matches reference image acid2 tests aspects html markup css 2.1 styling png images data uris acid2 test page displayed correctly application follows world wide web consortium internet engineering task force specifications technologies specifications known web standards describe technologies used web expected function acid2 designed microsoft internet explorer particularly mind creators acid2 dismayed internet explorer follow web standards prone display web pages differently browsers causing web developers spend time tweaking web pages acid2 challenged microsoft make internet explorer comply web standards acid2 released 13 april 2005 31 october 2005 safari 2.0.2 became first browser pass acid2 opera konqueror firefox others followed release internet explorer 8 19 march 2009 latest versions major desktop web browsers pass test ie10 released fails test successor microsoft edge able render correctly windows 10 version 1607 acid2 followed acid3 test fails browsers become compliant current css collapse margin standards acid2 first proposed håkon wium lie chief technical officer opera software creator widely used cascading style sheets web standard 16 march 2005 article cnet lie expressed dismay microsoft internet explorer properly support web standards hence completely interoperable browsers announced acid2 would challenge microsoft design internet explorer 7 development achieve greater degree standards compliance previous versions internet explorer original acid1 test forced browser makers fix applications face embarrassment lie hoped acid2 would lie colleague ian hickson created first draft test february 2005 ian hickson coded final test collaboration web standards project larger web community officially released 13 april 2005 time every web browser failed spectacularly 23 april 2005 acid2 updated fix bug made mouth appear close nose several complaints test updated january 2006 remove test unpopular sgml-style comments never widely implemented browsers implement sgml-style comments original test displayed word error bottom part face march 2008 ian hickson released acid3 follow-up acid2 acid2 primarily tests css acid3 focuses javascript web 2.0 technologies july 2005 chris wilson internet explorer platform architect stated passing acid2 priority internet explorer 7 describing test wish list features rather true test standards compliance december 2007 microsoft announced changes required pass acid2 would made available internet explorer 8 changes would turned default meaning ie8 would actually pass test concern switching new behavior would cause many problems web pages expecting internet explorer old non-compliant behavior march 2008 microsoft released ie8 beta 1 turned changes default james pratt product manager ie8 explained decision made developers spend time building features cool stuff less time trying tweak sites across different browsers another unresolved standards compliance issue caused ie8 beta 1 fail elements test hosted server august 2008 microsoft released ie8 beta 2 resolved issue beta however standards mode turned default pages loaded intranet zone zone active pages loaded via unc paths named addresses without dots like nowiki http //mysite/ /nowiki sites bypass proxy settings ie8 pass acid2 test loaded cases acid2 tests variety web standards published world wide web consortium internet engineering task force exception css 2.1 web standards tested codified year 2000 css 2.1 candidate recommendation time acid2 release still candidate recommendation 23 april 2009 specifically acid2 tests acid2 comprehensive test guarantee total conformance particular standard variant acid2 test test data uri support also available web standards project passing score considered valid browser default settings used actions changing font sizes zoom level applying user stylesheets break display test expected relevant browser compliance following browser settings user actions invalidate test rendered correctly acid2 appear smiley face text hello world user browser nose turning blue mouse cursor hovers time test release every browser failed number browsers pass see list even though opera mini based rendering engine opera personal computers pass acid2 test opera mini intentionally reformats web pages try make suitable devices small screens following list releases noting significant releases applications passed test new applications passed acid2 since first official release included timeline
[ 2451, 5984, 4575, 4759, 7975, 7346, 296, 5378, 578, 6452, 6292, 7015, 8009, 2415, 5598, 3043, 4352, 6221, 3057, 4097, 348, 3338, 87, 445 ]
Test
1,497
7
HCentive:hcentive hcentive inc. based reston virginia software development company specializing cloud-based products health insurers state health agencies first company build health insurance exchange solution ground-up post affordable care act aca hcentive involved development state private health insurance marketplaces exchanges state organizations health insurance providers companies third party administrators works three top five health insurance organizations us 125 employees hcentive work corporate headquarters others based indian r center hcentive founded 2009 sanjay singh manoj agarwala tarun upadhyay started activities affordable care act became law expecting would create new market idea founding hcentive company emerged concepts aca health care reform debated united states congress company ’ ceo sanjay singh software engineer emigrated india 2000 singh co-founded globallogic software services company vienna virginia next fourteen years grew 7,000 employees webinsure state cloud-hosted solution state-based health insurance exchanges states new york colorado kentucky chosen product state health insurance marketplaces company also offers products private market webinsure private exchange solution cloud-based solution health plans tpas dental plans webinsure exchange manager integration health insurance exchange health insurance providers related parties august 2013 geisinger health plan ghp health insurance provider began cooperation hcentive implement health insurance exchange integration private exchange solutions rank 62 deloitte technology fast 500 north american 117 inc. 5000 2014 list 12 washington business journal fast 50 2015. ranked 19 among virginia-based companies ranked 117 inc. 5000 2014 list
[]
Validation
1,498
9
S-attributed_grammar:s-attributed grammar s-attributed grammars class attribute grammars characterized inherited attributes synthesized attributes inherited attributes must passed parent nodes children nodes abstract syntax tree semantic analysis parsing process problem bottom-up parsing bottom-up parsing parent nodes abstract syntax tree created creation children attribute evaluation s-attributed grammars incorporated conveniently top-down parsing bottom-up parsing specifications parser generators yacc family broadly considered s-attributed grammars however parser generators usually include capacity reference global variables and/or fields within given grammar rule meaning pure s-attributed approach s-attributed grammar also l-attributed grammar
[ 1580, 5326, 1463 ]
Validation
1,499
2
IUnknown:iunknown computer programming iunknown interface fundamental interface component object model com com specification mandates com objects must implement interface furthermore every com interface must derived iunknown iunknown exposes two essential features com objects object lifetime management reference counting access object functionality interfaces iunknown iunknown-derived interface consists pointer virtual method table contains list pointers functions implement functions declared interface order declared interface in-process invocation call overhead therefore identical virtual method calls c++ iunknown interface exposes three methods codice_1 codice_2 codice_3 iunknown interface id defined guid value 00000000-0000-0000-c000-000000000046 com component interfaces required exhibit reflexive symmetric transitive properties reflexive property refers ability codice_1 call given interface interface id return instance interface symmetric property requires interface b retrieved interface via codice_1 interface retrievable interface b well transitive property requires interface b obtainable interface interface c obtainable interface b interface c retrievable interface
[ 1685, 4541, 6991, 2679, 5747, 5910, 2198 ]
Test
1,500
4
Hupigon:hupigon hupigon also graftor detected backdoor.win32.hupigon trojan.win32.hupigon backdoor.win32.graftor trojan.win32.graftor backdoor trojan first known detection goes back november 2008 according securelist kaspersky labs malicious software usually portable executable may packed upx mostly used order connect worldwide group victimized pcs form botnet also known zombie network software able spread networks order infect computers computer worms see conficker difference backdoors spread automatically worms started command control-center supervising hupigon family large number variants written borland delphi
[ 2173, 5452, 3932, 2724, 6715, 5571, 7087, 7186, 1395, 2618, 3575, 2876, 954, 862, 74, 7683, 5611, 3154 ]
Test
1,501
4
Vulnerabilities_Equities_Process:vulnerabilities equities process vulnerabilities equities process vep process used u.s. federal government determine case-by-case basis treat zero-day computer security vulnerabilities whether disclose public help improve general computer security keep secret offensive use government adversaries vep first developed period 2008-2009 became public 2016 government released redacted version vep response foia request electronic frontier foundation following public pressure greater transparency wake shadow brokers affair u.s. government made public disclosure vep process november 2017 according vep plan published 2017 equities review board erb primary forum interagency deliberation determinations concerning vep erb meets monthly may also convened sooner immediate need arises erb consists representatives following agencies national security agency serves executive secretariat vep according november 2017 version vep process follows agency finds vulnerability notify vep secretariat soon possible notification include description vulnerability vulnerable products systems together agency recommendation either disseminate restrict vulnerability information secretariat notify participants submission within one business day requesting respond relevant interest agency expressing interest must indicate whether concurs original recommendation disseminate restrict within five business days hold discussions submitting agency vep secretariat within seven business days attempt reach consensus consensus reached participants suggest options equities review board decisions whether disclose restrict vulnerability made quickly full consultation concerned agencies overall best interest competing interests missions u.s. government far possible determinations based rational objective methodologies taking account factors prevalence reliance severity review board members reach consensus vote preliminary determination agency equity disputes decision may providing notice vep secretariat elect contest preliminary determination agency contests preliminary determination treated final decision vulnerability information released done quickly possible preferably within seven business days disclosure vulnerabilities conducted according guidelines agreed members submitting agency presumed knowledgeable vulnerability responsible disseminating vulnerability information vendor submitting agency may elect delegate dissemination responsibility another agency behalf releasing agency promptly provide copy disclosed information vep secretariat record keeping additionally releasing agency expected follow-up erb determine whether vendor ’ action meets government requirements vendor chooses address vulnerability acting urgency consistent risk vulnerability releasing agency notify secretariat government may take mitigation steps vep process criticized number deficiencies including restriction non-disclosure agreements lack risk ratings special treatment nsa less whole-hearted commitment disclosure default option
[ 3932, 2791, 208, 3393, 5131, 7181, 5509, 2505, 1805 ]
Train
1,502
2
Universal_binary:universal binary universal binary apple parlance executable file application bundle runs natively either powerpc intel-manufactured ia-32 intel 64-based macintosh computers implementation concept generally known fat binary release mac os x snow leopard since move 64-bit architectures general software publishers mozilla used term universal refer fat binary includes tailored builds i386 32-bit intel x86_64 systems mechanism used select powerpc intel builds application also used select 32-bit 64-bit builds either powerpc intel architectures apple however continues require native compatibility powerpc intel order grant third-party software publishers permission use apple trademarks related universal binaries time apple specify whether third-party software publishers must bundle separate builds 32-bit 64-bit variants either architecture universal binaries introduced 2005 apple worldwide developers conference means ease transition existing powerpc architecture systems based intel processors began shipping 2006 universal binaries typically include powerpc x86 versions compiled application operating system detects universal binary header executes appropriate section architecture use allows application run natively supported architecture negative performance impact beyond increase storage space taken larger binary starting mac os x snow leopard intel-based macs supported software specifically depends upon capabilities present mac os x 10.6 newer run intel-based macs therefore require intel/ppc fat binaries additionally starting os x lion 64-bit intel macs supported software specifically depends new features os x 10.7 newer run 64-bit processors therefore require 32-bit/64-bit fat binaries presently fat binaries would necessary software designed backward compatibility older versions mac os x running older hardware two general alternative solutions first simply provide two separate binaries one compiled x86 architecture one powerpc architecture however confusing software users unfamiliar difference two although confusion remedied improved documentation use hybrid cds alternative rely emulation one architecture system running architecture approach results lower performance generally regarded interim solution used universal binaries specifically compiled binaries available see rosetta universal binaries larger single-platform binaries multiple copies compiled code must stored however non-executable resources shared two architectures size resulting universal binary usually smaller binaries combined also require extra ram one two copies loaded execution apple previously used similar technique transition 68k processors powerpc mid-1990s dual-platform executables called fat binaries referring larger file size nextstep another predecessor mac os x supported fat binaries one application bundle could run multiple architectures including motorola m68k intel x86 sun microsystems sparc hewlett-packard pa-risc binary format underlying universal binary mach-o archive format used fat binary nextstep apple xcode 2.1 supports creation files new feature release simple application developed processor-independence mind might require changes compile universal binary complex application designed take advantage architecture-specific features might require substantial modification applications originally built using development tools might require additional modification reasons given delay introduction intel-based macintosh computers availability third-party applications universal binary format apple delivery intel-based computers several months ahead previously announced schedule another factor gap apple xcode 2.4 takes concept universal binaries even allowing four-architecture binaries created 32- 64-bit intel powerpc therefore allowing single executable take full advantage cpu capabilities mac os x machine many software developers provided universal binary updates products since 2005 wwdc december 2008 apple website lists 7,500 universal applications april 16 2007 adobe systems announced release adobe creative suite 3 first version application suite universal binary format march 2008 many applications mac os x ported universal binary including quarkxpress apple final cut studio adobe creative suite microsoft office 2008 shockwave player beginning version 11 non-universal 32-bit powerpc programs run intel macs running mac os x 10.4 10.5 10.6 cases non-optimal performance since must translated on-the-fly rosetta run mac os x 10.7 lion later rosetta longer part os unix file command macos several unix-like systems identify mach-o universal binaries report architecture support snow leopard system profiler provides information applications tab
[ 3940, 713, 4690, 734, 6832, 3989, 3655, 2597, 3322, 2609, 5786, 4740, 1897, 6502, 6505, 2627, 7609, 1171, 5109, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 502, 6557, 2679, 3043, 6565, 2329, 3050, 163, 4453, 6582, 7308, 6236, 5535, 875, 5...
Test
1,503
5
Open_Settlement_Protocol:open settlement protocol open settlement protocol osp client/server protocol used internet service providers exchange authorization accounting usage information support ip telephony open settlement protocol implemented voice telephony gateways softswitches h.323 multimedia conferencing gateways session initiation protocol sip proxies osp defined european telecommunications standards institute etsi project tiphon telecommunications internet protocol harmonization networks press release september 2 1998 announced industry leaders 3com corporation cisco gric communications ipass inc. transnexus teamed promote inter-domain authentication authorization accounting standards ip telephony open settlement protocol osp open settlement protocol developed authority european telecommunications standards institute etsi project tiphon tiphon project objective one benefits new open settlement protocol flexible feature-rich information exchange via extensible markup language xml message system defined protocol architecture uses http communicate principal message content includes mime header together xml document codice_1 open settlement protocol standard specification may found document etsi technical specification 101 321 telecommunications internet protocol harmonization networks tiphon release 4 open settlement protocol inter-domain pricing authorisation usage exchange version 4.1.1 document ratified november 2003 document statement scope reads section 6 xml content xml element attribute declarations section define provisional dtd open settlement protocol osp toolkit complete development kit software developers want implement client side european telecommunication standards institute etsi osp standard secure voip peering osp toolkit includes source code written ansi c test tools extensive documentation implement osp standard hosted osp test server freely available internet developers test osp implementation
[ 7170 ]
Test
1,504
4
Employee_monitoring_software:employee monitoring software employee monitoring software means employee monitoring allows company administrators monitor supervise employee computers central location normally deployed business network allows easy centralized log viewing via one central networked pc sometimes companies opt monitor employees using remote desktop software instead employee monitoring software used supervise employees performance prevent illegal activities avoid confidential info leakage catch insider threats nowadays employee monitoring software widely used technology companies employee monitoring program monitor almost everything computer keystrokes passwords inputted websites visited chats facebook messenger skype social chats piece monitoring software also capture screenshots mobile activities administrator view logs cloud panel receive logs email may better inform employees advance administrator plans use employee monitoring software employees computers way employees may behave well try make mistakes case employees increase efficiency create value company
[ 3860, 3743, 2636, 6419, 6816, 104, 6023 ]
Test
1,505
4
RSA_Security:rsa security rsa security llc formerly rsa security inc. business rsa american computer network security company focus encryption encryption standards rsa named initials co-founders ron rivest adi shamir leonard adleman rsa public key cryptography algorithm also named among products rsa bsafe cryptography libraries securid authentication token rsa known allegedly incorporating backdoors developed nsa products also organizes annual rsa conference information security conference founded independent company 1982 rsa security acquired emc corporation 2006 us 2.1 billion operated division within emc emc acquired dell technologies 2016 rsa became part dell technologies family brands rsa based bedford massachusetts regional headquarters bracknell uk singapore numerous international offices ron rivest adi shamir leonard adleman developed rsa encryption algorithm 1977 founded rsa data security 1982 march 17 2011 rsa disclosed attack two-factor authentication products attack similar sykipot attacks july 2011 sk communications hack nightdragon series attacks rsa called advanced persistent threat today securid commonly used software token rather older physical tokens rsa relationship nsa changed years reuter joseph menn cybersecurity analyst jeffrey carr noted two adversarial relationship early years rsa leaders prominent advocates strong cryptography public use nsa bush clinton administrations sought prevent proliferation mid-1990s rsa bidzos led fierce public campaign clipper chip encryption chip backdoor would allow u.s. government decrypt communications clinton administration pressed telecommunications companies use chip devices relaxed export restrictions products used restrictions prevented rsa security selling software abroad rsa joined civil libertarians others opposing clipper chip among things distributing posters foundering sailing ship words sink clipper rsa security also created des challenges show widely used des encryption breakable well-funded entities like nsa relationship shifted adversarial cooperative bidzos stepped ceo 1999 according victor chan led rsa department engineering 2005 joined 10 people labs fighting nsa became different company later example rsa reported accepted 10 million nsa 2004 deal use nsa-designed dual ec drbg random number generator bsafe library despite many indications dual_ec_drbg poor quality possibly backdoored rsa security later released statement dual_ec_drbg kleptographic backdoor march 2014 reported reuters rsa also adapted extended random standard championed nsa later cryptanalysis showed extended random add security rejected prominent standards group internet engineering task force extended random however make nsa backdoor dual_ec_drbg tens thousands times faster use attackers key dual_ec_drbg backdoor presumably nsa extended nonces extended random made part internal state dual_ec_drbg easier guess rsa security java version hard crack without extended random since caching dual_ec_drbg output e.g rsa security c programming language version already made internal state fast enough determine indeed rsa security implemented extended random java implementation dual_ec_drbg 2004 2013 rsa shipped security software — bsafe toolkit data protection manager — included default cryptographically secure pseudorandom number generator dual ec drbg later suspected contain alleged secret national security agency kleptographic backdoor alleged backdoor could made data encrypted tools much easier break nsa allegedly secret private key backdoor scientifically speaking alleged backdoor employs kleptography essentially instance diffie hellman kleptographic attack published 1997 adam young moti yung rsa security employees aware least dual_ec_drbg might contain backdoor three employees members ansi x9f1 tool standards guidelines group dual_ec_drbg submitted consideration early 2000s possibility random number generator could contain backdoor first raised ansi x9 meeting according john kelsey co-author nist sp 800-90a standard contains dual_ec_drbg january 2005 two employees cryptography company certicom — also members x9f1 group — wrote patent application described backdoor dual_ec_drbg identical nsa one patent application also described three ways neutralize backdoor two — ensuring two arbitrary elliptic curve points p q used dual_ec_drbg independently chosen smaller output length — added standard option though nsa backdoored version p q large output length remained standard default option kelsey said knew implementers actually generated non-backdoored p q reports implementations using smaller outlet nevertheless nist included dual_ec_drbg 2006 nist sp 800-90a standard default settings enabling backdoor largely behest nsa officials cited rsa security early use random number generator argument inclusion standard also fix unrelated backdoor problem csprng predictable gjøsteen pointed earlier 2006 lead gjøsteen call dual_ec_drbg cryptographically sound ansi standard group members microsoft employees dan shumow niels ferguson made public presentation backdoor 2007 commenting shumow ferguson presentation prominent security researcher cryptographer bruce schneier called possible nsa backdoor rather obvious wondered nsa bothered pushing dual_ec_drbg included general poor quality possible backdoor would ensure nobody would ever use seem general awareness rsa security made default products 2004 snowden leak september 2013 new york times drawing snowden leaks revealed nsa worked insert vulnerabilities commercial encryption systems systems networks endpoint communications devices used targets part bullrun program one vulnerabilities times reported dual_ec_drbg backdoor renewed focus dual_ec_drbg noted rsa security bsafe used dual_ec_drbg default previously widespread awareness new york times published article rsa security recommended users switch away dual_ec_drbg denied deliberately inserted backdoor rsa security officials largely declined explain remove dubious random number generator flaws became known implement simple mitigation nist added standard neutralize suggested later verified backdoor reuters joseph menn reported nsa secretly paid rsa security 10 million 2004 set dual_ec_drbg default csprng bsafe story quoted former rsa security employees saying alarms raised deal handled business leaders rather pure technologists interviewed cnet schneier called 10 million deal bribe rsa officials responded entered contract engaged project intention weakening rsa ’ products menn stood story media analysis noted rsa reply non-denial denial denied company officials knew backdoor agreed deal assertion menn story make wake reports several industry experts cancelled planned talks rsa 2014 rsa conference among mikko hyppönen finnish researcher f-secure cited rsa denial alleged 10 million payment nsa suspicious hyppönen announced intention give talk governments malware authors conference quickly set reaction reports trustycon held day one block away rsa conference 2014 rsa conference former rsa security executive chairman art coviello defended rsa security choice keep using dual_ec_drbg saying became possible concerns raised 2007 might merit nist acknowledged problems 2013 rsa known securid product provides two-factor authentication hundreds technologies utilizing hardware tokens rotate keys timed intervals software tokens one time codes 2016 rsa re-branded securid platform rsa securid access release added single-sign-on capabilities cloud authentication resources using saml 2.0 types federation rsa securid® suite also contains rsa identity governance lifecycle solution formally aveksa solution provides visibility access within organization manages access various capabilities access review request provisioning rsa envision security information event management siem platform centralised log-management service claims enable organisations simplify compliance process well optimise security-incident management occur april 4 2011 emc purchased netwitness added rsa group products netwitness packet capture tool aimed gaining full network visibility detect security incidents tool re-branded rsa security analytics combination rsa envision netwitness siem tool log packet capture rsa archer grc platform software supports business-level management governance risk management compliance grc platform allows users adapt solutions requirements build new applications integrate external systems without touching single line code product originally developed archer technologies emc acquired 2010
[ 8157, 2543, 4295, 1344, 5276, 1168, 2193, 4133, 113, 6179, 907, 7818, 651, 129, 2667, 2489, 6644, 2325, 7207, 5511, 7120, 7856, 5251, 6049, 74, 7867, 6777, 7415, 972, 4838, 1805 ]
Test
1,506
3
Stardent_Inc.:stardent inc. stardent computer inc. manufacturer graphics supercomputer workstations late 1990s company formed 1989 ardent computer corporation formerly dana computer inc. stellar computer inc. merged stellar computer founded 1985 newton massachusetts headed william poduska previously founded prime computer apollo computer company aimed produce workstation system enough performance serious threat titan lower price ardent responded starting work new desktop system called stiletto featured two mips r3000s paired two r3010 fpus four i860s graphics processing i860s replaced vector units first product demonstrated march 1988 investment japanese company mitsui others announced june 1988 bringing total capital raised 48 million almost time november 1985 alan h. michaels matthew sanders iii co-founded dana computer inc. sunnyvale california silicon valley company sought produce desktop multiprocessing supercomputer dedicated graphics could support four processor units processor unit consisted initially mips r2000 cpu later r3000 connected custom vector processor vector unit held 8,192 64-bit registers could used way 8,192 one-word thirty-two 256-word registers compares modern simd systems allow perhaps eight sixteen 128-bit registers small variety addressing schemes changed company name dana ardent learning local disk drive company called dana goal release titan competitor july 1987 50,000 price point late 1986 however became clear unrealistic second round funding came kubota corporation japanese heavy industries company cash spare looking new opportunities kubota agreed fund completion titan also provide production facilities japan time finally ready testing february 1988 performance leadership position titan eroded price risen 80,000 ardent software ran unix system v release 3 proprietary support four-way smp vector processor compiler based convex fortran c compiler significant graphics system visualization dore dynamic object rendering environment gordon bell architect vax computer early member ardent michaels considered working poduska founded convergent technologies instead ardent japan-based kubota corporation became major investor owning 44 ardent delay product introduced 1988 merger two rivals announced august 30 1989 completed november 1989 poduska chief executive bell served chief scientist although stardent products known high performance also demanded high prices 1990 model quoted 123,400 example although much less cray y-mp kubota alleged forced merger odd twist original stellar group left corporate power number ardent employees less happy move quit form companies others attempted get kubota spin original development group new company called comet nothing came early july 1990 california portion stardent transferred company headquarters massachusetts co-chairmen michaels sanders brought suit kubota july 13 25 million damages contending kubota used financial leverage ardent force merge transfer people technology kubota unit july 24 1990 stardent fired co-chairmen michaels sanders offering settlement avoid publicity august board directors dismissed michaels sanders board agreed sell equity company kubota additional 60 million august 1991 stardent spun popular application visualization system avs software separate company november year stardent announced would cease operate name stardent computer sell titan workstation operations kubota pacific computers find buyer vistra workstations create new company called gs computer services provide maintenance support discontinued gs series workstations inherited stellar investors lost estimated 200 million remainder company would focus avs software system existing shareholders stardent would become shareholders software firm end year company given finding buyer believed oki electric vistra line workstations still hoped sell underlying graphics technology based intel i860 stardent decided liquidate rather pursuing new funding kubota corporation sales estimated 40 million 1990 limited ability compete workstation manufacturers ibm hp silicon graphics kubota pacific cast looking direction finally settling desktop-sized 3d graphics accelerator alpha-based dec 3000 axp workstations called denali company also bought dec 3000 axp workstations packaged denali sold integrated product kenai workstation company changed name becoming kubota graphics company closed 1994 1994 kubota graphics bought accelgraphics maker accelgraphics ag300 ag500 accelgraphics turn acquired evans sutherland 1998 stellar line called graphics supercomputer gs considered advanced design late 1980s stellar gs workstation family consisted gs1000 gs2000 models stellar merged ardent form stardent sold st1000 st2000 models gs2000 cpu supported four threads streams execution total 20 mips vector coprocessor capable 80 mflops 16 128mb system memory supported 64mb memory typical four threads implemented using barrel processor design similar used cdc 6000 series denelcor hep gs2000 graphics subsystem supported interactive 3d rendering rates 120,000 gouraud-shaded triangles per second 600,000 short vectors per second texture mapping antialiasing accumulation buffer also supported cpu graphics system shared system memory vector coprocessor gs workstations used x window system 3d hardware programmed x extension known xfdi x floating-point device interface bindings c fortran display supported 1280 1024 resolution 12 24 bits per pixel pseudo-color true-color modes 12 24-bit z buffers supported gs2000 cabinet quite large approximately 30 inches wide 48 inches tall 36 inches deep companion expansion chassis size could contain 9-track tape drive example
[ 7010, 2226, 1023, 3764, 4368, 551, 939, 7412, 8117, 2803 ]
Test
1,507
1
Anime_News_Network:anime news network anime news network ann anime industry news website reports status anime manga video games japanese popular music related cultures within north america australia southeast asia japan website offers reviews editorial content forums readers discuss current issues events encyclopedia contains large number anime manga information japanese english staff theme music plot summaries user ratings founded july 1998 justin sevakis website claims leading english-language source news information anime manga internet site operated 2008 magazine protoculture addicts website separate versions news content aimed towards audiences four separate regions united states canada australia new zealand southeast asia france international version website founded justin sevakis july 1998 may 2000 current ceo christopher macdonald joined website editorial staff replacing former editor-in-chief isaac alexander july 2002 anime news network launched encyclopedia collaborative database anime manga titles also including information staff cast companies involved production localization titles january 2007 ann launched separate version australian audiences july 4 2008 ann launched video platform library anime trailers well news show anntv fall 2004 editorial staff ann became formally involved anime magazine protoculture addicts magazine began publishing ann editorial control january 2005 september 7 2004 sci fi channel online newsletter sci fi weekly named site web site week anime news network stories related anime manga researched ann staff contributors staff discretion also contribute news articles website maintains listing anime manga titles well people companies involved production titles dubs encyclopedia site hosted several regular columns including question-and-answer column hey answerman review column entitled shelf life column old forgotten media called buried treasure written sevakis listing claimed differences edited original versions anime series titled edit list staff members ann also publish blogs hosted site ann also hosts forums includes threads accompany news item purposes discussion anime news network hosts irc channel worldirc network animenewsnetwork august 7 2017 hacker took control anime news network domain animenewsnetwork.com compromised site twitter accounts including personal accounts ann ceo christopher macdonald executive editor zac bertschy site temporarily live animenewsnetwork.cc staff regained control original domain article days loss domain macdonald published full story domain stolen
[ 4023, 4686, 8011, 4503, 518, 5638, 7409, 5749, 423 ]
Test
1,508
3
Tandy_1000:tandy 1000 tandy 1000 first line ibm pc compatible home computer systems produced tandy corporation sale radio shack radio shack computer center chains stores december 1983 executive tandy corporation maker trs-80 computers said new ibm pcjr 'm sure lot people coming pcjr look-alikes market big preparing tandy 2000—the company first ms-dos computer—for release november 1983 tandy began designing tandy 1000 code named august unlike 2000 would pc compatible ibm pc support pcjr graphics standard released november 1984 1,200 tandy 1000 offered functionality pcjr improved keyboard better expandability compatibility could ibm made mistake pcjr amazed tandy executive said regarding chiclet keyboard another claimed 1000 pcjr tandy 2000—not completely pc compatible—quickly failed although press saw 1000 former personal-computer leader tandy admitting could longer focus proprietary products market ibm pc dominated 1000 sold units first month tandy product early 1985 best-selling computer 1000 joystick ports like pcjr 16-color graphics 3-voice sound pcjr rom cartridge ports since ibm discontinued pcjr soon release 1000 tandy quickly removed mentions pcjr advertising emphasizing product pc compatibility although tandy initially marketed 1000 business computer like ibm pc infoworld stated 1985 company produced real home computer company claimed 1000 first fully ibm pc-compatible computer available less 1000 1000 helped company obtain 9.5 share us home-computer market 1986 year tandy stated half compatibles purchased home 1988 ceo john roach disagreed apple counterpart john sculley rejection home market let deny person well-represented home market wants abandon right tandy also regained significant share apple-dominated educational market two companies equally shared 1000 many successors successful unlike pcjr partly sold ubiquitous radio shack stores partly computer less costly easier expand almost entirely compatible ibm pc pcjr enhanced graphics sound standards became known tandy-compatible graphics sound built-in joystick ports 1000 best computer pc games vga graphics became popular 1990s software companies era advertised support tandy platform 28 66 games computer gaming world tested 1989 supported tandy graphics tandy 1000 computers first ibm pc clones incorporate complete set basic peripherals motherboard using proprietary asics forerunner chipset although original tandy 1000 came ibm pc-like desktop case models notably 1000 ex 1000 hx used home-computer-style cases keyboard motherboard disk drives one enclosure high level integration made machines cost-effective alternative larger complex ibm pc/xt pc/at-type systems required multiple add-in cards often purchased separately implement comparable feature-set tandy 1000 derived ibm pcjr architecture tandy 1000 offered several important features ibm pc-compatibles time lacked pcjr sound generator extended cga-compatible graphics controller also offered multiple built-in i/o ports including joystick port frequently separate add-on card non-tandy machines original line equipped intel 8088 cpu later extended faster clock speeds also 8086 80286 toward end line rsx 80386sx processors successors 1000 appended two three letters name space e.g tandy 1000 ex tandy 1000 hx instances letters slash appended followed either number additional letters e.g tandy 1000 tl/2 tandy 1000 rl/hd 1993 changes market made increasingly difficult tandy corporation make profit computer line tandy corporation sold computer manufacturing business ast computers tandy computer lines terminated radio shack stores began selling computers made manufacturers ibm compaq article subtitled junior meets match john j. anderson creative computing called original tandy 1000 machine ibm inept incapable afraid manufacture sure put whopping dent pcjr sales sales pc 'senior well favorably mentioned low price good pc-software compatibility bundled deskmate might never need another software package computer 80 micro approved 1000s pc compatibility stated exterior design gives feeling quality confidence magazine concluded tandy machine closely emulates basic functions ibm pc affordable price ... along security tandy substantial support network wondered people would buy 1000 ibm lowered price pc infoworld noted 1000s low price fully one-third less comparably equipped ibm pc predicted computer really intended elusive home computer market speculated retrospect might pcjr final straw magazine called 1000 almost fully ibm pc compatible computer get gave deskmate mixed review advised customers computer inability use full-length pc expansion cards concluded making 1000 inexpensive adaptable including deskmate tandy produced real home computer byte called 1000 good reasonably priced ibm pc clone best features ibm pc pcjr ... current prices good alternative noted high level software compatibility good keyboard stated deskmate fairly good ... little extra programming work could turned much better program noting that—for example—the word processor move command magazine also mentioned computer short slots pc magazine also noted slots criticized tandy 1000 fit finish acknowledged computer low price bundled hardware features tandy 1000 computers featured built-in video hardware enhanced sound hardware based one several variants texas instruments sn76496 sound generator numerous peripheral interfaces including game ports compatible trs-80 color computer ibm-standard floppy-disk controller supporting two drives parallel printer port integrated motherboard addition hardware standard ibm pc/xt later tandy 1000 models pc/at motherboards original tandy 1000 designers omitted dma controller pcjr one believed needed would add additional memory computer omitted rs-232 port tandy printers use parallel port believed customers would use internal modems earlier models tandy 1000 composite video output could used color monochrome composite monitor tv rf modulator original 1000 sx light-pen port unlike pc clones several tandy 1000 computers ms-dos built rom could boot seconds tandy bundled deskmate graphical suite consumer-oriented applications various tandy 1000 models early tandy 1000 models used phoenix bios common models machine included tandy 1000 1000 ex 1000 hx 1000 sx 1000 tx 1000 sl 1000 rl 1000 tl exception rlx rsx tandy 1000 machines xt-class machines support extended memory despite models using 80286 processors rlx oddity xt-class machine supports 384 kb extended memory rsx fully at-class machine support 9 mb extended memory exception 1000 ex hx tandy used industry standard 8-bit xt isa slots desktop models including sx tx sl tl series actual length limited 10.5 inches shorter rather industry standard xt length 13 inches 8-bit xt isa cards shorter 10.5 fit 1000 slots many 8-bit cards met length requirement cards hard cards ems memory cards multifunction cards required standard 13 length fit 1000 case ex hx utilized plus-style connector electronically identical 8-bit xt isa slot 62-pin berg connector instead card edge rendering incompatible isa cards without adapter plus connector designed compactness models built-in keyboards 1000 rsx featured two 16-bit isa slots hard disk drives time tandy 1000 introduction expensive tandy 1000 systems usually equipped hard drives however possible add hard drive tandy 1000 computers desktop-type tandy 1000 units could accept regular 8-bit isa bus mfm rll scsi controllers like typical xt-class machines however care taken configuring cards cause conflicts on-board tandy-designed peripherals tandy 1000 models compact ex hx come already equipped hard drive tandy offered hard disk options form hardcards installed one computer expansion slots consisted controller drive typically 3.5-inch mfm rll unit western digital controller mounted together metal bracket 20 mb hard card offered 799 though compatible third-party units available although arrangement provided neat physical coupling controller disk single-sector internal transfers dependence speed host machine transfer data memory meant trial-and-error approach still needed set disk interleave correctly ensure optimum transfer rates furthermore tandy 1000 slots 10.5 long 8-bit units would fit and/or operate correctly unless certified tandy-compatible starting tandy 1000 tl/2 xt ide controllers integrated onto motherboard however incompatible common ide hard drives tl/2 tl/3 rl rlx used xt ide interface later significantly upgraded rsx first tandy 1000 model computer use standard ide interface one option contemporary users systems would install use xt isa compactflash adapters also practical way install hard drive tandy 1000 ex hx using adapter cable adapts male plus-style connector 8-bit isa card-edge slot tandy 1000 sx tx used proprietary 8-pin round din connector keyboard port compatible older trs computers compatible ibm pc/at ps/2 standard scan codes differed tandy 1000 ibm pc/xt resulting software compatibility issues sl/tl later used directly pc/xt-compatible keyboard protocol 1000 rsx used pc/at ps/2-compatible protocol tandy 1000 used proprietary 6-pin female round connector joystick port sx/tx adjacent keyboard port front computer keyboard compatible older trs-80 tandy color computer models compatible ibm standard 15-pin male game port dos games work joystick ports support tandy 1000 graphics sound work early tandy 1000 models used non-standard card-edge parallel printer port rather industry standard db-25 printer port required tandy-1000 compatible printer cable connect standard printer parallel port later changed standard db-25 connector 1000 rl tandy 1000tx beyond used proprietary floppy drive cable port also powered floppy drive required tandy 1000 compatible floppy drive though may possible modify floppy drive cable make standard floppy drive work tandy shipped pcs customized version ms-dos compatible tandy graphics keyboard current version ms-dos tandy 1000 dos 3.22 tandy 1000s came shipped one several varieties deskmate gui productivity software suite may compatibility issues later versions dos dos 5 dos 6 1000 rlx tandy 1000s typically limited 640 kb main memory non-tandy versions dos often reduce memory available applications games addition hardware detection routine installer microsoft ms-dos 6 could corrupt serial eeprom tandy 1000 hx machines tandy 1000s could work windows 1.0 2.0 3.0 3.1 exception rlx could run windows 3.1 standard mode rsx fully supported running windows 3.1 386 enhanced mode tandy offered 2 color monitors specific tandy 1000 computers cm-5 0.64 millimeter dot pitch tandy cm-11 dot pitch 0.42 mm 13 inch displays power cable 9 pin rgb cable attach tandy cga port expensive cm-11 also supported special proprietary tandy enhanced 225 scan line text display mode tandy also offered monochrome monitors support mda hercules standard also work tandy 1000 uses cga-compatible interface non-tandy monitors support cga work original tandy 1000 sx ex tx hx used proprietary keyboard keyboard layout compatible pc/xt/at standard use layout keyboard prefigured ibm model keyboard introduced ibm ps/2 series function keys arranged row top instead left pc pc xt/at later models tandy 1000 series 1000 sl tl rl series used keyboard similar compatible ibm ps/2 series keyboard connector layout tandy 1000 used game ports tandy color computer series 26-3025 color mouse 26-3125 deluxe mouse compatible tandy 1000 though dos software drivers written recognize tandy digi-mouse also available required separate controller available either isa plus format systems rs-232c serial ports could use standard serial mice later systems 1000 rl featured ps/2 mouse connector radio shack offered one button joystick worked proprietary 6-pin din joystick connector compatible older trs-80 color computer standard 15-pin ibm pc game ports often found sound cards i/o multifunction isa cards worked many games written take advantage tandy graphics sound radio shack offered tandy 1000 plus 300-baud pc modem compatible 1000ex/hx used plus slots radio shack also offered 2400-baud internal modem third party modems speeds 14k baud work provided 8 bit isa fit radio shack sold tandy dmp-130a dot matrix printers go along tandy 1000 line along compatible card-edged printer cable printer sold home budget prices radio shack often offered package bundle tandy 1000 computer cm-5 budget monitor dmp-130a printer using specially-designed aftermarket cables possible connect non-tandy printers system tandy radio shack wanted compete education school home market dominated apple iie time partnered diamond radio shack sold diamond trackstar 128 series apple iie compatibility board 399 1987 offered free installation tandy 1000 series peripheral similar apple iie card sold later macintosh lc fully functional apple iie clone 128k ram 6502 cpu double high resolution graphics allowed tandy 1000 computers run software written apple iie iic platform especially important consideration education market time also sold retail home users businesses interested ms dos apple ii compatibility board pass rgb cable floppy drive cable required open 10 inch 8-bit isa slot used boot disk boot apple mode boot disk dos apple software could copied compatibility fairly good allowed tandy 1000 owners run apple ii software tandy 1000 machine less cost owning 2 separate machines ibm pc computer apple iie monitor many tandy 1000 sold schools came diamond trackstar 128 installed many home owners also purchased compatibility dos apple ii software original tandy 1000 large computer almost size though plastic case aluminium lower chassis reduce weight came standard one internal 5.25 double-density floppy disk drive additional exposed internal bay usable installation second 5.25 disk drive available kit radio shack floppy drives used jumpers select drive number instead ibm cable twist memory standard computer accepting total memory addition expansion cards ms-dos 2.11 deskmate 1.0 keyboard layout tandy 2000 included computer like pcjr tandy 1000 motherboard supply dma unlike system could dma added memory expansion board tandy 1000 three xt-compatible expansion slots early tandy memory upgrade boards took two slots get slots inches length instead pc 13 inches full-length cards fit reviewers noted many built-in hardware features reduced need cards later revision original tandy 1000 model tandy 1000a revision fixed bugs scanned expansion cards bootable roms added socket math coprocessor original tandy 1000 many models like home computers sold time hard disk drive tandy 1000 hd essentially original tandy 1000 hard disk option factory installed factory hard disk capacity order 10 20 mb tandy 1000 sx tx upgraded versions original tandy 1000 utilizing similar chassis two major upgrades original tandy 1000 inclusion dma controller improved speed diskette operations ibm pc-compatibility systems addition two additional isa expansion slots offer total five 8-bit isa slots tandy 1000 sx used 7.16 mhz 8088-2 processor 384k memory upgradeable 640 kb motherboard came either one two 5.25 internal floppy disk drives light pen port serial port like original tandy 1000 adjustable potentiometer inside system controlled volume internal speaker tandy ax sx rebadged sale walmart stores 1000 sx came ms-dos 3.2 deskmate ii 5.25 360kb diskettes sx first tandy 1000 built-in video circuitry could disabled via dip switch permit installation upgraded graphics card typically ega vga card expansion slot tandy 1000 tx similar 1000 sx detached keyboard unique parallel port edge connector xt-style architecture slightly modified case major difference 80286 cpu clocked 8 mhz similar ibm xt 286 featured 16-bit-wide memory bus although on-board peripherals isa slots 8 bits wide tx 3.5 internal floppy disk drive mounted 5.25 bay room optional second internal 3.5 5.25 floppy disk drive rear panel ports 1000 sx except rs-232c serial port replaced light-pen port memory size 640 kb sockets additional 128 kb devoted onboard video logic extra 128 kb could used on-board video controller impractical expand on-board memory beyond 640 kb vga graphics card installed computer came bundled personal deskmate 2 tandy 1000 ex hx designed entry-level ibm-compatible personal computers marketed starter systems people new computing offered compact all-in-one chassis featured 7.16 mhz 8088 capable clocking 4.77 mhz 256 kb memory expandable 640 kb plus memory expansion board pcjr- cga-compatible tandy video graphics controller keyboard depending model either single 5.25 360 kb floppy drive one two 3.5 720 kb floppy drives external floppy drive could connected port back machine supplied power external drive tandy unit usable ex hx external drive standard 360 kb 5.25 inch format 1988 compatible 720 kb 3.5 inch model offered ex hx upgradable via tandy plus cards systems bays three cards plus card connector electrically identical isa slot connector uses berg-style 62-pin connector instead 62-contact isa card-edge connector plus cards could installed add serial ports 1200-baud modem clock/calendar bus mouse board proprietary tandy network interface radio shack later sold adapter card allowing installation plus card standard isa slot larger tandy 1000 models like original tandy 1000 ex hx built-in dma controller though one added using plus memory expansion board tandy 1000 ex featured 5.25 floppy drive built right-hand side computer casing ex sold us 1,000.00 radio shack december 1986 ex later hx would among popular tandy 1000 line relatively low price useful feature ex later systems ability boot either drive drives could logically swapped system booted drive normally drive b became drive vice versa drives remained swapped system powered reset sx tx capability well 1000 ex came ms-dos 2.11 personal deskmate 5.25 360kb diskettes ms-dos version specialized bootable tandy 1000 included version basica microsoft advanced gw-basic support enhanced cga graphics modes a.k.a tandy graphics tga three-voice sound hardware tandy 1000 tandy 1000 hx updated version ex utilized architecture plus cards ex however one obvious difference offered two 3.5 bays front panel occupied one two 720 kb 3.5 floppy drives opposed single side-mounted 5.25 bay floppy drive ex also tandy ms-dos 2.11r rom could accessed starting computer bootable disk present another improvement ex addition serial eeprom store configuration information enabling similar functionality today cmos nvrams comparison earlier tandy 1000 models like ibm pc pc/xt systems used dip switches jumpers startup configuration settings putting basic elements dos deskmate rom eliminating memory test startup hx booted quickly compared contemporary ms-dos machines despite immediate provisions hard disk drive addition tandy ms-dos 2.11r hx shipped personal deskmate 2 versions ms-dos worked 1000 hx including dos 3.x later versions however quirk dos 4.0 environment prevented version dos working tandy 1000 hx computers additionally installer ms-dos 6 could corrupt contents serial eeprom tandy sl tl series computers updates sx tx respectively addition offering redesigned cases machines offered integrated motherboard improved graphics sound capabilities dropping composite video output graphics controller supported resolution well hercules graphics card-compatible mode monochrome monitors sound capabilities included 8-bit monaural dac/adc similar function parallel port sound devices covox speech thing disney sound source extended support dma transfers microphone input capability sampling rates 48 khz sl/tl lines allowed on-board floppy controller parallel port serial ports disabled earlier models sl tl also shipped ms-dos 3.3 deskmate 3 rom featured serial eeprom memory chip store bios settings machines could also run 'normal ms-dos 3.x 5.x 6.x windows 2.x 3.0 operating systems although windows limited real-mode operations common many pc clones era ms-dos 4 problematic generally avoided tandy 1000 sl sl/2 feature intel 8086 processor running 8 mhz socketed thus upgradeable nec v30 sl came ram preinstalled whereas sl/2 offered machines could expanded although graphics controller reserved portion memory yielding available operating system even systems using add-in isa graphic cards sl line mic/earphone ports volume knob reset button small satellite board jumper board allowed user change microphone input line-level output sl series offered five 8-bit xt-compatible isa slots come pre-installed real-time clock chips making optional upgrades form plug-in dallas ds1216e smartwatch sl machine line offers upper 5.25 bay therefore model offer two 5.25 bays models including sl/2 entire tl range feature two upper 3.5 bays one lower 5.25 bay result fitting hard drive sl already upper lower 5.25 bays populated may require either removal one devices bays installation hard disk card-style bracket seats one isa slots tandy 1000 tl tl/2 used 8 mhz intel 80286 processors whereas tl/3 used 10 mhz 80286 socketed thus upgradable 386sx 486sx replacements though functionality far true 386/486 cores due lack extended memory boards xt-type expansion slots tls 640 kb memory preinstalled option extra 128 kb video frame buffering 1000 tx unlike sl series machines tl machines came smartwatch real-time clock logic built-in powered removable 3-volt cr2032 button-cell battery motherboard tl offered five 8-bit xt-compatible isa slots tl/2 tl/3 offered four slots on-board 8-bit xt ide-compatible hard disk interface compatible standard ide hard drives tl series offered two upper 3.5 bays one lower 5.25 bay tl/3 also offered high-density floppy drive controller 1.44 mb drives though shipped double-density 3.5 720 kb drive tandy 1000 rl/rlx/rsx series slim-line desktop home computers featured much compact case least 512 kb memory pre-installed smaller ps/2-style keyboard mouse ports least one isa expansion slot rl-series rsx include provisions internal hard disk drive depending model rl-series featured built-in xt-ide hard drive interface rsx featured at-compatible ide interface keyboard connectors rl-series similar mechanically compatible ps/2-style connectors fully compatible typical ps/2 keyboards keyboard uses xt keyboard protocol rsx however incorporated keyboard protocol making first 1000-series system offer complete compatibility typical ps/2 keyboards keyboards using adapter rl rl/hd featured surface-mounted 8086 processor 512 kb ram expandable 768 kb provide 128 kb video 640 kb conventional memory db-25 unidirectional parallel port instead edge-connector ports sl enhanced graphics sound single half-size 8-bit expansion slot available rl/hd battery-backed real-time clock chip store date time information rl lacked models also ms-dos portion deskmate rom could therefore boot much faster many computers market rl/hd came 20mb drive preinstalled rlx 'mid-range offering rl line 10 mhz 286 surface-mounted 512 kb ram unlike 286-based tandy 1000 models supported 384 kb extended memory ram expanded maximum 1 mb however full at-class machine still 8-bit isa bus rl one half-size expansion slot 8 irqs 4 dma channels three-voice sound chip dac still present tandy video dropped favor acumos vga controller offering 256 kb video memory maximum 640x480x16 320x480x256 graphics resolution parallel port bidirectional first tandy 1000 series rlx one 1.44 mb 3.5 floppy drive empty drive bay could host second drive hard disk rlx/hd came 20 mb hard disk 1 mb ram preinstalled hard disk occupied empty drive bay version supported single floppy drive upscale offering rsx offered 25 mhz 80386sx processor 1 mb ram two 16-bit isa slots acumos svga video bidirectional parallel port standard ps/2 keyboard mouse ports full 386-class pc could run microsoft windows 3.x two sockets simm memory cards provided 1 mb 4 mb simms 9-chip type supported two installed like capacity two 4 mb simms installed 1000 rsx could expanded 9 mb ram without using isa slot rsx/hd variant came 52 mb hard drive using at-compatible ide interface replacement hard drives 504 mb could substituted slimline case one hard drive could installed alongside 1.44 mb 3.5 floppy drive motherboard socket 80387sx math coprocessor rsx still retained tandy 1000 3-voice sound hardware dac though i/o address 3-voice sound chip moved rendering many games previously compatible unable play music unless modified dac could used emulate covox speech thing via ms-dos device drivers limited sound support worked game chuck yeager air combat windows 3.xx sound device drivers available worked windows 95 full 9mb ram tandy 1000 rsx acumos vga graphics could software-updated cirrus logic bios via ms-dos driver allow vesa/svga function windows 95 windows 3.xx tandy vga drivers insufficient windows 95 major software publishers makers game educational software sierra broderbund offered software titles specifically supported tandy unique proprietary 16-color graphics 3-voice sound tandy specific hardware features enhancements offer superior graphics sound experience tandy 1000 owners standard dos titles software supported tandy graphics typically labelled package tandy 1000/pcjr compatible many tandy 1000 enhanced games featured youtube although tandy 1000 run dos software programs known specifically support tandy 1000 enhanced features programs require dos run tandy shipped version dos tandy used main memory graphics result programs require 640k 768k run enhanced graphics sound often tax processor 80286 processor faster recommended best results also games educational software supports second generation tandy 1000 graphics sound offers 640 200 16 colors 8-bit dacs found 1000 sl/tl series examples software includes mario typing tutor star trek freddy pharkas frontier pharmacist sargon chess
[ 1522, 4658, 6070, 1164, 636, 3774, 3275, 2562, 7269, 3303, 7467, 6380, 3313, 3735, 5777, 6768, 1052, 1237, 4277, 5615, 3755 ]
Validation
1,509
7
Mobile_agent:mobile agent computer science mobile agent composition computer software data able migrate move one computer another autonomously continue execution destination computer reality mobile agent code/object move travels itinerary within network connected nodes mobile agent namely type software agent feature autonomy social ability learning significantly mobility specifically mobile agent process transport state one environment another data intact capable performing appropriately new environment mobile agents decide move movement often evolved rpc methods user directs internet browser visit website browser merely downloads copy site one version case dynamic web sites similarly mobile agent accomplishes move data duplication mobile agent decides move saves state process image transports saved state new host resumes execution saved state mobile agent specific form mobile code within field code mobility however contrast remote evaluation code demand programming paradigms mobile agents active choose migrate computers time execution makes powerful tool implementing distributed applications computer network two types mobile agent classification based migration path 1 mobile agents predefined path static migration path 2 free roaming mobile agent dynamic migration path depending present network condition mobile agent chooses path open multi-agent systems mas system agents owned variety stakeholders continuously enter leave system early 1990s general magic created telescript language environment writing executing mobile agents described now-popular cloud metaphor described andy hertzfeld company unsuccessful however advantages mobile agents conventional agents one particular advantage remote deployment software includes increased portability thereby making system requirements less influential
[ 2961, 5391, 6814, 5022 ]
Test
1,510
4
Narus_(company):narus company narus inc. software company vendor big data analytics cybersecurity 1997 ori cohen vice president business technology development vdonet founded narus stas khirman israel presently employed deutsche telekom ag members narus executive team 2010 narus became subsidiary boeing located sunnyvale california 2015 narus sold symantec 2004 narus employed former deputy director national security agency william crowell director press release announcing narus one first companies combine patented machine learning algorithms automation data fusion technologies provide incisive intelligence context control network operators need protect cyberthreats ensure information security narus software primarily captures various computer network traffic real time analyzes results prior 9/11 narus built carrier-grade tools analyze ip network traffic billing purposes prevent narus called revenue leakage post-9/11 narus added semantic monitoring abilities surveillance narus noted created narusinsight supercomputer system whose installation san francisco internet backbone gave rise 2006 class action lawsuit electronic frontier foundation hepting v. features narusinsight include intercepted data flows narusinsight intercept suite data stored analyzed surveillance forensic analysis capabilities include playback streaming media i.e. voip rendering web pages examination e-mail ability analyze payload/attachments e-mail file transfer protocols narus partner products pen-link offer ability quickly analyze information collected directed analysis lawful intercept modules single narusinsight machine monitor traffic equal maximum capacity 10 gbit/s around 39,000 256k dsl lines 195,000 56k telephone modems practical terms since individual internet connections continually filled capacity 10 gbit/s capacity one narusinsight installation enables monitor combined traffic several million broadband users according year 2007 company press release latest version narusinsight intercept suite nis industry network traffic intelligence system supports real-time precision targeting capturing reconstruction webmail traffic ... including google gmail msn hotmail yahoo mail however currently webmail traffic https encrypted content messages monitored consent service providers narusinsight also perform semantic analysis traffic happening words analyze content meaning structure significance traffic real time exact use data fully documented public authorized see types activities ideas monitored ed snowden june 2013 releases prism surveillance program made clear however narus played central role narus provided telecom egypt deep packet inspection equipment content-filtering technology allows network managers inspect track target content users internet mobile phones passes routers national telecommunications authorities pakistan saudi arabia global narus customers narus supplied software hardware used wiretapping rooms according whistleblowers thomas drake mark klein
[ 1023, 6419, 7646, 1805 ]
Test
1,511
7
Apache_Impala:apache impala apache impala open source massively parallel processing mpp sql query engine data stored computer cluster running apache hadoop impala described open-source equivalent google f1 inspired development 2012 apache impala query engine runs apache hadoop project announced october 2012 public beta test distribution became generally available may 2013 impala brings scalable parallel database technology hadoop enabling users issue low-latency sql queries data stored hdfs apache hbase without requiring data movement transformation impala integrated hadoop use file data formats metadata security resource management frameworks used mapreduce apache hive apache pig hadoop software impala promoted analysts data scientists perform analytics data stored hadoop via sql business intelligence tools result large-scale data processing via mapreduce interactive queries done system using data metadata – removing need migrate data sets specialized systems and/or proprietary formats simply perform analysis features include early 2013 column-oriented file format called parquet announced architectures including impala december 2013 amazon web services announced support impala early 2014 mapr added support impala 2015 another format called kudu announced cloudera proposed donate apache software foundation along impala impala graduated apache top-level project tlp 28 november 2017
[ 6506, 7238, 894, 4303, 5728, 7805, 5476, 2741, 7444, 7896, 917, 5571, 3463, 3542, 3204, 1286, 6821, 5054, 840, 1392, 3031, 5408, 3558, 5677, 7924, 3479, 5064, 4261, 5419, 5863, 6387, 5075, 6137, 7488, 7857, 5874, 3915, 4742, 5007, 1333, ...
Test
1,512
4
Authbind:authbind authbind open-source system utility written ian jackson distributed gnu general public license authbind software allows program would normally require superuser privileges access privileged network services run non-privileged user authbind allows system administrator permit specific users groups access bind tcp udp ports 1024 ports 0 1023 normally privileged reserved programs run root user allowing regular users limited access privileged ports helps prevent possible privilege escalation system compromise software happens contain software bugs found vulnerable unknown exploits authbind achieves defining ld_preload environment variable loads libauthbind library library overrides bind call version executes setuid helper program /usr/lib/authbind/helper socket file descriptor 0 helper validates arguments checks configuration calls real bind system call file descriptor 0 also affects original process socket exits allowing original process continue socket bound requested address port authbind currently distributed debian ubuntu linux distributions
[ 5449, 7096, 3932, 5035, 3486, 3915, 4052, 7637, 5571, 1435 ]
Validation
1,513
4
HTTP_Public_Key_Pinning:http public key pinning http public key pinning hpkp internet security mechanism delivered via http header allows https websites resist impersonation attackers using mis-issued otherwise fraudulent digital certificates delivering set public keys client e.g web browser ones trusted future connections domain name example attackers might compromise certificate authority mis-issue certificates web origin combat risk https web server serves list “ pinned ” public key hashes valid given time subsequent connections validity time clients expect server use one public keys certificate chain error message shown easily bypassed user contrary common belief technique pin certificates public keys means one use key pair get certificate certificate authority one access private key alternatively also public keys root intermediate certificates created certificate authorities pinned would subsequently allow certificates issued certificate authority mechanism deprecated google chrome team late 2017 complexity dangerous side-effects google recommends using expect-ct safer alternative server communicates hpkp policy user agent via http response header field named codice_1 codice_2 reporting-only purposes hpkp policy specifies hashes subject public key info one certificates website authentic x.509 public key certificate chain least one backup key codice_3 directives period time user agent shall enforce public key pinning codice_4 directive optional codice_5 directive include subdomains domain sent header pinning policy optional codice_6 directive url send pinning violation reports least one public keys certificates certificate chain needs match pinned public key order chain considered valid user agent time publishing rfc 7469 allowed sha-256 hash algorithm hashes hpkp policy generated shell commands mentioned appendix a. rfc 7469 third-party tools website operator choose either pin root certificate public key particular root certificate authority allowing certificate authority intermediate authorities signed key issue valid certificates website domain and/or pin key one intermediate issuing certificates pin end-entity public key least one backup key must pinned case current pinned key needs replaced hpkp valid without backup key backup key defined public key present current certificate chain hpkp standardized rfc 7469 expands static certificate pinning hardcodes public key hashes well-known websites services within web browsers applications browsers disable pinning certificate chains private root certificates enable various corporate content inspection scanners web debugging tools mitmproxy fiddler nowiki rfc 7469 standard recommends disabling pinning violation reports user-defined root certificates acceptable browser disable pin validation. /nowiki user agent performs pin validation fails find valid spki fingerprint served certificate chain post json formatted host specified directive containing details violation uri may served via http https however user agent send hpkp violation reports https uri domain domain reporting violation hosts may either use http codice_6 use alternative domain use reporting service browsers also support codice_2 triggers reporting showing error user hpkp supported firefox opera chrome internet explorer/edge chrome deprecated hpkp release chrome 67
[ 363, 794, 887, 5984, 3172, 6795, 1168, 1173, 2644, 1460, 5824, 3861, 8189, 8093, 6540, 5399, 3383, 6458, 6553, 2587, 4071, 325, 7567, 7925, 3899, 6758, 2691, 6049, 4990, 7122, 69, 2789, 3057, 7214, 3588, 353, 1059, 354, 2620, 359, 3426 ...
Test
1,514
7
Mobile_backend_as_a_service:mobile backend service mobile backend service mbaas also known backend service baas model providing web app mobile app developers way link applications backend cloud storage apis exposed back end applications also providing features user management push notifications integration social networking services services provided via use custom software development kits sdks application programming interfaces apis baas relatively recent development cloud computing baas startups dating 2011 later although fairly nascent industry trends indicate services gaining mainstream traction enterprise consumers web mobile apps require similar set features backend including push notifications integration social networks cloud storage services api must individually incorporated app process time-consuming complicated app developers baas providers form bridge frontend application various cloud-based backends via unified api sdk providing consistent way manage backend data means developers need redevelop backend services apps need access potentially saving time money although similar cloud-computing developer tools software service saas infrastructure service iaas platform service paas baas distinct services specifically addresses cloud-computing needs web mobile app developers providing unified means connecting apps cloud services baas provider offers slightly different set backend tools resources among common services provided push notifications file storage sharing integration social networks facebook twitter location services database persistence queries messaging chat functions user management running business logic usage analysis tools baas providers broad focus providing sdks apis work app development multiple platforms ios android blackberry windows phone html5 others baas providers generate revenue services various ways often using freemium model model client receives certain number free active users api calls per month pays fee user call limit alternatively clients pay set fee package allows greater number calls active users per month also flat fee plans make pricing predictable providers offer unlimited api calls inside free plan offerings baas commonly offered commercial service open source options available
[ 4211, 5894, 4217, 2988, 7613, 370, 632, 189, 289, 1634, 3091, 6262, 7165, 3954, 7722, 3958, 6806, 22, 1550, 3627, 5927, 2212, 6906, 5135, 7741, 320, 1757, 3028, 4337, 5940, 2317, 7838, 842, 3309, 754, 5064, 330, 7114, 4627, 2961, 2430, ...
Test
1,515
4
Cyxymu:cyxymu cyxymu screen name georgian blogger targeted co-ordinated series attacks social networking sites facebook google blogger livejournal twitter taking latter offline two hours august 7 2009 name mimics cyrillic spelling sukhumi сухуми capital town georgian breakaway region abkhazia blogger extensively covers suffering georgian civilians war abkhazia accuses russia trying silence using cyberattacks facebook came defense cyxymu chief security officer max kelly stating “ simultaneous attack across number properties targeting keep voice heard cyxymu russian-language livejournal blog source information georgia news media 2007 state emergency 2008 russo-georgian war cyxymu lj blog previously targeted denial-of-service attacks october 2008 rendering livejournal servers unavailable three times october 26–27 attack cyxymu internationally seen part ongoing cyberwar russia georgia
[ 1691, 84 ]
Test
1,516
2
OS/390:os/390 os/390 ibm operating system system/390 ibm mainframe computers os/390 introduced late 1995 effort simplify packaging ordering key entitled elements needed complete fully functional mvs operating system package elements included limited additional benefit os/390 packaging concept improve reliability availability serviceability ras operating system number different combinations elements customer could order run drastically reduced reduced overall time required customers test deploy operating system environments well reducing number customer reported problems pmrs errors apars fixes ptfs arising variances element levels december 2001 ibm extended os/390 include support 64-bit zseries processors added various improvements result named z/os ibm ended support older os/390-branded versions late 2004
[ 1522, 4291, 7605, 6518, 4670, 6705, 8173, 6785, 7172, 299, 6532, 5481, 5738, 5571, 5041, 7827, 7546, 4421, 3201, 5396, 5932, 3874, 6197, 7003, 402, 839, 4428, 1575, 850, 5244, 2786, 607, 2431, 3664, 4361, 4366, 6849, 3233, 265, 1994 ]
Validation
1,517
3
Martianoids:martianoids martianoids zx spectrum video game developed ultimate play game released 1987 although uses isometric projection ultimate second-generation isometric releases nightshade gunfright martianoids used scrolling display rather flip-screen earlier titles knight lore alien 8 contemporary ultimate title bubbler martianoids written partnership tim stamper chris stamper instead programmed team u.s. gold therefore ultimate game name ultimate penultimate title 8-bit home computers 1988 company became rare embarking long-running partnership nintendo develop console games players given cryptic introduction describing attack aliens known martianoids martianoids enter player ship attack brain ship photon weapons player must act prevent damage player lasers defence destroy internal walls computer components forth aliens
[ 223, 2904, 6397, 1980, 6434, 3022, 4060 ]
Test
1,518
2
Storyboard_(Apple_programming):storyboard apple programming storyboards files programmers create create apps ios macos design gui
[]
Test
1,519
7
Piranha_(software):piranha software piranha text mining system developed united states department energy doe oak ridge national laboratory ornl software processes large volumes unrelated free-text documents shows relationships amongst technique valuable across numerous scientific data domains health care fraud national security results presented clusters prioritized relevance business government analysts piranha uses term frequency/inverse corpus frequency term weighting method provides strong parallel processing textual information thus ability analyze large document sets piranha six main strengths collecting extracting millions documents numerous sources databases social media collected text extracted hundreds file formats info translated number languages storing indexing documents search servers relational databases etc stored indexed recommending recommending valuable information particular users categorizing grouping items via supervised semi-supervised machine learning methods targeted search lists clustering similarity used create hierarchical group documents visualizing showing relationships among documents users quickly recognize connections work resulted eight issued 9,256,649 8,825,710 8,473,314 7,937,389 7,805,446 7,693,9037 7,315,858 7,072,883 several commercial licenses including textore pro2serve spin-off company inventors covenant health pro2serve called vortext analytics two r 100 awards scores peer reviewed research publications
[ 5885 ]
Test
1,520
9
Michael_Spivey:michael spivey michael spivey commonly known mike spivey british computer scientist university oxford spivey born 1960 educated archbishop holgate grammar school york england studied mathematics christ college cambridge undertook dphil computer science z notation wolfson college oxford programming research group part oxford university computing laboratory mike spivey university lecturer computation oxford university department computer science misys anderson fellow computer science oriel college oxford main areas research interest compilers programming languages especially logic programming wrote oberon-2 compiler
[ 1361 ]
Test
1,521
2
Unslung:unslung unslung open source firmware linksys nslu2 based stock linksys firmware due device running linux therefore licensed subject terms gnu general public license linksys released source code unslung takes linksys firmware expands upon still subject restrictions linksys firmware also removes based old linux 2.4 kernel support newer devices may exist web interface default linksys firmware kept fully functioning except upgrade interface ipkg users able install 1000 optware packages device specially compiled nslu2 unslung 6.10 beta firmware based linksys v2.3r63/a5 firmware minor bugfix/update unslung 6.8
[ 3559, 5876, 3751, 578, 5232, 7049, 5797 ]
Validation
1,522
2
List_of_operating_systems:list operating systems list operating systems computer operating systems categorized technology ownership licensing working state usage many characteristics practice many groupings may overlap criteria inclusion notability shown either existing wikipedia article citation reliable source non-unix operating systems still confirmed see also mobile operating systems
[ 4297, 1445, 13, 7167, 7172, 5735, 2933, 4336, 4344, 4347, 1493, 5771, 64, 65, 4366, 5783, 5784, 1508, 1516, 1522, 5803, 7242, 1536, 4397, 4400, 5822, 126, 4423, 4428, 1574, 7283, 1582, 7289, 4441, 5865, 7295, 3048, 4447, 1604, 5884, 161...
Validation
1,523
2
GNU_variants:gnu variants gnu variants also called gnu distributions distros short operating systems based upon gnu operating system hurd kernel gnu c library system libraries application software like gnu coreutils bash gnome guix package manager etc. according gnu project others also include operating systems using linux kernel others using bsd-based kernels gnu users usually obtain operating system downloading gnu distributions available wide variety systems ranging embedded devices example librecmc personal computers example debian gnu/hurd powerful supercomputers example rocks cluster distribution hurd official kernel developed gnu system linux-libre also became official gnu package debian gnu/hurd discussed release technology preview debian 7.0 wheezy however plans discarded due immature state system however maintainers debian gnu/hurd decided publish unofficial release release date debian 7.0 debian gnu/hurd considered yet provide performance stability expected production system among open issues incomplete implementation java x.org graphical user interfaces limited hardware driver support two thirds debian packages ported hurd arch hurd derivative work arch linux porting gnu hurd system packages optimised intel p6 architecture goal provide arch-like user environment bsd-style init scripts pacman package manager rolling releases simple set gnu hurd stable enough least occasional use although abandoned 2018 project produced livecd evaluation purposes installations guides livecd conventional installation term gnu/linux gnu+linux used fsf supporters refer operating system linux kernel distributed gnu system software distributions primary installed base gnu packages programs also linux notable official use term distribution debian gnu/linux 2018 gnu variants recommended gnu project regular use linux distributions committed free system distribution guidelines refer gnu/linux like debian actually use deblobbed version linux like linux-libre linux per se debian gnu/kfreebsd operating system ia-32 x86-64 computer architectures distribution gnu debian package management kernel freebsd k kfreebsd abbreviation kernel reflects fact kernel complete freebsd operating system used operating system officially released debian squeeze 6.0 february 6 2011 one debian gnu/kfreebsd live cd ging longer maintained nexenta os first distribution combines gnu userland exception libc opensolaris libc used debian packaging organisation opensolaris kernel nexenta os available ia-32 x86-64 based systems nexenta systems inc initiated project sponsors continued development nexenta os considered gnu variant due use opensolaris libc multiple illumos distributions use gnu userland default cygwin project actively-developed compatibility layer form c library providing substantial part posix api functionality windows well distribution gnu unix-like programs ecosystem first released 1995 cygnus solutions red hat 2016 microsoft canonical added official compatibility layer windows 10 translates linux kernel calls windows nt ones reverse wine allows elf executables run unmodified windows intended provide web developers familiar gnu userland top windows kernel combination dubbed linux windows even though linux i.e operating system family defined common use linux kernel absent
[ 707, 2559, 3636, 5757, 2226, 3981, 7559, 5760, 5065, 761, 2599, 6477, 1128, 5787, 6860, 7954, 788, 4020, 6505, 2985, 6876, 1547, 1193, 1563, 4059, 8001, 4070, 4441, 5515, 2698, 6586, 1989, 875, 6256, 191, 1637, 5912, 6981, 7355, 5571, 4...
Test
1,524
9
List_of_command-line_interpreters:list command-line interpreters computing command-line interpreter command language interpreter blanket term certain class programs designed read lines text entered user thus implementing command-line interface many variants unix shell
[ 3431, 5983, 1445, 2280, 5207, 2285, 5116, 5117, 6428, 2740, 6007, 6352, 486, 3021, 3874, 7459, 4705, 6113, 7190, 3303, 6029, 4067, 6119, 6918, 1769, 3990, 149, 1774, 1775, 1975, 6050, 5965, 1892, 5529, 6773, 1604, 2530, 4280, 6319, 2619, ...
Test
1,525
5
Citrio:citrio citrio free web browser developed catalina group ltd. distributed epom ad server citrio available windows mac os x. citrio download manager includes bittorrent support video downloader media player proxy switcher citrio based open source chromium web browser project makes compatible extensions apps themes chrome web store citrio known trigger warnings antivirus software downloads privacy-invading extensions background users data tracked collected epom purpose selling ads leading categorize citrio adware citrio built-in download manager allows pause resume downloads sorts downloaded files date type download status browser inbuilt bittorrent client allows download torrent files magnet links without additional software citrio ’ video grabber makes possible download files multiple online video websites downloaded torrents videos displayed together downloads respective section browser built-in media player play video files download still progress citrio built-in ad blocking extension citrio browser distributed epom ad server developed catalina group citrio initially released 2013 number core features download manager torrent manager video downloader proxy switcher citrio generally well-reviewed downloading capabilities download manager torrent video downloader others criticized adware security risk misleading promotional materials privacy-invading user data collection february 2015 cnet reviewed citrio following conclusion “ ... download lot media files internet definitely give citrio try offers one easiest ways 've seen download files aside ask toolbar optimization lot like free browser. ” softonic review citrio similarly concludes although citrio promoted secure browser installation programme known set malware warnings considered adware also unable opt installing privacy-invading ask toolbar initial installation still lot like browser ...
[ 1152, 4565, 4655, 2812, 2451, 5542, 5984, 4759, 5283, 7628, 5821, 3857, 1276, 6809, 5127, 393, 5571, 3291, 2574, 3383, 7015, 8006, 3043, 4352, 4725, 6221, 520, 2430, 3057, 5699, 1136, 348, 1057, 5887 ]
Validation
1,526
2
ActiveX_Data_Objects:activex data objects computing microsoft activex data objects ado comprises set component object model com objects accessing data sources part mdac microsoft data access components provides middleware layer programming languages ole db means accessing data stores whether databases uniform manner ado allows developer write programs access data without knowing database implemented developers must aware database connection knowledge sql required access database using ado although one use ado execute sql commands directly disadvantage introducing dependency upon type database used microsoft introduced ado october 1996 positioning software successor microsoft earlier object layers accessing data sources including rdo remote data objects dao data access objects ado made four collections twelve objects basic steps required order able access manipulate data using ado asp example using ado select name field table called phonebook phonenumber equal 555-5555 equivalent following asp code uses plain sql instead functionality recordset object ado supported development language supports binding binary com interfaces languages include asp delphi powerbuilder visual basic applications vba ado support added dbase plus 8 ado ado.net replaced ado way c /.net replaced c/win32 primary mode targeting windows application development ado.net follows design pattern ado enabling ado developer easy path forward moving .net framework
[ 4290, 7149, 3255, 6420, 714, 720, 1460, 3280, 2928, 7907, 5747, 2953, 53, 6840, 422, 6141, 4017, 6504, 4022, 4026, 7607, 3687, 2283, 3010, 5479, 7263, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 7715, 4129, 807...
Test
1,527
5
Intelligent_Resilient_Framework:intelligent resilient framework intelligent resilient framework irf proprietary software virtualization technology developed h3c 3com core idea connect multiple network devices physical irf ports perform necessary configurations devices virtualized distributed device virtualization technology realizes cooperation unified management non-stop maintenance multiple devices technology follows general concepts cisco vss vpc technologies technology originally developed 3com released 2003 xrn expandable resilient networking hp purchased 3com april 2010 hp renamed technology irf simplified topology streamlined management irf virtual device appears node network log connecting port member manage members irf virtual device companies use technology hewlett packard enterprise hpe formerly hewlett-packard h3c also hpe formerly 3com
[ 1134, 3764, 4926, 7648, 3819, 3301 ]
Test
1,528
4
EFAIL:efail efail also written efail security hole email systems content transmitted encrypted form gap allows attackers access decrypted content email contains active content like html javascript loading external content enabled client affected email clients include gmail apple mail microsoft outlook two related common vulnerabilities exposures ids issued security gap made public 13 may 2018 damian poddebniak christian dresen jens müller fabian ising sebastian schinzel simon friedberger juraj somorovsky jörg schwenk part contribution 27th usenix security symposium baltimore august 2018 result vulnerability content attacked encrypted email transmitted attacker plain text vulnerable email client used encryption keys disclosed security gap concerns many common email programs used email encryption systems openpgp s/mime attacker needs access attacked email message encrypted form well ability send email least one regular recipient original email exploit security gap attacker modifies encrypted email causing recipient email program send decrypted content email attacker access decrypted content encrypted email attacker modifies email attacked contain text prepared attacker specific way attacker sends changed email one regular recipients attacker inserts additional text encrypted text encrypted email thereby changing message multipart/mixed mime message created encrypted part message appears together limit marks mime message parameter value html tag example modified s/mime mail content-type multipart/mixed boundary= boundary -- boundary content-type text/html img src= http //attacker.chosen.url -- boundary content-type application/pkcs7-mime content-transfer-encoding base64 encryptedmessageencryptedmessageencryptedmessageencryptedmessage -- boundary content-type text/html -- boundary email client first breaks multipart message individual parts using codice_1 tag decrypts encrypted parts reassembles multipart message receives message way content-type multipart/mixed boundary= boundary -- boundary content-type text/html img src= http //attacker.chosen.url secretmessagesecretmessage -- boundary message contains decrypted content email codice_2 attribute codice_3 tag passed email program url web server codice_4 controlled attacker content requested attacker retrieve content encrypted message web server logs variant attack attacker uses vulnerability cbc s/mime cfb openpgp operating modes encryption algorithms used allows change ciphertext inserting gadgets side effect manipulation originally contained plain text becomes illegible known attacker correct inserting additional gadgets attacker hide unknown plain text inserting certain html tags result message similar structure described since vulnerability directed content email recipient necessary recipients implement countermeasures include extent even senders encrypted content reduce vulnerability e.g electronic signatures limitation subset mime formats yet conclusively clarified announcing security vulnerability 13 may 2018 electronic frontier foundation eff recommended stop using pgp plugins email programs even though vulnerability directly relate pgp configuration email program coordinated publication originally scheduled 15 may eff criticized ignoring various parties consequence robert hansen recommended establish closed group mailing list better coordinate publication future security issues still saw eff director danny o'brien best entity administer openpgp disclosure group
[ 704, 3932, 2912, 376, 3277, 2923, 2587, 5773, 3323, 5779, 7600, 4025, 2991, 1173, 6526, 6904, 6541, 6194, 2678, 3038, 3047, 6569, 2693, 862, 6582, 7307, 6589, 5187, 1996, 7328, 7725, 208, 2021, 5922, 6628, 924, 4531, 600, 1307, 2800, 63...
Test
1,529
4
CAUCE:cauce cauce coalition unsolicited commercial email non-profit advocacy group works reduce amount unsolicited commercial email spam via legislation cauce founded 1997 participants usenet newsgroup news.admin.net-abuse.email spam-l mailing list cauce north america formed march 2007 merger first cauce cauce us cauce canada combining strengths two sibling cauce organizations cauce na all-volunteer consumer advocacy organization moved beyond original mission encouraging creation adoption anti-spam laws broader stance defending interests average internet user cauce chapters formed canada europe among first lobby effective antispam legislation australia cauce india formed late 1990s 2003 apcauce cauce asia pacific formed bring together cauce chapters asia pacific region hosts technical workshops policy roundtable regional update sessions regional network operator conferences sanog apricot also member anti-spyware coalition cauce around world
[ 1898 ]
Test
1,530
4
NeoAccel:neoaccel neoaccel multinational company sells computer network security products direct end-user oem relationships company best known ssl vpn-plus product related icaa tssl technology company headquartered san jose california usa development support offices navi mumbai pune india neoaccel founded 2004 former netscaler purchased citrix ceo founder michel susai netscaler developed technology currently accelerates 75 world internet traffic companies like google yahoo aol netscaler purchased citrix 2005 300 million neoaccel financial support venture capital infusions hotmail founder sabeer bhatia inventor prabhu goel 2006 neoaccel raised 4,000,000 baring private equity partners ntt leasing company headquartered san jose california development office navi mumbai india support center pune india sales center beijing jan 2011 neoaccel purchased vmware company holds two main patents secure communications ip based networks neoaccel flagship product ssl vpn-plus company claims fastest vpn available due use icaa tssl technologies product uses ssl transport often categorized ssl vpn although company markets 3rd generation vpn nac-plus companies network access control device released 2007
[ 651, 3756 ]
Validation
1,531
4
Risk_IT:risk risk provides end-to-end comprehensive view risks related use information technology similarly thorough treatment risk management tone culture top operational issues risk published 2009 isaca result work group composed industry experts academics different nations coming organizations ernst young ibm pricewaterhousecoopers risk management insight swiss life kpmg risk part business risk—specifically business risk associated use ownership operation involvement influence adoption within enterprise consists it-related events could potentially impact business occur uncertain frequency magnitude creates challenges meeting strategic goals objectives management business risk essential component responsible administration organization due importance overall business risk treated like key business risks risk framework explains risk enables users risk managed key business leaders inside organization technical issue department risk categorised different ways risk framework based principles enterprise risk management standards/frameworks committee sponsoring organizations treadway commission erm iso 31000 way risk could understood upper management risk built around following principles major risk communication flows effective information three domains risk framework listed contained processes three domain process contains number activities process detailed domain maturity model depicted link risk scenarios ultimate business impact needs established understand effect adverse events risk prescribe single method different methods available among risk scenarios hearth risk evaluation process scenarios derived two different complementary ways risk scenarios analysed determining frequency impact based risk factors purpose defining risk response bring risk line overall defined risk appetite organization risk analysis i.e residual risk within risk tolerance limits risk managed according four main strategies combination key risk indicators metrics capable showing organizaztion subject high probability subject risk exceeds defined risk appetite second important document risk practitioner guide made eight sections risk framework complements isaca ’ cobit provides comprehensive framework control governance business-driven information-technology-based it-based solutions services cobit sets good practices means risk management providing set controls mitigate risk risk sets good practices ends providing framework enterprises identify govern manage risk val allows business managers get business value investments providing governance framework val used evaluate actions determined risk management process risk accept factor analysis information risk terminology evaluation process comparison risk processes foreseen iso/iec 27005 standard see risk management risk management methodology risk management iso 27005 framework risk practitioner guide appendix 2 contains comparison iso 31000 risk practitioner guide appendix 4 contains comparison coso
[ 2513, 3932, 5568, 8091, 4834, 7486 ]
Test
1,532
9
Mruby:mruby mruby interpreter ruby programming language intention lightweight easily embeddable project headed yukihiro matsumoto 100 contributors currently working project mruby 1.0 supports ruby 2.1 core ap none standard library well able execute basic ruby code mruby also features bytecode compiler virtual machine well ability easily embedded integrated c c++ code similar manner lua tcl mruby 2.0.0 adds support several ruby 2.x methods beyond ruby 2.1. v2.0.0 also changed variable length bytecode instructions format mruby bytecode embedded c code thus compiled standalone executable mruby also aims compliant iso/iec 30170:2012 standard assuming mruby installed path following program compiled executed running following command terminal mruby includes minimalistic virtual machine used execute mruby bytecode nicknamed ritevm first command compiles ruby code mruby bytecode creating file called test.mrb executed appending -b flag normal interpreter arguments
[ 5369, 6428, 3368, 5571, 486, 397, 3021, 4151, 1287, 3879, 3889, 7848, 7671, 952, 8137, 3915, 1989, 1435 ]
Test
1,533
4
Sourcefire_Vulnerability_Research_Team:sourcefire vulnerability research team sourcefire vulnerability research team vrt group network security engineers discovered assessed trends hacking activities intrusion attempts vulnerabilities members sourcefire vrt include clamav team well authors several standard security reference books articles sourcefire vrt also supported resources open source snort clamav communities group focuses developing vulnerability-based rules protect emerging exploits sourcefire customers snort users vrt provided zero-day protection outbreaks malware including conficker netsky nachi blaster sasser zotob nachi among others vrt also delivers rules provide day protection microsoft tuesday vulnerabilities develops official snort rules used sourcefire 3d system develops maintains official rule set snort.org maintains shared object rules distributed various platforms binary format following cisco acquisition sourcefire 2014 vrt combined cisco trac secapps security applications group form cisco talos
[ 5478, 1691, 3680, 2466 ]
Test
1,534
6
NTFS:ntfs ntfs new technology file system proprietary journaling file system developed microsoft starting windows nt 3.1 default file system windows nt family ntfs several technical improvements file systems superseded – file allocation table fat high performance file system hpfs – improved support metadata advanced data structures improve performance reliability disk space use additional extensions elaborate security system based access control lists acls file system journaling ntfs supported desktop server operating systems well linux bsd free open-source ntfs driver called ntfs-3g read write functionality macos comes read-only support ntfs disabled-by-default write support ntfs unstable mid-1980s microsoft ibm formed joint project create next generation graphical operating system result os/2 hpfs microsoft disagreed ibm many important issues eventually separated os/2 remained ibm project microsoft worked develop windows nt ntfs hpfs file system os/2 contained several important new features microsoft created new operating system borrowed many concepts ntfs original ntfs developers tom miller gary kimura brian andrew david goebel probably result common ancestry hpfs ntfs use disk partition identification type code 07 using partition id record number highly unusual since dozens unused code numbers available major file systems codes example fat nine one fat12 fat16 fat32 etc. algorithms identifying file system partition type 07 must perform additional checks distinguish hpfs ntfs microsoft released five versions ntfs version number e.g v5.0 windows 2000 based operating system version confused ntfs version number v3.1 since windows xp although subsequent versions windows added new file system-related features change ntfs example windows vista implemented ntfs symbolic links transactional ntfs partition shrinking self-healing ntfs symbolic links new feature file system others new operating system features make use ntfs features already place ntfs v3.0 includes several new features predecessors sparse file support disk use quotas reparse points distributed link tracking file-level encryption called encrypting file system efs ntfs optimized 4 kb clusters supports maximum cluster size 2mb earlier implementations support 64kb maximum ntfs volume size specification support clusters implementations achieve theoretical maximum discussed maximum ntfs volume size implemented windows xp professional clusters partly due partition table limitations example using 64kb clusters maximum size windows xp ntfs volume 256tb minus 64kb using default cluster size 4kb maximum ntfs volume size 16tb minus 4kb vastly higher 128gb limit windows xp sp1 partition tables master boot record mbr disks support partition sizes 2tb multiple guid partition table gpt dynamic volumes must combined create single ntfs volume larger 2tb booting gpt volume windows environment microsoft supported way requires system unified extensible firmware interface uefi 64-bit support ntfs maximum theoretical limit size individual files 16eib minus 1kb totals 18,446,744,073,709,550,592 bytes windows 10 version 1709 windows server 2019 maximum implemented file size 8pb minus 2mb 9,007,199,252,643,840 bytes ntfs journaling file system uses ntfs log logfile record metadata changes volume feature fat provide critical ntfs ensure complex internal data structures remain consistent case system crashes data moves performed defragmentation api allow easy rollback uncommitted changes critical data structures volume remounted notably affected structures volume allocation bitmap modifications mft records moves variable-length attributes stored mft records attribute lists indices directories security descriptors usn journal update sequence number journal system management feature records extend\ usnjrnl changes files streams directories volume well various attributes security settings journal made available applications track changes volume journal enabled disabled non-system volumes hard link feature allows different file names directly refer file contents hard links similar directory junctions refer files instead hard links may link files volume volume mft hard links file metadata change file size attributes one hard link may update others opened hard links originally included support posix subsystem windows nt windows uses hard links support short 8.3 filenames ntfs operating system support needed legacy applications work 8.3 filenames case additional filename record directory entry added 8.3 long file name linked updated together unlike regular hard link ntfs file system limit 1024 hard links file alternate data streams allow one data stream associated filename fork using format filename streamname e.g. text.txt extrastream ntfs streams introduced windows nt 3.1 enable services macintosh sfm store resource forks although current versions windows server longer include sfm third-party apple filing protocol afp products grouplogic extremez-ip still use feature file system small ads named zone.identifier added internet explorer recently browsers mark files downloaded external sites possibly unsafe run local shell would require user confirmation opening user indicates longer want confirmation dialog ads deleted alternate streams listed windows explorer size included file size file copied moved another file system without ads support user warned alternate data streams preserved warning typically provided file attached e-mail uploaded website thus using alternate streams critical data may cause problems microsoft provides tool called streams view streams selected volume starting windows powershell 3.0 possible manage ads natively six cmdlets add-content clear-content get-content get-item remove-item set-content malware used alternate data streams hide code result malware scanners special tools check alternate data streams ntfs compress files using lznt1 algorithm variant lz77 files compressed 16 cluster chunks 4 kb clusters files compressed 64 kb chunks compression algorithms ntfs designed support cluster sizes 4 kb cluster size greater 4 kb ntfs volume ntfs compression available compression reduces 64kb data 60kb less ntfs treats unneeded 4kb pages like empty sparse file clusters—they written allows reasonable random-access times os follow chain fragments however large compressible files become highly fragmented since every chunk smaller 64kb becomes fragment according research microsoft ntfs development team 50–60gb reasonable maximum size compressed file ntfs volume 4kb default cluster block size reasonable maximum size decreases sharply volumes smaller cluster sizes single-user systems limited hard disk space benefit ntfs compression small files 4kb 64kb depending compressibility files smaller approximately 900 bytes stored within directory entry mft flash memory ssd drives head movement delays hard disk drives fragmentation smaller penalty users fast multi-core processors find improvements application speed compressing applications data well reduction space used note ssds sandforce controllers already compress data however since less data transferred reduction i/os compression works best files repetitive content seldom written usually accessed sequentially compressed log files ideal example system files needed boot time drivers ntldr winload.exe bootmgr compressed system may fail boot correctly decompression filters yet loaded later editions windows allow important system files compressed files may compressed decompressed individually via changing advanced attributes drive directory directory tree becoming default files inside although read–write access compressed files mostly transparent microsoft recommends avoiding compression server systems and/or network shares holding roaming profiles puts considerable load processor sparse files files interspersed empty segments actual storage space used applications file looks like ordinary file empty regions seen regions filled zeros sparse file necessarily include sparse zeros areas sparse file attribute means file allowed database applications instance may use sparse files compressed files actual sizes sparse files taken account determining quota limits volume shadow copy service vss keeps historical versions files folders ntfs volumes copying old newly overwritten data shadow copy via copy-on-write technique user may later request earlier version recovered also allows data backup programs archive files currently use file system heavily loaded systems microsoft recommends setting shadow copy volume separate disk windows vista also introduced persistent shadow copies use system restore previous versions features persistent shadow copies however deleted older operating system mounts ntfs volume happens older operating system understand newer format persistent shadow copies windows vista applications use transactional ntfs txf group multiple changes files together single transaction transaction guarantee either changes happen none application outside transaction see changes committed uses similar techniques used volume shadow copies i.e copy-on-write ensure overwritten data safely rolled back clfs log mark transactions still committed committed still fully applied case system crash commit one participants transactional ntfs restrict transactions local ntfs volume also includes transactional data operations locations data stored separate volumes local registry sql databases current states system services remote services transactions coordinated network-wide participants using specific service dtc ensure participants receive commit state transport changes validated participant others invalidate local caches old data rollback ongoing uncommitted changes transactional ntfs allows example creation network-wide consistent distributed file systems including local live offline caches microsoft advises using txf microsoft strongly recommends developers utilize alternative means since txf may available future versions microsoft windows ntfs file folder assigned security descriptor defines owner contains two access control lists acls first acl called discretionary access control list dacl defines exactly type interactions e.g reading writing executing deleting allowed forbidden user groups users example files folder may read executed users modified user holding administrative privileges windows vista adds mandatory access control info dacls dacls primary focus user account control windows vista later second acl called system access control list sacl defines interactions file folder audited whether logged activity successful failed example auditing enabled sensitive files company managers get know someone tries delete make copy whether succeeds encrypting file system efs provides strong user-transparent encryption file folder ntfs volume efs works conjunction efs service microsoft cryptoapi efs file system run-time library fsrtl efs works encrypting file bulk symmetric key also known file encryption key fek used takes relatively small amount time encrypt decrypt large amounts data asymmetric key cipher used symmetric key used encrypt file encrypted public key associated user encrypted file encrypted data stored alternate data stream encrypted file decrypt file file system uses private key user decrypt symmetric key stored file header uses symmetric key decrypt file done file system level transparent user also case user losing access key support additional decryption keys built efs system recovery agent still access files needed ntfs-provided encryption ntfs-provided compression mutually exclusive however ntfs used one third-party tool support efs available basic home mediacenter versions windows must activated installation professional ultimate server versions windows using enterprise deployment tools within windows domains disk quotas introduced ntfs v3 allow administrator computer runs version windows supports ntfs set threshold disk space users may use also allows administrators keep track much disk space user using administrator may specify certain level disk space user may use receive warning deny access user hit upper limit space disk quotas take account ntfs transparent file-compression enabled applications query amount free space also see amount free space left user quota applied introduced ntfs v3 ntfs reparse points used associating reparse tag user space attribute file directory microsoft includes several default tags including symbolic links directory junction points volume mount points object manager parses file system name lookup encounters reparse attribute reparse name lookup passing user controlled reparse data every file system filter driver loaded windows filter driver examines reparse data see whether associated reparse point filter driver determines match intercepts file system request performs special functionality starting windows vista microsoft added built-in ability shrink expand partition however ability relocate page file fragments files marked unmovable shrinking volume often require relocating disabling page file index windows search shadow copy used system restore various third-party tools capable resizing ntfs partitions internally ntfs uses b-trees index file system data although complex implement allows faster file look times cases file system journal used guarantee integrity file system metadata individual files content systems using ntfs known improved reliability compared fat file systems ntfs allows sequence 16-bit values name encoding file names stream names index names etc except 0x0000 means utf-16 code units supported file system check whether sequence valid utf-16 allows sequence short values restricted unicode standard win32 namespace utf-16 code units case insensitive whereas posix namespace case sensitive file names limited 255 utf-16 code units certain names reserved volume root directory used files codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 dot codice_7 codice_8 codice_9 codice_10 codice_11 codice_12 dot extend directories others files nt kernel limits full paths 32,767 utf-16 code units additional restrictions code points file names boot partition format roughly based upon earlier fat filesystem fields different locations fields especially sectors per track number heads hidden sectors fields may contain dummy values drives either make sense determinable os first looks 8 bytes 0x30 find cluster number mft multiplies number number sectors per cluster 1 byte found 0x0d value sector offset lba mft described ntfs file directory metafile data—file name creation date access permissions use access control lists size—are stored metadata master file table mft abstract approach allowed easy addition file system features windows nt development—an example addition fields indexing used active directory software also enables fast file search software locate named local files folders included mft quickly without requiring index mft structure supports algorithms minimize disk fragmentation directory entry consists filename file id record number representing file master file table file id also contains reuse count detect stale references strongly resembles w_fid files-11 ntfs structures radically differ two copies mft stored case corruption first record corrupted ntfs reads second record find mft mirror file locations files stored boot sector ntfs contains several files define organize file system respects files structured like user file volume peculiar direct interest file system clients metafiles define files back critical file system data buffer file system changes manage free space allocation satisfy bios expectations track bad allocation units store security disk space usage information content unnamed data stream unless otherwise indicated metafiles treated specially windows handled directly codice_13 driver difficult directly view special purpose-built tools needed windows 7 ntfs driver completely prohibits user access resulting bsod whenever attempt execute metadata file made one tool nfi.exe ntfs file sector information utility freely distributed part microsoft oem support tools example obtain information mft -master file table segment following command used codice_14 another way bypass restriction use 7-zip file manager go low-level ntfs path codice_15 codice_16 resembles drive/partition 3 new folders appear codice_17 codice_18 pseudo-folder 7-zip uses attach files deleted file system view codice_19 another pseudo-folder contains ntfs metadata files trick used removable devices usb flash drives external hard drives sd cards etc inside windows active partition requires offline access namely winre file directory described mft record linear repository stream descriptors also named attributes packed together one mft records containing so-called attributes list extra padding fill fixed 1 kb size every mft record fully describes effective streams associated file attribute attribute type fixed-size integer mapping attribute definition file attrdef optional attribute name example used name alternate data stream value represented sequence bytes ntfs standard data files alternate data streams index data directories stored attributes according attrdef attributes either resident non-resident data attribute contains file data example attribute resident represented flag value stored directly mft record otherwise clusters allocated data cluster location information stored data runs attribute attributes given file may displayed using nfi.exe ntfs file sector information utility freely distributed part microsoft oem support tools windows system calls may handle alternate data streams depending operating system utility remote file system file transfer might silently strip data streams safe way copying moving files use backupread backupwrite system calls allow programs enumerate streams verify whether stream written destination volume knowingly skip unwanted streams optimize storage reduce i/o overhead common case attributes small associated value ntfs prefers place value within attribute size attribute exceed maximum size mft record instead using mft record space list clusters containing data case attribute store data directly store allocation map form data runs pointing actual data stored elsewhere volume value accessed directly within attribute called resident data computer forensics workers amount data fits highly dependent file characteristics 700 800 bytes common single-stream files non-lengthy filenames acls allocation map stored form data runs compressed encoding data run represents contiguous group clusters store attribute value files multi-gb volume entry encoded 5 7 bytes means 1 kb mft record store 100 data runs however attribute_list also size limit dangerous 1 million fragments single file ntfs volume also implies general good idea use ntfs compression file larger 10gb ntfs file system driver sometimes attempt relocate data attributes made non-resident clusters also attempt relocate data stored clusters back attribute inside mft record based priority preferred ordering rules size constraints since resident files directly occupy clusters allocation units possible ntfs volume contain files volume clusters example 74.5gb partition ntfs formats 19,543,064 clusters 4kb subtracting system files 64mb log file 2,442,888-byte bitmap file 25 clusters fixed overhead leaves 19,526,158 clusters free files indices since four mft records per cluster volume theoretically could hold almost 4 × 19,526,158= 78,104,632 resident files opportunistic file locks oplocks allow clients alter buffering strategy given file stream order increase performance reduce network use oplocks apply given open stream file affect oplocks different stream oplocks used transparently access files background network client may avoid writing information file remote server process accessing data may buffer read-ahead data process writing data windows supports four different types oplocks opportunistic locks enhanced windows 7 windows server 2008 r2 per-client oplock keys windows nt descendants keep internal timestamps utc make appropriate conversions display purposes ntfs timestamps utc historical reasons versions windows support ntfs keep time internally local zone time therefore file systems – ntfs – supported current versions windows means files copied moved ntfs non-ntfs partitions os needs convert timestamps fly files moved daylight saving time dst effect files moved standard time effect ambiguities conversions result especially shortly one days local zone time changes users may observe files timestamps incorrect one hour due differences implementation dst different jurisdictions result potential timestamp error 4 hours given 12 months different ntfs versions part fully forward- backward-compatible technical considerations mounting newer ntfs volumes older versions microsoft windows affects dual-booting external portable hard drives example attempting use ntfs partition previous versions a.k.a volume shadow copy operating system support result contents previous versions lost windows command-line utility called convert.exe convert supporting file systems ntfs including hpfs windows nt 3.1 3.5 3.51 fat16 fat32 windows 2000 later windows 10 version 1709 known fall creators update microsoft requires onedrive file structure reside ntfs disk reparse tag every file directory within local onedrive file structure set recursive manner thus making file folder unusable previous version windows ntfs file system driver file system backup utilities updated support unknown whether recursive linking feature ntfs file system undocumented workaround microsoft support onedrive new files on-demand feature mac os x 10.3 later include read-only support ntfs-formatted partitions gpl-licensed ntfs-3g also works mac os x fuse allows reading writing ntfs partitions performance enhanced commercial version called tuxera ntfs mac also available ntfs-3g developers paragon software group sells read-write driver named ntfs mac os x also included models seagate hard drives native ntfs write support discovered mac os x 10.6 later activated default although workarounds exist enable functionality however user reports indicate functionality unstable tends cause kernel panics probably reason write support enabled advertised linux kernel versions 2.2.0 later include ability read ntfs partitions kernel versions 2.6.0 later contain driver written anton altaparmakov university cambridge richard russon supports file read overwrite resize three userspace drivers ntfsmount ntfs-3g captive ntfs 'wrapping driver uses windows driver ntfs.sys exist ntfs support built filesystem userspace fuse linux kernel module tasked bridging userspace kernel code save retrieve data three licensed terms gnu general public license gpl due complexity internal ntfs structures built-in 2.6.14 kernel driver fuse drivers disallow changes volume considered unsafe avoid corruption two proprietary solutions also exist ecomstation freebsd offer read-only ntfs support beta ntfs driver allows write/delete ecomstation generally considered unsafe free third-party tool beos based ntfs-3g allows full ntfs read write ntfs-3g free implementation ntfs initially developed linux also works macos freebsd netbsd openbsd ntfs-3g available ports solaris qnx haiku fuse free-for-personal-use read/write driver ms-dos avira called ntfs4dos ahead software developed ntfsread driver version 1.200 dr-dos 7.0x 2002 2004 part nero burning rom software openbsd offers native read-only ntfs support default i386 amd64 platforms version 4.9 released 1 may 2011
[ 1438, 7161, 1475, 5753, 7195, 2953, 4354, 4375, 4377, 5805, 97, 1534, 1536, 2999, 4398, 4406, 7258, 5833, 126, 1561, 5843, 7272, 1571, 5850, 140, 5856, 5859, 5865, 3048, 4444, 3057, 1597, 7306, 1605, 174, 1624, 5900, 4480, 191, 1630, 59...
Validation
1,535
2
Linux_Mark_Institute:linux mark institute linux mark institute lmi fully lmi oregon llc organization administers linux trademark behalf linus torvalds computer software includes linux kernel computer hardware utilizing linux-based software services associated implementation documentation linux-based products linux trademark owned linus torvalds u.s. germany e.u. japan computer operating system software facilitate computer use operation assignment trademark torvalds occurred lawsuit attorney william r. della croce jr. boston registered trademark us september 1995 began 1996 send letters various linux distributors demanding ten percent royalties sales linux products petition della croce practices started early 1997 workgroup solutions yggdrasil linux journal linux international torvalds appealed original trademark assignment fraudulent obtained false pretenses november case settled torvalds owned trademark lmi originally charged nominal sublicensing fee use linux name part trademarks later changed favor offering free perpetual worldwide sublicense lmi headquartered monterey california least 2005 since least 2009 headquartered beaverton oregon
[ 1807, 3256, 5366, 2182, 3938, 3613, 6422, 7528, 3271, 7532, 2559, 7894, 1100, 5744, 6443, 2942, 7555, 6117, 4341, 5762, 412, 415, 2240, 3666, 2970, 7956, 5453, 5803, 5460, 7242, 462, 1924, 6892, 4400, 1176, 1933, 5829, 3384, 1208, 4435, ...
Test
1,536
4
Windows_Home_Server:windows home server windows home server code-named quattro home server operating system microsoft announced 7 january 2007 consumer electronics show bill gates released manufacturing 16 july 2007 officially released 4 november 2007 windows home server based windows server 2003 r2 intended solution homes multiple connected pcs offer file sharing automated backups print server remote access paired windows home server console—client software accessed another computer network provide graphical management interface power pack 1 windows home server released 20 july 2008 power pack 2 released 24 march 2009 power pack 3 released 24 november 2009 windows home server 2011 next version operating system released 6 april 2011 microsoft confirmed windows home server 2011 last release windows home server product line configuration interface designed user-friendly enough could set without prior knowledge server administration configuration interface called home server console delivered remote desktop protocol application remote pcs application ran server gui rendered remote system home server console client application could accessed windows pc server required video card peripherals designed require ethernet card least one windows xp windows vista windows 7 computer windows home server drive extender file-based replication system provided three key capabilities drive extender users could add larger capacity hard disk drives could offline lesser capacity drives upgrade capacity online example user reaching capacity share five terabytes six-terabyte capacity used six one-terabyte drives user could offline one one-terabyte drives physically replace two-terabyte drive whs automatically equalizes redistribution used space across available drives regular basis offline process would compress used data across minimum amount drives allowing removal one lesser capacity drives replaced drive higher capacity system automatically redistribute used capacity among pool ensure space capacity drive users specifically configure family home server dealt storage two levels shared folders disks concepts relevant regarding disks whether added home server storage pool whether disk appeared healthy system contrast windows logical disk manager requires greater degree technical understanding order correctly configure raid array shared folders name description permissions flag indicating whether duplication redundancy folder duplication shared folder default multi-disk home server systems applicable single disk systems files shared folder duplicated effective storage capacity halved however situations user may wanted data duplicated e.g tv shows archived windows home server system running windows media center drive extender provided capability duplicate files server short capacity manually mark complete content store duplication known limitation drive extender cases changed timestamp directories files data moved around disks according microsoft expected behaviour caused unexpected behaviour using clients sort media based date examples xbmc mediaportal squeezebox server aforementioned programs worked fine whs however files may appeared order due caveat 23 november 2010 microsoft announced drive extender would removed windows home server 2011 led public outcry announcement comments section criticism drive extender removal mainly related seen core feature windows home server key reason adoption replacement drive extender microsoft stated oems would use raid windows home server products windows home server computer backup automatically backs computers home server using image-based system ensures point-in-time-based restoration either entire pcs specific files folders complete bare-metal restores initiated restore bootable cd file based restores initiated whs client software allows users open backup drag drop files technology uses volume shadow services vss technology client computer take image based backup running computer backup operates data cluster level single instancing performed minimize amount data travels network ultimately stored home server single instancing gives server ability store one instance data matter data originated another computer another file even data within file computer backup images duplicated server server hard drive fails backups could lost server backup feature added power pack 1 include duplication backup images system also offers ssl secured web browser based interface internet shared file stores release version offers access web interface via free windows live-provided url uses dynamic dns web interface also allows uploading downloading files content stores however limit 2 gb single batch upload system also supports terminal services gateway allowing remote control desktop windows computer home network currently supported systems would normally support remote desktop windows xp professional tablet media center editions windows vista business enterprise ultimate editions windows 7 professional enterprise ultimate editions web interface also supports embedding remote desktop activex control provide remote access home computers within web interface directly remote sessions also connect home server console configure server internet windows home server allows developers publish community commercial add-ins designed enhance windows home server added functionality january 2010 nearly 100 add-ins developed whs including applications antivirus security backups disk management automation media network/power management remote access bittorrent windows home server sdk software development kit provides developers set apis tools use developing extending windows home server windows home server features integration windows xp sp2 newer windows vista windows 7 release power pack 3 software installation either client cd via network share connector software may also installed accessing codice_1 link provided download connector software install troubleshooting tools files stored windows home server also available windows share opening compatibility wide variety operating systems also administration console available via remote desktop allowing administration unsupported platforms windows home server support microsoft security essentials 64-bit windows client support introduced power pack 1 though restore wizard windows home server restore cd unable restore clients running 64-bit operating systems due fact restore cd support 64-bit drivers windows xp professional x64 n't officially supported however unofficial workarounds allow connector software work xp x64 integration file sharing service location mac os x time machine apparently considered upon mac os x leopard release apple removed ability use smb file sharing protocol time machine backups one whs provider hp provides plug-in home server line capable time machine backup home server windows home server officially supported domain controller capability readily join windows server domain wireless networking supported dedicated devices operating system pre-installed may supplied server recovery disk reloads os network connection utilized hp mediasmart server fujitsu siemens scaleo home server first release windows home server rtm release manufacturing suffered file corruption flaw whereby files saved directly edited shares whs device could become corrupted files ntfs alternate data streams susceptible flaw flaw led data corruption server heavy load time file ads saved onto share backups client pcs made windows home server susceptible flaw even though issue first acknowledged october 2007 microsoft formally warned users seriousness flaw 20 december 2007 microsoft issued list applications including windows live photo gallery microsoft onenote microsoft outlook synctoy 2.0 might triggered flaw used edit files whs share directly issue fixed power pack 1 released 21 july 2008 windows home server rtm include mechanism backing server power pack 1 added ability back files stored shared folders external drive users also subscribe 3rd-party online services fee however remains way back installed server operating system backing-up client backup database available either manually using instructions provided microsoft page 24 document done using whs bdbb add-in written alex kuretz available website hardware manufacturers developed dedicated boxes microsoft also released windows home server oem/system builder license november 2008 microsoft lowered price whs system builder sku us 100 users also choose use existing pc build systems would include use whs system builder 23 march 2009 microsoft also made windows home server available msdn microsoft technet subscribers computer systems available bundled windows home server license case versions windows possible request refund license fees paid windows home server
[ 448, 1522, 2452, 3764, 458, 4759, 5637, 1534, 4670, 6256, 7616, 3180, 3617, 6802, 7169, 5563, 3187, 2390, 2472, 4500, 4687, 6991, 1097, 5571, 7508, 5313, 224, 5672, 7660, 8118, 3135, 2329, 3048, 6136, 3907, 5516, 2066, 5781, 2885, 6580, ...
Test
1,537
6
Cp_(Unix):cp unix computing codice_1 command various unix unix-like operating systems copying files directories command three principal modes operation expressed types arguments presented program copying file another file one files directory copying entire directories another directory utility accepts various command line option flags detail operations performed two major specifications posix cp gnu cp gnu cp many additional options posix version command also available efi shell cp part version 1 unix version codice_1 bundled gnu coreutils written torbjorn granlund david mackenzie jim meyering cp three principal modes operation modes inferred type count arguments presented program upon invocation copying file another file copying file directory copying directory directory -r -r must used creating copy file current directory copies prog.c prog.bak prog.bak file already exist cp command creates exist cp command replaces contents contents prog.c file copy two files current directory another directory copies files jones /home/nick/clients/jones smith /home/nick/clients/smith copy file new file preserve modification date time access control list associated source file copies smith file smith.jr file instead creating file current date time stamp system gives smith.jr file date time smith file smith.jr file also inherits smith file access control protection copy directory including files subdirectories another directory copies directory clients including files subdirectories files subdirectories directory customers/clients unix systems behave differently mode depending termination directory paths using codice_3 gnu system behaves expected however bsd system copies contents clients directory instead directory clients happens gnu bsd systems path source directory ends .. without trailing slash copying file existing file performed opening existing file update mode thereby preserving files inode requires write access results target file retaining permissions originally
[ 1710, 361, 362, 980, 6789, 2817, 366, 3685, 4387, 4662, 8165, 3085, 7246, 7378, 2834, 4283, 1837, 5480, 3106, 5571, 923, 5933, 5138, 1389, 667, 1572, 5942, 6117, 6648, 3984, 2589, 5946, 1213, 6470, 7667, 4447, 6050, 7494, 3827, 6242, 13...
Validation
1,538
7
EVS_Broadcast_Equipment:evs broadcast equipment evs broadcast equipment sa belgian company manufactures live outside broadcast digital video production systems xt3 production video servers enable creation editing exchange playout audio video feeds programming television networks consists primarily broadcasting prerecorded images recently stored tapes linear editing editing tape replaced digital media non-linear editing today digital technology hard disk non-linear definition common alternative clear confirmation migration towards technology years even though still take another 5 6 years hard disk penetration rate increase 30 70 television stations began migrating tapeless interoperable computer platforms beginning late 1990s video recorders rarely used nowadays live productions evs type digital media servers norm live broadcasting evs co-founded 1994 laurent minguet three years later company invested 30 capital private funds roundabout eur 4 million 1998 evs listed first time stock exchange initial eur 14.8 quotation per share comparable levels valued eur 204 million year evs acquired vse hardware subcontractor managed michel counson transaction vse received evs shares approximate eur 4.5 million value since evs become major broadcast actor focusing digital recording technologies live sport tv production evs core products primarily used outbroadcasting vans ob vans allow high-quality respectively slow-motion image replay evs revolutionised professional digital recording first introduce hard disk drive field instead traditional magnetic tape recording business led time sony panasonic establishing outbroadcasting sport production evs started using high value servers address tv studio production full range products 2002 strategic move contributed +40 uplift 2012 additionally evs founded xdc 2004 pioneer high definition cinema broadcasting restructured within dcinex group evs sold stake dcinex 2014 2001 laurent minguet stepped position director three years later gave position side decided leave role ceo director following board directors meeting held september 15 2011 transitional period evs managed board directors 2012 evs appoints joop janssen ceo 10 october 2014 board directors joop janssen mutually agreed end term office duties joop janssen muriel de lathouwer member board directors evs chairing strategy committee appointed president executive committee interim basis 5 january 2015 evs announced acquired scalable video system gmbh svs developing it-based vision mixers dyvi live sa company based brussels distributing products svs name dyvi 19 february 2015 evs broadcast equipment appoints muriel de lathouwer managing director ceo july 17 2018 board directors muriel de lathouwer mutually agreed end term office duties muriel de lathouwer evs headquarters administration production development located liège belgium 4 additional development centers found evs also sales support offices london los angeles new york dubai mexico paris munich madrid brescia beijing hong kong sydney mumbai
[]
Validation
1,539
4
Alastair_MacWillson:alastair macwillson dr. alastair carmichael macwillson british cyber security professional macwillson chair institute information security professionals qufaro founding director cambridge analytica additionally principal chertoff group macwillson spent 16 years british foreign service working technical political risk analysis former ussr middle east united states dr. alastair carmichael macwillson british intelligence security cyber security professional macwillson chair institute information security professionals qufaro founding director cambridge analytica additionally principal chertoff group macwillson referenced spending 16 years british foreign service working technical political risk analysis former ussr middle east united states however cover real job officer mi6 direct recruit sis university oldfield chief initially specialised terrorist threat northern ireland 1980 posted senior intelligence officer oman research department internal security service staffed several senior sis gchq personnel director operations 1989 time worked cia establishing joint us/uk rapid deployment force combat terrorist events late 1989 returned uk 1990 published hmg sanctioned book entitled hostage taking terrorism since 1990 macwillson roving hq brief problem solver alleged set special operations group within sis 10 hostage taking terrorism dr. alastair macwillson published 1991 mcmillan 11 cambride analytica
[ 1539, 485 ]
Validation
1,540
5
Selective_Repeat_ARQ:selective repeat arq selective repeat arq/selective reject arq specific instance automatic repeat-request arq protocol used solve sequence number dilemma communications selective repeat part automatic repeat-request arq selective repeat sender sends number frames specified window size even without need wait individual ack receiver go-back-n arq receiver may selectively reject single frame may retransmitted alone contrasts forms arq must send every frame point receiver accepts out-of-order frames buffers sender individually retransmits frames timed may used protocol delivery acknowledgement message units may used protocol delivery subdivided message sub-units used protocol delivery messages sending process continues send number frames specified window size even frame loss unlike go-back-n arq receiving process continue accept acknowledge frames sent initial error general case sliding window protocol transmit receive window sizes greater 1 receiver process keeps track sequence number earliest frame received sends number every acknowledgement ack sends frame sender reach receiver sender continues send subsequent frames emptied window receiver continues fill receiving window subsequent frames replying time ack containing sequence number earliest missing frame sender sent frames window re-sends frame number given acks continues left size sending receiving windows must equal half maximum sequence number assuming sequence numbers numbered 0 n −1 avoid miscommunication cases packets dropped understand consider case acks destroyed receiving window larger half maximum sequence number possibly even packets present timeouts duplicates recognized sender moves window every packet acknowledged used protocol delivery subdivided messages works somewhat differently non-continuous channels messages may variable length standard arq hybrid arq protocols may treat message single unit alternately selective retransmission may employed conjunction basic arq mechanism message first subdivided sub-blocks typically fixed length process called packet segmentation original variable length message thus represented concatenation variable number sub-blocks standard arq message whole either acknowledged acked negatively acknowledged naked arq selective transmission ack response would additionally carry bit flag indicating identity sub-block successfully received arq selective retransmission sub-divided messages retransmission diminishes length needing contain sub-blocks linked channel models variable length messages probability error-free reception diminishes inverse proportion increasing message length words easier receive short message longer message therefore standard arq techniques involving variable length messages increased difficulty delivering longer messages repeat full length selective re-transmission applied variable length messages completely eliminates difficulty delivering longer messages successfully delivered sub-blocks retained transmission number outstanding sub-blocks following transmissions diminishes selective repeat implemented udp transmission transmission control protocol uses variant go-back-n arq ensure reliable transmission data internet protocol provide guaranteed delivery packets selective acknowledgement sack extension may also use selective repeat arq itu-t g.hn standard provides way create high-speed 1 gigabit/s local area network using existing home wiring power lines phone lines coaxial cables uses selective repeat arq ensure reliable transmission noisy media g.hn employs packet segmentation sub-divide messages smaller units increase probability one received correctly stanag 5066 profile hf radio data communications uses selective repeat arq maximum window size 128 protocol-data units pdus
[ 1952, 3821, 791, 7637, 3563, 1869, 3314, 3462 ]
Validation
1,541
9
Name_collision:name collision term name collision refers nomenclature problem occurs computer programs variable name used different things two separate areas joined merged otherwise go occupying separate namespaces sharing one collision identifiers must resolved way new software mashup work right problems name collision methods avoid common issue introductory level analysis computer languages c++ term name collision used computer science three decades referring names various classification systems several techniques avoiding name collisions including use tactics used resolve name collisions
[ 2079, 1198 ]
Validation
1,542
4
Charles_Proxy:charles proxy charles web debugging proxy cross-platform http debugging proxy server application written java enables user view http https http/2 enabled tcp port traffic accessed via local computer includes requests responses including http headers metadata e.g cookies caching encoding information functionality targeted assisting developers analyze connections messaging charles autoconfigure use following browsers
[ 6574, 726, 7637, 325, 4759, 5571, 3338, 578 ]
Test
1,543
5
IS-IS:is-is intermediate system intermediate system is-is also written isis routing protocol designed move information efficiently within computer network group physically connected computers similar devices accomplishes determining best route data packet-switched network is-is protocol defined iso/iec 10589:2002 international standard within open systems interconnection osi reference design internet engineering task force ietf republished is-is rfc 1142 rfc later marked historic rfc 7142 republished draft rather final version iso standard causing confusion is-is called de facto standard large service provider network backbones is-is interior gateway protocol designed use within administrative domain network contrast exterior gateway protocols primarily border gateway protocol bgp used routing autonomous systems rfc 1930 is-is link-state routing protocol operating reliably flooding link state information throughout network routers is-is router independently builds database network topology aggregating flooded network information like ospf protocol is-is uses dijkstra algorithm computing best path network packets datagrams forwarded based computed ideal path network destination is-is protocol developed digital equipment corporation part decnet phase v. standardized iso 1992 iso 10589 communication network devices termed intermediate systems opposed end systems hosts iso purpose is-is make possible routing datagrams using iso-developed osi protocol stack called clns is-is developed roughly time internet engineering task force ietf developing similar protocol called ospf is-is later extended support routing datagrams internet protocol ip network layer protocol global internet version is-is routing protocol called integrated is-is rfc 1195 is-is open shortest path first ospf link state protocols use dijkstra algorithm computing best path network result conceptually similar support variable length subnet masks use multicast discover neighboring routers using hello packets support authentication routing updates ospf natively built route ip layer 3 protocol runs top ip is-is osi layer 2 protocol layer connectionless network protocol clnp widespread adoption ip may contributed ospf popularity is-is use ip carry routing information messages ospf version 2 hand designed ipv4 is-is neutral regarding type network addresses route allowed is-is easily used support ipv6 operate ipv6 networks ospf protocol rewritten ospf v3 specified rfc 2740 ospf is-is routers build topological representation network map indicates subnets is-is router reach lowest-cost shortest path subnet used forward traffic is-is differs ospf way areas defined routed is-is routers designated level 1 intra-area level 2 inter area level 1–2 routing information exchanged level 1 routers level 1 routers area level 2 routers form relationships exchange information level 2 routers level 1–2 routers exchange information levels used connect inter area routers intra area routers ospf areas delineated interface area border router abr actually two areas effectively creating borders areas inside abr whereas is-is area borders routers designated level 2 level 1–2 result is-is router ever part single area is-is also require area 0 area zero backbone area inter-area traffic must pass logical view ospf creates something spider web star topology many areas attached directly area zero is-is contrast creates logical topology backbone level 2 routers branches level 1–2 level 1 routers forming individual areas is-is also differs ospf methods reliably floods topology topology change information network however basic concepts similar ospf larger set extensions optional features specified protocol standards however is-is easier expand use type-length-value tlv data allows engineers implement support new techniques without redesigning protocol example order support ipv6 is-is protocol extended support additional tlvs whereas ospf required new protocol draft ospfv3 addition is-is less chatty scale support larger networks given set resources is-is support routers area ospf contributed is-is isp-scale protocol tcp/ip implementation known integrated is-is dual is-is described rfc 1195 is-is also used control plane ieee 802.1aq shortest path bridging spb spb allows shortest-path forwarding ethernet mesh network context utilizing multiple equal cost paths permits spb support large layer 2 topologies fast convergence improved use mesh topology combined single point provisioning logical connectivity membership is-is therefore augmented small number tlvs sub-tlvs supports two ethernet encapsulating data paths 802.1ad provider bridges 802.1ah provider backbone bridges spb requires state machine substantive changes is-is simply requires new network layer protocol identifier nlpid set tlvs extension is-is defined ietf proposed standard rfc 6329
[ 709, 4676, 3620, 6428, 7170, 7173, 1462, 2214, 737, 2219, 7916, 6461, 1114, 3314, 7217, 6871, 2281, 6172, 106, 2644, 2650, 121, 7637, 6908, 5492, 3383, 5142, 6208, 5880, 4101, 4469, 6966, 6976, 3775, 7721, 3777, 7732, 7144, 3797, 3799, ...
Validation
1,544
2
BlackBerry:blackberry blackberry line smartphones tablets services originally designed marketed canadian company blackberry limited formerly known research motion rim currently designed manufactured marketed tcl communication brand blackberry mobile bb merah putih optiemus infracom global indonesian south asian markets respectively using blackberry brand license blackberry one prominent smartphone vendors world specializing secure communications mobile productivity well-known keyboards devices peak september 2013 85 million blackberry subscribers worldwide however blackberry since lost dominant position market due success android ios platforms numbers fallen 23 million march 2016 blackberry line traditionally uses proprietary operating system developed blackberry limited known blackberry os 2013 blackberry introduced blackberry 10 major revamp platform based qnx operating system blackberry 10 meant replace aging blackberry os platform new system line user experiences modern smartphone operating systems first bb10 powered device blackberry z10 followed all-touch keyboard-equipped models including blackberry q10 blackberry classic blackberry z30 stereo speakers blackberry passport blackberry leap 2015 blackberry re-focused business strategy began release android-based smartphones beginning blackberry priv slider blackberry dtek50 september 28 2016 blackberry announced would cease designing phones favor licensing partners tcl communication became global licensee brand name blackberry mobile optiemus infracom name blackberry mobile india bb merah putih also serve licensees brand serving indian indonesian markets respectively february 2017 blackberry mobile released blackberry keyone known physical keyboard 4.5 inch screen great battery life last device designed blackberry limited blackberry mobile latest android smartphone blackberry key2 officially announced june 7 2018 released july 13th year us devices along bb merah purih blackberry aurora make blackberry current lineup june 2018 blackberry key2 launched international markets india licensee optiemus infracom key2 first blackberry-branded smartphone sport dual camera setup incorporates features portrait mode optical zoom august 2018 launch blackberry key2 optiemus infracom announced launch evolve evolve x smartphones indian market sold exclusively amazon india smartphones conceptualized designed manufactured india evolve series officially announced august 2 2018 research motion rim founded waterloo ontario first developed inter ctive pager 900 announced september 18 1996 inter ctive pager 900 clamshell-type device allowed two-way paging success 900 inter ctive pager 800 created ibm bought us 10 million worth february 4 1998 next device released inter ctive pager 950 august 26 1998 first device carry blackberry name blackberry 850 email pager released january 19 1999 although identical appearance 950 850 first device integrate email name inter ctive pager longer used brand device first blackberry device 850 introduced 1999 two-way pager munich germany name blackberry coined marketing company lexicon branding name chosen due resemblance keyboard buttons drupelets compose blackberry fruit original blackberry devices rim 850 857 used datatac network 2002 commonly known convergent smartphone blackberry released supports push email mobile telephone text messaging internet faxing web browsing wireless information services blackberry gained market share mobile industry concentrating email blackberry began offer email service non-blackberry devices palm treo proprietary blackberry connect software original blackberry device monochrome display newer models installed color displays newer models optimized thumbing use thumbs type keyboard storm 1 storm 2 include suretype keypad typing originally system navigation achieved use scroll wheel mounted right side device models prior 8700 trackwheel replaced trackball introduction pearl series allowed four-way scrolling trackball replaced optical trackpad introduction curve 8500 series models made use iden networks nextel southernlinc nii holdings mike also incorporate push-to-talk ptt feature similar two-way radio january 30 2013 blackberry announced release z10 q10 smartphones models consist touch screens z10 features all-touch design q10 combines qwerty keyboard touchscreen features second financial quarter 2013 blackberry sold 6.8 million handsets eclipsed sales competitor nokia lumia model first time august 12 2013 blackberry announced intention sell company due increasingly unfavourable financial position competition mobile industry largely due lower expected sales z10 blackberry announced september 20 2013 4,500 full- part-time positions estimated 40 operating staff terminated product line reduced six four models september 23 2013 fairfax financial owns 10 equity stake blackberry made offer acquire blackberry 4.7 billion 9.00 per share following announcement blackberry announced acceptance offer provisionally would continue seek offers november 4 2013 november 4 2013 blackberry replaced thorsten heins new interim ceo john s. chen former ceo sybase november 8 blackberry board rejected proposals several technology companies various blackberry assets grounds break-up serve interest stakeholders include employees customers suppliers addition shareholders said sources want identified discussions confidential november 13 2013 chen released open message committed reclaiming success early july 2014 techcrunch online publication published article titled blackberry one hottest stocks 2014 seriously following 50 percent rise company stock increase greater peer companies apple google however analysis blackberry financial results showed neither revenue profit margin improved instead costs markedly reduced period blackberry also introduced new passport handset — consisting square screen full hd-class 1,440 x 1,440 resolution marketed professional fields healthcare architecture — promoted messenger app released minor updates bb10 mobile operating system december 17 2014 blackberry classic introduced meant line former bold series incorporating navigation buttons similar previous blackberry os devices discontinued june 2016 last blackberry keyboard dominates front phone classic style september 2015 blackberry officially unveiled blackberry priv slider german made camera lens 18 megapixels phablet utilizes android operating system additional security productivity-oriented features inspired blackberry operating systems however blackberry coo marty beard told bloomberg company never said would build another bb10 device july 26 2016 company hinted another model physical keyboard coming shortly day blackberry unveiled mid-range android model on-screen keyboard blackberry dtek50 powered latest version android 6.0 marshmallow priv could also upgraded 6.0 device featured 5.2-inch full high-definition display blackberry chief security officer david kleidermacher stressed data security launch indicating model included built-in malware protection encryption user information industry observers pointed dtek50 re-branded version alcatel idol 4 additional security-oriented software customizations manufactured designed tcl september 2016 blackberry limited agreed licensing partnership indonesian company set new joint venture company called bb merah putih source distribute market blackberry handsets indonesia october 25 2016 blackberry released blackberry dtek60 second device dtek series manufactured designed tcl device features 5.5-inch quad-hd touch screen display running qualcomm snapdragon 820 processor support quick charge 3.0 usb type-c fingerprint sensor october 2016 announced blackberry working ford motor company canada develop software car manufacturer connected vehicles february 2017 20m class action lawsuit blackberry announced former employees company march 2017 bb merah putih announced blackberry aurora indonesian-made sold device running operating system based android 7.0 box march 2018 announced blackberry working jaguar land rover develop software car manufacturer vehicles june 2018 blackberry partnership tcl mobile optiemus infracom launched key2 global launch new york third device sport keyboard running google android os 2000 ntp sent notice wireless email patents number companies offered license patents ntp brought patent-infringement lawsuit one companies research motion united states district court eastern district virginia court well known strict adherence timetables deadlines sometimes referred rocket docket particularly efficient trying patent cases jury eventually found ntp patents valid furthermore jury established rim infringed patents willful manner infringement cost ntp us 33 million damages greater reasonable royalty lost profits judge james r. spencer increased damages us 53 million punitive measure due willful nature infringement also instructed rim pay ntp legal fees us 4.5 million issued injunction ordering rim cease desist infringing patents—this decision would resulted closure blackberry systems us rim appealed findings court injunction remedies stayed pending outcome appeals march 2005 appeal rim ntp tried negotiate settlement dispute settlement 450 million negotiations broke due issues june 10 2005 matter returned courts early november 2005 us department justice filed brief requesting rim service allowed continue large number blackberry users us federal government january 2006 us supreme court refused hear rim appeal holding liability patent infringement matter returned lower court prior granted injunction preventing rim sales us use blackberry device might enforced presiding district court judge two parties unable reach settlement february 9 2006 us department defense dod filed brief stating injunction shutting blackberry service excluding government users unworkable dod also stated blackberry crucial national security given large number government users february 9 2006 rim announced developed software workarounds would infringe ntp patents would implement injunction enforced march 3 2006 stern warning judge spencer rim ntp announced settled dispute terms settlement rim agreed pay ntp 612.5 million usd full final settlement claims statement rim said terms agreement finalized litigation rim dismissed court order afternoon agreement eliminates need court proceedings decisions relating damages injunctive relief settlement amount believed low analysts absence future royalties technology question may 26 2017 blackberry announced reached agreement qualcomm incorporated resolving amounts payable connection interim arbitration decision announced april 12 2017 following joint stipulation parties arbitration panel issued final award providing payment qualcomm blackberry total amount u.s. 940,000,000 including interest attorneys fees net certain royalties due blackberry calendar 2016 first quarter calendar 2017 november 24 2010 research motion rim removed kik messenger blackberry app world limited functionality software users rim also sued kik interactive patent infringement misuse trademarks october 2013 companies settled lawsuit terms undisclosed 2018 reported blackberry would filing legal action facebook perceived intellectual property infringements within facebook messenger whatsapp well instagram many blackberry retail stores operate outside north america thailand indonesia united arab emirates mexico december 2007 blackberry store opened farmington hills michigan store offers blackberry device models t-mobile verizon sprint major u.s. carriers offer smartphones three prior attempts opening blackberry stores toronto london uk eventually folded also blackberry stores operated wireless giant airports atlanta boston charlotte minneapolis–st paul philadelphia houston newark several slated closing september 23 2015 blackberry opened first pop-up store frankfurt germany various stages company history suffered occasional service outages referred media embarrassing 2005 company suffered relatively short-term outage reportedly among small handful north america carriers service restored several hours 2007 e-mail service suffered outage led calls questioning integrity towards blackberry perceived centralized system 2009 company outage reportedly covering whole north america 2011-10-10 10:00 utc began multi-day outage europe middle east africa affecting millions blackberry users another outage following day october 12 2011 blackberry internet service went north america research motion attributed data overload due switch failures two data centres waterloo canada slough england cause service disruptions outage intensified calls shareholders shake-up company leadership estimates blackberry company lost 50 million 54 million due global email service failure outage 2011 bcesa blackberry certified enterprise sales associate qualification first three levels professional blackberry certification information certifications blackberry.com website blackberry technical certifications available android devices blackberry 10 devices blackberry 7 devices blackberry 6 devices blackberry 5 devices blackberry 4 devices blackberry 3 devices blackberry 2 devices blackberry 1 devices modern lte based phones blackberry z10 qualcomm snapdragon s4 plus proprietary qualcomm soc based armv7-a architecture featuring two 1.5 ghz qualcomm krait cpu cores 400 mhz adreno 225 gpu gsm-based blackberry phones incorporate arm 7 9 11 processor blackberry models torch 9850/9860 torch 9810 bold 9900/9930 1.2 ghz msm8655 snapdragon s2 soc 768 mb system memory 8 gb on-board storage entry-level models curve 9360 feature marvell pxa940 clocked 800 mhz previous blackberry devices bold 9000 equipped intel xscale 624 mhz processors bold 9700 featured newer version bold 9000 processor clocked speed curve 8520 featured 512 mhz processor blackberry 8000 series smartphones 8700 pearl based 312 mhz arm xscale armv5te pxa900 exception blackberry 8707 based 80 mhz qualcomm 3250 chipset due pxa900 chipset supporting 3g networks 80 mhz processor blackberry 8707 meant device often slower download render web pages 3g 8700 edge networks early blackberry devices blackberry 950 used intel 80386-based processors blackberry latest flagship phone blackberry z30 based 5-inch super amoled 1280×720 resolution 295 ppi 24-bit color depth powered quad-graphics qualcomm dual core 1.7 ghz msm8960t pro first blackberry android operating system released late november 2015 192 gram/6.77 ounce blackberry priv launched version 5.1.1 later upgraded version 6.0 android marshmallow first available four countries increased 31 countries february 28 2016 employing qualcomm 8992 snapdragon 808 hexa-core 64 bit adreno 418 600 mhz gpu 3gb ram processor unit equipped curved 5.4-inch 2560 x 1440 oled display sliding qwerty keyboard hidden use google voice recognition allows dictating e-mails also available priv retained best blackberry 10 features 3,410mah battery said provide 22.5 hours mixed use 18-megapixel camera schneider-kreuznach lens also record 4k video secondary selfie camera also provided several important apps unique priv available google play mid december new operating system blackberry 10 released two new blackberry models z10 q10 january 30 2013 blackberry world 2012 rim ceo thorsten heins demonstrated new features os including camera able rewind frame-by-frame separately individual faces image allow selection best different shots stitched seamlessly optimal composite intelligent predictive adapting keyboard gesture based user interface designed around idea peek flow apps available blackberry 10 devices blackberry world storefront previous operating system developed older blackberry devices blackberry os proprietary multitasking environment developed rim operating system designed use input devices track wheel track ball track pad os provides support java midp 1.0 wap 1.2 previous versions allowed wireless synchronisation microsoft exchange server email calendar well lotus domino email os 5.0 provides subset midp 2.0 allows complete wireless activation synchronisation exchange email calendar tasks notes contacts adds support novell groupwise lotus notes blackberry curve 9360 blackberry torch 9810 bold 9900/9930 curve 9310/9320 torch 9850/9860 featured 2011 blackberry os 7 apps available devices blackberry world 2013 called blackberry app world third-party developers write software using apis proprietary blackberry apis well application makes use certain restricted functionality must digitally signed associated developer account rim signing procedure guarantees authorship application guarantee quality security code rim provides tools developing applications themes blackberry applications themes loaded onto blackberry devices blackberry world air ota blackberry mobile browser blackberry desktop manager blackberry devices well android ios windows phone platforms ability use proprietary blackberry messenger also known bbm software sending receiving encrypted instant messages voice notes images videos via blackberry pin long cell phone data plan messages free charge features bbm include groups bar-code scanning lists shared calendars bbm music integration apps games using bbm social platform april 2013 blackberry announced shutting streaming music service bbm music active almost two years since launch blackberry messenger music closed june 2 2013 july 2014 blackberry revealed blackberry assistant new feature blackberry os 10.3 blackberry passport hardware feature digital personal assistant help keep organized informed productive december 2014 blackberry nanthealth healthcare-focused data provider launched secure cancer genome browser giving doctors ability access patients genetic data blackberry passport smartphone several non-blackberry mobile phones released featuring blackberry email client connects blackberry servers many phones full qwerty keyboards third-party software available use blackberry devices includes full-featured database management systems used support customer relationship management clients applications must manage large volumes potentially complex data march 2011 rim announced optional android player could play applications developed android system would available blackberry playbook rim first entry tablet market august 24 2011 bloomberg news reported unofficial rumors blackberry devices would able run android applications rim brings qnx android app player blackberry october 20 2011 rim officially announced android applications could run unmodified blackberry tablet newest blackberry phones using newest version operating system blackberry smartphones integrated organization email system software package called blackberry enterprise server bes version 5 blackberry enterprise service bes version 10 versions 6 9. versions bes available microsoft exchange lotus domino novell groupwise google apps individual users may able use wireless provider email services without install bes organizations multiple users usually run bes network blackberry devices running blackberry os 10 later also managed directly microsoft exchange server using exchange activesync eas policies way ios android device eas supports fewer management controls bes third-party companies provide hosted bes solutions every blackberry unique id called blackberry pin used identify device bes blackberry one time provided free bes software called bes express besx primary bes feature relay email corporate mailbox blackberry phone bes monitors user mailbox relaying new messages phone via blackberry network operations center noc user wireless provider feature known push email new emails contacts task entries memopad entries calendar entries pushed blackberry device immediately opposed user synchronising data manually device poll server intervals blackberry also supports polling email third-party applications messaging system built blackberry understands receive messages bes bis services handle connections user mail providers device storage also enables mobile user access data off-line areas without wireless service user reconnects wireless service bes sends latest data feature newer models blackberry ability quickly track user current location trilateration without use gps thus saving battery life time trilateration used quick less battery intensive way provide location-aware applications co-ordinates user however accuracy blackberry trilateration less gps due number factors including cell tower blockage large buildings mountains distance bes also provides phones tcp/ip connectivity accessed component called mds mobile data system connection service allows custom application development using data streams blackberry devices based sun microsystems java platform addition bes provides network security form triple des recently aes encryption data email mds traffic travels blackberry phone blackberry enterprise server providers offer flat monthly pricing via special blackberry tariffs unlimited data blackberry units bes addition receiving email organizations make intranets custom internal applications unmetered traffic recent versions blackberry platform mds longer requirement wireless data access starting os 3.8 4.0 blackberry phones access internet i.e tcp/ip access without mds – formerly email wap access possible without bes/mds bes/mds still required secure email data access applications require wap carriers allow wap access primary alternative using blackberry enterprise server use blackberry internet service bis blackberry internet service available 91 countries internationally blackberry internet service developed primarily average consumer rather business consumer service allows users access pop3 imap outlook web app via exchange activesync email accounts without connecting blackberry enterprise server bes blackberry internet service allows 10 email accounts accessed including proprietary well public email accounts gmail outlook yahoo aol blackberry internet service also supports push capabilities various blackberry applications various applications developed rim blackberry utilise push capabilities bis instant messaging clients like google talk windows live messenger yahoo messenger mms pin interactive gaming mapping trading applications require data plans like bis wi-fi use service usually provisioned mobile phone service provider though blackberry actually runs service blackberry pin personal identification number eight-character hexadecimal identification number assigned blackberry device pins changed manually device though blackberry technicians able reset update pin server-side locked specific blackberry blackberry devices message using pin directly using blackberry messenger application blackberry pins tracked blackberry enterprise servers blackberry internet service used direct messages blackberry device emails messages blackberry push service typically directed blackberry device pin message routed rim network operations center sent carrier deliver message last mile device september 2012 rim announced blackberry pin would replaced users blackberry id starting 2013 launch blackberry 10 platform primary competitors blackberry android smartphones iphone blackberry struggled compete market share plunged since 2011 leading speculation unable survive independent going concern however managed maintain significant positions markets despite market share loss global basis number active blackberry subscribers increased substantially years example fiscal period apple iphone first released rim reported subscriber base 10.5 million blackberry subscribers end 2008 android first hit market rim reported number blackberry subscribers increased 21 million finally quarter ended june 28 2012 rim announced number blackberry subscribers reached 78 million globally release apple iphone 5 september 2012 rim ceo thorsten heins announced current global subscribers 80 million sparked 7 jump shares price however since blackberry global user base meaning active accounts declined dramatically since peak 80 million june 2012 dropping 46 million users september 2014 market share globally also declined less 1 percent 2011 blackberry shipped 43 smartphones indonesia april 2014 fallen 3 decline indonesian market share mirrors global trend company 0.6 north america retail price 2,199,000 indonesian rupiah 189 failed give blackberry boost needed indonesia company launched device discounted offer first 1000 purchasers resulted stampede capital several people injured blackberry lost market share indonesia despite launch z3 may 13 2014 new device given worldwide launch city jakarta came back news research motion rim cut hardware production costs outsourcing taiwan-based foxconn group report third quarter 2015 results december 18 2015 company said approximately 700,000 handsets sold 1.9 million quarter 2014 800,000 q2 2015 average sale price per unit 240 315 however continue increase sales new android priv device selling premium price 800 canada example q3 2015 blackberry net loss 89 million u.s. 17 cents per share 15 million net loss three cents per share excluding restructuring charges one-time items revenue slightly year earlier 557 million u.s. vs. 548 million primarily software sales chief executive officer john chen said expects company software business grow 14 percent market time company ready provide sales figures android-based priv handset released weeks earlier four countries time chen offered comment analysts depending priv ... chance could achieve get closer break-even operating profitability overall device business fourth quarter due continuous reduction blackberry users february 2016 blackberry headquarter waterloo canada slashed 35 percent workforce early 2016 blackberry market share dropped 0.2 q4 2016 reports indicate blackberry sold 207,900 units—equivalent 0.0 market share number active blackberry users since 2003 globally research motion agreed give access private communications governments united arab emirates saudi arabia 2010 india 2012 saudi uae governments threatened ban certain services law enforcement agencies could decrypt messages people interest revealed part 2013 mass surveillance disclosures american british intelligence agencies national security agency nsa government communications headquarters gchq respectively access user data blackberry devices agencies able read almost smartphone information including sms location e-mails notes blackberry internet service operates outside corporate networks contrast data passing internal blackberry services bes compresses encrypt data documents stated nsa able access blackberry e-mail system could see read sms traffic brief period 2009 nsa unable access blackberry devices blackberry changed way compress data access devices re-established gchq gchq tool named scrapheap challenge capability perfect spoofing emails blackberry targets response revelations blackberry officials stated us comment media reports regarding alleged government surveillance telecommunications traffic added back door pipeline platform established exist similar access intelligence agencies mobile devices exists using similar techniques hack blackberry software includes support dual ec drbg csprng algorithm due probably backdoored nsa us national institute standards technology strongly recommends longer used blackberry ltd. however issued advisory customers consider probable backdoor vulnerability blackberry ltd. also owns us patent 2007189527 covers technical design backdoor formerly advanced encryption capabilities blackberry smartphone made eligible use government agencies state forces former united states president barack obama became known dependence blackberry device communication 2008 presidential campaign despite security issues insisted using even inauguration seen akin celebrity endorsement marketing experts estimated worth 25 million 50 million usage blackberry continued around end presidency hillary clinton email controversy associated hillary clinton continuing use blackberry assuming office secretary state example west yorkshire police allowed increase presence police officers along streets reduction public spending given officer could perform desk work directly via mobile device well several areas situations us federal government slow move away blackberry platform state department spokesperson saying 2013 blackberry devices still mobile devices approved u.s. missions abroad state department high encryption standard made blackberry smartphones playbook tablet unique since implemented devices including apple devices released iphone 4 bangalore city police one police departments india along pune police kochi police use blackberry devices united kingdom south west trains northern rail issued blackberry devices guards order improve communication control guards passengers canada toronto many municipalities within canada issued blackberry devices employees including limited transportation technical water operations inspection staff management staff order improve communication contracted construction companies winter maintenance operations assist successfully organize multimillion-dollar contracts devices standard mobile device receive e-mail redirected groupwise city e-mail environment currently set support blackberry devices part internet things endeavours company announced plans moving shipping industry adapting smartphones devices communication necessities freight containers eric schmidt executive chairman google longtime blackberry user although smartphones running google android mobile operating system compete blackberry schmidt said 2013 interview uses blackberry prefers keyboard italian criminal group known 'ndrangheta reported february 2009 communicated overseas gulf cartel mexican drug cartel use blackberry messenger since bbm texts difficult intercept
[ 6788, 1344, 6336, 1724, 7431, 5554, 5909, 291, 2555, 3855, 561, 3528, 298, 4684, 7818, 388, 5571, 5832, 484, 2570, 4055, 1652, 6910, 740, 4380, 6550, 5585, 3555, 2865, 2048, 47, 3561, 2233, 3653, 6465, 1582, 5509, 597, 3657, 7026, 2520,...
Test
1,545
3
MSX_Video_access_method:msx video access method colecovision sg-1000 creativision first-generation msx computers use tms9918a video display processor vdp 16 kib video memory shared main memory compared unified system video memory used 8-bit computers time apple ii zx spectrum commodore 64 separate memory advantage freeing z80 processor 64 kib address space main ram vdp n't need steal cpu cycles access video memory disadvantage program use cpu dedicated i/o instructions command vdp manipulate contents video ram slows video access also makes porting games unified-memory platforms difficult attempts porting zx spectrum games uk system similar msx often thwarted difference also programmers learn optimally use advanced capabilities vdp tms9918a method accessing video ram slower direct access used unified-memory computers accessing video memory involved first outputting low- hi-byte 14-bit video memory address i/o port 99 one bytes 8-bit data port 98 write memory pointer advances next address consecutive addresses written repeated instructions 98 z80 fast otir/otdr block instructions could used instead ldir/lddr still allowed vram access rate restricted unless vertical blanking however screen layout top-down character 8 lines advancing next character difficult use programmers tried convert existing software originally written system another arrangement screen layout trying use tms9918a high resolution mode video memory conventional way method indirect-access could far slower 8-bit computers unified memory like piece ram consequently machines using vdp could inefficient certain graphical tasks scrolling games entailed moving entire background memory instead able use z80 efficient fast block move instructions write elaborate routines first read bytes video memory system memory back another location video memory one byte time increase speed acceptable level programmers often limited scrolling 8-pixel steps looked primitive comparison 1 2 pixel scrolling steps available zx spectrum commodore 64 machines although commodore 64 also used 8-pixel steps fine-scroll register could compensate msx-1 tms9918a several features make shortfall example programmable character set allowed indirection greatly increase scrolling character table moved instead pixel data 32 hardware sprites sprites however limited example atari-8-bit systems highest resolution 16x16 pixels single-color transparency bigger drawback though reality scan line segments maximum 4 sprites could simultaneously displayed one picture scan line attempting place 5-th sprites scan line segment scan line four others would result flickering missing scan line segments still care multiple multi-color sprites could created way many japanese games prove zx spectrum sprites porting games often much trouble re-write game structure take advantage sprites often simply ignored porting games tricks available circumvent scrolling speed related problems using clever programming techniques video chip capabilities available zx spectrum using undocumented text mode supported multiple colors addition using built re-programmable fonts possible combine high resolution graphics faster scrolling also able use sprites method widely used japanese programmers writing native software rarely british programmers porting spectrum software video problems described especially sprite limits scrolling fixed newer msx-2 video chips however time 16 bit systems like amiga atari st started dominate market
[ 974 ]
Validation
1,546
3
Degree_of_parallelism:degree parallelism degree parallelism dop metric indicates many operations simultaneously executed computer especially useful describing performance parallel programs multi-processor systems program running parallel computer may utilize different numbers processors different times time period number processors used execute program defined degree parallelism plot dop function time given program called parallelism profile
[ 553, 5371, 5559, 4049, 4318, 3458, 5042, 4154, 1481, 5939, 4159, 1023, 1295, 5947, 3041, 240, 1586, 515, 8024, 2961, 3578, 4993, 5447, 357, 2266, 5890 ]
Validation
1,547
2
Bhyve:bhyve bhyve pronounced bee hive formerly written bhyve type-2 hypervisor written freebsd ported number illumos based distributions including smartos omnios bhyve runs freebsd 9+ openbsd netbsd linux illumos windows nt windows vista later windows server 2008 later guests current development efforts aim widening support operating systems x86-64 architecture
[ 4293, 7514, 2182, 732, 5396, 3636, 3978, 5760, 3986, 5064, 5065, 6477, 424, 7581, 6149, 6860, 6505, 1523, 481, 2300, 1193, 4059, 8001, 6918, 6211, 4806, 4441, 5865, 8037, 5884, 875, 3761, 1254, 4845, 6256, 191, 5904, 4498, 7355, 7357, 3...
Test
1,548
4
Common_Computing_Security_Standards_Forum:common computing security standards forum common computing security standards forum ccss forum voluntary organization vendors providers security software operating systems internet browsers ccss forum formed following goals 2009 melih abdulhayoğlu organized common computing security standards forum initially purpose maintaining list legitimate antivirus engines response scareware products present antivirus software either adware malware according fbi aware estimated loss victims rogue antivirus software much 150 million ccss maintains so-called whitelist legitimate organizations provide antivirus systems trusted vendors list viewed organization web site http //www.ccssforum.org
[ 363, 6006 ]
Test
1,549
9
FL_(programming_language):fl programming language fl short function level functional programming language created ibm almaden research center john backus john williams edward wimmers 1980s documented report 1989 fl designed successor backus earlier fp language providing specific support backus termed function-level programming fl dynamically typed strict functional programming language throw catch exception semantics much like ml function implicit history argument used things like strictly functional input/output i/o also used linking c code optimization exists type-system extension hindley–milner type inference many language ’ innovative ideas since implemented kenneth e. iverson ’ j language plasm geometry-oriented extension subset fl language first described 1992
[ 6507, 1270, 1892, 4929, 3630, 1381, 3570, 5164, 1435 ]
Validation
1,550
1
Amazon_DynamoDB:amazon dynamodb amazon dynamodb fully managed proprietary nosql database service supports key-value document data structures offered amazon.com part amazon web services portfolio dynamodb exposes similar data model derives name dynamo different underlying implementation dynamo multi-master design requiring client resolve version conflicts dynamodb uses synchronous replication across multiple datacenters high durability availability dynamodb announced amazon cto werner vogels january 18 2012 presented evolution amazon simpledb solution vogels motivates project 2012 announcement amazon began decentralized network services originally services direct access ’ databases became bottleneck engineering operations services moved away direct access pattern favor public-facing apis still third-party relational database management systems struggled handle amazon ’ client base culminated 2004 holiday season several technologies failed high scale traffic engineers normalizing relational systems reduce data redundancy design optimizes storage sacrifice stored given “ item ” data e.g information pertaining product product database several relations takes time assemble disjoint parts query many amazon ’ services demanded mostly primary-key reads data speed top priority putting pieces together taxing systems content compromising storage efficiency amazon ’ response dynamo highly available key-value store built internal use dynamo seemed everything engineers needed adoption lagged amazon developers opted “ works ” design patterns s3 simpledb systems noticeable design flaws demand overhead provisioning hardware scaling re-partitioning data amazon next iteration nosql technology dynamodb automated database management operations reduce headache developers dynamodb differs amazon services allowing developers purchase service based throughput rather storage auto scaling enabled database scale automatically additionally administrators request throughput changes dynamodb spread data traffic number servers using solid-state drives allowing predictable performance offers integration hadoop via elastic mapreduce september 2013 amazon made available local development version dynamodb developers test dynamodb-backed applications locally dynamodb table features items attributes form primary key whereas relational systems item features table attribute juggles “ null ” “ unknown ” values absence dynamodb items schema-less exception creating table developer specifies primary key table requires key item therein primary keys must scalar strings numbers binary take one two forms single-attribute primary key known table ’ “ partition key. ” partition key determines partition item hashes to––more partitioning below––so ideal partition key uniform distribution range primary key also feature second attribute dynamodb calls table ’ “ sort key. ” case partition keys unique paired sort keys make unique identifier item partition key still used determine partition item stored within partition items sorted sort key relational model indices typically serve “ helper ” data structures supplement table allow dbms optimize queries hood improve query functionality dynamodb query optimizer index simply another table different key two sits beside original developer creates index creates new copy data fields specifies get copied minimum fields indexes original table ’ primary key dynamodb users issue queries directly indices two types indices available global secondary index features partition key optional sort key ’ different original table ’ partition key local secondary index features partition key original table different sort key indices introduce entirely new query functionality dynamodb database allowing queries new keys indexing system data redundancy pure simple relational philosophy permit indices prime example dynamodb prioritizes speed space efficiency like relational systems dynamodb updates indices automatically addition/update/deletion must judicious creating risk slowing write-heavy database slew index updates dynamodb uses json syntax ubiquity development community create table action demands three arguments tablename keyschema––a list containing partition key optional sort key––and attributedefinitions––a list attributes defined must least contain definitions attributes used partition sort keys whereas relational databases offer robust query languages dynamodb offers put get update delete operations put requests contain tablename attribute item attribute consists attributes values item update request follows syntax similarly get delete item simply specify tablename key dynamodb uses hashing b trees manage data upon entry data first distributed different partitions hashing partition key partition store 10gb data handle default 1000 write capacity units wcu 3000 read capacity units rcu one rcu represents one strongly consistent read per second two eventually consistent reads per second items 4kb size one wcu represents one write per second item 1kb size prevent data loss dynamodb features two-tier backup system replication long-term storage partition features three nodes contains copy partition ’ data node also contains two data structures b tree used locate items replication log notes changes made node dynamodb periodically takes snapshots two data structures stores month s3 engineers perform point-in-time restores databases within partition one three nodes designated “ leader node. ” write operations travel first leader node propagating makes writes consistent dynamodb maintain status leader sends “ heartbeat ” node every 1.5 seconds another node stop receiving heartbeats initiate new leader election dynamodb uses paxos algorithm elect leaders amazon engineers avoided dynamo originally due engineering overheads like provisioning managing partitions nodes response dynamodb team built service calls autoadmin manage database autoadmin replaces node stops responding copying data another node partition exceeds three thresholds rcu wcu 10gb autoadmin automatically add additional partitions segment data like indexing systems relational model dynamodb demands updates table reflected table ’ indices dynamodb handles using service calls “ log propagator ” subscribes replication logs node sends put update delete requests indices necessary indices result substantial performance hits write requests dynamodb allows user five given table suppose dynamodb user issues write operation put update delete typical relational system would convert sql query relational algebra run optimization algorithms dynamodb skips processes gets right work request arrives dynamodb request router authenticates–– “ request coming where/whom claims ” ––and checks authorization–– “ user submitting request requisite permissions ” assuming checks pass system hashes request ’ partition key arrive appropriate partition three nodes within copy partition ’ data system first writes leader node writes second node sends “ success ” message finally continues propagating third node writes consistent always travel first leader node finally log propagator propagates change indices index grabs index ’ primary key value item performs write index without log propagation operation update pre-existing item updated attribute may serve primary key index thus b tree index must update well b trees handle insert delete read operations practice log propagator receives update operation issues delete operation put operation indices suppose dynamodb user issues get operation request router proceeds authentication authorization next hash partition key arrive appropriate hash encounter problem three nodes eventual consistency one another decide investigate dynamodb affords user two options issuing read consistent eventually consistent consistent read visits leader node consistency-availability tradeoff rears head read-heavy systems always reading leader overwhelm single node reduce availability second option eventually consistent read selects random node practice dynamodb trades consistency availability take route odds inconsistency ’ need write operation return “ success ” begin propagating third node finish ’ also need get target third node means 1-in-3 chance inconsistency within write ’ propagation window long window number catastrophes could cause node fall behind vast majority cases third node up-to-date within milliseconds leader languages frameworks dynamodb binding include java javascript node.js go c .net perl php python ruby haskell erlang django grails dynamodb exposes performance metrics help users provision correctly keep applications using dynamodb running smoothly metrics tracked using aws management console using aws command line interface monitoring tool integrating amazon cloudwatch
[ 5894, 2451, 5983, 1254, 4217, 2988, 7613, 632, 1634, 3091, 6262, 993, 3953, 6428, 7722, 2740, 8083, 6806, 3627, 5571, 5927, 2212, 5135, 1757, 3028, 7838, 6029, 6462, 842, 4163, 5239, 7102, 5064, 330, 2054, 5447, 6219, 517, 518, 2961, 59...
Validation
1,551
4
Forensic_search:forensic search forensic search emerging field computer forensics forensic search focuses user created data email files cell phone records office documents pdfs files easily interpreted person forensic search differs computer forensic analysis seek review analyze lower level system files registry link files disk level issues commonly associated traditional computer forensic analysis forensic search emerged due number factors including objective forensic search software allow person general knowledge computers skilled document review investigation techniques undertake search user created electronically stored information esi data typically considered user created esi made emails documents pictures file types created user opposed data created computer operating system i.e registry files link files unallocated space controlled created computer user objective reviewing user created data find information may used base decisions part investigation forensic search software differs using native applications e.g outlook desktop search software e.g google desktop search data changes made data processing searching may impact results skew findings forensic search software also allow access base metadata items available via native application good example would metadata ms word documents number forensic search software products able perform data recovery range email file types examples using native application non-forensic application affect data forensic search software likened ediscovery review software however strictly case ediscovery review software dealing many type computer records search options offer extra functionality forensic search software features redaction legal hold standard ediscovery review software also case forensic search software meet higher end tasks outlined widely accepted electronic discovery reference model edrm tasks identification collection preservation presentation generally covered forensic search software however true ediscovery review generally domain qualified legal practitioners companies use term ediscovery become catchall circles processing searching electronically stored information esi however true representation term ediscovery detailed understanding ediscovery electronic discovery reference model edrm good guideline could said forensic search closely related early case assessment eca ediscovery eca require rigor full ediscovery review presenting data part report may used form decision evidence important data correctly represented reader understand case generating reports system created data registry files link files system created data costly exercise also case straightforward answer explanation example would attempting explain lay person method techniques decoding userassist key windows system registry userassist key hold great deal information actions user computer however explain key reviewer able identify key correctly interpret key setting keys often encoded rot 13 keys decoded human readable formats reviewer show setting relates case often time consuming review hundreds even thousands settings times deliver circumstantial sometimes contentious findings reviewing user created data e-mail contracts reporting understanding findings often much straight forward semi skilled user usually good grasp email works use day-to-day work legal person understand contract need specialist forensic knowledge lead much lower costs review less contentious circumstantial findings features forensic search software focused allowing user search view range data users ’ files one time specific features forensic search software many newer emerging fields computer forensics cloud forensics mobile phone forensics network forensics memory analysis browser forensics forensic triage internet forensics distant past computer forensic expert ’ common role attend person ’ house place work data center forensically 'image computers devices may involved case categorized collection phase collection phase complete images reviewed esi relevant supplied interested parties required computer forensic investigator good deal experience training process time consuming costly computer forensic expert ’ primary role investigate computer evidence esi may familiar entire case objectives case agent detective forensic accountant crime analyst often led non-perfect time consuming identification correct evidence items differing parties would immediately flag interest detective deep knowledge case parties involved may go unnoticed computer forensic expert example would email suspect another case suspect case contact phone calls witness suspect compound issue massive increase size data computer forensic expert needs collect often case computer hard drive able imaged example computer contains evidence big system shut take image mission critical server email server company file server rise cloud computing also added challenges collection evidence data requires collection review may reside cloud case computer available image forensic expert needs collect information using forensic software designed work certain cloud providers short collection evidence changed significantly past years recognizing challenges concept hybrid forensics discussed creation tools adopt different approach collecting data concept hybrid forensics selective collection data 'live systems way may considered reliable evidence court law enforcement organizations like many organizations divided skill specific units computer forensic cybercrime area units take responsibility aspects esi discussed forensic search point 5 units usually time poor resourced albeit time resources low main knowledge unit comes officers consultants 7+ years experience predates computer forensic degrees available officers become familiar time methodology using forensic analysis software package offer started field hence new officers resources become available forensic analysis software prioritized newer specific software newer forensic field types forensic search software become popular method reducing time cost search analysis larger data sets focusing user data often yields evidence results e-mail seductive powerful evidence personal plentiful candid adults e-mail primary means written communication lawyers think e-discovery e-mail crave surprise e-mail traffic sought-after fought-over esi new generation tools developed order address challenges faced digital forensic ediscovery practitioners
[ 2961 ]
Test
1,552
4
Brian_Lord_(cyber_security_expert):brian lord cyber security expert brian richard lord born december 1965 former deputy director intelligence cyber operations government communications headquarters gchq cheltenham england managing director cyber pgi protection group international international consultancy specialising cyber security risk consulting brian lord born bradford december 1965 son computer programmer teacher mathematics educated bradford grammar school 1972-1984 brian lord served royal corps signals 1984 1992 joining civil service worked gchq 21 years leaving deputy director intelligence cyber operations awarded obe 2005 new year honours september 2013 joined pgi protection group international consultancy specialising cyber security risk consulting managing director cyber described telegraph leading thinker sector cyber warfare october 2017 lord cleared charge sexual assault gloucester crown court prosecutors present evidence plead guilty common assault placing hand woman knee 2 – 3 minutes party 2016 believed first person british legal history charged common assault particulars assault touching defendant knee according lawyer three judges questioned whether public interest continue case view minor nature
[ 3241 ]
Test
1,553
7
EthosCE:ethosce ethosce learning management system administration continuing medical education nursing pharmacy healthcare-related programs developed dlc solutions provides interfaces organizations produce manage continuing education websites distribution provided software-as-a-service web application administrative interface allows users administer system web browser supports online mobile registration learners communication in-person online training events application includes online transcripts tracking professional certifications integration accreditation council continuing medical education accme program reporting system pars web service ethosce course object api used define learning objects added workflow built support drupal nodes part course requirement workflow including multiple course objects api allows content/assessments non-drupal external objects delivered tracked course content provides access taking enrolling learners courses ethosce originally released 14 april 2009 dlc solutions version 7.4 discontinued support creating moodle course objects integrated external scorm/tincan/xapi player released 12 december 2014
[ 330, 6029 ]
Test
1,554
5
Client–server_model:client–server model client–server model distributed application structure partitions tasks workloads providers resource service called servers service requesters called clients often clients servers communicate computer network separate hardware client server may reside system server host runs one server programs share resources clients client share resources requests server content service function clients therefore initiate communication sessions servers await incoming requests examples computer applications use client–server model email network printing world wide web client-server characteristic describes relationship cooperating programs application server component provides function service one many clients initiate requests services servers classified services provide example web server serves web pages file server serves computer files shared resource may server computer software electronic components programs data processors storage devices sharing resources server constitutes service whether computer client server determined nature application requires service functions example single computer run web server file server software time serve different data clients making different kinds requests client software also communicate server software within computer communication servers synchronize data sometimes called inter-server server-to-server communication general service abstraction computer resources client concerned server performs fulfilling request delivering response client understand response based well-known application protocol i.e content formatting data requested service clients servers exchange messages request–response messaging pattern client sends request server returns response exchange messages example inter-process communication communicate computers must common language must follow rules client server know expect language rules communication defined communications protocol client-server protocols operate application layer application layer protocol defines basic patterns dialogue formalize data exchange even server may implement application programming interface api api abstraction layer accessing service restricting communication specific content format facilitates parsing abstracting access facilitates cross-platform data exchange server may receive requests many distinct clients short period time computer perform limited number tasks moment relies scheduling system prioritize incoming requests clients accommodate prevent abuse maximize availability server software may limit availability clients denial service attacks designed exploit server obligation process requests overloading excessive request rates bank customer accesses online banking services web browser client client initiates request bank web server customer login credentials may stored database web server accesses database server client application server interprets returned data applying bank business logic provides output web server finally web server returns result client web browser display step sequence client–server message exchanges computer processes request returns data request-response messaging pattern requests met sequence complete web browser presents data customer example illustrates design pattern applicable client–server model separation concerns early form client–server architecture remote job entry dating least os/360 announced 1964 request run job response output formulating client–server model 1960s 1970s computer scientists building arpanet stanford research institute used terms server-host serving host user-host using-host appear early documents rfc 5 rfc 4 usage continued xerox parc mid-1970s one context researchers used terms design computer network programming language called decode-encode language del purpose language accept commands one computer user-host would return status reports user encoded commands network packets another del-capable computer server-host received packets decoded returned formatted data user-host del program user-host received results present user client–server transaction development del beginning 1969 year united states department defense established arpanet predecessor internet client-host server-host subtly different meanings client server host computer connected network whereas words server client may refer either computer computer program server-host user-host always refer computers host versatile multifunction computer clients servers programs run host client–server model server likely devoted task serving early use word client occurs separating data function distributed file system 1978 paper xerox parc computer scientists howard sturgis james mitchell jay israel authors careful define term readers explain use distinguish user user network node client 1992 word server entered general parlance client–server model dictate server-hosts must resources client-hosts rather enables general-purpose computer extend capabilities using shared resources hosts centralized computing however specifically allocates large amount resources small number computers computation offloaded client-hosts central computers simpler client-hosts relies heavily network resources servers infrastructure computation storage diskless node loads even operating system network computer terminal operating system input/output interface server contrast fat client personal computer many resources rely server essential functions microcomputers decreased price increased power 1980s late 1990s many organizations transitioned computation centralized servers mainframes minicomputers fat clients afforded greater individualized dominion computer resources complicated information technology management 2000s web applications matured enough rival application software developed specific microarchitecture maturation affordable mass storage advent service-oriented architecture among factors gave rise cloud computing trend 2010s addition client–server model distributed computing applications often use peer-to-peer p2p application architecture client–server model server often designed operate centralized system serves many clients computing power memory storage requirements server must scaled appropriately expected work-load i.e number clients connecting simultaneously load-balancing failover systems often employed scale server implementation peer-to-peer network two computers peers pool resources communicate decentralized system peers coequal equipotent nodes non-hierarchical network unlike clients client–server client–queue–client network peers communicate directly peer-to-peer networking algorithm peer-to-peer communications protocol balances load even peers modest resources help share load node becomes unavailable shared resources remain available long peers offer ideally peer need achieve high availability redundant peers make resource downtime availability load capacity peers change protocol reroutes requests client-server master-slave regarded sub-categories distributed peer-to-peer systems
[ 7148, 7151, 5014, 6415, 6795, 3951, 4685, 3660, 2535, 2961, 7214, 4738, 84, 5453, 4387, 2636, 6184, 7639, 5847, 7278, 6574, 6224, 1989, 7315, 4469, 7341, 7343, 4863, 7355, 5571, 4145, 5931, 3463, 3795, 2043, 3807, 231, 235, 2054, 3820, ...
Test
1,555
0
Temporal_annotation:temporal annotation temporal annotation study automatically add semantic information regarding time natural language documents plays role natural language processing computational linguistics temporal annotation involves application semantic annotation document significant temporal annotation standards include timeml iso-timeml tides standards typically include annotations temporal expressions timexes events temporal relations temporal signals temporal relation types natural language texts events may associated times e.g. may start end given time events also associated events like occurring call relations temporal relations temporal relation typing classifies relation two arguments important difficult sub-task figuring temporal information document allen interval algebra one scheme types temporal relations rule-engineering machine learning approaches temporal annotation successful though achieving high performance temporal relation typing remains difficult task successful temporal annotation enables systems find facts asserted texts true build timelines extract plans discover mentions change applications many domains information extraction digital history processing social media clinical text mining tempeval task series sets shared temporal annotation task run semeval three times attracting system entries around world task originally centred determining types temporal relations tempeval-2 -3 expanded include event timex annotation addition i2b2 clinical evaluation shared task temporal annotation exercise 2012 attracted great deal interest
[ 1314, 5429, 1209, 1444, 4037, 5885 ]
Test
1,556
3
RISC-V:risc-v risc-v pronounced risk-five open-source hardware instruction set architecture isa based established reduced instruction set computer risc principles project began 2010 university california berkeley many contributors volunteers affiliated university june 2019 version 2.2 user-space isa version 1.11 privileged isa frozen permitting software hardware development proceed debug specification available draft version 0.3 usable new isas usually expensive computer-designers normally afford work free also developing cpu requires design expertise several specialties electronic digital logic compilers operating systems rare find team outside professional engineering organization team normally paid money charged designs therefore commercial vendors computer designs arm holdings mips technologies charge royalties use designs patents copyrights also often require non-disclosure agreements releasing documents describe designs detailed advantages instruction set many cases never describe reasons design choices expense secrecy make development new hardware software much difficult also prevents security audits another result modern high-quality general-purpose computer instruction sets explained available except academic settings risc-v started solve problems goal make practical isa open-sourced usable academically hardware software design without royalties also rationales every part project explained least broadly risc-v authors academic substantial experience computer design risc-v isa direct development series academic computer-design projects originated part aid projects address cost design project started academic research funded darpa order build large continuing community users therefore accumulate designs software risc-v isa designers planned support wide variety practical uses small fast low-power real-world implementations without over-architecting particular microarchitecture need large base contributors part reason risc-v engineered fit many uses therefore many risc-v contributors see project unified community effort term risc dates 1980 knowledge simpler computers could effective design principles widely described simple effective computers always academic interest academics created risc instruction set dlx first edition computer architecture quantitative approach 1990 david patterson author later assisted risc-v. dlx intended educational use academics hobbyists implemented using field-programmable gate arrays commercial success arm cpus versions 2 earlier public-domain instruction set still supported gnu compiler collection gcc popular free-software compiler three open-source cores exist isa manufactured openrisc open-source isa based dlx associated risc designs fully supported gcc linux implementations however commercial implementations krste asanović university california berkeley found many uses open-source computer system 2010 decided develop publish one short three-month project summer plan help academic industrial users david patterson berkeley also aided effort originally identified properties berkeley risc risc-v one long series cooperative risc research projects stage students inexpensively provided initial software simulations cpu designs risc-v authors institution originally provided isa documents several cpu designs bsd licenses allow derivative works—such risc-v chip designs—to either open free closed proprietary early funding darpa commercial users require isa stable utilize product might last many years address issue risc-v foundation formed maintain publish intellectual property related risc-v definition original authors owners surrendered rights foundation designers say instruction set main interface computer lies hardware software good instruction set open available use dramatically reduce cost software permitting far reuse also increase competition among hardware providers use resources design less software support designers assert new principles becoming rare instruction set design successful designs last forty years become increasingly similar failed sponsoring companies failed commercially instruction sets poor technically well-designed open instruction set designed using well-established principles attract long-term support many vendors prior open isas used gnu general public license gpl encouraging users open implementations copying use others unlike academic designs optimized simplicity exposition designers state risc-v instruction set practical computers said features increase computer speed yet reduce cost power use include load–store architecture bit patterns simplify multiplexers cpu simplified standards-based floating-point design architecturally neutral placing most-significant bits fixed location speed sign-extension sign extension said often critical timing path instruction set designed wide range uses supports three word-widths 32 64 128 bits variety subsets definitions subset vary slightly three word-widths subsets support small embedded systems personal computers supercomputers vector processors warehouse-scale rack-mounted parallel computers instruction set variable-width extensible encoding bits always added space 128-bit stretched version isa reserved 60 years industry experience shown unrecoverable error instruction set design lack memory address space 128-bit isa remains undefined intentionally yet little practical experience large memory systems proposals implement variable-width instructions 864-bits risc-v also supports designers academic uses simplicity integer subset permits basic student exercises integer subset simple isa enabling software control research machines variable-length isa enables extensions student exercises research separated privileged instruction set permits research operating system support without redesigning compilers risc-v open intellectual property allows designs published reused modified normal problem new instruction set lack cpu designs software issues limit usability reduce adoption risc-v website specification user-mode instructions preliminary specification general-purpose privileged instruction set support operating systems several open-sourced risc-v cpu designs including 64-bit berkeley order machine boom 64-bit rocket five 32-bit sodor cpu designs berkeley picorv32 clifford wolf scr1 syntacore pulpino riscy zero-riscy eth zürich university bologna others three-stage sodor cpu appears apt small embedded cpu rocket may suit compact low-power intermediate computers personal devices boom uses much infrastructure created rocket may usable personal supercomputer warehouse-scale computers picorv scr1 32-bit microcontroller unit mcu class rv32imc implementations verilog cores pulpino implement simple rv32imc isa micro-controllers zero-riscy powerful rv32imfc isa custom dsp extensions embedded signal processing design software includes design compiler chisel reduce designs verilog use devices website includes verification data testing core implementations available risc-v software tools include gnu compiler collection gcc toolchain gdb debugger llvm toolchain ovpsim simulator library risc-v fast processor models spike simulator simulator qemu operating system support exists linux kernel freebsd netbsd supervisor-mode instructions unstandardized prior june 2019 support provisional preliminary freebsd port risc-v architecture upstreamed february 2016 shipped freebsd 11.0 ports debian fedora stabilizing port das u-boot exists uefi spec v2.7 defined risc-v binding tianocore port done hpe engineers expected upstreamed preliminary port sel4 microkernel simulator exists run risc-v linux system web browser using javascript hex five released first secure iot stack risc-v freertos support also see comparison real-time operating systems risc-v modular design consisting alternative base parts added optional extensions isa base extensions developed collective effort industry research community educational institutions base specifies instructions encoding control flow registers sizes memory addressing logic i.e. integer manipulation ancillaries base alone implement simplified general-purpose computer full software support including general-purpose compiler standard extensions specified work standard bases without conflict many risc-v computers might implement compact extension reduce power consumption code size memory use also future plans support hypervisors virtualization together supervisor instruction set extension rvgc defines instructions needed conveniently support operating system unix-style portable operating system interface posix tame combinations functionality may implemented nomenclature defined specify instruction set base specified first coding risc-v register bit-width variant e.g. rv64i rv32e follows letters specifying implemented extensions canonical order base extended integer floating point calculations synchronisation primitives multi-core computing base extensions mafd considered necessary general-purpose computation thus shorthand g. small 32-bit computer embedded system might rv32ec large 64-bit computer might rv64gc i.e. shorthand rv64imafdc naming scheme zxxx standard extensions yxxx non-standard vendor-specific extensions proposed example ztso extension total store ordering alternative memory consistency model weak memory ordering discussion risc-v 32 16 embedded variant integer registers floating-point extension implemented 32 floating-point registers except memory access instructions instructions address registers first integer register zero register remainder general-purpose registers store zero register effect read always provides 0 using zero register placeholder makes simpler instruction set control status registers exist user-mode programs access used performance measurement floating-point management instructions exist save restore multiple registers thought needless complex perhaps slow like many risc designs risc-v load–store architecture instructions address registers load store instructions conveying memory load store instructions include 12-bit offset two register identifiers one register base register register source write destination read offset added base register get address forming address base register plus offset allows single instructions access data structures example base register points top stack single instructions access subroutine local variables stack likewise load store instructions access record-style structure memory-mapped i/o device using constant zero register base address allows single instructions access memory around address zero memory addressed 8-bit bytes words little-endian order words register size accessed load store instructions accessed memory addresses need aligned word-width accesses aligned addresses may faster example simple cpus may implement unaligned accesses slow software emulation driven alignment failure interrupt risc-v manages memory systems shared cpus threads ensuring thread execution always sees memory operations programmed order threads i/o devices risc-v simplified n't guarantee order memory operations except specific instructions instruction guarantees results predecessor operations visible successor operations threads i/o devices guarantee order combinations memory memory-mapped i/o operations e.g separate memory read write operations without affecting i/o operations system operate i/o devices parallel memory n't force wait one cpu one thread may decode like many risc instruction sets complex instruction set computer cisc instruction sets x86 ibm system/360 families risc-v lacks address-modes write back registers example auto-increment risc-v little-endian resemble familiar successful computers example x86 also reduces cpu complexity costs slightly reads sizes words order example risc-v instruction set decodes starting lowest-addressed byte instruction specification leaves open possibility non-standard big-endian bi-endian systems risc cpus mips powerpc dlx berkeley risc-i place 16 bits offset loads stores set upper 16 bits load upper word instruction permits upper-halfword values set easily without shifting bits however use upper half-word instruction makes 32-bit constants like addresses risc-v uses sparc-like combination 12-bit offsets 20-bit set upper instructions smaller 12-bit offset helps compact 32-bit load store instructions select two 32 registers yet still enough bits support risc-v variable-length instruction coding risc-v handles 32-bit constants addresses instructions set upper 20 bits 32-bit register load upper immediate loads 20 bits bits 31 12 second instruction set bottom 12 bits method extended permit position-independent code adding instruction generates 20 upper address bits adding offset program counter storing result base register permits program generate 32-bit addresses relative program counter base register often used as-is 12-bit offsets loads stores needed set lower 12-bits register 64-bit 128-bit isas sign-extend result get larger address fast cpus may interpret combinations instructions single fused instructions may good candidates fuse loads stores risc-v subroutine call jump link places return address register faster many computer designs saves memory access compared systems push return address directly stack memory 20-bit signed 2 complement offset offset multiplied 2 added pc generate relative address 32-bit instruction result 32-bit address i.e. evenly divisible 4 cpu may force exception risc-v cpus jump calculated addresses using jump link-register instruction similar gets destination address adding 12-bit offset base register contrast adds larger 20-bit offset pc bit format like register-relative loads stores like used instructions set upper 20 bits base register make 32-bit branches either absolute address using pc-relative one using position-independent code using constant zero base address allows single-instruction calls small offset fixed positive negative address risc-v recycles get unconditional 20-bit pc-relative jumps unconditional register-based 12-bit jumps jumps make linkage register 0 return address saved risc-v also recycles return subroutine base register set linkage register saved offset zero linkage register zero offset return address saved like many risc designs subroutine call risc-v compiler must use individual instructions save registers stack start restore stack exit risc-v save multiple restore multiple register instructions thought make cpu complex possibly slow take code space designers planned reduce code size library routines save restore registers risc-v condition code register carry bit designers believed condition codes make fast cpus complex forcing interactions instructions different stages execution choice makes multiple-precision arithmetic complex also numerical tasks need energy instead risc-v short branches perform comparisons equal not-equal less-than unsigned less-than greater-than equal unsigned greater-than equal ten comparison-branch operations implemented six instructions reversing order operands assembler example branch greater done less-than reversed order operands comparing branches twelve-bit signed range jump relative pc risc-v isa requires default branch predictions cpus backward conditional branches predicted taken forward conditional branches predict taken predictions easy decode pipelined cpu branch addresses signed numbers added pc backward branches negative two complement addresses thus one significant bit address forward branches zero significant bit fixed location operation code speed pipeline complex cpus add branch predictors work well even unusual data situations isa manual recommends software optimized avoid branch stalls using default branch predictions reuses significant bit signed relative address hint bit tell whether conditional branch taken hint bits needed operation codes risc-v branches makes bits available branch operation codes simple inexpensive cpus merely follow default predictions still perform well optimizing compilers compilers still perform statistical path optimization desired avoid needless loading branch prediction electronics thus needless pipeline stalls comparing branch codes never used unconditional jumps risc-v support predication conditional execution instructions designers claim cpus without predication easier design optimizing compilers less likely mistakenly use predication used designers claim fast out-of-order cpu designs predication anyway comparison branch conditional code parallel discarding unused path effects also claim even simpler cpus predication less valuable branch prediction prevent stalls associated conditional branches code without predication larger branches also claim compressed instruction set risc-v set c solves problem cases many risc designs included branch delay slot position branch instruction filled instruction executed whether branch taken feature improve performance pipelined cpus absorbing time wasted cpu mispredicts operation conditional branch cpu pipeline stalls risc-v omits branch delay slot complicates multicycle cpus superscalar cpus long pipelines dynamic branch predictors succeeded well enough reduce need delayed branches risc-v segregates math minimal set integer instructions set add subtract shift bit-wise logic comparing-branches simulate risc-v instruction sets software atomic instructions notable exception risc-v currently lacks count leading zero bit-field operations normally used speed software floating-point pure-integer processor integer multiplication instructions set includes signed unsigned multiply divide double-precision integer multiplies divides included multiplies divides produce high word result isa document recommends implementors cpus compilers fuse standardized sequence high low multiply divide instructions one operation possible floating-point instructions set f includes single-precision arithmetic also comparison-branches similar integer arithmetic requires additional set 32 floating-point registers separate integer registers double-precision floating point instructions set generally assume floating-point registers 64-bit i.e. double-width f subset coordinated set quad-precision 128-bit floating-point isa q also defined risc-v computers without floating-point use floating-point software library risc-v cause exceptions arithmetic errors including overflow underflow subnormal divide zero instead integer floating-point arithmetic produce reasonable default values set status bits divide-by-zero discovered one branch division status bits tested operating system periodic interrupt risc-v supports computers share memory multiple cpus threads risc-v standard memory consistency model release consistency loads stores may generally reordered loads may designated acquire operations must precede later memory accesses stores may designated release operations must follow earlier memory accesses base instruction set includes minimal support form instruction enforce memory ordering although sufficient provides acquire provides release combined operations efficient atomic memory operation extension supports two types atomic memory operations release consistency first provides general purpose load-reserved store-conditional instructions performs load tries reserve address thread later store-conditional reserved address performed reservation broken intervening store another source store succeeds zero placed register failed non-zero value indicates software needs retry operation either case reservation released second group atomic instructions perform read-modify-write sequences load optionally load-acquire destination register operation loaded value source register store result may optionally store-release making memory barriers optional permits combining operations optional operations enabled acquire release bits present every atomic instruction risc-v defines nine possible operations swap use source register value directly add bitwise exclusive-or signed unsigned minimum maximum system design may optimize combined operations example destination register swap constant zero load may skipped value stored unmodified since load store may skipped ibm system/370 successors including z/architecture x86 implement compare-and-swap instruction tests conditionally updates location memory location contains expected old value replaces given new value returns indication whether made change however simple load-type instruction usually performed fetch old value classic problem thread reads loads value calculates new value c uses replace c way know whether concurrent activity another thread replaced value b restored algorithms e.g. ones values memory pointers dynamically allocated blocks aba problem lead incorrect results common solution employs double-wide instruction update pointer adjacent counter unfortunately instruction requires special instruction format specify multiple registers performs several reads writes complex bus operation alternative efficient usually requires one memory load minimizing slow memory operations desirable also exact controls accesses memory cell rather assuring bit pattern however unlike permit livelock two threads repeatedly cause instructions fail risc-v guarantees forward progress livelock code follows rules timing sequence instructions 1 must use subset 2 prevent repetitive cache misses code including retry loop must occupy 16 consecutive instructions 3 must include system fence instructions taken backward branches 4 backward branch retry loop must original sequence specification gives examples use subset lock data structure standard risc-v isa specifies instructions 32 bits makes particularly simple implementation like risc processors instruction encoding results larger code size instruction sets compensate risc-v 32-bit instructions actually 30 bits opcode space reserved optional recommended variable-length compressed instruction set rvc includes 16-bit instructions like arm thumb mips16 compressed instructions simply aliases subset larger instructions unlike arm thumb mips compressed set space reserved beginning separate operating mode standard compressed instructions may intermixed freely letter c like thumb-1 mips16 compressed instructions simply alternate encodings aliases selected subset larger instructions compression implemented assembler essential compiler even know prototype rvc tested 2011 prototype code 20 smaller x86 pc mips compressed code 2 larger arm thumb-2 code also substantially reduced needed cache memory estimated power use memory system researcher intended reduce code binary size small computers especially embedded computer systems prototype included 33 frequently used instructions recoded compact 16-bit formats using operation codes previously reserved compressed set compression done assembler changes compiler compressed instructions omitted fields often zero used small immediate values accessed subsets 16 8 registers common often compressible much difference size compared arm thumb set occurred risc-v prototype instructions save restore multiple registers instead compiler generated conventional instructions access stack prototype rvc assembler often converted compressed forms half size however still took code space arm instructions save restore multiple registers researcher proposed modify compiler call library routines save restore registers routines would tend remain code cache thus run fast though probably fast save-multiple instruction standard rvc requires occasional use 32-bit instructions several nonstandard rvc proposals complete requiring 32-bit instructions said higher densities standard rvc another proposal builds claims use less coding range well instruction set smallest embedded cpus set e reduced ways 16 32-bit integer registers supported floating-point instructions supported specification forbids uneconomical floating-point software library must used compressed set c recommended privileged instruction set supports machine mode user mode memory schemes use base-and-bound address relocation discussion occurred microcontroller profile risc-v ease development deeply embedded systems centers faster simple c-language support interrupts simplified security modes simplified posix application binary interface correspondents also proposed smaller non-standard 16-bit rv16e isas several serious proposal would use 16-bit c instructions 8 × 16-bit registers april fools joke proposed practical arrangement utilize 16 × 16-bit integer registers standard eimc isas including 32-bit instructions joke propose bank-switching registers 32-bit cpu would clearly superior risc-v isa includes separate privileged instruction set specification version 1.11 ratified foundation version 1.11 specification supports several types computer systems correspond roughly systems four rings privilege security machine hypervisor supervisor user layer also expected thin layer standardized supporting software communicates more-privileged layer hardware overall plan isa make hypervisor mode orthogonal user supervisor modes basic feature configuration bit either permits supervisor-level code access hypervisor registers causes interrupt accesses bit lets supervisor mode directly handle hardware needed hypervisor simplifies type 2 hypervisor hosted operating system popular mode run warehouse-scale computers support type 1 unhosted hypervisors bit cause accesses interrupt hypervisor bit simplifies nesting hypervisors hypervisor runs hypervisor also said simplify supervisor code letting kernel use hypervisor features kernel code result hypervisor form isa supports five modes machine supervisor user supervisor-under-hypervisor user-under-hypervisor privileged instruction set specification explicitly defines hardware threads harts multiple hardware threads common practice more-capable computers one thread stalled waiting memory others often proceed hardware threads help make better use large number registers execution units fast out-of-order cpus finally hardware threads simple powerful way handle interrupts saving restoring registers required simply executing different hardware thread however hardware thread required risc-v computer thread zero existing control status register definitions support risc-v error memory exceptions small number interrupts systems interrupts specification also defines interrupt controller interrupts always start highest-privileged machine level control registers level explicit forwarding bits route interrupts less-privileged code example hypervisor need include software executes interrupt forward interrupt operating system instead set-up set bits forward interrupt several memory systems supported specification physical-only suited simplest embedded systems also three unix-style virtual memory systems memory cached mass-storage systems virtual memory systems three sizes addresses sized 32 39 48-bits virtual memory systems support 4 kib pages multilevel page-table trees use similar algorithms walk page table trees designed either hardware software page-table walking optionally reduce cost page table walks super-sized pages may leaf pages higher levels system page table tree sv32 two layer page table tree supports 4 mib superpages sv39 three level page table supports 2 mib superpages 1 gib gigapages sv48 required support sv39 also 4-level page table supports 2 mib superpages 1 gib gigapages 512 gib terapages superpages aligned page boundaries next-lowest size page substantial work done produce preliminary though unapproved bit-manipulation b isa risc-v done well bit-manipulation subset aid cryptographic graphic mathematical operations criteria inclusion documented draft compliance rv5 philosophies isa formats substantial improvements code density speed i.e. least 3-for-1 reduction instructions substantial real-world applications including preexisting compiler support version 0.37 included uncontroversial instructions count leading zeros count one bits perform complement shift ones rotate generalized bit-reverse shuffle byte swaps bit extracts deposits bit-manipulation additions compressed set also includes controversial proposal bit-field extract place using nonstandard 48-bit instruction format simple cost-reduced risc-v systems proposal use floating-point registers bits perform parallel single instruction multiple data simd sub-word arithmetic widely used accelerate multimedia digital signal processing isa undefined could resemble pa-risc multimedia instructions multimedia acceleration extensions besides native 64-bit math pa-risc max2 cpu could arithmetic four 16-bit subwords several overflow methods also could move subwords different positions pa-risc max2 intentionally simplified lacked support 8-bit 32-bit subwords 16-bit subword size chosen support digital signal processing tasks instructions inexpensive design build however increased cpu performance digital signal processing tasks 48-fold enabling practical real-time video codecs 1995 proposed vector-processing instruction set may make packed simd set obsolete designers hope enough flexibility cpu implement vector instructions standard processor registers would enable minimal implementations similar performance multimedia isa however true vector coprocessor could execute code higher performance vector-processing proposal conservative flexible design general-purpose mixed-precision vector processor suitable execute compute kernels code would port easily cpus differing vector lengths ideally without recompiling contrast short-vector simd extensions less convenient used x86 arm pa-risc change word-width forces change instruction set expand vector registers case x86 64-bit mmx registers 128-bit streaming simd extensions sse 256-bit advanced vector extensions avx avx-512 result growing instruction set need port working code new instructions risc-v vector isa rather fix vector length architecture instruction available takes requested size sets vector length minimum hardware limit requested size risc-v proposal like cray long-vector design vector 32 vectors length application specifies total vector width requires processor determines vector length provide available on-chip resources takes form instruction four immediate operands specifying number vector registers available width needed total must addressable limit 32 may less application require vector length limited available on-chip storage divided number bytes storage needed entry added hardware limits may also exist turn may permit simd-style implementations outside vector loops application request zero-vector registers saving operating system work preserving context switches vector length architecturally variable designed vary run time also achieve flexibility instruction set likely use variable-width data paths variable-type operations using polymorphic overloading plan reduce size complexity isa compiler recent experimental vector processors variable-width data paths also show profitable increases operations per second speed area lower cost watt longer battery life unlike typical modern graphics processing unit plans provide special hardware support branch predication instead lower cost compiler-based predication used preliminary specification risc-v hardware-assisted debugger debugger use transport system joint test action group jtag universal serial bus usb access debug registers standard hardware debug interface may support either standardized abstract interface instruction feeding exact form abstract interface remains undefined proposals include memory mapped system standardized addresses registers debug devices command register data register accessible communication system correspondents claim similar systems used freescale background debug mode interface bdm cpus arm openrisc aeroflex leon instruction feeding cpu process debug exception execute individual instructions written register may supplemented data-passing register module directly access memory instruction feeding lets debugger access computer exactly software would also minimizes changes cpu adapts many types cpu said especially apt risc-v designed explicitly many types computers data-passing register allows debugger write data-movement loop ram execute loop move data computer speed near maximum speed debug system data channel correspondents say similar systems used mips technologies mips intel quark tensilica xtensa freescale power isa cpus background debug mode interface bdm
[ 5012, 7519, 5371, 3948, 7529, 3955, 7533, 5737, 7541, 2567, 2929, 5042, 7905, 7912, 4703, 4336, 1481, 5055, 2226, 2229, 1867, 7581, 5079, 771, 1134, 2248, 6489, 6148, 441, 7960, 804, 6177, 4047, 3365, 4408, 5483, 3014, 2659, 5487, 7990, ...
Test
1,557
9
Bigloo:bigloo bigloo programming language dialect language lisp implementation language scheme developed french research institute french institute research computer science automation inria oriented toward providing tools effective diverse code generation match performance hand-written c c++ bigloo system contains scheme compiler generate c code java virtual machine jvm .net framework .net bytecode lisp dialects contains interpreter also termed read-eval-print loop repl free open-source software run-time system libraries released gnu lesser general public license lgpl compiler programming tools released gnu general public license gpl bigloo scheme implementation devoted one goal enabling scheme based programming style c ++ usually required hop web application engine roadsend php written bigloo bigloo-lib project contains modules
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 2226, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 6507, 795, 6876, 4759, 6888, 5494, 5501, 6210, 144, 4074, 4085, 7298, 5515, 8025, 3749, 5883, 1989, 6949, 6955, ...
Test
1,558
4
SquidGuard:squidguard squidguard url redirector software used content control websites users access written plug-in squid uses blacklists define sites access redirected squidguard must installed unix linux computer server computer software filtering extends computers organization including windows macintosh computers originally developed pål baltzersen lars erik håland implemented extended lars erik håland 1990s tele danmark internordia version 1.4 current stable version released 2009 version 1.5 development 2010 new features version 1.4 included optional authentication via mysql database squidguard free software licensed gnu general public license gpl version 2 included many linux distributions including debian opensuse ubuntu url filtering capabilities squidguard depend largely quality blacklists used several options available free lists found shallalist.de université toulouse 1 capitole commercial lists found squidblacklist.org
[ 4759, 5571, 578, 3794 ]
Train
1,559
4
OpenVPN:openvpn openvpn open-source commercial software implements virtual private network vpn techniques create secure point-to-point site-to-site connections routed bridged configurations remote access facilities uses custom security protocol utilizes ssl/tls key exchange capable traversing network address translators nats firewalls written james yonan published gnu general public license gpl openvpn allows peers authenticate using pre-shared secret keys certificates username/password used multiclient-server configuration allows server release authentication certificate every client using signatures certificate authority uses openssl encryption library extensively well tls protocol contains many security control features openvpn ported embedded several systems example dd-wrt openvpn server function softether vpn multi-protocol vpn server implementation openvpn protocol openvpn uses openssl library provide encryption data control channels lets openssl encryption authentication work allowing openvpn use ciphers available openssl package also use hmac packet authentication feature add additional layer security connection referred hmac firewall creator also use hardware acceleration get better encryption performance support mbed tls available starting version 2.3 openvpn several ways authenticate peers openvpn offers pre-shared keys certificate-based username/password-based authentication preshared secret key easiest certificate-based robust feature-rich version 2.0 username/password authentications enabled without certificates however make use username/password authentications openvpn depends third-party modules openvpn run user datagram protocol udp transmission control protocol tcp transports multiplexing created ssl tunnels single tcp/udp port rfc 3948 udp 2.3.x series openvpn fully supports ipv6 protocol virtual network inside tunnel openvpn applications also establish connections via ipv6 ability work proxy servers including http good working network address translation nat getting firewalls server configuration ability push certain network configuration options clients include ip addresses routing commands connection options openvpn offers two types interfaces networking via universal tun/tap driver create either based ip tunnel tun based ethernet tap carry type ethernet traffic openvpn optionally use lzo compression library compress data stream port 1194 official iana assigned port number openvpn newer versions program default port feature 2.0 version allows one process manage several simultaneous tunnels opposed original one tunnel per process restriction 1.x series openvpn use common network protocols tcp udp makes desirable alternative ipsec situations isp may block specific vpn protocols order force users subscribe higher-priced business grade service tier openvpn uses transmission control protocol tcp transports establish tunnel performance acceptable long sufficient excess bandwidth un-tunneled network link guarantee tunneled tcp timers expire becomes untrue performance falls dramatically known tcp meltdown problem openvpn offers various internal security features 256-bit encryption openssl library although service providers may offer lower rates effectively providing fastest vpn available consumers runs userspace instead requiring ip stack therefore kernel operation openvpn ability drop root privileges use mlockall prevent swapping sensitive data disk enter chroot jail initialization apply selinux context initialization openvpn runs custom security protocol based ssl tls rather support ike ipsec l2tp pptp openvpn offers support smart cards via pkcs 11-based cryptographic tokens openvpn extended third-party plug-ins scripts called defined entry points purpose often extend openvpn advanced logging enhanced authentication username passwords dynamic firewall updates radius integration plug-ins dynamically loadable modules usually written c scripts interface execute scripts binaries available openvpn openvpn source code examples plug-ins including pam authentication plug-in several third-party plug-ins also exist authenticate ldap sql databases sqlite mysql available solaris linux openbsd freebsd netbsd qnx macos windows xp later openvpn available mobile phone operating systems os including maemo windows mobile 6.5 ios 3gs+ devices jailbroken ios 3.1.2+ devices android 4.0+ devices android devices cyanogenmod aftermarket firmware flashed correct kernel module installed compatible mobile phone oses including palm os web-based vpn shown web page citrix terminal services web access program installed independently configured editing text files manually rather gui-based wizard openvpn compatible vpn clients use ipsec l2tp pptp protocols entire package consists one binary client server connections optional configuration file one key files depending authentication method used openvpn integrated several router firmware packages allowing users run openvpn client server mode network routers router running openvpn client mode example allows device network access vpn without needing capability install openvpn notable firmware packages openvpn integration include openvpn implemented manufacturer router firmware d-link dsr-250 mikrotik routers mikrotik implementation support udp protocol lzo compression limits transfer speeds attainable mikrotik said 2010 would continue developing openvpn favor secure socket tunneling protocol sstp openvpn integrated softether vpn open-source multi-protocol vpn server allow users connect vpn server existing openvpn clients openvpn also integrated vyos open-source routing os forked vyatta software router openvpn available two versions
[ 363, 2543, 6795, 2566, 6458, 753, 5773, 7581, 6487, 4014, 4746, 3350, 5808, 6879, 1168, 5814, 2644, 7637, 5486, 5488, 2664, 7275, 8008, 5157, 1989, 2356, 3756, 1261, 6984, 571, 578, 3794, 1663, 4162, 3172, 7806, 994, 3863, 4601, 6025, 7...
Test
1,560
4
Mayfield's_paradox:mayfield paradox mayfield paradox states keep everyone information system requires infinite amount money get everyone onto information system also requires infinite money costs extremes relatively low paradox depicted u-curve cost system vertical axis percentage humanity access system horizontal axis acceptance paradox information security community immediate consistent professional experiences group mayfield paradox points point curve additional security becomes unrealistically expensive conversely point curve becomes unrealistically expensive add additional users based paradox menz brothers developed menz theorems information physical security theorems present two formulas covering access security information systems physical facilities used help determine allocation resources response levels
[]
Test
1,561
6
Aufs:aufs aufs short advanced multi-layered unification filesystem implements union mount linux file systems name originally stood anotherunionfs version 2 developed junjiro okajima 2006 aufs complete rewrite earlier unionfs aimed improve reliability performance also introduced new concepts like writable branch balancing improvements – implemented unionfs 2.x branch aufs rejected merging mainline linux code criticized dense unreadable uncommented instead overlayfs merged linux kernel several attempts merge aufs mainline kernel author given aufs included debian jessie ubuntu 16.04 box debian stretch include aufs anymore provides package aufs-dkms auto-compiles aufs kernel module using dell dkms docker originally used aufs container filesystem layers still available one supported storage backends several linux distributions chosen aufs replacement unionfs including
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 3996, 6854, 5437, 4375, 6500, 788, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 828, 5130, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 6244...
Test
1,562
2
Apple_Configurator:apple configurator apple configurator application developed apple inc. available free download mac app store first launched march 2012 replaces iphone configuration utility application allows mass-configuration ios devices iphone ipad business educational organizations provides remote management administrator help set maintain standard configuration software across number devices
[ 6788, 3940, 713, 4690, 734, 405, 6832, 3989, 2597, 3322, 1502, 5786, 4740, 1897, 6505, 2627, 7609, 1171, 5109, 2284, 1178, 6188, 1187, 6909, 6548, 502, 6557, 2679, 6565, 2329, 3050, 163, 6582, 5535, 5191, 8051, 7335, 3445, 569, 5571, 70...
Test
1,563
9
GNU_cflow:gnu cflow gnu cflow flow graph generator part gnu project reads collection c source files generates c flow graph external references uses sources n't need run program initially implementation unix utility cflow cflow unix command generating c-language flowgraph besides gnu implementations cflow like one tru64 unix
[ 1523, 8158, 3174, 1351, 2559, 5571, 1011, 3868, 578, 6365, 7463, 7559, 3981, 4070, 2599, 1406, 4447, 6674, 5787, 966, 1435 ]
Test
1,564
2
Infinispan:infinispan infinispan distributed cache key-value nosql data store software developed red hat java applications embed library use service wildfly non-java applications use remote service tcp/ip infinispan successor jboss cache project announced 2009 typical use-cases infinispan include infinispan also used academia research framework distributed execution storage
[ 1640, 4384, 957, 3391, 7499, 6586, 7924, 1989, 2054, 6362, 3542, 3873 ]
Test
1,565
2
Tizen_Association:tizen association tizen association formerly limo linux mobile foundation non-profit technology consortium organization dedicated creating tizen first truly open hardware-independent linux-based mobile operating system smartphone mobile devices mission limo foundation create open linux-based software platform use industry produce mobile devices balanced transparent contribution process enabling ecosystem differentiated products applications services governance open transparent leadership decision making shared founding members motorola nec ntt docomo panasonic mobile communications samsung electronics vodafone work result limo platform work integrated mobile phone products nec panasonic samsung later combined tizen platform members tizen association phones using limo include end september 2011 announced linux foundation meego totally replaced tizen mobile operating system project 2012 tizen new free open source linux-based operating-system released first quarter 2012 intel samsung collaboration limo foundation assisting meego developers pointed lead development new software platform using third-party developer frameworks primarily built html5 web standards october 2012 limo website traffic redirected tizen.org
[ 5822, 7956, 5486, 4147, 1582, 6422, 578, 2240, 740, 7189 ]
Test
1,566
4
Sanctum_(company):sanctum company sanctum santa clara california-based information technology company focused application security sanctum credited inventing application security space mid-'90s firewall appshield scanner appscan foresaw need better application-layer security web environments 2003 sanctum merged watchfire company subsequently acquired ibm sanctum founded 1997 perfecto technologies eran reshef gili raanan company released first product appshield summer 1999 company done extensive research application security applying formal methods real life software collaboration turing award winner professor amir penueli early research 1996 1997 led invention parallel teams captcha technology application us patent captcha 2000 company renamed sanctum company backed investors sequoia capital intel capital goldman sachs dlj walden mofet appshield product first product inspect incoming hypertext transfer protocol requests block malicious attacks based dynamic policy composed analyzing outgoing html pages later june 2000 company introduced appscan world first web security vulnerability assessment solution among first clients appscan yahoo bank america
[ 3932, 2789, 230, 1919, 3383, 6092 ]
Test
1,567
4
Ingress_filtering:ingress filtering computer networking ingress filtering technique used ensure incoming packets actually networks claim originate used countermeasure various spoofing attacks attacker packets contain fake ip addresses make difficult find source attack technique often used denial-of-service attack primary target ingress filtering networks receive packets networks normally packet contain ip address computer originally sent allows devices receiving network know came allowing reply routed back amongst things except ip addresses used proxy spoofed ip address pinpoint specific user within pool users sender ip address faked 'spoofed characterising spoofing attack disguises origin packets sent example denial-of-service attack holds true proxies although different manner ip spoofing one potential solution involves implementing use intermediate internet gateways i.e. servers connecting disparate networks along path followed given packet filtering denying packet deemed illegitimate gateway processing packet might simply ignore packet completely possible might send packet back sender relaying message illegitimate packet denied host intrusion prevention systems hips one example technical engineering applications help identify prevent and/or deter unwanted unsuspected and/or suspicious events intrusions router implements ingress filtering checks source ip field ip packets receives drops packets packets n't ip address ip address block interface connected may possible end host multi-homed also sends transit network traffic ingress filtering packets coming network filtered network sending send packets originating ip address es end host stub network host router needs filter ip packets source ip private addresses rfc 1918 bogon addresses addresses network address interface network ingress filtering packet filtering technique used many internet service providers try prevent source address spoofing internet traffic thus indirectly combat various types net abuse making internet traffic traceable source network ingress filtering good neighbor policy relies cooperation isps mutual benefit best current practices network ingress filtering documented internet engineering task force bcp 38 bcp 84 defined rfc 2827 rfc 3704 respectively bcp 84 recommends upstream providers ip connectivity filter packets entering networks downstream customers discard packets source address allocated customer many possible ways implementing policy one common mechanism enable reverse path forwarding links customers indirectly apply policy based provider route filtering customers route announcements 2012 one report suggests contrary general opinion lack bcp 38 deployment 80 internet various measures already applying anti-spoofing packet filtering networks
[ 2944, 1691, 3175, 3117 ]
Validation
1,568
3
Control_unit:control unit control unit cu component computer central processing unit cpu directs operation processor tells computer memory arithmetic logic unit input output devices respond instructions sent processor directs operation units providing timing control signals computer resources managed cu directs flow data cpu devices john von neumann included control unit part von neumann architecture modern computer designs control unit typically internal part cpu overall role operation unchanged since introduction control unit cu digital circuitry contained within processor coordinates sequence data movements processor many sub-units result routed data movements various digital circuits sub-units within processor produces manipulated data expected software instruction loaded earlier likely memory controls conducts data flow inside processor additionally provides several external control signals rest computer direct data instructions to/from processor external destinations i.e memory examples devices require cu cpus graphics processing units gpus cu receives external instructions commands converts sequence control signals cu applies data path implement sequence register-transfer level operations precisely control unit cu generally sizable collection complex digital circuitry interconnecting directing many execution units i.e alu data buffers registers contained within cpu cu normally first cpu unit accept externally stored computer program single instruction based cpu instruction set cu decodes individual instruction several sequential steps fetching addresses/data registers/memory managing execution i.e data sent alu i/o storing resulting data back registers/memory controls coordinates cpu inner works properly manipulate data design sequential steps based needs instruction range number steps order execution units enabled thus using program set instructions memory cu configure cpu data flows needed manipulate data correctly instructions results computer could run complete program require human intervention make hardware changes instructions done using punch cards computations stored programmed computers cus invented detailed steps cu dictate cpu interconnecting hardware control signals enable/disable cpu units selected/de-selected unit proper order execution required instruction operation produce desired manipulated data additionally cu orderly hardware coordination properly sequences control signals configures many hardware units comprising cpu directing data also moved changed stored outside cpu i.e memory according instruction objective depending type instruction entering cu order number sequential steps produced cu could vary selection configuration parts cpu hardware utilized achieve instruction objective mainly moving storing modifying data within cpu one feature efficiently uses software instructions control/select/configure computer cpu hardware via cu eventually manipulates program data significant reason modern computers flexible universal running various programs compared 1930s 1940s computers without proper cu often required rewiring hardware changing programs cu instruction decode process repeated program counter incremented next stored program address new instruction enters cu address programs end advanced forms control units manage translation instructions data containing portion several micro-instructions cu manages scheduling micro-instructions selected execution units data channeled changed according execution unit function i.e. alu contains several functions processors control unit may broken additional units instruction unit scheduling unit handle scheduling retirement unit deal results coming instruction pipeline control unit orchestrates main functions cpu carrying stored instructions software program directing flow data throughout computer based upon instructions roughly likened traffic lights systematically control flow cars containing data different locations within traffic grid cpu parks desired parking spot memory address/register car occupants data go building execution unit come back changed way get back car return another location via controlled traffic grid hardwired control units implemented use combinational logic units featuring finite number gates generate specific results based instructions used invoke responses hardwired control units generally faster microprogrammed designs design uses fixed architecture—it requires changes wiring instruction set modified changed architecture preferred reduced instruction set computers risc use simpler instruction set controller uses approach operate high speed however little flexibility complexity instruction set implement limited hardwired approach become less popular computers evolved previously control units cpus used ad-hoc logic difficult design idea microprogramming introduced maurice wilkes 1951 intermediate level execute computer program instructions microprograms organized sequence microinstructions stored special control memory algorithm microprogram control unit unlike hardwired control unit usually specified flowchart description main advantage microprogram control unit simplicity structure outputs controller organized microinstructions easily replaced
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 1867, 2248, 6148, 2266, 4047, 5483, 1556, 5487, 6198, 1570, 1207, 6922, 7666, 515, 8024, 5521, 3747, 1237, 7314, 1252, 1254, 4847, 4479, 8066, 2012, 1640, 4864, 216, ...
Test
1,569
9
VisSim:vissim vissim visual block diagram program simulation dynamical systems model based design embedded systems visual language developed visual solutions westford massachusetts visual solutions acquired altair august 2015 products rebranded solidthinking embed part solidthinking model based development suite solidthinking embed develop virtual prototypes dynamic systems models built sliding blocks work area wiring together mouse embed automatically converts control diagrams c-code ready downloaded target hardware vissim solidthinking embed uses graphical data flow paradigm implement dynamic systems based differential equations version 8 adds interactive uml omg 2 compliant state chart graphs placed vissim diagrams allows modeling state based systems startup sequencing process plants serial protocol decoding vissim/solidthinking embed used control system design digital signal processing multidomain simulation design includes blocks arithmetic boolean transcendental functions well digital filters transfer functions numerical integration interactive plotting commonly modeled systems aeronautical biological/medical digital power electric motor electrical hydraulic mechanical process thermal/hvac econometric read-only version software vissim viewer available free charge provides way people licensed use vissim run vissim models program intended allow models widely shared preserving model published form viewer execute vissim model allows changes block simulation parameters illustrate different design scenarios sliders buttons may activated included model vissim/c-code add-on generates ansi c code model generates target specific code on-chip devices like pwm adc encoder gpio i2c etc useful development embedded systems behavior controller simulated c-code generated compiled run target debugging vissim supports interactive jtag linkage called hotlink allows interactive gain change plotting on-target variables vissim generated code called efficient readable making well suited development embedded systems vissim author served x3j11 ansi c committee wrote several c compilers addition co-authoring book c. deep understanding ansi c nature resulting machine code compiled key code generator efficiency vissim target small 16-bit fixed point systems like texas instruments msp430 using 740 bytes flash 64 bytes ram small closed-loop pulse-width modulation pwm actuated system well allowing high control sample rates 500 khz larger 32-bit floating point processors like texas instruments 150 mhz f28335 technique simulating system performance off-line generating code simulation known model-based development model-based development embedded systems becoming widely adopted production systems shortens development cycles hardware development way model-driven architecture shortens production cycles software development model building visual way describing situation engineering context instead writing solving system equations model building involves using visual blocks solve problem advantage using models cases problems appear difficult expressed mathematically may easier understand represented pictorially vissim uses hierarchical composition create nested block diagrams typical model would consist virtual plants composed various vissim layers combined necessary custom blocks written c fortran virtual controller added tuned give desired overall system response graphical control element sliders buttons allow control what-if analysis operator training controller tuning although vissim originally designed use control engineers used type mathematical model
[ 6507, 1908, 5098, 3606, 2820, 4033, 3619, 5288, 5117, 3365, 6356, 5571, 1435, 4872, 4705, 4067, 3981, 4070, 5190, 7860, 3410, 256, 4999, 1336 ]
Validation
1,570
3
Control_store:control store control store part cpu control unit stores cpu microprogram usually accessed microsequencer early types control store took form diode-arrays accessed via address decoders later implemented writable microcode stored form read-only memory called writable control store outputs generally go register prevent race condition occurring register clocked clock signal system running early control stores implemented diode-array accessed via address decoders form read-only memory tradition dates back program timing matrix mit whirlwind first described 1947 modern vlsi processors instead use matrices field-effect transistors build rom and/or pla structures used control processor well internal sequencer microcoded implementation ibm system/360 used variety techniques ccros card capacitor read-only storage model 30 tros transformer read-only storage model 40 bcros balanced capacitor read-only storage model 50 computers built using writable microcode — rather storing microcode rom hard-wired logic microcode stored ram called writable control store wcs computer sometimes called writable instruction set computer wisc many machines experimental laboratory prototypes wisc cpu/16 rtx 32p original system/360 models ibm mainframe read-only control store later system/360 system/370 successor models loaded part microprograms floppy disks dasd writable control store consisting ultra-high speed random-access read-write memory system/370 architecture included facility called initial-microprogram load iml impl could invoked console part power reset por another processor tightly coupled multiprocessor complex permitted ibm easily repair microprogramming defects field even majority control store stored rom computer vendors would often sell writable control store option allowing customers customize machine microprogram vendors e.g. ibm use wcs run microcode emulator features hardware diagnostics commercial machines used writable microcode include burroughs small systems 1970s 1980s xerox processors lisp machines xerox star workstations dec vax 8800 nautilus family symbolics l- g-machines 1980s dec pdp-10 machines stored microcode sram chips 80 bits wide x 2 kwords typically loaded power-on front-end cpu many machines offered user-programmable writable control stores option including hp 2100 dec pdp-11/60 varian data machines v-70 series minicomputers mentec m11 mentec m1 stored microcode sram chips loaded power-on another cpu data general eclipse mv/8000 eagle sram writable control store loaded power-on another cpu wcs offered several advantages including ease patching microprogram certain hardware generations faster access roms could provide user-programmable wcs allowed user optimize machine specific purposes cpu designs compile instruction set writable ram flash inside cpu rekursiv processor imsys cjip fpga reconfigurable computing several intel cpus x86 architecture family writable microcode starting pentium pro 1995 allowed bugs intel core 2 microcode intel xeon microcode fixed software rather requiring entire chip replaced fixes installed linux freebsd microsoft windows motherboard bios control store usually register outputs outputs go back sequencer determine next address go sort register prevent creation race condition designs bits also go register machine work faster execution next microinstruction delayed one cycle register known pipeline register often execution next microinstruction dependent result current microinstruction stable end current microcycle seen either way outputs control store go one big register historically used possible buy eproms register bits chip clock signal determining clock rate cycle time system primarily clocks register
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 4318, 2567, 4694, 5042, 1481, 5055, 1867, 2248, 6148, 2266, 4047, 5483, 1556, 5487, 6198, 1568, 6922, 7666, 515, 8024, 5521, 3747, 1237, 7314, 1252, 1254, 7331, 4847, 4479, 8066, 5911, 1640, 4864,...
Validation
1,571
2
Windows_Genuine_Advantage:windows genuine advantage windows genuine advantage wga anti-infringement system created microsoft enforces online validation licensing several microsoft windows operating systems accessing several services windows update downloading windows components microsoft download center windows 7 wga renamed windows activation technologies wga consists two components installable component called wga notifications hooks winlogon validates windows license upon logon activex control checks validity windows license downloading certain updates microsoft download center windows update wga notifications covers windows xp later exception windows server 2003 windows xp professional x64 edition activex control checks windows 2000 professional licenses well wga also advertises latest service pack service pack 3 windows xp requires manual intervention disable previously voluntary became mandatory use services july 2005 despite name actually evaluate integrity security computer wga validation process validates present installation windows license key detected computer hardware determines software licensed microsoft accessible either stand-alone program netscape-compatible web browser plug-in activex control within internet explorer latter relevant attempt access microsoft updates via browser includes following steps activex control downloaded first validation new version available validation performed time user connects microsoft website update windows vista without service packs wga validation failure greater impact addition persistent notification disabling non-critical updates wga also disables windows aero windows defender windows readyboost user given grace period pass validation operating system disabled windows reverts reduced functionality mode behavior however removed service pack 1 windows vista favor prominent notices systems believed unlicensed user installs windows genuine advantage internet explorer add-on installed labeled windows genuine advantage early releases tool could readily disabled ie add-on management feature windows group policy added later updates causing option unavailable default still accessible policy removed july 2006 latest update blocks management means program uses either stand-alone program generate key activex control discover whether license key valid either way internet connection required windows xp wga determines user copy windows unauthorized installed seemingly legitimate media i.e. cd/dvd holographic emblem present real copies windows seems genuine microsoft supply user new cd/dvd however newer versions windows still require user purchase new copy microsoft also offers discounts people want purchase legitimate copy windows valid cd microsoft indicated continue deliver critical security updates automatic updates service well via microsoft download center systems including fail pass validation still continue receive critical security updates company made installation windows genuine advantage requirement use windows update microsoft update websites part sure customers use support resources company aware software unlicensed according microsoft legal run microsoft windows without windows genuine advantage however since non-critical windows updates presented automatic updates installation wga required installation non-critical updates available windows update microsoft download center april 25 2006 microsoft began distributing windows genuine advantage notifications critical update kb905474 windows users windows 7 kb971033 function back 2006 users copies wga believed unlicensed exposed alerts startup login use windows os stating genuine copy windows users legitimate copies supposed see alerts although anyway may 23 2006 microsoft updated program closing forms circumvention reportedly updated may 30 june 6 june 27 2006 though forms circumvention still usable latest versions roll worldwide time dates given earliest dates versions appeared actual version offered places earlier version latest release still possible opt receiving update using show option windows update site windows xp hide option right-click menu windows update control panel windows vista/7/8 addition notifications windows genuine advantage also notify users message version windows xp longer secure users xp operating system using service pack 3 provide link help users update systems new service pack version windows genuine advantage notifications released november 29 2006 changed install process inform user program also set automatically update newer versions windows genuine advantage notifications also informs users may non-genuine version windows windows version n't reported genuine however unlike previous releases started automatically delivered windows machines using four widely distributed product keys latest update version 1.9.0040.0 released march 24 2009 microsoft includes windows genuine advantage validation library several products windows validation tool windows media player 11 check validation windows software version 7 internet explorer longer requires user pass windows genuine advantage test order download install software wga validation library also included microsoft security essentials 2.0 validate windows installation whether legitimate program stop working 30 days failed validation process information used wga library check overuse license keys september 2005 microsoft filed lawsuits number companies sold unauthorized copies software based information users told copyright infringing software windows genuine advantage application may 4 2006 microsoft announced lawsuits allegedly distributing unauthorized copies windows edirectsoftware montana chicago-area resellers nathan ballog easy computers personal firewalls though one embedded windows may alert method wgatray.exe started case outpost firewall identified hidden process wgatray.exe process firewall blocked without apparent problems tool released firewall vendor prevent wga notifications transmitting information one pc windows genuine advantage microsoft collects following data october 20 2008 many users windows xp china received black desktop microsoft introduced wga system chinese language systems effort combat copyright violation extremely common china since majority users china run unlicensed copy windows many users experienced described black screen syndrome operating system changes desktop background black screen well displays constant warning messages users even reported disabling office programs microsoft word powerpoint outlook according various polls carried chinese portals sohu.com qq.com 21cn.com many others large number 60 surveyed chinese internet users hostile microsoft windows genuine advantage wga office genuine advantage oga even wga really make program unusable updates except critical ones downloaded microsoft rather disallowing updating windows vista originally ran reduced-functionality mode found wga compromised made people compare wga time bomb software windows vista sp2 removed behavior reverted nag-only methods windows xp notification tool accused spyware-like behavior phoning home daily basis microsoft subsequently admitted behaviour denied amounted spyware following pressure microsoft announced future tool would phone home every two weeks instead every day microsoft also provided removal instructions pilot version wga despite microsoft sued anti-spyware statutes wga non-disclosed phone home behaviour lawsuit since dismissed wga program produce false positives incorrectly identifying genuine copy windows genuine happen number reasons failed updates etc microsoft established forum help users encountering problems february 2007 sure section added program case incorrect reading according ars technica editorial wga reported around 22 500 million windows computers failing test less 0.5 due unauthorized software balance 20 90 positives related edge cases microsoft refused comment rate pure false positives beyond saying 1 stated around 5 million users affected june 18 2007 news surfaced possible positively validate genuine microsoft product user result able download certain software microsoft official website using internet explorer ies4linux wine running linux without even windows-family system installed october 5 2006 wga failure occurred incorrectly flagging systems non-genuine august 25 2007 microsoft wga servers suffered outage resulting many legitimate copies windows xp vista marked counterfeit issue solved 12 hours later according microsoft fewer 12,000 systems affected worldwide july 18 2008 reports microsoft wga oga servers offline surfaced microsoft later responded offline verification temporarily
[ 3937, 3263, 378, 2198, 6096, 6107, 1475, 7553, 5410, 7564, 422, 6844, 6135, 1128, 2245, 435, 5442, 5090, 3340, 7602, 5805, 6164, 4759, 1534, 6885, 7619, 2999, 6528, 2290, 4774, 1181, 3711, 140, 6558, 4811, 6575, 3407, 3057, 1597, 2345, ...
Test
1,572
2
Tmux:tmux tmux terminal multiplexer unix-like operating systems allows multiple terminal sessions accessed simultaneously single window useful running one command-line program time also used detach processes controlling terminals allowing ssh sessions remain active without visible tmux includes features gnu screen allows users start terminal session clients bound specific physical virtual console multiple terminal sessions created within single terminal session freely rebound one virtual console another session several connected clients tmux notable features tmux included openbsd available package many unix-like operating systems
[ 361, 6414, 2817, 366, 2001, 2453, 6789, 191, 1537, 5373, 6085, 5480, 3106, 5571, 6630, 923, 5138, 667, 1394, 5946, 2589, 3559, 7752, 3572, 4990, 1133, 7214, 2883, 7765, 6242, 3417, 6404, 1245, 4283, 1435, 4020 ]
Test
1,573
0
Word_lists_by_frequency:word lists frequency word lists frequency lists language words grouped frequency occurrence within given text corpus either levels ranked list serving purpose vocabulary acquisition word list frequency provides rational basis making sure learners get best return vocabulary learning effort mainly intended course writers directly learners frequency lists also made lexicographical purposes serving sort checklist ensure common words left major pitfalls corpus content corpus register definition word word counting thousand years old still gigantic analysis done hand mid-20th century natural language electronic processing large corpora movie subtitles subtlex megastudy accelerated research field computational linguistics frequency list sorted list words word types together frequency frequency usually means number occurrences given corpus rank derived position list nation noted incredible help provided computing capabilities making corpus analysis much easier cited several key issues influence construction frequency lists currently available studies based written text corpus easily available easy process however proposed tap large number subtitles available online analyse large numbers speeches made long critical evaluation traditional textual analysis approach support move written corpus toward oral corpuses analysis thanks open film subtitles available online recently followed handful follow-up studies providing valuable frequency count analysis various languages indeed subtlex movement completed five years full studies french american english dutch chinese spanish greek vietnamese brazil portuguese portugal portuguese 2015 albanian polish subtlex-it 2015 provides raw data case basic word unit defined latin scripts words usually one several characters separated either spaces punctuation exceptions arise english ca n't french aujourd'hui idioms may also preferable group words word family representation base word thus possible impossible possibility words word family represented base word *possib* statistical purpose words summed base word form *possib* allowing ranking concept form occurrence moreover languages may present specific difficulties case chinese use spaces words specified chain several characters interpreted either phrase unique-character words multi-character word seems zipf law holds frequency lists drawn longer texts natural language frequency lists useful tool building electronic dictionary prerequisite wide range applications computational linguistics german linguists define häufigkeitsklasse frequency class formula_1 item list using base 2 logarithm ratio frequency frequency frequent item common item belongs frequency class 0 zero item approximately half frequent belongs class 1 example list misspelled word outragious ratio 76/3789654 belongs class 16. formula_3 floor function frequency lists together semantic networks used identify least common specialized terms replaced hypernyms process semantic compression lists intended given directly students rather serve guideline teachers textbook authors paul nation modern language teaching summary encourages first move high frequency vocabulary special purposes thematic vocabulary low frequency vocabulary teach learners strategies sustain autonomous vocabulary expansion word frequency known various effects memorization positively affected higher word frequency likely learner subject exposures lexical access positively influenced high word frequency phenomenon called word frequency effect effect word frequency related effect age-of-acquisition age word learned review available resources word counting dates back hellenistic time thorndike lorge assisted colleagues counted 18,000,000 running words provide first large scale frequency list 1944 modern computers made projects far easier suffer age particular words relating technology blog 2014 7665 frequency corpus contemporary american english first attested 1999 appear three lists twb contains 30,000 lemmas ~13,000 word families goulden nation read 1990 corpus 18 million written words hand analysed size source corpus increased usefulness age language changes reduced applicability gsl contains 2,000 headwords divided two sets 1,000 words corpus 5 million written words analyzed 1940s rate occurrence different meanings parts speech headword provided various criteria frequence range carefully applied corpus thus despite age errors corpus entirely written text still excellent database word frequency frequency meanings reduction noise list updated 2013 dr. charles browne dr. brent culligan joseph phillips new general service list corpus 5 million running words written texts used united states schools various grades various subject areas value focus school teaching materials tagging words frequency word school grade subject areas contain 1 million words written corpus representing different dialects english sources used produce frequency lists review made attempt made 1950s–60s includes f.f.1 list 1,500 high-frequency words completed later f.f.2 list 1,700 mid-frequency words used syntax rules claimed 70 grammatical words constitute 50 communicatives sentence 3,680 words make 95~98 coverage list 3,000 frequent words available french ministry education also provide ranked list 1,500 frequent word families provided lexicologue étienne brunet jean baudot made study model american brown study entitled fréquences d'utilisation des mots en français écrit contemporain recently project lexique3 provides 142,000 french words orthography phonetic syllabation part speech gender number occurrence source corpus frequency rank associated lexemes etc. available open license cc-by-sa-4.0 lexique3 continuous study originate subtlex movement cited made completely new counting based online film subtitles several studies spanish word frequency chinese corpuses long studied perspective frequency lists historical way learn chinese vocabulary based characters frequency american sinologist john defrancis mentioned importance chinese foreign language learning teaching johnny ca n't read chinese frequency toolkit da taiwanese ministry education provided large databases frequency ranks characters words hsk list 8,848 high medium frequency words people republic china republic china taiwan top list 8,600 common traditional chinese words two lists displaying common chinese words characters following subtlex movement recently made rich study chinese word character frequencies frequently used words different languages based wikipedia combined corpora 100 frequently used french words example sentences based www.opensubtitles.org
[ 1314, 5429, 2611, 5304 ]
Test
1,574
2
Atlas_Supervisor:atlas supervisor atlas supervisor program managed allocation processing resources manchester university atlas computer machine able act many tasks user programs concurrently various functions included running atlas computer virtual memory atlas supervisor paper section 3 store organisation ‘ considered many first recognisable modern operating system ’ brinch hansen described significant breakthrough history operating systems
[ 1522, 7325, 7605, 280, 2818, 4759, 190, 4670, 5021, 8066, 8167, 4397, 13, 5644, 3271, 5116, 6984, 299, 3626, 7142, 391, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 1992, 405, 6367, 6922, 8115, 5161, 5865, 7396, 65, 861, 5962, ...
Test
1,575
2
Page_replacement_algorithm:page replacement algorithm computer operating system uses paging virtual memory management page replacement algorithms decide memory pages page sometimes called swap write disk page memory needs allocated page replacement happens requested page memory page fault free page used satisfy allocation either none number free pages lower threshold page selected replacement paged referenced paged read disk involves waiting i/o completion determines quality page replacement algorithm less time waiting page-ins better algorithm page replacement algorithm looks limited information accesses pages provided hardware tries guess pages replaced minimize total number page misses balancing costs primary storage processor time algorithm page replacing problem typical online problem competitive analysis perspective sense optimal deterministic algorithm known page replacement algorithms hot topic research debate 1960s 1970s mostly ended development sophisticated lru least recently used approximations working set algorithms since basic assumptions made traditional page replacement algorithms invalidated resulting revival research particular following trends behavior underlying hardware user-level software affected performance page replacement algorithms requirements page replacement algorithms changed due differences operating system kernel architectures particular modern os kernels unified virtual memory file system caches requiring page replacement algorithm select page among pages user program virtual address spaces cached files latter pages specific properties example locked write ordering requirements imposed journaling moreover goal page replacement minimize total time waiting memory take account memory requirements imposed kernel sub-systems allocate memory result page replacement modern kernels linux freebsd solaris tends work level general purpose kernel memory allocator rather higher level virtual memory subsystem replacement algorithms local global process incurs page fault local page replacement algorithm selects replacement page belongs process group processes sharing memory partition global replacement algorithm free select page memory local page replacement assumes form memory partitioning determines many pages assigned given process group processes popular forms partitioning fixed partitioning balanced set algorithms based working set model advantage local page replacement scalability process handle page faults independently leading consistent performance process however global page replacement efficient overall system basis replacement algorithms simply return target page result means target page dirty contains data written stable storage page reclaimed i/o initiated send page stable storage clean page early days virtual memory time spent cleaning much concern virtual memory first implemented systems full duplex channels stable storage cleaning customarily overlapped paging contemporary commodity hardware hand support full duplex transfers cleaning target pages becomes issue deal situation various precleaning policies implemented precleaning mechanism starts i/o dirty pages likely replaced soon idea time precleaned page actually selected replacement i/o complete page clean precleaning assumes possible identify pages replaced next precleaning eager waste i/o bandwidth writing pages manage get re-dirtied selected replacement systems use demand paging—waiting page actually requested loading ram systems attempt reduce latency guessing pages ram likely needed soon pre-loading pages ram page requested often combination pre-cleaning guesses pages currently ram likely needed soon pre-writing storage page fault occurs anticipatory paging systems bring referenced page also next consecutive pages analogous prefetch input queue cpu swap prefetch mechanism goes even loading pages even consecutive likely needed soon h k -paging problem generalization model paging problem let h k positive integers formula_1 measure performance algorithm cache size formula_1 relative theoretically optimal page replacement algorithm formula_3 provide optimal page replacement algorithm strictly less resource h k -paging problem way measure online algorithm performs comparing performance optimal algorithm specifically separately parameterizing cache size online algorithm optimal algorithm marking algorithms general class paging algorithms page associate bit called mark initially set pages unmarked stage page requests mark page first requested stage marking algorithm algorithm never pages marked page alg marking algorithm cache size k opt optimal algorithm cache size h formula_1 alg formula_5-competitive every marking algorithm attains formula_5-competitive ratio lru marking algorithm fifo marking algorithm algorithm conservative consecutive request sequence containing k fewer distinct page references algorithm incur k fewer page faults alg conservative algorithm cache size k opt optimal algorithm cache formula_1 alg formula_5-competitive every conservative algorithm attains formula_5-competitive ratio lru fifo clock conservative algorithms variety page replacement algorithms theoretically optimal page replacement algorithm also known opt clairvoyant replacement algorithm bélády optimal page replacement policy algorithm works follows page needs swapped operating system swaps page whose next use occur farthest future example page going used next 6 seconds swapped page going used within next 0.4 seconds algorithm implemented general purpose operating system impossible compute reliably long page going used except software run system either known beforehand amenable static analysis memory reference patterns class applications allowing run-time analysis despite limitation algorithms exist offer near-optimal performance — operating system keeps track pages referenced program uses data decide pages swap subsequent runs algorithm offer near-optimal performance first run program program memory reference pattern relatively consistent time runs analysis paging problem also done field online algorithms efficiency randomized online algorithms paging problem measured using amortized analysis recently used nru page replacement algorithm algorithm favours keeping pages memory recently used algorithm works following principle page referenced referenced bit set page marking referenced similarly page modified written modified bit set setting bits usually done hardware although possible software level well certain fixed time interval timer interrupt triggers clears referenced bit pages pages referenced within current timer interval marked referenced bit page needs replaced operating system divides pages four classes although seem possible page modified yet referenced happens class 3 page referenced bit cleared timer interrupt nru algorithm picks random page lowest category removal four page categories nru algorithm replace not-referenced not-modified page page exists note algorithm implies modified not-referenced within last timer interval page less important not-modified page intensely referenced nru marking algorithm formula_5-competitive simplest page-replacement algorithm fifo algorithm first-in first-out fifo page replacement algorithm low-overhead algorithm requires little bookkeeping part operating system idea obvious name – operating system keeps track pages memory queue recent arrival back oldest arrival front page needs replaced page front queue oldest page selected fifo cheap intuitive performs poorly practical application thus rarely used unmodified form algorithm experiences bélády anomaly simple words page fault frame memory longest replaced fifo page replacement algorithm used vax/vms operating system modifications partial second chance provided skipping limited number entries valid translation table references additionally pages displaced process working set systemwide pool recovered already re-used fifo conservative algorithm formula_5-competitive modified form fifo page replacement algorithm known second-chance page replacement algorithm fares relatively better fifo little cost improvement works looking front queue fifo instead immediately paging page checks see referenced bit set set page swapped otherwise referenced bit cleared page inserted back queue new page process repeated also thought circular queue pages referenced bit set second encounter first page list page swapped referenced bit cleared pages reference bit cleared second chance algorithm degenerates pure fifo name suggests second-chance gives every page second-chance – old page referenced probably use swapped new page referenced clock efficient version fifo second-chance pages n't constantly pushed back list performs general function second-chance clock algorithm keeps circular list pages memory hand iterator pointing last examined page frame list page fault occurs empty frames exist r referenced bit inspected hand location r 0 new page put place page hand points hand advanced one position otherwise r bit cleared clock hand incremented process repeated page replaced clock conservative algorithm formula_5-competitive least recently used lru page replacement algorithm though similar name nru differs fact lru keeps track page usage short period time nru looks usage last clock interval lru works idea pages heavily used past instructions likely used heavily next instructions lru provide near-optimal performance theory almost good adaptive replacement cache rather expensive implement practice implementation methods algorithm try reduce cost yet keep much performance possible expensive method linked list method uses linked list containing pages memory back list least recently used page front recently used page cost implementation lies fact items list moved every memory reference time-consuming process another method requires hardware support follows suppose hardware 64-bit counter incremented every instruction whenever page accessed acquires value equal counter time page access whenever page needs replaced operating system selects page lowest counter swaps implementation costs one may consider algorithms like follow similar lru offer cheaper implementations one important advantage lru algorithm amenable full statistical analysis proven example lru never result n-times page faults opt algorithm n proportional number pages managed pool hand lru weakness performance tends degenerate many quite common reference patterns example n pages lru pool application executing loop array n 1 pages cause page fault every access loops large arrays common much effort put modifying lru work better situations many proposed lru modifications try detect looping reference patterns switch suitable replacement algorithm like recently used mru comparison arc algorithms lru mq 2q lru-2 lrfu lirs found megiddo modha 2004 lru marking algorithm formula_5-competitive random replacement algorithm replaces random page memory eliminates overhead cost tracking page references usually fares better fifo looping memory references better lru although generally lru performs better practice os/390 uses global lru approximation falls back random replacement lru performance degenerates intel i860 processor used random replacement policy rhodehamel 1989 frequently used nfu page replacement algorithm requires counter every page one counter initially set 0 clock interval pages referenced within interval counter incremented 1 effect counters keep track frequently page used thus page lowest counter swapped necessary main problem nfu keeps track frequency use without regard time span use thus multi-pass compiler pages heavily used first pass needed second pass favoured pages comparably lightly used second pass higher frequency counters results poor performance common scenarios exist nfu perform similarly os boot-up thankfully similar better algorithm exists description follows frequently used page-replacement algorithm generates fewer page faults least recently used page replacement algorithm page table contains null pointer values aging algorithm descendant nfu algorithm modifications make aware time span use instead incrementing counters pages referenced putting equal emphasis page references regardless time reference counter page first shifted right divided 2 adding referenced bit left binary number instance page referenced bits 1,0,0,1,1,0 past 6 clock ticks referenced counter look like 10000000 01000000 00100000 10010000 11001000 01100100 page references closer present time impact page references long ago ensures pages referenced recently though less frequently referenced higher priority pages frequently referenced past thus page needs swapped page lowest counter chosen following python code simulates aging algorithm counters formula_14 initialized formula_15 updated described via formula_16 using arithmetic shift operators def simulateaging rs k rs 1,0,1,0,1,1 1,1,0,0,1,0 1,1,0,1,0,1 1,0,0,0,1,0 0,1,1,0,0,0 k 8 simulateaging rs k given example r-bits 6 pages 5 clock ticks function prints following output lists r-bits clock tick formula_17 individual counter values formula_14 page binary representation note aging differs lru sense aging keep track references latest 16/32 depending bit size processor integers time intervals consequently two pages may referenced counters 00000000 even though one page referenced 9 intervals ago 1000 intervals ago generally speaking knowing usage within past 16 intervals sufficient making good decision page swap thus aging offer near-optimal performance moderate price basic idea behind algorithm locality reference used lru difference ldf locality based distance used references ldf replace page longest distance current page two pages distance page next current page anti-clock rotation get replaced many techniques discussed assume presence reference bit associated page hardware bit efficient use requires techniques operate well without one one notable example vax hardware running openvms system knows page modified necessarily page read approach known secondary page caching pages removed working sets process-private memory generally placed special-purpose lists remaining physical memory time removing page working set technically page-replacement operation effectively identifies page candidate page whose backing store still valid whose contents dirty otherwise need preserved placed tail free page list page requires writing backing store placed modified page list actions typically triggered size free page list falls adjustable threshold pages may selected working set removal essentially random fashion expectation poor choice made future reference may retrieve page free modified list removed physical memory page referenced way removed free modified list placed back process working set modified page list additionally provides opportunity write pages backing store groups one page increasing efficiency pages placed free page list sequence pages works way head free page list resembles results lru nru mechanism overall effect similarities second-chance algorithm described earlier another example used linux kernel arm lack hardware functionality made providing two page tables – processor-native page tables neither referenced bits dirty bits software-maintained page tables required bits present emulated bits software-maintained table set page faults order get page faults clearing emulated bits second table revokes access rights corresponding page implemented altering native table working set process set pages expected used process time interval working set model n't page replacement algorithm strict sense actually kind medium-term scheduler
[ 1616, 2633, 8066, 1741, 5571, 578, 5842, 1855, 1575, 4169, 6472, 8117, 56, 7575, 957, 5965, 6500, 1516, 4920 ]
Test
1,576
4
Email_bomb:email bomb internet usage email bomb form net abuse consisting sending large volumes email address attempt overflow mailbox overwhelm server email address hosted denial-of-service attack dos attack smoke screen distract attention important email messages indicating security breach three methods perpetrating email bomb mass mailing list linking zip bombing mass mailing consists sending numerous duplicate mails email address types mail bombs simple design extreme simplicity means easily detected spam filters email-bombing using mass mailing also commonly performed ddos attack employing use zombie botnets hierarchical networks computers compromised malware attacker control similar use spamming attacker instructs botnet send millions even billions emails unlike normal botnet spamming emails addressed one addresses attacker wishes flood form email bombing similar purpose ddos flooding attacks targets frequently dedicated hosts handling website email accounts business type attack devastating services host type attack difficult defend simple mass-mailing bomb multiple source addresses possibility zombie computer sending different message employing stealth techniques defeat spam filters list linking also known email cluster bomb means signing particular email address several email list subscriptions victim unsubscribe unwanted services manually attack carried automatically simple scripts easy almost impossible trace back perpetrator potentially destructive massive attack kind targeting .gov email addresses observed august 2016 order prevent type bombing email subscription services send confirmation email person inbox email used register subscription however even confirmation emails contribute attack better defense would prevent web sites exploited without abandoning subscription forms subscription form filled web site would dynamically create mailto link legitimate user would send message validate request without receiving email web site sender email could spoofed sender smtp ip address list manager therefore verify email form request matches originating smtp server validation message large amount confirmation emails initiated registration bots signing specific email address multitude services used distract view important emails indicating security breach happened elsewhere example amazon account hacked hacker may contrive flood confirmation emails sent email address associated account mask fact amazon shipment address changed purchases made hacker zip bomb variant mail-bombing commercial mail servers began checking mail anti-virus software filtering certain malicious file types exe rar zip 7-zip mail server software configured unpack archives check contents well new idea combat solution composing bomb consisting enormous text file containing example letter z repeating millions times file compresses relatively small archive unpacking especially early versions mail servers would use greater amount processing could result denial service zip .tar.gz file even contain copy causing infinite recursion server checks nested archive files text bomb similar variant sending large number text messages sms technique means cyberbullying online harassment apps online android operating system since banned means sending text bombs text messages may also lead high phone bill charges mobile plans additionally certain phone apps also created prevent text bombs android os
[ 6940, 1691, 598, 7050 ]
Test
1,577
4
Gateway_Anti-Virus:gateway anti-virus gateway anti-virus allows applications across enterprise check files viruses providing soap-based virus scanning web service client applications attach files soap messages submit gateway anti-virus web service web service uses clamav scan attachments viruses returns results client
[ 6986, 5571, 578 ]
Validation
1,578
7
Moab_Cluster_Suite:moab cluster suite moab cluster suite cluster workload management package available adaptive computing inc. integrates scheduling managing monitoring reporting cluster workloads moab cluster suite simplifies unifies management across one multiple hardware operating system storage network license resource manager environments moab development based open source maui cluster scheduler job scheduling package maui associated maui scheduler molokini edition developed project sourceforge site independent original maui scheduler moab feature set expanded greatly since divergence maui many new capabilities comparison list available adaptive computing enterprises inc. site
[ 2441 ]
Test
1,579
2
Kernel_marker:kernel marker kernel markers static kernel instrumentation support mechanism linux kernel source code allowing special tools lttng systemtap trace information exposed probe points kernel markers declared kernel code one-liners form name marker unique name format_string describes remaining arguments types marker depending whether probe connected code wants hook trace point first calls register probe callback marker point pdata private data value code wants pass probe later probe turned using using markers negligible overhead thanks part immediate values another support mechanism embeds switches code dynamically turned without using memory reference thus saving cache lines initial motivation create static instrumentation infrastructure large performance overhead induced predating dynamic instrumentation mechanism kprobe mechanism depends breakpoints static instrumentation also easily survive source code changes markers source code kernel markers consisted essentially c preprocessing macro added instrumented function branch function call neither stack setup function call executed instrumentation enabled identifying branch executing stack setup function call unlikely using gcc built-in expect hint given compiler position tracing instructions away cache lines involved standard kernel execution two kernel markers drawbacks identified led replacement tracepoints patch-set implementing merged version 2.6.24 released january 24 2008 address issues regarding kernel markers mathieu desnoyers original author implemented simpler type-safe version static probe points named tracepoints patch-set implementing tracepoints merged version 2.6.28 released december 25 2008 starting kernel markers slowly removed kernel sources eventually fully removed linux kernel 2.6.32 released december 3 2009
[ 1361, 3666, 1435, 6525 ]
Test
1,580
9
LR-attributed_grammar:lr-attributed grammar lr-attributed grammars special type attribute grammars allow attributes evaluated lr parsing result attribute evaluation lr-attributed grammars incorporated conveniently bottom-up parsing zyacc based lr-attributed grammars subset l-attributed grammars attributes evaluated one left-to-right traversal abstract syntax tree superset s-attributed grammars allow synthesized attributes yacc common hack use global variables simulate kind inherited attributes thus lr-attribution
[ 1498, 5326, 1619, 1463 ]
Test
1,581
2
HP_TouchPad:hp touchpad hp touchpad tablet computer developed designed hewlett-packard hp touchpad launched july 1 2011 united states july 15 canada united kingdom france germany august 15 australia august 18 2011 49 days touchpad launched united states hp announced would discontinue current devices running webos remaining touchpad stock received substantial price reductions quickly sold hp touchpad announced february 9 2011 webos think beyond event held fort mason center san francisco alongside hp veer hp pre 3 initial sales device sold 25,000 270,000 units meet hp expectations rapidly becoming overshadowed launch ipad 2 march august 16 2011 reported best buy refused pay hp touchpad stock europe touchpad estimated sold 12,000 first month release australia harvey norman exclusive retailer sold 1,200 units four days sale industry commentators suggested lack apps platform lackluster advertising hindering sales august 18 hp announced would discontinue webos devices hp cto shane robison noted touchpad half generation generation behind ipad n't going drive volume years later member development team described device made cast-off reject ipad parts august 19 2011 hp announced substantial price drop touchpad canada usa price 99 16gb model 149 32gb model quickly sold large numbers buyers acquired touchpad firesale prices brick-and-mortar retailers reportedly sold entire inventories within hours morning august 20 online retailers including barnes noble amazon.com best buy took orders august 22 rapidly exceeded inventory forced cancel many orders similar sale held australian harvey norman stores several stores selling inventory within hour similar sales took place uk several stores reducing prices £89 16gb £115 32gb hp touchpad became tablet highest approval rating hp touchpad stock immediately sold domestically overseas consumers rushing take advantage price promotion following successful sale clear component suppliers inventories touch panels batteries chassis hp announced august 30 would make another production run touchpad units used fulfill existing orders businesses like tiger direct best buy bundles set price 249.99 299.99 following meg whitman appointment ceo hp conjunction announcement company plans continue developing webos open-source operating system said company would continue using os devices specifically resuming use tablets said would happen 2012 would probably take place 2013 february 2013 hp sold source code transferred remaining webos team lg effectively ending webos deployment tablets consumer products hp touchpad touchscreen tablet runs hp webos several notable features touchpad uses card multitasking found palm pre phones integrated webcam front hp touchpad enables video conferencing backlit home button bottom hp touchpad also allows haptic feedback vibration function hardware includes arm-based qualcomm snapdragon processor 1gb ram touch share allows pre 3 mobile share information websites touching sensors touchpad sensors touchpad receive calls text messages forwarded phone using palm profile well make receive calls via skype application independent site estimated 16gb 32gb hp touchpad contained 296.15 318.15 materials respectively cost assemble 10 hp touchpad 9.7 inch 1024×768 pixel gorilla glass multitouch capacitive touch screen interaction finger capacitive stylus available separate purchase touchpad virtual keyboard configured one four preset sizes number row top common qwerty layout touchpad also features invensense 3-axis gyroscope touchpad three separate physical buttons sleep/wake button top right home button bottom front launches card view app launcher set volume rockers right device holding power button home button together creates screen snapshot touchpad stereo speakers feature beats audio atheros ar6003 chipset supports dual band 2.4 ghz 5 ghz wi-fi 802.11a/b/g/n bluetooth 2.1 edr a2dp stereo bluetooth tablet share urls phone calls text messages webos phones via bluetooth pairing pairing non-webos smartphones enabled software update 3.0.4 touchpad uses rechargeable 6000 6300 mah lithium-ion polymer battery rated 3,7 v total 22,2 wh charged via microusb connector optional wireless charging touchstone charger using touchstone touchpad enters mode called exhibition mode displays simple information clock schedule media battery life estimated nine hours hp review engadget battery lasted eight half hours july 2011 hp announced webos hardware roadmap included hp touchpad 4g faster 1.5 ghz processor 32 gb flash memory integrated a-gps 3.5g hspa+ wireless mobile broadband capabilities demo models displayed press show released sale except hp employees later appeared ebay craigslist august white model 64 gb flash memory 1.5 ghz processor wi-fi – without 3.5g – built small quantities shipped small number touchpad go models codenamed opal 7-inch display 32 gb flash memory 1.5-ghz processor cellular capabilities made sent technology review websites smaller touchpads however mass-produced overall inspiration later carried hp slate 7 touchpad sold webos operating system offers video chat wireless printing hp printers email integration ebooks web browsing document editing access hp catalog additional apps downloaded webos card-based multitasking environment open applications arranged stacks webos unobtrusively notifies users messages emails calendar agenda items appearing top right screen rapidly reviewed swipe gesture webos 3.0 integrates adobe flash last updated version 3.0.5 january 12 2012 hp supports funding new open source project webos scalability easy app development base attracts developers open source webos provides standardized java development tools build port apps webos rapidly open webos released hp directly work touchpad due proprietary code hp however released open source webos community edition use touchpad october 6 2011 reported customers received new touchpads android installed instead webos hp investigating unofficial release commented october 22 2011 android 2.3 gingerbread alpha version became available touchpad port based cyanogenmod enhanced distribution android allows touchpad run android apps natively android port touchpad replace webos provides multi-boot touchpad owners start tablets android webos oss android 3.0 'honeycomb ported touchpad source code publicly available january 17 2012 port android 4.0 ice cream sandwich based cyanogenmod 9 became available preliminary alpha build alpha 0 features including hardware-accelerated video playback microphone camera functional time updated alpha 0.5 around january 24 2012 alpha 0.6 around january 30 2012 bringing fixes stability improvements february 2 2012 hp released source code android 2.3 hp touchpad cyanogenmod team received source code hp started working touchpad tablet port phonenews.com reported android kernel based qualcomm ’ reference android source code used hp internally accelerate release touchpad never intended public use rather ensure touchpad ’ hardware would ready release consumers alongside webos 3 webos 3 lagging behind hardware development android also used manufacturing lines test touchpads ultimately flashed webos cyanogenmod 9 cm9 based android 4.0.4 official stable builds features working also unofficial cm10 cm10.1 cm10.2 cm11 based builds features working cm11 builds stability daily use dependent kernel used development kernels based linux 3.0 3.4 proceeding rom based 3.4 kernel unstable may features missing rom based 3.0 kernel generally stable android 5.0 works touchpad although sluggish android 7.0 nougat made available september 2016 via evervolv android open source project aosp rom authored flintman nearly feature complete usable runs better 5.1 android 7.1.1 nougat made available around december 2016 via evervolv authored flintman well second option lineageos authored invisiblek android 9.0 pie made available april 2019 via evervolv android open source project aosp rom linux distributions compiled arm architecture successfully run via chroot also x11 windowing system common many linux systems ported run within webos allows graphical applications made linux run webos port ubuntu run natively touchpad development january 2012 boots via moboot multiboot bootloader using method android port port early alpha stage functional development ended 2012 addition ubuntu alpha port arch linux arm january 2012 provides full touchscreen support gnome 3 lxde wi-fi access bluetooth camera sound installed using previously mentioned moboot method luneos linux-based operating system designed specifically native execution touch devices touchstone wireless charging dock charging touchstone touchpad set exhibition mode allowing user choose display photos digital photo frame upcoming appointments clock items using third party extensions touchstone also enables wireless communication hp pre3 touchpad tapping specific region transfer web links pre technology known “ touch share ” touchstone usb power cable attached usb standard-a plug end must plugged high-power usb power adapter hp touchpad power adapter newer high-current usb adapter hp shows warning user manual plug laptop north america touchstone ships ac power adapter included touchpad bluetooth wireless keyboard typical qwerty layout plus additional keys special touchpad capabilities power slide switch bottom two aa batteries required special touchpad keys power card view cursor left/up/right/down volume +/- mute brightness +/- fast forward play-pause rewind show virtual keyboard show type show notifications keyboard pair bluetooth devices key functions may missing keyboard layout outside alpha numeric keys specific touchpad power adapter converts wall ac usb dc accessory contains following items touchpad adapter cable touchstone adapter-only ships accessory protective case doubles stand watching videos typing holes edges case access microusb connector 3.5 mm jack connector internal microphone folded open opening speaker along binding edge case raised surface power volume buttons easily found touchpad charge case using either microusb cable touchstone dock early reviews hp touchpad mixed david pogue new york times wrote works beautifully conveys far information ipad 2 tablet offers real multitasking open apps always running jason chen gizmodo wrote actually holding touchpad say deceptively heavy around weight ipad 'd think would lighter back made plastic said overly heavy heavier 'd think looking matt buchanan also writing gizmodo praised os interface concept 'good conceptually described performance slow motion ... give thing six months could amazing well guess says everything needs said verge also noted poor performance describing interface 'intuitive natural 'sluggish unfinished ... bit hard sell right due firesale touchpad hp led non-apple tablets sold us 2011 december 2011 hp touchpad second desired tablet 5 percent share tablet sales estimated 903,354 devices sold hp touchpad firesale effect future android tablet sales low pricing scheme compared ipad used kindle fire nexus 7 commercially successful android tablets originally priced 199
[ 2086, 7326, 4754, 6874, 3764, 4575, 2370, 2278, 2551, 900, 6427, 4317, 5735, 5571, 6015, 488, 6910, 740, 3882, 7919, 4166, 5060, 6378, 1582, 2417, 7759, 5775, 3405, 1134, 4736, 1237, 1702, 2706, 3420, 4018, 5797 ]
Train
1,582
2
Mobile_operating_system:mobile operating system mobile operating system mobile os operating system phones tablets smartwatches mobile devices computers typical laptops 'mobile operating systems usually used considered mobile ones originally designed desktop computers historically need specific mobile features distinction becoming blurred newer operating systems hybrids made uses mobile operating systems combine features personal computer operating system features useful mobile handheld use usually including following considered essential modern mobile systems wireless inbuilt modem sim tray telephony data connection touchscreen cellular bluetooth wi-fi protected access wi-fi global positioning system gps mobile navigation video- single-frame picture cameras speech recognition voice recorder music player near field communication infrared blaster q1 2018 383 million smartphones sold 86.2 percent running android 12.9 percent running ios android alone popular popular desktop operating system windows general smartphone use even without tablets outnumber desktop use mobile devices mobile communications abilities e.g. smartphones contain two mobile operating systemsthe main user-facing software platform supplemented second low-level proprietary real-time operating system operates radio hardware research shown low-level systems may contain range security vulnerabilities permitting malicious base stations gain high levels control mobile device mobile operating systems majority use since 2017 measured web use even smartphones running excluding tablets used kind device thus traditional desktop os minority used kind os see usage share operating systems however variations occur popularity regions desktop-minority also applies days regions united states united kingdom mobile operating system milestones mirror development mobile phones smartphones operating systems often run atop baseband real time operating systems handle hardware aspects phone android based modified linux kernel mobile operating system developed google inc besides largest installed base worldwide smartphones also popular operating system general purpose computers category includes desktop computers mobile devices even though android popular operating system regular desktop personal computers pcs although android operating system free open-source software devices sold much software bundled including google apps vendor-installed software proprietary software closed source android releases 2.0 1.0 1.5 1.6 used exclusively mobile phones android 2.x releases mostly used mobile phones also tablets android 3.0 tablet-oriented release officially run mobile phones phone tablet compatibility merged android 4.0 current android version 9.0 pie android releases named sweets dessert items except first second releases android one software experience runs unmodified android operating system closely resembles running pixel devices previously google nexus program unlike stock androids running market android one ui closely resembles pixel ui due android one software experience developed google distributed partners signup program nokia xiaomi thus overall ui intended clean possible oem partners may tweak add additional apps cameras firmware otherwise apps handled google proprietary apps update handled google internally tested oem distributed via ota update end users designed alibaba based android amazfit os mobile operating system based android develop xiaomi backed huami higher-end amazfit series smartwatch amazfit pace verge stratos due android based operating system therefore side loaded android apk file run smartwatch similar miui although amazfit os based open source aosp consists closed source proprietary software blackberry secure operating system developed blackberry based android open source project aosp officially announced name android based front-end touch interface august 2017 announcement blackberry secure running blackberry brand devices blackberry priv dtek 50/60 blackberry keyone currently blackberry plan license blackberry secure oem coloros custom front-end touch interface based android open source project aosp developed oppo electronics corp. oppo officially releases coloros every oppo device released official rom oneplus one emotion user interface emui front-end touch interface developed huawei technologies co. ltd. based google android open source project aosp emui preinstalled huawei honor devices based open source android operating system consists closed source proprietary software /e/ operating system forked source code lineageos based android supports currently 76 devices april 2019 /e/ targets android smart phone devices uses microg replacement google play services flyme os operating system developed meizu technology co. ltd. open source os based google android open source project aosp flyme os mainly installed meizu smartphones mx series however also official rom support android devices funtouch os fork android developed vivo funtouch os difference traditional android ui funtouch os includes features unavailable former customizable gestures communication drawer bottom top swipe security centre lock screen resize options long screen shot eye protection changing warmer color temperature others funtouch os respects looks similar ios made apple grapheneos formerly named android hardening variant android runs pixel 2 pixel 3 hardware mainly developed daniel micay aims focus security privacy htc sense software suite developed htc used primarily company android-based devices serving successor htc touchflo 3d software windows mobile sense modifies many aspects android user experience incorporating added features altered home screen keyboard widgets htc-developed applications redesigned applications first device sense htc hero released 2009 indus os custom mobile operating system based android open source project aosp developed indus os team based india longer valid 2018indus os available micromax intex karbonn indian smartphone brands lg ux formerly named optimus ui front-end touch interface developed lg electronics partners featuring full touch user interface sometimes incorrectly identified operating system lg ux used internally lg sophisticated feature phones tablet computers available licensing external parties optimus ui 2 based android 4.1.2 released optimus k ii optimus neo 3 features refined user interface compared prior version based android 4.1.1 would include together new functionality voice shutter quick memo lineage android distribution custom mobile operating system based android open source project aosp serves successor highly popular custom rom cyanogenmod forked december 2016 cyanogen inc. announced discontinuing development shut infrastructure behind project since cyanogen inc. retained rights cyanogen name project rebranded fork lineageos similar cyanogenmod include proprietary apps unless user installs allows android users longer obtain update support manufacturer continue updating os version latest one based official release google aosp heavy theme customization mifavor custom android ui developed zte smartphone running android platform similar android ui mifavor replace stock apps zte owns apps however ux still closely similar stock android mi user interface miui developed chinese electronic company xiaomi inc. mobile operating system based android open source project aosp miui mostly found xiaomi smartphones mi redmi series however also official rom support android devices although miui based aosp open source consists closed source proprietary software miui poco custom mobile operating system based miui based android open source project aosp like predecessor also develop xiaomi inc unlike original miui miui poco specifically customized poco series smartphone including difference ui frequent update compare original miui like miui based open source aosp miui poco also consists closed source proprietary software oxygenos based open source android open source project aosp developed oneplus replace cyanogen os oneplus devices oneplus one preinstalled oneplus 2 oneplus x oneplus 3 oneplus 3t oneplus 5 oneplus 5t oneplus 6 stated oneplus oxygenos focused stabilizing maintaining stock like found nexus devices consists mainly google apps minor ui customization maintain sleekness pure android pixel ui developed google based open source android unlike nexus phones google shipped stock android ui came first generation pixel phones slightly modified compared stock android part google pixel software pixel ui home launcher closed source proprietary thus available pixel family devices however third party mods allow non pixel smartphones install pixel launcher google feed integration replicant custom mobile operating system based android proprietary drivers bloat closed source software removed samsung experience formerly called touchwiz front-end touch interface developed samsung electronics partners featuring full touch user interface sometimes incorrectly identified independent operating system samsung experience used internally samsung smartphones feature phones tablet computers available licensing external parties closed source proprietary android version samsung experience also comes samsung-made apps preloaded except starting galaxy s6 removed samsung pre-loaded apps installed leaving one galaxy apps save storage space initially due removal microsd release samsung galaxy s8 s8+ samsung experience 8.1 preinstall introducing new function known samsung dex similar concept microsoft continuum samsung dex allowed high end galaxy devices s8/s8+ note 8 connect docking station extends functionality allow desktop-like functionality connecting keyboard mouse monitor samsung also announced linux galaxy allows use standard linux distribution dex platform sony xperia ui formerly known timescape ui front-end ui developed sony mobile formerly sony ericsson sony xperia series running android platform sony xperia ui mostly consists sony application sony music formerly known walkman music player albums video player time timescape ui ui different standard android ui instead traditional apps dock bottom part located four corner home screen middle screen consist widget however recent development ui closely resemble stock android zenui front-end touch interface developed asus partners featuring full touch user interface zenui used asus android phones tablet computers available licensing external parties zenui also comes preloaded asus-made apps like zenlink pc link share link party link remote link non-android operating systems listed following sections chrome os operating system designed google based linux kernel uses google chrome web browser principal user interface result chrome os primarily supports web applications google announced project july 2009 conceiving operating system applications user data reside cloud hence chrome os primarily runs web applications due increase popularity 2 1 pcs recent chromebooks introduced touch screen capability android applications starting become available operating system 2014 2016 access android apps entire google play store introduced supported chrome os devices support android applications chromebook devices positioned tablet based instead notebooks chrome os available pre-installed hardware google manufacturing partners open source equivalent chromium os compiled downloaded source code early google provided design goals chrome os otherwise released technical description fuchsia capability-based real-time operating system rtos currently developed google first discovered mysterious code post github august 2016 without official announcement contrast prior google-developed operating systems chrome os android based linux kernels fuchsia based new microkernel called zircon derived little kernel small operating system intended embedded systems upon inspection media outlets noted code post github suggested fuchsia capability run universal devices embedded systems smartphones tablets personal computers may 2017 fuchsia updated user interface along developer writing project experimental prompting media speculation google intentions operating system including possibility replacing android liteos lightweight open source real-time operating system part huawei 1+2+1 internet things solution similar google android things samsung tizen huawei liteos features lightweight low-power fast-response multi-sensor collaboration multi-protocol interconnect connectivity enabling iot terminals quickly access network huawei liteos make intelligent hardware development easier thereby accelerating realization interconnection things currently liteos introduce consumer market huawei watch gt series smartbands current liteos version list pureos debian gnu/linux derivative using free software developed purism already used purism laptops planned use librem 5 smartphone purism partnership gnome kde aims separate cpu baseband processor include hardware kill switches phone wi-fi bluetooth camera microphone baseband processor provide gnome kde plasma mobile options desktop environment sailfish os jolla open source gnu general public license gpl middleware stack core comes mer sailfish due jolla business model due alliances various partners due intentional design os internals capable adopt several layers third party software including jolla software e.g jolla ui proprietary software closed source components proprietary many different kinds licences however user replace open source components like e.g nemo ui instead jolla ui nokia abandoned 2011 meego project meego team left nokia established jolla company use meego mer business opportunities mer standard allows launched hardware kernel compatible mer 2012 linux sailfish os based meego using middleware mer core stack distribution launched public use first device jolla smartphone unveiled may 20 2013 2015 jolla tablet launched brics countries declared officially supported os jolla started licensing sailfish os 2.0 third parties devices sold updateable sailfish 2.0 limits sailfish os version release named finnish lake tizen based linux kernel mobile operating system hosted linux foundation together support tizen association guided technical steering group composed intel samsung tizen operating system devices including smartphones tablets in-vehicle infotainment ivi devices smart tvs open source system however sdk closed source proprietary aims offer consistent user experience across devices tizen main components linux kernel webkit runtime according intel tizen combines best limo meego html5 apps emphasized meego encouraging members transition tizen stating future belongs html5-based applications outside relatively small percentage apps firmly convinced investment needs shift toward html5 tizen targeted variety platforms handsets touch pc smart tvs in-vehicle entertainment may 17 2013 tizen released version 2.1 code-named nectarine tizen open source ux ui layer developed samsung mainly closed source proprietary touchwiz ui samsung z series smartphone current tizen version list ubuntu touch canonical ltd.. open source uses gpl license ubuntu touch os built using android linux kernel using android drivers services via lxc container use java-like code android desktop environment ubuntu touch planned available one default desktop options librem 5 running pureos operating system though canonical formally announced discontinuing ubuntu mobile os integral component unity8 independent german non-profit ubports community/ foundation paperwork pending local berlin-government decided take project canonical started ubuntu touch based ubuntu 15.04 vivid vervet ubports upgraded base nearest current long-term support version ubuntu 16.04 lts xenial xerus original canonical ubuntu touch version list ubports ubuntu touch version list plasma mobile kde desktop environment mobile phones intended compatible several different mobile phone operating systems including pureos running librem 5 open source mobile operating systems active development include luneos based webos postmarketos based alpine linux gnu/linux distribution maemo leste meizu pro 5 ubuntu edition meizu mx4 ubuntu edition running ubuntu touch necuno using gnu/linux distribution plasma mobile desktop kde proprietary version amazfit os develop xiaomi backed huami amazfit bip smartwatch however instead based android based proprietary operating system thus able install third party apps apks ios formerly named iphone os created apple inc second largest installed base worldwide smartphones largest profits due aggressive price competition android-based manufacturers closed source proprietary built open source darwin operating system iphone ipod touch ipad second third-generation apple tv use ios derived macos native third party applications officially supported release iphone os 2.0 july 11 2008 jailbreaking allowed third party applications installed recent years jailbreaking scene changed drastically due apple continued efforts secure operating system prevent unauthorized modifications currently jailbreaks recent iterations ios semi-untethered requires device re-jailbroken every boot exploits jailbreaks becoming increasingly hard find use currently ios devices developed apple manufactured foxconn another apple partners watchos operating system apple watch developed apple inc based ios operating system many similar features released april 24 2015 along apple watch device runs watchos currently widely used wearable operating system features focus convenience able place phone calls send texts health fitness heart rate tracking current version watchos operating system watchos 5 windows 10 personal computer operating system developed released microsoft part windows nt family operating systems released july 29 2015 like predecessors designed run across multiple microsoft product pcs tablets windows user interface revised handle transitions mouse-oriented interface touchscreen-optimized interface based available input devices‍—‌particularly 2-in-1 pcs windows 10 also introduces universal apps expanding metro-style apps apps designed run across multiple microsoft product families nearly identical code‍—‌including pcs tablets smartphones embedded systems xbox one surface hub mixed reality current windows 10 version list kaios kai based firefox os unlike mobile operating systems focus smartphones kaios developed mainly feature phones giving access advanced technologies usually found smartphones app stores wi-fi/4g capabilities blackberry 10 based qnx os blackberry smartphone os closed source proprietary runs phones tablets manufactured blackberry one dominant platforms world late 2000s global market share reduced significantly mid-2010s late 2016 blackberry announced continue support os promise release 10.3.3 therefore blackberry 10 would receive major updates blackberry partners would focus android base development current blackberry 10 version list windows 10 mobile formerly called windows phone microsoft closed source proprietary unveiled february 15 2010 windows phone includes user interface inspired microsoft metro design language integrated microsoft services onedrive office xbox music xbox video xbox live games bing also integrates many non-microsoft services facebook google accounts windows phone devices made primarily microsoft mobile/nokia also htc samsung january 21 2015 microsoft announced windows phone brand phased replaced windows 10 mobile bringing tighter integration unification pc counterpart windows 10 provide platform smartphones tablets screen sizes 8 inches october 2017 microsoft officially announced would longer push major updates windows 10 mobile instead would put maintenance mode microsoft would push bug fixes general improvements therefore windows 10 mobile would receive new feature updates current windows 10 mobile version list cyanogenmod custom mobile operating system based android open source project aosp custom rom co-developed cyanogenmod community os include proprietary apps unless user installed due open source nature cyanogenmod allowed android users could longer obtain update support manufacturer continue updating os version latest one based official releases google aosp heavy theme customization last version os cyanogenmod 13 based android asus december 24 2016 cyanogenmod announced blog would longer releasing cyanogenmod updates development moved lineageos cyanogen os based cyanogenmod maintained cyanogen inc however included proprietary apps available commercial uses firefox os project name boot gecko also known b2g mozilla open source mobile operating system released mozilla public license built android linux kernel used android drivers use java-like code android according ars technica mozilla says b2g motivated desire demonstrate standards-based open web potential competitive alternative existing single-vendor application development stacks offered dominant mobile operating systems september 2016 mozilla announced work firefox os ceased b2g-related code would removed mozilla-central meego non-profit organization linux foundation open source gpl 2010 mobile world congress barcelona nokia intel unveiled meego mobile operating system combined moblin maemo create open-sourced experience users across devices 2011 nokia announced would longer pursue meego favor windows phone nokia announced nokia n9 june 21 2011 nokia connection event singapore lg announced support platform maemo platform developed nokia smartphones internet tablets open source gpl based debian gnu/linux draws much graphical user interface gui frameworks libraries gnome project uses matchbox window manager gtk-based hildon gui application framework webos developed palm webos open source mobile operating system running linux kernel initially developed palm launched palm pre acquired hp two phones veer pre 3 tablet touchpad running webos introduced 2011 august 18 2011 hp announced webos hardware would discontinued would continue support update webos software develop webos ecosystem hp released webos open source name open webos plans update additional features february 25 2013 hp announced sale webos lg electronics used operating system smart internet-connected tvs however hp retained patents underlying webos cloud-based services app catalog 1999 research motion released first blackberry devices providing secure real-time push-email communications wireless devices services blackberry messenger provide integration communications single inbox september 2012 rim announced 200 millionth blackberry smartphone shipped september 2014 around 46 million active blackberry service subscribers early 2010s rim undergone platform transition changing company name blackberry limited making new devices new platform named blackberry 10 windows mobile discontinued operating system microsoft replaced windows phone closed source proprietary windows ce operating system windows mobile middleware widely spread asia mostly uses android two improved variants operating system windows mobile 6 professional touch screen devices windows mobile 6 standard unveiled february 2007 criticized user interface optimized touch input fingers instead usable stylus like ios mobile os supports touch screen physical bluetooth keyboard configurations microsoft phased windows mobile os focus windows phone windows phone family mobile operating systems developed microsoft smartphones replacement successor windows mobile zune windows phone features new user interface derived metro design language windows phone replaced windows 10 mobile 2015 symbian platform developed nokia models smartphones proprietary software however used ericsson sonyericsson sending benq operating system discontinued 2012 although slimmed-down version basic phones still developed july 2014 microsoft officially shelved platform favor windows phone acquisition nokia bada platform stylized bada korean 바다 operating system mobile devices smartphones tablet computers developed samsung electronics name derived 바다 bada meaning ocean sea korean ranges mid- high-end smartphones foster adoption bada os since 2011 samsung reportedly considered releasing source code open-source license expanding device support include smart tvs samsung announced june 2012 intentions merge bada tizen project would meanwhile use bada operating system parallel google android os microsoft windows phone smartphones bada-powered devices branded wave name samsung android-powered devices branded name galaxy february 25 2013 samsung announced stop developing bada moving development tizen instead bug reporting finally terminated april 2014 palm os/garnet os access co closed source proprietary webos introduced palm january 2009 successor palm os web 2.0 technologies open architecture multitasking abilities 2006 android ios exist 64 million smartphones sold 2018 q1 383.5 million smartphones sold global market share 85.9 android 14.1 ios according statcounter web use statistics proxy use smartphones alone without tablets majority use globally desktop computers used much less android particular popular windows use varies however continent smartphones way popular biggest continents i.e asia desktop still popular though north america desktop still popular many countries overall 44.9 first quarter 2017 smartphones popular even many developed countries countries continent desktop-minority european countries south america e.g haiti north america asia africa smartphone-majority poland turkey highest 57.68 62.33 respectively ireland smartphone use 45.55 outnumbers desktop use mobile whole gains majority including tablet share 9.12 spain also slightly desktop-minority range measured mobile web use varies lot country statcounter press release recognizes india amongst world leaders use mobile surf internet big countries share around 80 desktop 19.56 russia trailing 17.8 mobile use desktop rest smartphones alone without tablets first gained majority december 2016 desktop-majority lost month n't christmas-time fluke close majority smartphone majority happened march 2017 week november 7–13 2016 smartphones alone without tablets overtook desktop first time short period non-full-month mobile-majority applies countries paraguay south america poland europe turkey asia africa world still desktop-majority e.g united states 54.89 days however territories united states puerto rico desktop way majority windows 30 overtaken android october 22 2016 subsequent weekends mobile showed majority since october 27 desktop n't shown majority even weekdays smartphones alone showed majority since december 23 end year share topping 58.22 christmas day mobile -majority share smartphones tablets could added giving 63.22 majority unusually high top similarly high also happened monday april 17 2017 smartphones share slightly lower tablet share slightly higher combined 62.88 formerly according statcounter press release world turned desktop-minority 49 desktop use month mobile n't ranked higher tablet share added exceed desktop share note
[ 5718, 3933, 2, 6788, 2185, 372, 2187, 7521, 5726, 3615, 1453, 6427, 4317, 2922, 23, 3282, 2564, 4320, 6808, 5391, 7545, 7183, 740, 7189, 1108, 1109, 4340, 42, 6831, 7919, 6465, 5062, 6125, 3653, 2594, 2954, 5068, 1123, 2240, 6132, 4726,...
Validation
1,583
4
Crossbeam_Systems:crossbeam systems crossbeam systems headquartered boxborough massachusetts offices europe latin america asia pacific crossbeam systems acquired blue coat systems december 2012 crossbeam brand fully absorbed blue coat crossbeam systems acquired blue coat systems december 2012 crossbeam brand fully absorbed blue coat crossbeam systems inc. incorporated november 23 1999 stephen justus mike akerman throop wilder joining founding team member 2000 since beginning crossbeam focused designing manufacturing range network security products peter george led company 2001 june 2007 ceo president pete fiore took company 2007 led company growth profitability death december 2009 march 2010 continues today ceo president november 9 2012 crossbeam systems inc. acquired private equity firm thoma bravo company publicly disclose acquisition price terms deal december 17 2012 blue coat systems announced acquiring crossbeam systems deal expected close december 31 2012 company ’ main product x-series network security product family introduced september 2001 way telecommunications operators consolidate security server appliance infrastructure one chassis acts virtual security architecture ‘ network box. ’ x-series architecture consists five major components including chassis operating system three types hardware blades modules past 11-plus years x-series product family including modules operating systems gone six major generational upgrades october 2010 5th generation upgrade x-series family network security platforms include x20 x30 x60 x80-s october 2011 crossbeam completed portfolio added 6th generation network processor module npm-9610 npm-9650 7 7 independent validation 6th generation x-series platform performance crossbeam together spirent european advanced network test centre eantc heavy reading set create new real-world methodology testing network security gprs 4g-lte mobile operator network methodology independently tested eantc crossbeam x80-s platform
[ 2488, 651, 5571, 1583 ]
Test
1,584
4
Fuzzing:fuzzing fuzzing fuzz testing automated software testing technique involves providing invalid unexpected random data inputs computer program program monitored exceptions crashes failing built-in code assertions potential memory leaks typically fuzzers used test programs take structured inputs structure specified e.g. file format protocol distinguishes valid invalid input effective fuzzer generates semi-valid inputs valid enough directly rejected parser create unexpected behaviors deeper program invalid enough expose corner cases properly dealt purpose security input crosses trust boundary often interesting example important fuzz code handles upload file user fuzz code parses configuration file accessible privileged user testing programs random inputs dates back 1950s data still stored punched cards programmers would use punched cards pulled trash card decks random numbers input computer programs execution revealed undesired behavior bug detected fixed execution random inputs also called random testing monkey testing 1981 duran ntafos formally investigated effectiveness testing program random inputs random testing widely perceived worst means testing program authors could show cost-effective alternative systematic testing techniques 1983 steve capps developed monkey tool would generate random inputs classic mac os applications macpaint figurative monkey refers infinite monkey theorem states monkey hitting keys random typewriter keyboard infinite amount time eventually type entire works shakespeare case testing monkey would write particular sequence inputs trigger crash term fuzzing originates 1988 class project taught barton miller university wisconsin fuzz test unix utility meant automatically generate random files command-line parameters utility project designed test reliability unix programs executing large number random inputs quick succession crashed also provided early debugging tools determine cause category detected failure allow researchers conduct similar experiments software source code tools test procedures raw result data made publicly available later term fuzzing limited command-line utilities 1991 crashme tool released intended test robustness unix unix-like operating systems executing random machine instructions 1995 fuzzer used test gui-based tools x window system network protocols system library apis april 2012 google announced clusterfuzz cloud-based fuzzing infrastructure security-critical components chromium web browser security researchers upload fuzzers collect bug bounties clusterfuzz finds crash uploaded fuzzer september 2014 shellshock disclosed family security bugs widely used unix bash shell vulnerabilities shellshock found using fuzzer afl many internet-facing services web server deployments use bash process certain requests allowing attacker cause vulnerable versions bash execute arbitrary commands allow attacker gain unauthorized access computer system april 2015 hanno böck showed fuzzer afl could found 2014 heartbleed vulnerability heartbleed vulnerability disclosed april 2014 serious vulnerability allows adversaries decipher otherwise encrypted communication vulnerability accidentally introduced openssl implements tls used majority servers internet shodan reported 238,000 machines still vulnerable april 2016 200,000 january 2017 august 2016 defense advanced research projects agency darpa held finals first cyber grand challenge fully automated capture-the-flag competition lasted 11 hours objective develop automatic defense systems discover exploit correct software flaws real-time fuzzing used effective offense strategy discover flaws software opponents showed tremendous potential automation vulnerability detection winner system called mayhem developed team forallsecure led david brumley september 2016 microsoft announced project springfield cloud-based fuzz testing service finding security critical bugs software december 2016 google announced oss-fuzz allows continuous fuzzing several security-critical open-source projects black hat 2018 christopher domas demonstrated use fuzzing expose existence hidden risc core processor core able bypass existing security checks execute ring 0 commands ring 3 fuzzer categorized follows mutation-based fuzzer leverages existing corpus seed inputs fuzzing generates inputs modifying rather mutating provided seeds example fuzzing image library libpng user would provide set valid png image files seeds mutation-based fuzzer would modify seeds produce semi-valid variants seed corpus seed files may contain thousands potentially similar inputs automated seed selection test suite reduction allows users pick best seeds order maximize total number bugs found fuzz campaign generation-based fuzzer generates inputs scratch instance smart generation-based fuzzer takes input model provided user generate new inputs unlike mutation-based fuzzers generation-based fuzzer depend existence quality corpus seed inputs fuzzers capability generate inputs scratch generate inputs mutation existing seeds typically fuzzers used generate inputs programs take structured inputs file sequence keyboard mouse events sequence messages structure distinguishes valid input accepted processed program invalid input quickly rejected program constitutes valid input may explicitly specified input model examples input models formal grammars file formats gui-models network protocols even items normally considered input fuzzed contents databases shared memory environment variables precise interleaving threads effective fuzzer generates semi-valid inputs valid enough directly rejected parser invalid enough might stress corner cases exercise interesting program behaviours smart model-based grammar-based protocol-based fuzzer leverages input model generate greater proportion valid inputs instance input modelled abstract syntax tree smart mutation-based fuzzer would employ random transformations move complete subtrees one node another input modelled formal grammar smart generation-based fuzzer would instantiate production rules generate inputs valid respect grammar however generally input model must explicitly provided difficult model proprietary unknown complex large corpus valid invalid inputs available grammar induction technique angluin l* algorithm would able generate input model dumb fuzzer require input model thus employed fuzz wider variety programs instance afl dumb mutation-based fuzzer modifies seed file flipping random bits substituting random bytes interesting values moving deleting blocks data however dumb fuzzer might generate lower proportion valid inputs stress parser code rather main components program disadvantage dumb fuzzers illustrated means construction valid checksum cyclic redundancy check crc crc error-detecting code ensures integrity data contained input file preserved transmission checksum computed input data recorded file program processes received file recorded checksum match re-computed checksum file rejected invalid fuzzer unaware crc unlikely generate correct checksum however attempts identify re-compute potential checksum mutated input dumb mutation-based fuzzer modified protected data typically fuzzer considered effective achieves higher degree code coverage rationale fuzzer exercise certain structural elements program also able reveal bugs hiding elements program elements considered critical others instance division operator might cause division zero error system call may crash program black-box fuzzer treats program black box unaware internal program structure instance random testing tool generates inputs random considered blackbox fuzzer hence blackbox fuzzer execute several hundred inputs per second easily parallelized scale programs arbitrary size however blackbox fuzzers may scratch surface expose shallow bugs hence attempts develop blackbox fuzzers incrementally learn internal structure behavior program fuzzing observing program output given input instance learnlib employs active learning generate automaton represents behavior web application white-box fuzzer leverages program analysis systematically increase code coverage reach certain critical program locations instance sage leverages symbolic execution systematically explore different paths program program specification available whitebox fuzzer might leverage techniques model-based testing generate inputs check program outputs program specification whitebox fuzzer effective exposing bugs hide deep program however time used analysis program specification become prohibitive whitebox fuzzer takes relatively long generate input blackbox fuzzer efficient hence attempts combine efficiency blackbox fuzzers effectiveness whitebox fuzzers gray-box fuzzer leverages instrumentation rather program analysis glean information program instance afl libfuzzer utilize lightweight instrumentation trace basic block transitions exercised input leads reasonable performance overhead informs fuzzer increase code coverage fuzzing makes gray-box fuzzers extremely efficient vulnerability detection tools fuzzing used mostly automated technique expose vulnerabilities security-critical programs might exploited malicious intent generally fuzzing used demonstrate presence bugs rather absence running fuzzing campaign several weeks without finding bug prove program correct program may still fail input executed yet executing program inputs prohibitively expensive objective prove program correct inputs formal specification must exist techniques formal methods must used order expose bugs fuzzer must able distinguish expected normal unexpected buggy program behavior however machine always distinguish bug feature automated software testing also called test oracle problem typically fuzzer distinguishes crashing non-crashing inputs absence specifications use simple objective measure crashes easily identified might indicate potential vulnerabilities e.g. denial service arbitrary code execution however absence crash indicate absence vulnerability instance program written c may may crash input causes buffer overflow rather program behavior undefined make fuzzer sensitive failures crashes sanitizers used inject assertions crash program failure detected different sanitizers different kinds bugs fuzzing also used detect differential bugs reference implementation available automated regression testing generated inputs executed two versions program automated differential testing generated inputs executed two implementations program e.g. lighttpd httpd implementations web server two variants produce different output input one may buggy examined closely static program analysis analyzes program without actually executing might lead false positives tool reports problems program actually exist fuzzing combination dynamic program analysis used try generate input actually witnesses reported problem modern web browsers undergo extensive fuzzing chromium code google chrome continuously fuzzed chrome security team 15,000 cores microsoft edge internet explorer microsoft performed fuzzed testing 670 machine-years product development generating 400 billion dom manipulations 1 billion html files fuzzer produces large number inputs relatively short time instance 2016 google oss-fuzz project produced around 4 trillion inputs week hence many fuzzers provide toolchain automates otherwise manual tedious tasks follow automated generation failure-inducing inputs automated bug triage used group large number failure-inducing inputs root cause prioritize individual bug severity fuzzer produces large number inputs many failure-inducing ones may effectively expose software bug bugs security-critical patched higher priority instance cert coordination center provides linux triage tools group crashing inputs produced stack trace lists group according probability exploitable microsoft security research centre msec developed exploitable tool first creates hash crashing input determine uniqueness assigns exploitability rating previously unreported triaged bugs might automatically reported bug tracking system instance oss-fuzz runs large-scale long-running fuzzing campaigns several security-critical software projects previously unreported distinct bug reported directly bug tracker oss-fuzz bug tracker automatically informs maintainer vulnerable software checks regular intervals whether bug fixed recent revision using uploaded minimized failure-inducing input automated input minimization test case reduction automated debugging technique isolate part failure-inducing input actually inducing failure failure-inducing input large mostly malformed might difficult developer understand exactly causing bug given failure-inducing input automated minimization tool would remove many input bytes possible still reproducing original bug instance delta debugging automated input minimization technique employs extended binary search algorithm find minimal input
[ 1710, 3932, 6515, 7614, 3680, 3681, 812, 3448, 2105, 5116, 1363, 2560, 3699, 3531, 5480, 4318, 5125, 5921, 651, 2566, 572, 2747, 5485, 1376, 3967, 6725, 3794, 2577, 5051, 4965, 2310, 405, 5401, 1019, 6823, 2491, 749, 6118, 5149, 6376, 3...
Test