node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
1,885
9
RScheme:rscheme rscheme scheme implementation developed donovan kolbly object-orientation approach adapted dylan rscheme implements r4rs except transcript-on transcript-off r5rs except define-syntax addition rscheme reflective object system many operating system services modules threads systems programming features including ability integrate compile c code code rscheme compiled c c compiled normal c compiler generate machine code default keep compilation fast code size rscheme compiles bytecodes interpreted runtime virtual machine systems compiling c done on-the-fly resulting object code dynamically loaded back image execution rscheme known publicly available scheme implementation include real-time safe garbage collector
[ 1616, 7878, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 5571, 1557, 218, 1478, 5494, 4704, 3880, 4609, 6116, 3212, 5501, 6210, 1116, 144, 6471, 7848, 7481, 2144, 2600, 7298, 5515, 8025, 5077, 7032, 4543, 1889, 2156, ...
Test
1,886
4
Great_Cannon:great cannon great cannon china attack tool used launch distributed denial-of-service attacks websites intercepting massive amounts web traffic redirecting targeted websites according researchers citizen lab international computer science institute princeton university center information technology policy coined term great cannon hijacks foreign web traffic intended chinese websites re-purposes flood targeted web servers enormous amounts traffic attempt disrupt operations co-located great firewall great cannon separate offensive system different capabilities design besides launching denial-of-service attacks tool also capable monitoring web traffic distributing malware targeted attacks ways similar quantum insert system used u.s. national security agency first known targets great cannon late march 2015 websites hosting censorship-evading tools including github web-based code hosting service greatfire service monitoring blocked websites china
[ 96, 1175, 6348, 2563, 4111, 6025, 7848, 2427, 7214, 1691, 6398, 5700, 3338, 4014, 3426 ]
Validation
1,887
2
Runtime_Callable_Wrapper:runtime callable wrapper runtime callable wrapper rcw proxy object generated .net common language runtime clr order allow component object model com object accessed managed code although rcw appears ordinary object .net clients primary function marshal calls data .net client com object example managed application written c might make use existing com library written c++ visual basic 6 via rcws runtime creates exactly one rcw com object regardless number references exist object runtime maintains single rcw per process object create rcw one application domain apartment pass reference another application domain apartment proxy first object used
[ 2530 ]
Test
1,888
4
Institute_for_Information_Infrastructure_Protection:institute information infrastructure protection institute information infrastructure protection i3p consortium national cyber security institutions including academic research centers u.s. federal government laboratories nonprofit organizations long-standing widely recognized expertise cyber security research development r i3p managed george washington university home small administrative staff oversees helps direct consortium activities i3p coordinates funds cyber security research related critical infrastructure protection hosts high impact workshops bring together leaders public private sectors i3p brings multi-disciplinary multi-institutional perspective complex difficult problems works collaboratively stakeholders seeking solutions since founding 2002 100 researchers wide variety disciplines backgrounds worked together better understand mitigate critical risks field cyber security i3p came existence following several government assessments u.s. information infrastructure ’ susceptibility catastrophic failure first study published 1998 united states president council advisors science technology pcast recommended nongovernmental organization formed address national cyber security issues subsequent studies–by institute defense analyses well white paper jointly produced national security council office science technology policy–agreed pcast assessment affirming need organization dedicated protecting nation ’ critical infrastructures 2002 i3p founded dartmouth college grant federal government martin wybourne chaired i3p 2003 2015 since inception i3p funding i3p come various sources including department homeland security dhs national institute standards technology nist national science foundation nsf i3p consortium consists 18 academic research centers 5 national laboratories 3 nonprofit research organizations member institution appoints primary secondary representative attend regular consortium meetings advanced technological education i3p partnered community college system new hampshire ccsnh educational project “ cybersecurity healthcare industry curriculum adaptation implementation. ” funded national science foundation ’ nsf advanced technological education ate program goal project produce well-qualified technicians serve healthcare information technology needs rural northern new england i3p launched project called improving csirt skills dynamics effectiveness effort funded department homeland security science technology directorate aims explore makes sustains good csirt results help organizations ensure csirts fulfill maximum potential become invaluable tool securing cyber infrastructure interdisciplinary team working new project include cyber security business researchers dartmouth college organizational psychologists george mason university researchers practitioners hewlett-packard april 2011 i3p convened nist-sponsored workshop examining challenge integrating security usability design development software one several workshop recommendations development case studies show software developers usable security integrated organization software development process consequently i3p begun usable security project using uniform study methodology project document usable security three different organizations results used understand key usable security problems addressed teach developers solutions enable researchers perform comparable studies nation critical infrastructure threat cyber attack today never main response cyber threat facing country increased information sharing traditionally agencies store data data bases information readily available others might benefit obama administration made clear strategy work – data must readily available sharing preferred way would using cloud numerous government agencies would store information information would available appropriate credentials model tremendous added benefits – associated risks researchers rand university virginia took challenge answering question information sharing project privacy digital era researchers five i3p academic institutions engaged sweeping effort understand privacy digital era course 18 months research project take multidisciplinary look privacy examining roles human behavior data exposure policy expression way people understand protect privacy leveraging human behavior reduce cyber security risk project brings behavioral-sciences lens security examining interface human beings computers set rigorous empirical studies multi-disciplinary project draws together social scientists information security professionals illuminate intricacies human perceptions cognitions biases impact computer security project ’ goal leverage new insights way produces secure systems processes better security risk pricing i3p researchers project examined ways quantify cyber risk exploring potential multi-factor scoring system analogous risk scoring insurance sector overall work takes account two key determinants cyber risk technologies reduce likelihood attack internal capabilities respond successful potential attacks survivability recovery process control systems research project builds earlier i3p project control-systems security develop strategies enhancing control-system resilience allowing rapid recovery event successful cyber attack business rationale cyber security project offshoot earlier study economics security addresses challenge corporate decision-making comes investing cyber security attempted answer questions “ much needed ” “ much enough ” “ one measure return investment ” study includes investigation investment strategies including risks vulnerabilities supply-chain interdependencies technological fixes safeguarding digital identity multidisciplinary scope project addresses security digital identities emphasizing development technical approaches managing digital identities also meet political social legal needs work focused primarily two sectors privacy identity protection paramount financial services healthcare insider threat project addresses need detect monitor prevent insider attacks inflict serious harm organization researchers undertaken systematic analysis insider threat one addresses technical challenges also takes account ethical legal economic dimensions i3p delivered report titled national cyber security research development challenges industry academic government perspective u.s senators joseph lieberman susan collins february 18 2009 report reflects finding three forums hosted i3p 2008 brought together high-level experts industry government academia identify r opportunities would advance cyber security research next five 10 years report contains specific recommendations technology policy research reflect input participants also concerns public private sectors i3p connects engages stakeholders workshops outreach activities often held partnership organizations workshops encompass range topics directly related i3p research projects others intended bring right people together probe particularly difficult foundational challenge secure systems engineering workforce development i3p sponsored postdoctoral research fellowship program 2004-2011 provides funding year research i3p member institution competitive awards granted according merit proposed work extent proposed work explored creative original concepts potential impact topic u.s. information infrastructure prospective applicants expected address core area cyber security research including trustworthy computing enterprise security management secure systems engineering network response recovery identity management forensics wireless computing metrics well legal policy economic dimensions security
[ 904, 1805 ]
Test
1,889
9
Racket_(programming_language):racket programming language racket general-purpose multi-paradigm programming language based scheme dialect lisp designed platform programming language design implementation addition core racket language racket also used refer family racket programming languages set tools supporting development racket racket also used scripting computer science education research racket platform provides implementation racket language including run-time system libraries jit compiler along drracket integrated development environment ide written racket racket used programbydesign outreach program aims turn computer science indispensable part liberal arts curriculum core racket language known extensive macro system enables creating embedded domain-specific languages language constructs classes modules separate dialects racket different semantics platform distribution free open-source software distributed gnu lesser general public license lgpl extensions packages written community may uploaded racket package catalog matthias felleisen founded plt mid 1990s first research group soon project dedicated producing pedagogic materials novice programmers lectures exercises/projects software january 1995 group decided develop pedagogic programming environment based scheme matthew flatt cobbled together mred original virtual machine racket libscheme wxwidgets free systems years followed team including flatt robby findler shriram krishnamurthi cormac flanagan many others produced drscheme programming environment novice scheme programmers research environment soft typing main development language drscheme supported named plt scheme parallel team began conducting workshops high school teachers training program design functional programming field tests teachers students provided essential clues directing development following years plt added teaching languages algebraic stepper transparent read–eval–print loop constructor-based printer many innovations drscheme producing application-quality pedagogic program development environment 2001 core team felleisen findler flatt krishnamurthi also written published first textbook design programs based teaching philosophy racket manifesto details principles driving development racket presents evaluation framework behind design process details opportunities future improvements first generation plt scheme revisions introduced features programming large modules classes version 42 introduced units – first-class module system – complement classes large scale development class system gained features e.g java-style interfaces also lost several features e.g multiple inheritance throughout versions language evolved throughout number successive versions gaining milestone popularity version 53 leading extensive work following version 100 would equivalent 1.0 release current popular version systems next major revision named version 200 introduced new default module system cooperates macros particular module system ensures run-time compile-time computation separated support tower languages unlike units modules first-class objects version 300 introduced unicode support foreign library support refinements class system later 300 series improved performance language runtime addition jit compiler switch default generational garbage collection next major release project switched conventional sequence-based version numbering version 4.0 introduced codice_1 shorthand specify language module written revision introduced immutable pairs lists support fine-grained parallelism statically-typed dialect june 7 2010 plt scheme renamed racket renaming coincided release version 5.0 subsequently graphical user interface gui backend rewritten racket c++ version 5.1 using native ui toolkits platforms version 5.2 included background syntax checking tool new plotting library database library new extended repl version 5.3 included new submodule feature optionally loaded modules new optimization tools json library features version 5.3.1 introduced major improvements drracket background syntax checker turned default new documentation preview tool added version 6.0 racket released second-generation package management system part development principal drracket racket repository reorganized split large set small packages making possible install minimal racket install packages needed version 7 racket released new macro expander written racket part preparations supporting moving chez scheme runtime system supporting multiple runtime systems racket core language includes macros modules lexical closures tail calls delimited continuations parameters fluid variables software contracts green os threads language also comes primitives eventspaces custodians control resource management enables language act like operating system loading managing programs extensions language created powerful macro system together module system custom parsers control aspects language unlike programming languages lack macro systems language constructs racket written base language using macros include mixin class system component module system expressive ml opaque ascription pattern matching language features first contract system higher-order programming language racket contract system inspired design contract work eiffel extends work higher-order values first-class functions objects reference cells example object checked contract ensured make contract checks methods eventually invoked racket includes bytecode jit jit compilers bytecode compiler translates internal bytecode format run racket virtual machine jit compiler translating bytecode native code x86 x86-64 arm powerpc platforms runtime since 2004 language also shipped planet package manager integrated module system third-party libraries transparently imported used also planet built-in versioning policy prevent dependency hell end 2014 much racket code moved new packaging system separate main code base new packaging system serviced client program named raco new package system provides fewer features planet blog post jay mccarthy racket blog explains rationale change duplicate older system features clearly distinguish racket languages lisp family integrated language extensibility features support building new domain-specific general-purpose languages racket extensibility features built module system allow context-sensitive module-level control syntax example codice_2 syntactic form overridden change semantics function application similarly codice_3 form allows arbitrary static analysis entire module since module used language via codice_1 notation effectively means virtually aspect language programmed controlled module-level extensibility features combined scheme-like hygienic macro system provides features lisp s-expression manipulation system scheme 84 hygienic extend-syntax macros r5rs syntax-rules indeed fair say macro system carefully tuned application programming interface api compiler extensions using compiler api programmers add features entire domain-specific languages manner makes completely indistinguishable built-in language constructs macro system racket used construct entire language dialects includes typed racket gradually typed dialect racket eases migration untyped typed code lazy racket—a dialect lazy evaluation hackett combines haskell racket pedagogical programming language pyret originally implemented racket. ref name= index 2017 /ref dialects include frtime functional reactive programming scribble documentation language slideshow presentation language several languages education racket core distribution provides libraries aid process constructing new programming languages languages restricted s-expression based syntax addition conventional readtable-based syntax extensions racket codice_1 makes possible language programmer define arbitrary parser example using parser tools library see racket logic programming example language language platform provides self-hosted ide named drracket continuation-based web server graphical user interface tools racket also viable scripting tool used scripting unix shell parse command line arguments execute external tools includes libraries like common scripting languages drracket formerly drscheme widely used among introductory computer science courses teach scheme racket lauded simplicity appeal beginner programmers ide originally built use teachscheme project programbydesign outreach effort northeastern university number affiliated universities attracting high school students computer science courses college level editor provides source highlighting syntax run-time errors parenthesis matching debugger algebraic stepper student-friendly features include support multiple language levels beginning student intermediate student also integrated library support sophisticated analysis tools advanced programmers module-oriented programming supported module browser contour view integrated testing coverage measurements refactoring support provides integrated context-sensitive access extensive hyper-linked help system named help desk drracket available windows macos unix linux x window system programs behave similarly platforms trivial hello world program running program produces output slightly less trivial program program taken racket website draws sierpinski triangle nested depth 8 using codice_1 directive source file written different dialects racket example factorial program typed racket statically typed dialect racket apart basis programming language theory racket designed used general-purpose language production systems thus racket distribution features extensive library covers systems network programming web development uniform interface underlying operating system dynamic foreign function interface several flavours regular expressions lexer/parser generators logic programming complete gui framework racket several features useful commercial language among ability generate standalone executables windows macos unix profiler debugger included integrated development environment ide unit testing framework racket used commercial projects web applications notable example hacker news website runs arc developed racket naughty dog used scripting language several video games racket used teach students algebra game design bootstrap program
[ 7878, 1445, 4302, 1820, 5019, 6796, 6087, 1825, 2915, 5734, 1478, 2218, 4704, 5055, 5757, 6116, 7557, 1116, 6471, 6475, 7573, 2600, 5077, 1885, 6507, 795, 3684, 1158, 6876, 4759, 6886, 6888, 4039, 109, 1557, 5494, 4067, 5501, 6210, 144, ...
Test
1,890
9
OpenMusic:openmusic openmusic om object-oriented visual programming environment musical composition based common lisp may also used all-purpose visual interface lisp programming specialized level set provided classes libraries make convenient environment music composition openmusic last series computer-assisted composition software designed ircam versions openmusic currently available mac os x powerpc intel windows linux source code released gnu lesser general public license lgpl programs openmusic created connecting together process known 'patching either pre-defined user-defined modules similar manner graphical signal-processing environments max/msp pd unlike environments however result openmusic computation typically displayed conventional music notation directly manipulated required via editor substantial body specialized libraries contributed users extends openmusic functionality areas constraint programming aleatoric composition spectral music minimalist music music theory fractals music information retrieval sound synthesis etc
[ 1908, 1716, 6876, 4759, 1445, 7160, 6888, 2915, 6352, 3370, 6191, 578, 4878, 4332, 5494, 5757, 6116, 3212, 7750, 6210, 1116, 6471, 940, 1676, 5420, 4535, 5077, 2249, 6408, 3250 ]
Test
1,891
1
Cursor_(databases):cursor databases computer science database cursor control structure enables traversal records database cursors facilitate subsequent processing conjunction traversal retrieval addition removal database records database cursor characteristic traversal makes cursors akin programming language concept iterator cursors used database programmers process individual rows returned database system queries cursors enable manipulation whole result sets scenario cursor enables sequential processing rows result set sql procedures cursor makes possible define result set set data rows perform complex logic row row basis using mechanics sql procedure also define result set return directly caller sql procedure client application cursor viewed pointer one row set rows cursor reference one row time move rows result set needed use cursors sql procedures need following work cursors must use following sql statements section introduces ways standard defines use cursors applications embedded sql application bindings relational database systems adhere standard cli jdbc use different interface programmer makes cursor known dbms using codice_1 ... codice_2 statement assigning cursor compulsory name code access data must open cursor codice_3 statement directly following successful opening cursor positioned first row result set applications position cursors specific row result set codice_4 statement fetch operation transfers data row application application processed available rows fetch operation positioned non-existing row compare scrollable cursors dbms returns sqlstate '02000 usually accompanied +100 indicate end result set final step involves closing cursor using codice_5 statement closing cursor program open implies dbms re-evaluates query different query builds new result set programmers may declare cursors scrollable scrollable scrollability indicates direction cursor move non-scrollable forward-only cursor codice_4 row cursor automatically moves next row fetch last row fetch put cursor last row get following code sqlstate 02000 sqlcode +100 program may position scrollable cursor anywhere result set using codice_4 sql statement keyword scroll must specified declaring cursor default codice_8 although different language bindings like jdbc may apply different default target position scrollable cursor specified relatively current cursor position absolutely beginning result set scrollable cursors potentially access row result set multiple times thus data modifications insert update delete operations transactions could affect result set cursor sensitive insensitive data modifications sensitive cursor picks data modifications affecting result set cursor insensitive cursor additionally cursor may insensitive case dbms tries apply sensitivity much possible cursors usually closed automatically end transaction i.e commit rollback implicit termination transaction occurs behavior changed cursor declared using hold clause default without hold holdable cursor kept open commit closed upon rollback dbms deviate standard behavior also keep holdable cursors open rollback commit occurs holdable cursor positioned next row thus positioned update positioned delete statement succeed fetch operation occurred first transaction note jdbc defines cursors holdable per default done jdbc also activates auto-commit per default cursors used fetch data dbms application also identify row table updated deleted sql:2003 standard defines positioned update positioned delete sql statements purpose statements use regular clause predicates instead cursor identifies row cursor must opened already positioned row means codice_4 statement cursor must operate updatable result set order successfully execute positioned update delete statement otherwise dbms would know apply data changes underlying tables referred cursor using cursors distributed transactions x/open xa environments controlled using transaction monitor different cursors non-distributed transactions one pay attention using holdable cursors however connections used different applications thus transaction ended committed subsequent transaction running different application could inherit existing holdable cursors herefore application developer aware situation xquery language allows cursors created using subsequence function format result result initial xquery start item number start item-count number items return equivalently also done using predicate codice_10 end sequence complete examples see following information may vary depending specific database system fetching row cursor may result network round trip time uses much network bandwidth would ordinarily needed execution single sql statement like delete repeated network round trips severely reduce speed operation using cursor dbmss try reduce effect using block fetch block fetch implies multiple rows sent together server client client stores whole block rows local buffer retrieves rows buffer exhausted cursors allocate resources server locks packages processes temporary storage example microsoft sql server implements cursors creating temporary table populating query result set cursor properly closed deallocated resources freed sql session connection closed wasting resources server lead performance degradations failures employees table
[ 2176, 1449, 7248, 5209, 7715, 1730, 3951, 3776, 6345, 7067, 3005, 6430, 1003, 3011, 4950, 6543, 2124, 927, 4798, 6462, 1861, 6128, 2054, 7022, 5419, 7205, 684, 517, 519, 7580, 7213, 7303, 6144, 4274, 4457, 1792, 4743, 784, 2265 ]
Test
1,892
9
J_(programming_language):j programming language j programming language developed early 1990s kenneth e. iverson roger hui synthesis apl also iverson fp fl function-level languages created john backus avoid repeating apl special-character problem j uses basic ascii character set resorting use dot colon inflections form short words similar digraphs primary primitive j words serve mathematical symbols dot colon extending meaning basic characters available also many characters languages often must paired codice_1 codice_2 treated j stand-alone words inflected single-character roots multi-character words j terse array programming language suited mathematical statistical programming especially performing operations matrices also used extreme programming network performance analysis like original fp/fl languages j supports function-level programming via tacit programming features unlike languages support object-oriented programming j flexible hierarchical namespace scheme every name exists specific locale effectively used framework class-based prototype-based object-oriented programming since march 2011 j free open-source software gnu general public license version 3 gplv3 one may also purchase source negotiated license j permits point-free style function composition thus programs terse considered difficult read programmers hello world program j implementation hello world reflects traditional use j – programs entered j interpreter session results expressions displayed also possible arrange j scripts executed standalone programs might look unix system historically apl used codice_3 indicate fold codice_4 equivalent codice_5 meanwhile division represented classic mathematical division symbol obelus ÷ implemented overstriking minus sign colon ebcdic ascii paper text terminals ascii general support overstrikes device-independent way include division symbol per se j uses represent division visual approximation reminder illustrates something mnemonic character j tokens quandaries imposed use ascii defining j function named codice_6 calculate average list numbers yields test execution function codice_7counts number items array.codice_8sums items array.codice_9divides sum number items avg defined using train three verbs codice_10 codice_11 codice_12 termed fork specifically codice_13 codice_14 shows power j v0 v1 v2 denote verbs ny denotes noun examples using codice_6 rank crucial concept j significance j similar significance codice_16 sql codice_17 c. implementing quicksort j dictionary yields following implementation quicksort demonstrating tacit programming later involves composing functions together referring explicitly variables j support forks hooks dictates rules arguments applied function applied component functions sorting j usually accomplished using built-in primitive verbs codice_18 sort codice_19 sort user-defined sorts quicksort typically illustration following example demonstrates usage self-reference verb codice_20 recursively calculate fibonacci numbers recursion also accomplished referring verb name although course possible verb named following expression exhibits pi n digits demonstrates extended precision abilities j j supports three simple types numeric variants one j numeric types bit two bit values 0 1 also bits formed lists example codice_21 list eight bits syntactically j parser treats one word space character recognized word-forming character would otherwise numeric words lists arbitrary length supported j supports usual binary operations lists exclusive rotate shift etc example j also supports higher order arrays bits formed two-dimensional three-dimensional etc arrays operations perform equally well arrays numeric types include integer e.g. 3 42 floating point 3.14 8.8e22 complex 0j1 2.5j3e88 extended precision integer 12345678901234567890x extended precision rational fraction 1r2 3r4 bits formed lists arbitrarily dimensioned arrays bits operations performed numbers array lists bits converted integer using codice_22 verb integers converted lists bits using codice_23 verb parsing j codice_24 period codice_25 colon word-forming characters never tokens alone unless preceded whitespace characters j also supports literal character type literals enclosed quotes example codice_26 codice_27 lists literals also supported using usual convention putting multiple characters quotes codice_28 typically individual literals 8-bits wide ascii j also supports literals unicode numeric boolean operations supported literals collection-oriented operations rotate supported finally boxed data type typically data put box using codice_29 operation left argument left argument would less operation analogous c codice_30 operation left argument however result c codice_30 reference semantics result j codice_29 value semantics words codice_29 function produces result result 0 dimensions regardless structure contained data viewpoint j programmer codice_29 puts data box allows working array boxes assembled boxes and/or copies made box collection type offered j arbitrarily dimensioned array algorithms expressed concisely using operations arrays j arrays homogeneously typed example list codice_35 list integers despite codice_36 bit part sorts type issues transparent programmers certain specialized operations reveal differences type example list codice_37 would treated exactly operations list codice_38 j also supports sparse numeric arrays non-zero values stored indices efficient mechanism relatively values non-zero j also supports objects classes artifact way things named data types instead boxed literals used refer objects classes j data value semantics objects classes need reference semantics another pseudo-type—associated name rather value—is memory mapped file j documentation includes dictionary words j identified nouns verbs modifiers primary words listed vocabulary respective parts speech indicated using markup note verbs two forms monadic arguments right dyadic arguments left right example 'codice_39 hyphen monadic verb 'codice_40 hyphen dyadic verb monadic definition mostly independent dyadic definition regardless whether verb primitive verb derived verb j provides control structures details similar procedural languages prominent control words category include
[ 5363, 1524, 1158, 4759, 4302, 3772, 2638, 4853, 811, 470, 6263, 1270, 1549, 5571, 3630, 1435, 578, 1381, 3464, 6285, 666, 7557, 752, 5322, 3898, 7848, 1774, 2871, 3570, 1308, 7758, 1312, 6846, 2881, 8137, 3060, 3915, 6064, 356, 1804 ]
Test
1,893
4
Parrot_OS:parrot os parrot linux linux distribution based debian focus computer security designed penetration testing vulnerability assessment mitigation computer forensics anonymous web browsing developed frank ruben aqua skid parrotsec intended provide suite penetration testing tools used attack mitigation security research forensics vulnerability assessment parrot based debian testing branch buster custom linux 4.19 kernel follows rolling release development model desktop environment mate default display manager lightdm project certified run devices minimum 256mb ram suitable 32-bit i386 64-bit amd64 processor architectures moreover project available armv7 armhf architectures even offers edition 32-bit 64-bit developed specifically servers carry cloud service penetration testing june 2017 parrotsec announced considering change debian devuan mainly problems highly controversial systemd january 21st 2019 parrot linux team phasing development 32-bit i386 versions future operating systems parrot multiple editions based upon debian various desktop environments available parrot home special edition parrot designed daily use targets regular users need lightweight always updated beautiful system laptops workstations distribution look feel regular parrot environment includes basic programs daily work parrot home also includes programs chat privately people encrypt documents highest cryptographic standards surf net completely anonymous secure way system also used starting point build customized pentesting platform tools need use build professional workstation taking advantage latest powerful technologies debian without hassle lightweight parrot release embedded systems aimed simplicity portability supported hardware brands raspberry pi orange pi pine64 cubieboard development team specified official release timeline based release changelogs notes included official review distribution project released monthly basis
[ 2179, 2187, 2909, 5724, 6086, 7894, 2935, 5051, 6453, 2585, 2228, 1487, 58, 3996, 6488, 7587, 4008, 1893, 7954, 1909, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 3700, 7635, 6902, 2297, 1941, 3023, 6549, 1960, 6209, 2680, 4435, ...
Validation
1,894
2
CMD_file_(CP/M):cmd file cp/m cp/m-86 concurrent cp/m-86 personal cp/m-86 s5-dos dos plus concurrent dos flexos multiuser dos system manager real/32 well scp1700 cp/k k8918-os cmd filename extension used cp/m-style executable programs corresponds com cp/m-80 exe dos extension used command-line interpreter cmd.exe os/2 windows batch files cmd file 128-byte header followed 1-8 groups code data group 1 megabyte size later versions format cmd files also contain relocation information resident system extensions rsxs start header lists groups present file types type used first 256 bytes data group must zero populated cp/m-86 zero page comparable program segment prefix dos data group first 256 bytes code group used instead os/2 windows nt .cmd file extension associated batch scripts command processor cmd.exe since binary code executed way attempting run cp/m-86 cmd files cmd command processor work typically cause mild inconvenience users executable loader relocator cp/m-86 related operating systems test first byte file happens type byte first table entry cp/m cmd file value 1 9 accepting valid cp/m cmd file ascii values smaller 10 rarely never used batch scripts scheme gives reasonably good protection
[ 1339, 4662, 4843, 4759, 2280, 6256, 2010, 8087, 126, 3870, 2403, 3210, 6380, 2418, 7020, 7032, 3664, 2160, 6496, 1989, 8043, 4745, 2084 ]
Test
1,895
2
Cocoa_Touch:cocoa touch cocoa touch ui framework building software programs run ios iphone ipod touch ipad watchos apple watch tvos fourth-generation apple tv apple inc. cocoa touch provides abstraction layer ios operating system iphone ipod touch ipad cocoa touch based macos cocoa api toolset like primarily written objective-c language cocoa touch allows use hardware features found macos computers thus unique ios range devices like cocoa cocoa touch follows model-view-controller mvc software architecture cocoa touch contains different set graphical control elements cocoa tools developing applications based cocoa touch included ios sdk ios watchos tvos technologies seen set layers cocoa touch highest level core os/kernel bottom hierarchical view ios watchos tvos technologies shown follows main features technologies cocoa touch cocoa touch provides key frameworks developing applications devices running ios key frameworks
[ 6788, 3940, 7890, 4320, 1840, 2926, 4690, 734, 5752, 6116, 6125, 2954, 1123, 7573, 6847, 6142, 2609, 5786, 5787, 4017, 5091, 4749, 7601, 1154, 2284, 1940, 2300, 3025, 2665, 2327, 3398, 6565, 2331, 3050, 4820, 6582, 1234, 5189, 4469, 889, ...
Test
1,896
3
Scramble_Spirits:scramble spirits player starts propelled plane fire air-to-air twin machine guns air-to-ground rockets weapons used destroying waves enemy planes ground sea units main plane destroyed one hit certain enemy destroyed player collect comrade fighter fight alongside main plane two comrade fighters collected comrade fighters assigned fight air fire bullets assigned fight low altitude fire air-to-ground rockets comrade fighters also launched kamikaze attack explosion enemy kamikaze attacks comrade fighters retrievable lost shot crash enemy areas certain stages player fly lower altitude armed twin machine guns shooting parked planes turrets take limited amount damage multiple shots crashes end stage player must destroy boss vehicle proceed
[ 1237 ]
Test
1,897
2
Quartz_(graphics_layer):quartz graphics layer apple macos operating system quartz quartz 2d quartz compositor part core graphics framework quartz includes 2d renderer core graphics composition engine sends instructions graphics card vertical nature quartz often synonymous core graphics general sense quartz quartz technologies refer almost every part graphics model rendering layer compositor including core image core video apple graphics technologies use quartz prefix include quartz 2d primary two-dimensional 2d text graphics rendering library directly supports aqua displaying two-dimensional graphics create user interface including on-the-fly rendering anti-aliasing quartz render text sub-pixel precision graphics limited traditional anti-aliasing default mode operation turned mac os x 10.4 tiger apple introduced quartz 2d extreme enabling quartz 2d offload rendering compatible gpus however gpu rendering enabled default due potential video redraw issues kernel panics mac os x v10.5 quartz 2d extreme renamed quartzgl however still remains disabled default situations degrade performance experience visual glitches per-application setting turned developer wishes quartz compositor compositing engine used macos mac os x jaguar later quartz compositor use graphics accelerator gpu vastly improve composition performance technology known quartz extreme enabled automatically systems supported graphics cards widely stated quartz uses pdf internally notably apple 2000 macworld presentation quartz early developer documentation often people making comparisons display postscript technology used nextstep openstep descendant quartz internal imaging model correlates well pdf object graph making easy output pdf multiple devices
[ 6788, 3940, 713, 4690, 734, 405, 6832, 3989, 2953, 2597, 3322, 1502, 2609, 5786, 4740, 4376, 5450, 6505, 2627, 7609, 5101, 1171, 5109, 3001, 2284, 5116, 1178, 120, 6188, 1187, 2300, 1562, 6909, 6548, 502, 6557, 2679, 2327, 3043, 6565, 2...
Test
1,898
4
Neil_Schwartzman:neil schwartzman neil schwartzman canadian anti-spam activist involved anti-spam efforts since 1995 co-founder executive director cauce sat canadian federal task force spam u.s. federal communications commission csric network abuse protection working group currently chair m3aawg awards committee
[ 1166, 4734, 1529 ]
Validation
1,899
4
NowSecure:nowsecure nowsecure formerly viaforensics chicago-based mobile security company publishes mobile app device security software former ceo co-founder andrew hoog working cio one employees dismissed dismissal hoog tasked reviewing whether employee stolen sensitive data company rather hire forensics firm investigate hoog performed investigation continued forensic work side hoog wife chee-young kim contributed money start company originally known chicago electronic discovery viaforensics hoog devoted full-time mobile forensics kim continued work corporate job day participated business development night weekends march 2011 viaforensics profitable extent could pay employee benefits kim left job went work viaforensics full-time june 5 year viaextract 1.0 released conference myrtle beach viaforensics introduced known vialab march 2013. vialab product allowed automated testing variety security flaws apps including man-in-the-middle attacks ssl strip attacks coding problems opportunities reverse engineering viaforensics subject inc 5000 13 fastest-growing tech company us award 2014 2014 viaforensics launched viaprotect app show users destinations sources data mobile devices rsa conference company began focus similar individual enterprise device protection result focus shift viaforensics decided rebrand nowsecure nowsecure publisher nowsecure forensics formerly viaextract nowsecure lab formerly vialab nowsecure mobile apps formerly viaprotect nowsecure forensics designed law enforcement extract artifacts mobile devices applying deleted data recovery data search nowsecure lab mobile app vulnerability scanning software nowsecure mobile free end-user oriented vulnerability scanner ios android blackphone 2014 2015 pc magazine awarded viaprotect editor choice android privacy utilities
[ 1461, 1715, 6515, 2876, 5511, 7093, 3426 ]
Test
1,900
5
Exchange_ActiveSync:exchange activesync exchange activesync commonly known eas proprietary protocol designed synchronization email contacts calendar tasks notes messaging server smartphone mobile devices protocol also provides mobile device management policy controls protocol based xml mobile device communicates http https originally branded airsync supporting microsoft exchange servers pocket pc devices microsoft licenses technology widely synchronization groupware mobile devices number competing collaboration platforms including addition support windows phone eas client support included beyond premises installations exchange various personal enterprise hosted services microsoft also utilize eas including outlook.com office 365 built-in email application windows 8 desktop mail app also supports protocol apart eas client support included first version eas called airsync time part mobile information server mis 2002 version eas communicated web-based distributed authoring versioning webdav exchange 2000 servers syncing email contacts calendar allowed users select folder list sync email folders contacts calendars initial version eas user ’ device “ pull ” data rather server “ push ” new information soon available eas 2.0 shipped exchange server 2003 version protocol developed microsoft windows mobile team delivered binary drop massync.dll exchange server team eas used webdav connect user mailbox added ability sync non-default calendar contacts folders always date autd implemented way let device know new information short message service sms technology used deliver information device use sms notification configuration sms gateway required account needed configured user mobile phone number exchange server 2003 sp1 ghosting support added eas 2.1 ghosting tells server sync sent changes sent specified fields changed others deleted eas protocol also moved globally unique identifier guid 1 x short ids items reduced amount data sent across wireless network eas 2.5 part exchange server 2003 sp2 first version eas written exchange server team version also introduced direct push real-time push e-mail solution allows server say new item tells client device sync called ping sync global address list gal search added enable people look co-workers company directory find email address ability remotely wipe device also added administrators could remove company data device lost stolen employee left company tasks syncing added s/mime email encryption following policies added eas 12.0 came exchange server 2007 eas 12.0 complete re-write protocol managed code previous version new features included password reset allowed users reset forgotten pin lock code message flagging gave users ability mark message could remember follow got back computer office setting users could set “ away ” message phone sharepoint unc file share access links email file traffic proxied though eas empty deleted items allow people shrink mailboxes ’ exceed mailbox size limits fetch allowed users get parts message choose later get rest message attachment later device info allowed users administrators see phones connected accounts autodiscover although strictly speaking ’ part eas protocol allowed phones automatically configure eas connection user login password instead requiring people know computer name exchange server ability see invited meeting also added well ability search server email synced device new policies introduced eas 12.1 came exchange server 2007 sp1 version protocol one largest changes since version 2.5 featured header compression base64 encoding binary structure decrease amount data sent wirelessly multiple collections sync bundling sync requests together instead previous way sync folder separately hanging sync allowed server keep communications channel open client times battery life data ’ consumed constantly turning radio querying server “ true push sync ” solution far lower message delivery latencies opposed previous ping based “ push pull ” solution confirmation completed remote wipe well following 30 new policies eas 14.0 introduced part exchange server 2010 new version added new conversation view put email messages view connected several attributes including message-id email subject notes syncing ability look availability free/busy status contact calendar nickname cache shared names common used contacts outlook web app owa eas ability set server side rule always move messages conversation lunar calendar support syncing reply state let device server know message forwarded replied source new way identify unified messaging um messages voicemail appeared user ’ inbox could handled differently sms syncing allowed users see sms messages email inbox reply inbox instead phone following two new policies also first version eas identified clients using older versions eas alerted updated version client would enable newer features eas 14.1 came part exchange server 2010 sp1 version protocol added gal photos images stored active directory server user sent email message diffs means sending new portion email avoiding redundant information added device/user information provision command new allow/block/quarantine feature could easily allow administrators control devices connected organizations information rights management irm eas method apply digital rights management control encryption email messages sent received eas 14.1 may allow irm eas eas 16.0 announced june 2015 deployed office 365 first followed exchange server 2016 new protocol version adds mainly 3 enhancements redesigned calendar synchronisation avoid common eas calendar syncing problems added calendar attachments syncing email drafts folder eas 16.1 announced june 2016 deployed office 365 first followed exchange server 2016 version protocol contains three major capabilities improved keyword search propose new time account-only remote wipe beginning early 2000s eas began available licensing time client protocol license motorola first licensee began license 2.1 version eas various organizations licensed eas time microsoft eventually started licensing server side eas 2007 protocol licensing continued 2008 december 2008 microsoft shifted licensing eas protocol license licensing patents eas providing full protocol documentation eas licensed series patents given computer code companies different clients servers implement subset entire features protocol implementations written company obtained license google uses implementation eas g suite subscribers likewise ibm novell implemented technology allow competing groupware servers lotus domino novell groupwise support smartphones devices ibm notes traveler novell data synchronizer mobility pack respectively april 2011 microsoft launched eas logo program tests third-party eas clients mobile email devices handset manufacturers licensed eas protocol microsoft eligible join program order compliant eas clients must employ eas v14.0 later enable following features management policies
[ 7148, 7607, 1912, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 1544, 6531, 1462, 2650, 7637, 2298, 2119, 6908, 740, 7091, 2219, 3383, 3640, 3797, 6550, 2043, 3312, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 7861, 6582, 259, 5880 ]
Validation
1,901
9
Quantum_programming:quantum programming quantum programming process assembling sequences instructions called quantum programs capable running quantum computer quantum programming languages help express quantum algorithms using high-level constructs quantum instruction sets used turn higher level algorithms physical instructions executed quantum processors sometimes instructions specific given hardware platform e.g ion traps superconducting qubits cqasm also known common qasm hardware-agnostic qasm guarantees interoperability quantum compilation simulation tools introduced qca lab tudelft quil instruction set architecture quantum computing first introduced shared quantum/classical memory model introduced robert smith michael curtis william zeng practical quantum instruction set architecture many quantum algorithms including quantum teleportation quantum error correction simulation optimization algorithms require shared memory architecture openqasm intermediate representation introduced ibm use qiskit ibm q experience blackbird quantum instruction set intermediate representation used xanadu strawberry fields designed represent continuous-variable quantum programs run photonic quantum hardware quantum software development kits provide collections tools create manipulate quantum programs also provide means simulate quantum programs prepare run using cloud-based quantum devices following software development kits used run quantum circuits prototype quantum devices well simulators ocean open source suite tools developed d-wave written mostly python programming language enables user formulate problems ising model quadratic unconstrained binary optimization formats qubo results obtained submitting online quantum computer leap d-wave ’ real-time quantum application environment customer-owned machines classical samplers open source project developed institute theoretical physics eth uses python programming language create manipulate quantum circuits results obtained either using simulator sending jobs ibm quantum devices open source project developed ibm quantum circuits created manipulated using python swift java results obtained either using simulators run user device simulators provided ibm prototype quantum devices provided ibm well ability create programs using basic quantum operations higher level algorithms available within qiskit aqua package qiskit based openqasm standard representing quantum circuits support pulse level control quantum systems specified openpulse standard open source project developed rigetti uses python programming language create manipulate quantum circuits results obtained either using simulators prototype quantum devices provided rigetti well ability create programs using basic quantum operations higher level algorithms available within grove package forest based quil instruction set public access quantum devices currently planned following sdks yet implemented project developed microsoft part .net framework quantum programs written run within visual studio vscode open source project developed google uses python programming language create manipulate quantum circuits results obtained using simulators run user device open-source python library developed xanadu designing simulating optimizing continuous variable cv quantum optical circuits three simulators provided one fock basis one using gaussian formulation quantum optics one using tensorflow machine learning library quantum programming environment developed cambridge quantum computing target simulators quantum hardware planned use hardware produced nqit hub well oxford quantum circuits full release expected september 2018 two main groups quantum programming languages imperative quantum programming languages functional quantum programming languages prominent representatives imperative languages qcl lanq q|si quantum computation language qcl one first implemented quantum programming languages important feature qcl support user-defined operators functions syntax resembles syntax c programming language classical data types similar primitive data types c. one combine classical code quantum code program quantum pseudocode proposed e. knill first formalized language description quantum algorithms introduced moreover tightly connected model quantum machine called quantum random access machine qram language developed microsoft used quantum development kit q|si platform embedded .net language supporting quantum programming quantum extension while-language platform includes compiler quantum while-language chain tools simulation quantum computation optimisation quantum circuits termination analysis quantum programs verification quantum programs q language second implemented imperative quantum programming language q language implemented extension c++ programming language provides classes basic quantum operations like qhadamard qfourier qnot qswap derived base class qop new operators defined using c++ class mechanism quantum memory represented class qreg qreg x1 // 1-qubit quantum register initial value 0 qreg x2 2,0 // 2-qubit quantum register initial value 0 computation process executed using provided simulator noisy environments simulated using parameters simulator quantum guarded command language qgcl defined p. zuliani phd thesis based guarded command language created edsger dijkstra described language quantum programs specification quantum macro assembler qmasm low-level language specific quantum annealers d-wave efforts underway develop functional programming languages quantum computing functional programming languages well-suited reasoning programs examples include selinger qpl haskell-like language qml altenkirch grattage higher-order quantum programming languages based lambda calculus proposed van tonder selinger valiron arrighi dowek qfc qpl two closely related quantum programming languages defined peter selinger differ syntax qfc uses flow chart syntax whereas qpl uses textual syntax languages classical control flow operate quantum classical data selinger gives denotational semantics languages category superoperators qml haskell-like quantum programming language altenkirch grattage unlike selinger qpl language takes duplication rather discarding quantum information primitive operation duplication context understood operation maps formula_1 formula_2 confused impossible operation cloning authors claim akin sharing modeled classical languages qml also introduces classical quantum control operators whereas languages rely classical control operational semantics qml given terms quantum circuits denotational semantics presented terms superoperators shown agree operational denotational semantics implemented classically haskell liqui| pronounced liquid quantum simulation extension f programming language currently developed quantum architectures computation group quarc part stationq efforts microsoft research liqui| seeks allow theorists experiment quantum algorithm design physical quantum computers available use includes programming language optimization scheduling algorithms quantum simulators liqui| used translate quantum algorithm written form high-level program low-level machine instructions quantum device quantum lambda calculi extensions classical lambda calculus introduced alonzo church stephen cole kleene 1930s purpose quantum lambda calculi extend quantum programming languages theory higher-order functions first attempt define quantum lambda calculus made philip maymin 1996 lambda-q calculus powerful enough express quantum computation however language efficiently solve np-complete problems therefore appears strictly stronger standard quantum computational models quantum turing machine quantum circuit model therefore maymin lambda-q calculus probably implementable physical device 2003 andré van tonder defined extension lambda calculus suitable proving correctness quantum programs also provided implementation scheme programming language 2004 selinger valiron defined strongly typed lambda calculus quantum computation type system based linear logic quipper published 2013 implemented embedded language using haskell host language reason quantum programs written quipper written haskell using provided libraries example following code implements preparation superposition
[ 6507, 4760, 718, 7071, 2740, 5482, 1102, 5939, 7557, 5008, 7842, 7290, 3570, 336, 1592, 7032, 5965, 5878, 2614, 2530, 1901, 5091 ]
Test
1,902
1
Database_application:database application database application computer program whose primary purpose entering retrieving information computerized database early examples database applications accounting systems airline reservations systems sabre developed starting 1957 characteristic modern database applications facilitate simultaneous updates queries multiple users systems 1970s might accomplished user front 3270 terminal mainframe computer mid-1980s becoming common give user personal computer program running pc connected database server information would pulled database transmitted network arranged graphed otherwise formatted program running pc starting mid-1990s became common build database applications web interface rather develop custom software run user pc user would use web browser program every application database application web interface advantage could used devices different sizes different hardware different operating systems examples early database applications web interfaces include amazon.com used oracle relational database management system photo.net online community whose implementation top oracle described book database-backed web sites ziff-davis press may 1997 ebay also running oracle electronic medical records referred emrexperts.com december 2010 software database application 2005 o'reilly book uses term title database applications web complex database applications remain accounting systems sap may contain thousands tables single module many today widely used computer systems database applications example facebook built top mysql etymology phrase database application comes practice dividing computer software systems programs operating system compilers file system tools database management system application programs payroll check processor standard pc running microsoft windows example windows operating system contains systems programs games word processors spreadsheet programs photo editing programs etc would application programs application short application program database application short database application program every program uses database would typically considered database application example many physics experiments e.g. large hadron collider generate massive data sets programs subsequently analyze data sets constitute database though typically managed standard relational database management system computer programs analyze data primarily developed answer hypotheses put information back database therefore overall program would called database application
[ 1905, 6604, 7330, 7341, 6345, 5561, 906, 5217, 6098, 4054, 6636, 2663, 2124, 6737, 6739, 3119, 3801, 7999, 5943, 2054, 6932, 6219, 6386, 684, 6390, 7937, 5252, 7303, 6144, 4457, 3920, 6320, 6594 ]
Test
1,903
4
Barrett_Brown:barrett brown barrett lancaster brown born august 14 1981 american journalist essayist satirist founded project pm research collaboration wiki facilitate analysis troves hacked emails leaked information concerning inner workings cyber-military-industrial complex january 2015 brown sentenced 63 months federal prison crimes accessory fact obstruction justice threatening federal officer stemming fbi investigation 2012 stratfor email leak prosecutors previously brought charges associated sharing http link leaked stratfor data charges dropped 2014 part sentence brown also required pay almost 900,000 stratfor prior 2011 brown ties hacktivist collective anonymous brown born dallas texas robert brown karen lancaster later divorced grew dallas exhibited early interest writing journalism creating newspapers family computer attending preston hollow elementary school went contribute school newspapers interned several weekly newspapers teenage years attended episcopal school dallas sophomore year high school spent would-be junior year tanzania father residing business africa brown completed high school online texas tech university program earning college credits well high school diploma 2000 enrolled university texas austin spent two semesters taking writing courses leaving school pursue full-time career freelance writer brown served director communications enlighten vote secularist pac provides financial strategic assistance political candidates advocate strict enforcement establishment clause 2010 brown began work crowdsourced investigation wiki project pm brown written main goals project pm increase positive influence calls capable segments blogosphere reducing negative influence well-regarded mainstream pundits may political agendas compatible public interest aim wiki project pm established way deliberate generation critical mass work following among dependable bloggers manner segments traditional media prompted even forced address critical issues methods means reportage experimental aim project pm also develop communicational schematic could provide bloggers reporters concerned citizen journalist best possible feed raw information produce content aim project pm brown stated institutions structures developed past two decades accelerating public internet use reasonably describe wholesome effect information flow information age work progress thus potential improvements made importantly improvements made initially small number influential participants working coordination purpose project pm implement solutions extent participants collectively able well demonstrate beneficial effects solutions others might spurred recreate even build upon independently efforts june 2011 project pm released exclusive report surveillance contract called romas/coin discovered e-mails hacked hbgary anonymous consisted sophisticated data-mining techniques leveraging mobile software aimed arab countries november 2011 brown said 75 names members zetas drug cartel would released member anonymous group kidnapped set free brown says member released truce drug cartel moment others said kidnapping fake january 18 2012 brown interviewed english language russian news network rt cyber attacks anonymous temporary blackout us government websites whitehouse.gov doj.gov fbi.gov march 6 2012 confirmed twitter fbi raided residence receiving information hector xavier monsegur also known online pseudonym sabu founder lulzsec early january 2014 announced second book begun 2006 published according legal defense website book originally titled hot fat clouded amazing amusing failures america ’ chattering class consisted attack ubiquitous newspaper columnists media pundits argues undeservedly influential able form public opinion … excited announce rescued book fate soon see light day newly titled keep rootin ’ putin establishment pundits twilight american competence text become available ebook spring 2014 donors legal defense fund september 2012 incarceration brown wrote series columns magazine titled barrett brown review arts letters jail 2015 transitioned intercept 2016 intercept national magazine award three barrett columns written daily beast vanity fair true/slant huffington post guardian publications media outlets presented brown spokesperson anonymous label disputes appeared documentaries legion terms conditions may apply hacker wars brown said renounced links group 2011 also reported 2011 brown anon alumnus gregg housh landed six-figure deal amazon book tentatively titled anonymous tales inside accidental cyberwar march 6 2012 fbi executed search warrants brown apartment mother house seeking evidence alleged crimes items seized included records relating hbgary infragard endgame systems anonymous lulzsec irc chats twitter wiki.echelon2.org pastebin.com agents took possession laptop computers suspect fbi working incorrect information brown told reporter september 12 2012 brown arrested dallas county texas threatening fbi agent youtube video arrest occurred left computer linked tinychat raid could heard background brown talked publicly history using heroin going withdrawal day arrest magistrate denied bail therefore kept pre-trial detention danger safety community risk flight september 24 2012 pastebin post appeared titled barrett brown – communiqué prison 9/20/12 brown thanked supporters described insufficient medical treatment received ribs injured arrest acknowledged past mistakes missive concludes personally thank everyone outside helped movement particularly critical time regained freedom nothing lose time war paper always war october 3 2012 federal grand jury indictment returned brown charges threats conspiracy retaliation federal law enforcement officer various tweets youtube uploads comments made brown arrest cited support within indictment later entered plea guilty three counts december 4 2012 brown indicted additional 12 federal charges related december 25 2011 hack austin-based private intelligence company stratfor carried jeremy hammond trove millions stratfor emails hack including authentication information thousands credit card accounts shared hacker collective lulzsec whistleblower site wikileaks main article 2012 stratfor email leak hammond pleaded guilty received maximum sentence ten years federal prison hack brown faced 45 years federal prison allegedly sharing link data part project pm presumed fbi entrapment maneuver attorney jesselyn radack raised connections brown case client peter van buren state department sought prosecute link personal blog wikileaks document two online commentators internet security issues criticized charges brown entered plea guilty twelve counts january 23 2013 third indictment filed brown two counts obstruction concealing evidence march 6 2012 fbi raid mother homes brief court hearing week later judge found mentally competent stand trial brown pleaded guilty additional charges may 1 2013 announced brown retained two attorneys charles swift ahmed ghappour represent legal cases september 4 2013 brown federal court-issued gag order lawyers allowed discuss case media lest taint jury assistant united states attorney candina s. heath lead prosecutor said brown tried manipulate media behind bars benefit brown attorney coordinates and/or approves use media publicity brown contained false information gross fabrications defense counsel maintained gag order unfounded unwarranted breach brown first amendment rights though forbidden write speak case brown continued pen articles prison cell unrelated topics gag order lifted april 23 2014 key documents unsealed brown custody since september 12 2012 mother sentenced november 8 2013 six months probation 1,000 fine misdemeanor charge obstructing execution search warrant better judgment clouded maternal instinct stated court judge said feel parent know best could march 2014 charges brown dropped april 2014 reported brown agreed plea bargain january 2015 brown sentenced 63 months prison also ordered pay 890,250 fines restitution journalist janus kopfstein said believed government considered brown threat suggested prosecutors made false allegations used increase length sentence supporting theory much brown december sentencing hearing spent drawn-out arguments definitions project pm brown brown released prison november 29 2016 moved halfway house five drug dealers close downtown dallas texas april 27 2017 brown arrested held unknown charges four days released gave interview democracy house arrest despite pressure government speak media brown expressed desire move iceland germany possible telling truthout interview ca n't stay us ca n't get work done 'm always subject little gusts bureaucracy wo n't another year 'm probation another two years generally goes one year n't act year 'll position leave 2017 lawyers donors brown legal fund filed suit assistant united states attorney candina heath filing subpoena wepay resulted divulgence identities lawyers argued irrelevance donor information case brown provision information directly special agent robert smith federal bureau investigation rather prosecutor judge trial led donors belief information intended surveil harass donors activity protected u.s. constitution filed destruction data monetary damages october 2 2017 judge maria elena james denied motion dismiss case introduced department justice sentencing statement brown alleged despite denial subpoena judge making statement identities contributors echelon2.org public wiki obtained means dozens people given time expertise hailed journalists advocacy groups crucial journalistic enterprise risk indicted sort spurious charges facing long ago government exposed decades prison time copying pasting link publicly available file journalists also linking without prosecuted relatively free documentary film released 2016 field vision brown drive across texas halfway house released prison barrett brown case included plot point season 2 u.s. tv series house cards brown serves advisory board international modern media institute
[ 6424, 3486, 7656 ]
Test
1,904
2
Maliit:maliit maliit input method framework computers particular focus implementing virtual keyboards designed mostly touchscreen devices maliit allows inputting text without presence physical keyboard advanced features word correction prediction also available originating part meego maliit free software licensed lgpl maliit deployed standard component nokia n9 kde plasma active luneos olpc devices ubuntu touch maliit originally developed part meego nokia eventually shipped part meego handset “ day 1 ” software platform meego project ended maliit transferred independent project free software consulting firm openismus first formally independent release 0.80.0 maliit 0.99 released switched qt 4 qt 5 among maliit ’ features plugin-based architecture word correction prediction multitouch context sensitive layouts running linux kernel handling input hardware relies evdev maliit adopted x11 well wayland
[ 1202, 520, 5803, 3082, 4759, 5571, 6440, 7162, 1377, 7848 ]
Test
1,905
1
Enhanced_entity–relationship_model:enhanced entity–relationship model enhanced entity–relationship eer model extended entity–relationship model computer science high-level conceptual data model incorporating extensions original entity–relationship er model used design databases developed reflect precisely properties constraints found complex databases engineering design manufacturing cad/cam telecommunications complex software systems geographic information systems gis eer model includes concepts introduced er model additionally includes concepts subclass superclass is-a along concepts specialization generalization furthermore introduces concept union type category used represent collection objects union objects different entity types eer model also includes eer diagrams conceptual models accurately represent requirements complex databases entity type subtype subclass entity type x every necessarily x subclass entity inherits attributes relationships superclass entity property called attribute relationship inheritance subclass entity may specific attributes relationships together attributes relationships inherits superclass common superclass example vehicle superclass along subclasses car truck number common attributes car truck would part superclass attributes specific car truck max payload truck type ... would make two subclasses textbooks discussing eer implementation using purely relational databases booklet discussing eer implementation using object-oriented object-relational databases textbook discussing implementation relational object-relational databases shorter survey articles
[ 3928, 784, 6604, 7330, 6594, 7341, 6345, 5561, 906, 4944, 5217, 6098, 4054, 736, 6543, 6636, 2663, 2937, 2124, 6364, 6737, 3119, 3801, 6739, 7999, 4252, 5943, 1768, 2054, 5419, 6932, 6386, 7757, 684, 6390, 5338, 5778, 7937, 7303, 6144, ...
Test
1,906
7
WANdisco:wandisco wandisco plc. dually headquartered sheffield england san ramon california us public software company specialized area distributed computing development offices san ramon california sheffield england belfast northern ireland wandisco corporate contributor hadoop subversion open source projects name wandisco acronym wide area network distributed computing initially offering replication solution distributed teams using concurrent versions system cvs expanded include apache subversion svn multisite plus 2006 git git multisite 2013 gerrit gerrit multisite 2014 2012 wandisco acquired altostor entered big data market non-stop hadoop product altostor founders dr. konstantin shvachko jagane sundar joined wandisco part acquisition helped develop company next generation hadoop product released 2015 wandisco fusion wandisco distributed coordination engine dcone shared component wandisco clustering products dcone system allows multiple instances application operate independent hardware without sharing resources application servers kept synchronisation dcone regardless whether servers lan globally separated accessible wide area network wan wandisco replication technology work yeturu aahlad previously worked sun netscape ibm involved developing corba framework aahlad theorized model effective active replication wan development dcone wandisco taken paxos algorithm baseline added innovations relevant mission-critical high transaction volume distributed environments wandisco provides replication products cvs apache subversion git gerrit apache hadoop amazon web services microsoft azure google cloud platform addition company offers support consultancy training services company website lists companies arm avaya bally technologies barclays blackrock bosch cisco dell emc disney fujitsu general electric honda juniper networks pitney bowes april 2016 wandisco announced ibm signed deal oem wandisco fusion deal allows ibm rebrand fusion ibm big replicate plays important role ibm big data cloud computing strategy including movement data on-premises software cloud july 2018 wandisco announced filed new patent blockchain company claims patent enables effective permissioned blockchain transactions underlying algorithmic mechanism mechanism enables throughput achieved orders magnitude higher public blockchains 2011 wandisco announced ubersvn deployment apache subversion included web based management console ability add additional application lifecycle management features ubersvn download available mid-2013 september 2013 wandisco announced official sponsor uc berkeley amplab five-year collaborative effort university california berkeley wandisco one apache hadoop committer staff jagane sundar february 2013 wandisco released free distribution hadoop containing additional components developed wandisco wandisco involved apache subversion open source project 2008 2015 employed several contributors work subversion project time wandisco provides subversion binary downloads windows centos debian oracle linux rhel suse linux ubuntu mac os x solaris via website binaries use default package management system linux distribution december 2010 wandisco announced intention develop features subversion project specifically aimed improving branching merging functionality apache foundation subversion developers said announcement contained unfounded claims insinuations community involvement lack development features according apache features already worked time david richards wandisco clarified position subversion community followed announcing wandisco sponsorship ongoing support work apache software foundation
[ 6430, 1155, 5239, 2680, 5064, 4783, 3463 ]
Test
1,907
4
Hacktivity:hacktivity hacktivity conference traditional event budapest hungary official alternative representatives information security profession meet interested field framework time informal informative sometimes in-depth technological participants official alternative experts information security profession universities colleges professors participating training young people participating high level education/university college students professional trade unions
[]
Test
1,908
9
Visual_programming_language:visual programming language computing visual programming language vpl programming language lets users create programs manipulating program elements graphically rather specifying textually vpl allows programming visual expressions spatial arrangements text graphic symbols used either elements syntax secondary notation example many vpls known dataflow diagrammatic programming based idea boxes arrows boxes screen objects treated entities connected arrows lines arcs represent relations vpls may classified according type extent visual expression used icon-based languages form-based languages diagram languages visual programming environments provide graphical iconic elements manipulated users interactive way according specific spatial grammar program construction general goal vpls make programming accessible novices support programmers three different levels visually transformed language non-visual language superimposed visual representation naturally visual languages inherent visual expression obvious textual equivalent current developments try integrate visual programming approach dataflow programming languages either immediate access program state resulting online debugging automatic program generation documentation dataflow languages also allow automatic parallelization likely become one greatest programming challenges future visual basic visual c visual j etc languages microsoft visual studio ide visual programming languages representation algorithms etc textual even though ide embellishes editing debugging activities rich user interface similar consideration applies rapid application development environments typically support form designer sometimes also graphical tools illustrate define control flow data dependencies parsers visual programming languages implemented using graph grammars following contains list notable visual programming languages many modern video games make use behavior trees principle family simple programming languages designed model behaviors non-player characters behaviors modeled trees often edited graphical editors article originally based material free on-line dictionary computing used update needed
[ 6507, 4575, 4759, 4033, 5464, 7337, 3772, 3944, 5282, 6888, 3852, 6712, 3784, 3966, 1102, 834, 405, 1569, 4609, 5145, 7557, 7841, 2866, 1033, 4078, 7664, 5190, 5420, 154, 336, 5171, 6669, 4543, 7860, 1890, 3915, 6497, 6498, 2709, 1803, ...
Test
1,909
2
Corel_Linux:corel linux corel linux also called corel linuxos debian-based operating system made corel began beta testing september 21 1999 released public november 15 1999 mainly competed windows 98 windows 2000 microsoft plus mac os 9 apple corel later discontinued distribution remove former corel open source development website march 2002 corel use kfm standard kde file manager instead used file manager cfm along modifications corel made made operating system incompatible versions linux much competitors industry time relatively little linux software available serious hurdle corel users operating system second edition released august 15 2000 download regular deluxe editions latter bundled corel wordperfect office linux xandros purchased corel linux source code development team corel scrapped linux business august 2001 however corel corporation stockholder xandros corel linux following system requirements corel linux featured file manager close look feel windows explorer file manager provided integrated windows smb network browser company also advertised operating system compatible flagship software key selling point corel linux compatibility company wordperfect applications eponymous word processor eighth version given away personal customers hopes would purchase wordperfect office 2000 suite added quattro pro corel presentations corelcentral programs deluxe version suite added paradox database manager latter omits level editor network mode scenarios original game 'limited edition corel linux deluxe came instead railroad tycoon ii unlike free wordperfect 8 office suite written natively linux instead consisted windows programs powered corel fork wine compatibility layer result linux suite suffered performance penalty compared windows version wordperfect 8 wordperfect suite corel adapted graphics applications run linux using wine consisted coreldraw stylized coreldraw suite eponymous program paid software corel photo-paint available free download corel smartmove part corel linux application provided following smartmove built around wine libraries read windows registry settings windows applications thus able migrate smartmove core libraries created wrapper windows registry easily look settings smartmove looks existing microsoft windows installations machine looks little individual users offers transfer application settings analogous programs linux understands deal internet explorer netscape cookies bookmarks outlook mirc icq settings variety desktop preferences including wallpaper color scheme even mouse handedness tried settings since windows installation fairly new n't much check death corel linux application faded away longer maintained however similar functionality available least ubuntu installing dual-boot configuration machine already windows
[ 5200, 4759, 1629, 6170, 7618, 3444, 7251, 7253, 474, 7075, 5571, 1941, 314, 5232, 2758, 1663, 2864, 6209, 1670, 3996, 6761, 1128, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6060, 3751, 6317, 7954, 6244 ]
Test
1,910
4
Mondo_Rescue:mondo rescue mondo rescue free disaster recovery software supports linux i386 x86-64 ia-64 freebsd i386 packaged multiple distributions red hat rhel fedora centos opensuse sles mandriva debian ubuntu gentoo also supports tapes disks usb devices network cd/dvd backup media multiple filesystems lvm software hardware raid restoration may done physical media including obdr tape support cd/dvd/usb media network pxe mentioned free software directory emphasis stability ease use according ohloh mondorescue development worth 6m mondo uses linux distribution called mindi provide favorable post boot environment performing data restore unlike disk clone solutions ready use live cd provided mondo rescue instead included mindi package create custom turn-key live cd/dvds using exact linux kernel configuration system backed effect bootable dvd/cd customized computer backed objective reduce possibility missing device drivers kernel incompatibilities may arise using generic vanilla linux kernel pre-built live dvd/cd
[ 4386, 1254, 2680, 5571, 6586, 4554, 7246, 3134, 578, 1435, 4985 ]
Test
1,911
7
CloudLocker:cloudlocker cloudlocker personal cloud device created stoamigo based paradise nevada cloudlocker offers cloud storage data conversion file sharing powered stoamigo platform unlike public cloud service involves third party access users ’ digital media cloudlocker on-premises cloud solution stays user ’ possession connects home office network via plug play interface cloud computing storage widely acknowledged next big thing many people wary privacy concerns uncomfortable storing personal data pictures videos somebody else ’ server core challenge data privacy share data protecting personal information public cloud storage services google amazon microsoft dropbox offer level protection personal information would available information kept home office according report world privacy forum report found “ information stored business individual third party may fewer weaker privacy protections information possession creator information. ” report goes state “ government agencies private litigants may able obtain information third party easily creator information. ” cloudlocker one many different personal cloud options market today cloudlocker falls server device cloud category personal cloud solutions cloudlocker attempts address internet privacy issue providing personal cloud server users keep sole possession gives global access remote browser user ’ internet-enabled devices files stored cloudlocker accessed pc laptop smartphone tablet via stoamigo platform stoamigo account stoamigo desktop web mobile applications designed sharing viewing streaming digital media cloudlocker used file sharing anyone even stoamigo account users decide share digital media user set permissions recipients view-only download share private file files shared anyone else users share files folders lists multiple contacts customize permission settings person user arrange receive notifications viewed downloaded shared files thus establish audit trail access specific files folders users may modify settings shared files time share choose retract shared files everyone selected recipients users create listen playlists watch video files continuous play devices streaming cloudlocker downloading required native media player streams files cloudlocker dlna compatible user able view media content cloudlocker dlna tv dlna device cloudlocker comes usb ports user attach external hard drives cloudlocker use space additional storage thereby making storage space limitless stoamigo android ios app option create qr code mobile device share file folder list files music playlist cloudlocker stoamigo also available europe
[ 2961, 7102, 5571, 7083, 3943, 578, 1589, 5889 ]
Test
1,912
5
CalDAV:caldav calendaring extensions webdav caldav internet standard allowing client access scheduling information remote server extends webdav http-based protocol data manipulation specification uses icalendar format data access protocol defined allows multiple client access information thus allowing cooperative planning information sharing many server client applications support protocol extensions caldav automated scheduling also standardized caldav specification first published 2003 internet draft submitted internet engineering task force ietf lisa dusseault march 2007 caldav specification finished published ietf rfc 4791 authored cyrus daboo apple bernard desruissaux oracle lisa dusseault commercenet caldav designed implementation collaborative software client server needs maintain access share collections events developed open standard foster interoperability software different implementers architecture caldav partially inherited underlying specifications organizes data events tasks free-busy info notes directories collections multiple items resources reside resources collections accessed one users using standard http dav semantics detect conflicting changes provide locking access control concept acls used operation view edit delete etc denied granted per user therefore specification requires caldav servers must support webdav access control protocol rfc 3744 calendar resources must use icalendar format allows server understand process data parsing icalendar items necessary server support number calendaring-specific operations free-busy time reports expansion recurring events functionality user may synchronize calendar caldav server share among multiple devices users protocol also supports non-personal calendars calendars sites organizations list caldav clients includes list caldav server includes
[ 5847, 3172, 2298, 5505, 2327, 1900, 7975, 5184, 4045 ]
Test
1,913
7
SalesforceIQ:salesforceiq salesforceiq formerly relateiq subsidiary salesforce.com american software company based palo alto california company software involves relationship intelligence platform combines data email systems smartphone calls appointments augment replace standard relationship management tools database solutions scans 10,000 emails calendar entries data points per minute first run july 2014 salesforce.com announced plans acquire company close 400 million company founded july 2011 adam evans steve loughlin end july 2013 company hired data scientist dj patil vp product leadership team also includes vp sales armando mann recent head sales dropbox former google executive vp marketing elise bergeron formerly facebook unlike traditional relationship management systems rely data input users keep teams informed run predictive analytics salesforceiq platform automatically isolates analyzes user professional emails interactions combining data information gleaned sources linkedin facebook salesforceiq leverages data science comb emails analyze offer reminders suggestions busy salespeople march 2014 company released closest connections feature automates normally time-consuming—and potentially erroneous—sales process identifying warm introductions potential prospects based real activity happening within team email inboxes phones calendars social networks part 2015 dreamforce conference relateiq rebranded salesforceiq
[ 7037, 330 ]
Train
1,914
4
UniKey:unikey unikey technologies alternative access control company based united states designs licenses keyless entry technology worldwide first product partnership kwikset kēvo bluetooth-enabled deadbolt door lock unikey technologies founded 2010 florida phil dumas serves president chief executive officer electrical engineering degree university central florida background biometric security dumas part team launched smartscan first mass-market biometric residential deadbolt lock started unikey effort create dependable convenient way access everything unikey technologies first came public attention may 2012 dumas appeared abc reality series shark tank unikey received investment offers five judges show including offer 500,000 40 equity stake mark cuban kevin o'leary dumas accepted offer ultimately unable come terms show 2013 unikey raised approximately 2.6 million funding led ff venture capital year unikey announced licensing deal kwikset largest residential lock manufacturer united states one largest world manufacture distribute kēvo residential smart lock using unikey technology launched 2013 kēvo first bluetooth-enabled touch-to-open smart lock kēvo ability detect user compatible smartphone tablet via app lock unlock door deadbolt lock senses user phone nearby outside phone emits low-energy bluetooth signal allowing door unlocked lock face touched making unnecessary interact phone order open door users grant unrestricted temporary access phones well kēvo also comes keychain fob provides touch-to-open function authorized smart phone prime security feature product unikey inside/outside intelligence detects whether verified device currently inside outside home authorized device known inside house unauthorized users unable activate kēvo outside system acts one-way filter lets authorized users pass entryway june 2014 unikey miwa lock company announced partnership offer keyless entry hotels unikey developed touch-to-open passive keyless entry system integrated miwa existing radio-frequency identification hospitality locks keys activated smartphone apps guests check app sent room number phone enabled act virtual key following miwa partnership unikey making way commercial access control industry partnerships grosvenor technologies nortek security control company also expanded international reach partnership uk home security company era
[]
Train
1,915
3
LibATA:libata libata library used inside linux kernel support ata host controllers devices libata provides ata driver api class transports ata atapi devices scsi ata translation ata devices according t10 sat specification features include power management s.m.a.r.t. pata/sata atapi port multiplier hot swapping ncq
[ 1254, 1989 ]
Validation
1,916
5
Connection-oriented_communication:connection-oriented communication connection-oriented communication network communication mode telecommunications computer networking communication session semi-permanent connection established useful data transferred stream data delivered order sent alternative connection-oriented transmission connectionless communication example datagram mode communication used ip udp protocols data may delivered order since different network packets routed independently may delivered different paths connection-oriented communication may circuit switched connection packet-mode virtual circuit connection latter case may use either transport layer virtual circuit protocol tcp protocol allowing data delivered order although lower layer switching connectionless may data link layer network layer switching mode data packets belonging traffic stream delivered path traffic flows identified connection identifier rather complete routing information allowing fast hardware based switching connection-oriented protocol services often always reliable network services provide acknowledgment successful delivery automatic repeat request functions case missing data detected bit-errors atm frame relay mpls examples connection-oriented unreliable protocol circuit switched communication example public switched telephone network isdn sonet/sdh optical mesh networks intrinsically connection-oriented communications systems circuit mode communication provides guarantees data arrive constant bandwidth constant delay in-order delivery bit stream byte stream provided switches reconfigured circuit establishment phase packet switched communication may also connection-oriented called virtual circuit mode communication due packet switching communication may suffer variable bit rate delay due varying traffic load packet queue lengths connection-oriented communication necessarily reliable protocols keep track conversation connection-oriented protocols sometimes described stateful connection-oriented transport layer protocols provide connection-oriented communications connectionless communications systems connection-oriented transport layer protocol tcp may based connectionless network layer protocol ip still achieves in-order delivery byte-stream means segment sequence numbering sender side packet buffering data packet reordering receiver side sequence numbering requires two-way synchronization segment counters three-step connection establishment phase connection-oriented packet switched data link layer network layer protocol data sent path communication session protocol identifies traffic flows channel/data stream number often denoted virtual circuit identifier vci rather complete routing information packet source destination addresses used connectionless datagram switching conventional ip routers connection-oriented communication routing information may provided network nodes connection establishment phase vci defined tables node thus actual packet switching data transfer taken care fast hardware opposed slow software based routing typically connection identifier small integer 10 bits frame relay 24 bits atm example makes network switches substantially faster routing tables simple look-up tables trivial implement hardware impact great fact even characteristically connectionless protocols ip traffic tagged connection-oriented header prefixes e.g. mpls ipv6 built-in flow id field atm frame relay example examples connection-oriented unreliable data link layer protocols also reliable connectionless protocols well ax.25 network layer protocol passes data i-frames combination rare reliable-connectionless uncommon modern networks connection-oriented protocols handle real-time traffic substantially efficiently connectionless protocols especially short constant length packets atm yet replaced ethernet carrying real-time isochronous traffic streams especially heavily aggregated networks like backbones motto bandwidth cheap fails deliver promise experience also shown over-provisioning bandwidth resolve quality service issues hence 10- gigabit ethernet expected replace atm time connection-oriented protocols designed altered accommodate connection-oriented connectionless data examples connection-oriented packet mode communication i.e virtual circuit mode communication
[ 1618, 3855, 7637, 6908, 5492, 3383, 3799, 1952, 585, 8108, 3821, 7765, 1981, 3236, 7590, 1988, 4378 ]
Validation
1,917
8
TreeRing:treering treering silicon valley ca-based technology company providing on-demand digital printing customizable school yearbooks us canada one first start-ups changed traditional yearbook industry company designed free software social-networking features allowing creation personalized yearbooks offered new business model eliminating financial cost yearbooks schools treering publishing platform allows high school community collaborate web-based yearbooks saved using cloud storage users add share comment photos memories events students parents customize copy school yearbook uploading content personalized pages result addition print version schools opt share online yearbook company business model impose financial obligation schools signing treering unlike traditional publishers business models based offset printing techniques minimum orders ordering paying yearbooks done online 2012 treering printed 125,000 yearbooks raised 3.6 million first round venture funding silicon valley list company investors included mike mccue flipboard co-founder rich barton expedia zillow founder second avenue partners cedar grove investments others 2013 company served 2,000 schools across us anticipating production 200,000 yearbooks company prints yearbooks recycled paper plants tree every printed copy
[ 5889 ]
Test
1,918
2
Phoenix-RTOS:phoenix-rtos phoenix-rtos real-time operating system designed internet things appliances main goal system facilitate creation software defined solutions phoenix-rtos successor phoenix operating system developed 1999-2001 pawel pisarczyk department electronics information technology warsaw university technology phoenix originally implemented ia-32 microprocessors adapted arm7tdmi processor 2003 powerpc 2004 system available gpl license decision abandon development phoenix write phoenix-rtos scratch taken creator 2004 2010 phoenix systems company established aiming commercialize system phoenix-rtos 2.0 based monolithic kernel initially versions ia-32 processor configurable esi-risc developed cooperation nxp semiconductors phoenix-rtos 2.0 also adapted vybrid arm cortex-a5 platform version equipped prime phoenix-prime g3-plc phoenix-g3 protocol support used smart grid networks phoenix-rtos runs applications designed written unix operating system phoenix-rtos version 3.0 based microkernel expected completed 2017 geared towards measuring devices low power consumption main problem first implementation low kernel modularity difficulties management process software development device drivers file system drivers phoenix-rtos equipped haas hardware software modules allow implementation rich devices functionality e.g modems existing haas modules include 2016 energa-operator based poland installed 6.6k data concentrator units balancing meter functionality network based phoenix-rtos license agreements use system mass production smart meters signed
[ 5571, 5021, 5232, 4336 ]
Test
1,919
4
AppShield:appshield appshield world first application firewall appshield conceptualized eran reshef gili raanan introduced market perfecto technologies sanctum summer 1999 appshield product first product inspect incoming hypertext transfer protocol requests block malicious attacks based dynamic policy composed analyzing outgoing html pages product faced many market adoption challenges sanctum forced introduce complementary solution named appscan demonstrate need application security 2004 f5 networks acquired appshield intellectual properties sanctum discontinued technology gartner ’ magic quadrant mq 2015 web application firewalls estimates global waf market size big 420 million 24 percent annual growth
[ 230, 3637, 1566, 3383, 1805 ]
Test
1,920
3
VESA_Display_Power_Management_Signaling:vesa display power management signaling vesa display power management signaling dpms standard vesa consortium power management video monitors example usage includes turning putting monitor standby period idle time save power commercial displays also incorporate technology vesa issued dpms 1.0 1993 basing work united states environmental protection agency epa earlier energy star power management specifications subsequent revisions included future vesa bios extensions standard defines signal h-sync v-sync pins standard svga monitor trigger monitor power saving capabilities dpms defines four modes normal standby suspended state power may still drawn order power indicator lights standard
[ 6307, 6055, 2509 ]
Validation
1,921
2
Samsung_Wave_II_S8530:samsung wave ii s8530 samsung wave ii s8530 samsung wave ii successor samsung wave s8500 smartphone running bada 1.2 operating system designed samsung commercially released october 2010 wave slim touchscreen phone powered samsung hummingbird cpu s5pc110 includes 1 ghz arm cortex-8 cpu powerful built-in powervr sgx 540 graphics engine super lcd screen 720p high-definition video capture capabilities shortage super amoled screens one primary reasons release model design phone made mostly metal alloy measured 10.9 mm thick terms form factor slate style featuring 3 physical buttons front call reject/ shutdown main menu button screen screen capacitive touchscreen super lcd anti-smudge oleophobic coating top scratch-resistant tempered-glass gorilla glass display touch panel shown capable resisting extreme friction scratch-resistant screen resolution 800x480 wvga processor phone features 1 ghz soc internally contains arm cortex a8 cpu core identical arm cortex cpu core used apple a4 package package soc phone graphics engine sgx 540 said capable generating 90 million triangles per second soc used samsung galaxy 256mb+128mb ram hardware samsung wave s8500 camera phone features 5 megapixel supports 2592 x 1944 pixels along autofocus led flash geo-tagging face blink detection image stabilization touch focus etc features various shooting modes beauty shot smile shot continuous panorama vintage shot camcorder able shoot 720p hd recording 1280x720 30 fps flash well also able record slow motion video 320x240 120 fps flash features feature includes a-gps 2 gb/8 gb internal storage microsdhc slot additional 32 gb also magnetometer proximity sensor accelerometer 5.1-channel surround sound mobile theater music recognition fake call service smart search social hub first phone support bluetooth version 3.0 addition bluetooth 3.0 phone also features wi-fi 802.11 b/g/n hsdpa 3.2 mbit/s hsupa 2 mbit/s phone available european/asia 3g bandings north american 3g bandings keep mind north american 3g bandings version phone limited availability available us user interface phone one smartphone feature samsung bada operating system platform ui samsung touchwiz 3.0 touchwiz 3.0 like 2 predecessors touchwiz 2.0 touchwiz utilises widgets 3 notable widgets pre-installed touchwiz 3.0 daily briefing includes essential information weather finance ap mobile news schedule feeds updates buddies allows users call send texts read facebook/twitter feeds favourite contacts users allowed 10 homescreens add widgets applications terms internet browser samsung wave pre-installed dolphin browser v2.0 based webkit browser supports flash disabled default improve page load time default phone comes picsel viewer capable reading .pdf microsoft office file formats users selected countries buy download picsel office editor samsung apps samsung apps users also download applications games widgets application store software includes gps software comes phone lbs route 66 palringo im facebook twitter social hub mini diary daily briefing memo video player fm radio media browser voice recorder e-mail pre-installed asphalt5 media support mp3 aac aac+ e-aac+ wma amr wav mp4 flac mpeg4 h.263 h.264 wmv avi divx xvid mkv android porting due many owners phone disliking bada software many people worked porting popular android o.s wave 2 ported versions known froyo gingerbread ice cream sandwich jelly bean kitkat however still developed features gps may limited function intended samsung site reviews support forums
[ 7030, 136, 2017, 5571, 1237, 1582, 6132, 740 ]
Validation
1,922
3
RISC_Single_Chip:risc single chip risc single chip rsc single-chip microprocessor developed fabricated international business machines ibm rsc feature-reduced single-chip implementation power1 multi-chip central processing unit cpu implemented power instruction set architecture isa used entry-level workstation models ibm rs/6000 family model 220 230 rsc operated frequencies 33 45 mhz three execution units fixed point unit floating point unit branch processor 8 kb unified instruction data cache like power1 memory controller i/o tightly integrated functional units responsible functions memory interface unit sequencer unit residing die processor rsc contains nine functional units fixed-point execution unit fxu floating-point execution unit fpu memory management unit mmu memory interface unit miu sequencer unit common on-chip processor unit cop instruction fetch unit instruction queue dispatch unit fixed point unit executes integer instructions generates addresses load store operations portions branch instructions three-stage pipeline consisting decode execute writeback stages instructions require several cycles execute stage completed floating point unit executes floating point instructions unlike power1 rsc register renaming capability due limited die area unit must fit save die area floating point multiply-add array 32 bits wide perform 64-bit double-precision operations operands broken two instruction passes twice multiply-add array floating point pipeline consists four stages decode multiply add writeback rsc 8 kb unified cache instead separate instruction large data caches like power1 unified cache two-way set associative uses store-through policy reload store miss least recently used lru replacement policy cache line size 64 bytes cache line sectored four quadwords 16 bytes quadword given valid bit cache directory cycle four words read two doublewords written memory data bus 72 bits wide 64 bits used data path 8 bits used error correcting code ecc memory interface unit manages bus performs ecc checks data coming processor ecc logic capable correcting single-bit errors compared power1 rsc memory data bus narrower uses industry standard simms instead custom memory cards rsc contained approximately one million transistors 14.9 mm 15.2 mm 226.48 mm die fabricated ibm complementary metal-oxide semiconductor cmos process minimal feature size 0.8 μm three levels wiring packaged 36 mm 36 mm ceramic pin grid array module 201 signal pins required 3.6 volt power supply consumed 4 watts operation 33 mhz
[ 2448, 3747, 1237, 3156, 7499, 3674 ]
Test
1,923
7
Oracle_Grid_Engine:oracle grid engine oracle grid engine previously known sun grid engine sge codine computing distributed networked environments grd global resource director grid computing computer cluster software system otherwise known batch-queuing system acquired part purchase gridware improved supported sun microsystems later oracle open source versions multiple commercial versions technology initially sun later oracle univa corporation october 22 2013 univa announced acquired intellectual property trademarks grid engine technology univa take support.. univa since evolved grid engine technology e.g improving scalability demonstrated 1 million core cluster aws announced june 24 2018 original grid engine open-source project website closed 2010 versions technology still available original sun industry standards source license projects forked original project code known son grid engine open grid scheduler univa grid engine grid engine typically used computer farm high-performance computing hpc cluster responsible accepting scheduling dispatching managing remote distributed execution large numbers standalone parallel interactive user jobs also manages schedules allocation distributed resources processors memory disk space software licenses grid engine used foundation sun grid utility computing system made available internet united states 2006 later becoming available many countries early version public cloud computing facility predating amazon aws instance feature sets date last sun releases 2009 earlier current feature information found web sites open source forks univa grid engine features 6.2 features sge include grid engine runs multiple platforms including aix bsd freebsd netbsd openbsd hp-ux irix linux mac os x solaris super-ux tru64 windows via sfu interix sua microsoft windows services unix execution hosts z/os progress typical grid engine cluster consists master host one execution hosts multiple shadow masters also configured hot spares take role master original master host crashes univa providing commercial support training univa grid engine oracle grid engine description historic options sun provided support contracts commercial version grid engine unix platforms windows professional services consulting training support provided sun partners sun partners georgetown university deliver grid engine administration classes bioteam runs short sge training workshops 1 2 days long users obtained community support grid engine mailing lists grid engine workshops held 2002 2003 2007 2009 2012 regensburg germany contains historic information recent deployment information specifically regarding commercial users available univa notable deployments sge include 2000 sun acquired gridware privately owned commercial vendor advanced computing resource management software offices san jose calif. regensburg germany later year sun offered free version gridware solaris linux renamed product sun grid engine 2001 sun made source code available adopted open source development model ports mac os x *bsd contributed non-sun open source developers 2010 purchase sun oracle grid engine 6.2 update 6 source code included binaries changes put back project source repository response grid engine community started open grid scheduler project continue develop maintain free implementation grid engine january 18 2011 announced univa recruited several principal engineers former sun grid engine team univa would developing forked version grid engine newly announced univa grid engine include commercial support would compete official version oracle grid engine oct 22 2013 univa announced acquired intellectual property trademarks pertaining grid engine technology univa take support oracle grid engine customers contains historic information products solutions longer available number sge add-ons available
[ 5362, 2362, 5890, 6690, 5983, 1254, 4759, 1256, 1258, 900, 6505, 6270, 908, 7535, 2651, 1185, 2299, 5571, 4418, 2848, 2033, 578, 7781, 1105, 4967, 4159, 5587, 1023, 4800, 5064, 6298, 418, 4624, 7114, 7930, 1878, 5604, 3820, 2961, 72, 49...
Test
1,924
2
Tomoyo_Linux:tomoyo linux tomoyo linux stylised tomoyo linux linux kernel security module implements mandatory access control mac tomoyo linux mac implementation linux used increase security system also useful purely systems analysis tool launched march 2003 sponsored ntt data corporation march 2012 tomoyo linux focuses system behaviour tomoyo linux allows process declare behaviours resources needed achieve purpose protection enabled tomoyo linux restricts process behaviours resources allowed administrator main features tomoyo linux include tomoyo merged linux kernel mainline version 2.6.30 2009 june 10 currently one four standard linux security modules lsm along selinux apparmor smack tomoyo linux project started patch linux kernel provide mac porting tomoyo linux mainline linux kernel required introduction hooks lsm designed developed specifically support selinux label-based approach however hooks needed integrate remaining mac functionality tomoyo linux consequently project following two parallel development lines
[ 3256, 2182, 3613, 7528, 7532, 5744, 6443, 2942, 6117, 4341, 5762, 412, 415, 3666, 2970, 7956, 5453, 5460, 7242, 1535, 6892, 1176, 1933, 5829, 1208, 6211, 4435, 5865, 7669, 3404, 1227, 1596, 165, 7312, 1607, 5884, 1991, 890, 3084, 6984, ...
Test
1,925
2
RemoteFX:remotefx microsoft remotefx microsoft brand name covers set technologies enhance visual experience microsoft-developed remote display protocol remote desktop protocol rdp remotefx first introduced windows server 2008 r2 sp1 based intellectual property microsoft acquired continued develop since acquiring calista technologies part overall remote desktop services workload remotefx components introduced windows server 2008 r2 sp1 include windows server 2012 following components added remotefx addition following components updated windows server 2016 rdp 10 following components added remotefx remotefx media streaming replaced multi media redirection mmr note mmr completely removed rdp 10 given remotefx media streaming works types video content whereas mmr worked windows server 2008 r2 remotefx codec could leveraged session hosting remote desktop session hosts vdi scenarios remote desktop virtualization hosts remotefx vgpu remotefx usb redirection features could used vdi scenarios remote desktop virtualization hosts windows 10 version 1511 brings remotefx client hyper-v removing dependency remote desktop services role generation 2 vms windows server 2012 r2 support remotefx windows server 2016 added support windows server 2012 features remotefx exception vgpu used without physical gpu present server gpu present server synthetic software-emulated gpu used render content gpu present server used hardware accelerate graphics via remotefx vgpu feature remotefx vgpu following requirements windows server 2008 r2 sp1 tested twelve virtual machines per gpu total twenty-four virtual machines two physical gpus although gpu meeting requirements capable using remotefx windows server catalog carries additional qualification define requirements server-qualified gpus specifications define gpus configuration requirements provide vm performance targets graphics cards meet typically professional workstation products ati/amd firepro v5800 v5900 v7800 v7900 v8800 v9800 nvidia quadro 2000 3800 4000 4800 5000 5800 6000 quadro fx 2800m 880m quadroplex 7000 tesla m2070q servers running remotefx vgpu need accommodate graphics cards either larger power supplies pcie slots alternatively connect existing servers external pcie expansion chassis
[ 3180, 7508, 6731, 2085 ]
Validation
1,926
4
NSA_Playset:nsa playset nsa playset open source project inspired nsa ant catalog create accessible easy use tools security researchers surveillance tools recreated off-the-shelf open-source hardware software thus far nsa playset consists fourteen items code instructions found online project ’ homepage initial nsa ant catalog leak published der spiegel 2013 michael ossman founder great scott gadgets gave shout security researchers start working tools mentioned catalog recreate name nsa playset came originally dean pierce also contributor twilightvegetable gsm nsa playset anyone invited join contribute device requisites addition nsa playset similar already existing nsa ant project ease use silly name based original tool ’ name silly name requisite rule michael ossman came example given project ’ website example project similar foxacid maybe could call coyotemeth ease use part stems also nsa playset motto 10 year old ’ n't count
[ 2823, 6014 ]
Validation
1,927
0
WYSIWYM_(interaction_technique):wysiwym interaction technique see meant wysiwym text editing interaction technique emerged two projects university brighton allows users create abstract knowledge representations required semantic web using natural language interface natural language understanding nlu technology employed instead natural language generation nlg used highly interactive manner text editor accepts repeated refinement selected span text becomes increasingly less vacuous authored semantics using mouse text property held evolving text refined set options derived nlg built-in ontology invisible representation semantic knowledge created used multilingual document generation formal knowledge formation task requires formally specified information two projects brighton worked field conceptual authoring lay foundation research development semantic web authoring tool swat tool explored means developing knowledge base without prior experience controlled natural language tools
[ 1718, 7290 ]
Train
1,928
4
DaveGrohl:davegrohl davegrohl brute-force password cracker macos originally created 2010 password hash extractor since evolved standalone distributed password cracker supports standard mac os x user password hashes md4 sha-512 pbkdf2 used since os x lion also extract formatted popular password crackers like john ripper latest stable release designed specifically mac os x lion mountain lion davegrohl supports dictionary incremental attacks dictionary attack scan number pre-defined wordlists incremental attack count character set finds password distributed mode uses bonjour find server nodes local network therefore requires configuration
[ 5194, 5272, 3151, 5571, 6157 ]
Test
1,929
3
Toobin':toobin' toobin nowiki /nowiki atari games video game originally released arcade game 1988 based recreational sport tubing later ported systems nes commodore amiga commodore 64 msx game boy color game player assumes control main characters bif jet guiding many winding rivers innertube game included part midway arcade treasures arcade party pak given remixed soundtrack also included 2012 compilation midway arcade origins game one 23 arcade games included midway arcade level pack lego dimensions unlocked using hidden arcade dock level follow lego brick road player competes river race computer another player player score increases swishing gates hitting characters cans collecting hidden letters spell toobin collecting treasures players try avoid obstacles pushing power-ups allow players carry multiple cans combinations gates increase score multiplier game three different classes five rivers total 15
[ 2136, 6380 ]
Test
1,930
7
Cloud_computing_architecture:cloud computing architecture cloud computing architecture refers components subcomponents required cloud computing components typically consist front end platform fat client thin client mobile device back end platforms servers storage cloud based delivery network internet intranet intercloud combined components make cloud computing architecture cloud computing architectures consist front-end platforms called clients cloud clients clients servers fat thick clients thin clients zero clients tablets mobile devices client platforms interact cloud data storage via application middleware via web browser virtual session zero ultra-thin client initializes network gather required configuration files tell os binaries stored entire zero client device runs via network creates single point failure network goes device rendered useless online network storage data stored accessible multiple clients cloud storage generally deployed following configurations public cloud private cloud community cloud combination three also known hybrid cloud order effective cloud storage needs agile flexible scalable multi-tenancy secure software-as-a-service saas service-model involves cloud provider installing maintaining software cloud users running software cloud internet intranet users client machines require installation application-specific software since cloud applications run cloud saas scalable system administrators may load applications several servers past customer would purchase load copy application servers saas customer access application without installing software locally saas typically involves monthly annual fee software service provides equivalent installed applications traditional non-cloud computing delivery applications software service four common approaches flex tenancy considered user adaptive saas paradigm designated multi-input four way manifold models systems based simplified encryption methods target listed data sequences multiple passes simplicity concept makes flex tenancy saas popular among without informatics processing experience basic maintenance custodial staff franchise businesses development service web based community shared development tools equivalent locally installed development tools traditional non-cloud computing delivery development tools data service web based design construct cloud data accessed defined api layer daas services often considered specialized subset software service saas offering platform service cloud computing service provides users application platforms databases service equivalent middleware traditional non-cloud computing delivery application platforms databases infrastructure service taking physical hardware going completely virtual e.g servers networks storage system management existing cloud equivalent infrastructure hardware traditional non-cloud computing method running cloud words businesses pay fee monthly annually run virtual servers networks storage cloud mitigate need data center heating cooling maintaining hardware local level generally cloud network layer offer
[ 2961, 1762, 1982, 330, 5889 ]
Test
1,931
4
McAfee_VirusScan:mcafee virusscan mcafee virusscan antivirus program created maintained mcafee inc. formerly known intel security network associates prior available standalone package included mcafee livesafe mcafee antivirus plus mcafee total protection additionally bskyb mcafee previously produced sky broadband branded version virusscan offered free sky digital customers upon broadband modem installation mcafee livesafe integrates antivirus firewall anti-spyware/anti-ransomware capabilities mcafee also produces enterprise-level product named virusscan enterprise mcafee designed use larger networks designed make management antivirus software multiple computers easier unlike home-user edition enterprise edition consists client application networked computers server application system installs updates configures settings client programs clients controlled using included epolicy orchestrator epo unified console control virusscan mcafee products november 2008 mcafee announced virusscan mac 8.6 earlier versions used name virex developed hjc software key changes virusscan 8.6 included leopard compatibility universal binary package ran intel powerpc-based macs access scanning apple mail support tests virus bulletin additional independent consumer-organizations mcafee virusscan fared well frequently failing detect common viruses review virusscan 2006 cnet criticized product due pronounced performance hits two three real-world performance tests users reviewing product reported encountering technical problems older versions virusscan engine use available cpu cycles reviewers described customer support mcafee products lacking support staff slow respond unable answer many questions april 21 2010 beginning approximately 2 pm gmt erroneous virus definition file update mcafee affected millions computers worldwide running windows xp service pack 3 update resulted removal windows system file codice_1 machines causing machines lose network access cases enter reboot loop mcafee rectified removing replacing faulty dat file version 5958 emergency dat file version 5959 posted fix affected machines consumer knowledgebase august 2012 update mcafee antivirus caused protection become turned users lose internet connections mcafee criticized notifying users promptly issues learned mcafee though well-known continues mixed reviews industry sources company prepared 2015 release series address current market conditions repositioning includes voice facial recognition authentication cloud-based data security
[ 5452, 91, 4115, 4759, 7425, 3089, 2642, 4492, 4138, 385, 910, 1838, 6005, 2296, 2746, 4689, 5571, 6006, 1376, 3111, 4111, 4783, 578, 7087, 496, 6644, 5144, 7193, 3123, 142, 935, 3561, 7478, 5601, 6043, 6305, 2789, 8134, 4456, 6777, 4645...
Train
1,932
3
Philips_NMS-1205:philips nms-1205 br philips nms-1205 msx audio cartridge without bios using yamaha y8950 chip released 1984 nms-1205 sold europe msx personal computer cartridge featured fm sound synthesizer sound sampler adpcm 32 kb sample ram midi interface audio midi i/o connectors also built software music-box call musicbox fm sound synthesizer opl fm operator type-l compatible sound sampler 32kb sampleram adpcm unit midi interface in/out/thru built software music-box call musicbox note sold europe
[ 1052 ]
Test
1,933
2
LIO_(SCSI_target):lio scsi target computing linux-io lio target open-source implementation scsi target become standard one included linux kernel internally lio initiate sessions instead provides one logical unit numbers luns waits scsi commands scsi initiator performs required input/output data transfers lio supports common storage fabrics including fcoe fibre channel ieee 1394 iscsi iscsi extensions rdma iser scsi rdma protocol srp usb included linux distributions native support lio qemu/kvm libvirt openstack makes lio also storage option cloud deployments lio maintained datera inc. silicon valley vendor storage systems software january 15 2011 lio scsi target engine merged linux kernel mainline kernel version 2.6.38 released march 14 2011 additional fabric modules merged subsequent linux releases competing generic scsi target module linux scst narrower purpose providing linux iscsi target older iet iscsi enterprise target stgt scsi target framework modules also enjoy industry support scsi standard provides extensible semantic abstraction computer data storage devices become lingua franca data storage systems scsi t10 standards define commands protocols scsi command processor sent scsi cdbs electrical optical interfaces various implementations scsi initiator endpoint initiates scsi session scsi target endpoint waits initiator commands executes required i/o data transfers scsi target usually exports one luns initiators operate lio linux scsi target implements generic scsi target provides remote access data storage device types prevalent storage fabrics protocols lio neither directly accesses data directly communicate applications lio provides highly efficient fabric-independent fabric-transparent abstraction semantics numerous data storage device types lio implements modular extensible architecture around versatile highly efficient parallelized scsi command processing engine scsi target engine implements semantics scsi target lio scsi target engine independent specific fabric modules backstore types thus lio supports mixing matching number fabrics backstores time lio scsi target engine implements comprehensive spc-3/spc-4 feature set support high-end features including scsi-3/scsi-4 persistent reservations prs scsi-4 asymmetric logical unit assignment alua vmware vsphere apis array integration vaai t10 dif etc lio configurable via configfs-based kernel api managed via command-line interface api targetcli concept scsi target n't narrowly restricted physical devices scsi bus instead provides generalized model receivers logical scsi fabric includes scsi sessions across interconnects physical scsi bus conceptually scsi target provides generic block storage service server scenario backstores provide scsi target generalized access data storage devices importing via corresponding device drivers backstores n't need physical scsi devices important backstore media types result lio provides generalized model export block storage fabric modules implement frontend scsi target encapsulating abstracting properties various supported interconnect following fabric modules available fibre channel ethernet fcoe fabric module allows transport fibre channel protocol fcp traffic across lossless ethernet networks specification supported large number network storage vendors part technical committee t11 fc-bb-5 standard lio supports standard ethernet nics fcoe fabric module contributed cisco intel released linux 3.0 july 21 2011 fibre channel high-speed network technology primarily used storage networking standardized technical committee t11 international committee information technology standards incits qlogic fibre channel fabric module supports 4- 8-gigabit speeds following hbas fibre channel fabric module low-level driver lld released linux 3.5 july 21 2012 linux 3.9 following qlogic hbas cnas also supported makes lio first open source target support 16-gigabit fibre channel firewire sbp-2 fabric module enables linux export local storage devices via ieee 1394 systems mount ordinary ieee 1394 storage device ieee 1394 serial bus interface standard high-speed communications isochronous real-time data transfer developed apple firewire late 1980s early 1990s macintosh computers supported firewire target disk mode since 1999 firewire sbp-2 fabric module released linux 3.5 july 21 2012 internet small computer system interface iscsi fabric module allows transport scsi traffic across standard ip networks carrying scsi sessions across ip networks iscsi used facilitate data transfers intranets manage storage long distances iscsi used transmit data local area networks lans wide area networks wans internet enable location-independent location-transparent data storage retrieval lio iscsi fabric module also implements number advanced iscsi features increase performance resiliency multiple connections per session mc/s error recovery levels 0-2 erl=0,1,2 lio supports standard ethernet nics iscsi fabric module released linux 3.1 october 24 2011 networks supporting remote direct memory access rdma use iscsi extensions rdma iser fabric module transport iscsi traffic iser permits data transferred directly remote scsi computer memory buffers without intermediate data copies direct data placement ddp using rdma rdma supported infiniband networks ethernet data center bridging dcb networks via rdma converged ethernet roce standard ethernet networks iwarp enhanced tcp offload engine controllers iser fabric module developed together datera mellanox technologies first released linux 3.10 june 30 2013 scsi rdma protocol srp fabric module allows transport scsi traffic across rdma see networks 2013 srp widely used iser although limited scsi peer-to-peer protocol whereas iscsi fully routable srp fabric module supports following mellanox host channel adapters hcas srp fabric module released linux 3.3 march 18 2012 2012 c't magazine measured almost 5000 mb/s throughput lio srp target one mellanox connectx-3 port 56 gbit/s fdr mode sandy bridge pci express 3.0 system four fusion-io iodrive pci express flash memory cards usb gadget fabric module enables linux export local storage devices via universal serial bus usb systems mount ordinary storage device usb designed mid-1990s standardize connection computer peripherals also become common data storage devices usb gadget fabric module released linux 3.5 july 21 2012 targetcli user space single-node management command line interface cli lio supports fabric modules based modular extensible architecture plug-in modules additional fabric modules functionality targetcli provides cli uses underlying generic target library well-defined api thus cli easily replaced complemented ui metaphors gui targetcli implemented python consists three main modules detailed instructions set lio targets found lio wiki targetcli lio included linux distributions per default overview popular ones together initial inclusion dates
[ 3256, 4295, 2182, 3613, 7528, 7532, 4321, 5744, 6443, 2942, 6117, 4341, 5762, 412, 415, 3666, 2970, 7956, 5453, 5460, 7242, 1535, 1924, 6892, 1176, 5829, 500, 1208, 6211, 4435, 5865, 3734, 7669, 3404, 1227, 1596, 165, 2701, 5530, 7312, ...
Test
1,934
2
Peter_T._Brown:peter t. brown peter t. brown executive director free software foundation fsf 2005 early 2011 come business management finance background began working organization 2001 comptroller promoted executive director 2005 departure bradley kuhn replaced john sullivan since joined software freedom conservancy director treasurer oxford england worked past bbc new internationalist became american citizen august 2017
[ 966 ]
Train
1,935
4
Enterprise_Privacy_Authorization_Language:enterprise privacy authorization language enterprise privacy authorization language epal formal language writing enterprise privacy policies govern data handling practices systems according fine-grained positive negative authorization rights submitted ibm world wide web consortium w3c 2003 considered recommendation 2004 lawsuit filed zero-knowledge systems claiming ibm breached copyright agreement worked together 2001 2002 create privacy rights markup language prml epal based prml means zero-knowledge argued co-owner standard
[ 1998, 87, 1409 ]
Test
1,936
2
DirectFB:directfb directfb direct frame buffer software library small memory footprint provides graphics acceleration input device handling abstraction layer integrated windowing system support translucent windows multiple display layers top linux framebuffer without requiring kernel modifications directfb free open-source software subject terms gnu lesser general public license lgpl library allows developers alternative full x window system x11 server used unix-like operating systems directfb allows applications talk directly video hardware direct api speeding simplifying graphic operations often used games embedded systems developers circumvent overhead full x window system server implementation 2006 version directfb included software stack ce linux forum audio/video graphics specification v2 directfb host xdirectfb rootless x server implementation uses directfb windows x11 top-level windows xdirectfb interface mimics x11 interface directfb api simplify running applications written x11 directfb directfbgl opengl extension directfb/xdirectfb uses direct rendering infrastructure dri mesa 3d library support opengl hardware acceleration among products use directfb linuxtv ben nanonote unreleased palm foleo mobile companion webos operating system panasonic viera connect tvs philips tvs based jointspace
[ 4469, 7985, 5571, 7310, 1989, 7848, 578, 1435 ]
Test
1,937
3
SPARC_T3:sparc t3 sparc t3 microprocessor previously known ultrasparc t3 codenamed rainbow falls also known ultrasparc kt niagara-3 development multithreading multi-core cpu produced oracle corporation previously sun microsystems officially launched 20 september 2010 member sparc family successor ultrasparc t2 overall single socket multi-socket throughput increased t3 processor systems providing superior throughput half cpu socket requirements predecessor throughput spec cint2006 rate increased single socket t3-1 platform comparison predecessor t2+ processor dual-socket t5240 platform simulated web serving workloads dual-socket based sparc t3 systems benchmarked better performance quad-socket previous generation ultrasparc t2+ systems well competing dual quad socket contemporary systems online publication register incorrectly reported june 2008 microprocessor would 16 cores 16 threads september 2009 published roadmap instead showed 8 threads per core hot chips 21 conference sun revealed chip total 16 cores 128 threads according isscc 2010 presentation 16-core sparc soc processor enables 512 threads 4-way glueless system maximize throughput 6mb l2 cache 461gb/s 308-pin serdes i/o 2.4tb/s support required bandwidth six clock four voltage domains well power management circuit techniques optimize performance power variability yield trade-offs across 377mm die support ultrasparc t3 confirmed july 16 2010 arcbot twitter noted unpublished psarc/2010/274 revealed new -xtarget value ultrasparc t3 included opensolaris oracle openworld san francisco september 20 2010 processor officially launched sparc t3 dropping ultra prefix name accompanied new systems new reported benchmarks claiming world-record performance varied real-world application benchmarks released full system disclosures internationally recognized spec benchmarks also released full system disclosures oracle disclosed sparc t3 built 40 nm process sparc t3 features include release sparc t3 chip new brand oracle sparc t-series servers introduced market effectively replacing cmt ultrasparc t2/t2 plus machines previous sparc enterprise product line fewer physical products former server line refreshed t3 chip reducing total number servers respectively four like prior t1 t2 t2+ processors t3 supports hyper-privileged execution mode t3 supports 128 oracle vm server sparc domains feature formerly known logical domains sparc t3 processor effectively two t2+ processors single die t3
[ 3761, 6329, 1254, 1258, 2992, 1263, 1185, 7639, 2299, 4418, 7453, 3294, 3026, 4515, 4967, 6647, 418, 1590, 8024, 8138, 7499, 1237, 8145, 441, 971 ]
Test
1,938
4
NOP_slide:nop slide computer security nop slide nop sled nop ramp sequence nop no-operation instructions meant slide cpu instruction execution flow final desired destination whenever program branches memory address anywhere slide technique sees common usage software exploits used direct program execution branch instruction target known precisely notable applications include defensive programming strategies emc-aware programming nop slide function consists list canonical nop instructions presence code suspicious easy automatically detect reason practical nop slides often composed non-canonical nop instructions moving register adding zero instructions affect program state inconsequentially makes much difficult identify entropy nop slide dependent upon constraints placed determined certain registers use say set known value next use instructions manipulate arbitrarily may used nop slide additionally alignment nop slide instruction pointer deterministic multi-byte instructions used nop slide without regard results unaligned execution input providing attack vector nop slide payload introduced filtered accepting printable characters field possible instructions inclusion limited instructions part architecture extension sse may frequently irrelevant program state used nop slide targeting computer extension supported many techniques exist detect presence nop slides memory example 2005 greek researchers found easily detected checking whether memory image contains lengthy sequence bytes starting offset within sequence valid leads execution place
[ 1019, 7533, 3747, 8064, 5670, 3635, 1805 ]
Test
1,939
4
DarkMatter_(Emirati_company):darkmatter emirati company darkmatter founded united arab emirates uae 2014 2015 cybersecurity company company describes purely defensive company several whistleblowers alleged involved offensive cybersecurity cracking colloquially hacking including behalf emirati government darkmatter founded either 2014 2015 faisal al-bannai founder mobile phone vendor axiom telecom son major general dubai police force around 2014 zeline 1 wholly owned subsidiary darkmatter became active finland darkmatter public launch came 2015 2nd annual arab future cities summit time company advertised capabilities including network security bug sweeping promised create new secure mobile phone handset promoted digital defense intelligence service uae 2016 darkmatter replaced cyberpoint contractor project raven also 2016 darkmatter sought smartphone development expertise oulu finland darkmatter recruited several finnish engineers early 2018 darkmatter turnover hundreds millions us dollars eighty per cent work uae government related organisations including nesa developed smartphone model called katim arabic silence addition recruiting via conventional routes personal referrals stalls trade shows e.g black hat darkmatter headhunts staff u.s. national security agency poached competitors staff contracted uae government happened cyberpoint employees project raven confidential initiative help uae surveil governments militants human rights activists team included former u.s. intelligence agents applied training hack phones computers belonging project raven victims operation based converted mansion abu dhabi nicknamed villa around 2014 2016 cyberpoint supplied u.s.-trained contractors project raven 2016 news reports emerged cyberpoint contracted italian spyware company hacking team damaged cyberpoint reputation defensive cybersecurity firm reportedly dissatisfied relying upon u.s.-based contractor uae replaced cyberpoint darkmatter contractor darkmatter induced several cyberpoint staff move darkmatter project raven reportedly expanded surveillance include targeting americans potentially implicating american staff unlawful behaviour 2016 project raven bought tool called karma karma able remotely exploit apple iphones anywhere world without requiring interaction part iphone owner apparently achieved exploiting zero-day vulnerability device imessage app project raven operatives able view passwords emails text messages photos location data compromised iphones people whose mobile phones deliberately compromised using karma reportedly include 2017 apple patched security vulnerabilities exploited karma reducing tool effectiveness 2016 two darkmatter whistleblowers multiple security researchers expressed concerns darkmatter intended become certificate authority ca would give technical capability create fraudulent certificates would allow fraudulent websites software updates convincingly masquerade legitimate ones capabilities misused would allow darkmatter easily deploy rootkits targets devices decrypt https communications firefox users via man-in-the-middle attacks 28 december 2017 darkmatter requested mozilla include trusted ca firefox web browser year mozilla reviewers addressed concerns darkmatter technical practices eventually questioning basis whether darkmatter met baseline requirements inclusion 30 january 2019 reuters published investigations describing darkmatter project raven mozilla reviewers noted investigation findings subsequently electronic frontier foundation eff others asked mozilla deny darkmatter request basis investigation showed darkmatter untrustworthy therefore liable misuse capabilities mozilla public consultation deliberations ongoing july 2019 mozilla prohibited government united arab emirates operating one internet security gatekeepers following reports cyber espionage program run abu dhabi-based darkmatter staff leading clandestine hacking operation august 2019 google blocked websites approved darkmatter reuters reported firm ’ involvement hacking operation led united arab emirates google previously said websites certified darkmatter would marked unsafe chrome android browsers
[ 3528, 1594, 363, 2791, 651, 5700, 6823, 1790, 3050, 3426 ]
Test
1,940
2
IPod_Touch_(7th_generation):ipod touch 7th generation seventh-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 7g ipod touch 7 ipod touch 2019 multipurpose handheld device designed marketed apple inc. touchscreen-based user interface successor ipod touch 6th generation becoming first major update ipod touch since 2015 released online apple store may 28 2019 seventh-generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode seventh-generation ipod touch introduced may 28 2019 running latest ios version 12.3.1 play music movies television shows audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods come seventh-generation ipod touch include remote microphone voice control feature also used identify track play songs playlist specific artist create genius playlist apple a10 system-on-chip seventh-generation ipod touch enables advanced features predecessors includes arkit applications group facetime functionality seventh-generation ipod touch features apple a10 processor m10 motion coprocessor processor used apple iphone 7 apple ipad 2018 however underclocked 1.64 ghz 2.34 ghz uses two four cores making ipod touch weaker devices chip seventh-generation ipod touch features front rear camera systems sixth-generation device includes 8mp rear facing camera capable recording video 1080p resolution 30fps slow-motion video 720p 120fps camera also supports different photo features burst photos hdr photos panoramic photos front facing camera facetime hd camera capable taking photos 1.2mp recording video 720p 30fps camera also features auto hdr video recordings burst photo capabilities device first ipod touch come 256 gb storage option— highest capacity ever offered ipod surpassing 160gb capacity sixth-generation ipod classic discontinued 2014 seventh-generation ipod touch ships apple earpods apple lightning usb charging cable device also supports apple airpods earpods lightning connector
[ 6788, 3940, 7890, 722, 1094, 4320, 2926, 4690, 734, 5752, 405, 6125, 2954, 1123, 6847, 6142, 2609, 1895, 4376, 5091, 4749, 5450, 7601, 6165, 3001, 2284, 3008, 5477, 120, 2300, 3025, 2665, 2679, 1582, 2327, 6565, 2331, 3050, 4820, 163, 1...
Test
1,941
2
4MLinux:4mlinux 4mlinux lightweight distribution made 32bit 64bit architectures named 4mlinux since 4 main components os maintenance used rescue live cd multimedia inbuilt support almost every multimedia format miniserver comes 64-bit server included running lamp suite mystery includes collection classic linux games distribution developed poland first released 2010 distribution include package manager uses jwm joe window manager default window manager also comes conky preinstalled installing programs distribution distribution retrieve windows version rather linux version due coming pre-installed wine compatibility layer windows applications package manager distribution geared towards people prefer lightweight distribution version distribution called 4mlinux game edition provides 90s games natively doom hexen distribution comes two different version 4mserver 4mlinux 4mlinux requires 128 mb ram installed hdd 1024 mb ram used live cd/usb whereas 4mserver requires 256 mb ram installed hdd 2048 mb ram used live cd/usb
[ 2179, 2187, 2909, 5724, 6086, 7894, 2935, 6453, 2585, 2228, 1487, 58, 3996, 1128, 7587, 4008, 1893, 7954, 1909, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 3023, 6549, 1960, 6209, 2680, 4435, 5163, 8019, 4824, ...
Test
1,942
4
Nmap:nmap nmap network mapper free open-source network scanner created gordon lyon also known pseudonym fyodor vaskovich nmap used discover hosts services computer network sending packets analyzing responses nmap provides number features probing computer networks including host discovery service operating system detection features extensible scripts provide advanced service detection vulnerability detection features nmap adapt network conditions including latency congestion scan nmap started linux utility ported systems including windows macos bsd linux popular platform followed windows nmap features include nmap provide information targets including reverse dns names device types mac addresses typical uses nmap nmapfe originally written zach smith nmap official gui nmap versions 2.2 4.22 nmap 4.50 originally 4.22soc development series nmapfe replaced zenmap new official graphical user interface based umit developed adriano monteiro marques various web-based interfaces allow controlling nmap analysing nmap results web browser include nmap-cgi ivre microsoft windows specific guis exist including nmapwin updated since june 2003 v1.4.0 nmapw syhunt nmap provides four possible output formats interactive output saved file nmap output manipulated text processing software enabling user create customized reports nmap first published september 1997 article phrack magazine source-code included help contributions computer security community development continued enhancements included operating system fingerprinting service fingerprinting code rewrites c c++ additional scan types protocol support e.g ipv6 sctp new programs complement nmap core features major releases include nmap tool used discover services running internet connected systems like tool could potentially used black hat hacking precursor attempts gain unauthorized access computer systems however nmap also used security systems administration assess networks vulnerabilities i.e white hat hacking system administrators use nmap search unauthorized servers computers conform security standards jurisdictions unauthorized port scanning illegal nmap originally distributed gnu public license gpl later releases nmap authors added clarifications specific interpretations license felt gpl unclear lacking instance nmap 3.50 specifically revoked license sco group distribute nmap software views sco-linux controversies matrix reloaded trinity seen using nmap access power plant computer system allowing neo physically break building appearance nmap film widely discussed internet forums hailed unusually realistic example hacking nmap nmapfe used listening 2006 movie former nsa officer defects mounts clandestine counter-listening station high italian alps nmap source code seen movie battle royale well brief views command line version nmap executing live free die hard bourne ultimatum 2013 nmap continued make appearances movies including popular sci-fi movie elysium film dredd film adaptation famous judge dredd comics released 2012 also contains multiple nmap scenes nmap used network reconnaissance exploitation slum tower network even seen briefly movie trailer command nmap widely used video game hacknet allowing probe network ports target system hack snowden nmap used aptitude test scene 14 minutes movie nmap integral part academic activities used research involving tcp/ip protocol suite networking general well research tool nmap become research topic
[ 1068, 6789, 7421, 4759, 3085, 4583, 2192, 3088, 3775, 113, 6986, 2837, 3368, 651, 7637, 2478, 5571, 5929, 3540, 5577, 578, 6363, 5051, 2043, 588, 848, 2500, 6129, 8119, 6220, 2330, 3486, 8023, 2244, 4187, 5965, 3915, 3236, 5181, 6062, 4...
Test
1,943
1
Online_complex_processing:online complex processing online complex processing olcp class realtime data processing involving complex queries lengthy queries and/or simultaneous reads writes records
[ 3951 ]
Test
1,944
1
Generic_Mapping_Tools:generic mapping tools generic mapping tools gmt open-source collection computer software tools processing displaying xy xyz datasets including rasterisation filtering image processing operations various kinds map projections software stores 2-d grids coards-compliant netcdf files comes comprehensive collection free gis data coast lines rivers political borders coordinates geographic objects users convert data like satellite imagery digital elevation models sources import gmt stores resulting maps diagrams postscript ps encapsulated postscript eps format users operate system command line enables scripting automation routine tasks less comprehensive graphic user interfaces available third parties well web applications bringing system functionality online paul wessel walter h. f. smith created gmt 1988 lamont-doherty earth observatory officially releasing october 7 1991 gnu general public license letters gmt originally stood gravity magnetism topography three basic types geophysical data besides strong support visualisation geographic data sets software includes tools processing manipulating multi-dimensional datasets gmt users geoscientists
[ 5571, 6016, 578, 1435 ]
Validation
1,945
4
Macau_Computer_Emergency_Response_Team_Coordination_Centre:macau computer emergency response team coordination centre macau computer emergency response team coordination centre mocert managed macau new technologies incubator centre providing macau computer security incident handling information promoting information security awareness well coordinating computer security incident response public local enterprises mocert collaborates local bodies also communicates exchange information members first forum incident response security teams apcert asia pacific computer emergency response teams mocert mission facilitate healthy secure internet environment macau mocert provides latest computer vulnerabilities discovered around world publishes latest security issues advisories website individuals organizations also register free mocert subscriber get latest related information email organization also provides advice best way handle computer incident free mocert accepts reports computer security related incidents example phishing malware malicious website phoney emails attachments information security attacks mocert organizes relevant seminars events macao constituency regular basis promote information security awareness macao public events topics altered according current issues facing macao mocert complements seminars events print material form leaflet booklets sections constituency requires awareness guidance information security
[ 3932, 7106, 1805 ]
Validation
1,946
3
Road_Blaster:road blaster laserdisc-based arcade games time gameplay consists on-screen instructions overlaid pre-recorded full motion video animated footage high-speed chases vehicular combat player controls cross-hair steer car toward correct directions according green arrows flashing beeping beside controlling gas pedal brake booster whenever light game nine stages upon successfully completing level player graded reaction time different difficulty levels selected normal mode pop-up icons audio tones signal turn left right brake hit turbo hit cars hard mode on-screen icons guide player story road blaster inspired revenge thriller films mad max takes place post-apocalyptic wasteland late 1990s united states future time game release player assumes role vigilante drives customized sports car order get revenge biker gang responsible wife death honeymoon recovering injuries upgrades car goes rampage nine areas goal seek gang female boss complete vengeance road blaster uses animation provided anime studio toei animation animated guidance yoshinobu inano also directed key-animated films animated using 15,000 hand-painted cels produce 30 minutes animation game director yoshihisa kishimoto previously worked cobra command later directed arcade version double dragon car road blaster seen inside lee brothers garage start game road blaster originally released 1985 laserdisc-based arcade game various ports released throughout including versions msx x1 mega cd/sega cd laseractive mega ld format sega saturn playstation 3do interactive multiplayer prototyped turbo blaster however sega cd mega ld versions released outside japan titles road avenger road prosecutor respectively titles possibly changed avoid confusion similarly titled arcade game roadblasters atari games ported mega drive around time road blaster also released sharp x68000 windows 2011 exclusively japan cobra command road blaster ported ios revolutionary concepts 2010 2011 respectively variations included one-shot reproductions vhs cassette players takara video challenger limited interactive port road blaster arcade game sega saturn playstation ports compilations road blaster another laserdisc arcade game developed team titled thunder storm known outside japan cobra command unofficial super nes port also released 2011 however game relies heavily msu1 media enhancement chip somewhat new chip allows 4gb additional storage space full motion video playback stereo pcm audio early 2018 another unofficial port released commodore amiga ocs aga versions released based mega cd version dragon reviewers gave sega cd version game 4 5 stars 1993 gamefan noted greater interaction compared time gal thunderstorm praised non-stop control vehicle graphics smooth animation andrenaline rush experience gamepro praised highly detailed animation stereo cd sound called masterpiece like participating intense action-packed animated movie release famitsu gave mega cd version score 32 40 mega rated 86 famitsu later scored sega saturn version 25 40 playstation version 23 40 ios port released generally favourable reviews including scores 8 10 ign 7 10 pocket gamer novelization game announced 2009 project officially authorized g-mode japan rights holder data east catalog written mary margaret park
[ 1338, 1714 ]
Test
1,947
3
Wait_state:wait state wait state delay experienced computer processor accessing external memory another device slow respond computer microprocessors generally run much faster computer subsystems hold data cpu reads writes even memory fastest supply data fast cpu could process example 2011 typical pc processors like intel core 2 amd athlon 64 x2 run clock several ghz means one clock cycle less 1 nanosecond typically 0.3 ns 0.5 ns modern desktop cpus main memory latency 15–30 ns second-level cpu caches run slower processor core processor needs access external memory starts placing address requested information address bus must wait answer may come back tens hundreds cycles later cycles spent waiting called wait state wait states pure waste processor performance modern designs try eliminate hide using variety techniques cpu caches instruction pipelines instruction prefetch branch prediction simultaneous multithreading others single technique 100 successful together significantly reduce problem wait states used reduce energy consumption processor allowing main processor clock either slow temporarily pause wait state cpu work rather spinning uselessly tight loop waiting data sporadically reducing clock speed manner helps keep processor core cool extend battery life portable computing devices ibm mainframes term wait state used different meaning wait state refers cpu halted possibly due kind serious error condition unrecoverable error operating system ipl wait state indicated bit 14 psw set 1 bits psw providing wait state code giving reason wait z/architecture mode wait state code found bits 116-127
[ 7467, 4864, 1254, 5636, 7499, 1237, 5243, 5042, 396, 467, 515 ]
Test
1,948
5
Advanced_Data_Communication_Control_Procedures:advanced data communication control procedures telecommunication advanced data communication control procedures protocol adccp bit-oriented data link layer protocol used provide point-to-point point-to-multipoint transmission data frames contain error control information places data network ensures proper delivery destination adccp based ibm sdlc protocol hdlc iso lapb itu/ccitt based adccp adccp ansi standard x3.66 derived ibm synchronous data link control sdlc protocol functionally equivalent iso high-level data link control hdlc standard adccp 3 main modes – nrm normal response mode akin sdlc abm asynchronous balanced mode akin hdlc arm asynchronous response mode
[ 4580, 5492, 3207 ]
Test
1,949
4
Wietse_Venema:wietse venema wietse zweitze venema born 1951 dutch programmer physicist best known writing postfix email system also wrote tcp wrapper collaborated dan farmer produce computer security tools satan coroner toolkit studied physics university groningen continuing get phd 1984 dissertation left-right symmetry nuclear beta decay spent 12 years eindhoven university systems architect mathematics computer science department spent part time writing tools electronic data interchange since emigrating u.s. 1996 2015 working ibm thomas j. watson research center new york state march 24 2015 announced leaving ibm google awards venema received work
[ 2478, 5308, 6129, 3073 ]
Test
1,950
5
Ipswitch_IMail_Server:ipswitch imail server imail handle many 300,000 users average message flow ~25 per second ~2 million day support 32 64 bit platforms iis/.net framework 2.0 smtp pop3 imap4 ldap protocol support rfc 1870 compliant business computing world review imail server premium v11.01 pc magazine voted imail server editor choice – march 2009 network computing awards 2008 messaging product year
[ 333, 3555, 7154, 46, 8034, 6256, 6908, 3135, 293 ]
Validation
1,951
9
TREE-META:tree-meta tree-meta tree meta treemeta translator writing system compiler-compiler system context-free languages originally developed 1960s parsing statements metalanguage resemble augmented backus–naur form embedded tree-building directives unparsing rules include extensive tree-scanning code-generation constructs tree-meta instrumental development on-line system ported many systems including univac 1108 ge 645 sds-940 icl 1906a perq ucsd p-system complete example tree-meta program extracted untested complete declarations conditionals blocks example appendix 6 icl 1900 tree-meta manual document also definition tree-meta tree-meta appendix 3 program recognizer also outputs assembly language input demonstrates one key features tree-meta tree pattern matching used lhs get val example rhs add sub algol-style comment delimited
[ 7375, 1446, 336 ]
Test
1,952
5
Automatic_repeat_request:automatic repeat request automatic repeat request arq also known automatic repeat query error-control method data transmission uses acknowledgements messages sent receiver indicating correctly received packet timeouts specified periods time allowed elapse acknowledgment received achieve reliable data transmission unreliable service sender receive acknowledgment timeout usually re-transmits packet sender receives acknowledgment exceeds predefined number retransmissions types arq protocols include stop-and-wait arq go-back-n arq selective repeat arq/selective reject arq three protocols usually use form sliding window protocol tell transmitter determine packets need retransmitted protocols reside data link transport layers layers 2 4 osi model transmission control protocol uses variant go-back-n arq ensure reliable transmission data internet protocol provide guaranteed delivery packets selective acknowledgement sack uses selective repeat arq itu-t g.hn standard provides way create high-speed 1 gbit/s local area network using existing residential wiring power lines telephone lines coaxial cables uses selective repeat arq ensure reliable transmission noisy media arq systems widely used shortwave radio ensure reliable delivery data telegrams systems came forms called arq-e arq-m also included ability multiplex two four channels number patents exist use arq live video contribution environments high throughput environments negative acknowledgements used drive overheads
[ 3821, 791, 6097, 7637, 1916, 3563, 1869, 3314, 5492, 1540, 3597, 2901 ]
Test
1,953
3
Rock_n'_Bolt:rock n bolt rock n bolt puzzle video game developed action graphics published 1984 activision colecovision commodore 64 msx sg-1000 objective game lock platforms place according supplied map three levels difficulty second third level time limits
[]
Validation
1,954
4
ReDoS:redos regular expression denial service redos algorithmic complexity attack produces denial-of-service providing regular expression takes long time evaluate attack exploits fact regular expression implementations exponential time worst case complexity time taken grow exponentially relation input size attacker thus cause program spend unbounded amount time processing providing regular expression either slowing becoming unresponsive regular expression matching done building finite-state automaton regular expressions easily converted nondeterministic automata nfas state input symbol may several possible next states building automaton several possibilities exist algorithms first two problematic first problematic deterministic automaton could formula_1 states formula_2 number states nondeterministic automaton thus conversion nfa dfa may take exponential time second problematic nondeterministic automaton could exponential number paths length formula_3 walking input length formula_3 also take exponential time last two algorithms however exhibit pathological behavior note non-pathological regular expressions problematic algorithms usually fast practice one expect compile regular expression time match n time instead simulation nfa lazy computation dfa mn worst-case complexity regular expression denial service occurs expectations applied regular expressions provided user malicious regular expressions provided user trigger worst-case complexity regular expression matcher regex algorithms written efficient way regular expression engines existence extend regular expression languages additional constructs always solved efficiently extended patterns essentially force implementation regular expression programming languages use backtracking malicious regexes get stuck crafted input different depending regular expression matcher attack backtracking matchers occur whenever factors occur second condition best explained example regular expression codice_1 match repeated subexpression codice_2 therefore matching nondeterministic automaton may try new match codice_2 new match input many consecutive double number possible paths automaton examples malicious regexes include following susceptible input minimum input length might change slightly using faster slower machines patterns may cause exponential behavior long enough inputs hundreds characters usually could still cause long elaboration times example pattern codice_9 input arbitrarily long sequence s. pattern may also cause backtracking matchers hang so-called evil malicious regexes found online regular expression repositories note enough find evil sub expression order attack full regex two examples also susceptible input regex affected user input attacker inject malicious regex make system vulnerable therefore cases regular expression denial service avoided removing possibility user execute arbitrary patterns server case web applications databases main vulnerable applications alternatively malicious page could hang user web browser cause use arbitrary amounts memory however examples paragraphs considerably less artificial others thus demonstrate vulnerable regexes may used result programming mistakes case e-mail scanners intrusion detection systems could also vulnerable fortunately cases problematic regular expressions rewritten non-evil patterns example codice_8 rewritten codice_13 case web application programmer may use regular expression validate input client server side system attacker could inspect client code looking evil regular expressions send crafted input directly web server order hang
[ 1361, 8024, 3171, 1691, 4573, 4716, 4958, 3680, 6756, 2535 ]
Validation
1,955
6
ARJ:arj arj archived robert jung software tool designed robert k. jung creating high-efficiency compressed file archives arj currently version 2.86 dos 3.20 microsoft windows supports 16-bit 32-bit 64-bit intel architectures arj one two mainstream archivers dos windows early mid-1990s pkzip competition parts arj covered generally arj less popular pkzip niche market bbs era warez scene largely due arj creation handling multi-volume archives archives split smaller files suitable dial-up transfers floppy distribution robust pkzip arj compressed files filename extension .arj unpacked various tools arj software exists free software re-implementation tool software 7-zip zipeg winrar also unpack .arj files mac exists standalone utilities dearj unarjmac
[ 4213, 1254, 7058, 985, 4759, 1352, 6992, 1471, 4700, 7555, 7746, 3032, 2589, 7201, 7387, 3219, 510, 5191, 1127, 2334, 6940, 8126, 4732, 5256, 4547, 3152, 7584, 169, 1139, 5349, 4461, 2897, 619 ]
Test
1,956
4
XML_external_entity_attack:xml external entity attack xml external entity attack type attack application parses xml input attack occurs xml input containing reference external entity processed weakly configured xml parser attack may lead disclosure confidential data denial service server side request forgery port scanning perspective machine parser located system impacts xml 1.0 standard defines structure xml document standard defines concept called entity storage unit type different types entities external general/parameter parsed entity often shortened external entity access local remote content via declared system identifier system identifier assumed uri dereferenced accessed xml processor processing entity xml processor replaces occurrences named external entity contents dereferenced system identifier system identifier contains tainted data xml processor dereferences tainted data xml processor may disclose confidential information normally accessible application similar attack vectors apply usage external dtds external style sheets external schemas etc included allow similar external resource inclusion style attacks attacks include disclosing local files may contain sensitive data passwords private user data using file schemes relative paths system identifier since attack occurs relative application processing xml document attacker may use trusted application pivot internal systems possibly disclosing internal content via http requests launching csrf attack unprotected internal services situations xml processor library vulnerable client-side memory corruption issues may exploited dereferencing malicious uri possibly allowing arbitrary code execution application account attacks access local resources may stop returning data possibly impacting application availability many threads processes released note application need explicitly return response attacker vulnerable information disclosures attacker leverage dns information exfiltrate data subdomain names dns server control examples testing xml injection owasp-dv-008 xml version= 1.0 encoding= iso-8859-1 php expect module loaded remote code execution may possible modified payload xml version= 1.0 encoding= iso-8859-1 since entire xml document communicated untrusted client usually possible selectively validate escape tainted data within system identifier dtd therefore xml processor configured use local static dtd disallow declared dtd included xml document
[ 6225, 623, 6029, 367, 3967, 7319 ]
Test
1,957
2
GeeksPhone_Revolution:geeksphone revolution geeksphone revolution smartphone released geeksphone january 2014 uses x86 architecture pci bus instead arm architecture capable running either android firefox os lacks dual boot facility
[ 1237, 740, 5236, 1582 ]
Validation
1,958
5
Instant_Messaging_and_Presence_Protocol:instant messaging presence protocol instant messaging presence protocol impp ietf working group created purpose developing architecture simple instant messaging presence awareness/notification created 1999-02-25 concluded 2004-09-08
[ 7148, 2450, 3762, 3350, 7967, 2555, 2284, 7170, 2201, 6624, 1369, 6629, 1014, 4337, 4887, 1210, 2048, 3050, 2880, 4634, 6668, 5535 ]
Validation
1,959
3
Green_Hills_Software:green hills software green hills software privately owned company builds operating systems programming tools embedded systems firm founded 1982 dan o'dowd carl rosenberg world headquarters santa barbara california green hills software wind river systems enacted 99-year contract cooperative peers embedded software engineering market throughout 1990s relationship ending series lawsuits throughout early 2000s resulted opposite parting ways whereupon wind river devoted publicly embrace linux open-source software green hills initiated public relations campaign decrying use issues national security 2008 green hills integrity-178 rtos first system certified national information assurance partnership niap composed national security agency nsa national institute standards technology nist evaluation assurance level eal 6+ november 2008 announced commercialized version integrity 178-b available sold private sector integrity global security subsidiary green hills software march 27 2012 contract announced green hills software nintendo designates multi official integrated development environment toolchain nintendo licensed developers program wii u video game console february 25 2014 announced operating system integrity chosen urban aeronautics airmule integrity posix real-time operating system rtos integrity variant named integrity-178b certified common criteria evaluation assurance level eal 6+ high robustness november 2008 micro velosity stylized µ-velosity real-time microkernel resource-constrained devices green hills produces compilers programming languages c c++ fortran ada cross-platform 32- 64-bit microprocessors including arm blackfin coldfire mips powerpc superh starcore x86 v850 xscale multi integrated development environment ide programming languages c c++ embedded c++ ec++ ada aimed embedded engineers timemachine set tools optimizing debugging c c++ software timemachine introduced 2003 supports reverse debugging feature later also became available free gdb 7.0 debugger 2009
[ 1522, 5275, 6082, 895, 5021, 4399, 6177, 1361, 304, 7823, 5571, 578, 3544, 7090, 7554, 7654, 5055, 6208, 1959, 6921, 4175, 6385, 1227, 4095, 3915, 352, 3751, 7775, 2803, 1435, 3682 ]
Test
1,960
2
NepaLinux:nepalinux nepalinux debian morphix-based linux distribution focused desktop usage nepali language computing contains applications desktop users openoffice.org nepali gnome kde desktops nepali input method editor development distribution nepalinux done madan puraskar pustakalaya version 1.0 produced part pan localization project support international development research centre idrc canada nepalinux effort promoting free open-source software nepal october 2007 nepalinux joint recipient association progressive communications annual apc foss prize
[ 5200, 1629, 3444, 7251, 474, 7075, 1941, 314, 5232, 2758, 1663, 2864, 3559, 6209, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 3751, 7954, 6244 ]
Test
1,961
3
Zen+:zen+ zen+ codename amd successor zen microarchitecture first released april 2018 powering second generation ryzen processors known ryzen 2000 mainstream desktop systems threadripper 2000 high-end desktop setups zen+ uses globalfoundries 12nm fabrication process optimization 14nm process used zen minor design rule changes means die sizes zen zen+ identical amd chose increase amount empty space individual smaller transistors improve power efficiency reduce thermal density rather design entirely new floor-plan physically smaller die process optimizations allowed zen+ achieve higher clock speeds lower power consumption zen products though minor revisions compared zen microarchitecture known changes microarchitecture include improved clock speed regulation response workload reduced cache memory latencies increased cache bandwidth better ddr4 sdram memory support zen+ also supports improvements per-core clocking features based core utilization cpu temperatures changes core utilization temperature power algorithms branded precision boost 2 xfr2 extended frequency range 2 evolutions first-generation technologies zen zen xfr gave additional 50 200 mhz clock speed increase 25 mhz increments maximum precision boost clocks zen+ xfr2 longer listed separate clock modifier instead xfr temperature power clock monitoring logic feeds precision boost 2 algorithm adjust clocks power consumption opportunistically dynamically ultimately changes zen+ resulted 3 improvement ipc zen conjunction 6 higher clock speeds resulted 10 overall increase performance
[ 2539, 5799, 6599, 5804, 4221, 6523, 5559, 6351, 7726, 1465, 7826, 4694, 7453, 6545, 584, 5055, 6647, 5063, 6655, 6562, 6569, 4090, 5431, 866, 694, 6675, 780, 7499, 1797, 7782, 3248, 2172 ]
Train
1,962
4
Loggly:loggly solarwinds loggly cloud-based log management analytics service provider based san francisco california jon gifford raffael marty kord campbell founded company 2009 charlie oppenheimer ceo loggly announced acquisition solarwinds part solarwinds cloud division brands january 8 2018 2009 jon gifford raffael marty kord campbell founded loggly assist companies solving operational issues app47 mobile application management provider partnered loggly september 2012 company chose loggly software-as-a-service saas deployment option september 2013 loggly released generation 2 updated version service update included log collection standard syslog protocols graphical web interface allowed users use point-and-click process find log events generate charts month loggly completed 10.5 million funding round led cisco data collective trinity ventures true ventures matrix partners also participated round october 2014 company announced 15 million series c funding round led harmony partners matrix partners trinity ventures cisco data collective true ventures also participated funding round raised loggly total investment funding 33.4 million company released loggly dynamic field explorer new user experience aims reduce time developers spend identifying troubleshooting problems month january 8 2018 company announced part solarwinds loggly headquartered san francisco california company 54 employees 10,000 customers october 2017 loggly records log data device reports real-time management platform trend data loggly cloud-based log management service provider require use proprietary software agents collect log data service uses open source technologies including elasticsearch apache lucene 4 apache kafka
[ 7984, 4783, 8069, 4511, 2556 ]
Validation
1,963
3
Spatial_Archive_and_Interchange_Format:spatial archive interchange format spatial archive interchange format saif pronounced safe defined early 1990s self-describing extensible format designed support interoperability storage geospatial data saif dataset saif two major components together define saiftalk first class syntax notation csn data definition language used define dataset schema second object syntax notation osn data language used represent object data adhering schema csn osn contained physical file along directory beginning file use ascii text straightforward syntax csn osn ensure parsed easily understood directly users developers saif dataset .saf .zip extension compressed using zip archive format schema definition saif defines 285 classes including enumerations class syntax notation covering definitions high-level features geometric types topological relationships temporal coordinates relationships geodetic coordinate system components metadata considered forming base schema using csn user defines new schema describe features given dataset classes belonging new schema defined csn subclasses existing saif classes new enumerations foreststand :myschema example could defined attributes including age species etc foreststand :myschema specified subclass geographicobject feature defined saif standard user defined classes must belong schema one defined user previously existing different schemas exist dataset objects defined one schema reference specified another inheritance saif supports multiple inheritance although common usage involved single inheritance object referencing object referencing used means breaking large monolithic structures significantly allow objects defined referenced number times section geometry land-water interface could define part coastline well part municipal boundary part marine park boundary geometric feature defined given object reference used geometry coastline municipality marine park specified multimedia multimedia objects also objects saif dataset referenced accordingly example image sound files associated given location could included primary advantage saif inherently extensible following object oriented principles meant data transfers one gis environment another need follow lowest common denominator two systems instead data could extracted dataset defined first gis transformed intermediary i.e. semantically rich saif model transformed model format applicable second gis notion model model transformation deemed realistic object oriented approach recognized scripts carry transformations could fact add information content safe software developed feature manipulation engine fme large measure express purpose supporting transformations fmebc freely available software application supported wide range transformations using saif hub fme developed commercial offering intermediary could held memory instead saif dataset saif project established means addressing interoperability different geographic information systems exchange formats particular prominence time included digest digital geographic information exchange standard sdts spatial data transfer specification later accepted spatial data transfer standard considered inflexible difficult use consequently government british columbia decided develop saif put forward national standard canada saif became canadian national standard 1993 approval canadian general standards board last version saif published january 1995 designated cgis-saif canadian geomatics interchange standard spatial archive interchange format formal definition release 3.2 issue can/cgsb-171.1-95 catalogue number p29-171-001-1995e work saif modeling paradigm csn classes carried principally mark sondheim henry kucera peter friesen british columbia government time dale lutz murray safe software developed object syntax notation reader writer software became part feature manipulation engine saif brought attention michael stonebraker kenn gardels university california berkeley working initial version open geospatial interoperability specification ogis first efforts became open geospatial consortium ogc series 18 submissions iso sql multimedia working group also helped tie saif original iso work geospatial features today saif historical interest significant precursor geography markup language formative element development widely used feature manipulation engine sondheim m. k. gardels k. buehler 1999 gis interoperability pp 347–358 geographical information systems second edition volume 1 edited paul a. longley michael f. goodchild david j. magurie davide w. rhind sondheim m. p. friesen d. lutz d. murray 1997 spatial archive interchange format saif spatial database transfer standards 2 characteristics assessing standards full descriptions national international standards world edited moellering h. hogan r. elsevier netherlands surveys resource mapping branch spatial archive interchange format release 3.2 formal definition 1995 also release 3.1 1994 3.0 1993 2.0 1992 1.0 1991 0.1 1990 surveys resource mapping branch british columbia ministry environment lands parks 258p also published canadian general standards board can/cgsb-171.1-95 available request geobc service desk http //www.ilmb.gov.bc.ca/geobc/servicedesk.html
[]
Test
1,964
9
Oracle_Media_Objects:oracle media objects oracle media objects formerly oracle card software development tool developing multi-media applications functionality appearance similar apple computer hypercard program originated plus 1989 clone hypercard published format verlag added several highly-requested features plus purchased spinnaker software ported windows nt os/2 presentation manager becoming first cross-platform hypermedia solution 1994 plus purchased objectplus focussed windows version renaming winplus also licensed system oracle used basis oracle card first released 1991 oracle card essentially redistribution plus runtime engine along external libraries establishing connections rdbms engines oracle db2 oracle card stacks could execute queries associate results native variables making oracle card one first rdbms application development environments support cross-platform development years later oracle acquired original plus source code format verlag developed become oracle media objects omo omo n't last long development ceasing version 1.1.2 omo used oracle position video demand market commercially products built using tool amongst secret century series cd-roms published voyager company inside independence day aces entertainment omo unique distinction stacks cross-platform also external libraries xcmds purpose small subset mac os memory management commands handles ported platforms addition omo sported modular design every type object actually implemented plugin file objects folder omo object types included standard controls available hypercard clones time buttons text fields draw paint graphics well complex controls like spreadsheet field non-control items could placed card invisible runtime like timers could scheduled send messages specified time oracle card primary value lay fact time oracle product offer gui support microsoft windows therefore sometimes included sales pitches potential clients virtue fact windows becoming increasingly popular desktop large corporations showed customers oracle serious windows current product platform oracle primary application development tool oracle forms 3 character-based run microsoft windows although could run dos window natively dos without windows oracle desperately working developing upgrade oracle forms 4 gui features development behind schedule oracle card primarily used stop gap demonstration product oracle forms become available handful large clients including u.s postal service known developed applications oracle card internal use oracle card broad commercial success development platform despite fact feature set surpassed apple hypercard nearly every respect platform support database connectivity vector graphics support better color support faster performance richer plug-in architecture eventually oracle forms 4.0 released meaning support windows longer exclusive domain oracle card oracle customers tended interested standard forms-based database applications rather sorts multimedia applications possible create oracle card successor omo oracle eventually threw full weight behind oracle forms 4.0 casting oracle card/omo oblivion however oracle card team led two oracle employees gone form successful technology companies marc benioff founder salesforce.com evan goldberg founder netsuite
[ 7213, 7814, 3169, 4453, 7037, 3412, 5571, 6256, 1103 ]
Train
1,965
2
ClanLib:clanlib clanlib video game sdk supporting microsoft windows macos linux partial support mobile platforms full hardware accelerated graphics support opengl also software renderer clanlib also helps playing sound using vorbis mikmod libraries classes collision detection guis xml networking things may helpful game programmer earliest known public release 1999 version 0.1.18 introduction c++ game programming published june 2007 dedicates chapter learn use clanlib library make 2d games also game programming python lua ruby published december 2003 chapter using clanlib together ruby
[ 4759, 5571, 7310, 578, 2639 ]
Validation
1,966
0
Eagles_Guidelines:eagles guidelines eagles guidelines provide guidance markup used text corpora particularly identifying features relevant computational linguistics lexicography expert advisory group language engineering standards eagles initiative european commission within dg xiii linguistic research engineering programme numerous well-known companies research centres universities professional bodies across european union collaborate aegis ec dgxiii produce eagles guidelines set recommendations de facto standards good practice areas language engineering eagles initiative coordinated consorzio pisa ricerche pisa italy eagles aims accelerate provision standards
[ 1314, 5304 ]
Validation
1,967
3
Miracle_Warriors:_Seal_of_the_Dark_Lord:miracle warriors seal dark lord miracle warriors seal dark lord known japan role-playing video game released initially japanese pc-88 ported various systems including sega master system version released north america screen game consists four parts lower left character statistics lists characters party character life bar experience bar single character gain experience hitting enemies experiences full new level reached experience bar emptied bars extended resulting maximum life character experience needed gain new level lower right statistics entire party example amount money upper right section varies screen screen traveling world town maze map shown player navigate player invokes main menu shown battle shows battle menu upper left section also varies traveling world cave shows party members surroundings battle shows foe town shows persons player talk dialogue player encounters enemy screen switches battle mode battle mode player choose one character attack per turn character also subjected attack enemy unless enemy uses spell attacks multiple players enemies use flame spells attack party members sleep spells put multiple party members sleep every time party member put sleep take damage wake put sleep many times battle taking damage time fall asleep every party member sleeping enemy use flame spell attack every party member alternative attack player several options including talking retreating using magical item casting spell enemies respond talking give hints currency game guilder used buy items heal players defeated enemies also yield fangs proof valor battle fangs used buy exclusive items traded villages guilders defeating enemies also increase decrease player character points fame killing monsters usually increases player fame killing good characters example merchants decreases player fame certain amount character points required enter certain villages game takes place world five lands spread three continent came elaborate grid-format map noting areas interest game four types land plain forest mountains desert enemies become dangerous different types land plains safest terrain cross continents separated oceans storming sea around last continent ship required sail oceans special ship needed cross storming sea helmed someone pirate blood veins throughout world several towns towns smiths repair weapons armor healers heal sell herbs shops sell weapons armor towns provide information one person every town buys fangs fifty guilders also villages serve special purposes selling ships special magical items several caves exist world house guardians protect mystical armors legend finally also various castles visited get weapons legends kings impressed enough demon queen terarin テラリン returned stolen golden seal opened pandora passage letting loose dark creatures world young hero tasked king restore peace world must step footsteps ancestor iason fought seal demoness another dimension finish job bring end terarin evil hero must enlist aid three companions guy warrior medi amazon treo pirate called turo english manual find three keys terarin lair underground temple defeat also need find set ancient mystical weapons armor miracle warriors master system received mixed mostly positive reviews including rated 40 games machine 77 sega power 80 tilt game followed sequel titled wings arugisu アルギースの翼 released msx2 kogado 1988
[]
Test
1,968
4
Computer_liquidator:computer liquidator computer liquidator buys computer technology related equipment longer required one company resells flips another company computer liquidators agents act computer recycling electronic recycling business several reasons companies sell liquidate used information technology i.t equipment bankruptcy downsizing expanding technological advancement technological advancement common reason equipment longer performing tasks required usually rendered obsolete advanced technology coming market used obsolete technology often referred electronic waste equipment designated outdated one company still viable another company whose operations may require advanced solutions often information technology audit performed help company decide equipment needs updating requirements computer liquidation sustainable solution environmentally friendly rapid technology change low initial cost planned obsolescence resulted fast-growing surplus computers electronic components around globe purpose computer liquidators keep many computers electronic parts landfills newer better technology replaces hardware ever-increasing speed amount technical trash increases technology replaced speed hardware changes innovates last years follows degree moore law predictions made every landfill would soon overflowing discarded computer screens computers along associated equipment keyboards mouses hardware associated use internet.most electronic waste sent landfills incinerated releases toxic materials lead mercury cadmium soil groundwater atmosphere thus negative impact environment best liquidating companies clearly outlined policies regarding disposal dangerous substances often issue information technology act liquidation avoids possible toxins pollution comes putting electronic waste landfills also avoids extra costs go recycling example new york passed law 2015 banned putting electronic devices landfills waste facilities rural counties forced either turn people away eat cost recycling cathode ray tubes outside new york city counties spending 6 million 10 million year deal problem according stephen acquario executive director new york state association counties option liquidation actually incentivizes people get rid electronic waste safer way since recycling actually costs owner money cases people would rather throw avoid recycling fee computer liquidators effectively create secondary market meet demand looking cheaper solution require cutting edge technology important note equipment liquidated ranges new technology old technology relatively lower price secondary market equipment companies may even purchase tech devices secondary market use backups stocking equipment preemptively replacement always hand event trouble product availability also another reason buyers buy market manufacturers generally refresh product line every 12 24 months typically liquidating older products networking hardware often see service lives five years resellers computer liquidators might carry products upwards decade old end users use particular product may find much easier cheaper add/replace older device rather take costs business disruptions knowledge gaps occur upgrading new products newer products adopted used equipment inevitably liquidated thrown sold back creates robust marketplace typically three agents computer liquidation process seller computer liquidator buyer sellers companies bankrupt need sell assets companies downsizing expanding companies upgrading technology usually companies looking sell equipment first conduct information technology audit review systems equipment process generally fueled supply side computer liquidators rely available market liquidate resell thus nearly always exists shortage buyers oceantech example buys computers laptops tablets electronics companies longer need technology conduct certified data destruction appliances technicians perform thorough check systems confirm devices functional stored warehouse certain parts like motherboard hard drives able used stripped machine put warehouse store devices parts resold smaller companies places like school districts need products companies involved computer liquidation business also heavily involved computer electronic recycling industry takes similar process disassembling testing process theoretically benefits ends exchange seller gets money equipment longer needs buyer gets cheap equipment necessary work number organizations sprung provide technical guidelines handling dealing ewaste
[ 1592 ]
Test
1,969
3
Ace_of_Aces_(video_game):ace aces video game ace aces combat flight simulator developed artech digital entertainment published 1986 three different companies accolade u.s. gold tiertex design studios released amstrad cpc atari 8-bit family atari 7800 commodore 64 msx ms-dos master system zx spectrum set world war ii player flies raf mosquito long range fighter-bomber equipped rockets bombs cannon missions include destroying german fighter planes bombers v-1 flying bombs u-boats trains 1988 atari corporation released version cartridge styled then-new atari xegs ace aces received mixed reviews went become one best-selling commodore 64 video games published accolade upon launching game menu screen options either practice partake proper mission shown player decides practice mode choose whether dog fight training u-boat train bombing playing practice mode enemies less aggressive five different view options — cockpit left right wings navigational map bomb bay — accessed using keyboard double-tapping fire button moving joystick desired direction missions player controls twin-engined balsa raf mosquito already airborne mitigating necessity takeoff starting mission player chooses supplies wish bring player brings lower maximum speed plane end missions landing required points awarded according many enemies shot along amount unused fuel bombs missiles missions completed player choose combine two missions produce mashup 1987 compute article ace aces noted accolade second best selling commodore 64 game compute along reviewers praised graphics sound ace aces 1991 1993 computer gaming world surveys strategy war games gave one half stars five calling somewhat ahistorical issue 20 zzap 64 reviewer said best factual war simulation played compared dambusters said playability better desert fox also used comparison referred sometimes unbelievable article computer video games magazine published 1986 said another well-made well-presented game accolade continued say action-packed gameplay would able keep even critical computer pilot busy time come four criteria highly rated graphics getting 10 along sound value playability getting 8 graphics along sound features highly praised commodore 64 version n't highly acclaimed master system version chad reinhardt defunct games mentioned ace aces starts potential poor controls lack ability interact plane makes forgettable reinhardt criticised different practise mode main game continued adding little help actually helps attempting missions gave game d+ overall reviewers commented feeling excitement playing sega version review kultboy given rating 20 said reasoning behind low review plane meant fighter plane flies like tanker comparatively score graphics game given high 68 sega pro gave game rating 56 praised graphics static continued say impractical in-game zx spectrum version met reviews disliking complexity changing controls may distracting dogfight issue 38 sinclair reviewers ben stone paul sumner mike dunn criticised difficulty game game contains enough gameplay days steve panak writing analog computing preferred ace aces infiltrator atari 8-bit flight simulator
[ 6380 ]
Test
1,970
2
Internet_Explorer_11:internet explorer 11 internet explorer 11 ie11 eleventh final version internet explorer web browser microsoft officially released october 17 2013 windows 8.1 november 7 2013 windows 7 browser also shipped windows 10 release july 29 2015 microsoft edge default browser version windows default browser shipped windows server 2016 windows server 2019 january 12 2016 recent version internet explorer offered installation given windows operating system continue supported security updates lasting end support lifecycle windows operating system windows 7 8.1 internet explorer 11 receive security updates remainder windows versions support lifecycles internet explorer 10 reach end support january 31 2020 ie 11 supported version internet explorer windows server 2012 windows embedded 8 standard ie 11 available piloting windows server 2012 windows embedded 8 standard starting spring 2019 ie11 features redesigned developer tools support webgl enhanced scaling high dpi screens prerender prefetch launch ie11 got support http/2 addition ie11 supports full screen orientation apis css border image support javascript enhancements dom mutation observers web cryptography api video text track support encrypted media support improved html editor ie11 uses transport layer security v1.2 default protocol secure connections deprecates rc4 cipher suite internet explorer 11 windows rt support java add-ons november 2013 review sitepoint ie11 scored better google chrome 30 firefox 26 webkit sunspider test google webgl test tied chrome fastest microsoft fish aquarium benchmark webgl came last google v8 performance benchmark result speed improvements reviewer said switched chrome speed alone 're using wrong browser ie11 also observed use less memory multiple tabs open contemporary versions chrome firefox august 2015 sitepoint benchmarked ie11 review microsoft edge edge 12 chrome 44 firefox 39 also present ie11 came last apple jetstream test replaced sunspider google octane test replaces v8 came second microsoft fish aquarium test edge though internal build ie11 leaked march 25 2013 first preview version formally released june 2013 build 2013 conference along preview release windows server 2012 r2 windows 8.1 july 25 2013 microsoft released developer preview internet explorer 11 windows 7 windows server 2008 r2 releases internet explorer update windows 7 8.1 released april 2 2014 added enterprise mode improved developer tools improved support webgl ecmascript 5.1
[ 4655, 6802, 5378, 7537, 6809, 7176, 393, 3291, 2574, 7925, 4352, 422, 4725, 5781, 1136, 6495, 84, 445, 1152, 4026, 4759, 7628, 5821, 5127, 3383, 6550, 8006, 3395, 3043, 6221, 3048, 8024, 520, 3057, 3060, 3412, 5887, 6966, 5542, 555, 237...
Train
1,971
2
QuickStart:quickstart quickstart loading method used several different software applications designed speed loading time software load core files libraries computer startup allows applications start quickly selected later quickstarters typically place icon system tray full application needs loaded base components already ram significantly reduces load time quickstarters controversial use ram even application open reason quickstarters actually decrease performance whole example six applications load quickstarter system tray 50 megabytes per piece 300 megabytes ram could otherwise used working applications user 256 megabytes ram cause running applications page virtual memory drastically reduce performance hand user one gigabyte ram running applications probably paged load times quickstart applications reduced resulting higher overall performance point user powers system system ready use delayed system must incur performance penalty form reading quickstart applications hard drive additional cpu processing sub-system usage quickstart application loaded memory following examples applications use quickstart method quickstarters workaround poor performance hard disk drives hdds traditionally standard desktop computers solid-state drives ssds lower latency faster seek times hdds less need quickstarters ssds ssd slowly becoming popular certain types computers business setting quickstart also informal often short description accomplish specific task generally meant help non-experts leave details important experts may also greatly simplified overall discussion topic
[ 8066, 3468 ]
Validation
1,972
4
Information_sensitivity:information sensitivity information sensitivity control access information knowledge might result loss advantage level security disclosed others loss misuse modification unauthorized access sensitive information adversely affect privacy welfare individual trade secrets business even security international relations nation depending level sensitivity nature information refers information already matter public record knowledge regard government private organizations access release information may requested member public often formal processes laid accessibility government-held public records important part government transparency accountability citizens values democracy public records may furthermore refer information identifiable individuals considered confidential including limited census records criminal records sex offender registry files voter registration includes business information subjected special protection may routinely shared anyone inside outside business confidential information used general sense mean sensitive information whose access subject restriction may refer information individual well pertains business however situations release personal information could negative effect owner example person trying avoid stalker inclined restrict access personal information furthermore person ssn sin credit card numbers financial information may considered private disclosure might lead crimes identity theft fraud types private information including records person health care education employment may protected privacy laws unauthorized disclosure private information make perpetrator liable civil remedies may cases subject criminal penalties even though often used interchangeably personal information sometimes distinguished private information personally identifiable information latter distinct former private information used identify unique individual personal information hand information belonging private life individual used uniquely identify individual range individual ’ favourite colour details domestic life latter common example personal information also regarded sensitive individual sharing details trusted listener would prefer shared anyone else sharing may result unwanted consequences confidential business information refers information whose disclosure may harm business information may include trade secrets sales marketing plans new product plans notes associated patentable inventions customer supplier information financial data classified information generally refers information subject special security classification regulations imposed many national governments disclosure may cause harm national interests security protocol restriction imposed upon information categorized hierarchy classification levels almost every national government worldwide restricted levels containing information may cause greatest danger national security leaked authorized access granted individuals need know basis also passed appropriate level security clearance classified information reclassified different level declassified made available public depending changes situation new intelligence classified information may also denoted method communication access example protectively marked secret eyes protectively marked secret encrypted transfer indicating document must physically read recipient openly discussed example telephone conversation communication sent using encrypted means often mistakenly listed meaning eyes intended recipient anomaly becomes apparent additional tag within windowed area also used data privacy concerns exist various aspects daily life wherever personal data stored collected internet medical records financial records expression political opinions 80 countries world personally identifiable information protected information privacy laws outline limits collection use personally identifiable information public private entities laws usually require entities give clear unambiguous notice individual types data collected reason collection planned uses data consent-based legal frameworks explicit consent individual required well european union data protection directive provides rigorous standard privacy protection legislation across member states although directive legally binding member states expected enact national privacy legislation within three years directive ’ adoption conforms standards since adoption directive demonstrated significant influence privacy legislation non-eu nations requirements privacy laws non-member nations engaging transborder flows private data eu member nations eu passed general data protection regulation gdpr replace directive regulation adopted 27 april 2016 becomes enforceable 25 may 2018 two-year transition period unlike directive require national governments pass enabling legislation thus directly binding applicable proposed new eu data protection regime extends scope eu data protection law foreign companies processing data eu residents provides harmonisation data protection regulations throughout eu thereby making easier non-european companies comply regulations however comes cost strict data protection compliance regime severe penalties 4 worldwide turnover gdpr also brings new set digital rights eu citizens age economic value personal data increasing digital economy canada personal information protection electronic documents act pipeda regulates collection use personal data electronic documents public private organizations pipeda effect federal provincial jurisdictions except provinces existing privacy laws determined “ substantially similar ” even though unified sensitive information framework united states implemented significant amount privacy legislation pertaining different specific aspects data privacy emphasis privacy healthcare financial e-commerce educational industries federal state levels whether regulated self regulated laws require establish ways access sensitive information limited people different roles thus essence requiring establishment sensitive data domain model mechanisms protection domains guideline form pre-defined models safe harbor hipaa based research latanya sweeny established privacy industry metrics additionally many countries enacted legislature regarding data privacy protection still process confidentiality sensitive business information established non-disclosure agreements legally binding contract two parties professional relationship ndas may one-way case employee receiving confidential information employing organization two-way businesses needing share information one another accomplish business goal depending severity consequences violation non-disclosure may result employment loss loss business client contacts criminal charges civil lawsuit hefty sum damages ndas signed employer employee initiation employment non-compete clause may part agreement added protection sensitive business information employee agrees work competitors start competing business within certain time geographical limit unlike personal private information internationally recognized framework protecting trade secrets even agreed-upon definition term “ trade secret ” however many countries political jurisdictions taken initiative account violation commercial confidentiality criminal civil laws example us economic espionage act 1996 federal crime united states misappropriate trade secrets knowledge benefit foreign power injure owner trade secret commonly breach commercial confidentiality falls civil law united kingdom developing countries trade secret laws either non-existent poorly developed offer little substantial protection many countries unauthorized disclosure classified information criminal offence may punishable fines prison sentence even death penalty depending severity violation less severe violations civil sanctions may imposed ranging reprimand revoking security clearance subsequent termination employment whistleblowing intentional disclosure sensitive information third-party intention revealing alleged illegal immoral otherwise harmful actions many examples present former government employees disclosing classified information regarding national government misconduct public media spite criminal consequences await espionage spying involves obtaining sensitive information without permission knowledge holder use spies part national intelligence gathering countries used political strategy nation-states since ancient times unspoken knowledge international politics countries spying one another time even allies computer security information security applied computing network technology significant ever-growing field computer science term computer insecurity hand concept computer systems inherently vulnerable attack therefore evolving arms race exploit existing vulnerabilities security systems must engineer new mechanisms security number security concerns arisen recent years increasing amounts sensitive information every level found primary existence digital form personal level credit card fraud internet fraud forms identity theft become widespread concerns individuals need aware day-to-day basis existence large databases classified information computer networks also changing face domestic international politics cyber-warfare cyber espionage becoming increasing importance national security strategy nations around world estimated 120 nations around world currently actively engaged developing deploying technology purposes philosophies internet cultures open-source governance hacktivism popular hacktivist slogan information wants free reflects cultural shifts perception towards political government secrecy popular controversial wikileaks one many manifestations growing cultural sentiment becoming additional challenge security integrity classified information
[ 4536, 1998, 2560, 2961, 6273, 8191, 4834, 5908, 6756, 2486, 1805 ]
Test
1,973
7
Cherrypal:cherrypal cherrypal california-based marketer chinese-manufactured consumer-oriented computers markets range models diversity cpu-types structures features operating systems commentators observed cherrypal arguably beat heralded much-better financed one laptop per child olpc project goal 100 laptop units physically small cherrypal unit general purchase 99 plus shipping 7 screen olpc provided child developing world 199 7.5 company business practices generated controversy antipathy vocally dissatisfied customers others marginally satisfied practices pertaining merchandise returns communication repeatedly faulted u.s better business bureau rating cherrypal f indicating bbb strongly questions company ’ reliability cherrypal claims commitment environmental concerns needs impoverished countries particular key sponsorship learning center ghana supports one laptop per teacher pilot program nigeria order company marketed c114 ppc-processor-based nettop cherrypal bing x86-based netbook cherrypal africa xburst-cpu-based netbook cherrypal asia arm-processor-based netbooks cherrypad america arm-processor-based tablet computer cherrypal c114 small light nettop computer using powerpc-processor freescale 5121e system-on-a-chip soc integrated main-board xubuntu operating system device launches firefox minefield web-browser abiword word-processor apps via icon double-click article register noted cherrypal producers asserted computer consume 2 watts power independent informal testing shown wattage consumption still low 6.9 watts booting cherrypal c114 rebadged version limepc d1 mini-desktop computer developed part broader freescale powerpc chip-based product line thtf shenzhen r center shown public 2008 ces las vegas january 2008 cherrypal bing slim x86-based netbook ships windows xp cherrypal 99 netbook africa aimed primarily developing world also available sale consumers according blog post max seybold device specs cherrypal web store kept intentionally vague africa built set design instead cherrypal either purchases pre-made netbook systems buys odd lots whatever inexpensive components available builds netbooks rebrands netbooks africas 99 computer named africa honor paajaf humanitarian services group based ghana west-africa seybold states resulting device minimum meet specs listed website could also exceed could also end arm mips x86-based cpu architecture depending chips available interview seybold stated africa meant sold computer traditional sense appliance provide internet access people could afford buy traditional computer said number government services unemployment disability encouraging access internet lack access becoming disability thing cherrypal promises 99 ability access internet cherrypal asia low cost arm-based netbook uses android os version 1.7 cherrypal america also known cherrypad android tablet based upon telechips tcc89xx arm11 processors cherrypal initially sold tablet promise upgrade android 2.2 november support android market market support officially removed tablet conform market requirements google also android 2.2 upgrade canceled instead cherrypal promises update android 2.3 hardware cherrypal america listed cherrypal comprises 800 mhz arm11 cpu telechips 256 mb ddr2 ram 2 gb flash memory 800x480 resistive touchscreen however user report arguing less powerful specifications according boot-log dumped via dmesg according various android news magazines cherrypal announced successor current cherrypad cherrypal founded max seybold based palo alto c114 following c120 desktop computers originally developed tsinghua tongfang thtf shenzhen r center engineering team led american electronics industry veterans jack campbell ryan quinn extended line handheld desktop tv-based pcs using freescale mpc5121e powerpc microprocessor shown ces 2008 thtf desktop product picked thereafter oem purchase cherrypal cherrypal marketers planned use firefox web-browser also user interface launch applications openoffice.org planned cherrypal would make use cloud computing applications storage would wholly part internet-based plans yet implemented company president asserted cloud green maraschino would launched february 2010 however known occurred
[ 1066, 2538, 1167, 289, 3524, 4317, 6443, 1284, 1202, 5236, 7919, 4627, 3734, 2961, 2338, 2339, 1702, 7049 ]
Test
1,974
5
Carrier-sense_multiple_access_with_collision_detection:carrier-sense multiple access collision detection carrier-sense multiple access collision detection csma/cd media access control method used notably early ethernet technology local area networking uses carrier-sensing defer transmissions stations transmitting used combination collision detection transmitting station detects collisions sensing transmissions stations transmitting frame collision condition detected station stops transmitting frame transmits jam signal waits random time interval trying resend frame csma/cd modification pure carrier-sense multiple access csma csma/cd used improve csma performance terminating transmission soon collision detected thus shortening time required retry attempted following procedure used initiate transmission procedure complete frame transmitted successfully collision detected transmission following procedure used resolve detected collision procedure complete retransmission initiated retransmission aborted due numerous collisions methods collision detection media dependent shared electrical bus 10base5 10base2 collisions detected comparing transmitted data received data recognizing higher normal signal amplitude bus media carrier sensed receive channel transmitting triggers collision event repeaters hubs detect collisions propagate jam signals collision recovery procedure likened happens dinner party guests talk common medium air speaking guest politely waits current speaker finish two guests start speaking time stop wait short random periods time ethernet time measured microseconds hope choosing random period time guests choose time try speak thus avoiding another collision jam signal jamming signal signal carries 32-bit binary pattern sent data station inform stations collision must transmit maximum jam-time calculated follows maximum allowed diameter ethernet installation limited 232 bits makes round-trip-time 464 bits slot time ethernet 512 bits difference slot time round-trip-time 48 bits 6 bytes maximum jam-time turn means station noting collision occurred sending 4 6 byte long pattern composed 16 1-0 bit combinations note size jam signal clearly minimum allowed frame-size 64 bytes purpose ensure node may currently receiving frame receive jam signal place correct 32-bit mac crc causes receivers discard frame due crc error late collision type collision happens packet allowed protocol standard question 10 megabit shared medium ethernet collision error occurs first 512 bits data transmitted transmitting station late collision said occurred importantly late collisions re-sent nic unlike collisions occurring first 64 octets left upper layers protocol stack determine loss data correctly set csma/cd network link late collisions usual possible causes full-duplex/half-duplex mismatch exceeded ethernet cable length limits defective hardware incorrect cabling non-compliant number hubs network bad nic local collision collision occurs nic opposed wire nic detect local collisions without attempting send information utp cable local collision detected local segment station detects signal rx pair time sending tx pair since two signals different pairs characteristic change signal collisions recognized utp station operating half-duplex functional difference half full-duplex operation regard whether transmit receive pairs permitted used simultaneously channel capture effect phenomenon one user shared medium captures medium significant time period usually 16 frames users denied use medium effect first seen networks using csma/cd ethernet effect data-intense connection dominates multiple-access wireless channel happens ethernet links way nodes back link attempt re-access ethernet protocol communication collision happens two users medium try send time user waits random period time re-accessing link however user wait back random amount time proportional number times successively tried access link channel capture effect happens one user continues win link example user user b try access quiet link time since detect collision user waits random time 0 1 time units user b let say user chooses lower back-off time user begins use link b allows finish sending frame user still send user user b cause another data collision choose random back-off time 0 1 user b choose back-off time 0 3 – b second time colliding row chances win one continues likely win collision battles 16 collisions number tries user backs extended period time user captured channel ability one node capture entire medium decreased number nodes increases number nodes increases higher probability one nodes lower back-off time capturing node channel capture effect creates situation one station able transmit others continually backing thus leading situation short-term unfairness yet situation long-term fair every station opportunity capture medium one station done transmitting efficiency channel increased one node captured channel negative side effect capture effect would idle time created due stations backing one station finished transmitting medium large idle times present stations continually backing instances back-off occur long stations actually discard packets maximum attempt limits reached csma/cd used now-obsolete shared media ethernet variants 10base5 10base2 early versions twisted-pair ethernet used repeater hubs modern ethernet networks built switches full-duplex connections longer need use csma/cd ethernet segment collision domain isolated csma/cd still supported backwards compatibility half-duplex connections ieee 802.3 standard defines ethernet variants historical reasons still bore title carrier sense multiple access collision detection csma/cd access method physical layer specifications 802.3-2008 uses new name ieee standard ethernet
[ 7052, 1618, 1068, 6071, 6976, 823, 5387, 7824, 2121, 5492, 3724, 4801, 2061, 2062, 4093, 1988 ]
Test
1,975
2
Comparison_of_command_shells:comparison command shells command shell command line interface computer program operating system background execution allows shell run command background posix shells unix shells allow background execution using character end command powershell use codice_1 codice_2 commands completion features assist user typing commands command line looking suggesting matching words incomplete ones completion generally requested pressing completion key often key command name completion completion name command shells command program command path usually codice_3 builtin command function alias path completion completion path file relative absolute wildcard completion generalization path completion expression matches number files using supported syntax file matching variable completion completion name variable name environment variable shell variable bash zsh fish completion variable names powershell completions environment variable names shell variable names — within user-defined functions — parameter names command argument completion completion specific command arguments two types arguments named positional named arguments often called options identified name letter preceding value whereas positional arguments consist value shells allow completion argument names support completing values bash zsh fish offer parameter name completion definition external command distributed separate completion definition file command parameter name/value completions shells assume path/filename completion completion defined command completion set suggest completions calling shell function fish shell additionally supports parsing man pages extract parameter information used improve completions/suggestions powershell types commands cmdlets functions script files inherently expose data names types valid value ranges/lists argument metadata used powershell automatically support argument name value completion built-in commands/functions user-defined commands/functions well script files individual cmdlets also define dynamic completion argument values completion values computed dynamically running system user shell may find he/she typing something similar user typed shell supports command history user call previous command line editor edit issuing shells support completion may also able directly complete command command history given partial/initial part previous command modern shells support command history shells support command history general also support completion history rather recalling commands history addition plain command text powershell also records execution start- end time execution status command history mandatory arguments/parameters arguments/parameters must assigned value upon invocation command function script file shell determine ahead invocation missing mandatory values assist interactive user prompting values instead letting command fail shell prompt missing values allow author script command function mark parameter mandatory instead creating script code either prompt missing values determining run interactively fail message powershell allows commands functions scripts define arguments/parameters mandatory shell determines prior invocation mandatory arguments/parameters bound prompt user value actual invocation automatic suggestions shell monitors interactive user typing displays context-relevant suggestions without interrupting typing instead user explicitly requesting completion powershell integrated scripting environment use discoverable metadata provide intellisense i.e suggestions automatically pops user types addition user explicitly requests completion lists pressing e.g shell may record locations user used current locations allow fast switching location/directory history one uses zsh directory stack record directory history particular auto_pushd option advanced cd arguments completion used purpose powershell allows multiple named stacks used locations directories pushed onto/popped current stack named stack stack become current default stack unlike shells powershell location concept allow location stacks hold file system locations well location types like e.g active directory organizational units/groups sql server databases/tables/objects internet information server applications/sites/virtual directories 4dos take command console record history current directories allows user switch directory history using popup window directory name used directly command implicitly changes current location directory must distinguished unrelated load drive feature supported concurrent dos multiuser dos system manager real/32 drive letter l implicitly updated point load path loaded application thereby allowing applications refer files residing load directory standardized drive letter instead absolute path command line match command arguments directly spell checking automatically correct common typing mistakes case sensitivity missing letters two approaches shell either suggest probable corrections upon command invocation happen earlier part completion autosuggestion tcsh zsh shells feature optional spell checking/correction upon command invocation fish autocorrection upon completion autosuggestion feature therefore way typing whole command pressing enter whereas extensive use tab right-arrow keys makes shell mostly case insensitive psreadline powershell module shipped version 5.0 provides option specify commandvalidationhandler scriptblock runs submitting command allows custom correcting commonly mistyped commands verification actually running command integrated environment integration command-line interface editors typically multiple documents help system possibly debugging tools take command console tcc comes integrated environment command line pane file explorer editor batch debugger powershell ise includes command line pane support integrated command line copy-paste multiple document editors source-level debugging help pane command explorer pane scripting interface allowing scripts/modules manipulate menus add-ons etc ise menus windows shortcuts addons customizable scripts snippets small regions reusable script code snippets often used save keystrokes assist user common scripting patterns many text editors support snippets scripting either built-in functionality plugins powershell supports snippets integrated scripting environment ise using shell script prompt interactive user value shell script present interactive user list choices shell script job report progress long running tasks interactive user unix/linux systems may offer tools support using progress indicators scripts standalone-commands program pv integrated features shells however powershell built-in command api functions used authoring commands writing/updating progress bar progress bar messages sent separates regular command output progress bar always displayed ultimate interactive users console regardless whether progress messages originates interactive script background job remote session output command execution displayed table/grid interactively sorted filtered and/or otherwise manipulated command execution ends powershell out-gridview cmdlet displays data interactive window interactive sorting filtering jp software command-line processors provide user-configurable colorization file directory names directory listings based file extension and/or attributes optionally defined colordir environment variable unix/linux shells feature ls command terminal command line processors dos plus multiuser dos real/32 versions dr-dos support number optional environment variables define escape sequences allowing control text highlighting reversion colorization display print purposes commands like type mentioned command line processors support defined sequences emitted filenames typical sequence would \033 1m conjunction ansi.sys \033p ascii terminal \016 ibm esc/p printer likewise typical sequences would \033 0m \033q \024 respectively variables header footer supported command.com dr-dos 7.02 higher define sequences emitted text blocks order control text highlighting pagination formatting options unix/linux shells feature terminal independent project offers syntax highlighting add-on z shell zsh part shell however powershell provides customizable syntax highlighting command line psreadline module module used powershell v3.0+ included v5.0 additionally loaded default command line host powershell.exe v5.0 powershell ise also includes syntax highlighting command line well script pane take command console tcc offers syntax highlighting integrated environment 4dos 4os2 4nt take command console powershell powershell ise looks context-sensitive help information pressed zsh provides various forms configurable context-sensitive help part run-help widget _complete_help command completion options commands command builder guided dialog assists user filling command powershell command builder available powershell ise displayed separately show-command cmdlet anticipation given running application may accept keyboard input user shell instructs shell generate sequence simulated keystrokes application interpret keyboard input interactive user sending keystroke sequences user may able direct application perform actions would impossible achieve input redirection would otherwise require interactive user example application acts keystrokes redirected distinguishes normal extended keys flushes queue accepting new input startup certain conditions read standard input keystroke stacking typically also provides means control timing simulated keys sent delay new keys queue flushed etc also allows simulate keys present keyboard corresponding keys physically exist different keyboard layout used therefore would impossible type user shell scripts need query user sensitive information passwords private digital keys pin codes confidential information sensitive input echoed back screen/input device could gleaned unauthorized persons plaintext memory representation sensitive information also avoided could allow information compromised e.g. swap files core dumps etc shells bash zsh powershell offer specific feature shells offer specific feature may still able turn echoing means shells executing unix/linux operating system use stty external command switch off/on echoing input characters addition echoing back characters powershell -assecurestring option also encrypts input character-by-character input process ensuring string never represented unencrypted memory could compromised memory dumps scanning transcription etc script reads password environment variable memory plain text thus may accessed via core dump also process environment may accessible processes started script powershell work encrypted string variables/parameters encrypted variables ensure values inadvertently disclosed e.g transcripts echo'ing logfiles memory crash dumps even malicious memory scanning powershell also supports saving encrypted strings text files protected key owned current user operating systems define execute permission granted users/groups file unix systems execute permission controls access invoking file program applies executables scripts permission enforced program loader obligation needed invoking program invoked program enforcing execute permission also goes shells interpreter programs behaviour mandated posix c library used interfacing kernel posix specifies codice_4 family functions shall fail eaccess permission denied file denies execution permission see execute permission applies script run directly script invoked argument interpreting shell executed regardless whether user holds execute permission script although windows also specifies execute permission none windows-specific shells block script execution permission granted shells block scripts determined untrustworthy refuse run scripts mandated system administrator powershell set block execution scripts marked obtained unknown/untrusted origin e.g internet internet facing applications web browsers im clients mail readers etc mark files downloaded internet origin zone alternate data stream understood powershell script/code signing policies used ensure operations department run approved scripts/code reviewed signed trusted reviewer/approver signing regimes also protects tampering script sent vendor client client use signing ensure script tampered transit script indeed originates vendor attacker trying social engineer operator running attack script powershell set allow execution otherwise blocked scripts e.g originating untrusted zone script digitally signed using trusted digital certificate company may want enforce execution restriction globally within company and/or certain parts company may want set policy running signed scripts allow certain parts company set policies zoned restrictions powershell allows script blocking policies enforced multiple levels local machine current user etc higher level policy overrides lower level policy e.g policy defined local machine place users local machine left undefined higher level defined lower levels several shells started configured start mode limited set commands actions available user security boundary command accessing resource blocked rather resource nevertheless typically used restrict users actions logging restricted mode part posix specification shells linux/unix shells support mode several built-in commands disabled external commands certain directory invoked powershell supports restricted modes session configuration files session configurations session configuration file define visible available cmdlets aliases functions path providers scripts invoke scripts security risk potentially execute foreign code context user launched initial script scripts usually designed exclusively include scripts known safe locations instances e.g offering user way configure environment loading localized messages script may need include scripts/files one way address risk shell offer safe subset commands executed included script powershell data sections contain constants expressions using restricted subset operators commands powershell data sections used e.g localized strings needs read external source protecting unwanted side effects
[ 362, 1524, 3431, 6249, 4759, 2280, 2379, 7341, 900, 7251, 4771, 5116, 644, 5480, 3532, 7637, 5571, 7827, 126, 3021, 578, 3636, 7272, 3979, 6921, 7663, 149, 8019, 4539, 6050, 6577, 343, 6489, 3915, 2530, 6319, 878 ]
Test
1,976
5
Carrier_system:carrier system carrier system telecommunications system transmits information voice signals telephone call video signals television modulation one multiple carrier signals principal voice frequency data rate carrier systems typically transmit multiple channels communication simultaneously shared medium using various forms multiplexing prominent multiplexing methods carrier signal time-division multiplexing tdm frequency-division multiplexing fdm cable television system example frequency-division multiplexing many television programs carried simultaneously coaxial cable sending different frequency multiple layers multiplexing may ultimately performed upon given input signal example public switched telephone network many telephone calls sent shared trunk lines time-division multiplexing long distance calls several channels may sent communications satellite link frequency-division multiplexing given receiving node specific channels may demultiplexed individually purpose carrier systems save money carrying traffic less infrastructure 19th century telephone systems operating baseband could carry one telephone call wire hence routes heavy traffic needed many wires 1920s frequency-division multiplexing could carry several circuits balanced wires 1930s l-carrier similar systems carried hundreds calls time coaxial cables capacity systems increased middle century 1950s researchers began take seriously possibility saving money terminal equipment using time-division multiplexing work led t-carrier similar digital systems local use due shorter repeater spacings required digital systems long-distance still used fdm late 1970s optical fiber improved point digital connections became cheapest ones distances short long end century analog connections within telephone exchanges became rare
[ 5714, 250, 4801, 2208, 6145, 2117, 4392, 2236 ]
Test
1,977
3
Rockchip:rockchip rockchip fuzhou rockchip electronics co. ltd. chinese fabless semiconductor company based fuzhou fujian province rockchip founded 2001 offices shanghai beijing shenzhen hangzhou hong kong designs system chip soc products using arm architecture licensed arm holdings majority projects rockchip ranked one top50 fabless company ic suppliers worldwide company established cooperation google microsoft intel 27 may 2014 intel announced agreement rockchip adopt intel architecture entry-level tablets rockchip supplier socs chinese white-box tablet manufacturers well supplying oems asus hp samsung toshiba market socs tablets rockchip faces competition allwinner technology mediatek intel actions semiconductor spreadtrum leadcore technology samsung semiconductor qualcomm broadcom via technologies amlogic establishing position early developing chinese tablet soc market 2012 faced challenge allwinner 2012 rockchip shipped 10.5 million tablet processors compared 27.5 million allwinner however q3 2013 rockchip forecast ship 6 million tablet-use application processors china compared 7 million allwinner mainly shipped single-core products rockchip reported number one supplier tablet-use application processors china q4 2013 q1 2014 q2 2014 chinese soc suppliers cellular baseband technology disadvantage compared companies mediatek also supply smartphone market white-box tablet makers increasingly add phone cellular data functionality products intel corporation made investments tablet processor market heavily subsidizing entry low-cost tablet market 2014 may 2014 intel announced agreement rockchip jointly deliver intel-branded mobile soc platform based intel atom processor 3g modem technology terms agreement two companies deliver intel-branded mobile soc platform quad-core platform based intel atom processor core integrated intel 3g modem technology expected available first half 2015 intel rockchip sell new part oems odms primarily company existing customer base october 2014 rockchip already offering intel xmm 6321 low-end smartphones two chips dual-core application processor either intel processor cores arm cortex-a5 cores integrated modem xg632 integrated rf chip ag620 originates cellular chip division infineon technologies intel acquired time ago application processor may also originate infineon intel rockchip earlier targeted smartphone space material way
[ 2538, 6082, 6421, 7890, 722, 2926, 5740, 1473, 5750, 740, 5752, 7189, 5405, 5406, 1864, 67, 6865, 446, 451, 6874, 6165, 1167, 463, 804, 5472, 469, 4041, 3008, 3365, 6910, 5845, 7654, 6919, 3397, 1977, 2339, 6950, 2711, 1995, 3764, 550, ...
Test
1,978
2
SIO_(software):sio software sio serial port driver package os/2 written raymond l. gwinn designed improve performance os/2 default serial drivers also improve compatibility sio contains virtualized fossil vx00 driver loaded provide fossil support dos based communications software sio later added ability create virtualized com ports combined included program vmodem allows incoming telnet connections directed toward virtualized com port older communications software also able call telnet sites possible due custom set commands allow users pass hostname vmodem software sio included vmodem software became popular among bulletin board system operators due incoming telnet feature well drastic speed improvements telnet solutions time
[ 7765, 490, 5571 ]
Test
1,979
2
Memory_ballooning:memory ballooning memory ballooning technique used eliminate need overprovision host memory used virtual machine vm implement virtual machine kernel implements balloon driver allocates unused memory within vm address space reserved memory pool balloon unavailable processes vm however rather reserved uses within vm physical memory mapped pages within vm actually unmapped vm host operating system hypervisor making available uses host machine depending amount memory required vm size balloon may increased decreased dynamically mapping unmapping physical memory required vm
[]
Test
1,980
3
Gunfright:gunfright gunfright arcade adventure video game developed ultimate play game published u.s. gold first released zx spectrum 1985 ported amstrad cpc msx later year game player takes role sheriff town black rock tasked eliminating outlaws scattered throughout settlement game developed directly nightshade re-uses latter game filmation ii game engine allows images rendered without overlapping game received mostly positive reviews upon release praise directed graphics presentation criticism directed game similarity nightshade later included rare replay rare 2015 xbox one retrospective compilation game presented isometric format set fictional town black rock player takes role sheriff quickdraw main objective game track kill gang outlaws hiding town game begins first-person perspective targeting minigame vertically scrolling bags money shot using crosshairs shooting bags give player initial sums money used purchase ammunition game quickdraw must locate wanted outlaws one one outlaw found shot shooting outlaw kill initiates duel game shifts first-person targeting minigame time player must shoot rapidly moving outlaw quickly possible player either wait outlaw draw take initiative shoot first make bandit draw weapon well player successfully shoots outlaw bounty paid increasing every round new outlaw enters town gameplay players often encounter helpful residents point way outlaws residents need protected gameplay player pay fine shot either bandits sheriff quickdraw outlaws mounted horseback meaning player may saddle imaginary horse pursue game developed isometric projection game engine known filmation ii used previously ultimate 1985 zx spectrum game nightshade filmation engine created stamper brothers portray 3d imagery filmation ii used image masking technique drew filled holes background allowing game create composite structures pixelated drawings without visual overlay despite limitations platforms zx spectrum offered gunfright initially released zx spectrum 1985 last game developed direct involvement stamper brothers realising graphical limits platforms zx spectrum pushed future projects blackwyche dragon skulle handed designer brothers dave bob thomas often uncredited work gunfright along knight lore alien 8 nightshade re-released msx 1986 gunfright sabre wulf ported amstrad cpc later year gunfright later included august 2015 xbox one compilation 30 rare titles rare replay game received mostly positive reviews upon release reviewers writing crash praised game graphics highly detailed colourful stated game visually similar ultimate immediately previous game nightshade gwyn hughes sinclair thought graphics best aspect game despite similarly comparing nightshade hughes also praised game smooth animation techniques used portray western town reviewer cvg suggested game style gameplay mix nightshade nintendo duck hunt reviewing msx version reviewer computer gamer praised game plot complimentary way game able separate ultimate previous game used filmation engine reviewers writing crash praised gameplay stating game element considerably developed several different stages highly addictive writers cvg criticised gameplay noting found difficult distinguish outlaws male inhabitants town also noted absence puzzle elements considered unusual ultimate game bill bennett computer similarly considered omission puzzle elements unusual welcomed witty change genre previous dungeon-themed video games
[ 223, 2904, 6397, 6434, 3022, 4060, 1517 ]
Validation
1,981
5
Cell_relay:cell relay computer networking cell relay refers method statistically multiplexing small fixed-length packets called cells transport data computers kinds network equipment unreliable connection-oriented packet switched data communications protocol cell relay transmission rates usually 56 kbit/s several gigabits per second atm particularly popular form cell relay commonly used home dsl connections often runs 128 kbit/s 1.544 mbit/s ds1 high-speed backbone connections oc-3 faster cell relay protocols neither flow control error correction capability information-content independent correspond layers one two osi reference model cell relay used delay- jitter-sensitive traffic voice video cell relay systems break variable-length user packets groups fixed-length cells add addressing verification information frame length fixed networking hardware based time delay user packet-length considerations one user data message may segmented many cells cell relay systems may also carry bitstream-based data pdh traffic breaking streams cells lightweight synchronization clock recovery shim thus cell relay systems may potentially carry combination stream-based packet-based data form statistical time division multiplexing cell relay implementation fast packet-switching technology used connection-oriented broadband integrated services digital networks b-isdn better-known supporting technology atm connectionless ieee 802.6 switched multi-megabit data service smds time information transmitted switch basically sends data units connections ’ negotiated like circuit switching channels ’ allocated channels exist atm condition adequate amount bandwidth maintain indefinite transmissions facility cell relay utilizes data cells persistent size frames comparable data packets however contrast cells may fluctuate size based circumstances type technology secure reason procedures support error handling data recovery per se delicate significant transmissions may perhaps transported faster via fixed-sized cells simpler transmit compared variable-sized frames packets cell relay extremely reliable transporting vital data switching devices give precise method cells endpoint address embedded cell example cell relay atm prevalent form utilized transfer cell fixed size 53 bytes
[ 2062, 5714, 8108, 1916, 3462 ]
Test
1,982
7
Cloud-computing_comparison:cloud-computing comparison following comparison cloud-computing software providers paas providers run iaas providers means provider paas iaas
[ 2988, 7613, 632, 1634, 3091, 6262, 993, 6428, 1930, 6806, 3627, 5927, 2212, 5135, 1757, 3028, 6029, 842, 1762, 5064, 6469, 330, 2961, 5965, 2700, 7037, 2619, 1514, 5889 ]
Test
1,983
4
MacScan:macscan macscan anti-malware utility apple mac os x developed securemac aimed removing malware including spyware trojan horses keystroke loggers tracking cookies first anti-spyware program released mac os x addition application scans remote administration programs like apple remote desktop allowing users verify programs installed authorization unlike anti-malware applications available mac os x systems macscan scans exclusively malware affects macs opposed scanning forms known threats would include windows malware given considerably less mac-based malware windows-based malware macscan definition files smaller optimized full version macscan available shareware 30-day trial available free developer website download macscan started discussion securemac.com forums developed response specific user concerns malware securemac developed keep mac platform secure scanning viruses malware addition selling flagship product securemac releases special-purpose removal utilities public free charge threat might compromise broader platform releases included utilities remove particular threat designed remove free
[ 5571 ]
Validation
1,984
5
File_eXchange_Protocol:file exchange protocol file exchange protocol fxp fxsp method data transfer uses ftp transfer data one remote server another inter-server without routing data client connection conventional ftp involves single server single client data transmission done two fxp session client maintains standard ftp connection two servers direct either server connect initiate data transfer advantage using fxp ftp evident high-bandwidth server demands resources another high-bandwidth server low-bandwidth client network administrator working away location authority access resources servers enabling fxp support make server vulnerable exploit known ftp bounce result ftp server software often fxp disabled default sites restricted ip addresses trusted sites limit risk ftp servers glftpd cuftpd raidenftpd drftpd wzdftpd support negotiation secure data channel two servers using either ftp protocol extension commands cpsv sscn normally works client issuing cpsv lieu pasv command—or sending sscn prior pasv transfers—which instructs server create either ssl tls connection however methods—cpsv sscn—may susceptible man-in-the-middle attacks two ftp servers verify ssl certificates sscn first introduced raidenftpd smartftp 2003 widely adopted although fxp often considered distinct protocol fact merely extension ftp protocol specified protocol standardized subset rfc 959 ietf
[ 7148, 456, 3172, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 2386, 6531, 1462, 2650, 7637, 2119, 6908, 7091, 2219, 3383, 3640, 3797, 2043, 6923, 3312, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 259, 5880, 3594, 3426 ]
Test