node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
2,185 | 2 | Provisioning_(telecommunications):provisioning telecommunications telecommunication provisioning involves process preparing equipping network allow provide new services users national security/emergency preparedness telecommunications services provisioning equates initiation includes altering state existing priority service capability concept network provisioning service mediation mostly used telecommunication industry refers provisioning customer services network elements requires existence networking equipment depends network planning design modern signal infrastructure employing information technology levels possible distinction telecommunications services higher level infrastructure accordingly provisioning configures required systems provides users access data technology resources refers enterprise-level information-resource management involved organizationally cio typically manages provisioning necessarily involving human resources departments cooperating core provisioning process monitors access rights privileges ensure security enterprise resources user privacy secondary responsibility ensures compliance minimizes vulnerability systems penetration abuse tertiary responsibility tries reduce amount custom configuration using boot image control methods radically reduce number different configurations involved discussion provisioning often appears context virtualization orchestration utility computing cloud computing open-configuration concepts projects instance oasis provisioning services technical committee pstc defines xml-based framework exchanging user resource service-provisioning information spml service provisioning markup language managing provisioning allocation identity information system resources within organizations provisioning taken place process sysopping ensures maintenance services expected standards provisioning thus refers setup startup part service operation sysopping ongoing support one type provisioning services assigned customer customer relationship management crm provisioned network element enabling service allows customer actually use service relation service configured crm service network elements necessarily 1:1 relation services enabled one network element e.g microsoft media server mms // service provisioning service mediation device translates service corresponding parameters service one services/parameters network elements involved algorithm used translate system service network services called provisioning logic electronic invoice feeds carriers automatically downloaded directly core telecom expense management tem software immediately conduct audit single line item charge way user support operations center usoc level provisioning software capture circuit number provided carriers bills outside contracted rate exception rule trigger red flag notify pre-established staff member review billing error server provisioning set actions prepare server appropriate systems data software make ready network operation typical tasks provisioning server select server pool available servers load appropriate software operating system device drivers middleware applications appropriately customize configure system software create change boot image server change parameters ip address ip gateway find associated network storage resources sometimes separated resource provisioning audit system auditing system ensure oval compliance limit vulnerability ensure compliance install patches actions restart system load new software makes system ready operation typically internet service provider isp network operations center perform tasks well-defined set parameters example boot image organization approved uses software license many instances boot image create virtual dedicated host many software products available automate provisioning servers services end-user devices examples bmc bladelogic server automation hp server automation ibm tivoli provisioning manager redhat kickstart xcat hp insight cmu etc middleware applications installed either operating system installed afterwards using application service automation tool questions addressed academia provisioning issued many servers needed multi-tier multi-service applications cloud computing servers may provisioned via web user interface application programming interface one unique things cloud computing rapidly easily done monitoring software used trigger automatic provisioning existing resources become heavily stressed short server provisioning configures servers based resource requirements use hardware software component e.g single/dual processor ram hdd raid controller number lan cards applications os etc depends functionality server isp virtualization nos voice processing server redundancy depends availability servers organization critical applications less downtime using cluster servers raid mirroring system service used larger scale centers part avoid additional resource provisioning may done per service several software market server provisioning cobbler hp intelligent provisioning user provisioning refers creation maintenance deactivation user objects user attributes exist one systems directories applications response automated interactive business processes user provisioning software may include one following processes change propagation self-service workflow consolidated user administration delegated user administration federated change control user objects may represent employees contractors vendors partners customers recipients service services may include electronic mail inclusion published user directory access database access network mainframe etc user provisioning type identity management software particularly useful within organizations users may represented multiple objects multiple systems multiple instances on-demand self-service described national institute standards technology nist essential characteristic cloud computing self-service nature cloud computing lets end users obtain remove cloud services―including applications infrastructure supporting applications configuration― without requiring assistance staff member automatic self-servicing may target different application goals constraints e.g deadlines cost well handling different application architectures e.g. bags-of-tasks workflows cloud users obtain cloud services cloud service catalog self-service portal business users obtain configure cloud services means staff productive gives time manage cloud infrastructures however one problem cloud service provisioning instantaneous cloud vm acquired time user may take several minutes acquired vm ready use vm startup time dependent factors image size vm type data center location number vms etc cloud providers different vm startup performance mobile subscriber provisioning refers setting new services gprs mms instant messaging existing subscriber mobile phone network gateways standard internet chat mail services network operator typically sends settings subscriber handset using sms text services html less commonly wap depending mobile operating systems accept general example provisioning data services mobile user using device voice calling may wish switch data services order read emails browse internet mobile device services provisioned thus user able stay connected push emails features smartphone services device management systems benefit end-users incorporating plug play data services supporting whatever device end-user using.. platform automatically detect devices network sending settings immediate continued usability process fully automated keeping history used devices sending settings subscriber devices previously set one method managing mobile updates filter imei/imsi pairs operators report activity 50 over-the-air settings update files per second changed refers delivering mobile content mobile internet mobile phone agnostic features said device may include operating system type versions java version browser version screen form factors audio capabilities language settings plethora characteristics april 2006 estimated 5000 permutations relevant mobile content provisioning facilitates common user experience though delivered widely different handsets getting user customer online beyond user provisioning network provisioning client system must configured process may include many steps depending connection technology question dsl cable fibre etc. possible steps four approaches provisioning internet access | [
2988,
5223,
4692,
5571,
921,
5666,
5753,
2489,
4800,
6381,
1582,
330,
2054,
6130,
2961,
6586,
3498,
4101
] | Test |
2,186 | 1 | DataMapper:datamapper datamapper object-relational mapper library written ruby follows active record pattern even though name implies follows data mapper pattern datamapper 1 may achieved total decoupling object database suggested data mapper pattern appears datamapper 2 intended change la virtus library adapted datamapper datamapper 2 project renamed launch released ruby object mapper rom august 2013 features datamapper datamapper designed abstract orm strictly sql based martin fowler enterprise pattern result datamapper adapters built non-sql databases couchdb apache solr webservices salesforce.com | [
2180,
7037,
7848,
5863,
6594,
6428
] | Test |
2,187 | 3 | OpenZaurus:openzaurus openzaurus defunct embedded operating system sharp zaurus personal mobile tool pda original form project repackaging sharprom zaurus factory supplied kernel root filesystem image order make zaurus os closer needs developer community sharprom altered use bugfixes software additions even removals order make package open openzaurus project revamped completely becoming debian-based built source ground due change direction openzaurus became quite similar embedded debian-based distributions familiar ipaq openzaurus current form facilitates easy method users build custom images efforts openzaurus along embedded linux projects integrated openembedded project provides common framework projects addition building custom openzaurus image using openembedded metadata openzaurus distribution acquired three variations version release april 26 2007 announced openzaurus project future development efforts focus ångström distribution embedded systems | [
2564,
5391,
5062,
5068,
2240,
424,
7214,
7587,
1893,
5794,
6158,
7954,
7956,
1522,
5803,
7251,
4400,
474,
2300,
5486,
1941,
6209,
3039,
1582,
5872,
4824,
5523,
5530,
3751,
6244,
5200,
3081,
1629,
3444,
3097,
5571,
5232,
2758,
5236,
1663,
... | Test |
2,188 | 1 | Flag_of_convenience:flag convenience flag convenience foc business practice whereby ship owners register merchant ship ship register country ship owners ship flies civil ensign country called flag state term often used pejoratively practice regarded contentious merchant ship required international law registered registry created country ship subject laws country used also ship involved case admiralty law ship owners may elect register ship foreign country enables avoid regulations owners ’ country may example stricter safety standards may also select jurisdiction reduce operating costs bypassing laws protect wages working conditions mariners term flag convenience used since 1950s registry nationality residency requirement ship registration often described open registry panama example offers advantages easier registration often online ability employ cheaper foreign labour furthermore foreign owners pay income taxes modern practice ships registered foreign country began 1920s united states shipowners seeking serve alcohol passengers prohibition registered ships panama owners soon began perceive advantages terms avoiding increased regulations rising labor costs continued register ships panama even prohibition ended use open registries steadily increased 1968 liberia grew surpass united kingdom world largest ship register half world merchant ships registered open registries almost 40 entire world fleet terms deadweight tonnage registered panama liberia marshall islands 2006 20 high-seas fishing vessels registered states connected according ihs markit march 2017 panama 8,052 ships registry singapore 3,574 ships liberia 3,277 ships marshall islands 3,244 ships hong kong 2,594 ships open registries criticised mainly trade union organisations based developed countries especially europe one criticism shipowners want hide ownership may select flag-of-convenience jurisdiction enables legally anonymous ships flags convenience found engaging crime offer substandard working conditions negatively impact environment primarily illegal unreported unregulated fishing shipowners may select jurisdiction measurement rules reduce certified grt size ship reduce subsequent port call dock dues consideration carnival cruise line changed flag rms empress canada 1972 panama 2011 cunard cruise line registered ships bermuda besides considerations enabled ship captains marry couples sea weddings sea described lucrative market thirteen flag states found international shipping organisations substandard regulations hand maritime industry practitioners seafarers countries contend natural product globalisation supporters practice however point economic regulatory advantages increased freedom choosing employees international labour pool ship owners developed countries use practice competitive global environment ships thirteen flags convenience targeted special enforcement countries visit ports countries called port state control international law requires every merchant ship registered country country ship registered flag state flag state gives ship right fly civil ensign ship operates laws flag state laws used ship involved admiralty case ship flag state exercises regulatory control vessel required inspect regularly certify ship equipment crew issue safety pollution prevention documents organization actually registers ship known registry registries may governmental private agencies reasons choosing open register varied include tax avoidance ability avoid national labor environmental regulations ability hire crews lower-wage countries national closed registries typically require ship owned constructed national interests least partially crewed citizens conversely open registries frequently offer on-line registration questions asked use flags convenience lowers registration maintenance costs turn reduces overall transportation costs accumulated advantages significant example 1999 28 american company sealand fleet 63 ships foreign-flagged saving company us 3.5 million per ship every year environmental disaster caused 1978 sinking flew liberian flag spurred creation new type maritime enforcement resulting strong political public outcry amoco cadiz sinking fourteen european nations signed 1982 paris memorandum understanding port state control paris mou port state control ships international trade became subject inspection states visit addition shipboard living working conditions inspections cover items concerning safety life sea prevention pollution ships cases port state inspection uncovers problems ship port state may take actions including detaining ship 2015 member states paris mou conducted 17,858 inspections deficiencies resulted 595 detained vessels 11 banned member states tokyo memorandum understanding conducted 17,269 ship inspections 2015 recording 83,606 deficiencies resulted 1,153 detentions principle genuine link ship owners flag state dates back 1958 article 5 1 geneva convention high seas also required state must effectively exercise jurisdiction control administrative technical social matters ships flying flag principle repeated article 91 1982 treaty called united nations convention law sea often referred unclos 1986 united nations conference trade development attempted solidify genuine link concept united nations convention conditions registration ships convention registration ships would require flag state linked ships either economic stake ownership ships providing mariners crew ships come force 1986 treaty requires 40 signatories whose combined tonnage exceeds 25 world total 14 countries signed treaty merchant ships used false flags tactic evade enemy warships since antiquity examples found early roman era middle ages following american revolutionary war merchantmen flying flag fledgling united states quickly found offered little protection attack barbary pirates – many responded seeking transfer registry back great britain use false flags frequently used british napoleonic wars united states war 1812 mid-19th century slave ships flew various flags avoid searched british anti-slavery fleets belen quezada august 1919 first foreign ship re-registered panamanian registry employed running illegal alcohol canada united states prohibition modern practice registering ships foreign countries gain economic advantage originated united states era world war though term flag convenience come use 1950s 1915 1922 several laws passed united states strengthen united states merchant marine provide safeguards mariners period u.s.-flagged ships became subject regular inspections undertaken american bureau shipping also time robert lafollette seamen act 1915 described magna carta sailors rights seamen act regulated mariners working hours payment established baseline requirements shipboard food also reduced penalties disobedience abolished practice imprisoning sailors offense desertion another aspect seamen act enforcement safety standards requirements lifeboats number qualified able seamen board officers seamen able speak language laws put u.s.-flagged vessels economic disadvantage countries lacking safeguards ships started re-registered panama open registry 1919 addition sidestepping seamen act panamanian-flagged ships early period paid sailors japanese wage scale much lower western merchant powers early phase world war ii transfer american-owned ships panama registry sanctioned united states government could used deliver materials britain without dragging united states neutral unintentionally war liberian open registry founded 1948 brainchild edward stettinius franklin d. roosevelt secretary state world war ii stettinius created corporate structure included liberia corporation joint-venture government liberia corporation structured one-fourth revenue would go liberian government another 10 went fund social programs liberia remainder returned stettinius corporation liberian registry created time panama registry becoming less attractive several reasons including unpopularity u.s. labor movement european shipping concerns political unrest panama increases fees regulations 11 march 1949 greek shipping magnate stavros niarchos registered first ship liberian flag world peace stettinius died 1949 ownership registry passed international bank washington led general george olmsted within 18 years liberia grew surpass united kingdom world largest register due liberia 1989 1999 civil wars registry eventually fell second panama flag convenience maritime funds continued supply 70 total government revenue civil war 1990 liberia joined republic marshall islands develop new maritime corporate program resulting company international registries formed parent company 1993 bought management taking liberian government americo-liberian warlord charles taylor signed new registry contract liberian international ship corporate registry commonly known liscr liscr one legal sources income taylor regime liberia registry operated virginia united states open registries panama liberia marshall islands accounted almost 40 entire world fleet terms deadweight tonnage year top ten flags convenience registered 55 world deadweight tonnage including 61 bulk carriers 56 oil tankers counteract class hopping 2009 iacs established transfer class agreement toca international transport workers federation itf maintains list registries considers flags convenience foc registries developing list itf considers ability willingness flag state enforce international minimum social standards vessels degree ratification enforcement ilo conventions recommendations safety environmental record list includes 35 countries panama liberia marshall islands world three largest registries terms deadweight tonnage dwt three organizations registered 11,636 ships total 39 world shipborne carrying capacity panama dominates scene 8,065 ships accounting almost 23 world dwt three marshall islands 1,265 registered ships greatest rate dwt increase 2009 increasing tonnage almost 15 bahamian flag ranks sixth worldwide behind hong kong greek registries similar size marshallese flag convenience 200 ships carrying capacity lower malta ninth position worldwide 100 ships bahamas capacity representing 4 world fleet 12 growth year eleventh position cyprus registered 1,016 ships 2009 2.6 world tonnage remaining top 11 flags convenience antigua barbuda 20 bermuda 22 saint vincent grenadines 26 french international ship register fis number 27 bermuda fis fewer 200 ships apiece large average bermudan ship average fis ship way reference average capacity ships u.s. u.k. registers respectively registries antigua barbuda saint vincent grenadines 1,000 ships average capacity respectively remaining flags convenience listed itf account less 1 world dwt half world merchant ships measured tonnage registered flags convenience number common threads found criticisms flag convenience system one flag states insufficient regulations regulations poorly enforced another many cases flag state identify shipowner much less hold owner civilly criminally responsible ship actions result lack flag state control flags convenience criticized grounds enabling tax avoidance providing environment conducting criminal activities supporting terrorism providing poor working conditions seafarers adverse effect environment david cockroft former general secretary itf says panama largest maritime register followed liberia landlocked bolivia also major registry mongolia also registers based countries example panama consulates manage documentation collect registration fees liberia registry managed company virginia bahamas city london ship beneficial owner legally financially responsible ship activities number reasons justifiable suspicious shipowners wish conceal ownership may use number strategies achieve goal jurisidictions permit actual owners may establish shell corporations legal owners ships making difficult impossible track beneficial owner ship 2004 report un secretary general consultative group flag state implementation reported easy comparatively inexpensive establish complex web corporate entities provide effective cover identities beneficial owners want known according 2003 report organisation economic co-operation development oecd report entitled ownership control ships corporate structures often multi-layered spread across numerous jurisdictions make beneficial owner almost impenetrable law enforcement officials taxation report concludes regardless reasons cloak anonymity made available provided also assist may wish remain hidden engage illegal criminal activities including terrorists oecd report concludes use bearer shares perhaps single important perhaps widely used mechanism protect anonymity ship beneficial owner physically possessing bearer share accords ownership corporation requirement reporting transfer bearer shares every jurisdiction requires serial numbers even recorded two similar techniques provide anonymity ship beneficial owner nominee shareholders nominee directors jurisdictions require shareholder identities reported loophole may exist beneficial owner may appoint nominee shareholder nominee legally compelled reveal identity beneficial owner corporations required least one director however many jurisdictions allow nominee director nominee director name would appear corporate paperwork place beneficial owners like nominee shareholders jurisdictions compel nominee director divulge identity beneficial owners hurdle jurisdictions allow corporation named director flag convenience ships long linked crime high seas example 1982 honduras shut open registry operations enabled illegal traffic kinds given honduras bad name ships registered cambodia shipping corporation csc found smuggling drugs cigarettes europe breaking iraq oil embargo engaging human trafficking prostitution europe asia response activities 2000 ahamd yahya cambodian ministry public works transport told industry publication fairplay n't know care owns ships whether 're 'white 'black business ... concern less two years later french forces seized cambodian-flagged greek-owned mv winner cocaine smuggling shortly seizure cambodian prime minister hun sen closed registry foreign ships cambodia canceled contract csc shortly thereafter north korean flag convenience also garnered significant scrutiny 2003 north korean freighter pong su reflagged tuvalu middle voyage shortly seized australian authorities smuggling heroin country year thirteen nations began monitoring vessels north korean flag illicit cargos like drugs missiles nuclear weapon fuel accompanying material ilo maritime labour convention 2006 international labour organization estimated time approximately 1,200,000 working seafarers across world document goes say working aboard ships flagged states exercise effective jurisdiction control ships seafarers often work unacceptable conditions detriment well-being health safety safety ships work international transport workers federation goes stating flags convenience provide means avoiding labor regulation country ownership become vehicle paying low wages forcing long hours work unsafe working conditions since foc ships real nationality beyond reach single national seafarers trade union also say ships low safety standards construction requirements enforce safety standards minimum social standards trade union rights seafarers frequently fail pay crews poor safety records engage practices abandoning crewmen distant ports flag convenience ships involved highest-profile oil spills history maltese-flagged bahamian-flagged marshallese-flagged deepwater horizon liberian-flagged ss torrey canyon common environmental criticism face regards illegal fishing critics flag convenience system argue many foc flag states lack resources properly monitor control vessels environmental justice foundation ejf contends illegal unreported unregulated fishing iuu vessels use flags convenience avoid fisheries regulations controls flags convenience help reduce operating costs associated illegal fishing methods help illegal operators avoid prosecution hide beneficial ownership result flags convenience perpetuate iuu fishing extensive environmental social economic impacts particularly developing countries ejf campaigning end granting flags convenience fishing vessels effective measure combat iuu fishing according franz fischler european union fisheries commissioner international regulations maritime industry promulgated agencies united nations particularly international maritime organization international labour organization flag states adopt regulations ships ratifying individual treaties one common criticism flag convenience countries allow shipowners avoid regulations ratifying important treaties failing enforce international chamber shipping ics issues annual report entitled shipping industry flag state performance table identifying six core conventions representing minimum level maritime regulation viewpoint shipowners solas marpol 66 stcw mlc clc/fund92 35 flag convenience countries listed itf ratified stcw convention concerning standards training certification watchkeeping seafarers 19 ratified six however least fourteen listed countries ratified remaining five conventions put context 60 flag states ratified six conventions including china united states america safety life sea solas load line 66 conventions focus shipboard safety issues originally developed response sinking rms titanic solas sets regulations lifeboats emergency equipment safety procedures including continuous radio watches updated include regulations ship construction fire protection systems life-saving appliances radio communications safety navigation management safe operation ships safety security concerns 66 sets standards minimum buoyancy hull stress ship fittings well establishing navigational zones extra precautions must taken international labour organization maritime labour convention 2006 provides comprehensive rights protection work seafarers including requirements minimum age qualifications hours work rest medical care complaint procedures wage payments onboard living arrangements mlc replaced number earlier ilo conventions including ilo147 marpol clc/fund92 relate pollution international convention prevention pollution ships 1973 marpol modified protocol 1978 including annexes i–vi regulates pollution ships including oil air pollution shipboard sewage garbage civil liability oil pollution damage clc international fund compensation oil pollution damage fund92 together provide mechanisms ensure compensation victims oil spills 1978 number european countries agreed hague audit labour conditions board vessels vis-a-vis rules international labour organization end 1982 paris memorandum understanding port state control paris mou established setting port state control standards twenty-six european countries canada several regional memoranda understanding established based paris model including memorandum understanding port state control asia-pacific region typically referred tokyo mou organizations black sea caribbean indian ocean mediterranean latin america tokyo paris organizations generate based deficiencies detentions black- white- grey-lists flag states us coast guard handles port state control inspections us maintains similar target list underperforming flag states least thirteen thirty-five flags convenience listed itf targeted special enforcement countries paris tokyo mous u.s. coast guard united nations conference trade development 2009 report maritime trade states shipowners often register ships foreign flag order employ seafarers developing countries lower wages philippines china supply large percentage maritime labor general major flags convenience particular 2009 flag-states employing highest number expatriate-filipino seafarers panama bahamas liberia marshall islands year 150,000 filipino sailors employed four flags convenience 2006 study united states maritime administration marad sailors people republic china comprised 40 crews surveyed ships flying panamanian flag around 10 flying liberian flag marad report referred china philippines low cost crewing sources seafaring industry often divided two employment groups licensed mariners including deck officers marine engineers mariners required licenses able seamen cooks required certified latter group collectively known unlicensed mariners ratings differences wages seen groups high cost crewing sources united states low cost sources china philippines however salaries flag convenience ships still far higher median salaries non-seafarers countries addition income tax exemption seamen particularly philippines unlicensed mariners 2009 statistics american bureau labor statistics give median earnings able ordinary seamen us 35,810 varying 21,640 10th percentile 55,360 90th percentile compared 2006 statistics international labour organization giving average yearly earnings filipino chinese able seamen around 2,000 3,000 per year php9,900 per month cny3,071 per year among licensed mariners american chief engineers earned median 63,630 varying 35,030 109,310 filipino counterparts averaged 5,500 per year php21,342 per month | [
6047,
7720,
477,
4712,
5792
] | Test |
2,189 | 3 | PC1512:pc1512 amstrad pc1512 amstrad mostly ibm pc-compatible computer system first manufactured 1986 later succeeded pc1640 launched £499 sold well one first cheap pcs europe significantly helped open european pc market consumers well businesses amstrad advertising pc1512 aimed homes rather offices 1512 influence uk pc magazine pc plus originally targeted amstrad pc 1512 compatibles since home ownership pcs time rare pc1512 shipped 512 kb ram could upgraded 640 kb ram 16 pieces 4164-120 dynamic ram chips 64kbx1 per chip setting jumper video output compatible cga standard extension allowing 16 colours used 640×200 graphics mode cpu pc1512 later pc1640 8 mhz intel 8086 sufficient playing secret monkey island maniac mansion prince persia power supply located monitor made upgrading difficult amstrad licensed ms-dos 3.2 digital research dos plus largely compatible ms-dos included features cp/m ability read cp/m disks one operating systems could used time also licensed gem windowing system supported customized cga hardware 1512 pc1512 followed pc1640 640 kb ram ega-compatible graphics chipset though ecd model could display ega modes either model shipped one two 5¼-inch floppy drives optionally hard drive either 10 20 mb amstrad also attempted expand market share selling computers united states us pc1512 marketed pc6400 included 20 mb hard drive ram upgrade 640 kb pc1512 also sold sinclair pc500 input devices supplied machine notable mouse amstrad mouse incompatible serial mice common time supported games including elite many dos programs problems keyboard sported atari-compatible joystick port digital joysticks joystick movements buttons mapped unused keyboard codes allowing joystick used many dos games written keyboard control series somewhat unusual fact physical volume control internal speaker allowed user make machine beep quietly silently boot time onwards innovation still present modern pcs legacy beeper typically still fixed-volume device whereas ibm pc almost pc compatibles power supply corner main case pc1512 power supply integrated monitor monitor sufficient venting cool convection instead needing fan pc1512 therefore quieter pcs rumours circulated amstrad pc would overheat existing owners would note happen new buyers discouraged result later models cooling fan integrated main case another example rumour suggestion issues 'unshielded power supply monitor affecting optional hard drive could installed back base unit would solved taping tin foil aluminum foil back base unit bottom monitor shield hard drive four discs supplied floppy models five hard drive models amstrad launched amstrad dmp3000 printer 80 character dot matrix printer ibm epson compatibility boasted nlq near letter quality could handle a4 fanfold paper connected computer via parallel port amstrad also launched sm2400 modem quad speed dial-up modem boasted speeds 2400 baud internal isa modem encased plastic could fit amstrad pc1512 pc1640 | [
7495,
6380,
5571,
1237,
6159
] | Test |
2,190 | 4 | Market_for_zero-day_exploits:market zero-day exploits market zero-day exploits refers commercial activity happens around trafficking software exploits software vulnerabilities exploits used get remote access stored information information generated real time people use software case countries today given monopolistic nature internet content service providers one specific vulnerability used thousands millions people context criminals become interested vulnerabilities 2014 report mcafee center strategic international studies estimates cost cybercrime cyberespionage somewhere around 160 billion per year worldwide countries appointed public institutions deal issue likely conflict interest government access people information order prevent crime result national security agencies criminals hide certain software vulnerabilities users original developer type vulnerability known zero-day exploit much said academia regular media regulation zero-day exploits market however difficult reach consensus definitions zero-day exploits rather vague applicable one define use certain software malware used addition conflict interest within operations state could prevent regulation make mandatory disclosure zero-days governments face trade-off protecting citizens privacy reporting vulnerabilities private companies one hand undermining communication technologies used targets—who also threaten security public—on protection national security exploitation software vulnerabilities unknown companies public ultimate resource security agencies also compromises safety every single user third party including criminal organizations could making use resource hence users private firms incentives minimize risks associated zero-day exploits former avoid invasion privacy latter reduce costs data breaches include legal processes costs related development solutions fix patch original vulnerability software costs associated loss confidence clients product ablon libicki golay explained great extent inner workings zero-day market main findings separated five components expanded commodity currency marketplace supply demand components relationship pricing described additionally challenge definition given demand component paramount understand nature markets i.e white gray black regulation lack thereof exploits digital products means information goods near-zero marginal production costs however atypical information goods unlike e-books digital videos lose value easy replicate due fact exposed original developer patch vulnerability decreasing value commodity value go zero two reasons 1 distribution patch asymmetric 2 developers could use original bug create variant decreased cost also atypical time-sensitive commodities companies updating software regular basis patch useful lapse versions sometimes vulnerability corrected without external report third even confidential transactions use exploit create dysfunction user end exposing vulnerability leading loss value sense exploits non-excludable non-rivalrous cases transactions typically designed protect identity least one parties involved exchange dependent type market—white markets use traceable money—most purchases made stolen digital funds credit cards cryptocurrencies latter dominant trend last years prices gray market set dollars shown leaks hacking team email archive classically black markets—like illegal weapons narcotics—require huge network trusted parties perform transactions deal-making document forgery financial transfers illicit transport among others difficult enforce legal agreement within networks many criminal organizations recruit members close home proximity element increases cost transaction intermediaries required transnational transactions decreasing overall profit original seller zero-days hand virtual products easily sold without intermediaries internet available technologies strong enough provide anonymity low cost even need intermediaries unwitting data mules used avoid evidence wrongdoing black market lucrative compared gray markets gray markets involve transactions public institutions charge national security usually require use third parties hide traces transactions hacking team archive example contains alleged contracts ecuadorian national secretariat intelligence used two intermediaries robotec theola archive said third-party companies cicom robotec negotiated contracts behalf fbi dea respectively less likely white markets face problem interest hide transaction quite opposite companies actively promote use new patches supply chain complex involves multiple actors organized hierarchies administrators sit top followed technical experts next intermediaries brokers vendors sophisticated finally followed witting mules within chain command one find multiple products zero-day exploits found developed subject matter experts exploits easily commercialized almost person willing enter black market two reasons first devices use outdated deprecated software easily targeted exploits otherwise would completely useless second half-day exploits used graphical interfaces learned freely available tutorials means little expertise required enter market seller coexistence zero-day half-day markets influences resilience black market developers keep moving towards sophisticated end take-downs high organized crime increased suppliers easily replaced people lower levels pyramid take less day find new provider take-down operation easily last months getting top however requires personal connections good reputation digital black market different physical one half-day exploits usually traded easily accessible places zero-days often require double-blind auctions use multiple layers encryption evade law enforcement done forums boards hence transactions occur extremely vetted spaces buys zero-day exploits defines kind market dealing afidler differentiates white gray black markets following market-sizing methodology harvard business school guide differentiate white markets gray markets black markets white markets original developers reward security researchers reporting vulnerabilities average prices reported 2014 less ten thousands dollars special offers 100,000 made certain vulnerabilities based type criticality nature affected software fourteen percent microsoft apple adobe vulnerabilities past ten years came white market programs criminals buy black market however governments occasional buyers offer satisfied gray market find impediments acquire zero-days due international regulations hacking team states website sell products governments countries blacklisted u.s. eu un nato asean although found infringing policy prices usually 10–100 times higher market compared white market changes depending location buyer united states place best prices offered potential sellers allowed sell specific territories like cuba north korea case u.s. likely operate black market well gray markets buyers include clients private sector governments brokers resell vulnerabilities information regarding markets available requests confidential information governments price usually redacted safety purposes information leaked national security agencies private companies i.e finfisher hacking team tsyrklevich reported transactions made hacking team date represents best evidence available inner workings gray market however likely case procedures applied white black markets well typically parties opposed gray markets retailers item market damages profits reputation result usually pressure original manufacturer adjust official channels distribution state also plays important role enforcing penalties case law infringement however zero-day exploit market atypical way operates closer workings black market brokers bounty programs could seen retailers zero-days control whatsoever original producers bad independently discovered different often anonymous actors interest change channel distribution profit white gray markets much less risk former states usually complement labour original manufacturers restrict gray markets play different role zero-day market regular purchasers exploits given secretive nature information security interest disclose information software vulnerabilities interest case aligned criminals seek infiltrate devices acquire information specific targets argued presence intelligence agencies consumers bad could increase price zero-days even legitimate markets provide bargaining power black-market sellers finally private companies unwilling raise prices rewards levels reached gray black markets arguing sustainable defensive markets previous studies shown reward programs cost-effective private firms compared hiring in-house security researchers prize rewards keeps increasing might case anymore 2015 zerodium new start-up focused acquisition high-risk vulnerabilities announced new bounty program published formats required vulnerability submissions criteria determine prices—the popularity complexity affected software quality submitted exploit—and prices represents mixture transparency offered traditional vulnerability reward program high rewards offered gray black markets software developer companies perceived new approach threat primarily due fact high bounties could cause developer tester employees leave day jobs effects market however yet defined nsa criticized buying stockpiling zero-day vulnerabilities keeping secret developing mainly offensive capabilities instead helping patch vulnerabilities | [
3528,
501,
2791,
208,
3393,
3480,
6589,
6756,
3047,
6323,
2427
] | Test |
2,191 | 4 | CyberHound:cyberhound cyberhound pty ltd formerly netbox blue pty ltd november 2015 australian-owned provider internet email security filtering management solutions founded brisbane john oxnam justin cooke trent davis 1999 privately held company cyberhound head office located fortitude valley queensland australia company provides products internet compliance management security john fison became chairman netbox blue 2006 director shareholder company january 2016 bloomberg acquired ip assets netbox blue bloomberg vault monitor social media trent davis works bloomberg 2008 netbox blue launched internet email filtering appliance specifically education sector technology offers cyberbullying protection category web filtering spam filtering virus protection internet quota management firewall late 2006 netbox blue partnered corporation ibm april 2008 global vendor canon solutions japan signed distribution agreement netbox blue netbox blue agreed provide spamchecker appliance—as known japan—to canon japan customers email filtering content control drop-in appliance result nine months co-development netbox blue canon japan specifically designed sme market japan netbox blue partnered anti-virus software provider eset partnership offered customers eset nod32 antivirus option netbox blue line utm virtualised security products result union small- medium-sized businesses smbs also access netbox blue integrated security management suite june 2012 netbox blue partnered edgewave inc deal enables edgewave provide customers netbox blue social media management technology safechat | [
91,
3123,
651
] | Test |
2,192 | 5 | Open_port:open port security parlance term open port used mean tcp udp port number configured accept packets contrast port rejects connections ignores packets directed called closed port ports integral part internet communication model — channel applications client computer reach software server services web pages ftp require respective ports open server order publicly reachable use terms open closed sometimes misleading though blurs distinction given port reachable unfiltered whether application actually listening port technically given port open context reachable enough communication channel established needs application service listening port accepting incoming packets processing application listening port incoming packets port simply rejected computer operating system ports closed context filtered use firewall firewall filter incoming packets letting packets configured packets directed port firewall configured close simply dropped transit though never existed malicious software acts service waiting connections remote attacker order give information control machine common security practice close unused ports personal computers block public access services might running computer without user knowledge whether due legitimate services misconfigured presence malicious software malicious black hat hackers crackers commonly use port scanning software find ports open unfiltered given computer whether actual service listening port attempt exploit potential vulnerabilities services find | [
1708,
5847,
3932,
3172,
7637,
1942,
3486,
1805
] | Test |
2,193 | 2 | Lightweight_Portable_Security:lightweight portable security lightweight portable security lps linux livecd liveusb developed publicly distributed united states department defense ’ air force research laboratory designed serve secure end node run almost intel-based computer pc mac lps boots ram creating pristine non-persistent end node supports dod-approved common access card cac readers required authenticating users pki-authenticated gateways access internal dod networks lps turns untrusted system home computer trusted network client trace work activity malware written local computer hard drive september 2011 version 1.2.5 lps public distribution includes smart card-enabled firefox browser supporting dod cac personal identity verification piv cards pdf text viewer java file browser remote desktop software citrix microsoft vmware view ssh client public edition encryption wizard ability use usb flash drives public deluxe version also available adds libreoffice adobe reader software lps encryption wizard initiated air force research laboratory anti-tamper software protection initiative program started 2001 2016 program ending lps encryption wizard moved trusted end node security program office lps version 1.7 rebranded trusted end node security tens encryption wizard retained name received tens logo version 3.4.11 nevertheless early 2019 site still uses lps name many places lps comes encryption wizard ew simple strong file folder encryptor protection sensitive unclassified information fouo privacy act cui etc. written java ew encrypts file types data rest data transit protection without installation elevated privileges ew runs windows mac linux solaris computers support java software platform simple drag drop interface ew offers 128-bit 256-bit aes encryption sha-256 hashing rsa signatures searchable metadata archives compression secure deleting pki/cac/piv support encryption keyed passphrase pki certificate ew gots—u.s government invented owned supported software—and comes three versions public version uses standard java cryptographic library unified version uses fip-140-2 certified crypto licensed legion bouncy castle government-only version uses fips-140-2 certified crypto stack licensed rsa security three versions interoperate web site distribution lps-public served https uses tls certificate signed certificate authority managed directly department defense defense information systems agency ca trusted non-dod operating systems browsers visiting site downloading iso generate browser security warning indicating certificate trusted military-issued devices already include certificate authority list trusted cas see errors article incorporates text us department defense spi web site | [
6984,
298,
363,
7214,
1505,
5259,
7567,
3751,
6015,
3590,
578,
5232,
3271
] | Validation |
2,194 | 3 | Besta_(computer):besta computer besta беста — soviet unix-based graphics workstation production started 1988 1,000 besta workstations produced several modifications computer besta-88 motorola 68020 cpu vme bus operating system legally ported version unix system v release 3.2 also known bestix | [
7812,
4321
] | Test |
2,195 | 4 | PTK_Forensics:ptk forensics ptk forensics ptk non-free commercial gui old versions digital forensics tool sleuth kit tsk also includes number software modules investigating digital media software developed anymore ptk runs gui interface sleuth kit acquiring indexing digital media investigation indexes stored sql database searching part digital investigation ptk calculates hash signature using sha-1 md5 acquired media verification consistency purposes | [
5561,
3823,
3700,
1715,
2451,
5254,
5983,
6029,
6488,
4523,
7825,
6020,
1756
] | Test |
2,196 | 6 | Market_fragmentation:market fragmentation fragmentation technology market happens market composed multiple highly-incompatible technologies technology stacks forcing prospective buyers single product commit entire product ecosystem rather maintaining free choice complementary products services two common varieties fragmentation market fragmentation version fragmentation fragmentation opposite solved standardization market fragmentation happens multiple competing firms offer highly-incompatible technologies technology stacks likely leading vendor lock-in version fragmentation happens firm offers multiple incompatible versions variations single product either tandem time result accumulated changes product specification term used android development community android fragmentation fragmentation within android variety versions android platform combined mixture hardware result inability devices properly run certain applications despite google upgrading android operating system version 4.4 also known kitkat users continued use earlier versions operating system primarily gingerbread 0.3 share cause primarily hardware manufacturers devices able upgrade later operating system number reasons result applications written one version operate consistently vice versa august 2010 developers opensignal wireless crowd-sourcing app detected 3,997 distinct values android.build.model among users app variable represents device model though may altered adding custom rom opensignal acknowledged made problematic develop apps wide variety models allows android enter markets developers placed blame google hardware manufacturers google blamed software developers staying within guidelines terms conditions issue fragmentation forced google add prohibition terms conditions software development kit developers must accept developing android operating system example opensignal testdroid studies found oems fragment android ecosystem significantly google | [
5781,
1053,
730,
4377,
5775
] | Test |
2,197 | 2 | Xbox_Linux:xbox linux xbox linux project ported linux operating system xbox video game console xbox uses digital signature system prevent public running unsigned code one must either use modchip softmod originally modchips option however later demonstrated tsop chip xbox bios held may reflashed way one may flash cromwell bios developed legally xbox linux project catalyzed large cash prize first team provide possibility booting linux xbox without need hardware hack numerous software-only hacks also found example buffer overflow found game allowed booting linux loader xbeboot straight save game xbox essentially pc custom 733 mhz intel pentium iii processor 10 gb hard drive 8 gb accessible user 64mb ram although earlier boxes upgradable 128mb 4 usb ports controller ports actually usb 1.1 ports modified connector specifications enough run several readily available linux distributions xbox-linux home page xbox legacy-free pc microsoft consists intel celeron 733 mhz cpu nvidia geforce 3mx 64 mb ram 8/10 gb hard disk dvd drive 10/100 ethernet every pc run linux it. xbox linux full desktop computer mouse keyboard web/email box connected tv server router node cluster either dual-boot use linux latter case replace ide devices yes connect xbox vga monitor. xbox linux installed act full desktop computer mouse keyboard web/email box connected television server router node cluster one either dual-boot use linux latter case one replace ide devices one also connect xbox vga monitor converter needed use keyboards/mice controller ports however difficult xbox uses standard usb proprietary port currently distributions xbox linux run version 1.6 xbox third newest version including 1.6b xboxes modchips cromwell bios installed run distributions softmod mainly due issues video chip used version 1.6 xboxes developed exclusively microsoft source code available time cause significant overscan four sides screen different kernel original loaded one popular ways installing xbox linux softmod require modchip use xbox linux softmod utilizes save exploit found original run mechassault splinter cell tony hawk pro skater 4 method involves loading hacked save file transferred xbox hard drive save file loaded mechinstaller initiated xbox live option dashboard replaced new linux option rebooting system another softmod used hotswap exploit unlock xbox hard drive long enough allow one modify also way completely replace xbox stock bios cromwell bios completely legal solely linux xbox however tsop bios chip flashed cromwell xbox longer play xbox games run native xbox executables .xbe files akin .exe windows several distributions xbox linux based pc linux distributions | [
1019,
4496,
2765,
1052,
5571,
578
] | Test |
2,198 | 2 | Windows_Runtime:windows runtime windows runtime winrt platform-agnostic application architecture first introduced windows 8 windows server 2012 2012 winrt supports development c++/winrt standard c++ c++/cx component extensions language based c++ javascript-typescript managed code languages c visual basic .net vb.net winrt applications natively support x86 arm processors may run inside sandboxed environment allow greater security stability winrt components designed interoperability multiple languages apis mind including native managed scripting languages windows phone 8.1 uses version windows runtime named windows phone runtime enables developing applications c vb.net windows runtime components c++/cx winrt implemented programming language c++ object-oriented design predecessor windows api win32 api written mostly language c. unmanaged code application programming interface api based component object model com allows interfacing multiple languages com however api definitions stored codice_1 files encoded ecma 335 metadata format .net framework also uses modifications common metadata format allows significantly less overhead invoking winrt .net applications relative p/invoke much simpler syntax new c++/cx component extensions language borrows c++/cli syntax allows writing consuming winrt components less glue code visible programmer relative classic com programming c++ imposes fewer restrictions relative c++/cli mixing types component extensions c++/cx recommended use api-boundary purposes regular c++ com-specific discipline also used program winrt components help windows runtime c++ template library wrl similar purpose active template library provides com winrt applications run within sandbox need explicit user approval access critical os features underlying hardware file access restricted several predetermined locations directories documents pictures winrt applications windows rt windows 8 beyond packaged codice_2 file format based upon open packaging conventions uses zip format added xml files winrt applications distributed mostly application store named microsoft store winrt software termed windows store apps downloaded purchased users winrt apps sideloaded outside windows store windows 8 rt systems part windows domain equipped special activation key obtained microsoft major departure win32 similarly .net framework 4.5 apis expected take significant time complete implemented asynchronous application dispatches api call returns immediately freeing application perform tasks waiting results asynchronous model requires new programming language constructs keyword codice_3 operator codice_4 c visual basic class codice_5 method codice_6 c++ provided winrt software development kit sdk keyword codice_7 function codice_8 javascript-html5 similar codice_9/codice_10 used exception handling parts api needing asynchronous access include on-screen messages dialogs file access internet connectivity sockets streams devices services calendar contacts appointments metadata describes code written winrt platform defines programming model makes possible write object-oriented code shared across programming languages enables services like reflection herb sutter c++ expert microsoft explained session c++ 2011 build conference winrt metadata cli metadata native code i.e. processor-specific machine code contain metadata stored separate winmd-files reflected like ordinary cli assemblies cli metadata code written native winrt languages used managed cli languages winrt rich object-oriented class-based type system built metadata supports constructs corresponding constructs .net framework classes methods properties delegates events one major additions winrt relative com cross-application binary interface abi .net-style generics c++/cx declared using keyword codice_11 syntax similar keyword codice_12 winrt classes ref classes also genericized using c++ templates template instantiations exported .winmd metadata name mangling unlike winrt generics preserve genericity metadata winrt also provides library generic containers parallel c++ standard library reciprocal back-and-forth conversion functions consumption winrt collections .net languages e.g. c vb javascript transparent c++ automated mappings natural equivalents occurring behind scenes authoring winrt component managed language extra com-style rules must followed e.g .net framework collection types declared return types winrt interfaces implement used component boundary classes compiled target winrt called winrt components classes written supported language supported platform key metadata metadata makes possible interface component winrt language runtime requires winrt components built .net framework use defined interface types .net type interfaces automatically map first named inheritance yet supported managed winrt components except xaml classes programs libraries targeted winrt runtime created consumed several platforms programming languages notably c/c++ either language extensions offering first-class support winrt concepts lower-level template library allowing write code standard c++ .net c visual basic .net vb.net javascript made possible metadata winrt terminology language binding termed language projection native c++ first-class citizen winrt platform version 10.0.17134.0 windows 10 version 1803 windows sdk contains c++/winrt c++/winrt entirely standard modern c++17 language projection windows runtime winrt apis implemented header-file-based library designed provide first-class access modern windows api c++/winrt windows runtime apis authored consumed using standards-compliant c++17 compiler winrt native platform supports native standard c++ code c++ developer reuse existing native c/c++ libraries c++/winrt language extensions prior c++/winrt officially released windows sdk october 2016 microsoft offered github c++/winrt rely c++/cx code result producing smaller binaries faster code two legacy options using winrt c++ wrl atl-style template library c++/cx c++ component extensions resembles c++/cli internal consumption requirements microsoft wrl exception-free meaning return-value discipline hresult-based like com c++/cx hand wraps-up calls winrt code error checking throws exceptions appropriate c++/cx several extensions enable integration platform type system syntax resembles one c++/cli although produces native although standard code metadata integrates runtime example winrt objects may allocated codice_13 counterpart codice_14 c++/cli hat operator codice_15 retains meaning however case caller callee written c++ living process hat reference simply pointer vptr virtual method table vtable vmt along c++/cx relative traditional c++ com programming partial classes inspired .net allow instance xaml code translated c++ code tools combined human-written code produce complete class allowing clean separation machine-generated human-edited parts class implementation different files .net framework common language runtime clr integrated winrt subplatform influenced set standards ecosystem metadata format libraries clr provides services like jit-compilation code garbage collection winrt applications using .net languages use new windows runtime xaml framework primarily written c vb.net first time xaml native code using c++/cx although yet officially supported programs also written .net languages classes defined winrt components built managed .net languages must declared codice_16 derived however non-sealed winrt classes defined elsewhere inherited .net virtual methods overridden inherited managed class must still sealed members interface another language must signature winrt types managed type convertible winrt applications also coded using html javascript code-behind run using trident rendering engine chakra javascript engine also used internet explorer coding winrt app javascript features adapted follow javascript naming conventions namespaces also mapped javascript objects winrt comes application programming interface api form class library exposes features windows 8 developer like immersive interface api accessible consumable supported language windows runtime classes set sdks provide access functionality xaml parser camera function sdks implemented native c/c++ libraries unmanaged naming conventions components classes members api heavily influenced .net naming conventions uses camel case specifically pascalcase microsoft recommends users follow rules case others given conventions projected differently languages like javascript converts conventions way around give native consistent experience regardless programming language since windows runtime projected various languages restrictions fundamental data types exist host languages programmers must careful behavior types used public access method parameters method return values properties etc. starting windows phone 8 possible develop apps using version windows runtime called windows phone runtime wprt although wp8 brought limited support platform eventually converge windows 8.1 windows phone 8.1 windows phone 8 limited support developing consuming windows runtime components windows phone runtime many windows runtime apis windows 8 handle core operating system functions ported windows phone 8 support developing native games using c++/cx directx added request game development industry however windows phone xaml framework still based microsoft silverlight framework windows phone 7 backward compatibility thus xaml development impossible c++/cx development using either html5 winjs unsupported windows phone 8 windows runtime support windows phone 8.1 converges windows 8.1 release brings full windows runtime api platform including support windows runtime xaml framework language bindings c++/cx html5-javascript also project type called universal apps enable apps share code across 8.1 versions windows phone windows windows phone 8 silverlight framework updated exploit new features windows runtime windows phone runtime uses appx package format windows 8 formerly using silverlight xap | [
7879,
3937,
3263,
378,
6096,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
1499,
2245,
5781,
435,
5442,
4377,
4017,
3340,
5090,
7602,
6164,
4759,
1534,
6885,
7247,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
1198,
7272,
1571,
... | Validation |
2,199 | 1 | Expression_index:expression index expression index also known function based index database index built generic expression rather one columns allows indexes defined common query conditions depend data table actually stored table common use expression index support case-insensitive searching constraints example web site wants make user names case-insensitive still preserve case originally entered user index created lower-case representation user name create unique index lower last_name queries search lower last_name could make use index major databases support expression indexes include db2 since version 10.5 oracle database since release 8i postgresql since least version 7 | [
1730,
5956,
7213,
7248
] | Validation |
2,200 | 9 | SIMCOS:simcos simcos acronym standing simulation continuous systems computer language development environment computer simulation 1989 developed slovenian experts led borut zupančič purpose language simulation dynamic mathematical models systems given set ordinary differential equations equation oriented compiler type language despite name used discrete simulation well language suits well cssl'67 standard simulation languages portability among languages conforming standard e.g tutsim acsl etc quite simple dos based software occasionally slightly modified run actual versions microsoft windows apart simulation also perform parametrisation series simulations different values parameters linearisation models optimisation finding values parameters criterion function minimised simulation scheme must prepared must described simcos language drawn similarly analogue computer using enclosed block library graphics tool contains basic elements integrators amplifiers summators basic input signals etc often entered program using one text editors e.g edit enclosed dos whichever form entry model used first phase simulation reprocesses space states form rewrites program fortran prepares files input parameters fortran program compiled executable file .exe executed executable program reads parameter values input files performs simulation writes requested calculated values another file terminates simcos takes control display results graphic plot heart executable function integ solve differential equations using one several numerical methods first reads necessary values e.g values parameters initial conditions files calls function deriv model actually described series functions derivatives returned values used selected numerical method requested calculated results written file whole procedure repeated termination condition satisfied continuous simulation dead time laplace transform formula_1 trivial task usually use one padé approximations simulate padé approximation 2nd order 4th order input signal unit step communication interval equals 0.01s length simulation run 5s results compared output built-in discrete function delay requires additional array del case appropriate size y1 result simulation padé approximation 2nd order y2 result simulation padé approximation 4th order y3 result discrete function delay transfer functions padé approximation developed using one simulation schemes model described following program simulation run finished results displayed plots possible trace values plots select plots display turning grid zoom etc slovenian language | [
2440,
2803,
4759
] | Validation |
2,201 | 5 | Message_Session_Relay_Protocol:message session relay protocol computer networking message session relay protocol msrp protocol transmitting series related instant messages context communications session application instantiates session session description protocol sdp session initiation protocol sip rendezvous methods msrp protocol defined rfc 4975 msrp messages also transmitted using intermediaries peers using relay extensions defined rfc 4976 msrp used rcs context especially instant messaging file transfer photo sharing features msrp similar syntax ietf text based protocol sip http rtsp message either request response uses uris message contains headers body carry type data including binary information unlike sip msrp much simpler first 2 headers must to-path from-path last must content-type significantly reduces complexity parsers messages must also end 7 dash '- characters followed transaction identifier appears first line followed continuation flag single character end line crlf last line end messages makes rather simple find detect message boundaries msrp defined connection-less protocols udp thus one certain response request would arrive connection msrp also relies reliable transport layer guarantees delivery maintains order messages simplifies protocol design msrp uri scheme msrp msrps authority defined rfc 3986 holds ip/domain name possibly port optional session identifier transport additional optional parameters example codice_1 msrp used within sip session msrp session set sip offer-answer model sdp m-line media type message protocol either tcp/msrp msrp tcp tcp/tls/msrp msrp secure tls furthermore msrp uri specified path attribute full sdp example provided rfc fact msrp contains address port time c-line holds address m-line contain port cause ambiguity generally media types use c-line m-line describe address msrp rfc 4975 states information actually specified msrp path may cause devices improperly set session particular b2bua may require alter path per msrp message different devices overcome rfc 6714 cema msrp changes way cema-aware devices use sdp makes cema-aware msrp b2bua implementations much simpler efficient generic open source peer library implemented following programming languages | [
7148,
2450,
3762,
3350,
7967,
2555,
2284,
7170,
6531,
6624,
1369,
6629,
1014,
3383,
4337,
4887,
1958,
1210,
2048,
3050,
2880,
4634,
6668,
533,
5535
] | Test |
2,202 | 2 | Project_Builder:project builder project builder integrated development environment ide originally developed next nextstep operating system rewritten informally dubbed pbx distributed apple computer software development mac os x computer systems prior mac os x v10.3 superseded xcode mac os x 10.3 panther gnustep projectcenter ide rough workalike original nextstep design additional functionality provided projectmanager 3rd-party gnustep ide meant greater usability | [
7308,
5786,
5787,
5571,
149,
5450
] | Test |
2,203 | 4 | Recovery_procedure:recovery procedure telecommunication recovery procedure process attempts bring system back normal operating state examples | [] | Test |
2,204 | 2 | Hibernation_(computing):hibernation computing hibernation suspend disk computing powering computer retaining state upon hibernation computer saves contents random access memory ram hard disk non-volatile storage upon resumption computer exactly entering hibernation hibernating hardware powered like regular shutdown hibernation means avoiding burden saving unsaved data shutting restoring running programs powering back hibernation used laptops limited battery power available set happen automatically low battery alarm desktops also support hibernation mainly general energy saving measure many systems also support low-power sleep mode processing functions machine powered using little power preserve contents ram support waking instantaneous resumption one advantages sleep mode hibernation hibernated system must start read data back ram typically takes time system sleep mode needs power cpu display almost instantaneous hand system sleep mode still consumes power keep data ram detaching power system sleep mode results data loss cutting power system hibernation risk hibernated system resume power restored shut hibernated systems may consume standby power unless unplugged sleep mode hibernation combined contents ram copied non-volatile storage computer enters sleep mode approach combines benefits sleep mode hibernation machine resume instantaneously state including open unsaved files survives power outage hybrid sleep consumes much power sleep mode hibernation powers computer early implementations hibernation used bios modern operating systems usually handle hibernation hibernation defined sleeping mode s4 acpi specification windows computers hibernation available hardware device drivers acpi plug-and-play–compliant hibernation invoked start menu command line windows 95 supports hibernation hardware manufacturer-supplied drivers compatible hardware bios present since windows 95 supports advanced power management apm hibernation called suspend-to-disk windows 98 later support acpi however hibernation often caused problems since hardware fully acpi 1.0 compliant wdm drivers also issues fat32 file system windows 2000 first windows support hibernation operating system level os-controlled acpi s4 sleep state without special drivers hardware manufacturer hidden system file named hiberfil.sys root boot partition used store contents ram computer hibernates windows 2000 file big total ram installed windows last release windows 9x family also supports os controlled hibernation requires disk space equal computer ram windows xp improved support hibernation hibernation resumption much faster memory pages compressed using improved algorithm compression overlapped disk writes unused memory pages freed dma transfers used i/o hiberfil.sys contains information including processor state file documented security researcher matthieu suiche black hat briefings 2008 also provided computer forensics framework manage convert file readable memory dump compression algorithm later documented microsoft well although windows xp added support 4 gigabytes memory windows xp 64-bit edition windows xp professional x64 edition operating system well windows server 2003 windows vista windows server 2008 support hibernation amount memory installed performance issues associated saving large pool data ram disk windows vista introduced hybrid sleep feature saves contents memory hard disk instead powering enters sleep mode power lost computer resume hibernated windows 7 introduced compression hibernation file set default size 75 total physical memory microsoft also recommends increase size using codice_1 tool rare workloads memory footprint exceeds amount set anywhere 50 100 although decreasing recommended windows 8 resume-from-hibernation algorithm multi-core optimized windows 8 also introduces hybrid boot feature users select shut option hibernates computer closes programs logs user session hibernating according microsoft regular hibernation includes data memory pages takes longer written disk comparison user session closed hibernation data much smaller therefore takes less time write disk resume windows 8 also saves kernel image users option performing traditional shutdown holding shift key clicking shut hibernation often under-used business environments difficult enable large network computers without resorting third-party pc power management software omission microsoft criticized led huge waste energy third-party power management programs offer features beyond present windows products offer active directory integration per-user per-machine settings advanced power plans scheduled power plans anti-insomnia features enterprise power usage reporting notable vendors include 1e nightwatchman data synergy powerman software faronics power save verdiem surveyor possible disable hibernation delete codice_2 macs feature known safe sleep saves contents volatile memory system hard disk time mac enters sleep mode mac instantaneously wake sleep mode power ram lost however power supply interrupted removing batteries without ac power connection mac would wake safe sleep instead restoring memory contents hard drive safe sleep hibernation process occurs regular sleep apple menu hibernate option safe sleep capability added mac models starting october 2005 powerbook g4 double-layer sd safe sleep requires mac os x v10.4 higher shortly apple started supporting safe sleep mac enthusiasts released hack enable feature much older mac computers running mac os x v10.4 classic mac os also supported hibernation feature dropped apple linux kernel hibernation implemented swsusp built 2.6 series alternative implementation tuxonice available patches kernel version 3.4 tuxonice provides advantages support symmetric multiprocessing preemption another alternative implementation uswsusp three refer suspend-to-disk | [
2812,
3511,
4387,
4759,
5022,
7432,
644,
4137,
2472,
6007,
5308,
2399,
405,
2942,
1213,
5156,
2953,
5694,
1594,
6051,
6488,
2885,
1052,
2970,
1992,
6504,
2266
] | Test |
2,205 | 5 | Jughead_(search_engine):jughead search engine jughead search engine system gopher protocol distinct veronica searches single server time jughead developed rhett jones 1993 university utah name jughead originally chosen match archie search engine jughead jones archie friend archie comics later backronym developed jonzy universal gopher hierarchy excavation display released original author gnu general public license 2006 source code modernized better run current posix systems due trademark issues modified version called jugtail made available download gnu savannah see external links | [
4655,
5542,
6802,
7628,
7537,
6905,
3291,
2261,
3548,
7094,
7015,
7016,
3043,
4352,
348,
1057,
84,
2804,
5887,
445
] | Test |
2,206 | 4 | Martin_McKeay:martin mckeay martin mckeay born june 29 1971 united states computer security expert blogger works akamai technologies security evangelist writes one popular security blogs also podcast called network security podcast qualified security assessor 2006 started blogging computer world product evangelist stillsecure speaker many conferences including hacker halted rsa conference def con advocate payment card industry data security standard | [
2381,
5511,
815,
6868
] | Test |
2,207 | 3 | Dragon_Slayer_(video_game):dragon slayer video game dragon slayer began dragon slayer series banner encompasses number popular falcom titles sorcerian legacy wizard dragon slayer early example action role-playing game genre laid foundations building prototypical action role-playing elements panorama toh 1983 created yoshio kiya nihon falcom well namco tower druaga 1984 dragon slayer often considered first true action role-playing game contrast earlier turn-based roguelikes dragon slayer dungeon crawl role-playing game entirely real-time action-oriented combat combining arcade style action mechanics traditional role-playing mechanics dragon slayer featured in-game map help dungeon-crawling required item management due inventory limited one item time featured item-based puzzles similar legend zelda dragon slayer overhead action-rpg formula used many later games along competitor hydlide dragon slayer laid foundations action rpg genre including franchises ys legend zelda | [
543,
7128,
4016,
6734
] | Test |
2,208 | 5 | Repeater:repeater telecommunications repeater electronic device receives signal retransmits repeaters used extend transmissions signal cover longer distances received side obstruction types repeaters broadcast identical signal alter method transmission example another frequency baud rate several different types repeaters telephone repeater amplifier telephone line optical repeater optoelectronic circuit amplifies light beam optical fiber cable radio repeater radio receiver transmitter retransmits radio signal broadcast relay station repeater used broadcast radio television information-bearing signal passes communication channel progressively degraded due loss power example telephone call passes wire telephone line power electric current represents audio signal dissipated heat resistance copper wire longer wire power lost smaller amplitude signal far end long enough wire call audible end similarly farther radio station receiver weaker radio signal poorer reception repeater electronic device communication channel increases power signal retransmits allowing travel since amplifies signal requires source electric power term repeater originated telegraphy 19th century referred electromechanical device relay used regenerate telegraph signals use term continued telephony data communications computer networking repeaters work actual physical signal attempt interpret data transmitted operate physical layer first layer osi model used increase range telephone signals telephone line frequently used trunklines carry long distance calls analog telephone line consisting pair wires consists amplifier circuit made transistors use power dc current source increase power alternating current audio signal line since telephone duplex bidirectional communication system wire pair carries two audio signals one going direction telephone repeaters bilateral amplifying signal directions without causing feedback complicates design considerably telephone repeaters first type repeater first applications amplification development telephone repeaters 1900 1915 made long distance phone service possible telecommunications cables fiber optic cables use optical repeaters invention electronic amplifiers mechanically coupled carbon microphones used amplifiers telephone repeaters turn 20th century found negative resistance mercury lamps could amplify used invention audion tube repeaters around 1916 made transcontinental telephony practical 1930s vacuum tube repeaters using hybrid coils became commonplace allowing use thinner wires 1950s negative impedance gain devices popular transistorized version called e6 repeater final major type used bell system low cost digital transmission made voiceband repeaters obsolete frequency frogging repeaters commonplace frequency-division multiplexing systems middle late 20th century type telephone repeater used underwater submarine telecommunications cables used increase range signals fiber optic cable digital information travels fiber optic cable form short pulses light light made particles called photons absorbed scattered fiber optical communications repeater usually consists phototransistor converts light pulses electrical signal amplifier increase power signal electronic filter reshapes pulses laser converts electrical signal light sends fiber however optical amplifiers developed repeaters amplify light without need converting electric signal first used extend range coverage radio signal history radio relay repeaters began 1898 publication johann mattausch austrian journal zeitschrift für electrotechnik v. 16 35 36 proposal translator primitive suitable use first relay system radio repeaters really functioned invented 1899 emile guarini-foresio radio repeater usually consists radio receiver connected radio transmitter received signal amplified retransmitted often another frequency provide coverage beyond obstruction usage duplexer allow repeater use one antenna receive transmit time radio repeaters improve communication coverage systems using frequencies typically line-of-sight propagation without repeater systems limited range curvature earth blocking effect terrain high buildings repeater hilltop tall building allow stations line-of-sight range communicate reliably radio repeaters may also allow translation one set radio frequencies another example allow two different public service agencies interoperate say police fire services city neighboring police departments may provide links public switched telephone network well typically repeater station listens one frequency transmits second b mobile stations listen signals channel b transmit channel difference two frequencies may relatively small compared frequency operation say 1 often repeater station use antenna transmission reception highly selective filters called duplexers separate faint incoming received signal billions times powerful outbound transmitted signal sometimes separate transmitting receiving locations used connected wire line radio link repeater station designed simultaneous reception transmission mobile units need equipped bulky costly duplexers transmit receive time mobile units repeater system may provided talkaround channel allows direct mobile-to-mobile operation single channel may used reach repeater system communications requiring attention mobiles talkaround channel may repeater output frequency repeater retransmit signals output frequency engineered radio communication system designer analyze coverage area desired select repeater locations elevations antennas operating frequencies power levels permit predictable level reliable communication designed coverage area repeaters divided two types depending type data handle type used channels transmit data form analog signal voltage current proportional amplitude signal audio signal also used trunklines transmit multiple signals using frequency division multiplexing fdm analog repeaters composed linear amplifier may include electronic filters compensate frequency phase distortion line digipeater used channels transmit data binary digital signals data form pulses two possible values representing binary digits 1 0 digital repeater amplifies signal also may retime resynchronize reshape pulses repeater performs retiming resynchronizing functions may called regenerator | [
1618,
1976,
6145,
2236,
6524
] | Test |
2,209 | 4 | Seculert:seculert seculert cloud-based cyber security technology company based israel company ’ technology designed detect breaches advanced persistent threats apts attacking networks seculert ’ business based malware research ability uncover malware gone undetected traditional measures 2012 company named one hottest new security start-ups new york times finalist sc magazine awards rookie security company year seculert founded 2010 former rsa fraudaction research lab manager aviv raff former sandisk product marketing manager dudi matot former finjan vp operations alex milstein 2011 company launched first offering seculert echo seculert sense traffic log analysis released october 2012 rsa conference february 2013 seculert unveiled beta version seculert swamp malware analysis sandbox seculert privately funded headquartered petah tikva israel july 2012 company announced 5.35m venture funding yl ventures norwest venture partners july 2013 seculert announced raised additional 10 million series b funding sequoia capital january 31 2017 seculert acquired radware company based mahwah new jersey usa january 2012 seculert discovered ramnit started targeting facebook accounts considerable success stealing 45,000 facebook login credentials worldwide mostly people uk france march 2012 seculert reported kelihos botnet distributed facebook worm still active spreading july 2012 seculert conjunction kaspersky lab uncovered ongoing cyber espionage campaign targeting iran middle eastern countries dubbed mahdi malware august 2012 seculert kaspersky lab symantec revealed discovery shamoon sophisticated malware attacked qatar natural gas firm rasgas saudi arabian oil company aramco december 2012 seculert uncovered dexter new malware steals payment card data point-of-sale terminals used stores hotels businesses victim businesses english-speaking 42 percent based north america 19 percent u.k. dexter infected systems running variety different versions windows including xp home server server 2003 windows 7 january 2013 kaspersky labs kl revealed cyber espionage operation dubbed red october next day seculert identified special folder used attackers additional attack vector vector attackers sent email embedded link specially crafted php web page webpage exploited vulnerability java background downloaded executed malware automatically january 2014 seculert research lab identified new targeted attack used xtreme rat attack used spear phishing emails target israeli organizations deploy piece advanced malware date 15 machines compromised including ones belonging civil administration judea samaria dyre wolf malware campaign made headlines early april banking trojan bypassed 2 factor authentication order steal 1 million corporate bank accounts several detection protection technologies combined cloud-based solution works identify new cyber threats automated traffic log analysis cloud-based analysis engine leverages http/s gateway traffic logs collected time analyzing petabytes data identify malware activity automatically identifies unknown malware detecting malicious patterns anomalies seculert traffic log analysis pinpoints evidence targeted attacks elastic sandbox elastic cloud-based automated malware analysis environment seculert elastic sandbox includes automatic analysis classification suspicious files time analyzes potentially malicious files different platforms simulate different geographic regions seculert elastic sandbox generates malware behavioral profiles crunching 40,000 malware samples daily basis leveraging data crowdsourced threat repository | [
6740,
5452,
7506,
3038,
7799,
6592,
5511
] | Test |
2,210 | 5 | NETCONF:netconf network configuration protocol netconf network management protocol developed standardized ietf developed netconf working group published december 2006 rfc 4741 later revised june 2011 published rfc 6241 netconf protocol specification internet standards track document netconf provides mechanisms install manipulate delete configuration network devices operations realized top simple remote procedure call rpc layer netconf protocol uses extensible markup language xml based data encoding configuration data well protocol messages protocol messages exchanged top secure transport protocol netconf protocol conceptually partitioned four layers netconf protocol implemented network devices routers switches major equipment vendors one particular strength netconf support robust configuration change using transactions involving number devices ietf developed simple network management protocol snmp late 1980s proved popular network management protocol early part 21st century became apparent spite originally intended snmp used configure network equipment mainly used network monitoring june 2002 internet architecture board key members ietf network management community got together network operators discuss situation results meeting documented rfc 3535 turned operators primarily using proprietary command line interfaces cli configure devices number features operators liked including fact text-based opposed ber-encoded snmp addition many equipment vendors provide option completely configure devices via snmp operators generally liked write scripts help manage boxes found snmp cli lacking number ways notably unpredictable nature output content formatting output prone change unpredictable ways around time juniper networks using xml-based network management approach brought ietf shared broader community collectively two events led ietf may 2003 creation netconf working group working group chartered work network configuration protocol would better align needs network operators equipment vendors first version base netconf protocol published rfc 4741 december 2006 several extensions published subsequent years notifications rfc 5277 july 2008 partial locks rfc 5717 december 2009 with-defaults rfc 6243 june 2011 system notifications rfc 6470 february 2012 access control rfc 6536 march 2012 revised version base netconf protocol published rfc 6241 june 2011 content netconf operations well-formed xml content related network management subsequently support encoding javascript object notation json also added netmod working group completed work define human-friendly modeling language defining semantics operational data configuration data notifications operations called yang yang defined rfc 6020 version 1 rfc 7950 version 1.1 accompanied common yang data types found rfc 6991 summer 2010 netmod working group re-chartered work core configuration models system interface routing well work compatibility snmp modeling language base protocol defines following protocol operations basic netconf functionality extended definition netconf capabilities set additional protocol features implementation supports communicated server client capability exchange portion session setup mandatory protocol features included capability exchange since assumed rfc 4741 defines number optional capabilities including xpath validate note rfc 6241 obsoletes rfc 4741 capability support subscribing receiving asynchronous event notifications published rfc 5277 document defines create-subscription operation enables creating real-time replay subscriptions notifications sent asynchronously using notification construct also defines interleave capability supported basic notification capability facilitates processing netconf operations subscription active capability support partial locking running configuration defined rfc 5717 allows multiple sessions edit non-overlapping sub-trees within running configuration without capability lock available entire configuration capability monitor netconf protocol defined rfc 6022 document contains data model including information netconf datastores sessions locks statistics facilitates management netconf server also defines methods netconf clients discover data models supported netconf server defines get-schema operation retrieve netconf messages layer provides simple transport-independent framing mechanism encoding every netconf message well-formed xml document rpc result linked rpc invocation message-id attribute netconf messages pipelined i.e. client invoke multiple rpcs without wait rpc result messages first rpc messages defined rfc 6241 notification messages defined rfc 5277 | [
2219
] | Validation |
2,211 | 8 | Haml:haml haml html abstraction markup language templating system designed avoid writing inline code web document make html cleaner haml gives flexibility dynamic content html similar web languages like php asp jsp template systems like eruby haml also embeds code gets executed runtime generates html code order provide dynamic content order run haml code files need .haml extension files similar .erb eruby files also help embed ruby code developing web application parsing coding comments haml uses rules ruby 1.9 later haml understands ascii compatible encodings like utf-8 utf-16 utf-32 compatible ascii haml used command line separate ruby module ruby rails application making haml suitable wide range applications haml originally introduced hampton catlin initial release 2006 work taken ahead people motive make html simpler cleaner easier use since 2006 revised several times newer versions released 2012 natalie weizenbaum primary maintainer haml followed norman clarke 2015 natalie worked making haml usable ruby applications branding design done nick walsh others currently maintenance team matt wildig akira matsuda tee parham takashi kokubun version 2.2.0 released july 2009 support ruby 1.9 rails 2.0 version 3.0.0 released may 2010 adding support rails 3 performance improvements fourth major version broke compatibility previous versions supporting rails 3 ruby 1.8.7 marked switch semantic versioning several amendments like increasing performance fixing warnings compatibility latest versions rails fixes documentation many made haml 4 series version 5.0.0 released april 2017 supports ruby 2.0.0 drops compatibility rails 3 'trace option helps users perform tracing haml template added four principles involved development haml markup language user-friendly adheres following features markup language adhere n't repeat dry principle markup language good indentation improves appearance makes easy read readers also determine given element starts ends markup language clear structure help code maintenance logical understanding final result unclear whether haml offers differential advantage regard haml markup similar css syntax example haml dot codice_1 representation classes css making easy developers use markup following equivalent haml recognises css selectors render following html code use haml ruby ruby codice_2 include line similar eruby haml also access local variables declared within file ruby code example uses sample ruby controller file renders use haml independent rails actionview install codice_5 gem include codice_2 simply import codice_7 ruby script invoke ruby interpreter codice_8 flag output haml :engine haml class haml uses whitespace indentation two spaces tag nesting scope acts replacement open-end tag pairs making dry cleaner following example compares syntaxes haml eruby embedded ruby alongside html output key differences note simple preview example may reflect current version language haml would produce xhtml official implementation haml built ruby plugins ruby rails merb ruby implementation also functions independently haml easily used along languages list languages haml implementations | [
6507,
6029,
3889,
3915,
5571,
6778,
3944,
7848,
84,
4151,
6221,
6428
] | Test |
2,212 | 7 | Content_as_a_service:content service content service caas managed content service mcaas service-oriented model service provider delivers content demand service consumer via web services licensed subscription content hosted service provider centrally cloud offered number consumers need content delivered applications system hence content demanded consumers required content service way provide raw content words without need specific human compatible representation html way systems make use content service meant direct human consumption rather platforms consume make use content according particular needs happens usually cloud centralized platform globally accessible provides standard format content content service centralize content single repository manage categorize make available others search whatever wish content delivered typically could one following term content service caas considered part nomenclature cloud computing service models service-oriented architecture along software service saas infrastructure service iaas platform service paas desktop service daas managed software service msaas digital content service dcaas mobile backend service mbaas information technology management service itmaas | [
4211,
5894,
2988,
4217,
370,
632,
189,
7613,
289,
1634,
3091,
6262,
7165,
3954,
7722,
3958,
6806,
22,
3627,
1550,
5927,
6906,
5135,
7741,
320,
1757,
3028,
5940,
2317,
7838,
842,
3309,
754,
5064,
330,
7114,
4627,
2961,
2430,
4636,
7037,
... | Test |
2,213 | 4 | Security_management:security management security management identification organization assets including people buildings machines systems information assets followed development documentation implementation policies procedures protecting assets organisation uses security management procedures asset information classification threat assessment risk assessment risk analysis identify threats categorise assets rate system vulnerabilities implement effective controls loss prevention focuses critical assets going protect key component loss prevention assessing potential threats successful achievement goal must include potential opportunities object take risk unless upside balance probability impact determine implement measures minimize eliminate threats management security risks applies principles risk management management security threats consists identifying threats risk causes assessing effectiveness existing controls face threats determining risks consequence prioritizing risks rating likelihood impact classifying type risk selecting appropriate risk option risk response 2016 universal standard managing risks developed netherlands 2017 updated named universal security management systems standard 2017 first choice considered possibility eliminating existence criminal opportunity avoiding creation opportunity always best solution additional considerations factors created result action would create greater risk example removing cash retail outlet would eliminate opportunity stealing cash–but would also eliminate ability conduct business avoiding eliminating criminal opportunity conflicts ability conduct business next step reduction opportunity potential loss lowest level consistent function business example application risk reduction might result business keeping enough cash hand one day ’ operation assets remain exposed application reduction avoidance subjects risk spreading concept limits loss potential losses exposing perpetrator probability detection apprehension prior consummation crime application perimeter lighting barred windows intrusion detection systems idea reduce time available steal assets escape without apprehension transferring risks alternatives risks reduced acceptable levels two primary methods accomplishing risk transfer insure assets raise prices cover loss event criminal act generally speaking first three steps properly applied cost transferring risks much lower remaining risks must simply assumed business risk business included accepted losses deductibles made part insurance coverage | [
2513,
3143,
8109,
3411,
8091,
6189,
8069,
6043,
3680,
7120
] | Test |
2,214 | 9 | PDF/A:pdf/a pdf/a iso-standardized version portable document format pdf specialized use archiving long-term preservation electronic documents pdf/a differs pdf prohibiting features unsuitable long-term archiving font linking opposed font embedding encryption iso requirements pdf/a file viewers include color management guidelines support embedded fonts user interface reading embedded annotations pdf standard encoding documents printed form portable systems however suitability pdf file archival preservation depends options chosen pdf created notably whether embed necessary fonts rendering document whether use encryption whether preserve additional information original document beyond needed print pdf/a originally new joint activity association suppliers printing publishing converting technologies npes association information image management develop international standard defining use portable document format pdf archiving documents goal address growing need electronically archive documents way would ensure preservation contents extended period time ensure documents would able retrieved rendered consistent predictable result future need exists wide variety government industry academic areas worldwide including legal systems libraries newspapers regulated industries pdf/a standard define archiving strategy goals archiving system identifies profile electronic documents ensures documents reproduced exactly way using various software years come key element reproducibility requirement pdf/a documents 100 self-contained information necessary displaying document manner embedded file includes limited content text raster images vector graphics fonts color information pdf/a document permitted reliant information external sources e.g font programs data streams may include annotations e.g hypertext links link external documents key elements pdf/a conformance include part 1 standard first published september 28 2005 specifies two levels conformance pdf files level b conformance requires standards necessary reliable reproduction document visual appearance followed level conformance includes level b requirements addition features intended improve document accessibility additional level requirements level conformance intended increase accessibility conforming files physically impaired users allowing assistive software screen readers precisely extract interpret file contents later standard pdf/ua developed eliminate became considered pdf/a shortcomings replacing many general guidelines detailed technical specifications part 2 standard published june 20 2011 addresses new features added versions 1.5 1.6 1.7 pdf reference pdf/a-1 files necessarily conform pdf/a-2 pdf/a-2 compliant files necessarily conform pdf/a-1 part 2 pdf/a standard based pdf 1.7 iso 32000-1 rather pdf 1.4 offers number new features part 2 defines three conformance levels pdf/a-2a pdf/a-2b correspond conformance levels b pdf/a-1 new conformance level pdf/a-2u represents level b conformance pdf/a-2b additional requirement text document unicode mapping part 3 standard published october 15 2012 differs pdf/a-2 one regard allows embedding arbitrary file formats xml csv cad word-processing documents spreadsheet documents others pdf/a conforming documents part 4 standard based pdf 2.0 expected published 2019 pdf/a document identified pdf/a-specific metadata located nowiki http //www.aiim.org/pdfa/ns/id/ /nowiki namespace metadata represents claim conformance ensure conformance industry collaboration original pdf/a competence center led development isartor test suite 2007 2008 test suite consists 204 pdf files intentionally constructed systematically fail requirements pdf/a-1b conformance allowing developers test ability software validate standard basic level conformance mid-2009 test suite already made appreciable difference general quality pdf/a validation software verapdf consortium led open preservation foundation pdf association created response eu commission preforma challenge develop open-source validator pdf/a format pdf association launched pdf validation technical working group november 2014 articulate plan developing industry-supported pdf/a validator verapdf consortium subsequently phase 2 preforma contract april 2015 development continued throughout 2016 phase 2 completed on-schedule december 2016 phase 3 testing acceptance period concluded july 2017. verapdf covers parts 1 2 3 conformance levels b u pdf/a verapdf available installation windows macos linux using pdfbox-based greenfields pdf parser pdf/a specification also states requirements conforming pdf/a viewer must encountering file claims conformance pdf/a pdf viewers default special pdf/a viewing mode fulfill conforming reader requirements take one example adobe acrobat adobe reader 9 include alert advise user pdf/a viewing mode activated pdf viewers allow users disable pdf/a viewing mode remove pdf/a information file pdf/a document must embed fonts use accordingly pdf/a file often larger equivalent pdf file include embedded fonts use transparency forbidden pdf/a-1 majority pdf generation tools allow pdf/a document compliance pdf export openoffice.org pdf export tool microsoft office 2007 suites also make transparent images given document non-transparent restriction removed pdf/a-2 archivists voiced concerns pdf/a-3 allows arbitrary files embedded pdf/a documents could result circumvention memory institution procedures restrictions archived formats pdf association addressed various misconceptions regarding pdf/a publication pdf/a nutshell 2.0 converting pdf version 1.4 pdf/a-2 usually works expected except problems glyphs according pdf association problems occur and/or generation pdfs pdf/a file formally correct yet still incorrect glyphs careful visual check uncover problem generation problems also affect unicode mapping problem attracts attention visual check carried extracted text pdf/a text/font usage specified uniquely enough ensure incorrect viewers printers offer complete support encoding systems result problems regard pdf/a meaning document completely compliant standard correct internally system used viewing printing document may produce undesired results document produced optical character recognition ocr conversion pdf/a-2 pdf/a-3 n't support codice_1 flag therefore type conversion result unrendered content | [
2451,
6172,
7721,
3620,
1543,
6428,
7732,
6015,
6016,
7144,
737,
4884,
6208,
1114,
5948,
1774,
2057,
2872,
2877,
4089,
3916,
7223,
698,
1435,
5191
] | Test |
2,215 | 0 | Shallow_parsing:shallow parsing shallow parsing also chunking light parsing analysis sentence first identifies constituent parts sentences nouns verbs adjectives etc links higher order units discrete grammatical meanings noun groups phrases verb groups etc. elementary chunking algorithms simply link constituent parts basis elementary search patterns e.g specified regular expressions approaches use machine learning techniques classifiers topic modeling etc take contextual information account thus compose chunks way better reflect semantic relations basic constituents advanced methods get around problem combinations elementary constituents different higher level meanings depending context sentence technique widely used natural language processing similar concept lexical analysis computer languages name shallow structure hypothesis also used explanation second language learners often fail parse complex sentences correctly | [
3601,
3931,
5800,
1718,
1444,
4760,
8065,
715,
2558,
5388,
5304,
3292,
1751,
7372,
4337,
3651,
4349,
4089,
1314,
5429,
4903,
5528,
5612,
7138,
5885,
5008
] | Test |
2,216 | 4 | Passports_issued_by_the_European_Union_candidate_states:passports issued european union candidate states since 1980s member states european union started harmonise aspects designs ordinary passports types passports diplomatic service emergency passports well common security features biometrics passports issued eu member states common recommended lay burgundy colour words “ european union ” accompanied name issuing member state printed cover information cover order language issuing state information first page one languages information possibly laminated identification page languages issuing state plus english french optional information following page nationals iceland full freedom movement residence within territory eea derives eea eu law nationals candidate countries varying visa arrangements schengen area common travel area members well united states canada following table details requirements enlargement european union involves accession new member states process began inner six founded european coal steel community eu predecessor 1952 since eu membership grown twenty-eight recent expansion croatia 2013 currently accession negotiations way several states process enlargement sometimes referred european integration term also used refer intensification co-operation eu member states national governments allow gradual harmonisation national laws join european union state needs fulfil economic political conditions called copenhagen criteria copenhagen summit june 1993 require stable democratic government respects rule law corresponding freedoms institutions according maastricht treaty current member state european parliament must agree enlargement present enlargement agenda european union regards turkey western balkans iceland turkey long-standing application eu negotiations expected take many years western balkan states eu pledged include civil wars fact two states entered three candidates one applied others pre-accession agreements finally iceland recently frozen negotiations eu however states europe either seek membership could potentially apply present foreign policy changes eu gives signal might included enlargement agenda however formally part current agenda already delayed due bilateral disputes balkans difficulty fully implementing acquis communautaire accepted body eu law today accession process follows series formal steps pre-accession agreement ratification final accession treaty steps primarily presided european commission enlargement commissioner dg enlargement actual negotiations technically conducted union member states candidate country country applies membership typically signs association agreement help prepare country candidacy eventual membership countries meet criteria even begin negotiations apply need many years prepare process association agreement helps prepare first step case western balkans special process stabilisation association process exists deal special circumstances country formally applies membership council asks commission prepare opinion country readiness begin negotiations council either accept reject commission opinion council rejected commission opinion latter advised opening negotiations greece council agrees open negotiations screening process begins commission candidate country examine laws eu determine differences exist council recommends opening negotiations chapters law feels sufficient common ground constructive negotiations negotiations typically matter candidate country convincing eu laws administrative capacity sufficient execute european law implemented seen fit member states often involve time-lines acquis communautaire european regulations directives standards fully implemented | [
7461,
5763
] | Validation |
2,217 | 7 | CRI_Middleware:cri middleware cri started csk research institute subsidiary csk producing video games mega drive/genesis went develop games sega saturn dreamcast incorporated cri middleware 2001 adx streamed audio format allows multiple audio streams seamless looping continuous playback allowing two files crossfaded played sequence low predictable cpu usage format uses adpcm framework known cri adx sofdec streamed video format supporting 24bit color includes multistreaming seamless playback frame rate 60 frames per second essentially repackaging mpeg-1/mpeg-2 video cri proprietary adx codec audio playback known cri sofdec clipper automated lip-syncing program analyzes waveforms outputs appropriate lip pattern text file later substitution facial animations in-game speaker known cri clipper rofs file management system handling virtual disc image extension cd-rom standard limitations file name format number directories files designed compatibility adx sofdec mind known cri rofs sound factory gui-based video game audio tool effective sound design without input programmers support previewing playback generated audio known cri sound factory movie encode video encoding service cri generates sofdec mpeg files media fee designated length file encoded files converted desired format quality specified client known cri movie encode cri movie high definition video support cri filemajik file system features asynchronous file requests prioritized loads zero-buffer decompression umd speed emulation playstation portable | [
4970,
5632,
1237,
1222,
5666
] | Test |
2,218 | 9 | Cadence_SKILL:cadence skill skill lisp dialect used scripting language pcell parameterized cells description language used many eda software suites cadence design systems originally put forth ieee paper 1990 skill originally based flavor lisp called franz lisp created uc berkeley students professor richard j. fateman skill acronym name trademark reasons cadence prefers capitalized franz lisp flavors lisp eventually superseded ansi standard common lisp historically skill known il skill library il functions name originally initialism silicon compiler interface language scil pronounced skil morphed skill plain english word easier everyone remember il interface language although skill used initially describe api rather language snappier name stuck name il remains common file extension used skill code designating code contained file lisp-2 semantics another possible file extension designating content lisp-1 semantics academic | [
6507,
7878,
1445,
897,
6796,
6888,
6087,
4588,
2734,
6981,
5734,
3188,
6352,
1557,
218,
1478,
4837,
5494,
2218,
4704,
3880,
4609,
6116,
3212,
5501,
6210,
1116,
144,
6471,
7481,
2144,
2600,
7298,
5515,
8025,
5077,
7032,
4543,
8137,
1889,
... | Test |
2,219 | 5 | Simple_Network_Management_Protocol:simple network management protocol simple network management protocol snmp internet standard protocol collecting organizing information managed devices ip networks modifying information change device behavior devices typically support snmp include cable modems routers switches servers workstations printers snmp widely used network management network monitoring snmp exposes management data form variables managed systems organized management information base mib describe system status configuration variables remotely queried circumstances manipulated managing applications three significant versions snmp developed deployed snmpv1 original version protocol recent versions snmpv2c snmpv3 feature improvements performance flexibility security snmp component internet protocol suite defined internet engineering task force ietf consists set standards network management including application layer protocol database schema set data objects typical uses snmp one administrative computers called managers task monitoring managing group hosts devices computer network managed system executes software component called agent reports information via snmp manager snmp-managed network consists three key components managed device network node implements snmp interface allows unidirectional read-only bidirectional read write access node-specific information managed devices exchange node-specific information nmss sometimes called network elements managed devices type device including limited routers access servers switches cable modems bridges hubs ip telephones ip video cameras computer hosts printers agent network-management software module resides managed device agent local knowledge management information translates information snmp-specific form network management station executes applications monitor control managed devices nmss provide bulk processing memory resources required network management one nmss may exist managed network snmp agents expose management data managed systems variables protocol also permits active management tasks configuration changes remote modification variables variables accessible via snmp organized hierarchies snmp define variables managed system offer rather snmp uses extensible design allows applications define hierarchies hierarchies described management information base mib mibs describe structure management data device subsystem use hierarchical namespace containing object identifiers oid oid identifies variable read set via snmp mibs use notation defined structure management information version 2.0 smiv2 subset asn.1 snmp operates application layer internet protocol suite snmp messages transported via user datagram protocol udp snmp agent receives requests udp port 161 manager may send requests available source port port 161 agent agent response sent back source port manager manager receives notifications traps informrequests port 162 agent may generate notifications available port used transport layer security datagram transport layer security requests received port 10161 notifications sent port 10162 snmpv1 specifies five core protocol data units pdus two pdus getbulkrequest informrequest added snmpv2 report pdu added snmpv3 snmp pdus constructed follows seven snmp pdu types identified pdu-type field follows snmpv1 snmpv2 use communities establish trust managers agents agents support three community names one read-only read-write trap three community strings control different types activities read-only community applies get requests read-write community string applies set requests trap community string applies receipt traps snmpv3 also uses community strings allows secure authentication communication snmp manager agent practice snmp implementations often support multiple versions typically snmpv1 snmpv2c snmpv3 snmp version 1 snmpv1 initial implementation snmp protocol design snmpv1 done 1980s group collaborators viewed officially sponsored osi/ietf/nsf national science foundation effort hems/cmis/cmip unimplementable computing platforms time well potentially unworkable snmp approved based belief interim protocol needed taking steps towards large scale deployment internet commercialization first request comments rfcs snmp known snmpv1 appeared 1988 1990 documents superseded 1991 mib-1 replaced often used snmpv1 widely used de facto network management protocol internet community snmpv1 may carried transport layer protocols user datagram protocol udp internet protocol ip osi connectionless-mode network service clns appletalk datagram delivery protocol ddp novell internetwork packet exchange ipx version 1 criticized poor security specification fact allow room custom authentication used widely used implementations support trivial authentication service identifies snmp messages authentic snmp messages. security messages therefore becomes dependent security channels messages sent example organization may consider internal network sufficiently secure encryption necessary snmp messages cases community name transmitted cleartext tends viewed de facto password spite original specification snmpv2 defined revises version 1 includes improvements areas performance security manager-to-manager communications introduced getbulkrequest alternative iterative getnextrequests retrieving large amounts management data single request new party-based security system introduced snmpv2 viewed many overly complex widely adopted version snmp reached proposed standard level maturity deemed obsolete later versions community-based simple network management protocol version 2 snmpv2c defined – snmpv2c comprises snmpv2 without controversial new snmp v2 security model using instead simple community-based security scheme snmpv1 version one relatively standards meet ietf draft standard maturity level widely considered de facto snmpv2 standard later restated part snmpv3 user-based simple network management protocol version 2 snmpv2u defined – compromise attempts offer greater security snmpv1 without incurring high complexity snmpv2 variant commercialized snmp v2* mechanism eventually adopted one two security frameworks snmp v3 snmpv2c incompatible snmpv1 two key areas message formats protocol operations snmpv2c messages use different header protocol data unit pdu formats snmpv1 messages snmpv2c also uses two protocol operations specified snmpv1 overcome incompatibility defines two snmpv1/v2c coexistence strategies proxy agents bilingual network-management systems snmpv2 agent act proxy agent behalf snmpv1 managed devices follows proxy agent maps snmpv1 trap messages snmpv2 trap messages forwards nms bilingual snmpv2 network-management systems support snmpv1 snmpv2 support dual-management environment management application bilingual nms must contact agent nms examines information stored local database determine whether agent supports snmpv1 snmpv2 based information database nms communicates agent using appropriate version snmp although snmpv3 makes changes protocol aside addition cryptographic security looks much different due new textual conventions concepts terminology visible change define secure version snmp adding security remote configuration enhancements snmp due lack security earlier versions network administrators often used means telnet ssh configuration accounting fault management snmpv3 focuses two main aspects namely security administration security aspect addressed offering strong authentication data encryption privacy administration aspect snmpv3 focuses two parts namely notification originators proxy forwarders changes also facilitated remote configuration administration snmp entities well addressing issues related large-scale deployment accounting fault management features enhancements included security one biggest weakness snmp v3 authentication snmp versions 1 2 amounts nothing password community string sent clear text manager agent snmpv3 message contains security parameters encoded octet string meaning security parameters depends security model used security approach v3 targets v3 also defines usm vacm later followed transport security model provided support snmpv3 ssh snmpv3 tls dtls snmp implementations vary across platform vendors cases snmp added feature taken seriously enough element core design major equipment vendors tend over-extend proprietary command line interface cli centric configuration control systems february 2002 carnegie mellon software engineering institute cm-sei computer emergency response team coordination center cert-cc issued advisory snmpv1 ca-2002-03 oulu university secure programming group conducted thorough analysis snmp message handling snmp implementations regardless version protocol use program code decoding protocol data units pdu thus many vendors issue patches snmp implementations among others problems found decoding snmp trap messages received snmp management station requests received snmp agent network device snmp powerful write capabilities would allow configuration network devices fully utilized many vendors partly lack security snmp versions snmpv3 partly many devices simply capable configured via individual mib object changes requirements snmp set operation easy implement correctly many vendors chose omit support set – probably lower development cost reduce code size among reasons snmp seemingly simple tree structure linear indexing may always understood well enough within internal data structures elements platform basic design consequently processing snmp queries certain data sets may result higher cpu utilization necessary one example would large routing tables bgp igp snmp values especially tabular values require specific knowledge table indexing schemes index values necessarily consistent across platforms cause correlation issues fetching information multiple devices may employ table indexing scheme example fetching disk utilization metrics specific disk identifier different across platforms modular devices may dynamically increase decrease snmp indices a.k.a instances whenever slotted hardware added removed although common hardware virtual interfaces effect index values typically assigned boot time remain fixed next reboot hardware virtual entities added device 'live may indices assigned end existing range possibly reassigned next reboot network inventory monitoring tools need device update capability properly reacting cold start trap device reboot order avoid corruption mismatch polled data index assignments snmp device instance may change poll poll mostly result changes initiated system administrator information needed particular interface imperative determine snmp index retrieving data needed generally description table like ifdescr map user friendly name like serial 0/1 blade 0 port 1 snmp index however necessarily case specific snmp value arbitrary snmp implementation snmp designed allow administrators monitor configure network devices remotely also used penetrate local area network lan snmp used network turned aside creating vulnerability consume available network bandwidth needlessly use cpu cycles significant number software tools scan entire network snmp therefore mistakes configuration read-write mode make network susceptible attacks 2001 cisco released information even read mode snmp implementation cisco ios 11.0 12.0 operating system used switches routers vulnerable certain denial service attacks security issues fixed ios upgrade configuring snmp read-only mode close attention paid configuration access control ip addresses snmp messages accepted snmp servers identified ip snmp allowed respond ips snmp messages ip addresses would denied however ip address spoofing remains security concern snmp available different versions 1 2 3 security issues snmp v1 sends passwords clear-text network therefore passwords read packet sniffing snmp v2 allows password hashing md5 configured virtually network management software support snmp v1 necessarily snmp v2 v3 snmp v2 specifically developed provide data security authentication privacy authorization snmp version 2c gained endorsement internet engineering task force ietf versions 2u 2* failed gain ietf approval due security issues snmp v3 uses md5 secure hash algorithm sha keyed algorithms offer protection unauthorised data modification masquerade attacks higher level security needed data encryption standard des optionally used cipher block chaining mode snmp v3 implemented cisco ios since release 12.0 3 t. snmpv3 may subject brute force dictionary attacks guessing authentication keys encryption keys keys generated short weak passwords passwords found dictionary snmpv3 allows providing random uniformly distributed cryptographic keys generating cryptographic keys password supplied user risk guessing authentication strings hash values transmitted network depends hash function used length hash value snmpv3 uses hmac-sha-2 authentication protocol user-based security model usm challenge-response handshake used improve security snmpv3 like snmp protocol versions stateless protocol designed minimal amount interactions agent manager thus introducing challenge-response handshake command would impose burden agent possibly network protocol designers deemed excessive unacceptable security deficiencies snmp versions mitigated ipsec authentication confidentiality mechanisms implementation snmp datagram transport layer security dtls also available snmp based network management software send passwords repeatedly normal operations across network therefore clear-text passwords significant security risk snmp v2 used network administrator enable password encryption network devices snmp servers running done command snmp-server enable traps snmp authentication md5 many snmp implementations include type automatic discovery new network component switch router discovered pooled automatically snmpv1 v2c done community string broadcast clear-text devices default configuration community strings public read-only access private read-write snmp topped list sans institute common default configuration issues number ten sans top 10 critical internet security threats year 2000 system network administrators frequently change configurations community string sent snmp network encrypted community string known outside organisation could become target attack prevent easy discovery community snmp configured pass community-name authentication failure traps snmp management device needs configured react authentication failure trap snmpv1 v2 vulnerable ip spoofing attacks whether runs tcp udp subject bypassing device access lists might implemented restrict snmp access snmpv3 security mechanisms usm tsm prevent successful attack would pointless employ snmpv3 vacm view-based access control without securing messages usm tsm | [
7148,
709,
5014,
4676,
4677,
7170,
4683,
6432,
1462,
2566,
2210,
5039,
6446,
7910,
3640,
4709,
7916,
3312,
3314,
1880,
1882,
1130,
1133,
7214,
7217,
2254,
2612,
3337,
1900,
3683,
4382,
5453,
6871,
456,
6879,
2281,
6521,
106,
1543,
2644,
... | Test |
2,220 | 2 | Joe_Ossanna:joe ossanna joseph f. ossanna december 10 1928 detroit michigan – november 28 1977 morristown new jersey worked member technical staff bell telephone laboratories murray hill new jersey became actively engaged software design multics multiplexed information computing service general-purpose operating system used bell ossanna received bachelor engineering b.s.e.e wayne state university 1952 bell telephone labs ossanna concerned low-noise amplifier design feedback amplifier design satellite look-angle prediction mobile radio fading theory statistical data processing also concerned operation murray hill computation center actively engaged software design multics learning program pdp-7 computer ken thompson dennis ritchie joe ossanna rudd canaday began program operating system designed earlier thompson unics later named unix writing file system set basic utilities assembler core unix operating system established doug mcilroy later wrote ossanna instincts motor pool sergeant equipped first lab attracted first outside users team got graphic systems cat phototypesetter making camera-ready copy professional articles publication patent applications ossanna wrote version nroff would drive dubbed troff typesetter roff 1973 authored first version troff unix entirely written pdp-11 assembly language however two years later ossanna re-wrote code c programming language planned another rewrite supposed improve usability work taken brian kernighan ossanna member association computing machinery sigma xi tau beta pi died consequence heart disease | [
336,
5571,
7710,
6470,
578,
1435
] | Validation |
2,221 | 4 | System_Safety_Monitor:system safety monitor system safety monitor ssm hips software behavior blocker developed system safety ltd windows platform ssm rely signatures detect malware instead monitors system certain types suspicious behavior warns user giving chance block allow like behavior blockers hips ssm warns certain event behavior occurs process causes warnings might legitimate software tasks though user decide whether allow block behavior ssm began private project 2002 one first behavior blockers aimed home user market april 2005 sold group professionals started syssafety company went commercial released first 2.0 beta series september 2005 june 2006 series split 2 lines first freeware version 2.0 features original 1.9 series plus improvements also 2.1 commercial version improvements freeware version particularly improved registry control hooking opposed polling low level keylogging control better termination protection new 2.1 version also dropped support windows 98 windows ssm similar many products class offers termination protection process filtering blocking driver installs etc separates hips programs offers process filtering also parent-child control processes means instead giving process complete rights start specify restrictive rules given process started another specific process example might want allow windows explorer start web browser might want processes start browser might exploit browser phone home see also leak tests ssm used effectively spyware adware programs well rootkits trojans keyloggers dialers browser hijackers commercial surveillance software however relies entirely user responding correctly prompts beginners might confused prompts respond incorrectly worst-case scenario lead malware infecting system allowing dangerous activity system error blocking activity needed system ssm also offers learning mode rules automatically made needed creating baseline normal operations assumes system clean ssm learn allow malware regardless training mode whenever new unknown process run prompt created unless user chooses block prompts | [
4759,
5571,
6823
] | Test |
2,222 | 3 | Princess_Tomato_in_the_Salad_Kingdom:princess tomato salad kingdom ported may 27 1988 famicom february 8 1991 nintendo entertainment system north america also released wii virtual console japan january 19 2010 north america february 8 2010 characters primarily cartoon-like anthropomorphic fruits vegetables taking role sir cucumber knight player assigned king broccoli deceased defeat evil minister pumpkin kidnapped princess tomato early sir cucumber gains sidekick percy baby persimmon offers advice helps throughout quest always refers sir cucumber boss princess tomato salad kingdom plays similarly text adventure though due nes lack keyboard accessory possible commands represented buttons line sides screen commands fixed change gameplay primarily game consists still screens exception finger wars rock paper scissors mazes occasional animated character octoberry fernbirds players issue commands game protagonist way lose able determine action required advance failing defeat end-game boss minister pumpkin game finger wars | [] | Validation |
2,223 | 2 | Core_common_area:core common area core common area named magnetic core memory term persisted modern era commonly used fortran basic languages | [
2803,
2164
] | Test |
2,224 | 4 | NolaCon_(infosec_conference):nolacon infosec conference nolacon information security conference held annually new orleans united states first year 2014 nolacon held sheraton canal st. 2015 2016 2017 2018 2019 may 17-19 conference astor crowne plaza new orleans french quarter | [
1805
] | Test |
2,225 | 7 | Illuminate_Labs:illuminate labs illuminate labs swedish software company based gothenburg founded 2002 specializing video games lighting company produces two middleware products called beast turtle based liquidlight technology illuminate labs products used largest game studios world electronic arts blizzard sony computer entertainment square enix bioware illuminate labs opened office san francisco 2009 autodesk acquired illuminate labs july 21 2010 san rafael california undisclosed amount turtle rendering baking plugin autodesk maya used lighting content creation next-gen game development turtle create global illumination game levels bake illumination texture maps vertex maps point clouds features include baking occlusion normal maps highly detailed models low polygon models baked results visualized maya viewport using gpu beast content pipeline tool used advanced global illumination dynamic character relighting beast enables advanced global illumination enhances look video games little effort beast precalculate lighting light maps shadow maps point clouds bake occlusion normal maps generate light fields dynamic relighting characters objects several game titles made beast and/or turtle company part epic ’ integrated partners program emergent certified partner official autodesk conductors partner partners include 3d labs adobe apple angstrom ati nvidia microsoft pixologic unity technologies announced next unity version 3.0 feature built-in beast lightmapping global illumination shelf | [
5666,
6759
] | Test |
2,226 | 3 | DEC_Alpha:dec alpha alpha originally known alpha axp 64-bit reduced instruction set computing risc instruction set architecture isa developed digital equipment corporation dec designed replace 32-bit vax complex instruction set computer cisc isa alpha implemented microprocessors originally developed fabricated dec microprocessors prominently used variety dec workstations servers eventually formed basis almost mid-to-upper-scale lineup several third-party vendors also produced alpha systems including pc form factor motherboards operating systems supported alpha included openvms previously known openvms axp tru64 unix previously known dec osf/1 axp digital unix windows nt discontinued nt 4.0 pre-release windows 2000 rc1 linux debian suse gentoo red hat bsd unix netbsd openbsd freebsd 6.x plan 9 bell labs well l4ka :pistachio kernel alpha architecture sold along parts dec compaq 1998 compaq already intel customer phased alpha favor forthcoming hewlett-packard/intel itanium architecture sold alpha intellectual property intel 2001 effectively killing product hewlett-packard purchased compaq later year continuing development existing product line 2004 selling alpha-based systems largely existing customer base april 2007 alpha born earlier risc project named prism parallel reduced instruction set machine product several earlier projects prism intended flexible design supporting unix-like applications well digital existing vms programs vax minor conversion new unix-like operating system known mica would run applications natively supporting vms emulation running time development palo alto design team working unix-only workstation originally included prism however development workstation well ahead prism engineers proposed release machines using mips r2000 processor instead moving release date considerably dec management doubted need produce new computer architecture replace existing vax decstation lines eventually ended prism project 1988 time cancellation however second-generation risc chips newer sparc architecture offering much better price/performance ratios vax lineup clear third generation would completely outperform vax ways cost another study started see new risc architecture could defined could directly support vms operating system new design used basic prism concepts re-tuned allow vms vms programs run reasonable speed conversion decision also made upgrade design full 64-bit implementation prism 32-bit conversion major risc vendors undertaking eventually new architecture became alpha primary alpha instruction set architects richard l. sites richard t. witek prism epicode developed alpha palcode providing abstracted interface platform- processor implementation-specific features main contribution alpha microprocessor industry main reason performance much architecture rather implementation time microchip industry dominated automated design layout tools chip designers digital continued pursuing sophisticated manual circuit design order deal overly complex vax architecture alpha chips showed manual circuit design applied simpler cleaner architecture allowed much higher operating frequencies possible automated design systems chips caused renaissance custom circuit design within microprocessor design community originally alpha processors designated decchip 21x64 series decchip replaced mid-1990s alpha first two digits 21 signifies 21st century last two digits 64 signifies 64 bits alpha designed 64-bit start 32-bit version middle digit corresponded generation alpha architecture internally alpha processors also identified ev numbers ev officially standing extended vax alternative humorous meaning electric vlasic giving homage electric pickle experiment western research lab first generations alpha chips innovative time persistent report attributed dec insiders suggests choice axp tag processor made dec legal department still smarting vax trademark fiasco lengthy search tag axp found entirely unencumbered within computer industry joke got started acronym axp meant almost exactly prism alpha architecture intended high-performance design digital intended architecture support one-thousandfold increase performance twenty-five years ensure architectural feature impeded multiple instruction issue clock rate multiprocessing removed result alpha alpha condition codes integer instructions remove potential bottleneck condition status register instructions resulting overflow adding two numbers whose result fit 64 bits write 32 64 least significant bits destination register carry generated performing unsigned compare result either operand see result smaller either operand test true value one written least significant bit destination register indicate condition architecture defined set 32 integer registers set 32 floating-point registers addition program counter two lock registers floating-point control register fpcr also defined registers optional implemented implementation required lastly registers palcode defined integer registers denoted r0 r31 floating-point registers denoted f0 f31 r31 f31 registers hardwired zero writes registers instructions ignored digital considered using combined register file split register file determined better enabled two-chip implementations register file located chip integer-only implementations omit floating-point register file containing floating point registers split register file also determined suitable multiple instruction issue due reduced number read write ports number registers per register file also considered 32 64 contenders digital concluded 32 registers suitable required less die space improved clock frequencies number registers deemed major issue respect performance future growth thirty-two registers could support least eight-way instruction issue program counter 64-bit register contains longword-aligned virtual byte address low two bits program counter always zero pc incremented four address next instruction instruction decoded lock flag locked physical address register used load-locked store-conditional instructions multiprocessor support floating-point control register fpcr 64-bit register defined architecture intended use alpha implementations ieee 754-compliant floating-point hardware alpha architecture byte defined 8-bit datum octet word 16-bit datum longword 32-bit datum quadword 64-bit datum octaword 128-bit datum alpha architecture originally defined six data types maintain level compatibility vax 32-bit architecture preceded alpha two floating-point data types included alpha 64-bit linear virtual address space memory segmentation implementations implement smaller virtual address space minimum size 43 bits although unused bits implemented hardware tlbs architecture required implementations check whether zero ensure software compatibility implementations larger full virtual address space alpha isa fixed instruction length 32 bits six instruction formats integer operate format used integer instructions contains 6-bit opcode field followed ra field specifies register containing first operand rb field specifies register containing second operand next 3-bit field unused reserved 1-bit field contains 0 distinguished format integer literal format 7-bit function field follows used conjunction opcode specify operation last field rc field specifies register result computation written register fields 5 bits long required address 32 unique locations 32 integer registers integer literal format used integer instructions use literal one operands format integer operate format except replacement 5-bit rb field 3 bits unused space 8-bit literal field zero-extended 64-bit operand floating-point operate format used floating-point instructions similar integer operate format 11-bit function field made possible using literal unused bits reserved integer operate format memory format used mostly load store instructions 6-bit opcode field 5-bit ra field 5-bit rb field 16-bit displacement field branch instructions 6-bit opcode field 5-bit ra field 21-bit displacement field ra field specifies register tested conditional branch instruction condition met program counter updated adding contents displacement field program counter displacement field contains signed integer value integer positive branch taken program counter incremented value integer negative program counter decremented branch taken range branch thus ±1 mi instructions ±4 mib alpha architecture designed large range part architecture forward-looking goal call_pal format used codice_1 instruction used call palcode subroutines format retains opcode field replaces others 26-bit function field contains integer specifying pal subroutine control instructions consist conditional unconditional branches jumps conditional unconditional branch instructions use branch instruction format jump instructions use memory instruction format conditional branches test whether least significant bit register set clear compare register signed quadword zero branch specified condition true conditions available comparing register zero equality inequality less less equal greater equal greater new address computed longword aligning sign extending 21-bit displacement adding address instruction following conditional branch unconditional branches update program counter new address computed way conditional branches also save address instruction following unconditional branch register two instructions differ hints provided branch prediction hardware four jump instructions perform operation saving address instruction following jump providing program counter new address register differ hints provided branch prediction hardware unused displacement field used purpose integer arithmetic instructions perform addition multiplication subtraction longwords quadwords comparison quadwords instruction division architects considered implementation division hardware adverse simplicity addition standard add subtract instructions scaled versions versions shift second operand left two three bits adding subtracting multiply longword multiply quadword instructions write least significant 32 64 bits 64- 128-bit result destination register respectively since useful obtain significant half unsigned multiply quadword high umulh instruction provided umulh used implementing multi-precision arithmetic division algorithms concept separate instruction multiplication returns significant half result taken prism instructions operate longwords ignore significant half register 32-bit result sign-extended written destination register default add multiply subtract instructions exception umulh scaled versions add subtract trap overflow functionality required versions instructions perform overflow detection trap overflow provided compare instructions compare two registers register literal write 1 destination register specified condition true 0 conditions equality inequality less equal less exception instructions specify former two conditions versions perform signed unsigned compares integer arithmetic instructions use integer operate instruction formats logical instructions consist performing bitwise logical operations conditional moves integer registers bitwise logical instructions perform nand xnor xor two registers register literal conditional move instructions test register signed quadword zero move specified condition true specified conditions equality inequality less equal less greater equal greater shift instructions perform arithmetic right shift logical left right shifts shift amount given register literal logical shift instructions use integer operate instruction formats later alpha included byte-word extensions set instructions manipulate 8-bit 16-bit data types instructions first introduced 21164a ev56 microprocessor present subsequent implementations instructions performed operations previously required multiple instructions implement improved code density performance certain applications bwx also made emulation x86 machine code writing device drivers easier motion video instructions mvi instruction set extension alpha isa added instructions single instruction multiple data simd operations alpha implementations implement mvi chronological order alpha 21164pc pca56 pca57 alpha 21264 ev6 alpha 21364 ev7 unlike simd instruction sets period mips mdmx sparc visual instruction set like pa-risc multimedia acceleration extensions mvi simple instruction set composed instructions operate integer data types stored existing integer registers mvi simplicity due two reasons firstly digital determined alpha 21164 already capable performing dvd decoding software therefore requiring hardware provisions purpose inefficient mpeg-2 encoding second reason requirement retain fast cycle times implementations adding many instructions would complicated enlarged instruction decode logic reducing implementation clock frequency mvi consisted 13 instructions floating-point extensions fix extension alpha architecture introduced nine instructions floating-point square-root transferring data integer registers floating-point registers alpha 21264 ev6 first microprocessor implement instructions count extensions cix extension architecture introduced three instructions counting bits instructions categorized integer arithmetic instructions first implemented alpha 21264a ev67 time announcement alpha heralded architecture next 25 years alpha nevertheless reasonably long life first version alpha 21064 otherwise known ev4 introduced november 1992 running 192 mhz slight shrink die ev4s shrunk 0.75 µm 0.675 µm ran 200 mhz months later 64-bit processor superpipelined superscalar design like risc designs nevertheless outperformed dec touted world fastest processor careful attention circuit design hallmark hudson design team like huge centralized clock circuitry allowed run cpu higher speeds even though microarchitecture fairly similar risc chips comparison less expensive intel pentium ran 66 mhz launched following spring alpha 21164 ev5 became available 1995 processor frequencies 333 mhz july 1996 line speed bumped 500 mhz march 1998 666 mhz also 1998 alpha 21264 ev6 released 450 mhz eventually reaching 2001 21264c/ev68cb 1.25 ghz 2003 alpha 21364 ev7 marvel launched essentially ev68 core four 1.6 gb/s inter-processor communication links improved multiprocessor system performance running 1 1.15 ghz 1996 production alpha chips licensed samsung electronics company following purchase digital compaq majority alpha products placed api networks inc. previously alpha processor inc. private company funded samsung compaq october 2001 microway became exclusive sales service provider api networks alpha-based product line june 25 2001 compaq announced alpha would phased 2004 favor intel itanium canceled planned ev8 chip sold alpha intellectual property intel hp new owner compaq later year announced development alpha series would continue years including release 1.3 ghz ev7 variant called ev7z would final iteration alpha 0.13 µm ev79 also canceled alpha also implemented piranha research prototype developed compaq corporate research nonstop hardware development groups western research laboratory systems research center piranha multicore design transaction processing workloads contained eight simple cores described 27th annual international symposium computer architecture june 2000 illustrate comparative performance alpha-based systems spec performance numbers specint95 specfp95 listed note spec results claim report measured performance whole computer system cpu bus memory compiler optimizer cpu also note benchmark scale changed 1992 1995 however figures give rough impression performance alpha architecture 64-bit compared contemporary hp 64-bit intel-based offerings 32-bit perhaps obvious trend intel could always get reasonably close alpha integer performance floating point performance difference considerable side hp pa-risc also reasonably close alpha cpus running significantly lower clock rates mhz tables lack two important values power consumption price cpu first generation dec alpha-based systems comprised dec 3000 axp series workstations low-end servers dec 4000 axp series mid-range servers dec 7000 axp 10000 axp series high-end servers dec 3000 axp systems used turbochannel bus previous mips-based decstation models whereas 4000 based futurebus+ 7000/10000 shared architecture corresponding vax models dec also produced pc-like alpha workstation eisa bus decpc axp 150 codename jensen also known dec 2000 axp first alpha system support windows nt dec later produced alpha versions celebris xl digital personal workstation pc lines 21164 processors digital also produced single board computers based vmebus embedded industrial use first generation included 21068-based axpvme 64 axpvme 64lc 21066-based axpvme 160 introduced march 1 1994 later models axpvme 100 axpvme 166 axpvme 230 based 21066a processor alpha vme 4/224 alpha vme 4/288 based 21064a processor last models alpha vme 5/352 alpha vme 5/480 based 21164 processor 21066 chip used dec multia vx40/41/42 compact workstation alphabook 1 laptop tadpole technology 1994 dec launched new range alphastation alphaserver systems used 21064 21164 processors introduced pci bus vga-compatible frame buffers ps/2-style keyboards mice alphaserver 8000 series superseded dec 7000/10000 axp also employed xmi futurebus+ buses alphastation xp1000 first workstation based 21264 processor later alphaserver/station models based 21264 categorised ds departmental server es enterprise server gs global server families final 21364 chip used alphaserver es47 es80 gs1280 models alphastation es47 number oem motherboards produced dec 21066 21068-based axppci 33 noname part major push oem market company 21164-based alphapc 164 alphapc 164lx 21164pc-based alphapc 164sx alphapc 164rx 21264-based alphapc 264dp several third parties samsung api also produced oem motherboards api up1000 up2000 assist third parties developing hardware software platform dec produced evaluation boards eb64+ eb164 alpha 21064a 21164 microprocessors respectively 21164 21264 processors used netapp various network-attached storage systems 21064 21164 processors used cray t3d t3e massively parallel supercomputers fastest supercomputer based alpha processors | [
5012,
1447,
2549,
5371,
6085,
3948,
3951,
7527,
7529,
5737,
1465,
4321,
2567,
2929,
4694,
5042,
742,
7554,
1481,
5055,
1112,
2226,
5760,
1867,
3319,
6133,
1881,
7581,
2248,
5431,
1506,
6148,
5794,
444,
2266,
447,
448,
1522,
1523,
2989,
... | Test |
2,227 | 1 | Truth_discovery:truth discovery truth discovery also known truth finding process choosing actual true value data item different data sources provide conflicting information several algorithms proposed tackle problem ranging simple methods like majority voting complex ones able estimate trustworthiness data sources truth discovery problems divided two sub-classes single-truth multi-truth first case one true value allowed data item e.g birthday person capital city country second case multiple true values allowed e.g cast movie authors book typically truth discovery last step data integration pipeline schemas different data sources unified records referring data item detected abundance data available web makes probable find different sources provide partially completely different values data item together fact increasing reliance data derive important decisions motivates need developing good truth discovery algorithms many currently available methods rely voting strategy define true value data item nevertheless recent studies shown rely majority voting could get wrong results even 30 data items solution problem assess trustworthiness sources give importance votes coming trusted sources ideally supervised learning techniques could exploited assign reliability score sources hand-crafted labeling provided values unfortunately feasible since number needed labeled examples proportional number sources many applications number sources prohibitive single-truth multi-truth discovery two different problems single-truth discovery characterized following properties multi-truth case following properties hold multi-truth discovery unique features make problem complex taken consideration developing truth-discovery solutions examples point main differences two methods knowing examples truth provided source 1 single truth case first table say sources 2 3 oppose truth result provide wrong values hand second case second table sources 2 3 neither correct erroneous instead provide subset true values time oppose truth vast majority truth discovery methods based voting approach source votes value certain data item end value highest vote select true one sophisticated methods votes weight data sources importance indeed given votes coming trusted sources source trustworthiness usually known priori estimated iterative approach step truth discovery algorithm trustworthiness score data source refined improving assessment true values turn leads better estimation trustworthiness sources process usually ends values reach convergence state source trustworthiness based different metrics accuracy provided values copying values sources domain coverage detecting copying behaviors important fact copy allows spread false values easily making truth discovery hard since many sources would vote wrong values usually systems decrease weight votes associated copied values even ’ count currently available truth discovery methods designed work well single-truth case reported characteristics relevant typologies single-truth methods different systems model source trustworthiness majority voting simplest method popular value selected true one majority voting commonly used baseline assessing performances complex methods methods estimate source trustworthiness exploiting similar technique one used measure authority web pages based web links vote assigned value computed sum trustworthiness sources provide particular value trustworthiness source computed sum votes assigned values source provides methods estimate source trustworthiness using similarity measures typically used information retrieval source trustworthiness computed cosine similarity similarity measures set values provided source set values considered true either selected probabilistic way obtained ground truth methods use bayesian inference define probability value true conditioned values provided sources formula_1 formula_2 value provided data item formula_3 formula_4 set observed values provided sources specific data item trustworthiness source computed based accuracy values provides complex methods exploit bayesian inference detect copying behaviors use insights better assess source trustworthiness due complexity less attention devoted study multi-truth discovery reported two typologies multi-truth methods characteristics methods use bayesian inference define probability group values true conditioned values provided data sources case since could multiple true values data item sources provide multiple values single data item possible consider values individually alternative consider mappings relations set provided values sources providing trustworthiness source computed based accuracy values provides sophisticated methods also consider domain coverage copying behaviors better estimate source trustworthiness methods use probabilistic graphical models automatically define set true values given data item also assess source quality without need supervision many real-world applications benefit use truth discovery algorithms typical domains application include healthcare crowd/social sensing crowdsourcing aggregation information extraction knowledge base construction truth discovery algorithms could also used revolutionize way web pages ranked search engines going form current methods based link analysis like pagerank procedures rank web pages based accuracy information provide | [
5016,
2054
] | Test |
2,228 | 2 | Granular_Linux:granular linux granular granular linux linux distribution targeted common desktop users granular based pclinuxos comes installable live cd cd version granular features two desktop environments kde development version enlightenment kde full-featured desktop environment enlightenment lightweight desktop shell markedly faster kde granular roots india granular linux project kicked october 2006 first demonstration given college students first release made available download 30 december 2006 main idea behind birth project redefine application set included pclinuxos extent introduce idea one major desktop environment single livecd latter idea implemented beginning second version release granular version 0.25 two desktop environments kde xfce included kde highly customizable feature-rich resource heavy xfce light-weight yet feature-full desktop environment v0.25 came v0.90 finally v1.0 granular 1.0 code name esto vox last esto series first 0.90 esto vello october 2007 special dvd edition granular 0.90 released name funworks featured lg3d desktop environment along three others host many software games granular utilizes pclinuxos repository well software/package management granular repository opened march 2008 since source granular-specific rpm packages available pclinuxos repository granular comes livecd means n't install try standard cd version granular includes two desktop environments kde enlightenment 17 like pclinuxos granular uses synaptic package manager gui frontend apt package management installing updating removing packages granular comes perl-based script mklivecd makes possible remaster granular create backup cd/dvd installed system also included granular startpoint html-based acts primer various major software included granular beginning news website launched 5 december domain http //www.granular-linux.com/main/ later main website shifted another server new domain name present website address http //www.granularlinux.com/ later main website migrated http //linux.granularproject.org/ | [
5983,
5200,
1629,
3444,
7251,
474,
7075,
5571,
1941,
314,
5664,
5232,
2758,
1663,
2864,
6209,
6761,
2063,
7033,
343,
4824,
5523,
5259,
1893,
5530,
5704,
6317,
3751,
7587,
7954,
6244,
788
] | Test |
2,229 | 2 | Supervisory_program:supervisory program supervisory program supervisor computer program usually part operating system controls execution routines regulates work scheduling input/output operations error actions similar functions regulates flow work data processing system also refer program allocates computer component space schedules computer events task queuing system interrupts control system returned supervisory program frequently enough ensure demands system met historically term essentially associated ibm line mainframe operating systems starting os/360 operating systems supervisor generally called kernel 1970s ibm abstracted supervisor state hardware resulting hypervisor enabled full virtualization i.e capacity run multiple operating systems machine totally independently hence first system called virtual machine vm | [
5571,
1556,
5041
] | Test |
2,230 | 5 | Emergency_Stand_Alone:emergency stand alone emergency stand alone esa term used vendors telephone equipment nortel dms-100 lucent 5ess gtd-5 typically small towns communities telephone services provided remote switching unit controlled powerful host switching complex esa occurs host/remote links severed thus leaving region “ community isolation ” esa mode town/community limited receiving placing calls within community/town larger towns/regions may several remote switching units required “ backdoor trunking ” connect remote units esa within town/community special translations implemented allow 911 redirected local number local police station fire hall resides within community/town | [
7888
] | Test |
2,231 | 4 | Port_triggering:port triggering port triggering configuration option nat-enabled router controls communication internal external host machines ip network similar port forwarding enables incoming traffic forwarded specific internal host machine although forwarded port open permanently target internal host machine chosen dynamically two networks communicate nat-router host machines internal network behave ip address nat-router perspective host machines external network without traffic forwarding rules impossible host machine external network host b open connection host machine internal network host connection targeted ip nat-router since internal network hidden behind nat port triggering host opens connection host b using predefined port ports incoming traffic router receives predefined port ports forwarded host 'triggering event forwarding rule forwarding rule disabled period inactivity port triggering useful network applications client server roles must switched certain tasks authentication irc chat file downloading ftp file sharing example port triggering operates connecting irc internet relay chat common authenticate username ident protocol via port 113 connecting irc client computer typically makes outgoing connection port 6667 port range 6660–7000 causing irc server attempt verify username given making new connection back client computer port 113 computer behind nat nat silently drops connection know computer behind nat send request connect two transport-level connections necessary application-level connection irc server succeed see internet protocol suite since second tcp/ip connection possible attempted connection irc server fail case port triggering router configured outbound connection established port 6660 7000 allow inbound connections particular computer port 113 gives flexibility static port forwarding necessary set specific address network allowing multiple clients connect irc servers nat-router security also gained sense inbound port left open actively use port triggering disadvantage binds triggered port single client time long port bound particular client port triggering effectively unavailable clients ftp file sharing example means two clients download files ftp server running active mode simultaneously irc even though authentication step happens quickly port triggering timeout may still prevent clients logging irc servers port triggering unsuitable servers behind nat router relies local computer make outgoing connection receive incoming ones routers possible one client use port triggering port forwarding simultaneously | [
2681,
5790,
3855
] | Test |
2,232 | 4 | System_integrity:system integrity telecommunications term system integrity following meanings | [
5571
] | Validation |
2,233 | 2 | BlackBerry_World:blackberry world blackberry world previously blackberry app world application distribution service application blackberry limited majority blackberry devices service provides blackberry users environment browse download update third-party applications service went live april 1 2009 three major app stores different operating systems largest revenue per app 9,166.67 compared 6,480.00 1,200.00 apple app store google play respectively 21 january 2013 blackberry announced rebranded blackberry app world simpler blackberry world part release blackberry 10 operating system blackberry devices since 2015 release blackberry priv longer use blackberry 10 operating system android instead uses google play store blackberry world set shut 2019 2003 rim launched mobile data service enable customers access java-based third-party enterprise applications using secure real-time push-based blackberry infrastructure later october 21 2008 rim announced blackberry developer conference company would open application store devices also announced store scheduled open march 2009 would work conjunction paypal services january 19 2009 rim began accepting submissions applications developers march 4 2009 rim officially named store blackberry app world previously called blackberry application storefront also confirmed service would initially available desktops web-based catalog would accessible non-blackberry devices april 1 2009 ctia trade show rim announced app world gone live blackberry sponsored wireless symposium announced average one million apps downloaded day august 19 2010 blackberry app world 2.0 released new version introduced blackberry id single sign account system used blackberry client blackberry app world desktop storefront addition blackberry id blackberry app world 2.0 also introduced direct credit card billing carrier billing wireless subscribers december 3 2010 research motion announced daily downloads two million apps per day february 2 2011 blackberry app world 2.1 released version introduced in-app purchases digital goods allowing add-ons purchased within applications january 21 2013 blackberry rebranded blackberry app world blackberry world june 18 2014 blackberry announced official relationship amazon includes access amazon appstore blackberry 10.3 december 5 2017 blackberry announced closure blackberry world december 31 2019 april 1 2018 blackberry removed paid apps blackberry world beginning 2011 16,000 apps available blackberry app world year later app store passed 60,000 apps january 2012 month later 70,000 apps february 2012 blackberry jam september 2012 rim announced app world 105,000 apps may 2013 blackberry live conference blackberry announced 120,000 apps blackberry 10 available download blackberry world application verification done blackberry world apps content quality agreed launch 85 percent verification done denpasar bali rim announced store would initially available united states united kingdom canada march 2013 blackberry world available 170 markets supports 23 currencies 33 languages 6 million applications downloaded daily aggregate 4 billion downloads to-date accepts payment markets using combination paypal credit card carrier billing list countries blackberry world available applications free paid 0.99 599.99 usd u.s registration app submission fees charged developers currently 0 service available english french italian german spanish brazilian portuguese store available following blackberry devices updated blackberry os version 4.5.0 higher users initially allowed archive apps microsd emmc storage certain blackberry smartphone models archive function later removed release app world 3.0 2010 rim announced several new tools make easier applications developers build simulate deploy monetize feature-rich applications blackberry platform including blackberry enterprise application development platform next generation blackberry web application platform blackberry webworks platform blackberry playbook™ tablet blackberry smartphones blackberry payment service blackberry push service blackberry advertising service location service maps services analytics service scoreloop bbm social platform software developer kits et al blackberry embraced open standards included variety open source libraries box including lua openal cocos2d-x box2d open source repository accessed github.com/blackberry open ecosystem helps developers target multiple platforms partnerships appcelerator apache cordova dojo jquery mobile marmalade nme qt sencha touch blackberry changed whole direction development tools mainly embracing c++/cascades native road develop mobile apps blackberry 10 platform html5 considered almost-native second path development april 2014 blackberry announced stop support adobe air release blackberry 10.3.1 released later 2014 time release blackberry 10.3.1 possible upload new adobe air-based apps blackberry world | [
7232,
6336,
6516,
7619,
291,
7169,
1544,
6621,
5386,
6440,
5571,
5486,
740,
6550,
3559,
2048,
163,
6312,
2795,
4380
] | Validation |
2,234 | 3 | Redundant_array_of_independent_memory:redundant array independent memory redundant array independent memory raim design feature found certain computers main random access memory raim utilizes additional memory modules striping algorithms protect failure particular module keep memory system operating continuously raim similar concept redundant array independent disks raid protects failure disk drive case memory supports several dram device chipkills entire memory channel failures raim much robust parity checking ecc memory technologies protect many varieties memory failures july 22 2010 ibm introduced first high end computer server featuring raim zenterprise 196 z196 machine contains 3 tb usable raim-protected main memory 2011 business class model z114 introduced also supporting raim formal announcement letter offered additional information regarding implementation | [
4221,
5738
] | Validation |
2,235 | 4 | Julia_Ward:julia ward julia ward december 1900 – june 18 1962 founder central reference division national security agency nsa inducted cryptologic hall honor 2002 ward received a.b bryn mawr college 1923 ph.d bryn mawr college 1940 ward joined cryptologic service wwii worked signal security agency army cryptologic organization also worked librarian eventually built collection classified unclassified materials use analysts 1945 became deputy chief reference section within years turned section one known poorly organized section widely recognized highly respected 1949 ward named head collateral branch thereby becoming female branch head office operations 1955 ward promoted deputy chief nsa liaison foreign operations section ward inducted nsa cryptologic hall honor june 2002 national cryptologic museum baltimore md bryn mawr college plaque commemorate placement hall honor | [] | Test |
2,236 | 5 | T-carrier:t-carrier t-carrier member series carrier systems developed bell laboratories digital transmission multiplexed telephone calls first version transmission system 1 t1 introduced 1962 bell system could transmit 24 telephone calls simultaneously single transmission line copper wire subsequent specifications carried multiples basic t1 1.544 mbit/s data rates t2 6.312 mbit/s 96 channels t3 44.736 mbit/s 672 channels others t-carrier hardware specification carrying multiple time-division multiplexed tdm telecommunications channels single four-wire transmission circuit developed bell laboratories ca 1957 first employed 1962 long-haul pulse-code modulation pcm digital voice transmission d1 channel bank t-carriers commonly used trunking switching centers telephone network including private branch exchange pbx interconnect points uses twisted pair copper wire analog trunks used employing one pair transmitting another pair receiving signal repeaters may used extended distance requirements digital t-carrier system carrier wave systems 12-channel carrier systems worked frequency division multiplexing call analog signal t1 trunk could transmit 24 telephone calls time used digital carrier signal called digital signal 1 ds-1 ds-1 communications protocol multiplexing bitstreams 24 telephone calls along two special bits framing bit frame synchronization maintenance-signaling bit t1 maximum data transmission rate 1.544 megabits per second europe rest world except japan standardized e-carrier system similar transmission system higher capacity directly compatible t-carrier existing frequency-division multiplexing carrier systems worked well connections distant cities required expensive modulators demodulators filters every voice channel connections within metropolitan areas bell labs late 1950s sought cheaper terminal equipment pulse-code modulation allowed sharing coder decoder among several voice trunks method chosen t1 system introduced local use 1961 later decades cost digital electronics declined point individual codec per voice channel became commonplace advantages digital transmission become entrenched common legacy system line rate speeds t1 means data circuit runs original 1.544 mbit/s line rate originally t1 format carried 24 pulse-code modulated time-division multiplexed speech signals encoded 64 kbit/s streams leaving 8 kbit/s framing information facilitates synchronization demultiplexing receiver t2 t3 circuit channels carry multiple t1 channels multiplexed resulting transmission rates 6.312 44.736 mbit/s respectively t3 line comprises 28 t1 lines operating total signaling rate 1.544 mbit/s possible get fractional t3 line meaning t3 line 28 lines turned resulting slower transfer rate typically reduced cost supposedly 1.544 mbit/s rate chosen tests done long lines chicago conducted underground test site typical bell system outside plant time accommodate loading coils cable vault manholes physically apart determined repeater spacing optimum bit rate chosen empirically—the capacity increased failure rate unacceptable reduced leave margin companding allowed acceptable audio performance seven bits per pcm sample original t1/d1 system later d3 d4 channel banks extended frame format allowing eight bits per sample reduced seven every sixth sample frame one bit robbed signaling state channel standard allow zero sample would produce long string binary zeros cause repeaters lose bit sync however carrying data switched 56 could long strings zeros one bit per sample set 1 jam bit 7 leaving 7 bits × 8,000 frames per second data detailed understanding rate 1.544 mbit/s divided channels follows explanation glosses t1 voice communications deals mainly numbers involved given telephone system nominal voiceband including guardband 4,000 hz required digital sampling rate 8,000 hz see nyquist rate since t1 frame contains 1 byte voice data 24 channels system needs 8,000 frames per second maintain 24 simultaneous voice channels frame t1 193 bits length 24 channels × 8 bits per channel 1 framing bit 193 bits 8,000 frames per second multiplied 193 bits yield transfer rate 1.544 mbit/s 8,000 × 193 1,544,000 initially t1 used alternate mark inversion ami reduce frequency bandwidth eliminate dc component signal later b8zs became common practice ami mark pulse opposite polarity previous one space level zero resulting three level signal however carried binary data similar british 23 channel systems 1.536 megabaud 1970s equipped ternary signal repeaters anticipation using 3b2t 4b3t code increase number voice channels future 1980s systems merely replaced european standard ones american t-carriers could work ami b8zs mode ami b8zs signal allowed simple error rate measurement bank central office could detect bit wrong polarity bipolarity violation sound alarm later systems could count number violations reframes otherwise measure signal quality allow sophisticated alarm indication signal system decision use 193-bit frame made 1958 allow identification information bits within frame two alternatives considered assign one extra bit b additional eight bits per frame 8-bit choice cleaner resulting 200-bit frame twenty-five 8-bit channels 24 traffic one 8-bit channel available operations administration maintenance oa chose single bit per frame reduce required bit rate 1.544 vs 1.6 mbit/s marketing worried 8 bits chosen oa function someone would try sell voice channel wind nothing soon commercial success t1 1962 t1 engineering team realized mistake one bit serve increasing demand housekeeping functions petitioned management change 8-bit framing flatly turned would make installed systems obsolete hindsight ten years later cept chose eight bits framing european e1 although feared extra channel sometimes appropriated voice data 1970s bell labs developed higher rate systems t1c sophisticated modulation scheme carried 3 mbit/s balanced pair cables could support t-2 carried 6.312 mbit/s requiring special low-capacitance cable foam insulation standard picturephone t-4 t-5 used coaxial cables similar old l-carriers used long lines td microwave radio relay systems also fitted high rate modems allow carry ds1 signal portion fm spectrum poor quality voice service later carried ds3 ds4 signals 1980s companies rlh industries inc. developed t1 optical fiber industry soon developed evolved multiplexed t1 transmission schemes ds1 signals interconnected typically central office locations common metallic cross-connect point known dsx-1 ds1 transported metallic outside plant cable signal travels conditioned cable pairs known t1 span t1 span +-130 volts dc power superimposed associated four wire cable pairs line span power line repeaters t1 niu t1 smartjacks t1 span repeaters typically engineered apart depending cable gauge 36 db loss requiring repeated span cable bridge taps load coils across pairs t1 copper spans replaced optical transport systems copper metallic span used t1 typically carried hdsl encoded copper line four wire hdsl require many repeaters conventional t1 spans newer two wire hdsl hdsl-2 equipment transports full 1.544 mbit/s t1 single copper wire pair approximately twelve thousand 12,000 feet 3.5 km 24 gauge cable used hdsl-2 employ multiple repeaters conventional four wire hdsl newer hdsl-4 systems one advantage hdsl ability operate limited number bridge taps tap closer hdsl transceiver two four wire hdsl equipment transmits receives cable wire pair compared conventional t1 service utilizes individual cable pairs transmit receive ds3 signals rare except within buildings used interconnections intermediate step multiplexed onto sonet circuit t3 circuit go repeaters customer orders ds3 usually receives sonet circuit run building multiplexer mounted utility box ds3 delivered familiar form two coax cables 1 send 1 receive bnc connectors ends twelve ds1 frames make single t1 superframe t1 sf t1 superframe composed two signaling frames t1 ds0 channels employ in-band signaling eighth bit written robbed full 64 kbit/s ds0 payload either logical zero one bit signify circuit signaling state condition hence robbed bit signaling restrict ds0 channel rate 56 kbit/s two twelve ds1 frames make t1 sf framed circuit t1 sf framed circuits yield two independent signaling channels b t1 esf framed circuits four signaling frames twenty four frame extended frame format yield four independent signaling channels b c 56 kbit/s ds0 channels associated digital data service dds services typically utilize eighth bit ds0 voice circuits employ b band signaling one exception switched 56kbit/s dds dds bit eight used identify dte request send rts condition switched 56 dds bit eight pulsed alternately set logical zero one transmit two state dial pulse signaling information sw56 dds csu/dsu digital end office switch use robbed-bit signaling america decreased significantly result signaling system 7 ss7 inter-office dial trunks ss7 full 64 kbit/s ds0 channel available use connection allows 64 kbit/s 128 kbit/s isdn data calls exist switched trunk network connection supporting t1 carrier entity optioned b8zs clear channel capable carriers price ds1 lines many different ways however boil two simple components local loop cost local incumbent charges transport signal end user central office otherwise known co point presence otherwise known pop carrier port cost access telephone network internet carrier network typically port price based upon access speed yearly commitment level loop based geography farther co pop loop costs loop price several components built including mileage calculation performed v/h coordinates standard gps coordinates telco piece local bell operating company—namely verizon inc. qwest—charge t-carriers different price per mile rates therefore price calculation two distance steps geomapping determination local price arrangements carriers utilize geographic pricing model described competitive local exchange carriers clecs telepacific integra telecom tw telecom windstream level 3 communications xo communications offer national pricing ds1 pricing model provider charges price every geography services national pricing outgrowth increased competition t-carrier market space commoditization t-carrier products providers adopted national pricing strategy may experience widely varying margins suppliers bell operating companies e.g. verizon inc. qwest maintain geographic pricing models albeit wholesale prices voice ds1 lines calculation mostly except port required internet access replaced ldu otherwise known long distance usage price loop determined voice-related charges added total short total price loop ldu x minutes used | [
5714,
4566,
7418,
2982,
4926,
4392,
995,
1364,
2208,
2114,
7824,
2117,
4970,
2050,
7569,
1976,
6145
] | Test |
2,237 | 3 | Interrupts_in_65xx_processors:interrupts 65xx processors 65xx family microprocessors consisting mos technology 6502 derivatives wdc 65c02 wdc 65c802 wdc 65c816 csg 65ce02 handle interrupts similar fashion three hardware interrupt signals common 65xx processors one software interrupt instruction wdc 65c816 adds fourth hardware interrupt— useful implementing virtual memory architectures—and software interrupt instruction also present 65c802 intended use system coprocessor type e.g. floating point processor hardware interrupt signals active low follows detection signal causes processor enter system initialization period six clock cycles sets interrupt request disable flag status register loads program counter values stored processor initialization vector – commencing execution operating native mode 65c816/65c802 switched back emulation mode stay returned native mode software control detection signal well execution instruction cause overall sequence events order behavior 65c816 asserted differs respects description separately discussed note processor push accumulator index registers stack—code interrupt handler must perform task well restore registers termination interrupt processing necessary also note vector eight bit 65xx processors well 65c802/65c816 operating emulation mode operating native mode 65c802/65c816 provide separate vectors set interrupt request disable flag bit status register disable detection signal effect interrupts however see section instruction implemented wdc cmos processors additionally 65 c 02 65c816/65c802 operating emulation mode copy status register pushed stack flag set software interrupt cause interrupt cleared cause hence interrupt service routine must retrieve copy saved status register pushed onto stack check status flag order distinguish requirement eliminated operating 65c802/65c816 native mode due separate vectors two interrupt types 65c816 interrupt input intended provide means redirect program execution hardware exception detected page fault memory access violation hence processor response input asserted negated different and/or asserted also achieving correct operation response requires interrupt occur proper time machine cycle whereas requirement exists asserted valid memory cycle processor asserted and/or status outputs following sequence events occur address pushed stack aborted instruction rather contents program counter executing return interrupt following interrupt cause processor return aborted instruction rather next instruction would case interrupts order processor correctly respond abort system logic must assert negate input soon valid address placed bus determined address constitutes page fault memory access violation anomaly e.g. attempted execution privileged instruction hence logic must assert processor asserted signals also must remain asserted fall phase-two clock immediately released timing constraints observed abort interrupt handler may aborted causing registers and/or memory changed possibly-undefined manner nmos 6502 derivatives e.g. 6510 simultaneous assertion hardware interrupt line execution accounted design—the instruction ignored case also status decimal mode flag processor status register unchanged following interrupt kind behavior potentially result difficult locate bug interrupt handler decimal mode happens enabled time interrupt anomalies corrected cmos versions processor well-designed succinct interrupt handler interrupt service routine isr expeditiously service event causes interrupt without interfering way interrupted foreground task—the isr must transparent interrupted task although exceptions may apply specialized cases means isr must preserve microprocessor mpu state disturb anything memory supposed disturb additionally isr fully reentrant meaning two interrupts arrive close succession isr able resume processing first interrupt second one serviced reentrancy achieved using mpu hardware stack storage preserving mpu state means isr must assure whatever values mpu registers time interrupt isr terminates part preservation process automatically handled mpu acknowledges interrupt push program counter program bank 65c816/65c802 status register stack prior executing isr completion isr instruction executed mpu reverse process member 65xx family pushes registers stack isrs accumulator and/or index registers must preserved assure transparency later restored final steps prior executing case 65c816/65c802 consideration must given whether operated emulation native mode time interrupt latter may also necessary preserve data bank direct zero page registers guarantee transparency also 65c816 native mode operating system may well use different stack location application software means isr would preserve subsequently restore stack pointer complicating matters 65c816/65c802 sizes accumulator index registers may either 8 16 bits operating native mode requiring sizes preserved later restoration methods mpu state preserved restored within isr vary different versions 65xx family nmos processors e.g. 6502 6510 8502 etc one method accumulator index registers preserved accumulator pushed pulled stack therefore following isr entry code typical instruction necessary previously noted nmos versions 6502 clear decimal mode flag status register interrupt occurs accumulator index registers preserved isr use needed isr concluded work would restore registers resume interrupted foreground task following nmos code typical consequence instruction mpu return decimal mode state time interrupt 65c02 65c816/65c802 operating emulation mode require less code able push pull index registers without using accumulator intermediary also automatically clear decimal mode executing isr following typical upon finishing isr would reverse process previously stated little complexity 65c816/65c802 operating native mode due variable register sizes necessity accounting registers case index registers may pushed without regard sizes changing sizes automatically sets significant byte msb registers zero data lost pushed value restored provided index registers size pushed accumulator however really two registers designated pushing accumulator set 8 bits preserve could result loss transparency isr change way therefore accumulator must always set 16 bits pushed pulled isr using also efficient set index registers 16 bits pushing otherwise isr push extra copy status register restore register sizes prior pulling stack isrs following entry code achieve goal transparency code fragment symbol mos technology wdc standard assembly language syntax bitwise operand isr assigned stack location preservation stack pointer must occur memory pushes occurred—it apparent following code added sequence would handle requirement completion isr processes would reversed follows note upon executing 65c816/65c802 automatically restore register sizes interrupt occurred since pulling previously–saved status register sets clears register size bits time interrupt possible switch 65c816/65c802 native mode emulation mode within isr fraught peril addition forcing accumulator index registers 8 bits causing loss significant byte index registers entering emulation mode truncate stack pointer 8 bits relocate stack page 1 ram result stack existed time interrupt inaccessible unless also page 1 ram larger 256 bytes general mode switching servicing interrupt recommended procedure may necessary specific operating environments previously noted software interrupts may used variety ways implement system functions historical use assist patching proms bugs discovered system firmware typical technique often used firmware development arrange vector point unprogrammed patch area prom event bug discovered patching would accomplished blowing fuses address faulty instruction located thus changing instruction opcode upon executing resulting mpu would redirected patch area suitable patch code would written often patch area code started sniffing stack determine address bug encountered potentially allowing presence one patch prom use prom patching diminished eproms eeproms became commonly available another use software development debugging aid conjunction machine language monitor overwriting opcode directing hardware vector entry point monitor one cause program halt desired point allowing monitor take control time one may examine memory view processor register values patch code etc debugging advocated kuckes thompson facilitated liberally sprinkling one code instructions opcode replaced instructions without altering actual behaviour program debugged characteristic instructions processor treats either two byte instruction opcode following byte referred signature upon execution processor add two program counter prior pushing stack hence return interrupt executed interrupted program continue address immediately following signature used debugging device program counter may adjusted point signature order execution resume expected alternatively may inserted signature placeholder case program counter adjustment required fact double-increment program counter pushing stack facilitates technique treating supervisor call instructions found mainframe computers usual procedure treat signature operating system service index operating system handler would retrieve value program counter pushed stack decrement read resulting memory location get signature converting signature zero-based index simple lookup table consulted load program counter address proper service routine upon completion service routine instruction would used return control program made operating system call note signature may value whereas signature limited range use and/or request operating system service means user applications know entry address operating system function correct signature byte invoke desired operation hence relocation operating system memory break compatibility existing user applications also executing always vectors processor address simple code may used preserve registers stack prior turning control requested service however programming model result somewhat slower execution compared calling service subroutine primarily result stack activity occurs interrupt also interrupt requests disabled executing requiring operating system re-enable wait interrupt opcode instruction available wdc version 65c02 65c816/65c802 microprocessors mpu halts mpu places semi-catatonic state hardware interrupt kind occurs primary use low-power embedded systems mpu nothing expected event occurs minimal power consumption desired system waiting quick response required typical example code would make use follows code fragment mpu halt upon execution go low power consumption state despite interrupt requests irq disabled prior instruction mpu respond hardware interrupt waiting upon receipt interrupt mpu awaken one clock cycle resume execution instruction immediately following hence interrupt latency short 70 nanoseconds 14 megahertz resulting rapid response possible external event similar ways stop opcode instruction completely shuts mpu waiting single interrupt input executed mpu halts internal clock retain data registers enters low power state mpu brought state pulling reset input pin classified interrupt input low execution resume address stored locations hardware reset vector intended use low power embedded applications long periods time may elapse events require mpu attention processing required would used normal programming would result total cessation processing | [
7960,
708,
4479,
7519,
468,
7531,
7533,
5296,
7353,
2567,
7730,
4061,
5680,
4532,
7668,
336,
4643,
1237,
3918,
263,
5087,
7222,
1150
] | Train |
2,238 | 7 | OurGrid:ourgrid ourgrid opensource grid middleware based peer-to-peer architecture ourgrid mainly developed federal university campina grande brazil run ourgrid instance named ourgrid since december 2004 anyone freely easily join gain access large amount computational power run parallel applications computational power provided idle resources participants shared way makes contribute get need currently platform used run application whose tasks i.e parts run single machine communicate among execution like simulations data mining searching figure 1.1 ourgrid main components ourgrid broker originally called mygrid scheduling component ourgrid solution machine running broker called home machine central point grid processing jobs acts grid coordinator scheduling execution tasks necessary data transfer grid machines due central role grid configuration management well job specification done home machine broker ourgrid user frontend provides support describe execute monitor jobs job processing done machines running ourgrid workers execution job broker gets workers on-demand associated peer broker role schedule tasks run workers deploy retrieve data to/from workers execution tasks ourgrid peer runs machine called peer machine main role peer organize provide worker machines belong administrative domain user perspective peer worker provider i.e. network service dynamically provides workers task execution administrative point view peer determines machines used workers ourgrid worker component runs machine available task execution worker provides necessary access functionality home machine also provides basic support instrumentation fault handling furthermore combined ourgrid peer allows use machines private networks practice computer connected internet used worker machine even lies different administrative domain behind firewall figure 1.1 administrative domains possibly using intranets illustrated rectangles containing workers encourage resource contribution network ourgrid uses resource allocation mechanism called network favours network favours autonomous reputation scheme rewards peers contribute way incentive peer contribute much possible system ourgrid community peer-to-peer resource sharing system focused providing resources bot applications central mission ourgrid community sharing done using network favours model model peer offers access idle resources community return work exceeds local capacity peer expects gain access idle resources participants system aims allow users bot applications easily obtain access use community computational resources dynamically forming on-demand large-scale grid peer community entity owns number resources occasionally needs computing power resources provide whenever peer needs power requests resources community whenever idle resources allocates one requesters guarantees quality service obtained idle resources donated community applications suitable ourgrid community status snapshot could seen | [
6025,
5666,
4159
] | Validation |
2,239 | 4 | Echoworx:echoworx echoworx email encryption software company based toronto ontario canada offices hermosa beach california london uk certificate authority echoworx member microsoft root certificate program apple root certificate program echoworx operates several data centers including locations united states europe founded 2000 echoworx headed ceo president michael ginsberg formerly ceo certapay email money transfer technology company december 2005 one first telecommunications companies united states white-label provide echoworx encryption services subscribers verizon communications dow 30 company delivers broadband communication wireline wireless customers launched encrypted email products december 2005 british telecom leading provider communications solutions services operating 170 countries british telecom launched bt secure mail encrypted message exchange bt emx based public key infrastructure pki october 2007 messagelabs provider integrated messaging web security services launched echoworx policy based encryption later acquired symantec october 2008 apptix application service provider asp technology company providing hosted business services software service small medium-sized businesses provided apptix secure mail powered echoworx part hosted email security services portfolio launched service april 2010 hostway infrastructure-as-a-service provider partnered echoworx provide encryption services 2011 company original priority small business market evolved enterprise corporate market echoworx offers several products area email encryption products offered direct sales white-labelled product several partners major offerings include | [
363,
7725,
7567,
330,
5773
] | Test |
2,240 | 2 | Moblin:moblin moblin short 'mobile linux discontinued open source operating system application stack mobile internet devices mids netbooks nettops embedded devices built around intel atom processor builds designed minimize boot times power consumption netbook mid-centric operating system netbook/desktop version moblin supported chipsets based ssse3 instruction set core2 celeron processors oem support scarce hit all-time high 2009 acer replaced linpus linux moblin acer aspire one netbooks lg electronics chose moblin os 2.1 mobile internet device class smartphone lg gw990 dell also accepted orders ubuntu moblin remix canonical ltd. built moblin top ubuntu distribution base commercial products existed around moblin 2 prominently foxconn netbook inventech smartphone announced computex 2009 mandriva offered moblin v2 version mandriva distribution netbook owners consumer electronics show january 2010 msi novell announced suse moblin preloaded msi u135 netbook following release moblin version 2.1 first original equipment manufacturer oem sell fully supported intel atom processor-based netbook running moblin-based technology consumers demonstrated msi intel booths show addition samsung showed four netbooks preloaded suse moblin mobile world congress february 2010 announced moblin project would merging maemo create meego mobile software platform nokia stopped meego development switching windows phone 2011 intel also discontinued work join tizen project instead intel launched moblin.org site july 2007 significantly updated site april 2008 launch intel atom processor family intel developer forum shanghai custom software development kit sdk available site moblin 2 os specifically designed run intel atom processor netbook april 2009 intel turned moblin linux foundation subsequently moblin merged maemo becoming meego meego development also hosted linux foundation initially governed technical steering group overseen imad sousou intel nokia valtteri halla linux foundation canceled meego september 2011 favor tizen new finnish start-up jolla announced july 2012 meego community-driven successor mer would basis new operating system sailfish os slated launch smartphone 2013 linux collaboration summit april 2009 intel demonstrated moblin 2 alpha release load major components stack including graphics system start mere seconds may 19 2009 imad sousou announced release moblin v2.0 beta netbooks nettops developer testing moblin 2 core distribution based recent builds fedora distributions announce future support core moblin stack include linpus ubuntu second major release marked shift xfce desktop environment custom-built gnome mobile ui based openedhand clutter key piece maemo graphical environment built around x window system new ui also includes integrated gecko web browser register impressed interface noted presence quite apparent bugs described beta release moblin 2 closer alpha beta. moblin 2 interface designed netbook nettops built open source graphics technology clutter dri2 kms designed around toolbars panels available top screen | [
6788,
3933,
2,
2187,
7528,
2559,
2564,
5391,
740,
7555,
1108,
5062,
5068,
3996,
424,
5794,
6158,
7956,
1522,
5453,
5803,
6515,
1535,
4400,
1176,
474,
2300,
5486,
1565,
1202,
3039,
1582,
1227,
5872,
3751,
4101,
5540,
549,
3081,
1260,
309... | Test |
2,241 | 2 | Uninstaller:uninstaller uninstaller also called deinstaller variety utility software designed remove software parts computer opposite installer uninstallers useful primarily software components installed multiple directories software components might shared system uninstalled systems remain use generic uninstallers flourished 1990s due popularity shared libraries constraints then-current operating systems especially microsoft windows xp declining storage costs increasing capacity subsequently made reclaiming disk space less urgent end-user applications increasingly relied simpler installation architectures consolidate components facilitate removal typical uninstallers contain following components uninstall invented jack bicer working norton desktop windows symantec bicer came uninstall concept developed first uninstall program 1991 published march 23 1992 norton desktop windows v.20 see official readme.txt first software package ever include uninstaller shown uninstalling norton desktop section release norton desktop windows 2.0 ken spreitzer tester product symantec capitalized uninstall idea wrote first widely used pc program called uninstaller initially licensed microhelp february 1998 sold cybermedia microhelp published spreitzer program uninstaller version 1 1995 spreitzer told new york times royalties received microhelp uninstaller made millionaire age 30 tim o'pry president microhelp substantially rewrote code uninstaller version 2 became best-selling program | [
3151,
3334,
6382,
7287,
1077,
3042,
4645,
6962,
6823
] | Validation |
2,242 | 9 | Register_(keyword):register keyword c programming language codice_1 reserved word keyword type modifier storage class hint codice_1 keyword deprecated c++ became reserved unused c++17 suggests compiler store declared variable cpu register faster location instead ram possible depending type cpu complexity program code optimize access variable hence improve execution time program c c++ keyword essentially ignored location variable declared codice_1 accessed codice_4 operator applied aside limitation codice_1 essentially meaningless modern compilers due optimization place variables register appropriate regardless whether hint given programming embedded systems codice_1 may still significant example microchip mplab xc32 compiler allows specify particular register keyword however discouraged favor compiler optimizations used codice_1 typically loop counters possibly frequently used variables code | [
1361,
1435
] | Validation |
2,243 | 7 | NetPC:netpc netpc standard diskless pcs developed microsoft intel competing standard network computer standard many ncs use intel cpus microsoft software network computer launched oracle corporation mid-1990s | [
7639,
5461,
1237,
4277,
3758
] | Test |
2,244 | 5 | Ping_sweep:ping sweep computing ping sweep method establish range ip addresses map live hosts classic tool used ping sweeps fping traditionally accompanied gping generate list hosts large subnets although recent version fping include functionality well-known tools ping sweep capability include nmap unix systems pinger software rhino9 windows nt many tools capability including hping simple nomad icmpenum solarwind ping sweep foundstone superscan also ping sweep tool windows mac linux android ios called fing made overlook soft pings detected protocol loggers like ippl | [
6256,
1942,
6062,
8023,
1708
] | Test |
2,245 | 6 | NTFS_reparse_point:ntfs reparse point ntfs reparse point type ntfs file system object available ntfs v3.0 found windows 2000 later versions reparse points provide way extend ntfs filesystem reparse point contains reparse tag data interpreted filesystem filter identified tag microsoft includes several default tags including ntfs symbolic links directory junction points volume mount points unix domain sockets also reparse points used placeholders files moved windows 2000 remote storage hierarchical storage system also act hard links n't limited point files volume point directories local volume general windows vista supports new symbolic link capability replaces windows 2000 windows xp junction points designed aid migration application compatibility unix operating systems unlike junction point symbolic link also point file remote smb network path additionally ntfs symbolic link implementation provides full support cross-filesystem links however functionality enabling cross-host symbolic links requires remote system also support effectively limits support windows vista later windows operating systems hard links use mft entry original file adding hard link creates new name attribute increases hard link count newly created file count equals one deleting hard link removes appropriate name decreases hard link count count goes zero system deletes file freeing allocated disk space releasing mft record name attributes independent deleting moving renaming file n't affect hard links volume mount points similar unix mount points root another file system attached directory ntfs allows additional file systems mounted without requiring separate drive letter codice_11 codice_12 volume mounted top existing directory another volume contents previously listed directory become invisible replaced content root directory mounted volume mounted volume could still drive letter assigned separately file system allow volumes mutually mounted volume mount points made either persistent remounted automatically system reboot persistent must manually remounted reboot mounted volumes may use file systems ntfs possibly security settings remapping access rights according remote file system policy directory junctions similar volume mount points reference directories file system instead volumes instance directory codice_13 directory junction attribute contains link codice_14 automatically refer directory codice_14 accessed user-mode application function conceptually similar symbolic links directories unix except target ntfs must always another directory typical unix file systems allow target symbolic link type file directory junctions created command codice_16 removed codice_17 console prompt persistent resolved server side share security realm local system domain parent volume mounted security settings contents content target directory however junction may distinct security settings unlinking directory junction delete files target directory directory junctions installed default windows vista compatibility previous versions windows codice_18 root directory system drive links codice_19 physical directory root directory volume however hidden default security settings set windows explorer refuse open within shell applications except local built-in system user local administrators group user accounts used system software installers additional security restriction probably made avoid users finding apparent duplicate files joined directories deleting error semantics directory junctions hardlinks reference counting used target contents even referenced container directory junctions soft links persist even target directory removed working limited form symbolic links additional restriction location target optimized version allowing faster processing reparse point implemented less overhead newer ntfs symbolic links resolved server side found remote shared directories symbolic links soft links introduced windows vista symbolic links resolved client side symbolic link shared target subject access restrictions client server symbolic links created either files created codice_20 directories created codice_21 unlike unix symbolic links semantic link must provided created link target however need exist available symbolic link created symbolic link accessed target checked availability ntfs also check correct type file directory return not-found error existing target wrong type also reference shared directories remote hosts files subdirectories within shared directories target mounted immediately boot temporarily demand opening openfile createfile api definition persistent ntfs volume created types symbolic links removed files using codice_22 command line prompt batch distributed link tracking allows applications track files shell shortcuts ole links even renamed moved another volume within machine domain workgroup tracking implemented system service uses object identifier oid index stored metafile application requests track file directory tracking service creates oid entry points file file rename copy move operation ntfs v3 volume also copies object id allows tracking service eventually find target file several directories different similar files files may identical content single instance storage allows identical files merged one file create references merged file sis consists file system filter manages copies modification merges files user space service groveler searches files identical need merging sis mainly designed remote installation servers may multiple installation images contain many identical files sis allows consolidated unlike example hard links file remains distinct changes one copy file leave others unaltered similar copy-on-write technique memory copying really done one copy modified hierarchical storage management means transferring files used period time less expensive storage media file next accessed reparse point file determines needed retrieves storage nss activex document storage technology since discontinued microsoft allowed activex documents stored multi-stream format activex uses internally nss file system filter loaded used process multiple streams transparently application file transferred non-ntfs formatted disk volume would also transfer multiple streams single stream windows 10 build 17063 stable release version 1803 microsoft introduced unix domain sockets windows realized using afunix.sys kernel driver new reparse point filesystem unix domain sockets common bsd linux systems since ages seen standard inter process communication systems therefore introduction windows allow simplified adoption code cross platform portability stuxnet part series win32 exploits uses ntfs junction points part overall mode operation | [
3599,
7879,
3937,
3263,
378,
2198,
6096,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
435,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
6558,
6575,
... | Test |
2,246 | 6 | Hi_Performance_FileSystem:hi performance filesystem hi performance filesystem hfs file system used hp-ux operating system variant unix file system | [
900,
1254,
7827
] | Train |
2,247 | 8 | Adtech_(company):adtech company adtech ag german–american digital marketing company retails products manage serve evaluate online advertising campaigns including display video mobile formats company founded 1998 frankfurt germany acquired web portal aol may 15 2007 company merged oath inc. brand subsidiary verizon communications adtech founded 1998 frankfurt germany michael stusch michael schultheiß 2000 american internet holding company cmgi acquired controlling interest 80 adtech year adtech became private limited company based adforce inc. ’ technology adtech opened first data center frankfurt germany 1998 2001 adtech delivered ten billionth banner ad 2002 adtech supplied 100,000th advertising campaign delivered 100 million banners every day 2004 adforce technology replaced adtech ’ ad serving technology shortly second ad serving data center launched frankfurt may 16 2007 aol announced acquisition adtech ag adtech acquired provide aol ad serving platform enabling website publishers manage traffic report online advertising campaigns operating independent wholly owned subsidiary aol advertising.com division ad-serving platform aol advertising previously platform-a company november 2018 part oath inc. owned verizon communications adtech provides integrated ad serving platform product allows publishers advertisers agencies ad networks ability manage display video mobile digital advertising campaigns adtech ad server responds banner requests prompted user ’ browsers xml delivers specified end system — provision terminals must online open design adtech adservers allows implementation external technologies targeting adtech collaborates vendors nugg wunderloop fall 2007 adtech presented integrated suite display video mobile ad serving technologies digital publishers ad tech london ad tech new york collaboration technology partners lightningcast third screen media adtech merged new video mobile applications directly existing user interface reporting system according adtech digital advertisements distributed mobile devices type including mobile smart phones customers also able apply selective targeting options address advertiser needs since 2004 adtech interprets banner requests ad servers periodical web analyses europe adtech surveys document different aspects internet usage ranging browser trends click-through rates also serve reference professional articles trends digital marketing industry | [
6092
] | Test |
2,248 | 3 | Register_file:register file register file array processor registers central processing unit cpu modern integrated circuit-based register files usually implemented way fast static rams multiple ports rams distinguished dedicated read write ports whereas ordinary multiported srams usually read write ports instruction set architecture cpu almost always define set registers used stage data memory functional units chip simpler cpus architectural registers correspond one-for-one entries physical register file prf within cpu complicated cpus use register renaming mapping physical entry stores particular architectural register changes dynamically execution register file part architecture visible programmer opposed concept transparent caches register files may clubbed together register banks processors several register banks arm processors use arm register banks fast interrupt request x86 processors use context switching fast interrupt switching instruction decoder gprs register files one instruction issued existing processors support superscalar however context switching totally different mechanism arm register bank within registers modcomp later 8051-compatible processors use bits program status word select currently active register bank usual layout convention simple array read vertically single word line runs horizontally causes row bit cells put data bit lines run vertically sense amps convert low-swing read bitlines full-swing logic levels usually bottom convention larger register files sometimes constructed tiling mirrored rotated simple arrays register files one word line per entry per port one bit line per bit width per read port two bit lines per bit width per write port bit cell also vdd vss therefore wire pitch area increases square number ports transistor area increases linearly point may smaller and/or faster multiple redundant register files smaller numbers read ports rather single register file read ports mips r8000 integer unit example 9 read 4 write port 32 entry 64-bit register file implemented 0.7 µm process could seen looking chip arm length two popular approaches dividing registers multiple register files distributed register file configuration partitioned register file configuration principle operation could done 64-bit-wide register file many read write ports could done single 8-bit-wide register file single read port single write port however bit-level parallelism wide register files many ports allows run much faster thus operations single cycle would take many cycles fewer ports narrower bit width width bits register file usually number bits processor word size occasionally slightly wider order attach extra bits register poison bit width data word different width address—or cases 68000 even width—the address registers separate register file data registers basic scheme bit cell many optimizations possible register files make special provision prevent multiple write ports writing entry simultaneously instead instruction scheduling hardware ensures one instruction particular cycle writes particular entry multiple instructions targeting register issued one write enables turned crossed inverters take finite time settle write operation read operation either take longer return garbage common bypass multiplexers bypass written data read ports simultaneous read write entry commanded bypass multiplexers often part larger bypass network forwards results yet committed functional units register file usually pitch-matched datapath serves pitch matching avoids many busses passing datapath turn corners would use lot area since every unit must bit pitch every unit datapath ends bit pitch forced widest unit waste area units register files two wires per bit per write port bit lines must contact silicon every bit cell often set pitch datapath area sometimes saved machines multiple units datapath two datapaths side-by-side smaller bit pitch single datapath would case usually forces multiple copies register file one datapath alpha 21264 ev6 instance first large micro-architecture implement shadow register file architecture two copies integer register file two copies floating point register locate front end future scaled file contain 2 read 2 write port took extra cycle propagate data two context switch issue logic attempted reduce number operations forwarding data two greatly improved integer performance help reduce impact limited number gpr superscalar speculative execution design later adapted sparc mips later x86 implementation mips uses multiple register file well r8000 floating-point unit two copies floating-point register file four write four read ports wrote copies time context switch however support integer operation integer register file still remain one later shadow register file abandoned newer design favor embedded market sparc uses shadow register file architecture well high end line 4 copies integer register files future retired scaled scratched contain 7 read 4 write port 2 copies floating point register file unlike alpha x86 locate back end retire unit right order unit renaming register files load instruction instruction fetch decoding stage context switch needless design ibm uses mechanism many major microprocessors deeply merging register file decoder register file work independently decoder side involve context switch different alpha x86 register file serve dedicate decoder thread level example power8 8 instruction decoders 32 register files 32 general purpose registers 4 read 4 write port facilitate simultaneous multithreading instruction used cross register file lack context switch. x86 processor line typical pre-486 cpu individual register file general purpose register directly work decoder x87 push stack located within floating-point unit starting pentium typical pentium-compatible x86 processor integrated one copy single-port architectural register file containing 8 architectural registers 8 control registers 8 debug registers 8 condition code registers 8 unnamed based register one instruction pointer one flag register 6 segment registers one file one copy 8 x87 fp push stack default mmx register virtually simulated x87 stack require x86 register supplying mmx instruction aliases exist stack p6 instruction independently stored executed parallel early pipeline stages decoding micro-operations renaming out-of-order execution beginning p6 register files require additional cycle propagate data register files like architectural floating point located code buffer decoders called retire buffer reorder buffer oooe connected within ring bus 16 bytes register file still remains one x86 register file one x87 stack serve retirement storing x86 register file increased dual ported increase bandwidth result storage registers like debug/condition code/control/unnamed/flag stripped main register file placed individual files micro-op rom instruction sequencer inaccessible registers like segment register separated general-purpose register file except instruction pointer located scheduler instruction allocator order facilitate register renaming out-of-order execution x87 stack later merged floating-point register file 128-bit xmm register debuted pentium iii xmm register file still located separately x86 integer register files later p6 implementations pentium yonah introduced shadow register file architecture expanded 2 copies dual ported integer architectural register file consist context switch future retirered file scaled file using trick used integer floating point order solve register bottleneck exist x86 architecture micro op fusion introduced still 8 entries 32 bit architectural registers total 32 bytes capacity per file segment register instruction pointer remain within file though inaccessible program speculative file second file served scaled shadow register file without context switch scaled file store instruction independently instruction sse2/sse3/ssse3 require feature integer operation example instruction like pshufb pmaddubsw phsubw phsubd phsubsw phaddw phaddd phaddsw would require loading eax/ebx/ecx/edx register file though uncommon x86 processor take use another register file instruction time second file served scale retirered file pentium architecture still remains one dual-ported fp register file 8 entries mm/xmm shared three decoder fp register shadow register file shadow register file architecture including floating point function processor p6 architectural register file external locate processor backend retired opposite internal register file locate inner core register renaming/reorder buffer however core 2 within unit called register alias table rat located instruction allocator size register size retirement core 2 increased inner ring bus 24 bytes allow 3 instructions decoded extended register file dual ported one read/one write quad ported two read/two write register still remain 8 entries 32 bit 32 bytes including 6 segment register one instruction pointer unable access file code/instruction total file size expanded 16 entries x64 total 128 bytes size per file pentium pipeline port decoder increased 're located allocator table instead code buffer fp xmm register file also increase quad ported 2 read/2 write register still remain 8 entries 32 bit extended 16 entries x64 mode number still remain 1 shadow register file architecture including floating point/sse functions later x86 implementations like nehalem later processors integer floating point registers incorporated unified octa-ported six read two write general-purpose register file 8 8 32-bit 16 16 x64 per file register file extended 2 enhanced shadow register file architecture favorite executing hyper threading thread uses independent register files decoder later sandy bridge onward replaced shadow register table architectural registers much large yet advance physical register file decoding reorder buffer randered sandy bridge onward longer carry architectural register atom line modern simplified revision p5 includes single copies register file share thread decoder register file dual-port design 8/16 entries gprs 8/16 entries debug register 8/16 entries condition code integrated file however eight-entries 64 bit shadow based register eight-entries 64 bit unnamed register separated main gprs unlike original p5 design located execution unit file registers single-ported expose instruction like scaled shadow register file found core/core2 shadow register file made architectural registers bonnell due shadow register file architecture however file use renaming purpose due lack order execution found bonnell architecture also one copy xmm floating point register file per thread difference nehalem bonnell unified register file dedicated register file hyper threading instead bonnell uses separate rename register thread despite order similar bonnell larrabee xeon phi also one general-purpose integer register file larrabee 16 xmm register files 8 entries per file xeon phi 128 avx-512 register files containing 32 512-bit zmm registers vector instruction storage big l2 cache intel x86 lines n't register file internal design geode gx vortex86 many embedded processors n't pentium-compatible reverse-engineered early 80x86 processors therefore n't register file decoders gprs used individually pentium 4 hand register file decoder x86 gprs n't exist within structure due introduction physical unified renaming register file similar sandy bridge slightly different due inability pentium 4 use register naming attempting replace architectural register file skip x86 decoding scheme instead uses sse integer execution storage alu result sse2/sse3/ssse3 use mechanism well integer operation amd early design like k6 register file like intel support shadow register file architecture lack context switch bypass inverter necessary require register file function appropriately instead use separate gprs directly link rename register table oooe cpu dedicated integer decoder floating decoder mechanism similar intel pre-pentium processor line example k6 processor four int one eight-entries temporary scratched register file one eight-entries future register file one eight-entries fetched register file eight-entries unnamed register file two fp rename register files two eight-entries x87 st file one goes fadd one goes fmov directly link x86 eax integer renaming xmm0 register floating point renaming later athlon included shadow register front end scaled 40 entries unified register file order integer operation decoded register file contain 8 entries scratch register 16 future gprs register file 16 unnamed gprs register file later amd designs abandons shadow register design favored k6 architecture individual gprs direct link design like phenom three int register files two sse register files located physical register file directly linked gprs however scales one integer one floating-point bulldozer like early amd designs x86 manufacturers like cyrix via dm p sis used mechanism well resulting lack integer performance without register renaming in-order cpu companies like cyrix amd increase cache size hope reduce bottleneck amd sse integer operation work different way core 2 pentium 4 uses separate renaming integer register load value directly decode stage though theoretically need shorter pipeline intel sse implementation generally cost branch prediction much greater higher missing rate intel would take least two cycles sse instruction executed regardless instruction wide early amds implementations could execute fp int sse instruction set like intel implementation unlike alpha sparc mips allows one register file load/fetch one operand time would require multiple register files achieve superscale arm processor hand integrate multiple register files load/fetch instructions arm gprs special purpose instruction set arm isa require accumulator index stack/base points registers accumulator base/stack point used thumb mode gprs propagate store multiple instructions independently smaller code size small enough able fit one register architectural register act table shared decoder/instructions simple bank switching decoders major difference arm designs arm allows run general-purpose register quick bank switching without requiring additional register file superscalar despite x86 sharing mechanism arm gprs store data individually x86 confront data dependency three non-related instructions stored gprs per file small eight 32 bit mode 16 64 bit compared arm 13 32 bit 31 64 bit data impossible superscalar without multiple register files feed decoder x86 code big complex compared arm x86 front-ends become much larger much power hungry arm processor order competitive example pentium core 2 duo bay trail third-party x86 equivalent processors even became noncompetitive arm due dedicated register file architecture particularly amd cyrix via bring reasonable performance without register renaming order execution leave intel atom in-order x86 processor core mobile competition x86 nehalem processor merged integer floating point register one single file introduction large physical register table enhanced allocator table front-end renaming out-of-order internal core processors perform register renaming arrange functional unit write subset physical register file arrangement eliminate need multiple write ports per bit cell large savings area resulting register file effectively stack register files single write ports benefits replication subsetting read ports limit technique would place stack 1-write 2-read regfiles inputs functional unit since regfiles small number ports often dominated transistor area best push technique limit useful sparc isa defines register windows 5-bit architectural names registers actually point window much larger register file hundreds entries implementing multiported register files hundreds entries requires large area register window slides 16 registers moved architectural register name refer small number registers larger array e.g architectural register r20 refer physical registers 20 36 52 68 84 100 116 seven windows physical file save area sparc implementations implement 32-entry register file cell seven bits one read writeable external ports contents bits rotated rotation accomplishes single cycle movement register window wires accomplishing state movement local tremendous bandwidth possible little power technique used r10000 register renaming mapping file stores 6-bit virtual register number physical registers renaming file renaming state checkpointed whenever branch taken branch detected mispredicted old renaming state recovered single cycle see register renaming | [
5012,
1447,
5371,
3948,
7527,
7529,
5737,
2567,
4694,
5042,
1481,
5055,
2226,
2950,
1867,
4365,
4370,
6148,
4372,
441,
2266,
4765,
4047,
4408,
5483,
1556,
5487,
3020,
6198,
1568,
1570,
6922,
7666,
515,
8024,
5521,
3747,
4098,
1237,
6236,
... | Test |
2,249 | 1 | CLSQL:clsql clsql sql database interface common lisp created 2001 kevin m. rosenberg initially based substantially maisql package pierre r. mai orphaned onshore development marcus pearce ported uncommonsql package clsql provides commonsql-compatible api clsql clsql used query interface mysql postgresql odbc aodbc sqlite version 2 3 oracle oci | [
1716,
6876,
1445,
6888,
2915,
6352,
3863,
3370,
5571,
6191,
4878,
4332,
5494,
5757,
6116,
3212,
7750,
6210,
1116,
6471,
940,
2054,
1676,
5956,
4535,
5077,
1890,
3915,
784,
3250
] | Test |
2,250 | 1 | Trigger_list:trigger list trigger list general meaning refers list whose items used initiate trigger certain actions united states person applies mortgage loan lender makes credit inquiry potential borrower national credit bureaus equifax experian transunion unless borrower opted credit bureaus put applicants onto trigger list leads persons interested new loans lists sold numerous lenders united states soon application applicant starts receiving offers parts country trigger lists contain significant amount personal financial information among buyers trigger lists lead generators resell filtered information borrowers e.g. people live certain area certain credit score federal trade commission considers market trigger lists legal business many people organizations national association mortgage brokers consider serious breach privacy lobby putting practice regulatory controls american consumers may opt-out trigger lists calling 1-888-5-optout 1-888-567-8688 zangger committee nuclear suppliers group maintain lists items may contribute nuclear proliferation nuclear non-proliferation treaty forbids members export items non-treaty members items said trigger countries responsibilities npt hence name | [] | Test |
2,251 | 4 | Trusted_computing_base:trusted computing base trusted computing base tcb computer system set hardware firmware and/or software components critical security sense bugs vulnerabilities occurring inside tcb might jeopardize security properties entire system contrast parts computer system outside tcb must able misbehave way would leak privileges granted accordance security policy careful design implementation system trusted computing base paramount overall security modern operating systems strive reduce size tcb exhaustive examination code base means manual computer-assisted software audit program verification becomes feasible term trusted computing base goes back john rushby defined combination kernel trusted processes latter refers processes allowed violate system access-control rules classic paper authentication distributed systems theory practice lampson et al define tcb computer system simply definitions clear convenient neither theoretically exact intended e.g network server process unix-like operating system might fall victim security breach compromise important part system security yet part operating system tcb orange book another classic computer security literature reference therefore provides formal definition tcb computer system words trusted computing base tcb combination hardware software controls work together form trusted base enforce security policy orange book explains words given piece hardware software part tcb designed part mechanism provides security computer system operating systems typically consists kernel microkernel select set system utilities example setuid programs daemons unix systems programming languages security features designed java e tcb formed language runtime standard library pointed consequence orange book definition boundaries tcb depend closely upon specifics security policy fleshed network server example even though say web server serves multi-user application part operating system tcb responsibility performing access control users usurp identity privileges sense definitely part tcb larger computer system comprises unix server user browsers web application words breaching web server e.g buffer overflow may regarded compromise operating system proper certainly constitutes damaging exploit web application fundamental relativity boundary tcb exemplified concept 'target evaluation 'toe common criteria security process course common criteria security evaluation one first decisions must made boundary audit terms list system components come scrutiny systems n't trusted computing base part design provide security secure insofar security provided external means e.g computer sitting locked room without network connection may considered secure depending policy regardless software runs david j. farber et al put nowiki n /nowiki computer system integrity lower layers typically treated axiomatic higher layers far computer security concerned reasoning security properties computer system requires able make sound assumptions importantly however barring reason believe otherwise computer able everything general von neumann machine obviously includes operations would deemed contrary simplest security policies divulging email password kept secret however barring special provisions architecture system denying computer could programmed perform undesirable tasks special provisions aim preventing certain kinds actions executed essence constitute trusted computing base reason orange book still reference design secure operating systems characterizes various security assurance levels defines mainly terms structure security features tcb outlined aforementioned orange book software portions trusted computing base need protect tampering effect due von neumann architecture implemented virtually modern computers since machine code processed another kind data read overwritten program barring special memory management provisions subsequently treated part tcb specifically trusted computing base must least prevent software written many modern cpus protection memory hosts tcb achieved adding specialized piece hardware called memory management unit mmu programmable operating system allow deny access specific ranges system memory programs run course operating system also able disallow programming programs technique called supervisor mode compared crude approaches storing tcb rom equivalently using harvard architecture advantage allowing security-critical software upgraded field although allowing secure upgrades trusted computing base poses bootstrap problems stated trust trusted computing base required make progress ascertaining security computer system words trusted computing base “ trusted ” first foremost sense trusted necessarily trustworthy real-world operating systems routinely security-critical bugs discovered attests practical limits trust alternative formal software verification uses mathematical proof techniques show absence bugs researchers nicta spinout open kernel labs recently performed formal verification sel4 member l4 microkernel family proving functional correctness c implementation kernel makes sel4 first operating-system kernel closes gap trust trustworthiness assuming mathematical proof free error due aforementioned need apply costly techniques formal verification manual review size tcb immediate consequences economics tcb assurance process trustworthiness resulting product terms mathematical expectation number bugs found verification review order reduce costs security risks tcb therefore kept small possible key argument debate preferring microkernels monolithic kernels aix materializes trusted computing base optional component install-time package management system | [
180,
3932,
3767,
5021,
6894,
907,
4864,
5571,
5232,
7554,
1019,
6208,
7570,
6299,
1682,
2879,
5785,
3751,
6861,
5190,
1805
] | Test |
2,252 | 1 | Tuvalu_Ship_Registry:tuvalu ship registry tuvalu ship registry body appointed government tuvalu register ships tuvalu flag ship registry launched 2004 located singapore operated tuvalu ship registry pte ltd ship registry managed behalf tuvalu government sovereign ventures sv pte ltd responsibilities registry include total 245 type bulk carrier 18 container ship 2 general cargo 36 oil tanker 27 162 2017 tuvalu entered international spotlight 2012 ships sailing flag iran registered tuvalu ship registry response european boycott iranian oil exports iran nuclear policy number oil tankers changed tuvalu flags according radio australia could lead unforeseen consequences small nation iranian vessels accepted tuvalu ship registry earlier flagged malta cyprus flags well-known reputable flags however upon understanding vessels actually sanctioned us eu government tuvalu took swift action instruct tuvalu ship registry de-register possible iranian-linked vessels 16 august 2012 iranian-linked vessels de-registered 21 september 2012 press releases actions taken tuvalu ship registry posted website iranian vessels later rumored gone flags tanzania mongolia others | [] | Train |
2,253 | 3 | Operation_Europe:_Path_to_Victory:operation europe path victory operation europe path victory released japan combat strategy video game multiple platforms one two players compete world war ii action ms-dos version game released north america object game fulfill one military objectives either axis allied forces players engage modern warfare around western europe eastern europe central europe north africa game uses abstract numbers figures map view saves concrete illustrations soldiers lock horns battlefield urban setting urban settings give traditional 1930s view housing office buildings provide extra protection units guarding however massive numbers crunch lack graphics help enhance number crunching ability game artificial intelligence way utilize nobunaga ambition video game engine simulating modern warfare general statistics completely randomized roulette system 84 different characters used generals including american television show combat examples non-fictional characters include adolf hitler josef stalin walter bedell smith weapons automatically replenished end scenario units built scratch must requested head brigade instead japanese version game 4 game modes campaign demonstration one player game 2 players game campaign mode player play germans starting mode invasion france german army continues fighting africa ending berlin defense officers gain experience every scenario retaining winning battle troops often replaced type one infantry artillery howitzers reactive artillery tanks self-propelled artillery armored infantry carriers mechanized units often give stronger instead weaker make losses battalion strong units although campaign mode directly available us version game still present game text translated needed graphics present formulas calculating quantity quality units operate allows game patched enable campaign mode reviewing snes version gamepro applauded intelligent ai stating even n't friend go head-to-head game still enjoyable challenging huge amount content arguing six scenarios essentially amount six complete games single cart though noting lack action gameplay would make unappealing average gamer concluded challenging strategy makes game serious ww ii buff without | [
6380
] | Test |
2,254 | 4 | Uninterruptible_power_supply:uninterruptible power supply uninterruptible power supply uninterruptible power source ups electrical apparatus provides emergency power load input power source mains power fails ups differs auxiliary emergency power system standby generator provide near-instantaneous protection input power interruptions supplying energy stored batteries supercapacitors flywheels on-battery run-time uninterruptible power sources relatively short minutes sufficient start standby power source properly shut protected equipment type continual power system ups typically used protect hardware computers data centers telecommunication equipment electrical equipment unexpected power disruption could cause injuries fatalities serious business disruption data loss ups units range size units designed protect single computer without video monitor around 200 volt-ampere rating large units powering entire data centers buildings world largest ups 46-megawatt battery electric storage system bess fairbanks alaska powers entire city nearby rural communities outages primary role ups provide short-term power input power source fails however ups units also capable varying degrees correcting common utility power problems manufacturers ups units categorize products accordance number power-related problems address three general categories modern ups systems on-line line-interactive standby ups one kilovolt-ampere 1 kva line-interactive standby variety usually less expensive large power units dynamic uninterruptible power supplies dups sometimes used synchronous motor/alternator connected mains via choke energy stored flywheel mains power fails eddy-current regulation maintains power load long flywheel energy exhausted dups sometimes combined integrated diesel generator turned brief delay forming diesel rotary uninterruptible power supply drups fuel cell ups developed recent years using hydrogen fuel cell power source potentially providing long run times small space offline/standby ups offers basic features providing surge protection battery backup protected equipment normally connected directly incoming utility power incoming voltage falls rises predetermined level sps turns internal dc-ac inverter circuitry powered internal storage battery ups mechanically switches connected equipment dc-ac inverter output switch-over time long 25 milliseconds depending amount time takes standby ups detect lost utility voltage ups designed power certain equipment personal computer without objectionable dip brownout device line-interactive ups similar operation standby ups addition multi-tap variable-voltage autotransformer special type transformer add subtract powered coils wire thereby increasing decreasing magnetic field output voltage transformer may also performed buck–boost transformer distinct autotransformer since former may wired provide galvanic isolation type ups able tolerate continuous undervoltage brownouts overvoltage surges without consuming limited reserve battery power instead compensates automatically selecting different power taps autotransformer depending design changing autotransformer tap cause brief output power disruption may cause upss equipped power-loss alarm chirp moment become popular even cheapest upss takes advantage components already included main 50/60 hz transformer used convert line voltage battery voltage needs provide two slightly different turns ratios one convert battery output voltage typically multiple 12 v line voltage second one convert line voltage slightly higher battery charging voltage multiple 14 v difference two voltages charging battery requires delta voltage 13–14 v charging 12 v battery furthermore easier switching line-voltage side transformer lower currents side gain buck/boost feature required two separate switches ac input connected one two primary taps load connected thus using main transformer primary windings autotransformer battery still charged bucking overvoltage boosting undervoltage transformer output low charge batteries autotransformers engineered cover wide range varying input voltages requires taps increases complexity expense ups common autotransformer cover range 90 v 140 v 120 v power switch battery voltage goes much higher lower range low-voltage conditions ups use current normal may need higher current circuit normal device example power 1000-w device 120 v ups draw 8.33 brownout occurs voltage drops 100 v ups draw 10 compensate also works reverse overvoltage condition ups need less current online ups batteries always connected inverter power transfer switches necessary power loss occurs rectifier simply drops circuit batteries keep power steady unchanged power restored rectifier resumes carrying load begins charging batteries though charging current may limited prevent high-power rectifier overheating batteries boiling electrolyte main advantage on-line ups ability provide electrical firewall incoming utility power sensitive electronic equipment online ups ideal environments electrical isolation necessary equipment sensitive power fluctuations although one time reserved large installations 10 kw advances technology permitted available common consumer device supplying 500 w less online ups may necessary power environment noisy utility power sags outages anomalies frequent protection sensitive equipment loads required operation extended-run backup generator necessary basic technology online ups standby line-interactive ups however typically costs much due much greater current ac-to-dc battery-charger/rectifier rectifier inverter designed run continuously improved cooling systems called double-conversion ups due rectifier directly driving inverter even powered normal ac current online ups typically static transfer switch sts increasing reliability hybrid rotary ups designs official designations although one name used utl double conversion demand style ups targeted towards high-efficiency applications still maintaining features protection level offered double conversion hybrid double conversion demand ups operates off-line/standby ups power conditions within certain preset window allows ups achieve high efficiency ratings power conditions fluctuate outside predefined windows ups switches online/double-conversion operation double-conversion mode ups adjust voltage variations without use battery power filter line noise control frequency ferroresonant units operate way standby ups unit however online exception ferroresonant transformer used filter output transformer designed hold energy long enough cover time switching line power battery power effectively eliminates transfer time many ferroresonant upss 82–88 efficient ac/dc-ac offer excellent isolation transformer three windings one ordinary mains power second rectified battery power third output ac power load dominant type ups limited around range units still mainly used industrial settings oil gas petrochemical chemical utility heavy industry markets due robust nature ups many ferroresonant upss utilizing controlled ferro technology may interact power-factor-correcting equipment result fluctuating output voltage ups may corrected reducing load levels adding linear type loads ups designed powering dc equipment similar online ups except need output inverter also ups battery voltage matched voltage device needs device power supply needed either since one power conversion steps eliminated increases efficiency run time many systems used telecommunications use extra-low voltage common battery 48 v dc power less restrictive safety regulations installed conduit junction boxes dc typically dominant power source telecommunications ac typically dominant source computers servers much experimentation 48 v dc power computer servers hope reducing likelihood failure cost equipment however supply amount power current would higher equivalent 115 v 230 v circuit greater current requires larger conductors energy lost heat laptop computer classic example pc dc ups built high voltage dc 380 v finding use data center applications allows small power conductors subject complex electrical code rules safe containment high voltages rotary ups uses inertia high-mass spinning flywheel flywheel energy storage provide short-term ride-through event power loss flywheel also acts buffer power spikes sags since short-term power events able appreciably affect rotational speed high-mass flywheel also one oldest designs predating vacuum tubes integrated circuits considered line since spins continuously normal conditions however unlike battery-based ups flywheel-based ups systems typically provide 10 20 seconds protection flywheel slowed power output stops traditionally used conjunction standby generators providing backup power brief period time engine needs start running stabilize output rotary ups generally reserved applications needing 10,000 w protection justify expense benefit advantages rotary ups systems bring larger flywheel multiple flywheels operating parallel increase reserve running time capacity flywheels mechanical power source necessary use electric motor generator intermediary diesel engine designed provide emergency power using transmission gearbox rotational inertia flywheel used directly start diesel engine running diesel engine used directly spin flywheel multiple flywheels likewise connected parallel mechanical countershafts without need separate motors generators flywheel normally designed provide high current output compared purely electronic ups better able provide inrush current inductive loads motor startup compressor loads well medical mri cath lab equipment also able tolerate short-circuit conditions 17 times larger electronic ups permitting one device blow fuse fail devices still continue powered rotary ups life cycle usually far greater purely electronic ups 30 years require periodic downtime mechanical maintenance ball bearing replacement larger systems redundancy system ensures availability processes maintenance battery-based designs require downtime batteries hot-swapped usually case larger units newer rotary units use technologies magnetic bearings air-evacuated enclosures increase standby efficiency reduce maintenance low levels typically high-mass flywheel used conjunction motor-generator system units configured case 3 motor generator synchronous/synchronous induction/synchronous motor side unit case nos 2 3 driven directly ac power source typically inverter bypass 6-step double-conversion motor drive 6-pulse inverter case 1 uses integrated flywheel short-term energy source instead batteries allow time external electrically coupled gensets start brought online case nos 2 3 use batteries free-standing electrically coupled flywheel short-term energy source smaller ups systems come several different forms sizes however two common forms tower rack-mount tower models stand upright ground desk shelf typically used network workstations desktop computer applications rack-mount models mounted standard 19-inch rack enclosures require anywhere 1u 12u rack units typically used server networking applications devices feature user interfaces rotate 90° allowing devices mounted vertically ground horizontally would found rack large business environments reliability great importance single huge ups also single point failure disrupt many systems provide greater reliability multiple smaller ups modules batteries integrated together provide redundant power protection equivalent one large ups n+1 means load supplied n modules installation contain n+1 modules way failure one module impact system operation many computer servers offer option redundant power supplies event one power supply failing one power supplies able power load critical point – power supply must able power entire server redundancy enhanced plugging power supply different circuit i.e different circuit breaker redundant protection extended yet connecting power supply ups provides double protection power supply failure ups failure continued operation assured configuration also referred 1+1 2n redundancy budget allow two identical ups units common practice plug one power supply mains power ups ups system placed outdoors specific features guarantee tolerate weather without effects performance factors temperature humidity rain snow among others considered manufacturer designing outdoor ups system operating temperature ranges outdoor ups systems could around −40 °c +55 °c outdoor ups systems either pole ground pedestal host mounted outdoor environment could mean extreme cold case outdoor ups system include battery heater mat extreme heat case outdoor ups system include fan system air conditioning system solar inverter pv inverter solar converter converts variable direct current dc output photovoltaic pv solar panel utility frequency alternating current ac fed commercial electrical grid used local off-grid electrical network critical bos–component photovoltaic system allowing use ordinary ac-powered equipment solar inverters special functions adapted use photovoltaic arrays including maximum power point tracking anti-islanding protection problem combination double-conversion ups generator voltage distortion created ups input double-conversion ups essentially big rectifier current drawn ups non-sinusoidal cause voltage ac mains generator also become non-sinusoidal voltage distortion cause problems electrical equipment connected power source including ups also cause power lost wiring supplying power ups due spikes current flow level noise measured percentage total harmonic distortion current thd classic ups rectifiers thd level around 25 –30 reduce voltage distortion requires heavier mains wiring generators twice large ups several solutions reduce thd double-conversion ups classic solutions passive filters reduce thd 5 –10 full load reliable big work full load present problems used tandem generators alternative solution active filter use device thd drop 5 full power range newest technology double-conversion ups units rectifier use classic rectifier components thyristors diodes uses high-frequency components instead double-conversion ups insulated-gate bipolar transistor rectifier inductor thd small 2 completely eliminates need oversize generator transformers without additional filters investment cost losses space power management pm requires basic computer-to-ups control methods intended one-to-one signaling single source single target example single ups may connect single computer provide status information ups allow computer control ups similarly usb protocol also intended connect single computer multiple peripheral devices situations useful single large ups able communicate several protected devices traditional serial usb control signal replication device may used example allows one ups connect five computers using serial usb connections however splitting typically one direction ups devices provide status information return control signals may permitted one protected systems ups ethernet increased common use since 1990s control signals commonly sent single ups multiple computers using standard ethernet data communication methods tcp/ip status control information typically encrypted example outside hacker gain control ups command shut distribution ups status control data requires intermediary devices ethernet switches serial multiplexers powered one ups systems order ups alerts reach target systems power outage avoid dependency ethernet infrastructure upss connected directly main control server using gsm/gprs channel also sms gprs data packets sent upss trigger software shut pcs reduce load three main types ups batteries valve regulated lead acid vrla flooded cell vla batteries lithium ion batteries run-time battery-operated ups depends type size batteries rate discharge efficiency inverter total capacity lead–acid battery function rate discharged described peukert law manufacturers supply run-time rating minutes packaged ups systems larger systems data centers require detailed calculation load inverter efficiency battery characteristics ensure required endurance attained lead–acid battery charged discharged initially affects reacting chemicals interface electrodes electrolyte time charge stored chemicals interface often called interface charge spreads diffusion chemicals throughout volume active material battery completely discharged e.g car lights left overnight next given fast charge minutes short charging time develops charge near interface battery voltage may rise close charger voltage charging current decreases significantly hours interface charge spread volume electrode electrolyte leading interface charge low may insufficient start car due interface charge brief ups self-test functions lasting seconds may accurately reflect true runtime capacity ups instead extended recalibration rundown test deeply discharges battery needed deep discharge testing damaging batteries due chemicals discharged battery starting crystallize highly stable molecular shapes re-dissolve battery recharged permanently reducing charge capacity lead acid batteries known sulfation also affects types nickel cadmium batteries lithium batteries therefore commonly recommended rundown tests performed infrequently every six months year multi-kilowatt commercial ups systems large easily accessible battery banks capable isolating testing individual cells within battery string consists either combined-cell battery units 12-v lead acid batteries individual chemical cells wired series isolating single cell installing jumper place allows one battery discharge-tested rest battery string remains charged available provide protection also possible measure electrical characteristics individual cells battery string using intermediate sensor wires installed every cell-to-cell junction monitored individually collectively battery strings may also wired series-parallel example two sets 20 cells situation also necessary monitor current flow parallel strings current may circulate strings balance effects weak cells dead cells high resistance shorted cells example stronger strings discharge weaker strings voltage imbalances equalized must factored individual inter-cell measurements within string battery strings wired series-parallel develop unusual failure modes due interactions multiple parallel strings defective batteries one string adversely affect operation lifespan good new batteries strings issues also apply situations series-parallel strings used ups systems also electric vehicle applications consider series-parallel battery arrangement good cells one becomes shorted dead way prevent subtle series-parallel string interactions using parallel strings using separate charge controllers inverters individual series strings even single string batteries wired series adverse interactions new batteries mixed old batteries older batteries tend reduced storage capacity discharge faster new batteries also charge maximum capacity rapidly new batteries mixed string new old batteries depleted string voltage drop old batteries exhausted new batteries still charge available newer cells may continue discharge rest string due low voltage energy flow may useful may wasted old cells resistance heating cells supposed operate within specific discharge window new cells capacity may cause old cells series string continue discharge beyond safe bottom limit discharge window damaging old cells recharged old cells recharge rapidly leading rapid rise voltage near fully charged state new cells capacity fully recharged charge controller detects high voltage nearly fully charged string reduces current flow new cells capacity charge slowly slowly chemicals may begin crystallize reaching fully charged state reducing new cell capacity several charge/discharge cycles capacity closely matches old cells series string reasons industrial ups management systems recommend periodic replacement entire battery arrays potentially using hundreds expensive batteries due damaging interactions new batteries old batteries within across series parallel strings | [
3511,
1254,
8061,
447,
6711,
5738,
2393,
5571,
2219,
4260,
2776,
6488,
4554,
6151,
271
] | Test |
2,255 | 8 | XAMPP:xampp xampp free open-source cross-platform web server solution stack package developed apache friends consisting mainly apache http server mariadb database interpreters scripts written php perl programming languages since actual web server deployments use components xampp makes transitioning local test server live server possible xampp ease deployment means wamp lamp stack installed quickly simply operating system developer advantage number common add-in applications wordpress joomla also installed similar ease using bitnami term xampp apparent acronym however official acronym expansion specified apache friends website homepage header reads xampp apache mariadb php perl indicating abbreviation recursive acronym term unofficially broken follows mysql replaced mariadb 2015-10-19 beginning xampp versions 5.5.30 5.6.14 effectively altering meaning acronym letters p de facto interchangeable convention used apache friends website indicates first letter p short php latter letter p short perl xampp requires one zip tar 7z exe file downloaded run little configuration various components make web server required windows version xampp requires microsoft visual c++ 2017 redistributable xampp regularly updated latest releases apache mariadb php perl also comes number modules including openssl phpmyadmin mediawiki joomla wordpress self-contained multiple instances xampp exist single computer given instance copied one computer another xampp offered full standard version smaller version obvious characteristic xampp ease wamp webserver stack deployed instantiated later common packaged applications could easily installed provided bitnami officially xampp designers intended use development tool allow website designers programmers test work computers without access internet make easy possible many important security features disabled default xampp ability serve web pages world wide web special tool provided password-protect important parts package xampp also provides support creating manipulating databases mariadb sqlite among others xampp installed possible treat localhost like remote host connecting using ftp client using program like filezilla many advantages installing content management system cms like joomla wordpress also possible connect localhost via ftp html editor | [
7148,
5983,
293,
3863,
5571,
6029,
933,
3652,
2054,
6661,
518,
6056,
3915,
6778,
84
] | Test |
2,256 | 9 | Tcllib:tcllib tcllib collection packages available tcl programming language tcllib distributed source code well pre-compiled binary formats tcllib supports variety common operating systems windows bsd unix linux tcllib includes implementations many common data structure algorithms linked list hash map tree graph | [
6671,
4759,
486,
1989,
578
] | Test |
2,257 | 3 | PowerPC_e200:powerpc e200 powerpc e200 family 32-bit power isa microprocessor cores developed freescale primary use automotive industrial control systems cores designed form cpu part system-on-a-chip soc designs speed ranging 600 mhz thus making ideal embedded applications e200 core developed mpc5xx family processors turn derived mpc8xx core powerquicc soc processors e200 adheres power isa v.2.03 well previous book e specification e200 core based microprocessors named mpc55xx mpc56xx/jpc56x scheme confused mpc52xx processors based powerpc e300 core april 2007 freescale ipextreme opened e200 cores licensing manufacturers continental ag freescale developing space tri-core e200 based processor designed electronic brake systems cars stmicroelectronics freescale jointly developed microcontrollers automotive applications based e200 mpc56xx/spc56x family e200 family consists six cores simple low-end complex high-end nature simplest core e200z0 features order four stage pipeline mmu cache fpu uses variable bit length vle part power isa uses 16-bit versions otherwise standard 32-bit powerpc book e isa thus reducing code footprint 30 single 32-bit amba 2.0v6 bus interface load/store unit pipelined 1-cycle load latency supports throughput one load store operation per cycle e200z0 used mpc5510 optional co-processor alongside e200z1 core making chip multicore processor e200z0 available co-processors e200 based processors well low end stand alone processors e200z1 four-stage single-issue pipeline branch prediction unit 8 entry mmu cache fpu use complete 32-bit powerpc isa well vle instructions uses dual 32-bit amba 2.0v6 bus interface load/store unit pipelined 1-cycle load latency supports throughput one load store operation per cycle e200z3 four-stage single-issue pipeline branch prediction unit 16 entry mmu simd capable fpu cache use complete 32-bit powerpc isa well vle instructions uses dual 64-bit amba 2.0v6 bus interface load/store unit pipelined 1-cycle load latency supports throughput one load store operation per cycle e200z4 five-stage dual-issue pipeline branch prediction unit 16 entry mmu signal processing extension spe simd capable single precision fpu 4 kilobyte 2/4-way set associative instruction l1 cache pseudo round-robin replacement algorithm data cache use complete 32-bit powerpc isa well vle instructions uses dual 64-bit bus amba 2.0v6 interface load/store unit pipelined 2-cycle load latency supports throughput one load store operation per cycle depending derivative may support spe lsp e200z6 seven-stage single-issue pipeline branch prediction unit 32 entry mmu signal processing extensions spe simd capable single-precision fpu 8-way set associative 32 kib unified data/instruction l1 cache use complete 32-bit powerpc isa well vle instructions uses single 64-bit bus amba 2.0v6 interface load/store unit pipelined 3-cycle load latency supports throughput one load store operation per cycle e200z7 ten-stage dual-issue pipeline branch prediction unit 32 entry mmu simd capable single-precision fpu 16-kb 4 way set-associative harvard instruction data l1 caches use complete 32-bit powerpc isa well vle instructions uses 32-bit bus amba 2.0v6 interface address bus 64-bit data bus plus attributes control bus load/store unit pipelined 3-cycle load latency supports throughput one load store operation per cycle depending derivative may support spe spe v1.1 spe v2 | [
5097,
2719,
3348,
4661,
3936,
1075,
1346,
4847,
4479,
2458,
3440,
5100,
1454,
1083,
4408,
5652,
912,
5737,
7361,
2845,
3708,
7453,
7905,
7990,
5665,
6111,
4702,
1199,
1386,
4336,
1388,
7654,
7099,
2133,
234,
2501,
239,
6474,
2781,
8125,
... | Validation |
2,258 | 8 | Dynamic_site_acceleration:dynamic site acceleration dynamic site acceleration dsa group technologies make delivery dynamic websites efficient manufacturers application delivery controllers content delivery networks cdns use host techniques accelerate dynamic sites including edge device either adc cdn capable tcp multiplexing placed web servers clients offload origin servers accelerate content delivery usually connection client server requires dedicated process lives origin duration connection clients slow connection occupies part origin server process stay alive server waiting complete request tcp multiplexing situation different device obtains complete valid request client sending origin request fully arrived offloads application database servers slower expensive use compared adcs cdns http built-in system cache control using headers etag expires last modified many cdns adcs claim dsa replaced system calling dynamic caching dynamic cache control gives options invalidate bypass cache standard http cache control purpose dynamic cache control increase cache-hit ratio website rate requests served cache served normal server due dynamic nature web 2.0 websites difficult use static web caching reason dynamic sites per definition personalized content different users regions example mobile users may see different content desktop users may see registered users may need see different content anonymous users see even among registered users content may vary widely often example social media websites static caching dynamic user-specific pages introduces potential risk serving irrelevant content 3rd party content wrong users identifier allowing caching system differentiate content url/get-request n't correctly varied appending user-specific tokens/keys dynamic cache control options configure caching cookie-based cache control allows serving content cache based presence lack specific cookies cookie stores unique identifier-key logged-in user device already implemented authenticating users upon execution page opens session dynamic caching system caches referred url well cookie keys allowing simply enable serving default caches anonymous users personalized caches logged-in users without forcing modify code make append additional user identifiers url like static caching system personalized content cached might queued edge device means system store list possible responses might needed future allowing readily served differs caching prefetched responses served especially useful accelerating responses third-party apis advertisements route optimization also known latency-based routing optimizes route traffic clients different origin servers order minimize latency route optimization done dns provider cdn route optimization comes measuring multiple paths client origin server recording fastest path path used serve content client specific geographical zone makes request although front-end optimization feo dsa describe group techniques improve online content delivery work different aspects overlaps on-the-fly data compression improved cache-control however key differences | [
7232,
40,
6689,
3383,
2117
] | Test |
2,259 | 1 | MySQL_Archive:mysql archive mysql archive storage engine mysql relational database management system users use analytic storage engine create table “ archive ” data deleted table added archive engine uses compression strategy based zlib library packs rows using bit header represent nulls removes whitespace character type fields completed row inserted compression buffer flushed disk explicit flush table read closing table one current restrictions archive tables support indexes thus necessitating table scan select tasks archive tables however supported mysql query cache dramatically reduce response times archive table queries repetitively issued mysql examining index support archive tables upcoming releases engine acid compliant unlike oltp engines uses stream format disk block boundaries head archive file generated byte array representing data format contents file mysql 5.1 copy mysql frm file stored header archive file frm file represents definition table allows archive file restored mysql server archive file copied server despite use zlib archive files compatible gzio basis gzip tools uses azio system fork gzio archive differs mysql analytical engine myisam row level locking engine keeping constant version snapshot throughout single query making mvcc means archive lock concurrent bulk inserts bulk inserts performs interlaced insert unlike myisam order guaranteed users use archive_reader tool take online snapshot table change characteristics archive file create archive table specify following engine string mysql archive storage engine authored maintained brian aker introduced 2004 mysql 4.1 | [
7957,
5717,
1359,
5126,
5571,
6279,
4708,
5055,
4167,
3652,
3219,
6755,
4363,
5780,
6056,
1695,
3915,
3244,
971,
7598,
1435
] | Test |
2,260 | 2 | Jeff_Waugh:jeff waugh jeff waugh also known jdub australian free software open source software engineer known past prominence gnome ubuntu projects communities 2004 waugh hired mark shuttleworth early employee canonical ltd. member ubuntu project worked business development oscon 2005 waugh best evangelist google-o'reilly open source awards evangelism ubuntu gnome announced resignation canonical july 2006 focus fully work gnome project 2007 waugh then-wife pia waugh co-directors waugh partners australian open source consultancy launched 2006 waugh partners 2007 nsw state pearcey award young achievers work promoting free software australian ict industry 2008 waugh partner one laptop per child australia program 2008 pia waugh moved new career waugh later employers included bulletproof networks kounta waugh served number formal semi-formal positions free software development community projects waugh author python feed aggregator planet waugh married fellow open-source advocate community leader pia waugh 2011 wrote blog september 2011 occasion ruok day struggling depression since late teens contributing factor divorce felt overcome category living people category open source people category free software programmers category year birth missing living people category australian computer specialists category gnome developers category ubuntu operating system people category people sydney category australian bloggers | [
3938,
7159,
1822,
4685,
2585,
5759,
7559,
412,
7959,
462,
4401,
5829,
2297,
1192,
499,
4435,
2689,
3404,
5523,
6951,
3084,
2728,
1267,
3780,
578,
7740,
589,
3133,
4187,
5965,
3152,
966,
2074,
968,
8149,
2091,
7429,
1351,
8169,
642,
5292... | Test |
2,261 | 5 | Wide_area_information_server:wide area information server wide area information server wais client–server text searching system uses ansi standard z39.50 information retrieval service definition protocol specifications library applications z39.50:1988 search index databases remote computers developed late 1980s project thinking machines apple computer dow jones kpmg peat marwick wais adhere either standard osi framework adopting instead tcp/ip created unique protocol inspired z39.50:1988 wais protocol servers promoted thinking machines corporation tmc cambridge massachusetts tmc-produced wais servers ran massively parallel cm-2 connection machine sparc-based cm-5 mp supercomputers wais clients developed various operating systems windowing systems including microsoft windows macintosh next x gnu emacs character terminals tmc released free open source software version wais unix 1991 inspired wais project full-text databases emerging sgml projects z39.50 version 2 z39.50:1992 released unlike 1988 predecessor compatible superset international iso 10162/10163 standard advent z39.50:1992 termination support free wais thinking machines establishment wais inc commercial venture u.s. national science foundation funded clearinghouse networked information discovery retrieval cnidr promote internet search discovery systems open source standards cnidr created new free open-source wais first freewais based wais-8-b5 codebase tmc wholly new software suite isite based upon z39.50:1992 using isearch full-text search engine ulrich pfeifer norbert gövert computer science department university dortmund extended cnidr freewais code become freewais-sf structured fields main improvement ulrich pfeifer rewrote freewais-sf perl becoming wait inspired wais directory servers eliot christian usgs envisioned gils government information locator service gils based upon z39.50:1992 extensions became u.s. federal mandate part paperwork reduction act 1995 thinking machines corp provided service called directory servers wais server like information source except containing information wais servers internet wais server tmc wais code creates special record containing metadata plus common words describing indexed content record uploaded central server indexed along records public servers directory searched find servers might content relevant specific field interest model searching wais servers search became model gils peter deutsch whois++ distributed white pages directory two developers wais brewster kahle harry morris left thinking machines found wais inc menlo park california bruce gilliat wais inc. originally joint project apple computer peat markwick dow jones thinking machines 1992 presidential campaign ross perot used wais product campaign wide information system connecting field offices national office later perot systems adopted wais better access information corporate databases early clients environmental protection agency library congress department energy later wall street journal encyclopædia britannica wais inc sold aol may 1995 15 million following sale margaret st. pierre left wais inc start blue angel technologies wais variant formed basis metastar georgios papadopoulos left found atypon françois schiettecatte left human genome project johns hopkins hospital started fs-consult developed variant wais eventually became scienceserver later sold elsevier science kahle gilliat went found internet archive alexa internet public wais often used full-text search engine individual internet gopher servers supplementing popular veronica system searches menu titles gopher sites wais gopher share world wide web client–server architecture certain amount functionality wais protocol influenced largely z39.50 protocol designed networking library catalogs allows text-based search retrieval following search gopher provides free text search mechanism principally uses menus menu list titles user may pick one gopher space web containing many loops menu system gives user impression tree web data model similar gopher model except menus generalized hypertext documents cases simple file servers generate menus hypertext directly file structure server web hypertext model permits author freedom communicate options available reader include headings various forms list structure | [
4655,
7148,
5983,
5542,
2819,
98,
4759,
2281,
6802,
7168,
7628,
20,
2205,
7537,
4415,
5571,
6905,
3291,
3383,
3548,
6024,
7094,
1023,
7015,
7198,
7016,
2054,
3043,
84,
4351,
4352,
518,
7494,
7765,
3827,
348,
5612,
1057,
80,
5887,
971,
... | Train |
2,262 | 4 | Gamma_Group:gamma group gamma group anglo-german technology company sells surveillance software governments police forces around world company strongly criticised human rights organisations selling finfisher software undemocratic regimes egypt bahrain following arab spring protests 2011 activists bahrain identified suspicious emails identified social engineering attempts persuade launch applications containing malicious software emails passed analysts identified malware would give finfisher access infected computers university toronto citizenlab conducted investigation gamma identified 33 likely government users finfisher 32 countries based presence finfisher master ip address country belonging specific government department 2014 gamma group hacked 40 gb dump information released detailing gamma 'client lists price lists source code details effectiveness finfisher malware user support documentation list classes/tutorials much details gamma capabilities found surveillance industry index despite hack extent negative publicity gamma activities finfisher reported gaining popularity around world numerous governments | [
5955,
803,
3047
] | Test |
2,263 | 3 | MP6:mp6 rise mp6 superpipelined superscalar microprocessor designed rise technology compete intel pentium line rise technology spent 5 years developing x86 compatible microprocessor finally introduced november 1998 low-cost low-power alternative super socket 7 platform allowed higher front-side bus speeds previous socket 7 made possible cpu manufacturers keep competing intel moved slot 1 platform mp6 made use mmx instruction set three mmx pipelines allowed cpu execute three mmx instructions single cycle three integer units made possible execute three integer instructions single cycle well fully pipelined floating point unit could execute two floating-point instructions per cycle improve performance core utilized branch prediction number techniques resolve data dependency conflicts according rise mp6 perform almost fast intel pentium ii frequencies despite innovative features real-life performance mp6 proved disappointing mainly due small l1 cache another reason rise mp6 pr 266 rating based upon old intel pentium mmx main competitors intel celeron 266 idt winchip 2-266 amd k6-2 266 delivered performance benchmarks applications celeron k6-2 actually worked 266 mhz winchip 2 pr rating based upon performance amd opponent announced 1998 chip never achieved widespread use rise quietly exited market december following year like competitors cyrix idt rise found unable compete intel amd silicon integrated systems sis licensed mp6 technology used sis 550 system-on-a-chip soc integrated mp6 cpu north south bridges sound video single chip sis 550 saw use compact pcs consumer devices dvd players sis 551 chip also marketed dm p vortex86 m6127d later dm p took mp6 design sis continues development vortex86 soc product line dm p signed agreement xcore allow rebrand chip xcore86 | [
3576,
2541,
4212,
5737,
7280,
866,
1162,
7499,
1237,
352,
6170,
2685,
3002,
5669
] | Test |
2,264 | 1 | VxInsight:vxinsight vxinsight knowledge mining tool developed sandia national laboratories institute scientific information allows user visualize relationship groups objects large databases 3d landscape hillier et al call pioneering study vxinsight used analyze gene expression i.e microarray data across number conditions c. elegans using vxinsight kim et al able cluster genes mounts coherent functions also able make novel observations finding distinct classes transposons tc3 mariner transposons appear differentially regulated development | [] | Validation |
2,265 | 1 | In-database_processing:in-database processing in-database processing sometimes referred in-database analytics refers integration data analytics data warehousing functionality today many large databases used credit card fraud detection investment bank risk management use technology provides significant performance improvements traditional methods traditional approaches data analysis require data moved database separate analytics environment processing back database spss ibm examples tools still today analysis database data resides eliminates costs time security issues associated old approach processing data warehouse though in-database capabilities first commercially offered mid-1990s object-related database systems vendors including ibm illustra/informix ibm oracle technology begin catch mid-2000s concept migrating analytics analytical workstation enterprise data warehouse first introduced thomas tileston presentation entitled “ cake eat accelerate data mining combining sas teradata ” teradata partners 2005 experience possibilities conference orlando fl september 18–22 2005 mr. tileston later presented technique globally 2006 2007 2008 point need in-database processing become pressing amount data available collect analyze continues grow exponentially due largely rise internet megabytes gigabytes terabytes petabytes “ big data ” one primary reasons become important collect process analyze data efficiently accurately also speed business accelerated point performance gain nanoseconds make difference industries additionally people industries use data answer important questions questions ask become complex demanding sophisticated tools precise results factors combination created need in-database processing introduction column-oriented database specifically designed analytics data warehousing reporting helped make technology possible three main types in-database processing translating model sql code loading c c++ libraries database process space built-in user-defined function udf out-of-process libraries typically written c c++ java registering database built-in udfs sql statement type in-database processing predictive model converted source language sql run database usually stored procedure many analytic model-building tools ability export models either sql pmml predictive modeling markup language sql loaded stored procedure values passed parameters model executed natively database tools use approach include sas spss r kxen c c++ udf libraries run process functions typically registered built-in functions within database server called like built-in function sql statement running process allows function full access database server ’ memory parallelism processing management capabilities functions must well-behaved negatively impact database engine type udf gives highest performance method olap mathematical statistical univariate distributions data mining algorithms out-of-process udfs typically written c c++ java running process run risk database engine run process space resources ’ expected performance in-process udf still typically registered database engine called standard sql usually stored procedure out-of-process udfs safe way extend capabilities database server ideal way add custom data mining libraries in-database processing makes data analysis accessible relevant high-throughput real-time applications including fraud detection credit scoring risk management transaction processing pricing margin analysis usage-based micro-segmenting behavioral ad targeting recommendation engines used customer service organizations determine next-best actions in-database processing performed promoted feature many major data warehousing vendors including teradata aster data systems acquired ibm netezza puredata systems db2 warehouse products iemc greenplum sybase paraccel sas exasol products offered vendors cwi monetdb ibm db2 warehouse offer users means write functions udfs extensions udxs enhance products capabilities fuzzy logix offers libraries in-database models used mathematical statistical data mining simulation classification modelling well financial models equity fixed income interest rate portfolio optimization in-database pioneers collaborates marketing teams institutionalize data mining analytic processes inside data warehouse fast reliable customizable consumer-behavior predictive analytics in-database processing one several technologies focused improving data warehousing performance others include parallel computing shared everything architectures shared nothing architectures massive parallel processing important step towards improving predictive analytics capabilities | [
1905,
3928,
6507,
3166,
1449,
2911,
5209,
7248,
1730,
3951,
3776,
3011,
4950,
4463,
6543,
6364,
2124,
4798,
7999,
4252,
6462,
3807,
7017,
1768,
3396,
2054,
7205,
5419,
684,
5424,
5338,
5778,
7303,
1600,
4274,
1891,
4457,
1792,
784,
360
] | Test |
2,266 | 2 | Preemption_(computing):preemption computing computing preemption act temporarily interrupting task carried computer system without requiring cooperation intention resuming task later time changes executed task known context switches normally carried privileged task part system known preemptive scheduler power preempt interrupt later resume tasks system given system design operations performed system may preemptible usually applies kernel functions service interrupts permitted run completion would tend produce race conditions resulting deadlock barring scheduler preempting tasks processing kernel functions simplifies kernel design expense system responsiveness distinction user mode kernel mode determines privilege level within system may also used distinguish whether task currently preemptible modern systems preemptive kernels designed permit tasks preempted even kernel mode examples systems solaris 2.0/sunos 5.0 windows nt linux kernel 2.6.x newer aix bsd systems netbsd since version 5 term preemptive multitasking used distinguish multitasking operating system permits preemption tasks cooperative multitasking system wherein processes tasks must explicitly programmed yield need system resources simple terms preemptive multitasking involves use interrupt mechanism suspends currently executing process invokes scheduler determine process execute next therefore processes get amount cpu time given time preemptive multitasking operating system kernel also initiate context switch satisfy scheduling policy priority constraint thus preempting active task general preemption means prior seizure high priority task instance seizes currently running task known preemptive scheduling term preemptive multitasking sometimes mistakenly used intended meaning specific referring instead class scheduling policies known time-shared scheduling time-sharing preemptive multitasking allows computer system reliably guarantee process regular slice operating time also allows system rapidly deal important external events like incoming data might require immediate attention one another process specific time processes grouped two categories waiting input output called i/o bound fully utilizing cpu cpu bound early systems processes would often poll busywait waiting requested input disk keyboard network input time process performing useful work still maintained complete control cpu advent interrupts preemptive multitasking i/o bound processes could blocked put hold pending arrival necessary data allowing processes utilize cpu arrival requested data would generate interrupt blocked processes could guaranteed timely return execution although multitasking techniques originally developed allow multiple users share single machine soon became apparent multitasking useful regardless number users many operating systems mainframes single-user personal computers no-user control systems like robotic spacecraft recognized usefulness multitasking support variety reasons multitasking makes possible single user run multiple applications time run background processes retaining control computer period time process allowed run preemptive multitasking system generally called time slice quantum scheduler run every time slice choose next process run length time slice critical balancing system performance vs process responsiveness time slice short scheduler consume much processing time time slice long processes take longer respond input interrupt scheduled allow operating system kernel switch processes time slices expire effectively allowing processor time shared number tasks giving illusion dealing tasks parallel simultaneously operating system controls design called multi-tasking system today nearly operating systems support preemptive multitasking including current versions windows macos linux including android ios earliest operating systems available home users featuring preemptive multitasking sinclair qdos 1984 amiga os 1985 ran motorola 68000-family microprocessors without memory management amiga os used dynamic loading relocatable code blocks hunks amiga jargon multitask preemptively processes flat address space early pc operating systems ms-dos pc dos support multitasking however alternative operating systems mp/m-86 1981 concurrent cp/m-86 support preemptive multitasking unix-like systems including minix coherent provided preemptive multitasking 1980s-era personal computers later dos versions natively supporting preemptive multitasking/multithreading include concurrent dos multiuser dos novell dos later called caldera opendos dr-dos 7.02 higher since concurrent dos 386 could also run multiple dos programs concurrently virtual dos machines earliest version windows support limited form preemptive multitasking windows 2.1x used intel 80386 virtual 8086 mode run dos applications virtual 8086 machines commonly known dos boxes could preempted windows 95 98 32-bit applications made preemptive running one separate address space 16-bit applications remained cooperative backward compatibility windows 3.1x protected mode kernel virtual device drivers ran preemptively 16-bit applications non-preemptive shared address space preemptive multitasking always supported windows nt versions os/2 native applications unix unix-like systems linux bsd macos vms os/360 many operating systems designed use academic medium-to-large business markets although plans upgrade cooperative multitasking found classic mac os preemptive model preemptive api exist mac os 9 although limited sense abandoned favor mac os x called macos hybrid old mac system style nextstep operating system based mach kernel derived part bsd always provided unix-like preemptive multitasking | [
1807,
2539,
5012,
4297,
4670,
5021,
5371,
3948,
13,
3271,
7529,
3276,
2204,
3626,
5737,
4318,
5041,
5042,
7546,
7550,
405,
1481,
1855,
5055,
2226,
4347,
1867,
1495,
65,
2961,
5079,
6849,
2248,
3667,
4733,
5783,
6853,
2969,
2970,
6148,
5... | Test |
2,267 | 1 | Jordan_Antiquities_Database_and_Information_System:jordan antiquities database information system jordan antiquities database information system jadis computer database antiquities jordan first kind arab world established department antiquities 1990 cooperation american center oriental research amman sponsored united states agency international development jadis use 2002 superseded new system mega-j 10,841 antiquities registered database | [
2054
] | Train |
2,268 | 4 | ThunderByte_Antivirus:thunderbyte antivirus thunderbyte anti-virus tbav early antivirus software product created dutchman frans veldman 1988 published company esass b.v mainly designed dos also versions supporting microsoft windows tbav known fast scan speed heuristics-based scanner codice_1 files tracking known-good file information originally thunderbyte used dedicated isa card provide protection operating system even loaded later software-only product released soon displaced hardware offering distributed shareware 1998 tbav sold norman asa discontinued thunderbyte product | [
4759,
5571,
3755,
7809
] | Test |
2,269 | 7 | EKool:ekool ekool school management system used estonia covering 90 nation school network connecting pupils parents teachers involved estimated application used 28-30 estonians total name ekool means eschool estonian system usable teachers pupils parents exchange information time tables grades homework assignments similar features ekool created 2002 look world foundation cooperation companies private sector originally designed meet requirements four test schools rocca al mare school jüri gymnasium kuresaare gymnasium tallinn arte gymnasium since grown cover 90 estonian school network ekool started 2002 replace printed school diaries digital journals would enable parents students see grades homework assignments online pilot project launched specifications 4 schools rocca al mare school jüri gymnasium kuressaare gymnaasium tallinn arte gymnasium initial look world program ended 2005 turned private company koolitööde next years ekool mostly expanded estonian school system reaching 420 schools 2012 since 2014 ekool also supported mobile application allows students parents access information mobile phones however schools teachers still need use computer ekool accessed combination user-name password estonian id-card estonian mobile-id smart-id online bank identification ekool used various interest groups school personnel students parents extent local government overseeing school one user account person access functionalities different user groups user belongs schools personnel carries data entry process ekool latter used parties right access information among information schools provide parents students access information keep date side make easy school collect contact information parents students enter keep ekool updated using | [] | Test |
2,270 | 3 | Volta_(microarchitecture):volta microarchitecture volta codename gpu microarchitecture developed nvidia succeeding pascal first announced roadmap march 2013 however first product announced may 2017 architecture named 18th 19th century italian chemist physicist alessandro volta nvidia first chip feature tensor cores specially designed cores superior deep learning performance regular cuda cores architecture produced tsmc 12 nm finfet process first graphics card use datacentre tesla v100 e.g part nvidia dgx-1 system also used quadro gv100 titan v. mainstream geforce graphics cards based volta volta succeeded turing architecture architectural improvements volta architecture include following volta announced gpu microarchitecture within xavier generation tegra soc focusing self-driving cars nvidia annual gpu technology conference keynote 10th may 2017 nvidia officially announced volta microarchitecture along tesla v100 volta gv100 gpu built 12 nm process size using hbm2 memory 900 gb/s bandwidth nvidia officially announced nvidia titan v december 7 2017 nvidia officially announced quadro gv100 march 27 2018 volta also reported included summit sierra supercomputers used gpgpu compute volta gpus connect power9 cpus via nvlink 2.0 expected support cache coherency therefore improve gpgpu performance | [
2538,
6610,
7442,
1640,
4954,
7912,
5939,
1864,
8125,
1595,
8141,
1237,
4833,
2080
] | Validation |
2,271 | 2 | Nokia_E72:nokia e72 nokia e72 smartphone nokia eseries range manufactured finland nokia e72 announced june 15 2009 nokia connections 2009 event singapore successor nokia e71 based similar design form factor offers similar feature set nokia e72 business-oriented phone eseries devices standard features including mobile email calendar instant messaging among many others symbian-based s60 3rd edition feature pack 2 operating system nokia e72 new optical navi key feature addition standard d-pad used many nokia devices including nokia e71 – said improve ease scrolling menus emails internet browser images optical sensor addition series closely spaced buttons comparison predecessor nokia e72 said higher level performance likely due faster 600 mhz arm processor also includes 5-megapixel auto focusing camera changes improvements software-based including changes user interface built-in messaging application among others nokia e73 mode usa feature phone t-mobile usa support t-mobile uma service band iv support 3g different piece hardware internally e72 current firmware device 91.004 published 2 june 2012 check current firmware one may dial 0000 vertu constellation quest 2010 based e72 design | [
1066,
5979,
6517,
372,
1724,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
8072,
2922,
4407,
118,
23,
2564,
3703,
7261,
7545,
5044,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
6465,
5062,
3039,
3653,
1582,
4894,
5068,
597,
7393... | Test |
2,272 | 2 | Henry_Spencer:henry spencer henry spencer born 1955 canadian computer programmer space enthusiast wrote regex widely used software library regular expressions co-wrote c news usenet server program also wrote ten commandments c programmers coauthor david lawrence book managing usenet working university toronto ran first active usenet site outside u.s. starting 1981 records period eventually acquired google provide archive usenet 1980s first international usenet site run ottawa 1981 however generally remembered served merely read-only medium later 1981 spencer acquired usenet feed duke university brought utzoo online earliest public archives usenet date may 1981 result small size usenet youthful days spencer early involvement made well-recognised participant commemorated vernor vinge 1992 novel fire upon deep novel featured interstellar communications medium remarkably similar usenet author including spurious message headers one characters appeared solely postings modeled spencer slightly obliquely named also credited claim understand unix condemned reinvent poorly mid-december 2001 google unveiled improved usenet archives go decade deeper internet past millions posts company originally acquired bought existing archive called deja news 1981 1991 running zoology department computer system university toronto spencer copied 2 million usenet messages onto magnetic tapes 141 tapes wound university western ontario google michael schmidt tracked help david wiseman others got transferred onto disks google archives henry spencer helped geoff collyer write c news 1987 around time wrote non-proprietary replacement codice_1 unix library handling regular expressions made freely available api followed eighth edition research unix spencer library used many software packages including tcl mysql postgresql well adapted others including early versions perl circa 1993 spencer donated second version library 4.4bsd following posix standard regular expressions spencer technical lead frees/wan project implementing ipsec cryptographic protocol stack linux also wrote 'aaa amazing awk assembler one longest complex programs ever written awk programming language also developed 4 point font used entomologists labeling pinned insect specimens spencer founding member canadian space society served board directors several times since 1984 mission analysis planning launch orbits css canadian solar sail project defunct software architect canadian science microsatellite dedicated studying variable light stars extrasolar planets launched eurockot 2003 asteroid 117329 spencer named honour highly regarded space enthusiast familiar respected presence several space forums usenet internet 1983 2007 spencer posted 34,000 messages sci.space newsgroups knowledge space history technology corrected henry spencer virtual t-shirt award created reward anyone catch error fact | [
4447,
361,
6003,
5983,
5157,
1989,
486,
2379,
578,
5956,
1435,
2644,
6367
] | Test |
2,273 | 4 | Bill_Woodcock:bill woodcock bill woodcock born august 16 1971 san francisco california united states executive director packet clearing house non-profit research institute dedicated understanding supporting internet traffic exchange technology policy economics bill entered field internet routing research 1989 serving network architect operations director international multiprotocol service-provision backbone network 1993 1994 woodcock one founders packet clearing house served current post executive director since 1997 time woodcock directly participated establishment three hundred public internet exchange points europe africa asia americas continues serve boards provide ongoing technical policy advice many institutions 1998 woodcock j.d falk model spam regulation became first anti-spam legislation world california law 17538.4 paved way jurisdictions woodcock successfully concluded telecommunications regulatory reform efforts several african countries woodcock director roles four companies areas satellite communications content distribution domain name service technology 2001 woodcock co-authored chuck goolsbee chuck woody fiendishly difficult mac-mgrs trivia quiz annual gathering member macintosh managers mailing list san francisco macworld expo date 50 questions remain unanswered twenty years together richard ford initially brita meng hosted annual inaptly named a/ux user group dinner conjunction mactivity macworld meetings woodcock current former packet clearing house representative afrinic apnic arin iepg isoc isp/c lacnic natoa ripe bill woodcock regular speaker afnog apia apnic apricot arin isoc ripe iepg ietf sanog nanog meetings served program committees nanog sanog pam apricot woodcock one estonia computer attacks unleashed bronze soldier tallinn incident assisted defense coordinated hillar aarelaid cert-ee wake itu december 2012 world conference international telecommunications characterized attempted take-over institutions internet governance woodcock published number secret itu budget documents acted point-person effort redirect usd 11m u.s. government funds itu contributions support multistakeholder model internet governance effort centered people petition web site received much favorable attention press internet governance community woodcock published work includes many pch white-papers 1993 mcgraw-hill book networking macintosh report anf appletalk tunneling architectures working group chaired 1993 1994 many articles network world macworld macweek connections networking journals periodicals addition principal author multicast dns ip anycast operator requirements infrastructure management methods ietf drafts early 1990s pioneered igp egp-based topological load-balancing techniques using ip anycast technology together mark kosters proposed 1996 montreal iepg root dns servers migrated ip anycast work provided basis upon root dns servers deployed since late 1990s 2010 2011 rick lamb previously built signing system places dnssec cryptographic signatures dns root zone woodcock built first global-scale fips 140-2 level 4 dnssec signing infrastructure locations singapore zurich san jose addition protocol development work woodcock developed networking products cisco agilent farallon | [
2307,
6756
] | Test |
2,274 | 1 | World_Database_of_Happiness:world database happiness world database happiness web-based archive research findings subjective appreciation life database contains overview scientific publications happiness digest research findings database contains information happy people wide range circumstances 165 different nations happiness defined degree individual judges quality life whole favorably two 'components happiness distinguished hedonic level affect degree pleasant affect dominates contentment perceived realization wants world database happiness tool acquire overview ever-growing stream research findings happiness accumulation knowledge stagnates scientists capitalize earlier research investments medio 2013 database covered 19,000 scientific findings happiness 6000 distributional findings happy people another 13,000 correlational findings associated less happiness first findings date 1915 world database happiness often used popular media make lists happiest countries around globe example happy planet index aims chart sustainable happiness world combining data longevity happiness size ecological footprint citizens database clear conceptual focus includes research findings subjective enjoyment one ’ life whole thereby evades babel haunted study happiness ages side coin much interesting research left findings reported technical details measurement statistical analysis detail welcomed scholars makes information difficult digest lay-persons still another limitation available findings often contradictory makes hard draw firm conclusions causes happiness clear poor health separation unemployment lack social contact strongly negatively associated unhappiness another problem world database happiness number studies happiness increases high rate gets increasingly difficult offer complete overview research findings | [] | Validation |
2,275 | 7 | Unigine:unigine unigine proprietary cross-platform game engine developed russian software company unigine corp. apart use game engine mainly used enterprise area simulators virtual reality systems serious games visualization distinguishing feature unigine support large open worlds planet scale also advanced 3d renderer currently supports opengl 4 directx 11 updated unigine sdk released 3 months unigine engine also core technology lineup benchmarks cpu gpu power supply cooling system used overclockers technical media tom hardware linus tech tips pc gamer others unigine benchmarks also included part phoronix test suite benchmarking purposes linux systems first public release 0.3 version may 4 2005 unigine engine created scratch based engine last update released july 7 2014 initially started microsoft windows linux support platforms added later os x playstation 3 android ios experimental support webgl included official sdk unigine 1 support several graphical apis directx 9 directx 10 directx 11 opengl opengl es playstation 3 initial versions v0.3x opengl support 3 apis developers c++ c uniginescript proprietary scripting language similar с++ syntax custom shaders written glsl hlsl languages unigine 1 several features required professional simulators enterprise vr systems mostly support large virtual scenarios specific hardware often called serious games support large virtual worlds implemented via double precision coordinates 64-bit per axis zone-based background data streaming optional operations geographic coordinate system latitude longitude elevation instead x z video output sophisticated displays implemented via so-called multi-channel rendering network-synchronized image generation single large image several computers standard approach professional simulators system enabled support multiple output devices asymmetric projections e.g cave curved screens multiple projectors requiring image warping edge blending also supported also various types stereoscopic 3d output supported anaglyph separate images output nvidia 3d vision well vr hmd support oculus rift unigine 1 also supported multi-monitor output video-walls unigine renderer supports shader model 5.0 hardware tessellation directcompute well opencl together set post-processes including screen space ambient occlusion ssao real-time global illumination set built-in high-level objects like terrain grass water clouds unigine uses proprietary physics engine collision detection rigid body physics dynamical destruction objects rag doll cloth fluid buoyancy force fields time reverse pathfinding also implemented proprietary engine together basic ai components spatial triggers callbacks features includes interactive 3d gui video playback using theora codec 3d audio system based openal library wysiwyg scene editor unigineeditor originally released october 10 2015 unigine 2 features unigine 1 focus simulators enterprise use main differences transition forward rendering deferred rendering approach pbr shading introduction several new graphical technologies like geometry water multi-layered volumetric clouds ssrtgi voxel-based lighting introduction c api supported platforms microsoft windows linux os x support stopped starting 2.6 version unigine 2 supports following graphical apis directx 11 opengl 4.x 3 apis developers c++ c uniginescript supported shader languages hlsl glsl uusl unified unigine shader language proprietary ssrtgi screen space ray-traced global illumination rendering technology introduced 2.5 version presented siggraph 2017 real-time live event roots unigine frustum.org open source project initiated 2002 alexander frustum zaprjagaev co-founder along denis shergin ceo ex-cto unigine corp name unigine means universal engine unique engine november 25 2010 unigine corp announced competition support linux game development agreed give away free license unigine engine anyone willing develop release game linux native client would also grant team windows license competition ran december 10 2010 considerable number entries submitted due unexpected response unigine decided extend offer three best applicants getting full unigine licenses winners announced december 13 2010 developers selected kot-in-action creative artel previously developed steel storm gamepulp intend make puzzle platformer med-art previously worked 2019 company claimed 200 b2b customers worldwide primarily use unigine military virtual reality projects several notable projects include graphical benchmarks cad systems unigine engine used platform series benchmarks used determine stability pc hardware cpu gpu power supply cooling system extremely stressful conditions well overclocking | [
1659,
5897,
2002,
7898,
3915,
4759,
3063,
4833,
1606,
578,
6759,
8195,
4130,
3571,
2085
] | Test |
2,276 | 3 | Interrupt_coalescing:interrupt coalescing interrupt coalescing also known interrupt moderation technique events would normally trigger hardware interrupt held back either certain amount work pending timeout timer triggers used correctly technique reduce interrupt load order magnitude incurring relatively small latency penalties interrupt coalescing typically combined either hardware fifo direct memory access allow continued data throughput interrupts held back interrupt coalescing common feature modern network cards technique dates back early computer uarts 16550 uart chip used ibm pc serial interface time even servicing interrupt rates required low data rate serial data streams day taxing contemporary cpus interrupt coalescing also implemented without support hardware disabling interrupts interrupt controller using timer-based polling | [
2141,
2572
] | Test |
2,277 | 9 | Hash_consing:hash consing computer science particularly functional programming hash consing technique used share values structurally equal term hash consing originates implementations lisp attempt reuse cons cells constructed avoiding penalty memory allocation hash consing commonly implemented hash tables storing weak references may garbage-collected data stored therein contains references outside table hash consing shown give dramatic performance improvements—both space time—for symbolic dynamic programming algorithms interesting property hash consing two structures tested equality constant time turn improve efficiency divide conquer algorithms data sets contain overlapping blocks simple efficient suitable demonstration concept implementation memoizer means hash table weak references scheme | [
1616,
7032,
4543,
8174,
379
] | Test |
2,278 | 4 | HP_Data_Protector:hp data protector hp data protector software automated backup recovery software single-server enterprise environments supporting disk storage tape storage targets provides cross-platform online backup data microsoft windows unix linux operating systems business- mission-critical applications hp data protector zero downtime backup leverages array-based solutions offload processing server perform backup operations copy production data hp data protector instant recovery retrieves data replicated images disk recovery specific points time hp data protector originated omniback last version use omniback name version 4.1 retired 2004 hewlett-packard acquired apollo computer 1989 latter already developed backup system entitled omniback network backup system available market time hp continued develop product omniback name purpose backing individual files raw disk partitions related distinct product omniback/turbo developed backing databases 1996 hp released omniback ii 2.0 merged omniback ii omniback/turbo single product although still impossible create single job would contain database file system backup windows nt port released version 2.3 version 2.55 released 1997 included support hp-ux ibm aix interim hewlett-packard withdrew development slovenia germany significant time spent delivering version 3.5.2 solaris complete however allowed quick ports tru64 linux version 5.0 omniback name dropped since product called hp openview storage data protector hp storageworks data protector product called hp data protector software hp announced release hp data protector 9.0 part adaptive backup recovery initiative may 2014 released july 2014 released july 2014 along two companion products hp data protector management pack hp backup navigator hp data protector architecture based concept cell network environment contains cell manager clients backup devices cell manager main system centrally controls manages cell contains database runs core software runs backup restore sessions writing session information database client system within cell clients backed require installation disk agent clients control backup restore data require installation media agent multi-site operations data protector manager managers mom allows local administrators control data backup restore providing centralized enterprise monitoring media management configuration multiple data protector cells grouped configured managed mom hp data protector offers data deduplication capabilities ability compare blocks data written backup device data blocks previously stored device data deduplication hp data protector allows disk-based data storage target storage tape drives used deduplication targets sequential nature opposed block-oriented nature disk-devices hp data protector supports backup restore virtual servers including protection whole virtual machine application data supported virtual environments include vmware windows 2008 hyper-v limited microsoft virtual server 2005 hp integrity virtual machines citrix xenserver support longer officially provided hp data protector includes automated key management software linear tape-open lto-4 encryption users choice client-based encryption data security use encryption functionality lto-4 later generation tape drives november 2009 hp began offering hp data protector notebook extension hp data protector notebook extension enables users back recover data working remotely offline hp data protector notebook extension data captured backed automatically time user changes creates receives file processes transparent user impact laptop desktop performance data stored temporarily local repository pending transfer network data vault full backup restore capabilities key features include end-user single-click recovery encryption compression techniques granular recovery extensions components sit inside applications provide operator application way triggering large restore selecting individual items need restored without requiring assistance backup administrator example vmware granular recovery extension appears extra item vsphere console vcenter lets vmware administrator restore vmdk file finally provides interface selecting files vmdk file sharepoint gre allows microsoft sharepoint administrators recover single document collection folder directly via sharepoint gui granular recovery sharepoint 2010 introduced version 7.0 | [
3764,
4295,
4759,
900,
5735,
2390,
5571,
578,
3882,
5060,
1581,
7759,
1134,
4736,
4018
] | Test |
2,279 | 4 | Turnstile:turnstile turnstile also called baffle gate turnstyle form gate allows one person pass time also made enforce one-way traffic people addition restrict passage people insert coin ticket pass similar thus turnstile used case paid access sometimes called faregate ticket barrier used purpose example access public transport pay toilet restrict access authorized people example lobby office building turnstiles originally used like forms stile allow human beings pass keeping sheep livestock penned use turnstiles modern applications credited clarence saunders used first piggly wiggly store turnstiles used wide variety settings including stadiums amusement parks mass transit stations office lobbies airports ski resorts factories power plants casinos business/revenue standpoint turnstiles give accurate verifiable count attendance security standpoint lead patrons enter single-file security personnel clear view patron enables security efficiently isolate potential trouble confiscate prohibited materials hand physical barriers become serious safety issue speedy evacuation needed requiring emergency exits bypass turnstiles persons disabilities may difficulties using turnstiles cases generally wide aisle gate manual gate may provided locations luggage expected line turnstiles may entirely formed wide aisle gates example heathrow terminals 2 3 underground station turnstiles often use ratchet mechanisms allow rotation stile one direction allowing ingress preventing rotation direction often designed operate payment made usually inserting coin token slot swiping tapping inserting paper ticket electronically-encoded card turnstiles often used counting numbers people passing gate even payment involved used extensively manner amusement parks order keep track many people enter exit park ride ride first major use turnstiles sporting venue hampden park glasgow scotland waist-high turnstiles often used fairs attractions arenas user inserts ticket pass slot barcode read access granted sensor determines speed user passes sets electric motor turn turnstile corresponding speed sometimes also referred half-height turnstiles fixed arm style traditionally popular type turnstile many variations style available including one designed accompanied matching ticket box one ticket box built styles designed allow entry payment actual coins tokens inserted others allow access valid barcode electronically read disadvantage type people jump turnstile happens commonly moscow metro mass transport systems russia optical turnstiles alternative traditional arm -style turnstile increasingly used locations physical barrier deemed unnecessary unaesthetic optical turnstiles generally use infrared beam count patrons recognize anyone attempting enter site without valid entry pass drop arm optical turnstile combination security tripod barrier turnstile fully optical turnstile lanes either single double arms access granted arms drop recesses cabinet arms drop way turnstile functions fully optical turnstile full-height turnstile larger version turnstile commonly high similar operation revolving door eliminates possibility inherent waist-high style someone jumping turnstile however type turnstile functions differently revolving door often allow someone come someone else goes also pejoratively known iron maiden torture device name high-wheel sometimes called rotogate especially chicago used unstaffed exits chicago l stations also used increasingly new york city subway stations since turn 21st century europe however rotogate refers different kind gate turnstile two types full height turnstiles high entrance/exit turnstile heet exit-only difference heet turnstiles rotate directions thus allowing two-way traffic exit-only turnstiles rotate one direction thus allowing one-way traffic exit-only turnstiles commonly used mass transit stations allow passengers exit system without interfering entering exit-only models also used enclosed areas theme parks zoos amusement parks allow visitors leave denying admission paid additionally single double tandem turnstiles contain two rotors side side frame allows throughput limited space tandems frequently narrow two single turnstiles placed side-by-side public transport systems soviet union common use turnstiles entrance subway stations first introduced moscow metro 7 november 1958 city buses commuter trains usually operated proof-of-payment system fare collection became pressing business post-soviet russia railway terminals high-traffic railway station moscow area nizhny novgorod elsewhere turnstiles installed early 2000s moscow authorities sought improve fare collection since enclosing bus tram stops providing fare gates feasible installed turnstiles inside city bus tram practice caused passenger complaints slowed boarding compared traditional honor system similar system use brazilian chilean city buses hong kong trams | [
4939
] | Test |
2,280 | 2 | Dynamic_debugging_technique:dynamic debugging technique dynamic debugging technique ddt name several debugger programs originally developed dec hardware initially known dec debugging tape distributed paper tape name pun insecticide i.e bug-killer ddt first version ddt developed mit pdp-1 computer 1961 newer versions newer platforms continued use name ported vendor platforms changing media name changed less dec-centric version ddt closely related odt names used several different debuggers generally debuggers odt name limited capabilities ddt debuggers early versions digital research cp/m cp/m-86 kept dec name ddt ddt-86 ddt-68k debugger however meaning dynamic debugging tool cp/m ddt later superseded symbolic instruction debugger sid zsid sid86 gemsid dr dos gem addition normal function debugger ddt also used top-level command shell mit operating system recent systems replaced pword implements restricted subset ddt functionality ddt could run debug eight processes called jobs time several sessions teco ddt could run recursively jobs could ddts could run another eight jobs eight jobs given unique names usual name original top-most ddt hactrn hack-tran thus guy l. steele famous filk poem parody edgar allan poe raven hactrn ddt dynamic debugging technique implemented decsystem-10 decsystem-20 allowed references symbols within programming debugged feature loaded symbols .exe executable file special version named sddt used symbols running monitor allowed system programmers peek inside | [
1524,
4843,
190,
2010,
8087,
5571,
126,
3210,
3728,
7020,
1975,
7032,
3664,
5784,
1894,
2160,
6496,
8043,
4745,
785,
1435
] | Test |
2,281 | 5 | Network_News_Transfer_Protocol:network news transfer protocol network news transfer protocol nntp application protocol used transporting usenet news articles netnews news servers reading posting articles end user client applications brian kantor university california san diego phil lapsley university california berkeley wrote specification network news transfer protocol march 1986 contributors included stan o. barber baylor college medicine erik fair apple computer usenet originally designed based uucp network article transfers taking place direct point-to-point telephone links news servers powerful time-sharing systems readers posters logged computers reading articles directly local disk local area networks internet participation proliferated became desirable allow newsreaders run personal computers connected local networks resulting protocol nntp resembled simple mail transfer protocol smtp tailored exchanging newsgroup articles newsreader also known news client software application reads articles usenet either directly news server disks via nntp well-known tcp port 119 reserved nntp well-known tcp port 433 nnsp may used bulk transfer articles one server another clients connect news server transport layer security tls tcp port 563 often used sometimes referred nntps alternatively plain-text connection port 119 may changed use tls via codice_1 command october 2006 ietf released updates nntp codifies many additions made years since rfc 977 time ietf also released specifies use transport layer security tls via nntp starttls abortive attempt update nntp standard early 1990s specialized form nntp intended specifically use clients nnrp proposed protocol never completed fully implemented name persisted internetnews inn nnrpd program result subset standard nntp commands useful clients sometimes still referred nnrp | [
4655,
7148,
709,
4676,
4677,
7168,
7170,
4683,
7533,
20,
6432,
1462,
7537,
5039,
735,
6446,
2219,
3640,
4709,
7916,
7194,
5760,
3312,
414,
66,
7214,
7217,
2612,
3337,
2261,
1900,
6871,
456,
6879,
6521,
106,
1543,
2644,
6531,
2650,
121,
... | Validation |
2,282 | 7 | Lanyon_Solutions:lanyon solutions lanyon solutions inc. privately owned software-as-a-service saas company provided cloud-based software manage meetings events travel lanyon software supported range clients including corporations hotels associations tradeshows convention visitor bureaus cvbs intermediaries meetings events travel space merged cvent 2017 lanyon solutions formed combination two companies active network business solutions group lanyon vista equity partners 2014 two acquisitions added passkey genieconnect 2014 nevertheless solutions services offered individual companies date back decades lanyon founded 1984 nick lanyon irving texas provider software focused corporate transient travel 2009 lanyon received 10 million funding frontier capital charlotte nc-based private equity company expand lanyon product customer sales support company purchased vista equity partners december 2012 signaling exit frontier capital investment company founded 1996 waltham ma-based passkey international provided hotel reservation technology hotels event planners april 2014 lanyon acquired passkey complemented lanyon existing event solutions included passkey groupmax technology enabled hotels destination marketing organizations drive revenue group reservations easing manual tasks associated managing group room blocks starcite founded 1999 spinoff mcgettigan partners company expanded focus desktop consolidation meetings technology acquiring attendee applications provider regweb 2002 attendee product provider b-there 2003 2006 starcite merged onvantage inc. formed merger seeuthere technologies plansoft 2004 bringing together two leaders meetings technology merged company took starcite name products included starcite mobile attendee attendee networking 1:1 meetings schedule meetings business intelligence meetings data analytics suite smm applications supplier database 2008 active network acquired boulder co-based regonline online registration company lindon ut-based wingateweb provided large enterprise event management software january 2012 active network acquired starcite 57.7 million form business solutions group offer smm event marketing software meetings events addition starcite smm business solutions group technology offering included activeworks conference conferences regonline online registration starcite supplier marketplace hotel venue sourcing september 2013 active network acquired vista equity partners 1 billion would return public company private status february 2014 lanyon paired active network business solutions group consolidated lanyon name genieconnect founded 2010 teams us uk apac previously known geniemobile march 2013 uk-based genieconnect offered enterprise-level mobile event technology products included smartconnect provides content based attendee app usage ibeacon-enabled audience response solution marketing track attendee behaviors send messages audiences omnistream event wall aggregate social event activity genieconnect mobile event technology used associations corporations exhibitors expo companies cisco live 2014 genieconnect achieved following results 11,000 attendee profiles updates 7,500 access interactive maps 167,00 plus favorited content mobile app received user rating 4.5 5 stars cisco post-event survey acquired lanyon december 2014 genieconnect mobile technology already integrated many lanyon existing solutions formed early 2014 merger active network business solutions group lanyon lanyon solutions expanded software offering focus several key mergers acquisitions company acquired group hotel reservations company passkey april 2014 mobile application company genieconnect december 2014 lanyon solutions relocated headquarters downtown dallas texas offices draper ut london uk philadelphia pa singapore singapore waltham lanyon serves meetings events travel industries variety software products businesses hotels lanyon large focus enterprise serving 80 fortune 100 10,000 small medium-sized businesses 100,000 hotels company solutions designed manage costs spend data related meetings hotels enabling hoteliers offer venues services corporations associations introduced 2013 lanyon smart events cloud solution brings together strategic meetings management event marketing technologies single solution smart events cloud solution includes products hoteliers lanyon provides rfp management software respond meetings transient erfps hotel booking systems product offerings include | [
6843
] | Test |
2,283 | 8 | Text_Template_Transformation_Toolkit:text template transformation toolkit microsoft text template transformation toolkit usually referred t4 template based text generation framework included visual studio t4 source files usually denoted file extension .tt t4 used developers part application tool framework automate creation text files variety parameters text files ultimately text format code example c xml html xaml t4 uses custom template format contain .net code string literals parsed t4 command line tool .net code compiled executed output executed code text file generated template t4 also completely run within .net applications via use texttransformation class eliminates need end user visual studio installed t4 used within microsoft asp.net mvc creation views controllers ado.net entity framework entity generation asp.net dynamic data also used outside microsoft projects subsonic t4 templating also supported monodevelop four types controls handed t4 template transformation engine microsoft often criticized lack tooling support t4 within visual studio ide relies third parties namely tangible engineering clarius consulting however later revisions included better tooling support | [
7149,
714,
720,
1460,
1840,
2928,
7907,
4697,
5747,
6110,
3303,
2953,
53,
6840,
422,
425,
432,
4017,
6504,
4022,
4026,
7607,
1526,
2986,
3687,
4759,
7619,
7621,
7971,
5479,
7263,
3028,
5850,
7660,
150,
6933,
519,
3052,
4448,
3407,
1232,... | Test |
2,284 | 2 | Messages_(Apple):messages apple messages instant messaging software application developed apple inc. macos ios watchos operating systems desktop messages application replaced ichat native os x instant messaging client release os x mountain lion july 2012 inherits majority ichat features messages also brings support imessage apple messaging service ios well facetime integration mobile version messages ios used iphone ipad also supports sms mms due replacing older text messaging text app since ios 3 users tell difference message via sms one sent imessage bubbles appear either green sms blue imessage apple released messages iphone built-in application iphone os 3.0 june 17 2009 replaced text application native messaging application since iphone inception change name due iphone gaining native support mms protocol addition previously available sms protocol even though iphone 3g newly released iphone 3gs original iphone received os 3.0 update original iphone left support mms citing hardware challenges messages also gained support sharing contacts using vcard standard big changes included support copy paste ability forward delete multiple messages time release iphone os 4.0 name later changed ios 4.0 2010 messages received minor upgrade among new features ability search within text messages much like search feature mail also added support displaying character count notify one gone standard sms character limit ios 4.0 also included support red exclamation mark appear app icon warn failure send message developers provided new api allowed add embedded messaging functionality apps ipad ipod touch gained support messages release ios 5.0 october 12 2011 unlike iphone supported sms mms imessage ipad ipod touch supported apple imessage protocol imessage users ios 5 could send text picture messages contacts wifi 3g ios 5 devices without using carrier quota addition user could start conversation one device continue another messages also introduced typing indication delivery read receipts imessage introduction notification center new sms mms imessages could seen lock screen pulling notification center ios 6 helped improve syncing multiple devices ipod touch ipad users could use iphone phone numbers send receive imessages earlier iphone users could receive imessages sent phone number ipad ipod touch addition users could add additional emails receive send messages device settings accessible settings application messages tab ios 6 also added share button apps like safari photos enabled users share links photos using sms/mms imessage without leaving app ios 7 messages received new user interface apple also allowed users see message post date swiping messages view right left ios 8 users send audio video messages holding record button group conversations users remove/add someone thread name thread share location thread view attachments turn disturb receive notifications specific thread part new continuity feature users use iphones relay send receive sms mms messages macs ipads ios 9 app received redesigned overlay sending audio clip well seeing contact photos list view iphone 6 later ios 10 app app store allowing user download third-party messages apps apps allow user send stickers play games within messages app app received new visual effects example chat bubbles sent loud gentle effect messages announced os x beta application february 16 2012 macs running mac os x 10.7 lion released conjunction developer preview apple to-be-released os mountain lion 10.8 beta discontinued december 12 2012 3 months release mountain lion full-version messages os x released july 25 2012 included mountain lion messages replaced ichat default im client since mac os x 10.2 addition supporting apple new imessage protocol messages os x retained support aim yahoo messenger google talk jabber messages unitizes newly added notification center notify incoming messages introduction new share button applications like safari finder preview gave users ability share links webpages photos files messages also supported dragging dropping files photos sharing messages also supports video calling apple facetime third-party im services supports release 10.8.2 messages os x gained ability send receive imessages using iphone phone number yosemite app redesigned look like app ios 7 8 part new continuity feature users able send receive sms mms messages iphones running ios 8 possibility reopen previous conversations removed embedded control font size character format within sent messages removed headlining feature ios 5 messages widely reviewed met fairly positive reviews dante cesa engadget review praised brilliance apple execution messages complimented way messages change earlier sms ui would automatically convert sms/mms imessage recipient registered imessage sms/mms stopped using service dan moren macworld also praise apple execution saying ... explain less technically savvy friends send free message instead sms done automatically feature widely praised anandtech praised apple technical achievements messages particularly imessage noted away sms character limits 140 160 helped eliminate messages sent received split two messages tests found apple actually prioritized using cellular networks send text messages opposed wifi networks spite possibly incurring data costs claimed data usage text based imessage small enough ignore especially considered cellular networks secure wifi protected picture video messages apple prioritized wifi given much higher data consumption compared text criticism messages relates imessage release ios 6 os x mountain lion 10.8.2 inability receive imessages sent one iphone phone number ipad ipod touch mac criticized feature addressed ios 6 iphones ipads ipod touches os x 10.8.2 macs messages also came fire due multiple cases apple icloud service going messages relies icloud send receive imessages using apple voiceover screen reader ios macos visually impaired users tap message read also navigate messages ui using voice utilizing siri messages enables one dictate send messages commands siri also able read new incoming messages default font size ios messages editable accessibility tab settings application | [
7148,
6788,
3940,
713,
7890,
2555,
7170,
2201,
4320,
2926,
4690,
734,
5752,
405,
4337,
6832,
6125,
3989,
2954,
2597,
1123,
3322,
6847,
1502,
6142,
2609,
5786,
1895,
4740,
1897,
5091,
4749,
6505,
7601,
2627,
7609,
3350,
7967,
1171,
5109,
... | Validation |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.