node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,285
9
Jsish:jsish javascript interpreter shell jsish jsi short scripting language designed use embedded systems language used primarily applications written c c++ using gnu tool-chains mingw provides windows compatibility jsi code compiles either c99 c++ c++ support native instead extern c jsi created embedded application replacement tcl jimtcl main goal provide embedded scripting using mostly standard syntax javascript opposed idiosyncratic ones used tcl lua python secondary goal data compatibility web browsers using json speed major goal life jsi started fork quad-wheel interpreter eventually major internal features tcl added current implementation nearly 10 times size original little original code remains jsi comes builtin support sqlite websocket self-hosting zip file-systems codice_1 executable unusual integrates self-mounting file system containing builtin utilities applications include debugger web-server latter used provide web user-interfaces debugger sqlite applications accessed via codice_1 command-line arguments jsi highly independent scripts extensions unusually robust due functions support duck typed-parameters implementation mature rich resilient development environment includes integrated logging asserts strict mode version 2.4 released december 2017 jsi considered feature-stable jsi implements version 5.1. ecmascript standard following deviations one major extension function definitions use types defaults
[ 2810, 6507, 3931, 1524, 2451, 4759, 6172, 3368, 3863, 5571, 2026, 486, 313, 753, 6211, 3133, 7669, 7581, 6489, 5965, 3915, 1435 ]
Validation
2,286
9
CorVision:corvision corvision fourth generation programming tool 4gl currently owned attunity inc. corvision developed cortex corporation vax/vms isam environment although cortex beta tested corvision-10 generated pcs corvision stayed anchored vms corvision-10 proved difficult hoped never released corvision traced back 1972 lou santoro mike lowery created inform newly formed time-sharing company standard information systems sis inform contained corvisions basic utility commands sort report list consolidate first users inform new england telephone polaroid temple barker sloan 1972 sis offices los angeles garden grove minneapolis chicago boston new york city district columbia charlotte raleigh atlanta phoenix 1976 1977 ken levitt dick berthold sis ported inform cdc-3600 pdp-11/70 ias called new tool inform-11 cortex founded 1978 sherm uchill craig hill mike lowery dick berthold market inform-11 inform-11 first used deliver 20-user order entry system eddie bauer deliver insurance processing system consolidated group trust 1981 1982 cortex received significant investment b. dick using new investment cortex ported inform digital equipment corporation new vax/vms adding compiled executables inform-11 promoted cortex digital pioneering rapid application development system 1984 jim warner encapsulated inform repository-based development tool called application factory inform process procedural language became known builder within application factory 1986 name application factory dropped favor name corvision 1986 1989 corvision experienced heyday quickly became known robust capable tool rapidly building significant multi-user applications addition relational database support attracted major accounts cortex quickly became international company 1992 corvision version 5 released query support unix query allowed read-only access users developers systems database backend seemed desirable facility allowing users create use throw away reports without calling developers nasty habit causing performance issues users often understand database structure could send large queries processing queues causing system-wide issues 1993 cortex started supported vesting digital new 64-bit alpha line 1994 international software group co. ltd. isg purchased cortex early 1987 cortex recognized growth popularity ibm pc supporting wikt diagrammatic editing menus data relationships corvision 1993 client-server version released widely adopted 1997 isg work corvision-10 herald rebirth corvision onto ibm pc platform stopped corvision-10 proving difficult port isg finally refused spend money now-dated system 1994 saw last innovative corvision release v5.11 extra-fee y2k release v5.12.2 marked end development corvision still exists handful companies yet found time money upgrade existing mainframe systems corvision runs vms environment stable search corvision developers contractors support ageing systems problem since around 1999 companies started appearing offering conversion tools convert builder code compiled visual basic java 2005 corvision guru michael lowery president order processing technologies attempted revive corvision franchise cv2vb process convert corvision applications .net applications using sql server cv2vb opt third generation corvision conversion replacement modeler/code generator commercial service former corvision clients information available cv2vb website brief explanation application development using corvison first step developing application corvision fill parameters control miscellaneous aspects concerning application-wide functions parameters fall five groupings follows usually default values parameters satisfactory corvision however allows setting changed time development parameters file wp accessed runtime latest setting always used corvision keeps information behind status screen up-to-date indicates current state development process left hand side indicates specification tasks need right hand side indicates generation tasks need changes additions specification cause changes dictionary datasets keys dictionary datasets keys screens reports menus corvision provides useful feature called field search field search allows investigate analyze use fields different aspects application allows developers assess impact changes made provide complete specification details hardcopy form corvision run reports option 80 different types report produced component specification reports csrs known also produced tentative unreferenced unresolved items key corvision procedures procedures corvision eventually become executable images .edo three types procedures essentially true consider procedure program fact procedure set instructions builder commands build program program builder actually called process program procedure therefore set builder commands instruct builder build process save program library compiled file .sav extension corvision keeps data structure files separate manipulated builder builder keeps structure file key structure file dataset used application process compiled data structures bound process time thus binding data structures takes place precise moment process compiled structure key structure files kept separate dataset definitions altered development major strength corvision allowing prototyping environment code data structures changed throughout development brought together compile time structure key structure files loaded process compiled done load file builder makes assumption data structures already loaded compiles process point compilation binds data structures code following files created following files also added following files created compiling
[ 2226, 6462, 5852, 2866, 4277, 8117, 684, 7396 ]
Test
2,287
4
Qualified_digital_certificate:qualified digital certificate context regulation eu 910/2014 eidas qualified digital certificate public key certificate issued qualified trust service provider ensures authenticity data integrity electronic signature accompanying message and/or attached data eidas defines several tiers electronic signatures used conducting public sector private transactions within across borders eu member states qualified digital certificate addition specific services provided qualified trust service provider required elevate status electronic signature considered qualified electronic signature using cryptography digital certificate also known public key certificate contains information link owner digital signature trust entity verifies authenticity content signed according eidas considered qualified digital certificate certificate must meet requirements provided annex regulation eu 910/2014 including limited need non-repudiation authentication electronic signatures originally addressed electronic signatures directive 1999/93/ec help facilitate secure transactions specifically occur across borders eu member states eidas regulation later replaced directive defined standards used creation qualified digital certificates trust service providers qualified digital certificate issued qualified trust service provider received authorization member state ’ supervisory body provide qualified trust services creating qualified electronic signatures provider must listed upon eu trust list otherwise permitted provide qualified digital certificates qualified trust services trust service provider required abide guidelines established eidas creating qualified digital certificate include court qualified electronic signature provided highest level probative value makes difficult refute authorship qualified electronic signature along qualified certificate given consideration handwritten signature used evidence legal proceedings validity qualified electronic signature created qualified certificate must accepted eu member states regardless member state signature produced parts world similar concepts created define standards electronic signatures switzerland digital signing standard zertes comparable standards address conformity regulation trust service providers product digital certificates united states nist digital signature standard dss provide comparable standard regulating qualified certificates would address non-repudiation signatory ’ qualified certificate amendment nist dss currently discussed would in-line eidas zertes handle trusted services
[ 2312, 6672, 6795, 5596, 1037, 3794, 1266 ]
Test
2,288
7
Logging_as_a_service:logging service logging service laas architectural model centrally ingesting collecting type log files coming given source location servers applications devices etc files normalized filtered reformatting forwarding dependent systems processed “ native ” data managed displayed ultimately disposed according predesignated retention schedule based number criteria enterprise situation datacenter becomes hub log files normalization managed service provider msp environment log sources would coming applications outside enterprise still hosted managed msp needed model datacenter acts private cloud concept cloud computing provision logs various stakeholders within organization future forensics analysis identify risks patterns activity predict behaviors based data collected within logs becomes hub service stakeholders become beneficiaries centralized data form alerts reports periphery applications predictive analysis insight big data graphical display
[ 2961 ]
Test
2,289
4
Heap_feng_shui:heap feng shui computer security heap feng shui technique used exploits facilitate arbitrary code execution technique attempts manipulate layout heap making heap allocations carefully selected sizes named feng shui ancient chinese system aesthetics involves selection precise alignments space term general used describe variety techniques bypassing heap protection strategies paper often credited naming technique heap feng shui javascript used refer exploit dangling pointer aligned portion attacker-controlled chunk however also found usage capture flag events describe attacks exploit characteristics heap layout spacing chunks
[ 1363, 2318, 5697, 7614, 3967, 8064, 1805 ]
Test
2,290
3
Architecture_of_Windows_NT:architecture windows nt architecture windows nt line operating systems produced sold microsoft layered design consists two main components user mode kernel mode preemptive reentrant multitasking operating system designed work uniprocessor symmetrical multiprocessor smp -based computers process input/output i/o requests use packet-driven i/o utilizes i/o request packets irps asynchronous i/o starting windows xp microsoft began making 64-bit versions windows available 32-bit versions operating systems programs subsystems user mode limited terms system resources access kernel mode unrestricted access system memory external devices kernel mode windows nt full access hardware system resources computer windows nt kernel hybrid kernel architecture comprises simple kernel hardware abstraction layer hal drivers range services collectively named executive exist kernel mode user mode windows nt made subsystems capable passing i/o requests appropriate kernel mode device drivers using i/o manager user mode layer windows nt made environment subsystems run applications written many different types operating systems integral subsystem operates system-specific functions behalf environment subsystems kernel mode stops user mode services applications accessing critical areas operating system access executive interfaces user mode subsystems deal i/o object management security process management kernel sits hardware abstraction layer executive provide multiprocessor synchronization thread interrupt scheduling dispatching trap handling exception dispatching kernel also responsible initializing device drivers bootup kernel mode drivers exist three levels highest level drivers intermediate drivers low-level drivers windows driver model wdm exists intermediate layer mainly designed binary source compatible windows 98 windows 2000 lowest level drivers either legacy windows nt device drivers control device directly plug play pnp hardware bus user mode made various system-defined processes dlls interface user mode applications operating system kernel functions called environment subsystem windows nt one implementing different api set mechanism designed support applications written many different types operating systems none environment subsystems directly access hardware access hardware functions done calling kernel mode routines four main environment subsystems win32 subsystem os/2 subsystem windows subsystem linux posix subsystem security subsystem deals security tokens grants denies access user accounts based resource permissions handles login requests initiates login authentication determines system resources need audited windows nt also looks active directory workstation service implements network redirector client side windows file print sharing implements local requests remote files printers redirecting appropriate servers network conversely server service allows computers network access file shares shared printers offered local system windows nt kernel mode full access hardware system resources computer runs code protected memory area controls access scheduling thread prioritization memory management interaction hardware kernel mode stops user mode services applications accessing critical areas operating system access user mode processes must ask kernel mode perform operations behalf x86 architecture supports four different privilege levels numbered 0 3 two extreme privilege levels used usermode programs run cpl 3 kernel runs cpl 0 two levels often referred ring 3 ring 0 respectively design decision done achieve code portability risc platforms support two privilege levels though breaks compatibility os/2 applications contain i/o privilege segments attempt directly access hardware code running kernel mode includes executive made many modules specific tasks kernel provides low-level services used executive hardware abstraction layer hal kernel drivers windows executive services make low-level kernel-mode portion contained file ntoskrnl.exe deals i/o object management security process management divided several subsystems among cache manager configuration manager i/o manager local procedure call lpc memory manager object manager process structure security reference monitor srm grouped together components called executive services internal name ex system services internal name nt i.e. system calls implemented level except call directly kernel layer better performance term service context generally refers callable routine set callable routines distinct concept service process user mode component somewhat analogous daemon unix-like operating systems kernel sits hal executive provides multiprocessor synchronization thread interrupt scheduling dispatching trap handling exception dispatching also responsible initializing device drivers bootup necessary get operating system running kernel performs almost tasks traditional microkernel strict distinction executive kernel prominent remnant original microkernel design historical design documentation consistently refers kernel component microkernel kernel often interfaces process manager level abstraction kernel never calls process manager way around save handful corner cases still never point functional dependence windows nt uses kernel-mode device drivers enable interact hardware devices drivers well defined system routines internal routines exports rest operating system devices seen user mode code file object i/o manager though i/o manager devices seen device objects defines either file device driver objects kernel mode drivers exist three levels highest level drivers intermediate drivers low level drivers highest level drivers file system drivers fat ntfs rely intermediate drivers intermediate drivers consist function drivers—or main driver device—that optionally sandwiched lower higher level filter drivers function driver relies bus driver—or driver services bus controller adapter bridge—which optional bus filter driver sits function driver intermediate drivers rely lowest level drivers function windows driver model wdm exists intermediate layer lowest level drivers either legacy windows nt device drivers control device directly pnp hardware bus lower level drivers directly control hardware rely drivers windows nt hardware abstraction layer hal layer physical hardware computer rest operating system designed hide differences hardware provide consistent platform kernel run hal includes hardware-specific code controls i/o interfaces interrupt controllers multiple processors however despite purpose designated place within architecture hal n't layer sits entirely kernel way kernel sits executive known hal implementations depend measure kernel even executive practice means kernel hal variants come matching sets specifically constructed work together particular hardware abstraction involve abstracting instruction set generally falls wider concept portability abstracting instruction set necessary handling several revisions x86 instruction set emulating missing math coprocessor performed kernel via hardware virtualization
[ 7879, 3937, 3263, 5021, 378, 2198, 6096, 1475, 5747, 7553, 7195, 5410, 7564, 5413, 2953, 422, 6844, 1128, 2245, 5784, 435, 5442, 4377, 4017, 3340, 5090, 2266, 447, 7602, 6164, 2631, 4759, 1534, 6885, 7619, 5108, 2999, 5116, 5475, 6528, ...
Test
2,291
8
Nginx:nginx nginx like engine x stylized nginx nginx web server also used reverse proxy load balancer mail proxy http cache software created igor sysoev first publicly released 2004 company name founded 2011 provide support nginx plus paid software nginx free open-source software released terms bsd-like license large fraction web servers use nginx often load balancer march 2019 nginx company acquired f5 networks 670 million netcraft estimated nginx served 32 active websites ranked ranking first apache 29 top million websites neither ranked first ranked first 33 sources still estimate apache ahead overall according netcraft november 2016 web server survey nginx found second widely used web server across active sites 18.22 surveyed sites top million busiest sites 27.83 surveyed sites according w3techs used 37.7 top 1 million websites 49.7 top 100,000 websites 57.0 top 10,000 websites according builtwith used 38.2 top 10,000 websites growth within top 10k 100k 1 million segments increased 2018 survey docker usage found nginx commonly deployed technology docker containers wikipedia uses nginx ssl termination proxy openbsd release 5.2 1 november 2012 nginx became part openbsd base system providing alternative system fork apache 1.3 intended replace later replaced openbsd httpd 8 nginx deployed serve dynamic http content network using fastcgi scgi handlers scripts wsgi application servers phusion passenger modules serve software load balancer nginx uses asynchronous event-driven approach rather threads handle requests nginx modular event-driven architecture provide predictable performance high loads nginx default configuration file codice_1 features include upgrading executable configuration without client connections loss module-based architecture core third-party module support paid plus product includes additional features advanced load balancing access expanded suite metrics performance monitoring two versions nginx oss nginx nginx plus nginx plus offers additional features included oss nginx active health checks session persistence based cookies dns service discovery integration cache purging api appdynamic datalog dynatrace new relic plug-ins active-active ha config sync key-value store on-the-fly zero downtime updates upstream configurations key‑value stores using nginx plus api web application firewall waf dynamic module nginx written explicit goal outperforming apache web server box serving static files nginx uses dramatically less memory apache handle roughly four times many requests per second however performance boost comes cost decreased flexibility ability override systemwide access settings per-file basis apache accomplishes .htaccess file nginx feature built nginx also reputation harder install configure apache formerly adding third party modules nginx required recompiling application source modules statically linked partially overcome version 1.9.11 february 2016 addition dynamic module loading however modules still must compiled time nginx modules compatible system—some require older static linking process nginx generally considered less stable windows server linux apache equal support igor sysoev began development nginx 2002 originally nginx developed solve c10k problem fill needs websites including rambler search engine portal serving 500 million requests per day september 2008 nginx inc. founded july 2011 sysoev provide commercial products support software company principal place business san francisco california legally incorporated british virgin islands october 2011 nginx raised 3 million bv capital runa capital msd capital michael dell venture fund company announced commercial support options companies using nginx production nginx offered commercial support february 2012 paid nginx plus subscription august 2013 support packages focus installation configuration performance improvement etc support includes proactive notifications major changes security patches updates patches wordpress developer automattic inc. content delivery network provider maxcdn became funding partners update google spdy version 3.1 slated early 2014 nginx also offers consulting services assist customers custom configuration adding additional features october 2013 nginx raised 10 million series b investment round led new enterprise associates round included previous investors well aaron levie ceo founder box.com december 2014 nginx raised 20 million series b1 round led new enterprise associates participation e.ventures formerly bv capital runa capital index ventures nginx ceo gus robertson october 2017 nginx inc. announced general available nginx amplify saas providing monitoring analytics capabilities nginx september 2017 nginx announced api management tool nginx controller would build api gateway nginx plus june 2018 nginx raised 43 million series c funding round led goldman sachs accelerate application modernization digital transformation enterprises 11 march 2019 f5 networks acquired nginx
[ 5369, 5373, 1834, 26, 7544, 1474, 3637, 4701, 3298, 417, 4364, 6489, 6860, 3338, 7952, 2620, 5820, 2646, 5824, 3368, 6536, 7988, 6908, 833, 501, 3408, 864, 1602, 5184, 6966, 5206, 900, 5214, 6270, 5571, 578, 230, 2776, 3135, 1686, 7411,...
Test
2,292
7
Benchmark_Email:benchmark email benchmark email international internet-based service provider email marketing headquarters los alamitos ca company founded curt denise keller 2004 company offers various free paid editions benchmark member returnpath.net email sender provider coalition industry consortiums expansion international markets pursued company translating software english spanish french german chinese japanese portuguese italian establishing offices philippines japan china india spain taiwan italy among several countries recently website also launched french 2017 benchmark email named one 20 b2b technologies try 2017 forbes
[]
Test
2,293
1
Relational_data_mining:relational data mining relational data mining data mining technique relational databases unlike traditional data mining algorithms look patterns single table propositional patterns relational data mining algorithms look patterns among multiple tables relational patterns types propositional patterns corresponding relational patterns example relational classification rules relational classification relational regression tree relational association rules several approaches relational data mining multi-relation association rules multi-relation association rules mrar new class association rules contrast primitive simple even multi-relational association rules usually extracted multi-relational databases rule item consists one entity several relations relations indicate indirect relationship entities consider following mrar first item consists three relations live nearby humid “ live place near city humid climate type also younger 20 health condition good ” association rules extractable rdbms data semantic web data
[ 2054 ]
Test
2,294
2
A/UX:a/ux a/ux discontinued unix-based operating system apple computer custom integrated system 7 graphical interface application compatibility launched 1988 discontinued 1995 version 3.1.1 apple first official unix-based operating system a/ux requires select models 68k-based macintosh fpu paged memory management unit pmmu including macintosh ii se/30 quadra centris series predecessor macos variant unix currently bundled apple desktop computers described infoworld open systems solution macintosh heart operating system based unix system v release 2.2 includes additional features system v releases 3 4 bsd versions 4.2 4.3 posix system v interface definition svid compliant includes tcp/ip networking version 2 onward unix-compatible posix-compliant operating system made possible apple bid large contracts supply computers u.s. federal government institutes a/ux provides graphical user interface including familiar finder windows menus controls a/ux finder customized version system 7 finder adapted run unix process designed interact underlying unix file systems a/ux includes codice_1 terminal program offers command line interface underlying unix system x window system server application called macx terminal program also used interface system run x applications alongside finder alternatively user choose run fullscreen x11r4 session without finder apple compatibility layer allows a/ux run macintosh system 7.0.1 unix hybrid applications hybrid application uses functions macintosh toolbox unix system example run macintosh application calls unix system functions unix application calls macintosh toolbox functions quickdraw hypercard stack graphical frontend command-line unix application a/ux compatibility layer uses existing toolbox functions computer ’ rom function calls translated native unix system calls cooperatively multitasks macintosh apps single address space using token-passing system access toolbox a/ux includes utility called codice_2 similar tool name included macintosh programmer workshop assist users entering unix commands opening unix executable file finder opens dialog box allows user choose command-line options program using standard controls radio buttons check boxes display resulting command line argument user executing command program feature intended ease learning curve users new unix decrease user reliance unix manual a/ux utility allows user reformat third-party scsi drives way used macs era a/ux runs 68k-based macintoshes floating point unit fpu paged memory management unit pmmu even runs select models example quadra 840av apple fastest 68k macintosh run a/ux a/ux 1.0 announced february 1988 uniforum conference seven months behind schedule initially aimed existing unix customers universities vars. ref name= apple breaks unix market a/ux /ref system initially sold pre-installed macintosh ii although one could add larger monitor higher price purchase kit upgrading existing mac ii lower price third-party software announced system first release includes ingres database statview developer tools various productivity software packages based unix system v.2.2 additional features bsd unix networking support included tcp/ip appletalk nfs implementations developed unisoft base system gui running command line capable running single mac program time using system 6 interface although 10 existing mac software would run released 1989 a/ux 1.1 supplies basic gui system 6 finder chooser desk accessories control panels provisions unix x window system x11r3 gui draft 12 posix standard overall improved speed comparable low end sun workstation. ref name= a/ux release 1.1 supports x window /ref first posix compliant platform allowed apple join growing list industry heavyweights allowed us federal government burgeoning 6 billion bid market 1991 based aim alliance apple envisioned a/ux becoming basis drastically scaling concept macintosh system architecture application compatibility across computing industry personal enterprise markets apple formed new business division enterprise systems led director jim groff serve large businesses government higher education basing division upon maturing a/ux groff admitted apple major player unix market performed merely quiet marketing operating system fully intended become major player broad-based marketing objectives 1992 apple believed alliance ibm would merge a/ux aix system 7—thus ultimately scaling execution macintosh applications mac desktops ibm huge rs/6000 systems november 1991 apple launched a/ux 3.0 planning synchronize two ongoing release schedules a/ux system 7 time company also preannounced a/ux 4.0 expected release 1993 1994 announcement expounded upon historic technology partnership apple ibm expecting merge apple user-friendly graphical interface desktop applications market ibm highly scalable unix server market allowing two companies enter apple believed emerging general desktop open systems market upcoming a/ux 4.0 would target poweropen environment abi merge features ibm aix variant unix a/ux use osf/1 kernel open software foundation a/ux 3.0 would serve important migration path new system making unix system 7 applications compliant poweropen specification future a/ux 4.0 aix operating systems intended run variety ibm power powerpc hardware apple powerpc-based hardware april 1992 c2-level secure version a/ux released coincidentally aim alliance launched apple/ibm partner corporation taligent inc. one month earlier mission bringing pink market grandly universal operating system application framework contrary announcements apple eventually abandoned plans a/ux 4.0 never releasing product 1995 company withdrew taligent partnership poweropen discontinued 1996 discontinued two-year copland project intended become mac os 8 host taligent software 1996 1997 company deployed short-lived platform apple network server systems based upon powerpc hardware customized ibm aix operating system company overall failed operating system strategy left badly aged system 7 successor following apple 1996 acquisition next apple introduced 1999 mac os x server descendant unix-based nextstep operating system final release a/ux version 3.1.1 1995 apple abandoned a/ux platform completely 1996 a/ux 1.0 criticized 1988 infoworld review largely command-driven user interface unix variants rather graphical system 6 networking support praised though byte 1989 listed a/ux 1.1 among excellence winners byte awards stating could make unix multitasking operating system choice next decade challenge os/2 compared contemporary workstations unix vendors however macintosh hardware lacks features demand paging first two versions a/ux consequently suffer poor performance poor sales users also complained amount disk space uses standard macintosh though comparable unix system august 1992 issue infoworld author favorably reviewed a/ux 3.0 describing open systems solution macintosh heart apple finally gets unix right praised gui single-button point-and-click installer one year personal tech support graphical help dialogs user manuals saying a/ux defies stereotype unix difficult use easiest version unix learn list price much higher much weaker competing pc operating systems system 7 os/2 ms-dos windows 3.1 low compared prevailing proprietary unix licenses review found system speed acceptable great even fastest quadra 950 blaming software incomplete unix optimization found apple hardware though good value system price-performance ratio judged altogether uncompetitive sun sparcstation 2 reviewers thought unlikely users want buy macs run a/ux would awarded infoworld top score os proprietary macintosh hardware tony bove bove rhodes report generally complained f unix super-users compelling reason buy apple unix apple a/ux always way sell macs unix check-off item users a/ux requires specific raw hardware access execution a/ux within macintosh emulation software impossible 2014 introduction macintosh ii emulator named shoebill vintage a/ux users one central repository a/ux applications internet server nasa called jagubox administered jim jagielski also editor a/ux faq
[ 1807, 5362, 6788, 4670, 6085, 5732, 4320, 5048, 6113, 405, 6119, 4344, 1493, 56, 1123, 6479, 5079, 4733, 443, 4747, 5450, 1522, 3346, 4751, 4389, 5101, 4768, 473, 5477, 5481, 2300, 3387, 149, 2327, 4447, 6577, 4453, 3412, 3751, 8043, 19...
Validation
2,295
4
System_Reconfiguration_Attacks:system reconfiguration attacks system reconfiguration attacks modify settings user ’ pc malicious purposes example urls favorites file might modified direct users look-alike websites e.g. bank website url may changed “ bankofabc.com ” “ bancofabc.com ” بتعديل الإعدادات على جهاز الكمبيوتر الخاص بالمستخدم والهدف من هذا التعديل أهداف ضارة system reconfiguration attacks تقوم هجمات إعادة تهيئة النظام
[ 2086, 1805 ]
Validation
2,296
4
Agnitum:agnitum agnitum ltd founded 1999 st. petersburg russia software company 2000 agnitum hired 2 developers increased number staff people 20 2002 agnitum originally focused anti-trojan pc connections monitoring solutions targeted windows pcs users company known mostly personal firewall internet security products provider outpost firewall pro flagship product company released 2002 together freeware solution updated 2009 agnitum products mostly consumer-oriented taking account licensing agnitum products technologies several national security software publishers january 14 2016 agnitum confirmed official blog company acquired yandex december 2015 february 28 2017 final phase sale yandex agnitum site user forum shut agnitum established software producer 1999 st. petersburg russia two students baltic state technical university distributing software online shareware agnitum sold niche software entering 2002 pc firewalls market agnitum software become rather popular 2002 agnitum began formally implement international distribution strategy putting place agreements partners major european markets well germany italy spain poland 2003 2006 agnitum strengthened european american far east market positions personal firewall engine company became basis company products thus integrated several firms security solutions partnering security vendors provide personal firewall anti-spyware technologies 2003-2006 agnitum announced contracts anti-virus solutions vendors whole re-branded software part vendor suite sophos uk usa lavasoft sweden novell usa virusbuster hungary others 2006 agnitum criticized microsoft onecare firewall agnitum claimed leaks faced simplest attacks programs test firewalls leaks agnitum chief software architect posted less-than-glowing assessment microsoft windows firewall part company entry security software business 2006 agnitum entered strategic alliance virusbuster experienced anti-virus vendor hungary agnitum aimed enter market internet security suite solutions compete anti-virus vendors kaspersky zonelabs etc already integrated personal firewalls personal security solutions mostly personal anti-viruses additional spyware adware spam web content filtering engines 2007-2008 agnitum finally entered market anti-virus solutions anti-virus products began participating international domestic test labs tests virus bulletin vb100 anti-malware.ru anti-virus tests outpost firewall pro tested leaktests killtests independent research portals 2009 2010 agnitum released 2 freeware editions outpost software outpost firewall pro free edition outpost security suite free continue competition well-known zonealarm comodo free pc firewall vendors agnitum first software products anti-trojan tool tauscan pc connections monitoring tool jammer anti-trojan software tauscan occasionally achieved attention media received awards jammer focused detecting blocking attacks hackers prototype outpost personal firewall launched simultaneously “ free ” “ pro ” versions march 2002 march 2007 agnitum released free anti-spam plug-in filtering microsoft outlook outlook express mail supports bat since 2008 may 2007 agnitum released combined internet security suite solution — outpost security suite pro ossp proactive solution basis outpost firewall agnitum anti-spam licensed anti-virus combined agnitum anti-spyware october 2007 agnitum released microsoft vista-compatible outpost 2008 products outpost firewall pro began pass leak-tests kill-tests matousec transparent security firewall challenge project independent project proactive security software testing 2010 agnitum released extension freeware solution outpost security suite free include anti-virus anti-spyware anti-spam free internet security suite moment agnitum security products available following languages english german french spanish russian default also lot localized outpost software versions like italian polish hungarian japanese traditional simplified chinese korean turkish dutch brazilian portuguese agnitum firewall anti-spyware anti-virus engines became almost independent products several security companies licensing agnitum technologies integrate products list companies made publicity licensing novell novell os client security agent sophos corporate edition client agent bullguard internet security solution lavasoft personal firewall client agent cat/quickheal indian anti-virus solutions vendor total security solution
[ 385, 7536, 1838, 4689, 6107, 3637, 7193, 6149, 7597, 88, 5452, 91, 4759, 806, 1931, 4783, 496, 7275, 5144, 142, 3394, 6560, 4091, 4456, 6235, 6951, 875, 6962, 1249, 4115, 3089, 4492, 4138, 910, 2746, 3111, 578, 8100, 6644, 1291, 7744, ...
Validation
2,297
2
Freespire:freespire freespire community-driven linux distribution currently owned pc/open systems llc derived linspire composed mostly free open source software providing users choice including proprietary software including multimedia codecs device drivers application software freespire 1.0 based debian freespire 2.0 based ubuntu linspire bought xandros originally planned switch back debian future freespire releases january 1 2018 pc/open systems announced purchased linspire xandros released freespire 3.0 linspire 7 available 79.99 freespire 3.0 free august 2005 distribution live cd based linspire source pools named freespire hit web accident distribution created andrew betts produced released linspire inc. freespire confused users actual product linspire request linspire distribution adopted development codename squiggle began looking new name linspire back generated publicity offered users free linspire purchase price discounted 0 using coupon code freespire september 9 2005 squiggle os longer active development april 24 2006 linspire announced project named freespire new freespire distribution announced linspire president former ceo kevin carmony follows model fedora supported red hat community since 2003 novell also started similar community project name opensuse suse linux product line second half 2005 xandros acquired linspire/freespire summer 2008 xandros plans keep freespire community developed distribution similar opensuse fedora respective commercial distributions freespire 2.0.8 released 30 november 2007 based ubuntu 7.04 final release distribution revived 3.0 january 2018 distribution debian-based community-driven -supported project tied commercial linspire distribution freespire includes previously proprietary elements linspire click n run cnr client elements linspire licenses like windows media audio compatibility libraries remain proprietary closed source consequently two versions freespire one proprietary closed source libraries one called freespire oss edition includes mostly open-source components freespire number in-house programs written haskell ocaml iso image builder hardware detection autoconfiguration package autobuilder debian library also programs managing cgi
[ 2585, 3996, 7587, 1893, 2260, 7954, 788, 4759, 7251, 474, 1941, 6209, 2680, 3738, 4824, 5523, 6586, 5530, 3751, 6951, 6244, 5200, 1629, 2728, 3444, 5912, 3780, 2740, 5232, 2758, 1663, 4165, 2063, 5259, 2074, 6317, 968, 7075, 5658, 314, ...
Train
2,298
5
MDaemon:mdaemon mdaemon email server email server application groupware functions microsoft windows first released alt-n technologies 1996 mdaemon supports multiple client-side protocols including imap pop3 smtp/msa webmail caldav carddav optionally activesync mobile clients outlook connector outlook add-on mdaemon features include built-in spam filter heuristic bayesian analysis ssl tls encryption client-side server-side email attachment encryption public shared folder support mailing list support sharing groupware data calendar contacts tasks notes also basis mdaemon tech security gateway email servers according securityspace.com mail mx server survey june 2018 mdaemon provides approximately 1 percent known internet mail servers fifth largest installation base identified servers
[ 770, 1912, 4734, 4759, 5571, 352, 1900 ]
Test
2,299
3
Sun_Enterprise:sun enterprise sun enterprise range unix server computers produced sun microsystems 1996 2001 line launched sun ultra enterprise series ultra prefix dropped around 1998 systems based 64-bit ultrasparc microprocessor architecture related contemporary ultra series computer workstations like ultra series run solaris various models single-processor entry-level servers large high-end multiprocessor servers produced enterprise brand phased favor sun fire model line 2001 onwards first ultrasparc-i-based servers produced sun launched 1995 ultraserver 1 ultraserver 2 server configurations ultra 1 ultra 2 workstations respectively later renamed ultra enterprise 1 ultra enterprise 2 consistency server models later joined ultra enterprise 150 comprises ultra 1 motherboard tower-style enclosure 12 internal disk bays 1998 sun launched server configurations ultrasparc-iii-based ultra 5 ultra 10 workstations called enterprise ultra 5s enterprise ultra 10s respectively sun enterprise 450 rack-mountable entry-level multiprocessor server launched 1997 capable four ultrasparc ii processors sun enterprise 250 two-processor version launched 1998 later joined enterprise 220r enterprise 420r rack-mount servers 1999 220r 420r models respectively based motherboards ultra 60 ultra 80 workstations 250 replaced sun fire v250 450 sun fire v880 220r superseded sun fire 280r 420r sun fire v480 1996 sun replaced sparcserver 1000e sparccenter 2000e models ultra enterprise 3000 4000 5000 6000 servers multiprocessor servers based common hardware architecture incorporating gigaplane packet-switched processor/memory bus ultrasparc-i ii processors high availability fault-tolerance features included x000 systems intended mission-critical applications 3000 model deskside server configurable six processors 10 internal disks 4000 rack-mount system 14 processors 5000 essentially 4000 rack cabinet 6000 cabinet-housed data center server 30 processors 1999 enterprise 3500 4500 5500 6500 models announced upgraded x000 systems faster gigaplane bus 100 mhz depending processor clock speed compared 83 mhz 3500 also differs 3000 additional gigaplane slot resulting increased maximum eight processors enterprise x500 series replaced sun fire 3800/4800/6800 line enterprise 10000 e10k starfire development code name also used marketing purposes high-end multiprocessor data center server capable configured 64 ultrasparc ii processors largely designed cray research business systems division successor cray superserver 6400 related sun earlier sun-4d architecture servers cray acquired silicon graphics 1996 division sold sun launched starfire ultra enterprise 10000 1997 starfire based around fault-tolerant gigaplane-xb processor/memory interconnect like x000 x500 series servers starfire incorporates many high-availability features including ability partitioned multiple domains booted individually run instance solaris also possible remove resources running domain short notice reassign freed resources domains domain granularity one cpu board single system may 1-16 single cpu board carry 4 processors 4gb ram 4 sbus io boards rare option replace 4 sbus boards dual pci boards starfire first server vendor exceed 2000 tpc-d 300 gb benchmark starfire systems used number high-profile customers dot-com boom notably ebay typically sold well 1 million fully configured system starfire contains one two controller modules connected via ethernet external computer system service processor ssp controller modules interface system centerplane via jtag control partitioning available cpus memory i/o devices one domains effect distinct computer system partitioned booted without original ssp contains encrypted keys issued manufacturer e10k preserved computer history museum mountain view starfire superseded sun fire 12k/15k models
[ 6329, 1254, 1160, 1258, 2992, 1923, 1263, 6505, 6270, 908, 7535, 1185, 1937, 4418, 2033, 3294, 3026, 4515, 4967, 7010, 5587, 1023, 418, 7114, 1590, 3820, 8138, 4999, 3673, 5705, 8145, 7781, 971 ]
Test
2,300
2
WatchOS:watchos watchos operating system apple watch developed apple inc based ios operating system many similar features released april 24 2015 along apple watch device runs watchos api called watchkit second version watchos 2 included support native third-party apps improvements released september 21 2015 third version watchos 3 released september 13 2016 emphasizing better performance including new watch faces stock apps fourth version watchos 4 released september 19 2017 fifth version watchos 5 released september 17 2018 adding third-party support new workouts along “ walkie-talkie ” feature sixth version watchos 6 announced june 3 2019 home screen rendered also known carousel composed circular application icons zoomed digital crown dragged launched touching display many apps miniaturized simplified versions ios counterparts prior watchos 3 glances provided fast access summarized view popular native third party applications used apple watch glances view opened swipe gesture watch face screen watchos 3 glances replaced redesigned control center much like one ios friends menu invoked side button acts dedicated dock apps different actions options appear depending user taps deep presses apple watch detects pressure-sensitive force touch display several years apple developing healthkit product bid change way people interact devices also conscious attempt penetrate lucrative healthcare wellness industry many observers believe hold huge growth opportunity apple confirmed jony ive apple chief designer interview said health crucial element apple watch since day inception developmental trajectory hardware watchos geared towards health-based capabilities ive pointed one primary apps shipped first watchos allowed users track communicate well encourage move exercise stand said many us phones us time ’ connected imagine something powerful times opportunities might present user opportunity phenomenal particularly ’ understand today terms technology capability headed.one recent updates watchos included applications keep users active also diagnose illnesses example app called deepheart deep learning network detect atrial fibrillation hypertension sleep apnea diabetes taps healthkit platform collect data particularly collected apple watch heart sensor watchos 5 first shown public san jose wwdc developer conference held apple instant watch-to-watch walkie-talkie mode first version watchos support first generation apple watch apple announced new version watchos contain features app store calculator tip tools audiobooks app apple voice memos app
[ 4297, 13, 4320, 2926, 5752, 4344, 5760, 4347, 1493, 2954, 65, 5786, 5787, 4376, 1522, 7242, 4397, 3001, 4400, 1547, 120, 126, 4423, 3025, 1574, 1582, 5859, 4441, 5865, 3050, 4447, 163, 4453, 1599, 7308, 1614, 4478, 7335, 190, 191, 3097,...
Test
2,301
9
IBM_System/36_BASIC:ibm system/36 basic ibm system/36 basic interpreter ibm system/36 midrange computer system/36 basic first offered 1983 contained many trappings basic program would encountered time period ibm pc commodore 64 vic-20 trs-80 many offerings seventies early eighties s/36 basic uses conventions longer standard modern basics line numbers support newer features while/wend do/enddo with/end procedures properties forth basic interpreters written seventies tended odd things odd ways example apple ii programmer could embed command program via print prefaced character string chr 4 peek poke could used various basics examine memory content change even create ad hoc machine language program run system/36 basic tends stay away odd conventions however programmer could call alarm buzzing sound made terminal via print chr 7 basic statements expected entered capital letters operator press cmd2 use lowercase basic interpreter convert non-comment keywords uppercase basic could useful midrange computing environment ibm added extensions language specific hardware software conventions ibm system/36 family workstn file support indexed direct sequential disk files ability open close multiple printer files load/save libraries fixed disk core basic statements functions commands used advanced ibm-supplied statements included error error-trapping statement allows basic suspend error might otherwise stop basic program running perform error-handling routine instead variants include suffixing oflow zdiv error types statement immediately trap errors option allows basic program meet special criteria sometimes basic much user space since s/36 programs limited 64k area called code space contains current user program must reside within user space therefore users could choose option lprec causes basic compute double-precision long numerics option sprec provides space single-precision short numerics programmers prefer matrix mathematics lowest-numbered index 0 others prefer 1 option base 0 option base 1 accomplish uses option rpg ii programs s/34 s/36 could call basic programs could using chain statement chain passes control current basic module named module bearing list arguments become variables new module loaded def fn allows definition user function basic named referred program fnend placed last statement function four ways format basic input output first unformatted print input heart content second print using s/36 basic incorporate constant string variable line number label third print fields input fields place 5250-type display fields crt immediate mode fourth using workstation file opened open x ws name= forth performing various combinations write read workstation file using sda-generated screen formats similar s/36 applications write read well print using input using direct basic line number label contains keyword image image statement contains decimals commas dollar signs dashes pound signs representation substituted numeric alphameric values form statement denotes size variables read written save numeric value .00 99,999.99 use notation label tag line follows desired statement gosub begin_calculations used instead gosub 260 open close write rewrite delete append already familiar cobol programmers describe actions taken access s/36 disk files using basic n't possible access every single type s/36 file include system files libraries folders every user-created s/36 file fixed record length fortran programs use variable record lengths suffice disk files opened sequentially index relatively record number file delete-capable records deleted using delete statement add record use write append specified open statement update use rewrite s/36 basic print printer device file must used default printer file called 255 always exists basic started printer name basic255 opens device default printer terminal begins basic session desired possible create different printer file numbered 1 254 use open x printer name= forth specifying columns device id parameters needed pageoflow keyword used trap page overflow condition printer versions basic allow programmer sort array s/36 basic n't provide function provide interesting remedy programmer define array number elements target array use aidx didx create ascending descending index element new array contain number representing ordinal sorted position target array america sixth element array first alphabetical order setting didx would cause 6 contain value 1 writing basic program much fun rewriting program time use therefore authors basic allow programmers save program code library member replace changes made save prog1 pgmrlib causes current module saved subroutine member type r named prog1 user library named pgmrlib note system/36 files part libraries disk file named fnf001 open statement like one work n't matter library used access file fnf001 renumber s/36 basic command used renumber statements internal references statement numbers immediately recalculated system/36 basic dangerous command called free typing free followed filename deletes file without trace work every user file unless conflict security in-use condition blocks system/36 basic another dangerous command called lock lock command make current program source code inaccessible reversible always save unlocked copy using lock system/34 basic system/36 basic similar however machine code incompatibility makes impossible port subroutine member basic program systems see also square root 2 pi π solution solution published mainframes 1980s 1990s
[ 6778 ]
Test
2,302
8
Renewables.ninja:renewables.ninja renewables.ninja web tool developed imperial college london eth zürich shows estimate amount energy could generated wind solar farms location model tested iain staffell codeveloper renewables.ninja centre environmental policy imperial college london stefan pfenninger eth zürich estimate productivity wind farms planned construction europe next 20 years german electrical supplier rwe using test models output
[ 84 ]
Test
2,303
4
Christopher_Soghoian:christopher soghoian christopher soghoian born 1981 privacy researcher activist currently working senator ron wyden senator ’ senior advisor privacy cybersecurity 2012 2016 principal technologist american civil liberties union soghoian nephew sal soghoian former automation product manager apple inc. responsible applescript automator soghoian holds british us nationality received b.s james madison university computer science 2002 masters johns hopkins university security informatics 2005 phd indiana university informatics 2012 dissertation focused role third-party internet telecommunications service providers play facilitating law enforcement surveillance customers soghoian visiting fellow yale law school information society project ted senior fellow previously open society foundations fellow student fellow berkman center internet society harvard university soghoian research advocacy largely focused government surveillance research shed significant light use sophisticated surveillance technologies us law enforcement agencies exposing techniques public debate criticism august 2013 presentation hacker conference def con soghoian highlighted existence dedicated fbi team delivers malware computers mobile devices surveillance targets presentation soghoian stated discovered team reading heavily redacted government documents looking profiles ex-fbi contractors social network website linkedin october 2014 soghoian called attention fact fbi 2007 impersonated associated press effort deliver malware teenager washington state threatened bomb high school act deception strongly condemned leading news organizations including general counsel associated press february 2012 public speech soghoian criticized commercial market called zero-day security vulnerabilities topic yet receive significant attention mainstream press one month later soghoian quoted forbes lengthy article zero day market describing firms individuals sell software exploits “ modern-day merchants death ” selling “ bullets cyberwar. ” next several years several major media outlets published front-page stories industry often quotes soghoian criticizing providing hacking software governments december 2009 employee federal trade commission soghoian secretly audio recorded closed-door surveillance industry conference agency inspector general opened investigation soghoian conduct subsequently let go ftc recording executive sprint nextel revealed company created special website law enforcement agents obtain gps information subscribers website used process 8 million requests previous year recording subsequently cited alex kozinski chief judge ninth circuit court appeals u.s. v. pineda-moreno support view 1984 may come bit later predicted last june 2009 soghoian co-authored open letter google 37 prominent security privacy experts urging company protect privacy customers enabling https encryption default gmail cloud based services january 2010 google enabled https default users gmail subsequently products including search according google already considering https default soghoian recent years continued https advocacy calling news media law firms government agencies organizations encrypt websites may 2011 soghoian approached public relations firm burson-marsteller asked write anti-google op-ed criticizing company privacy issues associated social search product soghoian refused instead published email conversation subsequent investigation journalists revealed pr firm refused identify client soghoian retained facebook may 2011 soghoian filed complaint ftc claimed online backup service dropbox deceiving customers security services soon soghoian first publicly voiced concerns dropbox updated terms service privacy policy make clear company fact encrypt user data key known user company disclose users private data forced law enforcement agencies october 2010 soghoian filed complaint ftc claimed google intentionally leaking search queries sites users visited clicked link search results page two weeks later law firm filed class action lawsuit google practice lawsuit extensively quoted soghoian ftc complaint october 2011 google stopped leaking search queries sites users visited 2015 company settled search query leakage class action lawsuit 8.5 million dollars 2009 2010 worked us federal trade commission first ever in-house technical advisor division privacy identity protection ftc assisted investigations facebook twitter myspace netflix soghoian first gained public attention 2006 creator website generated fake airline boarding passes october 26 2006 soghoian created website allowed visitors generate fake boarding passes northwest airlines users could change boarding document name flight number city wished generator defaulted creating document osama bin laden soghoian claimed motivation website focus national attention ease passenger could evade no-fly lists information describing security vulnerabilities associated boarding pass modification widely publicized others including senator charles schumer d-ny security expert bruce schneier october 27 2006 then-congressman edward markey called soghoian arrest 2 october 28 2006 home raided agents fbi seize computers materials soghoian internet service provider voluntarily shut website received letter fbi claiming site posed national security threat october 29 2006 congressman markey issued revised statement stating soghoian go jail instead department homeland security put work fix boarding pass security flaws fbi closed criminal investigation november 2006 without filing charges tsa june 2007
[ 907, 1243, 1480 ]
Validation
2,304
1
SQL_programming_tool:sql programming tool field software sql programming tools provide platforms database administrators dbas application developers perform daily tasks efficiently accurately database administrators application developers often face constantly changing environments rarely completely control many changes result new development projects modifications existing code deployed production always produce expected result organizations better manage development projects teams develop code suppliers sql programming tools normally provide facility database administrator application developer aid database management quality code-deployment practices sql programming tools may include following features sql editors allow users edit execute sql statements may support following features tools may display information database objects relevant developers database administrators users may tools also provide features display dependencies among objects allow users expand dependent objects recursively example packages may reference views views generally reference tables super/subtypes database administrators application developers use session browsing tools view current activities user database check resource-usage individual users statistics information locked objects current running sql individual session dbas create edit delete disable enable user-accounts database using security-management tools dbas also assign roles system privileges object privileges storage-quotas users tools offer features debugging stored procedures step step step run exception breakpoints view set variables view call stack users debug program-unit without making modification including triggers object types monitoring tools may show database resources — usage summary service time summary recent activities top sessions session history top sql — easy-to-read graphs database administrators easily monitor health various components monitoring instance application developers may also make use tools diagnose correct application-performance problems well improve sql server performance test data generation tools populate database realistic test data server client side testing purposes also kind software upload sample blob files database
[ 1449, 6345, 6386, 3776, 5449 ]
Test
2,305
3
OpenPIC_and_MPIC:openpic mpic order compete intel advanced programmable interrupt controller apic enabled first intel 486-based multiprocessor systems early 1995 amd cyrix proposed somewhat similar-in-purpose openpic architecture supporting 32 processors openpic architecture least declarative support ibm compaq around 1995 x86 motherboard released openpic however openpic failure x86 market amd licensed intel apic architecture amd athlon later processors ibm however developed multiprocessor interrupt controller mpic based openpic register specification reference ibm design processors share mpic dcr bus access bus controlled dcr arbiter mpic supports four processors 128 interrupt sources various implementations mpic included powerpc reference designs retail computers ibm used mpic based openpic 1.0 rs/6000 f50 one based openpic 1.2 rs/6000 s70 systems also used dual 8259 pci-isa bridges ibm mpic also used rs/6000 7046 model b50 apple hydra mac i/o mio chip 1990s classic mac os era implemented mpic alongside scsi controller adb controller geoport controller timers apple implementation open pic apple documentation era spells first mio chip common hardware reference platform based version 1.2 register specification supported two processors 20 interrupt sources mpic also incorporated newer k2 i/o controller used power mac g5s freescale also uses mpic compatible open pic powerquicc qoriq processors linux kernel-based virtual machine kvm supports virtualized mpic 256 interrupts based freescale variants
[ 405, 5884, 5622, 2332 ]
Test
2,306
6
Free_space_bitmap:free space bitmap free-space bitmaps one method used track allocated sectors file systems simplistic design highly inefficient advanced hybrid implementations free space bitmaps used modern file systems simplest form free space bitmap bit array i.e block bits example zero would indicate free sector one indicates sector use sector would fixed size explanatory purposes use 4 gib hard drive 4096 byte sectors assume bitmap stored elsewhere example disk would require 1,048,576 bits one sector 128 kib increasing size drive proportionately increase size bitmap multiplying sector size produce proportionate reduction operating system os needs write file scan bitmap finds enough free locations fit file 12 kib file stored example drive three zero bits would found changed ones data would written across three sectors represented bits file subsequently truncated 8 kib final sector bit would set back zero indicating available use drive size grows amount time needed scan free space become unreasonable address real world implementations free space bitmaps find ways centralize information free space one approach split bitmap many chunks separate array stores number free sectors chunk chunks insufficient space easily skipped total amount free space easier compute finding free space entails searching summary array first searching associated bitmap chunk exact sectors available approach drastically reduces cost finding free space n't help process freeing space combined size summary array bitmap greater readily stored memory large number files scattered sectors freed enormous amount disk access necessary find sectors decrement summary counter flip bits back zero greatly reduces benefits bitmap longer performing function summarizing free space rapidly without reading disk
[ 5562, 6117, 1670, 5571, 2350, 5660, 2710 ]
Test
2,307
4
Hillar_Aarelaid:hillar aarelaid hillar aarelaid born december 31 1967 founder first ceo estonia computer emergency response team cert-ee director general estonian data protection inspectorate 1999 2003 aarelaid one central officials charge responding computer attacks estonia bronze soldier tallinn controversy american expert bill woodcock observers praised aarelaid calm professionalism displayed attacks
[ 2273 ]
Train
2,308
8
WebMacro:webmacro webmacro framework developing java servlets enforces model-view-controller framework project allowing clean separation concerns design particular webmacro keeps program source code absolutely separate presentation html code webmacro open source software webmacro initially created designed justin wells semiotek inc. mid-2000 project taken team sourceforge extensive discussions webmacro java servlet-interest mailing list time may influential sun microsystems decision move java server pages product model-view-controller architecture webmacro also used generate arbitrary text output templates one uses automated code generation template language similar language used apache velocity automated script perform migration apache velocity project started clean room re-implementation jon scott stevens geir magnusson jason van zyl agreement could reached adoption apache license current version webmacro bsd licensed
[]
Test
2,309
9
William_A._Martin:william a. martin william arthur martin 1938-1981 computer scientist oklahoma city oklahoma graduating northwest classen high school state wrestling champion attended mit received bachelor degree 1960 master 1962 ph.d. 1967 electrical engineering supervision marvin minsky dissertation symbolic mathematical laboratory obtaining degrees worked teaching assistant mit beginning 1960 became assistant professor 1968 promoted associate professor electrical engineering 1972 1975 received academic tenure held joint appointment mit sloan school management research pulled towards project mac became laboratory computer science artificial intelligence laboratory researched expert systems finishing ph.d. dissertation symbolic mathematics martin co-founded macsyma project 1968 directed 1971 macsyma later became successful commercial product also core free maxima system martin worked automatic programming knowledge representation natural language processing
[ 5429 ]
Test
2,310
4
Data-centric_security:data-centric security data-centric security approach security emphasizes security data rather security networks servers applications data-centric security evolving rapidly enterprises increasingly rely digital information run business big data projects become mainstream data-centric security also allows organizations overcome disconnect security technology objectives business strategy relating security services directly data implicitly protect relationship often obscured presentation security end common processes data-centric security model include technical point view information data -centric security relies implementation following data access control selective restriction access data accessing may mean viewing editing using defining proper access controls requires map information resides important important sensitive data designing appropriate controls encryption proven data-centric technique address risk data theft smartphones laptops desktops even servers including cloud one limitation encryption always effective network intrusion occurred cybercriminals operate stolen valid user credentials data masking process hiding specific data within database table cell ensure data security maintained sensitive information exposed unauthorized personnel may include masking data users developers third-party outsourcing vendors etc data masking achieved multiple ways duplicating data eliminate subset data needs hidden obscuring data dynamically users perform requests monitoring activity data layer key component data-centric security strategy provides visibility types actions users tools requested authorized specific data elements continuous monitoring data layer combined precise access control contribute significantly real-time detection data breaches limits damages inflicted breach even stop intrusion proper controls place 2016 survey shows organizations still n't assess database activity continuously lack capability identify database breaches timely fashion cloud computing evolving paradigm tremendous momentum unique aspects exacerbate security privacy challenges heterogeneity diversity cloud services environments demand fine-grained access control policies services flexible enough capture dynamic context attribute-based access requirements data protection recent decades many organizations rely managing database services public clouds amazon web services oracle cloud google cloud platform microsoft azure organize data approach limitations users managing security sensitive data instance hardware security appliances agents running database servers longer option requires innovative ways secure data databases using reverse proxy sitting clients applications database servers requirements supporting load balancing high availability fail-over data-centric security brings additional challenges database security vendors must meet
[ 623, 3932, 6694, 2988, 3767, 6515, 3681, 3448, 2105, 1461, 651, 2566, 2747, 5485, 1376, 6725, 3794, 5401, 6823, 2491, 3884, 5149, 6376, 3726, 5064, 1584, 4440, 6756, 3486, 2961, 2789, 74, 7865, 7139, 7319, 3680, 1805 ]
Test
2,311
9
Parametricity:parametricity programming language theory parametricity abstract uniformity property enjoyed parametrically polymorphic functions captures intuition instances polymorphic function act way consider example based set x type x x → x functions x higher-order function twice x → x given twice f f ∘ f intuitively independent set x family functions twice parametrized sets x called parametrically polymorphic function simply write twice entire family functions write type formula_1 x x → x individual functions twice called components instances polymorphic function notice component functions twice act way given rule families functions obtained picking one arbitrary function x → x would uniformity called ad hoc polymorphic functions parametricity abstract property enjoyed uniformly acting families twice distinguishes ad hoc families adequate formalization parametricity possible prove parametrically polymorphic functions type formula_1 x x → x one-to-one natural numbers function corresponding natural number n given rule f formula_3 f i.e. polymorphic church numeral n contrast collection ad hoc families would large set parametricity theorem originally stated john c. reynolds called abstraction theorem paper theorems free philip wadler described application parametricity derive theorems parametrically polymorphic functions based types parametricity basis many program transformations implemented compilers haskell programming language transformations traditionally thought correct haskell haskell non-strict semantics despite lazy programming language haskell support certain primitive operations—such operator codice_1—that enable so-called selective strictness allowing programmer force evaluation certain expressions paper free theorems presence seq patricia johann janis voigtlaender showed presence operations general parametricity theorem hold haskell programs thus transformations unsound general
[ 7152, 4573, 3895, 3499, 8097 ]
Test
2,312
4
Trust_service_provider:trust service provider trust service provider tsp person legal entity providing preserving digital certificates create validate electronic signatures authenticate signatories well websites general trust service providers qualified certificate authorities required european union switzerland context regulated electronic signing procedures term trust service provider coined european parliament european council important relevant authority providing non-repudiation regulated electronic signing procedure first brought electronic signatures directive 1999/93/ec initially named certification-service provider directive repealed eidas regulation became official july 1 2016. ref name= 1999/93/ec /ref regulation binding legislative act requires eu member states follow trust service provider responsibility assure integrity electronic identification signatories services strong mechanisms authentication electronic signatures digital certificates eidas defines standards trust service providers perform services authentication non-repudiation regulation provides guidance eu member states trust service providers shall regulated recognized trust service defined electronic service entails one three possible actions first may concern creation verification validation electronic signatures well time stamps seals electronically registered delivery services certifications required services second action entails creation verification well validation certificates used authenticate websites third action preservation electronic signatures seals related certificates elevated level qualified trust service service must meet requirements set eidas regulation trust services provide trust framework facilitates continued relations electronic transactions conducted participating eu member states organizations qualified trust service provider plays important role process qualified electronic signing trust service providers must given qualified status permission supervisory government body provide qualified digital certificates used create qualified electronic signatures eidas requires eu maintain eu trust list lists providers services received qualified status trust service provider entitled provide qualified trust services eu trust list trust service providers eu trust list required follow strict guidelines established eidas need provide stamps valid time date creating certificates signatures expired certificates need revoked immediately eu obliges trust service providers deliver appropriate training personnel employed trust service provider shall provide tools software hardware trustworthy capable preventing forgeries certificates produced one major intents eidas facilitate public business services especially conducted parties across eu member state borders transactions safely expedited means electronic signing services provided trust service providers regards ensuring integrity signatures eu member states required eidas establish “ points single contact ” pscs trust services ensure electronic id schemes used cross-board public sector transactions including exchange access healthcare information across borders advanced electronic signature legally binding eidas qualified electronic signature created qualified trust service provider carries higher probative value used evidence court signature ’ authorship considered non-repudiable authenticity signature easily challenged eu member states obligated accept qualified electronic signatures created qualified certificate member states valid according eidas regulation i.e article 24 2 signature created qualified certificate legal value handwritten signature court standards evolving additional standards including policy definitions trust service providers development european telecommunication standards institute etsi swiss digital signing standard zertes defined comparable concept certificate service providers certificate service providers need audited conformity assessment bodies appointed schweizerische akkreditierungsstelle united states nist digital signature standard dss current release know anything comparable qualified trust service provider would allow enhance non-repudiation signatory qualified certificate however authors forthcoming review commentators publicly discussing amendment similar eidas zertes approach trusted service provision allow stringent non-repudiable global transactions legal relevance international harmonization would required several research institutes associations expressed concern respect establishment small group centralized trust service providers per country authenticate digital transactions state construct may negative impact privacy given central role trust service providers many transactions council european professional informatics societies cepis fears trust service providers would gain collect information distinguishing attributes citizens subject authentication regard requirement preserve data resulting expected efforts keep evidence potential liability requests inaccurate id cepis sees risk trust service providers could create store log entries authentication processes information gained allows monitoring profiling involved citizens transaction counterpart also identifies user interests communication behaviour additionally sharpen profiles gained big data analysis would allow far-reaching insights citizens privacy relationships direct connection qualifying governmental bodies could allow gain access gained data profiles authors claim truly take advantage secure seamless cross-border electronic transactions assurance levels definitions technical deployment need specified precisely
[ 4945, 363, 3963, 5596, 7290, 1037, 3794, 2287 ]
Validation
2,313
6
Global_file_system:global file system computer science global file system historically referred distributed virtual name space built set local file systems provide transparent access multiple potentially distributed systems global file systems properties blocking interface buffering etc guaranteed path name corresponds object computers deploying filesystem also called distributed file systems file systems rely redirection distributed systems therefore latency scalability affect file access depending target systems reside andrew file system attempted solve campus environment using caching weak consistency model achieve local access remote files recently global file systems emerged combine cloud object storage versioning local caching create single unified globally accessible file system rely redirection storage device serves files local cache maintaining single file system meta data object storage described google patents advantages global file systems include ability scale object storage use snapshots stored object storage versioning replace backup create centrally managed consolidated storage repository object storage
[ 3599, 2547, 7161, 4672, 3626, 6117, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1254, 1624, 5900, 4480, 4855, 7718, 2...
Validation
2,314
3
Moonsound:moonsound moonsound name sound card released msx home-computer system tilburg computer fair 1995 name moonsound originated software moonblaster written people use hardware plug-in synthesizer moonsound sound-card produced msx home-computer system based yamaha ymf278 opl4 sound chip capable 18 channels fm sound well 24 channels 12 16 bit sample-based synthesis arrived us branch microsoft abandoned msx system focusing ibm pc 2 mb instrument rom containing multisampled instruments unusual time factory came equipped one 128 kb sram chip user samples designed electronic engineer henrik gilvad produced sunrise swiss semi-hobby basis two generations made first small size pcb without box later larger size pcb fit msx cartridge available later version room two sample sram chips resulting 1 mb compressed user samples moonblaster software designed remco schrijvers based time-step sequencer software msx sound cards moonblaster came two versions one fm one sample-based synthesis later marcel delorme took software development sound effects like chorus delay reverb omitted due cost size usability reasons yamaha effect chip requires specialised memory effect routing basic 18 fm channels 24 channels sample-based sound shares effect setting creative step-time sequencer programmers made pseudo effects like chorus reverb delay overdubbing using dedicated channels repeat notes delay stereo panning effective quickly reduces musical complexity possible moonsound version 1.0 1 socket user sample ram moonsound version 1.1 1.2 2 sockets 1mb sram hackers found stack 2 additional sram chips resulting 2mb sram based opl4 chip moonsound compatible fm register opl1 opl2 opl3 msx-audio contains chip also compatible opl1 therefore older software make use moonsound 2 mb rom contained 330 mono samples mostly 22.050 khz 12 bits drums 44.1 khz fm part opl4 chip configured several ways four-operator fm allows complex sounds reduces polyphony eight waveforms available fm synthesis moonsound audio power supply isolated digital supply attempt reduce noise separate stereo audio output mixed internal msx sound additional software tools able rip sound loops digitally audio cds inserted cd-rom drive connected scsi ata-ide interfaces software designed henrik gilvad msx club gouda sunrise swiss today moonsound emulated msx emulators bluemsx openmsx
[ 2023 ]
Test
2,315
9
John_Ousterhout:john ousterhout john kenneth ousterhout born october 15 1954 professor computer science stanford university founded electric cloud john graham-cumming ousterhout professor computer science university california berkeley created tcl scripting language tk platform-independent widget toolkit proposed idea coscheduling ousterhout also led research group designed experimental sprite operating system first log-structured file system ousterhout author magic vlsi computer-aided design cad program received bachelor degree physics yale university 1975 ph.d. computer science carnegie mellon university 1980 ousterhout received grace murray hopper award 1987 work cad systems very-large-scale integrated circuits work inducted 1994 fellow association computing machinery ousterhout member national academy engineering 1994 ousterhout left berkeley join sun microsystems laboratories hired team join tcl development several years sun left co-founded scriptics inc. later renamed ajuba solutions january 1998 provide professional tcl development tools tcl team followed sun ajuba purchased interwoven october 2000 joined faculty stanford university 2008
[ 3930, 2633, 5106, 6977, 6263, 908, 486, 6285, 2129, 1116, 851, 6472, 242, 7758, 5621 ]
Validation
2,316
3
Jack_Nicklaus'_Greatest_18_Holes_of_Major_Championship_Golf:jack nicklaus greatest 18 holes major championship golf jack nicklaus greatest 18 holes major championship golf golf-simulation video game developed sculptured software published accolade beginning 1988 released amiga amstrad cpc apple ii atari st commodore 64 c64 ms-dos macintosh msx nintendo entertainment system nes pc-88 sharp x68000 1990 1991 game released hucard cartridge cd-rom formats u.s turbografx-16 foreign counterpart pc engine turbografx-16 versions game titled jack nicklaus turbo golf pc engine version titled jack nicklaus world golf tour cd-rom format game boy version released jack nicklaus golf 1992 first series golf games named golfer jack nicklaus followed jack nicklaus unlimited golf course design 1990 game features jack nicklaus favorite 18 golf holes put together single course includes holes augusta national golf club muirfield pebble beach golf links royal lytham st annes golf club old course st andrews two courses designed nicklaus also featured game castle pines colorado desert mountain arizona additionally game boy version includes muirfield village course several add-on disks released computer versions add additional courses game features two game modes stroke play skins multiplayer option allows maximum total four players able play player also compete selection eight different cpu players includes jack nicklaus image nicklaus also appears holes gives tips player jack nicklaus turbo golf turbografx-16 differs versions cd-rom format game five courses including castle pines courses previously featured game early add-on disks australian golf club royal troon golf club kemper lakes golf club st. creek golf club cd-rom version allows player take 360-degree look around courses nicklaus appears courses give advice hole hucard cartridge version jack nicklaus turbo golf includes one course australian golf club includes eight golfer rivals well jack nicklaus accolade began publishing jack nicklaus greatest 18 holes major championship golf 1988 longest title software product time release august 1989 versions released united kingdom commodore 64 pc versions amiga amstrad cpc atari st scheduled release autumn apple ii version released late 1989 1990 macintosh version published accolade nes version published konami released united states march 1990 united kingdom release came august 1991 versions also released msx pc-88 sharp x68000 u.s. turbografx-16 game released jack nicklaus turbo golf hucard cd-rom formats game also released turbografx-16 foreign counterpart pc engine cd-rom format pc engine version published title jack nicklaus world golf tour game hucard format retained original jack nicklaus greatest 18 holes major championship golf title jack nicklaus turbo golf foreign counterparts released 1990 1991 game boy version jack nicklaus golf released united states may 1992 published tradewest along unrelated game title super nes computer versions game received criticism slow load times generating new screen criticized computer version including off-disc copy protection scheme deemed difficult use critics favorably compared game leader board golfing game series praise given graphics amiga amstrad cpc commodore 64 versions amstrad action called cpc version beyond shadow doubt best golf sim ever cpc however magazine also wrote game would immediately appeal golf fans people played computer golf games stating limitations unfairly cripple game popularity – crime entertaining well-programmed sports sim cu amiga-64 praised amiga version gameplay critical minimal sounds putting agonisingly slow computer golfer opponent zzap 64 reviewed commodore 64 version criticized sound effects well blocky scenery unusual color schemes games machine reviewing cpc st versions criticized blocky scenery murky colors well simple sound effects poorly animated golfer sprites reviewing amiga version magazine praised digitized image jack nicklaus appears holes criticized rest graphics tom malcom .info reviewed commodore 64 version called graphics adequate sound abominable concluded game overall good choice malcom subsequently reviewed amiga version praised gameplay felt graphics could also wished option turn jack nicklaus advice hole stating slowed gameplay considerably bob wade amiga format praised sound tony hetherington amiga criticized bad putting controls called game perfectly playable competently programmed still considered bland amiga action praised game recommended considered leader board superior amiga user international recommended game people already purchased mean 18 similar golf game also accolade dan muse incider praised apple ii version new standard computer golf games best sports game period regarding image nicklaus appears holes muse wrote okay little corny like michael dashe macworld praised macintosh version graphics realistic gameplay variety courses nes turbografx-16 versions also criticized slow reanimation raze reviewed nes version stated easy gameplay fun play people rather alone mean machines criticized nes version blocky scenery stating hampered gameplay magazine also criticized golfer sprite average sound effects lack music concluded tedious golf sim die-hard fans genre take chance chicago sun-times reviewing one game versions wrote great golfing enthusiasts good new golf chip jonathan carter writing philadelphia daily news reviewed turbografx-16 cartridge version stated additional courses would nice although praised gameplay graphics gamepro reviewed turbografx-16 cd-rom version recommended game golf fans criticized slow reanimation stated game offer much distinguish golf games
[ 6380 ]
Test
2,317
8
BigQuery:bigquery bigquery restful web service enables interactive analysis massive datasets working conjunction google storage serverless platform service paas may used complementarily mapreduce limited testing period 2010 bigquery generally available november 2011 google atmosphere conference april 2016 european users service suffered 12-hour outage may 2016 support announced google sheets bigquery provides external access dremel technology scalable interactive ad hoc query system analysis read-only nested data bigquery requires requests authenticated supporting number google-proprietary mechanisms well oauth
[ 2902, 5372, 6427, 6806, 3627, 2212, 2569, 3309, 7924, 2591, 5064, 7571, 5775, 2961, 6153, 1514, 5455, 2988, 7613, 4762, 7967, 6176, 5476, 831, 5135, 5141, 3028, 136, 2673, 842, 7285, 2683, 855, 6937, 2700, 168, 6950, 5534, 2712, 1247, 5...
Validation
2,318
4
JIT_spraying:jit spraying jit spraying class computer security exploit circumvents protection address space layout randomization aslr data execution prevention dep exploiting behavior just-in-time compilation used exploit pdf format adobe flash just-in-time compiler jit definition produces code data since purpose produce executable data jit compiler one types programs run no-executable-data environment jit compilers normally exempt data execution prevention jit spray attack heap spraying generated code produce exploit code jit idea dion blazakis used input program usually javascript actionscript typically contains numerous constant values erroneously executed code example xor operation could used jit transform bytecode native x86 code like attacker uses suitable bug redirect code execution newly generated code example buffer overflow use free bug could allow attack modify function pointer return address causes cpu execute instructions way unintended jit authors attacker usually even limited expected instruction boundaries possible jump middle intended instruction cpu interpret something else non-jit rop attacks may enough operations usefully take control computer continuing example jumping second byte mov instruction results inc instruction computer hardware allows jumping middle instruction includes x86 x86-64 arm although especially effective type hardware jit spraying works systems well protect jit spraying jit code disabled made less predictable attacker
[ 6002, 1363, 1019, 2289, 2451, 755, 8064, 352, 6015, 3635, 1265, 1805 ]
Validation
2,319
4
FIDO2_Project:fido2 project fido2 project joint effort fido alliance world wide web consortium w3c whose goal create strong authentication solution web core fido2 consists w3c web authentication webauthn standard fido client authenticator protocol ctap fido2 based upon previous work done fido alliance particular universal 2nd factor u2f authentication standard taken together webauthn ctap specify standard authentication protocol protocol endpoints consist user-controlled cryptographic authenticator smartphone hardware security key webauthn relying party also called fido2 server web user agent i.e. web browser together webauthn client form intermediary authenticator relying party single webauthn client device may support multiple webauthn clients example laptop may support multiple clients one conforming user agent running laptop conforming user agent implements webauthn javascript api name implies client authenticator protocol ctap enables conforming cryptographic authenticator interoperate webauthn client ctap specification refers two protocol versions called ctap1/u2f ctap2 authenticator implements one protocols typically referred u2f authenticator fido2 authenticator respectively fido2 authenticator also implements ctap1/u2f protocol backward compatible u2f
[ 3490, 7380, 4412, 4133, 87 ]
Validation
2,320
4
Dshell:dshell dshell open source python-based forensic analysis framework developed u.s. army research laboratory md tool provides users ability develop custom analysis modules helps understand events cyber intrusion framework handles stream reassembly ipv4 ipv6 network traffic also includes geolocation ip-to-asn mapping connection additionally framework plug-ins designed aid understanding network traffic present results user concise useful manner since dshell written entirely python code base customized particular problems modifying existing decoder extract different information existing protocols u.s. army research laboratory arl released version dshell github social coding website december 17 2014 100 downloads 2,000 unique visitors 18 countries publicly released dshell small select community users several government organizations users could use tool tool find exact information needed network data including looking names reassembled website requests decoded malware traffic arl chose release dshell github sharing world created security teams gaining another specialized tool keep networks secure furthermore increasing security internet whole increasing number skilled eyes looking bugs potential improvements throughout code 2014 nasa released 1,000 dshell agencies national security agency national guard air force research laboratory joined shortly following year github chosen dshell allows members easily download software code store edits provide mechanism offer feedback original designer additionally rolling enhancements official version make easier share software across organizations bypassing constant emailing sending cds june 2016 users created 11,000 copies tool offered approximately 62 suggested modifications original software additional modules within dshell framework accessed increase network security however ability rapidly develop share analytical modules core strength framework
[ 5965, 7848, 3819 ]
Test
2,321
0
METEO_System:meteo system meteo system machine translation system specifically designed translation weather forecasts issued daily environment canada system used 1981 30 september 2001 environment canada translate forecasts issued french province quebec english issued english canadian provinces french since competitor program replaced meteo system open governmental bid system developed john chandioux often mentioned one success stories field machine translation meteo system operational use environment canada 1982 2001 stems prototype developed 1975-76 taum group known taum-meteo initial motivation develop prototype junior translator came taum ask help translating weather bulletins environment canada since official communications emanating canadian government must available french english official languages act 1969 weather bulletins represent large amount translation real time junior translators spend several months producing first draft translations revised seniors difficult tedious job specificities english french sublanguages used rewarding lifetime bulletin 4 hours taum proposed build prototype mt system environment canada agreed fund project prototype ready months basic integration workflow translation source target bulletins travelled telex lines time mt happened mainframe computer first version system meteo 1 went operation control data cdc 7600 supercomputer march 1977 chandioux left taum group manage operation improve taum group embarked different project taum-aviation 1977–81 benoit thouin made improvements initial prototype subsequent year turned operational system three years meteo 1 demonstrated feasibility microcomputer-based machine translation satisfaction canadian government translation bureau public works government services canada meteo 1 formally adopted 1981 replacing junior translators workflow need high quality translation revision step done senior translators maintained quality measured percentage edit operations inserting deleting word counts 1 replacing 2 mt results reached 85 1985 time mt part still implemented sequence q-systems q-systems formalism rule-based sllp specialized language linguistic programming invented alain colmerauer 1967 postdoc coopérant taum group later invented prolog language 1972 returning france becoming university professor marseille-luminy engine q-systems highly non-deterministic manipulated data structures ways simple without types string number chandioux encountered limitations efforts raise translation quality lower computation time point could run microcomputers 1981 chandioux created new sllp metalanguage linguistic applications based basic algorithmic ideas q-systems deterministic offering typed labels tree nodes following advice bernard vauquois colmerauer created gram r developed microcomputers 1982 could start developing gram r new system translating weather bulletins high-end cromemco microcomputer meteo 2 went operation 1983 software ran 48kb central memory 5mb hard disk paging meteo 2 first mt application run microcomputer 1985 system nothing left initial prototype officially renamed meteo translated 20 million words per year english french 10 million words french english quality 97 typically took 4 minutes bulletin english sent winnipeg come back french mt human revision 1996 chandioux developed special version system meteo 96 used translate weather forecasts different kinds bulletins issued us national weather service 1996 summer olympics atlanta last known version system meteo 5 dates 1997 ran ibm pc network windows nt translated 10 pages per second able fit 1.44mb floppy disk
[ 3645, 6256, 2852, 5008 ]
Test
2,322
9
J2EE_Management:j2ee management j2ee management specification java specification request jsr-77 standardization j2ee server management j2ee management specification abstracts manageable parts j2ee architecture defines interface accessing management information helps system administrators integrate j2ee servers system management environment also helps application developers create management tools scratch goal jsr 77 abstract fundamental manageable aspects j2ee architecture provide well defined model implementing instrumentation information access addition specification defines standardized api inter-operating j2ee components participate monitoring control platform ’ resources implementation jsr-77 enterprise applications done application server done web container j2ee management model specification attributes operations architecture managed objects required compliant j2ee platform implementations model designed interoperable variety industry standard management systems protocols management ejb mejb component provides interoperable remote access model j2ee application components compliant implementations must support mejb component specification also provides standard mappings model cim/wbem common information model cim snmp management information base mib implementation support snmp cim/wbem optional latest version jsr 1.1 released 08 may 2006
[ 2371, 7347, 6986, 1479, 2126, 3488, 2517, 773, 2519, 2799 ]
Validation
2,323
4
World_Reuse,_Repair_and_Recycling_Association:world reuse repair recycling association world reuse repair recycling association wr3a business consortium dedicated reform trade e-waste wr3a inspired fair trade organizations wr3a fair trade association tradename fair trade recycling reserved 2013 established improve export markets surplus electronics e-waste defend biased reporting racial profiling wr3a conceived 2006 following visit china group including usa electronics recycler american retroworks inc. university california davis recycling program director seattle recycler zero-export policy group inspired visit three china semi knock factories factories purchased usa computer monitors still functional crts crts knocked bare tube inserted new tv monitor case complete new tuner board etc wr3a founders observed western journalists reporting purchase import used crts invariably described primitive wire burning operations rather re-manufacturers often contract manufacturers originally assembled brand new crt monitors rebuilt second-hand crts usa crt refurbishing factory video display corp tucker georgia wr3a proposed form coalition usa companies export functional crt monitors directly reuse factories removing imploded damaged screen-burned older non-compliant raster e.g trinitron crts loads destined crt factories usa companies remove recycle bad 1/3 crts would benefit higher prices chinese factories would bypass sorting villages guiyu wr3a swamped orders asian factories year chinese government took new crt manufacturing capacity worldwide 1990s eventually opposed import used crts many skd factory owners relocated businesses countries indonesia malaysia thailand others relocated used monitor sourcing operations hong kong vietnam trucking crts overland chinese factories period several anti-globalist ngos began campaign end trade used electronics especially crts cbs 60 minutes economist businessweek others ran reports claiming 80 displays exported reused burned copper primitive scrapyards source 80 dumping claim later retracted eventually reuse operations asia turned re-export africa used local sources urban asian cities used crts used remanufacturing new tv monitor displays decline purchases used displays usa 2011 wr3a recognized organizational conflicts cooperative suppliers competing declining market organization refined mission 2013 emphasize anti-defamation overseas refurbishing companies promoted used electronics exports peer-reviewed fair trade agreements importers used equipment africa asia latin america consider organization defender tech sector refurbishers wr3a remains dedicated principle used computer exports outlawed outlaws export used computers organization members south america africa asia north america europe dedicated defending legitimate used electronics exporters organization considers false defamatory declarations e-waste toxics externalization 2015 2017 2018 wr3a led visits agbogbloshie district central accra bringing journalists al jazeera independent smithsonian others meet dagbani speaking translators visit led journalists discredit allegations agbogbloshie largest e-waste dump world former wetland outskirts city received hundreds sea containers full junk electronics wr3a found credible evidence dumping site exaggerated accra metropolitan association representatives interested relocating economic refugees develop property three months forced evictions used electronics processed site shown delivered carters wheelbarrows consist devices vcrs imported decades previously wr3a provided reporters world bank statistics showing domestic ghana generation accounted e-waste observed ghana recorded organization interviews ghana tech sector representatives uploaded youtube wr3a september 2013 wr3a adapted tradename fair trade recycling trademark registered uspto registered supplemental certification may 26 2015 organization claim recognized fairtrade one word april 2013 wr3a held fair trade recycling summit middlebury college vermont summit brought together researchers memorial university canada pontificia universidad catholica de peru university southern california usa massachusetts institute technology mit representatives usa international trade office basel convention secretariat interpol several used electronics importers africa asia latin america group deliberated beneficial development emerging markets electronics reuse repair labelled tinkerer blessing yuzo takahashi 2000 technology history network tinkerers. role electronics repair reverse engineering development contrasted so-called resource curse economic development natural resource exploitation middlebury students presenters discussed whether balanced approach recycling secondary materials may warranted follow meeting wr3a interpol held july 2013 november 2013 interpol announced new research program study used electronics trade continuing arrests african importers project eden debate fair trade recycling advocates anti-export organization basel action network profiled usa today september 26 2013 discovery magazine nih 2006 july 2012 memorial university newfoundland canada announced 5-year research project study map routes used electronics weee e-waste exports wr3a partner research grant along researchers universities peru california first year group document efforts develop fair trade recycling model mexico see npr pbs ap coverage research possible application model peru bangladesh china wr3a formerly adapted registered tradename fair trade recycling 2012 wr3a collaborated massachusetts institute technology publication mit january 2012 study e-waste generation exports wr3a provided researchers detailed reconciliations 3 years exports wr3a members mit compared wr3a data corroborating data isri usepa basel secretariat ghana nigeria studies may 2011 wr3a interviewed part e-waste german news magazine zdf.kultur investigated assumptions african imports primitive linked exports egypt green revolution march 2011 wr3a profiled motherboard.tv organization case reduced exports used electronics stewards unintended consequences october 2010 wr3a announced partnership basel action network reduce unnecessary breakage destruction working computer monitors california california sb20 laws followed report critical california cancellation policies published sacramento bee july 19 2010 july 30 2010 discovery news presented analysis contrasting wr3a fair trade engagement approach basel action network ban trade restriction approach abstained choosing sides. may 15 2009 national public radio npr program living earth profiled one wr3a members women cooperative tv repair recycling mexico january 2009 organization presented statistics film keynote address ces 2009 las vegas statistics demonstrated rate growth internet access much higher countries low incomes logically unlikely growth achieved new computers wr3a also presented film reuse refurbishing operations demonstrate proper recycling practices best available practices ten countries wr3a contracted consultant us environmental protection agency july 2008 publication electronic waste management united states
[ 2127 ]
Validation
2,324
2
.DS_Store:.ds store apple macos operating system .ds_store file stores custom attributes containing folder position icons choice background image name abbreviation desktop services store reflecting purpose created maintained finder application every folder functions similar file desktop.ini microsoft windows starting full stop period character hidden finder many unix utilities internal structure proprietary file .ds_store created directory folder accessed finder application even remote file systems mounted servers share files example via server message block smb protocol apple filing protocol afp remote file systems however could excluded operating system settings permissions although primarily used finder files envisioned general-purpose store metadata display options folders icon positions view settings example mac os x 10.4 tiger later .ds_store files contain spotlight comments folder files comments also stored extended file attributes finder read earlier apple operating systems finder applications created similar files root volume accessed including foreign file systems collecting settings files volume instead separate files respective folder complaints many users prompted apple publish means disable creation files remotely mounted network file systems however instructions apply local drives including usb flash drives although workarounds mac os x 10.5 .ds_store files visible remote filesystems .ds_store files impose additional burdens revision control process inasmuch frequently changed therefore appear commits unless specifically excluded .ds_store files included archives zip created os x users along hidden files directories .ds_store files known adversely affect copy operations multiple files selected file transfer copy operation retroactively cancel progress upon reaching .ds_store file forcing user restart copy operation beginning 2015 .ds_store file led leakage tcl corporation admin portal
[ 2361, 4759, 1471, 5859 ]
Test
2,325
4
Distributed.net:distributed.net distributed.net distributed computing effort attempting solve large scale problems using otherwise idle cpu gpu time governed distributed computing technologies incorporated dcti non-profit organization u.s. tax code 501 c 3 distributed.net working rc5-72 breaking rc5 72-bit key ogr-28 searching optimal 28-mark golomb ruler rc5-72 project pace exhaust keyspace 150 years although project end whenever required key found problems part series ogr part infinite series rc5 eight unsolved challenges rsa security although may 2007 rsa security announced would longer providing prize money correct key secret key challenges distributed.net decided sponsor original prize offer finding key result 2001 distributed.net estimated throughput 30 tflops 2009 throughput estimated much higher coordinated effort started february 1997 earle ady christopher g. stach ii hotjobs.com new media labs effort break rc5-56 portion rsa secret-key challenge 56-bit encryption algorithm 10,000 usd prize available anyone could find key unfortunately initial effort suspended result syn flood attacks participants upon server new independent effort named distributed.net coordinated jeffrey a. lawson adam l. beberg david c. mcnett along several others would serve board operate infrastructure late march 1997 new proxies released resume rc5-56 work began enhanced clients cow head selected icon application project mascot rc5-56 challenge solved october 19 1997 250 days correct key 0x532b744cc20999 plaintext message read unknown message time move longer key length rc5-64 challenge solved july 14 2002 1,757 days correct key 0x63de7dc154f4d039 plaintext message read unknown message things better left unread search ogrs order 24 25 26 27 completed distributed.net 13 october 2004 25 october 2008 24 february 2009 19 february 2014 respectively dnetc file name software application users run participate active distributed.net project command line program interface configure available wide variety platforms distributed.net refers software application simply client volunteers running 32-bit windows ati/amd stream enabled gpus contributed processing power rc5-72 project volunteers running 64-bit gnu/linux contributed processing power ogr-28 project portions source code client publicly available although users permitted distribute modified versions distributed.net rc5-72 ogr-28 projects available boinc client moo wrapper yoyo home projects respectively recent years work rc5-72 project submitted clients run gpu modern graphics cards although project already underway almost 6 years first gpus began submitting results march 2018 gpus represent 78 completed work units complete nearly 93 work units day
[ 584, 7442, 4159, 1440, 1505, 2566, 1256, 1237, 634, 1353, 4484, 5109, 1612 ]
Validation
2,326
2
Comparison_of_Windows_Vista_and_Windows_XP:comparison windows vista windows xp page comparison windows vista windows xp windows xp windows vista differ considerably regards security architecture networking technologies management administration shell user interface mobile computing windows xp suffered criticism security problems issues performance vista received criticism issues performance product activation another common criticism vista concerns integration new forms drm operating system user account control uac security technology windows vista faces backward compatibility problems many games utility programs work windows xp july 2008 2,000 applications specifically carried 'vista compatibility logo although majority applications without logo run without problems number low compared number programs currently work xp either natively simulation modality initial performance tests demonstrated windows xp outperforms vista several productivity areas file copy operations speculated one area vista performs better xp test run crn test center 1.25 gb file copied network share desktop xp took 2 minutes 54 seconds vista sp1 took 2 minutes 29 seconds vista implementation file copy arguably complete correct file register transferred completely transferred windows xp file completed dialogue box displayed prior file actually finishing copy transfer file completing dialogue displayed cause issue storage device ejected prior file successfully transferred copied windows xp due dialogue box premature prompt another test performed tom hardware january 2007 applications unreal tournament 2004 graphics benchmarking suite specviewperf 9.03 suffered heavily lack support opengl graphics library vista reached conclusion windows vista clearly great new performer comes executing single applications maximum speed hand find evidence windows vista desktop window manager dwm consumes energy windows xp window manager tests performed computer 2.93 ghz intel core 2 extreme x6800 processor 2× 1024 mb ddr2-800 ram radeon x1900xtx iceq3 graphics card 150 gb western digital wd1500adfd hard drive gigabyte ga-965p-dq6 motherboard scientific paper performance evaluation recent windows operating system performance concludes windows vista n't provide better overall performance high-end computer system compared windows xp performance improvements seen memory management graphics display parts os equal lower performance windows xp low-end computer system windows xp outperforms windows vista tested areas windows os network performance depends packet size used protocol however general windows vista compared windows xp shows better network performance particularly medium-sized packets security top priority windows vista development windows xp every user set administrator default unless added computer management result home users ran software administrator access however left users unwittingly open potential security threats hacking malware downloads large amount existing software ’ run well standard user due developers implementing principle least privilege design testing example many poorly written applications often assume incorrectly read write access entire filesystem system registry denying application access assumed rights cause application fail sometimes person logged standard user windows xp ca n't perform user-specific tasks changing system clock calendar changing computer time zone changing computer power management settings due so-called lua bugs user account control windows vista improves limiting application software standard user privileges administrator authorizes increase privilege level way uac prevents users making inadvertent changes system settings locks computer prevent unauthorized applications installing performing malicious actions windows vista able work around many lua bugs third party applications file registry virtualisation feature well application compatibility shims internet explorer 7 protected mode utilizes user account control isolate ie applications prevent writing content location except temporary internet files folder internet explorer 7 available xp support protected mode xp windows vista also includes windows defender spyware scanning removal tool also available windows xp free enterprise ultimate editions windows vista include bitlocker drive encryption aims help protect data case stolen devices vista implements address space layout randomization makes considerably difficult malicious code exploit return-to-libc attacks previous versions windows particularly 64-bit systems furthermore vista implements heap management enhancements make much difficult carry buffer overflow attacks 64-bit editions windows vista require kernel-mode drivers digitally signed initially making difficult rootkits install alureon managed overcome obstacle 2010 subverting master boot record firewall vista rewritten allowing outbound well inbound traffic blocked luna default visual style windows xp available three color schemes blue default olive green silver windows xp media center edition comes royale default theme editions windows vista default theme windows aero aero offers translucent window effects well live thumbnails animated transitions flip 3d however requires compatible graphics card wddm driver directx 9 support 32-bit color otherwise windows vista displayed using windows vista basic visual style
[ 5637, 6618, 4687, 1097, 7827, 3635, 924, 4880, 6823, 1019, 5850, 1670, 7570, 8118, 432, 1418, 5794, 2085 ]
Test
2,327
2
IOS_version_history:ios version history ios mobile operating system developed apple inc. iphone ipad ipod touch updates ios released itunes software since ios 5 via over-the-air software updates announcement ios 5 june 6 2011 usb connection itunes longer needed activate ios devices data synchronization happen automatically wirelessly apple icloud service major new ios releases announced yearly apple worldwide developers conference wwdc usually released september year usually coinciding release new iphone models recent stable release ios 12.4 released july 22 2019 june 3 2019 wwdc apple announced ios 13 new features include limited dark interface reworks reminders app redesign maps app recent ios 13 beta release ios 13.0 beta 7 released august 15 2019 june 2007 saw official release eventually became ios – concurrently first iphone ios official name official release iphone software development kit iphone sdk march 6 2008 apple marketing simply stated iphone ran version mac os x made specifically iphone ios introduced named iphone os officially renamed ios june 7 2010 announcement introduction ipad introduction ipad existence ipod touch meant iphone longer device run mobile operating system ios 4 first major ios release reflected name change apple licensed ios trademark cisco systems apple concurrently provides version ios comparable model iphone ipod touch usually devices released calendar year iphone users receive software updates free ipod touch users paid 2.0 3.0 major software updates ios 4 apple longer charges money ipod touch updates apple announced iphone os 1 iphone keynote january 9 2007 released public alongside original iphone june 29 2007 official name given initial release apple marketing literature simply stated iphone runs version apple desktop operating system os x release iphone os 1.1 brought support ipod touch 1st generation iphone os 1.1.5 final version iphone os 1 became unsupported 18 may 2010.what apple announce prototype code name acorn os looked like ipod classic style= background ececec padding:0 0.5em colspan= 5 |table versions iphone os 1.0.x
[ 6788, 1068, 3940, 7890, 6092, 4320, 2926, 4690, 734, 3967, 3635, 6452, 5752, 6113, 405, 3648, 6119, 755, 6125, 2954, 1123, 6479, 6847, 4003, 6142, 2609, 5787, 1895, 1897, 4014, 4376, 4377, 5091, 4749, 5450, 7601, 1912, 6165, 5101, 3001, ...
Train
2,328
8
Tricentis_Tosca:tricentis tosca tricentis tosca software testing tool used automate end-to-end testing software applications developed tricentis tricentis tosca combines multiple aspects software testing test case design test automation test data design generation analytics test guis apis business perspective two frequently-noted technologies used tricentis tosca related model-based testing risk-based testing instead using scripting test automation tricentis tosca applies model-based testing approach creates model application test technical details application test test case logic test data saved separately joined together test execution time element application test changes technical details updated central model since test cases inherit model various test cases test updated element need modified manually reflect change based risk assessment application test ’ requirements tricentis tosca uses risk-based test design suggest effective test cases identify risk contribution test cases also uses variety methodologies equivalence partitioning boundary testing combinatorial methods linear expansion try minimize number test cases increasing risk coverage tests executed tool aggregates risk coverage business technical compliance perspectives tricentis tosca features technologies gui testing api testing mobile testing service virtualization test data design generation business intelligence data warehouse testing exploratory testing sap-certified integration sap solutions used automate testing sap technologies sap s/4hana sap fiori 2.0 successfactors sap crm concur technologies sap ariba sap business information warehouse
[ 4759, 5571 ]
Test
2,329
6
MetaSAN:metasan metasan cross-platform storage area network san management software developed sold tiger technology product ceased developed company 2014 however supported end 2016. metasan enables one share one physical virtual disk devices multiple hosts using fibre channel iscsi ethernet infiniband interconnect every computer participating san could read write storage volume folder time metasan file system distributed lock manager existing ntfs hfs+ file systems hardware agnostic worked off-the-shelf storage networking components offered per-node bandwidth control aimed enable fair distribution available storage bandwidth cross-platform setup metasan provided file-system translation services allowed mac windows linux workstations transparently access non-native volumes arbitrate accesses shared storage device one computer elected master san computer became metadata controller mdc computers clients san communicated sent metadata requests mdc lan request acknowledged clients could access storage device directly metasan setup member san could act mdc default first computer boot became mdc possible define priorities assign dedicated computer task metasan superseded tiger store http //www.tiger-technology.com/products/tiger-series/tiger-store/
[ 3940, 713, 7528, 2559, 4687, 4690, 1097, 734, 7555, 3989, 2597, 3322, 6136, 1502, 5781, 5786, 4740, 1897, 4377, 5794, 444, 447, 448, 5453, 5803, 2627, 7609, 458, 4759, 1534, 1535, 1536, 5109, 2284, 1176, 6188, 1187, 1562, 6909, 6548, 50...
Validation
2,330
4
Paping:paping paping pronounced pah ping computer network administration utility used test reachability host internet protocol tcp/ip network measure time takes connect specified port name play word ping another computer network administration utility icmp used identify operating system remote machine sometimes blocked icmp blocked ping used identify service responding publicly available services must keep relevant tcp udp ports open paping attempt make connections ports determine service responding similar utilities nmap allow range ports scanned however allow repetitively scan ports paping operates attempting connect internet protocol tcp/ip port target process measures time taken connection established records connection failures results test printed form statistical summary connections made including minimum maximum mean connection times paping cross-platform software currently supporting windows linux april 2013 project appears abandoned new fixes versions produced following sample output paping en.wikipedia.org tcp/ip port 80 http linux host
[ 3821, 3915, 5571, 1942, 6062, 578 ]
Test
2,331
2
IPad_(1st_generation):ipad 1st generation first-generation ipad tablet computer designed marketed apple inc. first ipad line device features apple a4 processor 9.7 touchscreen display certain variants capability accessing cellular networks using ios operating system ipad play music send receive email browse web functions include ability play games access references gps navigation software social network services enabled downloading apps device announced unveiled january 27 2010 media conference april 3 2010 wi-fi variant device released united states followed release wi-fi cellular variant april 30 may 28 released australia canada france japan italy germany spain switzerland united kingdom device received primarily positive reviews various technology blogs publications reviewers praised device wide range capabilities labelled competitor laptops netbooks aspects criticized including closed nature operating system lack support adobe flash multimedia format first 80 days three million ipads sold launch ipad 2 apple sold 15 million ipads march 2 2011 apple announced ipad 2 reduced price first-generation ipad apple co-founder steve jobs stated 1983 speech company ’ apple ’ first tablet computer newton messagepad 100 introduced 1993 led creation arm6 processor core acorn computers apple also developed prototype powerbook duo-based tablet penlite decided sell order avoid hurting messagepad sales apple released several newton-based pdas final one messagepad 2100 discontinued 1998 apple reentered mobile-computing market 2007 iphone smaller yet announced ipad featuring camera mobile phone pioneered multitouch finger-sensitive touchscreen interface apple ’ ios mobile operating system late 2009 ipad release rumored several years speculation mostly talked “ apple ’ tablet ” specific names included itablet islate actual name reportedly homage star trek padd fictional device similar appearance ipad ipad announced january 27 2010 jobs apple press conference yerba buena center arts san francisco jobs later said apple began developing ipad iphone temporarily shelved effort upon realizing ideas would work well mobile phone ipad ’ internal codename k48 revealed court case surrounding leaking ipad information launch apple began taking pre-orders ipad us customers march 12 2010 major change device announcement available pre-order change behavior side switch sound muting screen rotation lock wi-fi version ipad went sale united states april 3 2010 wi-fi 3g version released april 30 3g service ipad united states provided initially sold two prepaid contract-free data plan options one unlimited data 250 mb per month half price june 2 2010 announced effective june 7 unlimited plan would replaced new customers 2 gb plan slightly lower cost existing customers would option keep unlimited plan plans activated ipad cancelled time ipad initially available purchase apple ’ online store retail locations since become available retailers including amazon walmart network operators ipad launched countries including australia canada france germany japan united kingdom may 28 online pre-orders countries began may 10 apple released ipad hong kong ireland mexico new zealand singapore july 23 2010 israel briefly prohibited importation ipad concerns wi-fi might interfere devices september 17 2010 ipad officially launched china ipad originally shipped iphone os 3.2 september 1 2010 announced ipad would get ios 4.2 november 2010 fulfill apple released ios 4.2.1 public november 22 comes several applications including safari mail photos video ipod itunes app store maps notes calendar contacts several improved versions applications developed iphone mac ipad syncs itunes mac windows pc apple ported iwork suite mac ipad sells pared-down versions pages numbers keynote apps app store although ipad designed replace mobile phone user use wired headset built-in speaker microphone place phone calls wi-fi 3g using voip application october 12 2011 ios 5 released various ios devices including first-generation ipad downloadable itunes update reported contain hundreds new features tweaks including twitter integration notification center imessage feature allows users send messages multimedia files users ios os x operating system apple computers icloud ios app apple-provided internet storage service allows users sync backup user data settings to/from devices also made available update june 11 2012 announced ios 6 would released first-generation ipad making ios 5.1.1 final operating system officially available device first-generation ipad features apple a4 soc comprises 1 ghz processor 256 mb ram powervr sgx535 gpu four physical switches ipad including home button near display returns user main menu three plastic physical switches sides wake/sleep volume up/down plus software-controlled switch whose function changed software updates originally switch locked screen current orientation ios 4.2 changed mute switch moving rotation lock function onscreen menu ios 4.3 update setting added allow user specify whether side switch used rotation lock mute unlike successors first-generation ipad cameras ipad touchscreen display 1,024 768 pixel liquid crystal display diagonal fingerprint- scratch-resistant glass result device screen dimensions resolution screen pixel density 132 ppi display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense ipad orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes ipad equipped 16 gb 32 gb 64 gb solid-state flash memory program data storage furthermore device available two connectivity options wi-fi wi-fi cellular unlike successors wi-fi cellular variant first-generation ipad could support carriers utilized gsm/umts standards compatible cdma networks however like successors assisted gps services supported bluetooth also available models weight first-generation ipad varied dependent upon connectivity options chosen wi-fi variant weighs whereas variant wi-fi cellular weighs dimensions however identical across entire range variants measuring 9.56×7.47×0.50 243×190×13 mm apple offers several ipad accessories adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line-out port generation ipad requires corresponding dock dock included physical keyboard supported original ipad generations compatible bluetooth keyboards also work macs pcs ipad charged 10 w standalone power adapter also compatible ipods iphones media reaction announcement device device mixed media noted thousands people queued first day sale number countries many waited claiming worth walt mossberg wall street journal wrote software stupid meaning hardware features build less important ipad success software user interface first impressions largely positive mossberg also called price modest device capabilities praised ten-hour battery life others including pc advisor sydney morning herald wrote ipad would also compete proliferating netbooks use microsoft windows base model price 499 lower pre-release estimates wall street analysts apple competitors expecting much higher entry price point media also praised quantity applications well bookstore media applications contrast sources including bbc criticized ipad closed system mentioned ipad faces competition android-based tablets however time first-generation ipad launch yahoo news noted android tablet os known honeycomb open source fewer apps available ipad although later google released source code honeycomb independent criticized ipad readable bright light paper praised able store large quantities books uk release daily telegraph said ipad lack adobe flash support annoying ipad selected time magazine one 50 best inventions year 2010 popular science chose top gadget behind overall best new 2010 winner groasis waterboxx 300,000 ipads sold first day availability may 3 2010 apple sold million ipads half time took apple sell number original iphones passing one million mark continued selling rapidly reaching 3 million sales 80 days financial conference call october 18 2010 steve jobs announced apple sold ipads macs fiscal quarter total apple sold 15 million first-generation ipads prior launch ipad 2 – tablet pcs combined since ipad release reaching 75 tablet pc sales end 2010 cnet criticized ipad apparent lack wireless sync portable devices microsoft zune number years walt mossberg called pretty close laptop killer david pogue new york times wrote dual review one part technology-minded people part non-technology-minded people former section notes laptop offers features cheaper price ipad review latter audience however claims readers like concept device understand intended uses enjoy using device pc magazine tim gideon wrote winner undoubtedly driving force shaping emerging tablet landscape michael arrington techcrunch said ipad beats even optimistic expectations new category device also replace laptops many people pc world criticized ipad file sharing printing abilities arstechnica critically noted sharing files computer one least favorite parts ipad experience
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 5752, 405, 6125, 2954, 1123, 7572, 6482, 6847, 6142, 2609, 1895, 4373, 7226, 4376, 2978, 5091, 4749, 5450, 7601, 3346, 6165, 4389, 4759, 5463, 102, 5469, 4768, 3001, 2284, ...
Validation
2,332
3
Advanced_Programmable_Interrupt_Controller:advanced programmable interrupt controller computing intel advanced programmable interrupt controller apic family interrupt controllers name suggests apic advanced intel 8259 programmable interrupt controller pic particularly enabling construction multiprocessor systems one several architectural designs intended solve interrupt routing efficiency issues multiprocessor computer systems apic split architecture design local component lapic usually integrated processor optional i/o apic system bus first apic 82489dx discrete chip functioned local i/o apic 82489dx enabled construction symmetric multiprocessor smp systems intel 486 early pentium processors example reference two-way 486 smp system used three 82489dx chips two local apics one i/o apic starting p54c processor local apic functionality integrated intel processors silicon first dedicated i/o apic intel 82093aa intended piix3-based systems two components intel apic system local apic lapic i/o apic one lapic cpu system first implementation 82489dx lapic discrete circuit opposed thereafter implementation intel processors silicon typically one i/o apic peripheral bus system original system designs lapics i/o apics connected dedicated apic bus newer systems use system bus communication apic components apic whether discrete chip integrated cpu version register containing four-bit version number specific apic implementation example 82489dx apic version number 0 version 1 assigned first generation local apics integrated pentium 90 100 processors systems containing 8259 pic 8259 may connected lapic system bootstrap processor bsp one system i/o apics logically however 8259 connected given time first-generation intel apic chip 82489dx meant used intel 80486 early pentium processors actually external local i/o apic one circuit intel mp 1.4 specification refers discrete apic contrast integrated apic found pentium processors 82489dx 16 interrupt lines also quirk could lose isa interrupts multiprocessor 486 system cpu paired 82489dx additionally supplementary 82489dx used i/o apic 82489dx could emulate 8259a xt-pic also included physical chips backwards compatibility 82489dx packaged 132-pin pqfp local apics lapics manage external interrupts specific processor smp system addition able accept generate inter-processor interrupts ipis lapics lapics may support 224 usable interrupt vectors i/o apic vector numbers 0 31 0 255 reserved exception handling x86 processors intel processors starting p5 microarchitecture p54c built-in local apic however local apic disabled p5 processor re-enabled software limitation longer exists p6 processors later ones single-processor systems major advantage local apic pci cards longer need interrupts mapped isa interrupts use virtual pci irqs 15 resulting fewer conflicts better performance microsoft family operating systems windows xp first properly make use virtual irqs provided local apic partial support present windows 2000 windows 2000 spreading pci card interrupts virtual irq happens machine also i/o apic microsoft blamed windows 2000 implementation information received intel supposedly promising future systems would contain i/o apic well something retrospect happen microsoft document era even claimed without i/o apic system local apics useless situation windows 2000 revert using 8259 pic sudden widespread use local apic windows xp expose number bugs various bios implementations particular microsoft forced retain pci irq stacking behavior machine cardbus controller without i/o apic message signaled interrupts msi feature pci 2.2 later specifications used without local apic enabled use msi obviates need i/o apic additionally 224 interrupts supported msi mode irq sharing allowed another advantage local apic also provides high-resolution order one microsecond better timer used interval one-off mode apic timer initial acceptance woes microsoft document 2002 advocated adoption high precision event timer instead criticized lapic timer poor resolution stating clocks silicon sometimes buggy nevertheless apic timer used example windows 7 profiling enabled windows 8 circumstances windows 8 claimed exclusive rights timer also used programs like cpu-z microsoft windows apic timer shareable resource aperiodic interrupts offered apic timer used linux kernel 2.6.18 onwards implement tickless kernel feature legacy 8253 programmable interval timer longer used tickless kernels vmware document notes software reliable way determine frequency generally way determine local apic timer ’ frequency measure using pit cmos timer yields approximate result i/o apics contain redirection table used route interrupts receives peripheral buses one local apics first-generation dedicated i/o apic 82093aa support 24 interrupt lines packaged 64-pin pqfp 82093aa normally connected piix3 used integrated legacy 8259 pics according 2009 intel benchmark using linux i/o apic reduced interrupt latency factor almost three relative 8259 emulation xt-pic using msi reduced latency even factor nearly seven relative xt-pic baseline xapic introduced pentium 4 x2apic recent generation intel programmable interrupt controller introduced nehalem microarchitecture november 2008 major improvements x2apic address number supported cpus performance interface x2apic uses 32 bits address cpus allowing address 2 − 1 cpus using physical destination mode logical destination mode works differently introduces clusters using mode one address 2 − 16 processors x2apic architecture also provides backward compatibility modes original intel apic architecture introduced pentium/p6 xapic architecture introduced pentium 4 improved interface reduces number needed apic register access sending inter-processor interrupts ipis advantage qemu emulate x2apic older processors physically support going back conroe even amd opteron g-series processors neither natively support x2apic apicv intel brand name hardware virtualization support aimed reducing interrupt overhead guests apicv introduced ivy bridge-ep processor series sold xeon e5-26xx v2 launched late 2013 xeon e5-46xx v2 launched early 2014 amd announced similar technology called avic available family 15h models 6xh carrizo processors newer number known bugs implementations apic systems especially concern 8254 connected defective bioses may set interrupt routing properly provide incorrect acpi tables intel multiprocessor specification mps tables apic also cause system failure operating system support properly older operating systems i/o local apics often disabled possible anymore due prevalence symmetric multiprocessor multi-core systems bugs firmware operating systems rare occurrence amd cyrix proposed somewhat similar-in-purpose openpic architecture supporting 32 processors least declarative support ibm compaq around 1995 x86 motherboard released openpic however openpic failure x86 market amd licensed intel apic amd athlon later processors ibm however developed multiprocessor interrupt controller mpic based openpic register specifications mpic used powerpc based designs including ibm instance rs/6000 systems also apple late power mac g5s
[ 4295, 3173, 4845, 2989, 3262, 6338, 4767, 810, 6523, 6616, 5219, 1377, 578, 2305, 6731, 4879, 742, 5669, 4061, 496, 584, 6647, 1667, 2498, 1770, 2141, 4840, 421, 1778, 5165, 6133, 5431, 6945, 1052, 6675, 352, 2351, 1150, 1248 ]
Test
2,333
7
IBM_Websphere_Business_Events:ibm websphere business events websphere business events ibm implementation event-processing engine event processing involves altering existing server software organization emit events small messages whenever notable event occurs event-processing software software monitor events look certain patterns interest useful prevention credit card fraud giving executives high-level view going company e.g share price drops extended period time detailed description see complex event processing software components following details websphere business events released june 2008 based upon acquisition aptsoft software
[]
Test
2,334
6
Info-ZIP:info-zip info-zip set open-source software handle zip archives circulation since 1989 consists 4 separately-installable packages zip unzip command-line utilities wiz maczip graphical user interfaces archiving programs microsoft windows classic mac os respectively info-zip zip unzip ported dozens computing platforms unzip web page describes unzip third portable program world surpassed hello world c-kermit possibly linux kernel zip unzip programs included linux unix distributions info-zip zip unzip addition info-zip releases parts info-zip including zlib used numerous file archivers programs many info-zip programmers also involved projects closely related deflate compression algorithm png image format zlib software library unzip package also includes three additional utilities zip package includes three additional utilities unzip 1.0 march 1989 released samuel m. smith written pascal c. pascal abandoned soon unzip 2.0 september 1989 released samuel m. smith included support unimploding method 6 introduced pkzip 1.01 george sipe created unix version unzip 2.0a december 1989 released carl mascott john cowan spring 1990 info-zip formed mailing list simtel20 released unzip 3.0 may 1990 became first public release info-zip group unzip 4.0 december 1990 adds support central directory within .zip archive unzip 5.0 august 1992 introduces support deflate method 8 compression method used pkzip 1.93a method 8 become de facto base standard zip archives 1994 1995 info-zip turned corner effectively became de facto zip program non-ms-dos systems huge number ports released year including numerous minicomputers mainframes practically every microcomputer ever developed unzip 5.41 april 2000 relicensed info-zip license unzip 5.50 february 2002 adds support deflate64 method 9 decompression unzip 6.0 adds support zip64 .zip archive bzip2 method 12 decompression support bzip2-style compression also zip 3.0f beta zip 1.9 august 1992 introduces support deflate method 8 compression method method 8 become de facto base standard zip archives zip 2.3 december 1999 first info-zip archiver tool new bsd-like info-zip license zip 3.0 2008-07-07 supports zip64 .zip archive 65536 files per archive multi-part archive bzip2 compression unicode utf-8 filename partial comment unix 32-bit uids/gids wiz 4.0 november 1997 released info-zip wiz 5.01 april 2000 relicensed info-zip license maczip 1.05 july 2000 released info-zip license maczip 1.06 released february 2001 written dirk hasse
[ 2810, 4213, 7058, 985, 4759, 1352, 6992, 5571, 2026, 658, 4700, 1955, 7746, 2226, 5147, 3032, 5948, 753, 6211, 6380, 7201, 3219, 510, 7387, 7669, 8126, 1127, 2334, 6940, 7581, 4732, 6489, 5256, 3152, 169, 1139, 5349, 4461, 2897, 1435, 6...
Test
2,335
5
Bootstrap_Protocol:bootstrap protocol bootstrap protocol bootp computer networking protocol used internet protocol networks automatically assign ip address network devices configuration server bootp originally defined rfc 951 computer connected network powered boots operating system system software broadcasts bootp messages onto network request ip address assignment bootp configuration server assigns ip address based request pool addresses configured administrator bootp implemented using user datagram protocol udp transport protocol port number 67 used dhcp server receive client requests port number 68 used client receive dhcp server responses bootp operates ipv4 networks historically bootp also used unix-like diskless workstations obtain network location boot image addition ip address assignment enterprises used roll pre-configured client e.g. windows installation newly installed pcs originally requiring use boot floppy disk establish initial network connection manufacturers network cards later embedded protocol bios interface cards well system boards on-board network adapters thus allowing direct network booting parts bootp effectively superseded dynamic host configuration protocol dhcp adds feature leases parts bootp used provide service dhcp protocol dhcp servers also provide legacy bootp functionality bootp first defined september 1985 rfc 951 replacement reverse address resolution protocol rarp published rfc 903 june 1984 primary motivation replacing rarp bootp rarp link layer protocol made implementation difficult many server platforms required server present individual ip subnet bootp introduced innovation relay agents forwarded bootp packets local network using standard ip routing one central bootp server could serve hosts many subnets case 1 client server network case 2 client server different networks
[ 7148, 456, 6879, 4759, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 7639, 5572, 2119, 6908, 7091, 2219, 3383, 3640, 3797, 2043, 229, 3312, 2057, 3819, 3820, 3821, 7490, 7214, 7217, 7765, 1052, 259, 5880, 1992 ]
Test
2,336
4
David_Venable:david venable david dave venable born january 11 1978 little rock arkansas former intelligence officer united states national security agency current cyber security professional businessman author speaker topics cyber security cyberwarfare international security also developed security-related internet protocols dave venable grew little rock arkansas arkansas later attended university arkansas majoring mathematics college venable joined united states air force studied korean defense language institute monterey california department defense educational research institution provides linguistic cultural instruction dod federal agencies venable also pursued graduate education mathematics university texas international relations harvard university 2005 venable served several intelligence roles national security agency including computer network exploitation cyberwarfare information operations digital network intelligence support global anti-terrorism operations also taught subjects serving adjunct faculty national cryptologic school school within national security agency provides training members united states intelligence community leaving federal service venable founded served ceo vanda security dallas-based security consultancy ultimately became security professional services practice masergy communications venable currently serves vice president cyber security venable regularly speaks industry government conferences including black hat briefings warsaw security forum serves cyber security expert think tanks policy research institutes serves colony texas technology board venable frequently contributes appears forbes bbc harvard business review bloomberg businessweek informationweek idg connect media outlets matters pertaining cyber security cyberwarfare international security
[ 6756, 1594 ]
Test
2,337
4
Cisco_PIX:cisco pix cisco pix private internet exchange popular ip firewall network address translation nat appliance one first products market segment 2005 cisco introduced newer cisco adaptive security appliance cisco asa inherited many pix features 2008 announced pix end-of-sale pix technology sold blade firewall services module fwsm cisco catalyst 6500 switch series 7600 router series reached end support status september 26 2007 pix originally conceived early 1994 john mayes redwood city california designed coded brantley coile athens georgia pix name derived creators aim creating functional equivalent ip pbx solve then-emerging registered ip address shortage time nat investigated viable approach wanted conceal block blocks ip addresses behind single multiple registered ip addresses much pbxs internal phone extensions began rfc 1597 rfc 1631 discussed now-familiar rfc 1918 yet submitted design testing carried 1994 john mayes brantley coile johnson wu network translation inc. brantley coile sole software developer beta testing pix serial number 000000 completed first customer acceptance december 21 1994 kla instruments san jose california pix quickly became one leading enterprise firewall products awarded data communications magazine hot product year award january 1995 shortly cisco acquired network translation november 1995 mayes coile hired two longtime associates richard chip howes pete tenereillo shortly acquisition 2 longtime associates jim jordan tom bohannon together continued development finesse os original version cisco pix firewall known pix classic time pix shared code another cisco product localdirector january 28 2008 cisco announced end-of-sale end-of-life dates cisco pix security appliances software accessories licenses last day purchasing cisco pix security appliance platforms bundles july 28 2008 last day purchase accessories licenses january 27 2009 cisco ended support cisco pix security appliance customers july 29 2013 may 2005 cisco introduced asa combines functionality pix vpn 3000 series ips product lines asa series devices run pix code 7.0 later pix os release 7.x pix asa use software images beginning pix os version 8.x operating system code diverges asa using linux kernel pix continuing use traditional finesse/pix os combination pix runs custom-written proprietary operating system originally called finese fast internet service executive software known simply pix os though classified network-layer firewall stateful inspection technically pix would precisely called layer 4 transport layer firewall access restricted network layer routing socket-based connections port ip address port communications occur layer 4 default allows internal connections outbound traffic allows inbound traffic response valid request allowed access control list acl conduit administrators configure pix perform many functions including network address translation nat port address translation pat well serving virtual private network vpn endpoint appliance pix became first commercially available firewall product introduce protocol specific filtering introduction fixup command pix fixup capability allows firewall apply additional security policies connections identified using specific protocols protocols specific fixup behaviors developed include dns smtp dns fixup originally implemented simple effective security policy allowed one dns response dns server internet known outside interface dns request client protected known inside interface inspect superseded fixup later versions pix os cisco pix also one first commercially available security appliances incorporate ipsec vpn gateway functionality administrators manage pix via command line interface cli via graphical user interface gui access cli serial console telnet ssh gui administration originated version 4.1 several incarnations cisco acquired pix network translation cli originally align cisco ios syntax starting version 7.0 configuration became much ios-like original nti pix pix classic cases sourced oem provider appro flash cards early encryption acceleration cards pix-pl pix-pl2 sourced productivity enhancement products pep later models cases cisco oem manufacturers pix constructed using intel-based/intel-compatible motherboards pix 501 used amd 5x86 processor standalone models used intel 80486 pentium iii processors pix boots proprietary isa flash memory daughtercard case nti pix pix classic 10000 510 520 535 boots integrated flash memory case pix 501 506/506e 515/515e 525 ws-svc-fwm-1-k9 latter part code pix technology implemented fire wall services module catalyst 6500 7600 router adaptive security appliance network firewall made cisco introduced 2005 replace cisco pix line along stateful firewall functionality another focus asa virtual private network vpn functionality also features intrusion prevention voice ip asa 5500 series followed 5500-x series 5500-x series focuses virtualization hardware acceleration security modules 2005 cisco released 5510 5520 5540 models asa continues using pix codebase asa os software transitioned major version 7.x 8.x moved finesse/pix os operating system platform linux operating system platform also integrates features cisco ips 4200 intrusion prevention system cisco vpn 3000 concentrator asa continues pix lineage intel 80x86 hardware cisco pix vpn product hacked nsa-tied group equation group somewhere 2016 equation group developed tool code-named benigncertain reveals pre-shared password attacker cve-2016-6415 equation group later hacked another group called shadow brokers published exploit publicly among others according ars technica nsa likely used vulnerability wiretap vpn-connections decade citing snowden leaks cisco asa-brand also hacked equation group vulnerability requires ssh snmp accessible attacker codename given exploit nsa extrabacon bug exploit cve-2016-6366 also leaked shadowbrokers batch exploits backdoors according ars technica exploit easily made work modern versions cisco asa leaked exploit handle 29th january 2018 security problem cisco asa-brand disclosed cedric halbronn ncc group use free-bug secure sockets layer ssl vpn functionality cisco adaptive security appliance asa software could allow unauthenticated remote attacker cause reload affected system remotely execute code bug listed cve-2018-0101
[ 5194, 3855, 2644, 998, 1363, 2746, 5571, 578, 2219, 5509, 7214, 4014, 3755 ]
Test
2,338
2
Nokia_N900:nokia n900 nokia n900 smartphone made nokia supersedes nokia n810 default operating system maemo 5 linux-based os originally developed nokia 770 internet tablet first nokia device based upon texas instruments omap3 microprocessor arm cortex-a8 core unlike three nokia internet tablets preceding nokia n900 first maemo device include phone functionality quad-band gsm 3g umts/hsdpa n900 functions mobile internet device includes e-mail web browsing access online services 5-megapixel digital camera still video photography portable media player music video calculator games console word processor sms well mobile telephony using either mobile network voip via internet mobile wi-fi maemo provides x-terminal interface interacting core operating system launched nokia world 2 september 2009 released 11 november 2009 united states 9 european countries n900 launched alongside maemo 5 giving device overall touch-friendly interface predecessors customizable home screen mixes application icons shortcuts widgets maemo 5 supports adobe flash player 9.4 includes many applications designed specifically mobile platform new touch-friendly media player nokia n900 announced 17 september 2008 keynote presentation dr. ari jaaksi nokia new supported features announced maemo 5 cellular connectivity 3g/hspa ti omap3 processor high definition camera support news backward compatibility older internet tablets time frame established release pre-alpha maemo 5 software development kit december 2008 targeted exclusively omap3 architecture revamped user interface included support hardware graphics acceleration functionalities found internet tablets time cellular data connectivity high definition camera support first photo specifications n900 codenamed rover developed came may 2009 release fcc approval documents august 2009 confirmed device provided second codename rx-51 nokia n900 officially announced 2 september 2009 nokia world 2009 germany nokia says step 4 5 line maemo devices started 2005 nokia 770 device initially available selected markets starting november 2009 4 december uk retail price €599 finland germany italy netherlands spain €649 france 2499 zł poland 5995 kr sweden £499 united kingdom prices including vat excluding subsidies retail price launch us 649 united states excluding sales taxes subsidies available canada independent retailers around c 800 march 2010 nokia site australia lists n900 homepage hinting launch time near future black color available launch initially availability extremely limited leading delays statement nokia higher pre-order demand expected nokia n900 launched hong kong 29 may 2010 added features facilitate character handwriting input price launch 4998 hkd already released australia via optus nokia n900 powered omap 3430 arm cortex-a8 system-on-a-chip made texas instruments based 65 nanometer cmos process omap 3430 composed three microprocessors cortex a8 running 600 mhz 1.15 ghz correct overclocking used run os applications powervr sgx530 gpu made imagination technologies supports opengl es 2.0 capable 14 mpolys/s tms320c64x digital signal processors running 430 mhz used run image processing camera audio processing telephony data transmission tms320 c64x main purpose offload cortex a8 process audio video signal moreover omap 3430 n900 devices successfully over-clocked 1150 mhz using modified kernel editing kernel power configuration file system 256 mb dedicated high performance ram mobile ddr paired access 768 mb swap space managed os provides total 1 gb virtual memory nokia n900 resistive touchscreen resolution 800 × 480 pixel wvga 267 ppi according nokia xorg.log capable displaying 65k colours 565 rgb nokia n900 camera capability 2592x1944 pixels carl zeiss optics autofocus dual led flash video light geo-tagging lcd transflective permit usability wide range luminosity daylight dark haptic feedback provided touchscreen input applying small vibration sound user choose whether feature enabled stylus provided allow precise touch input access smaller user interface elements 3-axis accelerometer allows orientation screen change portrait landscape mode certain applications used user input games applications dashboard desktop active rotating device landscape portrait mode activates phone application feature also disabled user discretion update pr1.2 became possible view web pages portrait mode developers may add support portrait mode applications desired proximity sensor deactivates display touchscreen device brought near face call slide-out 4-row keyboard d-pad nokia n810 replaced nokia n900 slide-out 3-row backlit keyboard arrow keys previous internet tablets on-screen keyboard also available addition english qwerty layout slide keyboard available variants italian french german russian czech nordic finnish swedish spanish nokia n900 ambient light sensor adjusts display brightness activates backlit keyboard os comes word prediction software configured user preferences auto capitalization word completion auto spacing words device autonomous gps optional a-gps functionality comes pre-loaded ovi maps application ovi maps provides typical mapping features alternate views 3d landmarks satellite hybrid maps address/places interest searching route planning although turn-by-turn navigation yet 5-megapixel back camera autofocus feature dual led flash 4:3 16:9 aspect ratio options 3× digital zoom focal length camera 5.2 mm aperture f/2.8 focus range 10 cm infinity capable video recording 848 × 480 pixels 25 fps lens use protected sliding hatch opening hatch launches camera application although 0.3-megapixel front camera capable video recording 640 × 480 pixels pre-production units could used video calls ip using google talk retail version delivered without software enabling video calling video chatting update pr1.2 ota over-the-air skype video calling added enabling fascia camera software updates phone becomes capable play/record/stream 720p video holding device facing screen top left right rocking buttons function volume up/down zoom in/out depending context power on/off camera button pressing power button brings menu change profile activate offline mode a.k.a airplane flight mode turns emitted signals lock device either secure key code simple lock option end current task nokia n900 fewer hardware buttons makes use touchscreen display on-screen buttons example accept reject end call n900 microphone stereo speakers located side device 3.5 mm four-contact trrs connector simultaneously provides stereo audio output either microphone input video output pal ntsc tv possible using nokia video connectivity cable included upon purchase standard trrs 3x rca cable high-speed usb 2.0 usb micro-b connector provided data synchronization mass storage mode client battery charging micro-usb connector prone failure nokia n900 unlike previous versions nokia internet tablet n't enabled support usb on-the-go ability act usb host default order meet deadlines production usb certification ongoing community effort add support subsequently currently software beta stage requiring non-standard usb cable usb a-a adapter software development repository built-in bluetooth v2.1 supports wireless earpieces headphones hsp profile nokia n900 supports hardware capable stereo audio output a2dp profile built-in car hands-free kits also supported hfp profile file transfer supported ftp along opp profile sending/receiving objects possible remote control device avrcp profile dun profile permits access internet laptop dialing mobile phone wirelessly tethering hid profile provides support devices bluetooth keyboards pan profile networking using bluetooth unsupported enabled bluetooth set also functions fm receiver allowing one listen fm radio n900 also 88.1–107.9 mhz fm transmitter example play music separate radio note fm transmitter frequency range extended 76.0–107.9 mhz community supported modifications operating system furthermore nokia n900 wi-fi b/g connectivity support wep wpa wpa2 aes/tkip security protocols nokia n900 synchronize microsoft outlook activesync various e-mail calendar clients syncml bluetooth micro-usb contact information also exchanged via vcard file format supported commonly e-mail programs including evolution microsoft outlook device also features infrared port compatible irda used turn nokia n900 remote controller using third-party software battery life shipped bl-5j 1320mah battery n900 seems deficient able make full working day internet connection call usage press release nokia stated aiming one day full usage always online 2-4 days tcp/ip connected active online usage 1+ day early reports users range 12 hours wi-fi web browsing video gps 2 days online used continuously value appears highly dependent user choice background software active desktop widgets im email polling well mobile network signal quality especially 3g cases software bugs nokia reported talk times around 9 hours gsm 5 hours 3g battery life extended significantly switching gps/a-gps wi-fi bluetooth replacing 3g 2g gprs previous internet tablets used larger batteries 1500 mah compared n900 1320 mah based less efficient microprocessor typical battery time nokia n810 around 7 hours continuous full usage display wi-fi principle n900 figures expected much higher third party extended batteries 2400 mah capacity available n900 also community supported modifications performed 3rd party n900 compatible batteries usually involving putting two said batteries parallel increase effective battery capacity nokia n900 3000 mah sim card located battery accessed removing back panel nokia n900 microsd hc card socket also located back cover battery tool necessary remove back panel nokia n900 32 gb emmc 256 mb nand non-removable storage additional storage available via hot swappable microsdhc card socket claimed support 200 gb additional storage however sdhc specification supports cards 32 gb size difficulty reported use 64+ gb sdxc cards sandisk claims sdxc cards compatible n900 hot swapping achieved via software-supported magnetic sensor detects removal back cover partition residing microsdhc card unmounted back cover removed microsdhc card formatted supported file system ext2 ext3 fat16 fat32 32 gb emmc split 3 partitions 256 mb nand formatted ubifs contains bootloader kernel image root directory 100 mb free space programs larger 500 kb including dependencies stored /opt symlinked /home/opt therefore located 2 gb ext3 partition vfat partition also available storage needs used carefully unmounted exported usb cable connected device maemo 5 also known fremantle default operating system nokia n900 maemo 5 nokia adaptation linux desktop environment pocket-sized device ui fully customizable user able move widgets around add/remove widgets change background add shortcuts applications n900 comes preloaded variety applications 1500 additional applications overwhelming majority free download use created 3rd party developers custom kernels also available via app manager users need devices maemo uses upstart reduce boot time application called easy debian installs debian lxde image internal memory enabling applications iceweasel firefox browser openoffice.org suite run within maemo applications synaptic package manager included debian installation gimp run within lxde interface software also added debian using maemo chroot utility using synaptic apt-get command line stellarium zim desktop wiki accessed either via lxde desktop icons program manager shortcuts desktop nokia n900 sim application toolkit available also known operator menu possible use services require result support sim interact directly outside world initiate commands independently handset network making n900 vulnerable installation malicious sim java applications via text messages issues various value-added services resulting availability sim application toolkit include following nokia often offers new n8 e7 devices warranty replacements n900s although warranty terms consumer rights legislation differ across jurisdictions users reported success refusing pressing n900 least eu india recently august 2011 owners confident getting n900 warranty replacement often attempt repair devices sell nokia-provided replacement buy n900 instead n900 proximity sensor designed lock touch screen phone user ear prevent accidental operation locks screen unintentionally bright light usually outdoors call placed received nokia acknowledged hardware issue addressed unlock screen phone call tactile unlock switch right side device used however keep touch screen active accidental operation phone keys call may occur device used handset issue blamed application screen protectors however n900 users without screen protectors also experiencing problem n900 microusb charger port fragile people successfully fixed problem either epoxy glue resoldering usb port onto circuit board chips n900 gsm module might badly soldered circuit board resulting multiple n900 devices reported troubled inability sim card detected issue fixable putting something gsm-related chips shielding though proper fix would reballing announced may 2010 nokia n900 last mobile communication device running maemo 5 operating system replaced meego nokia continue support n900 updates necessary transition succeeding meego operating system possible mainly interest developers rather consumers officially supported nokia interest within user community working backporting meego developments maemo n900 places interesting device people within wider open source community consumers download meego operating system available officially supported nokia nokia used say meego going succeed maemo new devices however 11 february 2011 nokia announced primarily concentrating alliance microsoft meego development stopped one meego device become available 2011 3 march 2011 jukka eklund product manager meego os nokia announced meego-dev mailing list meego 1.2 developer edition n900 developed dedicated nokia team led mika leppinen target particular edition usable primary phone device developer/hacker person regular end users september 2011 announcement intel linux foundation abandoning meego favor tizen prompted developer community begin seriously doubt future meego n900 meego developer edition rename meego community edition evolved nemo based mer currently october 2012 actively developed nitdroid project ports android devices alternate operating system also available n900 however little progress made achieving voice calling nitdroid n900 main developer goes online handle e-yes moved developing devices nokia n9 community-based project aiming provide hardware upgrade n900 called neo900 began late 2013 collaboration openmoko maemo communities hardware upgrade quadruple device ram provide processor nearly twice fast one original n900 integrate additional sensors gyroscope compass likely modern lte modem also included
[ 1066, 2538, 372, 7521, 3615, 1453, 3952, 4317, 2922, 23, 2564, 6443, 7545, 5044, 740, 2581, 7919, 6465, 5062, 3653, 5068, 7207, 3657, 4726, 7209, 1129, 7583, 76, 2271, 6517, 1167, 3694, 472, 4407, 118, 3703, 7261, 5493, 1202, 3029, 499,...
Test
2,339
3
Telechips:telechips telechips fabless company headquartered seoul founded 1999 regional offices japan china singapore designs integrated circuits company sells system chip products used automotive entertainment systems consumer electronics based arm architecture support android windows embedded compact nucleus rtos linux telechips also sells development kits
[ 451, 278, 6165, 550, 463, 987, 6421, 5472, 469, 4041, 3182, 7890, 722, 3008, 4947, 6720, 3786, 2926, 2024, 1473, 5576, 6910, 4879, 5752, 5845, 224, 5405, 5406, 5585, 6371, 7376, 7654, 1864, 4166, 6378, 1995, 5323, 677, 3397, 1779, 6389,...
Test
2,340
7
ServedBy_The_Net:servedby net servedby net llc cloud computing provider specializing infrastructure service company provides infrastructure efforts virtual servers storage server backup company current slogan serving clouds seattle servedby net founded seattle washington joshua breeds breeds developed interest cloud technology sector age 10 developed first web hosting company years later breeds founded servedby net llc 2011 working biochemistry degree university washington 2014 organization technology partner microsoft vmware parallels suse f5 networks servedby net offers cloud iaas infrastructure service well hosted services managed cloud services domain name registration
[ 2961, 3637, 6986 ]
Test
2,341
2
Windows_Internal_Database:windows internal database windows internal database codenamed wyukon sometimes referred sql server embedded edition variant sql server express 2005–2014 included windows server 2008 sql 2005 windows server 2008 r2 sql 2005 windows server 2012 sql 2012 windows server 2012 r2 sql 2012 windows server 2016 sql 2014 included free microsoft products released 2007 require sql server database backend windows sharepoint services 3.0 windows server update services 3.0 include windows internal database used alternative using retail edition sql server wid 32-bit application even component windows server 2008 64-bit installs path windows server 2012 later 64-bit application installed windows internal database available standalone product use end-user applications microsoft provides sql server express microsoft sql server purpose additionally designed accessible windows services running machine several components windows server 2008 2012 use windows internal database data storage active directory rights management services windows system resource manager uddi services active directory federation services 2.0 ipam windows sharepoint services windows server 2003 sharepoint windows server update services install windows internal database use default data store retail sql server database instance provided knowledge base article published microsoft states windows internal database identify removable component provides instructions may uninstalled calling windows installer directly sql server management studio express used connect instance windows internal database using codice_1 2003–2008 codice_2 2012 instance name work locally remote connections enabled edition sql server also note windows authentication used opposed sql server authentication administrators seem best results authenticating successfully logged using administrative account created windows installed
[ 7619, 7621, 7715, 4936, 3180, 7971, 8183, 8085, 2840, 7080, 8094, 4697, 5747, 5234, 3303, 930, 53, 941, 422, 5692, 425, 1684, 5694, 5252, 2702, 7687, 2530, 4017, 2085 ]
Test
2,342
3
ThinkPad:thinkpad thinkpad line business-oriented laptop computers tablets designed developed marketed sold lenovo formerly ibm thinkpads known minimalist black boxy design initially modeled 1990 industrial designer richard sapper based concept traditional japanese bento lunchbox revealing nature opened according later interviews sapper also characterized simple thinkpad form elementary simple black cigar box similar proportions offers 'surprise opened thinkpad line first developed ibm yamato facility japan led arimasa naitoh dubbed father thinkpad first thinkpads released october 1992 considered innovative became large success ibm decade thinkpads especially popular businesses older models revered technology enthusiasts collectors power users due durable design relatively high resale value abundance aftermarket replacement parts thinkpads received somewhat cult following small loyal fanbase throughout years aftermarket parts developed models custom motherboards current processors created x60 x200 thinkpad laptops used outer space 2003 laptops certified use international space station name thinkpad product ibm corporate history culture thomas j. watson sr. first introduced think ibm slogan 1920s every minicomputer mainframe ibm installed almost leased – sold blue plastic sign placed atop operator console think command aluminum plate decades ibm distributed small notepads word think emblazoned brown leatherette cover customers employees name thinkpad suggested ibm employee denny wainwright think notepad pocket name opposed ibm corporate naming committee names ibm computers numeric time thinkpad kept due praise journalists public thinkpad ibm answer toshiba compaq notebook market well apple dec task making notebook given yamato facility japan led arimasa naitoh japanese man joined ibm 1970s dubbed father thinkpad ibm pushing thinkpad 1992 launch keep harvard business school happy april 1992 ibm announced first thinkpad tablet computer news conference first thinkpad tablet penpoint-based device formally known ibm 2521 thinkpad positioned developer release thinkpad tablet became available purchase general public october year addition giving innovative name ibm marketed thinkpad imaginative activities early customer pilot programs numerous pre-launch announcements extensive loaner program designed showcase product strengths weaknesses ibm even worked archaeologists excavating ancient egyptian city leontopolis field test thinkpad device loaned dig team summer resulting report documented thinkpad excellent performance difficult conditions report said thinkpad impressive machine rugged enough used without special care worst conditions egypt offer first thinkpad model announced april 1992 700 renamed 700t release three newer models 300 new 700 700c october 1992 bright red trackpoint kind pointing stick embedded keyboard enabled notebook used without external pointing device first thinkpads successful collecting 300 awards design quality thinkpad 755c laptop computers used payload general support computers aboard space shuttle 1990s thinkpad 760ed also tested part shuttle–mir program period 760ed computer used without modification model used space program contained intel 133 mega hertz pentium processor 48 megabytes ram four speed cd-rom power supply unit 1.44 megabyte floppy disk drive two 1.2 gigabyte hard drives accessories use space laptops subject radiation could cause errors 760ed noted improvement area 755c traditionally black thinkpads commonly featured magnesium carbon fiber reinforced plastic titanium composite cases thinkpad introduced innovations including trackpoint pointing device thinklight led keyboard light top lcd screen active protection system accelerometer sensor detects thinkpad falling shuts hard disk drive prevent damage roll cage design minimize motherboard flex stainless steel hinges biometric fingerprint reader client security solution improves security using built-in trusted platform module tpm facilitates deployment corporate environment thinkvantage technologies suite computer management applications drain holes help reduce damage keyboard components accidental spillage original design concept thinkpad created 1990 italy-based designer richard sapper corporate design consultant ibm since 2005 lenovo sapper noted design classic products tizio lamp artemide office chair knoll kitchenwares alessi ballpoint lamy design based concept traditional japanese bento lunchbox revealing nature opened according later interviews sapper also characterized simple thinkpad form elementary simple black cigar box similar proportions offers 'surprise opened computers also known iconic red trackpoint variation joystick middle keyboard first thinkpad notebook 700c announced 1992 first new product emerge ibm differentiated product personality strategy resulting collaboration sapper tom hardy head corporate ibm design program development 700c also involved close working relationship sapper kazuhiko yamazaki lead notebook designer ibm yamato design center japan liaison sapper yamato engineering 1990–1992 pre-internet collaboration italy japan facilitated special sony digital communications system transmitted high-res images telephone lines system established several key global design centers hardy ibm designers could visually communicate effectively interact directly sapper advice projects innovative design management leadership thinkpad development hardy named innovator year 1992 pc magazine since 1992 thinkpad design regularly updated developed refined years sapper respective teams ibm later lenovo included yamazaki tom takahashi sam lucente since 1995 david hill vice president user experience design leads manages design/user experience thinkpad hill approach maintaining evolution sapper original thinkpad design analogous porsche manages evolution classic 911 fold-out butterfly keyboard appeared thinkpad 701 series designed sapper collaboration sam lucente john karidis widely considered design masterpiece display museum modern art new york city thinkpad 760 series also included unusual keyboard design keyboard elevated two arms riding small rails side screen tilting keyboard achieve ergonomic design although almost models feature trackpoint models touchpad left right buttons possibly making mouse clicks less ergonomic touchpads x220 double regular mouse buttons also case newer models december 2013 cause problems accidental clicking much pressure exerted mouse movements occasion 20th anniversary thinkpad introduction david hill authored designed commemorative book thinkpad design titled thinkpad design spirit essence book revealed event held moma thinkpads especially popular businesses older models revered technology enthusiasts collectors power users due durable design relatively high resale value abundance aftermarket replacement parts thinkpads received somewhat cult following small loyal fanbase throughout years laptop magazine 2006 called thinkpad highest-quality laptop computer keyboard available ranked first reliability support pc magazine 2007 survey lenovo thinkpad pc magazine 2006 reader choice pc based laptops ranked number 1 support pc based laptops thinkpad series first product receive pc world hall fame award enderle group rob enderle said constant thing thinkpad brand stands quality build best keyboard business thinkpad x tablet-series pc magazine editor choice tablet pcs thinkpad x60s ranked number one ultraportable laptops pc world lasted 8 hours 21 minutes single charge 8-cell battery lenovo thinkpad x60s series pc world top 100 products 2006 2005 pc world reliability service survey ranked thinkpad products ahead brands reliability 2004 survey ranked second behind emachines lenovo named environment-friendly company electronics industry greenpeace 2007 since dropped place 14 17 october 2010 lenovo thinkpad t60p received editor choice award mobile graphic workstation pc magazine lenovo thinkpad x60 pc magazine editor choice among ultra-portable laptops lenovo thinkpad t400-series pc world top 100 products 2009 thinkpad laptops 2003 laptops certified use international space station 2017 currently operate linux windows xp windows vista software nasa purchased 500 thinkpad 750 laptops flight qualification software development crew training astronaut senator john glenn used thinkpad laptops spaceflight mission sts-95 1998 thinkpad models used shuttle missions include least three thinkpad 750c left spektr module mir module depressurized laptops used aboard space shuttle international space station feature safety operational improvements weightless environment must operate modifications include velcro tape attach surfaces upgrades cpu video card cooling fans accommodate microgravity hotter air n't rise lower density cabin air adapter station 28 volt dc power thinkpad 750 flew aboard space shuttle endeavour mission repair hubble space telescope 2 december 1993 thinkpad 750c task run nasa test program determined radiation inherent space environment causes memory anomalies 750c generates unexpected problems 755c also used 760ed tested well part shuttle–mir test thinkpads used conjunction joystick portable in-flight landing operations trainer pilot throughout 2006 thinkpad a31p used service module central post international space station seven thinkpad a31p laptops service orbit aboard international space station 2010 space station equipped 68 thinkpad a31 computers along 32 new lenovo thinkpad t61p laptops plus dedicated ip phone also limited video phone capabilities work incorporating laptops station lan continued june 2011 laptops aboard iss connected station lan via wi-fi connected ground 3 mbit/s 10 mbit/s comparable home dsl connection speeds 2005 chinese technology company lenovo purchased ibm personal computer business thinkpad flagship brand along speaking purchase ibm personal computer division liu chuanzhi said benefited three ways ibm acquisition got thinkpad brand ibm advanced pc manufacturing technology company international resources global sales channels operation teams three elements shored sales revenue past several years although lenovo acquired right use ibm brand name five years acquisition ibm personal computer business lenovo used three years majority thinkpad computers since 2005 acquisition brand lenovo made china addition chinese manufacturing facilities lenovo employs 300 people combined manufacturing distribution center near american headquarters morrisville north carolina device made facility packed box sports red-white-and-blue sticker proclaiming whitsett north carolina 2012 lenovo partially moved production thinkpad line computers japan thinkpads produced nec yonezawa yamagata akaemi watanabe president lenovo japan said japanese glad see return domestic production goal realize full-scale production improve image make products acceptable japanese customers 2014 although sales rose 5.6 percent previous year lenovo lost position top commercial notebook maker however company celebrated milestone 2015 shipment 100 millionth unit thinkpad line lenovo laptops x230 w530 t430 block third-party batteries lenovo calls feature battery safeguard first introduced models may 2012 laptops feature scan security chips thinkpad-branded batteries contain affected thinkpads flash message stating genuine lenovo battery attached third-party batteries used thinkpad yoga ultrabook-class convertible device functions laptop tablet computer yoga gets name consumer-oriented ideapad yoga line computers form factor thinkpad yoga backlit keyboard flattens flipped tablet mode accomplished platform surrounding keys rises level keyboard buttons locking mechanism prevents key presses feet pop prevent keyboard directly resting flat surfaces lenovo implemented design response complaints earlier yoga 13 11 models awkward use tablet mode reinforced hinge required implement design convertible form factor thinkpad yoga retains standard thinkpad features black magnesium-reinforced chassis island keyboard red trackpoint large buttonless trackpad released august 2011 thinkpad tablet first lenovo line business-oriented tablets thinkpad brand tablet described gadget mix premium business tablet since tablet primarily business-oriented includes features security anti-theft software ability remotely disable tablet sd card encryption layered data encryption cisco virtual private network vpn additionally thinkpad tablet able run software ibm lotus notes traveler stylus could used write notes tablet also included software convert handwritten content text another feature tablet drag-and-drop utility designed take advantage tablet touch capabilities feature could used transfer data usb devices internal storage sd card slashgear summarized thinkpad tablet saying stylus styling add distinctive slate n't merely attempt ape apple ipad order celebrate 20th anniversary thinkpad lenovo held large party new york announced several products including tablet 2 lenovo says thinkpad tablet 2 available 28 october 2012 windows 8 released thinkpad tablet 2 runs windows 8 professional operating system able run desktop software compatible version windows tablet 2 based clover trail version intel atom processor customized tablets tablet 2 2 gigabytes ram 64gb ssd tablet 2 10.1-inch ips display 16:9 aspect ratio resolution preview cnet wrote windows 8 looked readable functional metro standard windows-based interfaces mini-hdmi port included video output 8-megapixel rear camera 2-megapixel front camera included along noise-canceling microphone order facilitate video conferencing announced released january 2014 thinkpad 8 based intel bay trail atom z3770 processor 2 gb ram 128 gb built-in storage thinkpad 8 8.3-inch ips display 16:10 aspect ratio resolution pixels features include aluminum chassis micro-hdmi port 8-megapixel back camera flash optional 4g connectivity runs windows 8 operating system announced may 2014 lenovo thinkpad 10 successor thinkpad tablet 2 scheduled launch summer 2014 along accessories docking station external detachable magnetic keyboards used windows 8.1 pro operating system available 64 128gb variants 1.6ghz quad-core intel atom baytrail processor 2gb 4gb ram optionally supported 3g 4g lte display resolution announced paired stylus pen thinkpad x1 tablet fanless tablet powered core cpus available 4 8 16gb lpddr3 ram sata pcie nvme ssds 1tb ips screen supports touch pen input thinkpad 11e budget laptop computer schools students 11-inch screen without trackpoint 11e yoga convertible version 11e e series low-cost thinkpad line designed small business mass-market requirements currently contains 14 15 sub-lines e series line laptops replaced lenovo edge series somewhere countries currently may 2019 offered thinkpad edge/e series names l series replaced former r series positioned mid-range thinkpad offering mainstream intel core i3/i5/i7 cpus l series 3 sub-lines long-running 14 15.6 launched line two models l412 l512 2010 2018 also 13 l380 available replaces thinkpad 13 main difference e series l series basic mil-std-810 certification l series thinkpads series historically high-end features magnesium alloy rollcages high-density ips screens known flexview discontinued t60 series 7-row keyboards screen latches lenovo ultrabay thinklight models included 14.1-inch 15.4-inch displays available 4:3 16:10 aspect ratios since 2012 entire thinkpad line given complete overhaul modifications removal separate buttons use trackpoint reintroduced 2015 removal separate audio control buttons removal screen latch removal led indicator lights new ultra-portable models t430u t431s non-replaceable batteries newer models combination built-in replaceable battery enabling user switch replaceable without putting computer hibernation also non-widescreen displays longer available 16:9 aspect ratio remaining choice x series main high-end ultraportable thinkpad line offering lightweight highly portable laptop moderate performance current sub-lines x series includes daughter line includes x1 tablet confused 2005-2013 x series tablets mainstream current workhorse models x390 x390 yoga 13 successors classic discountinued 12 line lenovo x series thinkpads premium 14 /15 thin-and-light line 13.3 thinkpad models x300/x301 ultrabay cd-rom removable battery replaced modern premium x1-series ultrabook line x1 carbon x1 yoga x1 extreme sub-series discountinued mainstream lines 12 x200 x201 x220 models could ordered high-end thinkpad features like trackpoint thinklight 7-row keyboard docking port hot-swappable hdd solid magnesium case optional slice battery discontinued 12.5 x220 x230 still featured roll cage thinklight optional premium ips display first ips display non-tablet thinkpad since t60p 7-row keyboard offered x220 however lacked lid latch mechanism present previous x200 x201 versions discontinued slim 12 line contained x200s x201s low power cpus high resolution displays x230s low power cpus 12.5 x series thinkpads x240 later simplified design last 12 x280 model trackpoint feature partially magnesium case simplified docking port obsolete low-cost 11.6 netbook line x100e x120e plastic lacking latch thinklight using variant island keyboard known chiclet keyboard found edge series x100e also offered red addition blue white countries like high-end netbooks whereas x200 series like full ultraportables featuring intel core previously core 2 celeron series cpus rather amd netbook cpus x series tablet suffixes outdated variant 12 x series models low voltage cpus flip-screen tablet resistive touchscreen include traditional thinkpad features noted using higher quality affs-type screen better viewing angles compared screens used thinkpads p series line laptops replaced lenovo w series p series excluding models suffix designed engineers architects animators etc comes variety high-end options p series models included fingerprint readers first generation comes variety high-end options intel xeon processors 4k screens ddr4 ram 64gb 1080p screens intel core series cpus pcie ssds come standard p series uses cooling system known flex features two fans connected heat pipe located near cpu gpu three-button touchpad included color calibrator dropped nvidia pascal gpus new dock stations side connection port hardware update optional oled screen p1 gen2 thinkpad stack line products includes accessories designed portability interoperability line includes external hard drives wireless router power bank bluetooth 4.0 speaker stack device includes rubber feet magnets pogo-pin power connections allow use single cable combined weight stack devices slightly less two pounds stack series announced january 2015 international ces stack series accessories expanded 2016 international ces include 720p resolution projector 150 lumens brightness wireless charging station stack blocky black rectangular look thinkpad logo shares common design language thinkpad laptop computers dock stations finder thinkpad usb 3.0 secure hard drive thinkpad keyboards thinkpad stands japan-only thinkpad 235 type 2607 progeny ibm/ricoh rios project also known clavius chandra2 contains unusual features like presence three pcmcia slots use dual camcorder batteries source power features intel pentium mmx 233 mhz cpu support 160 mb edo memory built-in hard drive udma support hitachi marketed chandra2 prius note 210 ultraportable thinkpad 240 x z started intel celeron processor went 600 mhz intel pentium iii models using intel 440bx chipset ram expandable 320 mb max bios update screen key pitch standard key pitch also one first thinkpad series contain built-in mini pci card slot form factor 3b 240s optical disc drives external floppy drive optional extended battery sticks bottom like bar props back laptop weighing smallest lightest thinkpads ever made 300-series 300 310 340 350 360 365 380 385 390 various sub-series long-running value series starting 386sl/25 processor way pentium iii 450 300 series offered slightly lower-price alternative 700 series exceptions thinkpad 360pe unique model series could used regular laptop transform tablet flipping monitor top retailing 3,699 1995 360pe featured touch sensitive monitor operated stylus machine could run operating systems supported touch screen pendos 2.2 500-series 500 510 560 e x z 570 e main line ultraportable thinkpads starting 486slc2-50 blue lightning pentium iii 500 machines hard disk board drives external 570 case ultrabase weighed around 600-series 600 600e 600x direct predecessors series 600-series packed svga xga tft lcd pentium mmx pentium ii iii processor full-sized keyboard optical bay package weighing roughly ibm able create light fully featured machine using lightweight strong carbon fiber composite plastics battery shipped 600-series models manufacturing defect left vulnerable memory effect resulted poor battery life problem avoided use third-party battery 700-series 700 701 720 730 tablet 750 755 760 765 770 various sub-models considered cutting-edge intel-based thinkpads featured best screens largest hard drives fastest processors available time first successful thinkpad introduced 1992 first thinkpad tablet pc 700t model without keyboard mouse thinkpad 800-series 800/820/821/822/823/850/851/860 unique based powerpc architecture rather intel x86 architecture 800 series laptops used powerpc 603e cpu speeds 100 mhz 166 mhz 860 model although earliest 800 type 6020 direct ancestor 850 used 603 apparently offered developers units used scsi-2 instead ide hard disks id every scsi device system could configured cursor driven gui-based bios another unusual aspect series unique startup chime reminiscent apple macintosh computers time powerpc thinkpad line considerably expensive standard x86 thinkpads—even modestly configured 850 cost upwards 12,000 hand 800 850 851 later 860 861 capable supporting optional web camera one first commercially available webcams available laptop units could also record pal ntsc signals onboard composite connectors batteries contained internal processors regulate power usage optimized battery longevity powerpc thinkpads could run windows nt 3.5 4.0 os/2 warp connect powerpc edition aix 4.1.x solaris desktop 2.5.1 powerpc edition many powerpc operating systems corresponding compilers scarce hard find however also possible run certain powerpc versions linux 800 series thinkpad series introduced ibm 1999 geared towards multimedia focus many models featuring independent integrated cd players multimedia access buttons 1400 1500 models designed acer ibm contract featured similar hardware found acer laptops including ali chipsets three way audio jacks internal plastics painted copper paint series thinkpads particularly acer developed models prone broken hinges stress damage chassis one notable thinkpad series lineup s3x s30/s31 models featuring unique keyboard lid design allowing standard size keyboard fit chassis otherwise would n't able support protruding keyboard models largely available asia pacific ibm offered optional piano black lid models designed yamato design lab thinkpad since 701c feature special design accommodate keyboard physically larger laptop also thinkpad aside z61 deviate away standard matte lid a-series developed all-around productivity machine equipped hardware powerful enough make desktop replacement hence biggest heaviest thinkpad series time also features even found t-series age a-series dropped favor g-series r-series a31 released 2002 desktop replacement system equipped pentium 4-m processor clocked 1.6 1.8 1.9 2.0 ghz max supported 2.6 ghz ati mobility radeon 7500 128 256 mb pc2100 ram officially upgradable 1 gb unofficially upgraded 2 gb ibm high rate wireless prism 2.5 based modified support wpa-tkip equipped 20 30 40 gb hard disk drive r series budget line beginning r30 2001 ending r400 r500 presented 2008 successor r400 r500 models thinkpad l series l412 l512 models notable model r50p optional 15 ips lcd screen introduced 2003 g-series consisted three models g40 g41 g50 large heavy machines equipped powerful desktop processors line thinkpads consequently served mainly replacements desktop computers z series released high-end multimedia laptop result first thinkpad feature widescreen 16:10 aspect ratio display z-series also unique certain models featured optional titanium lid integrated wwan webcam also found configurations series ever included z60 z60m z60t z61 z61m z61t z61p latter first z-series thinkpad intel yonah dual core technology processor supports intel vt-x disabled bios turned bios update running fully virtualised operating systems via xen vmware therefore possible despite z61 carrying number t61 hardware z61 closer t60 likewise z60 closer t43 15-year anniversary thinkpad model based x60s laptop model initially known inside lenovo scout name horse ridden tonto sidekick 1950s television series lone ranger lenovo envisioned scout high-end thinkpad would analogous luxury car unit covered fine leather embossed owners initials extensive market research conducted consumers would perceive form factor determined appreciated emphasised warmth nature human relations technology scout soon renamed thinkpad reserve edition came bundled premium services including dedicated 24-hour technical support hotline would answered immediately released 2007 sold 5,000 united states sl series launched 2008 low-end thinkpad targeted mainly geared toward small businesses lacked several traditional thinkpad features thinklight magnesium alloy roll cage ultrabay lid latch use 6-row keyboard different layout traditional 7-row thinkpad keyboard also sl-series models ideapad-based firmware models offered included 14 sl400 sl410 15.6 sl500 sl510 13.3 model sl300 previously offered discontinued w series introduced 2008 replace p-suffixed performance series e.g t61p geared towards cad users photographers power users others need high-performance system demanding tasks w530 released june 2012 minimum specifications include intel core i5 i7 cpu 15.6 hd screen nvidia quadro k1000m graphics processor four dimm slots capable accepting maximum 32 gb ram previously available w7xx series 17 widescreen model w500 15.4 16:10 ratio model w510 15.6 16:9 ratio model w520 15.6 16:9 ratio model w700ds w701ds two displays 17 main lcd 10 slide-out secondary lcd w7xx series also available wacom digitizer built palm rest high-performance workstation models offered high-end components quad core cpus higher-end workstation graphics compared t-series powerful thinkpad laptops available w540 retained thinklight ultrabay roll cage lid latch found t-series w540 release marked end lid latch thinklight hot-swappable ultrabays found earlier models thinkpad w series discontinued replaced p series mobile workstations edge series released early 2010 small business consumer-end machines design radical departure compared traditional black boxy thinkpad design glossy surfaces optional matte finish later models rounded corners silver trim also offered red first traditionally black thinkpads like sl series targeted towards small businesses consumers lack roll cage ultrabay lid latch thinklight traditional thinkpads though 2011 e220s e420s thinklights also introduced island-style keyboard significantly different layout models included 12.5 e220 e220s 13.3 edge 13 14 edge 14 e420 e420s 15.6 edge 15 e520 e545 sizes 11.6 edge 11 model offered available united states series positioned mid-range thinkpad offering containing ultrabooks derived edge series august 2013 series includes s531 s440 models cases made aluminum magnesium alloy available silver gunmetal colors lenovo thinkpad twist s230u laptop/tablet computer hybrid aimed high-end users twist gets name screen ability twist manner converts device tablet twist 12.5 screen makes use intel core i7 processor ssd technology lieu hard drive review engadget dana wollman wrote lately feel like reviews windows 8 convertibles end way thinkpad twist plenty going bright ips display good port selection affordable price unrivaled typing experience like thinkpads past also offers useful software features businesses lacking dedicated departments good things road warrior battery barely lasts four hours something tells us twist still appeal lenovo loyalists folks trust thinkpad build quality would n't caught dead using keyboard 're brand-agnostic though windows 8 convertibles comfortable keyboards – mention sharper screens faster performance longer battery life helix convertible laptop satisfying tablet conventional notebook users uses rip flip design allows user detach display replace facing different direction sports 11.6 full hd 1920 × 1080 display support windows 8 multi-touch essential processing hardware contained display assembly multitouch capability detached monitor used standalone tablet computer helix high-end hardware build quality including gorilla glass stylus-based input intel vpro hardware-based security features designed appeal business users review published forbes jason evangelho wrote first laptop owned thinkpad t20 next one may likely thinkpad helix lenovo unveiled ces 2013 sea touch-inspired windows 8 hardware first ultrabook convertible form factor gets everything right first batch windows 8 ultrabooks get high marks inspired designs n't quite flexible enough truly byod bring device solutions lenovo ideapad yoga came close sensation feeling keyboard underneath fingers transformed tablet mode slightly jarring dell xps 12 solved problem clever rotating hinge design wanted ability remove tablet display entirely products thinkpad 13 also known thinkpad s2 mainland china budget model 13-inch screen versions running windows 10 google chrome os options powerful configuration skylake core i7 processor 512gb ssd connectivity includes hdmi usb 3.0 onelink+ usb type-c etc weighs thick 2017 second generation ultrabook model released kaby lake core i7 processor fhd touchscreen available certain countries lineup merged l-series 2018 l380 successor 13 second generation lenovo released 25th anniversary retro thinkpad 25 october 2017 model based t470 difference 7-row classic keyboard layout found −20 series logo received splash colour reminiscent ibm era last thinkpad models 7-row keyboard introduced 2011 september 2017 lenovo announced two thinkpad models featuring amd pro chipset technology – a275 a475 sees revival series nameplate seen since early 2000s thinkpads ibm ownership however likely moniker emphasised uses amd technology rather comparative product segment workstation class previous line n't first time lenovo offered amd derived thinkpad first released alternative premium offering established series x series thinkpads use intel chipsets instead
[ 5980, 4291, 4295, 188, 6256, 2995, 2550, 6615, 3274, 818, 3009, 7442, 5571, 4148, 578, 3395, 3040, 7670, 953, 8135, 2342, 3826, 4277, 352, 3674, 972 ]
Validation
2,343
4
Michael_Hayden_(general):michael hayden general michael vincent hayden born march 17 1945 retired united states air force four-star general former director national security agency principal deputy director national intelligence director central intelligence agency hayden currently co-chairs bipartisan policy center electric grid cyber security initiative 2017 hayden became national security analyst cnn director national security agency nsa 1999 2005 tenure director oversaw controversial nsa surveillance technological communications persons united states alleged foreign terrorist groups resulted nsa warrantless surveillance controversy april 21 2005 lt. gen hayden confirmed united states senate first principal deputy director national intelligence awarded fourth star-making highest-ranking military intelligence officer armed forces served position dni john negroponte may 26 2006 may 8 2006 hayden nominated position director central intelligence agency following resignation porter j. goss 23 may united states senate select committee intelligence voted 12–3 send nomination senate floor nomination confirmed united states senate 26 may vote 78–15 may 30 2006 following day cia lobby president george w. bush attendance hayden sworn director central intelligence agency july 1 2008 hayden retired air force 41 years service continued serve director cia february 12 2009 received honorary doctorate institute world politics washington d.c. 2009 currently principal chertoff group security consultancy co-founded former homeland security secretary michael chertoff also serves board directors caliburn international military contractor oversees operations homestead temporary shelter unaccompanied children hayden distinguished visiting professor george mason university schar school policy government elected board directors motorola solutions effective january 4 2011 michael vincent hayden born march 17 1945 pittsburgh pennsylvania irish-american couple sadie murray harry v. hayden jr. worked welder pennsylvania manufacturing company sister debby brother harry hayden attended st. peter elementary school 7th 8th grade played quarterback school football team coached late dan rooney son founder pittsburgh steelers former chairman team hayden graduated north catholic high school one first jobs equipment manager steelers went duquesne university pittsburgh earned bachelor arts history 1967 commissioned second lieutenant attended graduate school duquesne master degree modern american history continues avid fan hometown pittsburgh steelers since 1990s traveling wife family least three four games year hayden commissioned duquesne university air force reserve officers training corps program hayden entered active military service 1969 hayden married former jeanine carrier daughter margaret two sons michael liam november 2018 hayden hospitalized suffering stroke hayden served commander air intelligence agency director joint command control warfare center headquartered lackland air force base also served senior staff positions pentagon headquarters u.s. european command stuttgart germany national security council washington d.c. u.s. embassy then-people republic bulgaria prior becoming director national security agency general served deputy chief staff united nations command u.s forces korea yongsan garrison also worked intelligence guam 1996 1997 hayden served commander aia agency 16,000 charged defending exploiting information domain hayden served director national security agency chief central security service fort george g. meade maryland march 1999 april 2005 director nsa chief css responsible combat support agency department defense military civilian personnel stationed worldwide hayden came nsa time great trouble agency internal government analysis indicated suffered lack quality management outdated infrastructure fact soon came board huge part nsa network system crashed several days part plan revitalize agency introduce outside contractors induce lot old managers retire get rid old management structures part plan also included increased openness agency historically one secretive organs government notably allowed james bamford access book body secrets hayden also initially extremely concerned following laws domestic surveillance many reports say 9/11 became concerned stopping terrorism allegedly softened stance domestic surveillance hayden however said believed everything agency effective appropriate lawful 9/11 hayden immediately evacuated non-essential personnel nsa headquarters 9/11 agency greatly increased activity details operations largely hidden played major role wars afghanistan iraq war terror one notable example relationship unmanned aerial vehicle 'drone program may 2006 usa today reported hayden leadership nsa created domestic telephone call database nomination hearings hayden defended actions senator russ feingold others stating relied upon legal advice white house building database supported article two united states constitution executive branch powers president must take care laws faithfully executed overriding legislative branch statutes forbidding warrantless surveillance domestic calls included foreign intelligence surveillance act fisa previously action would required warrant fisa court stated purpose database eavesdrop international communications persons within u.s. individuals groups overseas order locate terrorists hayden also championed trailblazer project transformation project large information technology component project criticized several nsa staffers including privacy protections united states citizens waste money critics included diane roark house intelligence committee nsa workers thomas andrews drake william binney j. kirk wiebe loomis others hayden severely rebuked critics several quit protest investigations nsa inspector general dod inspector general congress trailblazer shut part intelligence reform terrorism prevention act 2004 cia chief longer would run intelligence community instead new office created purpose director national intelligence general hayden became principal deputy director national intelligence may 2005 may 2006 first dni john negroponte january 23 2006 hayden participated news conference youtube video posted michael hayden telling reporters press conference probable cause required searches seizures fourth amendment claiming instead standard whether search seizure reasonable probable cause required warrants whether search seizure deemed unreasonable hayden referred people believed torture cia detainees never yielded useful intelligence interrogation deniers may 8 2006 hayden nominated president george w. bush director central intelligence agency resignation porter j. goss may 5 2006 later confirmed may 26 2006 director 78–15 full u.s. senate vote critics nomination hayden attempts increase domestic surveillance included senator dianne feinstein stated may 11 2006 happen believe way major constitutional confrontation fourth amendment guarantees unreasonable search seizure hayden accused lying congress 2007 testimony cia 'enhanced interrogation program 2007 hayden lobbied allow cia conduct drone strikes purely behavior ground vehicles evidence connection terrorism 2008 hayden warned destabilizing consequences muslim migration europe might raise possibility civil unrest 2013 p5+1 reached nuclear agreement iran hayden said accepted iranian uranium enrichment 2014 senate intelligence committee report cia torture cited email prepared subordinate indicated cia director hayden instructed out-of-date information used briefing congress fewer 100 guantanamo bay detainees would reported september 2013 hayden stressed indisputable legality nsa called edward snowden troubled young man morally arrogant tremendous degree also said prospects russia suspect end like rest defectors went old soviet union isolated bored lonely depressed—and ended alcoholics 2008 native northside neighborhood city pittsburgh named part street going past heinz field honor july 26 2011 hayden inducted air force reserve officer training corps distinguished alumni ceremony maxwell afb alabama officiated lt. gen. allen g. peck commander air university serves member board advisors military cyber professionals association mcpa playing edge one new york times book review 100 notable books 2016
[ 4210, 1344, 820, 208, 6627, 1278, 3716, 7191, 4429, 7917, 147, 5412, 5767, 5509, 6756, 4988, 4996, 1701, 4201 ]
Validation
2,344
4
Estonian_Defence_League's_Cyber_Unit:estonian defence league cyber unit estonian defence league ’ cyber unit kkl group units within certain malevs estonian defense league established 2010 created inspiration 2007 cyberattacks estonia spearheaded informatics scientist ülo jaaksoo focuses defense estonian state private telecommunications infrastructure outside-derived cyberattacks mostly employs volunteer participation professionals kkl headquartered grounds tartu tallinn malevs jointly headed tallinn jaan priisalu tartu kuido külm kkl mission protect estonia high-tech way life protecting information infrastructure thus carrying broad defense goals defence minister jaak aaviksoo publicly suggested desire spread kkl units branches option conscripted estonian military
[]
Test
2,345
2
Microsoft_Tinker:microsoft tinker tinker also known microsoft tinker puzzle video game developed fuel industries player controls robot various mazes obstacle courses originally released september 23 2008 part windows ultimate extras contained 60 levels including 20-level tutorial free map editor level builder also released however compatible games windows – live version tinker compatible windows ultimate extras version december 15 2009 expanded live-enabled version game released games windows – live client game available windows xp windows vista windows 7 including users access windows vista ultimate extras windows vista editions contains 160 levels including tutorial version also 15 achievements worth 200g similar many xbox live arcade games like every games windows live game requires user sign using gamertag assigned windows live id however windows vista ultimate extras version requirement tinker spatial/environmental puzzle game players must guide robot end point moving objects activating switches traversing obstacles playing field square board divided checkerboard pattern robot given limited number moves make runs energy player must guide goal marker without expiring motions essentially action robot makes counts move including taking step activating switch turning around players must carefully plan actions stage waste moves players replenish robot energy collecting batteries thus extend possible number moves allowed make players earn achievement star level completing course par time energy cog collection cogs exist level obstacles objects present levels include movable objects pushed pulled two objects row pushed even movable objects stacked top pushed bottom object movable e.g. tower consisting two dice blocks metal block moved one dice blocks bottom attempting push immovable object row objects result wasted move though attempting walk obstacle waste move robot destroyed rendered inoperable hit laser beam falling height greater two blocks running energy hazards destroy robot process reaching exit e.g. robot walks laser beam crosses exit square hazard trumps exit robot destroyed however level completed exit reached zero energy live-enabled version tinker previously possible earn achievement star set 07 level 19 due energy par value -1 player could unlock perfection achieved achievement thus able obtain 175 achievement points 200 fuel industries game developer nick iannitti mentioned tinker blog fix sent gfwl march 7 2010 fix hours removed due bug auto-update code required unnecessary reboot update officially released april 10 2010 making perfection achieved achievement obtainable
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 6136, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, ...
Test
2,346
5
Time-based_One-time_Password_algorithm:time-based one-time password algorithm time-based one-time password algorithm totp extension hmac-based one-time password algorithm hotp generating one-time password instead taking uniqueness current time adopted internet engineering task force standard rfc 6238 cornerstone initiative open authentication oath used number two-factor authentication systems latency network human unsynchronised clocks one-time password must validate range times authenticator authenticated time downsampled larger durations e.g. 30 seconds allow validity parties however hotp decreased uniqueness requires additional countermeasures rate limiting establish totp authentication authenticated authenticator must pre-establish hotp parameters following totp parameters authenticator authenticatee compute totpvalue authenticator checks totpvalue supplied authenticated matches locally-generated totpvalue authenticators allow values generated current time order account slight clock skews network latency user delays totp uses hotp algorithm substituting counter non-decreasing value based current time time counter c integer counting number durations difference current unix time epoch cf unix epoch latter values integer seconds note unix time strictly increasing specifically leap seconds inserted utc subsequent authentications work clocks authenticated authenticator need roughly synchronized authenticator typically accept one-time passwords generated timestamps differ ±1 time interval authenticated timestamp totpvalues phished passwords though require attackers proxy credentials real time rather collect later time implementations n't limit login attempts vulnerable brute forcing values attacker steals shared secret generate new valid totpvalues particular problem attacker breaches large authentication database totp devices batteries go flat clocks de-sync totp software versions run phones lost and/or stolen real-world implementations methods bypass protection e.g printed codes email-resets etc. cause considerable support burden large user-bases also gives fraudulent users additional vectors exploit totpvalues valid longer amount time show screen typically twice long concession authenticating authenticated sides clocks skewed large margin totp draft developed collaboration several oath members order create industry-backed standard complements event-based one-time standard hotp offers end user organizations enterprises choice selecting technologies best fit application requirements security guidelines 2008 oath submitted draft version specification ietf version incorporates feedback commentary authors received technical community based prior versions submitted ietf may 2011 totp officially became rfc 6238
[ 2543, 7380, 7865, 3568, 5554, 3227 ]
Test
2,347
4
Burp_Suite:burp suite burp burp suite graphical tool testing web application security tool written java developed portswigger web security tool three editions community edition downloaded free charge professional edition enterprise edition purchased trial period community edition significantly reduced functionality developed provide comprehensive solution web application security checks addition basic functionality proxy server scanner intruder tool also contains advanced options spider repeater decoder comparer extender sequencer company behind burp suite also developed mobile application containing similar tools compatible ios 8 portswigger founded 2004 dafydd stuttard leading expert web security also authored popular manual web application security
[ 325, 3338, 5051 ]
Validation
2,348
9
Immediately_invoked_function_expression:immediately invoked function expression immediately invoked function expression iife pronounced iffy javascript programming language idiom produces lexical scope using javascript function scoping immediately invoked function expressions used avoid variable hoisting within blocks protect polluting global environment simultaneously allow public access methods retaining privacy variables defined within function immediately invoked function expressions may written number different ways common convention enclose function expressionand optionally invocation operatorwith grouping operator parentheses tell parser explicitly expect expression otherwise situations parser encounters codice_1 keyword treats function declaration statement function expression function /* ... */ function /* ... */ ways enforce function expression function /* ... */ ~function /* ... */ -function /* ... */ +function /* ... */ void function /* ... */ contexts expression expected wrapping parentheses necessary var f function /* ... */ true function /* ... */ 0 function /* ... */ passing variables scope done follows function b /* ... */ hello world initial parenthesis one case automatic semicolon insertion asi javascript cause problems expression instead interpreted call last term preceding line styles omit optional semicolons semicolon placed front parenthesis known defensive semicolon example b c // code ... avoid parsed codice_2 key understanding design patterns iife realize prior es6 javascript featured function scope thus lacking block scope passing values reference inside closures longer case es6 version javascript implements block scoping using new codice_3 codice_4 keywords lack block scope means variables defined inside example loop definition hoisted top enclosing function evaluating function depends variables modified outer function including iteration difficult see without loop update value defining invoking function var v getvalue v 1 getvalue function return v v 2 getvalue // 2 result may seem obvious updating codice_5 manually produce unintended results codice_6 defined inside loop hereafter function passes codice_5 argument invoked immediately preserving inner function execution context var v getvalue v 1 getvalue function x v v 2 getvalue // 1 equivalent following code var v getvalue v 1 function f x getvalue f v v 2 getvalue // 1 david herman effective javascript contains example illustrating problems evaluation context inside loops herman example deliberately convoluted arises directly lack block scope iifes also useful establishing private methods accessible functions still exposing properties later use following example comes alman post iifes // counter function returns object properties case functions var counter function // calls access function properties returned counter counter.get // 0 counter.set 3 counter.increment // 4 counter.increment // 5 attempt access codice_8 global environment undefined enclosed within invoked function property codice_9 likewise attempt access codice_10 result error declared codice_10 global environment originally known self-executing anonymous function ben alman later introduced current term iife semantically accurate name idiom shortly discussion arose comp.lang.javascript notably immediately invoked functions need anonymous inherently ecmascript5 strict mode forbids codice_12 rendering original term misnomer
[ 790, 562, 3931, 2451, 7333, 7687, 6172 ]
Test
2,349
2
Boot_disk:boot disk boot disk removable digital data storage medium computer load run boot operating system utility program computer must built-in program load execute program boot disk meeting certain standards almost modern computers boot hard drive containing operating system software would normally called boot disks removable media cd-roms common forms media used media magnetic paper tape drives zip drives recently usb flash drives used computer bios must support booting device question boot disks used term boot comes idea lifting oneself one bootstraps computer contains tiny program bootstrap loader load run program found boot device program may small program designed load larger capable program i.e. full operating system enable booting without requirement either mass storage device write boot medium usual boot program use system ram ram disk temporary file storage example computer compatible ibm pc able built-in software load contents first 512 bytes floppy execute viable program boot floppies simple loader program bytes process vulnerable abuse data floppies could virus written first sector silently infects host computer switched disk drive bootable floppy disks boot floppies pcs usually contain dos miniature versions linux commonly available floppy disk hold 1.4 mb data standard format making impractical loading large operating systems use boot floppies decline due availability higher-capacity options cd-roms usb flash drives modern pc configured attempt boot various devices certain order computer booting device desired floppy drive user may enter bios setup function pressing special key computer first turned delete f1 f2 f10 f12 changing boot order recent bioses permit interruption final stage boot process pressing function key usually f11 results list bootable devices presented selection may made modern apple computers boot appropriate disk user presses c key machine starting different operating systems use different boot disk contents boot disks must compatible computer designed files must version operating system complete boot disks prepared one operation installed operating system details vary
[ 1710, 362, 1254, 1536, 6175, 3271, 5571, 2399, 578, 3903, 4536, 3230, 1052, 1992, 788, 447 ]
Test
2,350
6
Disk_sector:disk sector computer disk storage sector subdivision track magnetic disk optical disc sector stores fixed amount user-accessible data traditionally 512 bytes hard disk drives hdds 2048 bytes cd-roms dvd-roms newer hdds use 4096-byte 4 kib sectors known advanced format af sector minimum storage unit hard drive disk partitioning schemes designed files occupy integral number sectors regardless file actual size files fill whole sector remainder last sector filled zeroes practice operating systems typically operate blocks data may span multiple sectors geometrically word sector means portion disk center two radii corresponding arc see figure 1 item b shaped like slice pie thus disk sector figure 1 item c refers intersection track geometrical sector modern disk drives physical sector made two basic parts sector header area typically called id data area sector header contains information used drive controller information includes sync bytes address identification flaw flag error detection correction information header may also include alternate address used data area undependable address identification used ensure mechanics drive positioned read/write head correct location data area contains sync bytes user data error-correcting code ecc used check possibly correct errors may introduced data first disk drive 1957 ibm 350 disk storage ten 100 character sectors per track character six bits included parity bit number sectors per track identical recording surfaces recorded identifier field id associated sector 1961 ibm 1301 disk storage introduced variable length sectors termed records ibm added record record address field separate data record sector modern disk drives sector address fields called id fields separate data sector also 1961 bryant 4000 series introduced concept zoned recording allowed number sectors per track vary function track diameter sectors outer track inner track became industry practice 1990s standard today disk drives announced ibm system/360 1964 detected errors fields sectors records cyclic redundancy check crc replacing parity per character detection prior generations ibm sectors records time added third field physical sector key field aid searching data ibm physical sectors called records three basic parts count field acts id field key field present disk drive sectors data field frequently called ckd format record 1970 ibm 3330 disk storage replaced crc data field sector error correcting code ecc improve data integrity detecting errors allowing correction many errors ultimately fields disk sectors eccs prior 1980s little standardization sector sizes disk drives maximum number bits per track various system manufacturers subdivided track different sector sizes suit oses applications popularity pc beginning 1980s advent ide interface late 1980s led 512-byte sector becoming industry standard sector size hdds similar storage devices 1970s ibm added fixed-block architecture direct access storage devices fba dasds line ckd dasd ckd dasd supported multiple variable length sectors ibm fba dasd supported sector sizes 512 1024 2048 4096 bytes 2000 industry trade organization international disk drive equipment materials association idema started work define implementation standards would govern sector size formats exceeding 512 bytes accommodate future increases data storage capacities.by end 2007 anticipation future idema standard samsung toshiba began shipments 1.8-inch hard disk drives 4096 byte sectors 2010 idema completed advanced format standard 4096 sector drives setting date transition 512 4096 byte sectors january 2011 manufacturers advanced format drives soon became prevalent sector specifically means physical disk area term block used loosely refer small chunk data block multiple meanings depending context context data storage filesystem block abstraction disk sectors possibly encompassing multiple sectors contexts may unit data stream unit operation utility example unix program dd allows one set block size used execution parameter codice_1 specifies size chunks data delivered dd unrelated sectors filesystem blocks linux disk sector size determined codice_2 block size determined codice_3 sector defined intersection radius track case early hard drives floppy disks sectors towards outside disk physically longer nearer spindle sector still contains number bytes outer sectors lower bit density inner ones inefficient use magnetic surface solution zone bit recording wherein disk divided zones encompassing small number contiguous tracks zone divided sectors sector similar physical size outer zones greater circumference inner zones allocated sectors known zoned bit rate consequence zone bit recording contiguous reads writes noticeably faster outer tracks corresponding lower block addresses inner tracks bits pass head rotation difference 25 1998 traditional 512-byte sector size identified one impediment increasing capacity time growing rate exceeding moore law increasing length data field implementation advanced format using 4096-byte sectors removed impediment increased efficiency data surface area five thirteen percent increasing strength ecc turn allowed higher capacity format standardized industry consortium 2005 2011 incorporated new products hard drive manufacturers
[ 1710, 2717, 7331, 7242, 6885, 4398, 5562, 5128, 576, 2306, 5672, 3221, 5419, 4536, 3905, 6488, 5784, 5615, 6241 ]
Validation
2,351
3
P6_(microarchitecture):p6 microarchitecture p6 microarchitecture sixth-generation intel x86 microarchitecture implemented pentium pro microprocessor introduced november 1995 frequently referred i686 succeeded netburst microarchitecture 2000 eventually revived pentium line microprocessors successor pentium variant p6 microarchitecture core microarchitecture turn also derived p6 microarchitecture p6 core sixth generation intel microprocessor x86 line first implementation p6 core pentium pro cpu 1995 immediate successor original pentium design p5 p6 processors dynamically translate ia-32 instructions sequences buffered risc-like micro-operations analyze reorder micro-operations order detect parallelizable operations may issued one execution unit pentium pro first x86 chip use technique — nexgen nx586 introduced 1994 also used — first intel x86 chip techniques first used x86 space p6 core include p6 architecture lasted three generations pentium pro pentium iii widely known low power consumption excellent integer performance relatively high instructions per cycle ipc p6 line processing cores succeeded netburst p68 architecture appeared introduction pentium 4 completely different design based use long pipelines favoured high clock speed cost lower ipc higher power consumption upon release pentium 4-m mobile pentium 4 quickly realized new mobile netburst processors ideal mobile computing netburst-based processors simply efficient per clock per watt compared p6 predecessors mobile pentium 4 processors ran much hotter pentium iii-m processors n't offer significant performance advantages inefficiency affected cooling system complexity also all-important battery life realizing new microarchitecture n't best choice mobile space intel went back drawing board design would optimally suited market segment result modernized p6 design called pentium design overview pentium power efficient x86 processor notebooks several years consuming maximum 27 watts maximum load 4-5 watts idle processing efficiency gains brought modernization allowed rival mobile pentium 4 clocked 1 ghz higher fastest-clocked mobile pentium 4 compared fastest-clocked pentium equipped much memory bus bandwidth first pentium family processors banias internally support pae show pae support flag cpuid information causes operating systems primarily linux distributions refuse boot processors since pae support required kernels yonah cpu launched january 2006 core brand single dual-core mobile version sold core solo core duo pentium dual-core brands server version released xeon lv processors provided partial solutions pentium shortcomings adding resulted interim microarchitecture low-voltage cpus part way p6 following core microarchitecture july 27 2006 core microarchitecture derivative p6 launched form core 2 processor subsequently processors released core microarchitecture core 2 xeon pentium celeron brand names core microarchitecture intel final mainstream processor line use fsb later intel processors based nehalem later intel microarchitectures featuring integrated memory controller qpi dmi bus communication rest system improvements relative intel core processors chips technically derivatives pentium pro architecture gone several radical changes since inception
[ 6793, 3942, 5379, 1854, 1867, 766, 2248, 6148, 6152, 441, 2977, 5802, 6170, 4765, 3020, 3717, 4077, 2685, 2332, 7302, 4098, 1237, 2351, 4108, 4116, 4847, 3443, 7364, 3803, 6647, 5243, 5605, 1335, 2448, 2449, 2814, 6332, 6698, 5988, 3849, ...
Test
2,352
5
Data_link_connection_identifier:data link connection identifier data link connection identifier dlci frame relay 10-bit-wide link-local virtual circuit identifier used assign frames specific pvc svc frame relay networks use dlcis statistically multiplex frames dlcis preloaded switch act road signs traveling frames standard allows existence 1024 dlcis dlci 0 reserved ansi/q993a lmi standard—only numbers 16 976 usable end-user equipment dlci 1023 reserved cisco lmi however numbers 16 1007 usable summary using cisco lmi numbers 16 1007 available end-user equipment rest reserved various management purposes dlci layer 2 addresses locally significant two devices dlci mapped interface one frame relay cloud
[ 3797, 585 ]
Validation
2,353
3
Freescale_683XX:freescale 683xx freescale 683xx formerly motorola 683xx family compatible microcontrollers use motorola 68000-based cpu core family designed using hardware description language making parts synthesizable amenable improved fabrication processes die shrinks two cpu cores used 683xx family 68ec000 cpu32 instruction set cpu32 core similar 68020 without bitfield instructions instructions unique cpu32 core table lookup interpolate instructions low-power stop mode modules microcontroller designed independently released new cpus could tested process let architects perform design-ahead silicon technologies available motorola designs ready implement go market many submodules carried forward coldfire line processors microcontrollers consist series modules connected internal bus modules available various processors 683xx family
[ 5097, 5100, 7327, 1075, 4479, 1454, 3451, 5652, 3708, 7905, 7990, 6111, 4702, 1386, 7654, 2133, 1670, 234, 2501, 2781, 2785, 608, 5079, 1237, 2257, 5614, 3674, 7133, 5622 ]
Test
2,354
4
Scareware:scareware scareware form malware uses social engineering cause shock anxiety perception threat order manipulate users buying unwanted software scareware part class malicious software includes rogue security software ransomware scam software tricks users believing computer infected virus suggests download pay fake antivirus software remove usually virus fictional software non-functional malware according anti-phishing working group number scareware packages circulation rose 2,850 9,287 second half 2008 first half 2009 apwg identified 585 increase scareware programs scareware label also apply application virus pranks users intent cause anxiety panic internet security writers use term scareware describe software products produce frivolous alarming warnings threat notices typically fictitious useless commercial firewall registry cleaner software class program tries increase perceived value bombarding user constant warning messages increase effectiveness way software packaged look feel mimics legitimate security software order deceive consumers websites display pop-up advertisement windows banners text computer may infected harmful spyware programs immediate removal may required scan click 'yes websites go far saying user job career marriage would risk products using advertisements often considered scareware serious scareware applications qualify rogue software scareware affiliated installed programs user encounter pop-up website indicating pc infected scenarios possible become infected scareware even user attempts cancel notification popups especially designed look like come user operating system actually webpage 2010 study google found 11,000 domains hosting fake anti-virus software accounting 50 malware delivered via internet advertising starting march 29 2011 1.5 million web sites around world infected lizamoon sql injection attack spread scareware research google discovered scareware using servers check internet connectivity data suggested million machines infected scareware company placed warning search results users whose computers appear infected another example scareware smart fortress site scares people thinking lots viruses computer asks buy professional service forms spyware also qualify scareware change user desktop background install icons computer notification area microsoft windows claiming kind spyware infected user computer scareware application help remove infection cases scareware trojans replaced desktop victim large yellow text reading warning spyware box containing similar text even forced screensaver change bugs crawling across screen winwebsec term usually used address malware attacks users windows operating system produces fake claims similar genuine anti-malware software spysheriff exemplifies spyware scareware purports remove spyware actually piece spyware often accompanying smitfraud infections antispyware scareware may promoted using phishing scam another approach trick users uninstalling legitimate antivirus software microsoft security essentials disabling firewall since antivirus programs typically include protection tampered disabled software scareware may use social engineering convince user disable programs would otherwise prevent malware working 2005 microsoft washington state successfully sued secure computer makers spyware cleaner 1 million charges using scareware pop-ups washington attorney general also brought lawsuits securelink networks high falls media makers quick shield october 2008 microsoft washington attorney general filed lawsuit two texas firms branch software alpha red producers registry cleaner xp scareware lawsuit alleges company sent incessant pop-ups resembling system warnings consumers personal computers stating critical error message registry damaged corrupted instructing users visit web site download registry cleaner xp cost 39.95 december 2 2008 u.s. federal trade commission ftc filed complaint federal court innovative marketing inc. bytehosting internet services llc well individuals sam jain daniel sundin james reno marc ’ souza kristy ross complaint also listed maurice ’ souza relief defendant alleged held proceeds wrongful conduct accusing violating law ftc alleged defendants violated ftc act deceptively marketing software including winfixer winantivirus drivecleaner errorsafe xp antivirus according complaint defendants falsely represented scans consumer computer showed compromised infected offered sell software fix alleged problems another type scareware involves software designed literally scare user use unanticipated shocking images sounds video
[ 2173, 2810, 623, 4025, 6511, 7151, 6417, 4759, 6515, 3426, 2996, 3089, 6419, 1456, 2733, 3698, 651, 210, 2026, 1376, 4508, 2850, 7186, 2577, 5401, 7371, 6823, 5848, 1766, 330, 7480, 3047, 2789, 8133, 74, 6682, 3071, 88, 3680, 4110, 880 ...
Test
2,355
2
Setcontext:setcontext setcontext one family c library functions others getcontext makecontext swapcontext used context control codice_1 family allows implementation c advanced control flow patterns iterators fibers coroutines may viewed advanced version setjmp/longjmp whereas latter allows single non-local jump stack codice_1 allows creation multiple cooperative threads control stack codice_1 specified posix.1-2001 single unix specification version 2 unix-like operating systems provide posix.1-2004 obsoleted functions posix.1-2008 removed posix threads indicated possible replacement citing ieee std 1003.1 2004 edition incorporation iso/iec 9899:1999 standard specification found iso c standard subclause 6.11.6 specifies use function declarators empty parentheses obsolescent feature therefore using function prototype making use obsolescent feature iso c standard therefore strictly conforming posix application use form therefore use getcontext makecontext swapcontext marked obsolescent way iso c standard specify non-obsolescent function prototype indicating function called arbitrary number including zero arguments arbitrary types including integers pointers data pointers functions composite types functions associated types defined codice_4 system header file includes codice_5 type four functions operate codice_6 points context resumed current context exits context created codice_7 secondary context codice_8 used store set signals blocked context codice_9 stack used context codice_10 stores execution state including registers cpu flags instruction pointer stack pointer codice_11 opaque type functions example demonstrates iterator using codice_1 note example correct may work intended cases function codice_7 requires additional parameters type codice_36 example passes pointers thus example may fail 64-bit machines specifically lp64-architectures problem worked around breaking reconstructing 64-bit values introduces performance penalty get set context smaller context handy makes infinite loop context holds program counter
[ 2176, 5571, 1237, 1989, 578, 1435 ]
Test
2,356
5
L2TPv3:l2tpv3 layer 2 tunnelling protocol version 3 ietf standard related l2tp used alternative protocol multiprotocol label switching mpls encapsulation multiprotocol layer 2 communications traffic ip networks like l2tp l2tpv3 provides pseudo-wire service scaled fit carrier requirements l2tpv3 regarded mpls ip atm simplified version concept much benefit achieved fraction effort cost losing technical features considered less important market case l2tpv3 features lost teletraffic engineering features considered important mpls however reason features could re-engineered top l2tpv3 later products protocol overhead l2tpv3 also significantly bigger mpls
[ 7148, 456, 6879, 2281, 6521, 6976, 3775, 3855, 7806, 2644, 7170, 6531, 1462, 2650, 7637, 5488, 1559, 2119, 6908, 7091, 2219, 3383, 3640, 3797, 2043, 4162, 8008, 3312, 5157, 2057, 3572, 3819, 3820, 3821, 7122, 7214, 6487, 7217, 7765, 530, ...
Train
2,357
2
New_World_ROM:new world rom new world rom computers macintosh models use macintosh toolbox rom logic board due mac os x requiring availability toolbox allowed rom sizes shrink dramatically typically facilitated use flash memory system firmware instead expensive less flexible mask rom previous macs used facility loading toolbox startup device however made available allowing use mac os 8 mac os 9 new world machines new world architecture developed macintosh network computer unrealized project eventually contributed several key technologies first-generation imac powerpc macs imac ibook blue white power mac g3 bronze keyboard lombard powerbook g3 forward new world rom machines previous models including beige power mac g3 beige platinum macs old world rom machines intel based macs incapable running mac os 9 machines efi used instead open firmware new world old world machines based new world rom macs first macs direct usage open firmware subsystem encouraged previous pci power macs used open firmware booting implementation complete machines expected probe pci devices immediately hand control mac os rom versions 1.0.5 2.x several serious bugs well missing functionality able load files hfs partition tftp server apple also set default input output devices ttya modem port beige macs made difficult normal users get open firmware necessary either hook terminal change open firmware settings inside mac os using tool boot variables apple system disk new world rom introduced much-improved version open firmware interpreter version 3.0 added many missing features fixed bugs earlier versions capability run chrp boot scripts toolbox rom embedded inside chrp script system folder called mac os rom along short loader stub copy happy mac icon suitable display open firmware rom loaded disk mac boot sequence continued usual open firmware could also run binary boot loader version 3.0 added support elf objects well xcoff files versions 1.0.5 2.0 supported also version 3.0 well last releases version 2.x starting powerbook 3400 officially supported direct access open firmware command prompt console setting auto-boot variable false mac os holding command-option-o-f boot one major difference old world rom macs new world rom macs least classic mac os gestalt selector machine type longer usable new world rom macs use mach id 406 decimal actual machine id encoded model compatible properties root node open firmware device tree new world rom also sets compatible property root node macrisc2 machines boot classic mac os using mac os rom macrisc3 machines boot mac os x another unix-like system somewhat easier boot non-mac-os operating system new world system indeed openbsd bootloader works new world system simplest way distinguish new world rom mac factory built-in usb port old world rom mac usb port factory equipment instead used adb keyboard mouse mini-din-8 modem printer serial ports peripherals also new world rom macs generally built-in floppy drive
[ 1069, 2547, 7064, 7814, 7075, 5660, 1103, 405, 7274, 502, 6295, 2418, 149, 4175, 6765, 3230, 4453, 3412, 7311, 352, 3920, 4740 ]
Validation
2,358
3
Bandit_Kings_of_Ancient_China:bandit kings ancient china bandit kings ancient china also known japan turn-based strategy video game developed published koei released 1989 ms-dos amiga macintosh 1990 nintendo entertainment system 1996 koei issued remake japanese sega saturn sony playstation featuring vastly improved graphics new arrangements original songs based great classical novel water margin game takes place ancient china reign emperor huizong song dynasty bandit kings ancient china—a band ten bandits—engage war china minister war gao qiu evil person unlimited power objective game build sustain command army troops capture gao qiu jurchen invasion january 1127 players hold certain attributes strength dexterity wisdom players must also deal situations taxes care troops maintenance replacement weapons equipment forces nature troop unrest desertion battlefields take place hexagonal grids players move armies across various terrain order strategically engage defeat enemy army troops capability fighting either melee weapons bows arrows magic dueling swords player defeats enemy army option recruiting imprisoning exiling executing captured enemy troops attacker 30 days win castles defeat deployed enemy commanders automatically defeated game ends defeat player game calendar hit january 1127 game map shows empire composed 48 prefectures prefecture may invaded adjacent territory exception imperial capital kaifeng player must built sufficient popularity gain attention emperor confer imperial decree permitting player march capital reviewing nes version bandit kings ancient china nintendo power suggested players might find game pace slow compared action-oriented games others would enjoy game depth involvement attention detail compute magazine praised game one complete entertaining role-playing simulations available gave honorable mention war/strategy category 1991 compute choice awards reviewer austin american-statesman suggested game depth overwhelming calling game richest complex role-playing game ever published saying trouble figuring ... supposed pc magazine reviewed game positively concluding bandit kings ancient china addictive game brought alive mixture computer-driven personalities romance departed culture large battery options unpredictability game play computer gaming world gave game three five stars 1990 two stars 1993 amiga version received positive reviews amiga magazines game reviewed 1994 dragon 211 jay dee eye monitor column reviewers gave game 3½ 5 stars computer gaming world named bandit kings ancient china antagonist gao qiu twelfth memorable game villain
[ 8015, 6380 ]
Validation
2,359
7
Distributed_lock_manager:distributed lock manager operating systems use lock managers organise serialise access resources distributed lock manager dlm runs every machine cluster identical copy cluster-wide lock database way dlm provides software applications distributed across cluster multiple machines means synchronize accesses shared resources dlms used foundation several successful clustered file systems machines cluster use storage via unified file system significant advantages performance availability main performance benefit comes solving problem disk cache coherency participating computers dlm used file locking also coordination disk access vmscluster first clustering system come widespread use relies openvms dlm way dec vms virtual memory system first widely available operating system implement dlm became available version 4 although user interface single-processor lock manager first implemented version 3 dlm uses generalized concept resource entity shared access must controlled relate file record area shared memory anything else application designer chooses hierarchy resources may defined number levels locking implemented instance hypothetical database might define resource hierarchy follows process acquire locks database whole particular parts database lock must obtained parent resource subordinate resource locked process running within vmscluster may obtain lock resource six lock modes granted determine level exclusivity granted possible convert lock higher lower level lock mode processes unlocked resource system information resource destroyed following truth table shows compatibility lock mode others process obtain lock resource enqueueing lock request similar qio technique used perform i/o enqueue lock request either complete synchronously case process waits lock granted asynchronously case ast occurs lock obtained also possible establish blocking ast triggered process obtained lock preventing access resource another process original process optionally take action allow access e.g demoting releasing lock lock value block associated resource read process obtained lock resource null lock updated process obtained protected update exclusive lock used hold information resource application designer chooses typical use hold version number resource time associated entity e.g database record updated holder lock increments lock value block another process wishes read resource obtains appropriate lock compares current lock value value last time process locked resource value process knows associated entity updated since last time read therefore unnecessary read hence technique used implement various types cache database similar application one processes obtained locks resources possible produce situation preventing another obtaining lock none proceed known deadlock e. w. dijkstra originally called deadly embrace simple example process 1 obtained exclusive lock resource process 2 obtained exclusive lock resource b process 1 tries lock resource b wait process 2 release process 2 tries lock resource processes wait forever openvms dlm periodically checks deadlock situations example second lock enqueue request one processes would return deadlock status would process take action resolve deadlock—in case releasing first lock obtained red hat oracle developed clustering software linux ocfs2 oracle cluster file system added official linux kernel version 2.6.16 january 2006 alpha-quality code warning ocfs2 removed 2.6.19 red hat cluster software including dlm gfs2 officially added linux kernel version 2.6.19 november 2006 systems use dlm modeled venerable vms dlm oracle dlm simpler api core function codice_1 eight parameters whereas vms service red hat dlm_lock 11 dlm implementations include following
[ 5455, 1624, 1630, 5289, 2104, 1640, 5571, 578, 3801, 2411, 5408, 5239, 7924, 2683, 2054, 2329, 8124, 6309, 6315, 6586, 83 ]
Test
2,360
4
Identity_Interrogation:identity interrogation identity interrogation method authentication identity proofing involves posing one knowledge-based authentication questions individual identity interrogation questions mother ’ maiden name last four digits social security number questioning process requires individuals reveal personally identifiable information pii order prove identity method businesses use prevent identity theft impersonation customers identity interrogation primarily employed remote in-person interactions teller bank many interactions require user authentication internet telephone employ identity interrogation substitute stronger authentication methods physical ownership authentication i.e presenting driver license bankcard biometrics i.e fingerprint facial recognition available mainly in-person interactions identity interrogation used assist risk management account security legal regulatory compliance remote interactions addition technique developed assist prevention identity fraud illegal use another person identity commit fraud criminal activities identity interrogation methods commonly used governments organizations companies banks financial intermediaries credit card companies internet providers telecommunications companies insurance providers others
[ 4593, 7120 ]
Test
2,361
6
Hidden_file_and_hidden_directory:hidden file hidden directory computing hidden folder sometimes hidden directory hidden file folder file filesystem utilities display default showing directory listing commonly used storing user preferences preserving state utility frequently created implicitly using various utilities security mechanism access restricted usually intent simply clutter display contents directory listing files user directly create unix-like operating systems file folder starts dot character example /home/user/.config commonly called dot file dotfile treated hidden – codice_1 command display unless codice_2 flag codice_3 used command-line shells wildcards match files whose names start codice_4 unless wildcard starts explicit codice_4 convention arose using dotfiles user home directory store per-user configuration informational text early uses well-known dotfiles codice_6 codice_7 codice_8 configuration files bourne shell c shell shells compatible codice_9 codice_10 used codice_11 codice_12 commands many applications bash desktop environments gnome store per-user configuration way unix/linux freedesktop.org xdg base directory specification aims migrate user config files individual dotfiles codice_13 non-hidden files hidden directory codice_14 android operating system uses empty codice_15 files tell smartphone apps display include contents folder prevents digital photos digital music files shown picture galleries played mp3 player apps useful prevent downloaded voicemail files playing songs playlist keep personal photos private still allowing folders shared person friends family colleagues codice_15 file effect filesystem even operating system instead depends entirely individual app respect presence different files gnome desktop environment well programs written using glib filenames listed file named codice_17 directory also excluded display gnome file manager keyboard shortcut enables display kinds hidden files addition dotfile behaviour files invisible attribute hidden finder although codice_1 invisible attribute set cleared using codice_19 command example invoking codice_20 hide file jimbo starting mac os x snow leopard codice_21 command also used example codice_22 hide file jimbo dos systems file directory entries include hidden file attribute manipulated using attrib command use command line command codice_23 display files attribute hidden windows explorer content directory hidden appending pre-defined clsid end folder name directory still visible content becomes one windows special folders however real content directory still seen using cli command codice_24
[ 1710, 6788, 3685, 3843, 6264, 4771, 5116, 3626, 5571, 1281, 740, 6640, 2324, 4438, 4174, 1047, 6488, 5784, 4275, 6857, 2528, 7510 ]
Validation
2,362
7
GLite:glite glite pronounced gee-lite middleware computer software project grid computing used cern lhc experiments scientific domains implemented collaborative efforts 80 people 12 different academic industrial research centers europe glite provides framework building applications tapping distributed computing storage resources across internet glite services adopted 250 computing centres used 15000 researchers europe around world prototyping phases 2004 2005 convergence lhc computing grid lcg-2 distribution reached may 2006 glite 3.0 released became official middle-ware enabling grids e-science egee project ended 2010 development glite middle-ware taken european middleware initiative maintained part emi software stack distributed computing infrastructure built egee supported european grid infrastructure runs grid middle-ware produced european middleware initiative many components came glite middle-ware glite user community grouped virtual organisations vos user must join vo supported infrastructure running glite authenticated authorized using grid resources grid security infrastructure gsi wlcg/egee enables secure authentication communication open network gsi based public key encryption x.509 certificates secure sockets layer ssl communication protocol extensions single sign-on delegation authenticate him/herself user needs digital x.509 certificate issued certification authority ca trusted infrastructure running middle-ware authorization user specific grid resource done two different ways first simpler relies grid-mapfile mechanism second way relies virtual organisation membership service voms lcas/lcmaps mechanism allow detailed definition user privileges access point glite grid user interface ui machine users personal account user certificate installed ui user authenticated authorized use wlcg/egee resources access functionalities offered information workload data management systems provides cli tools perform basic grid operations computing element ce grid terminology set computing resources localized site i.e cluster computing farm ce includes grid gate gg acts generic interface cluster local resource management system lrms sometimes called batch system cluster collection worker nodes wns nodes jobs run two ce implementations glite 3.1 lcg ce developed edg used lcg-22 glite ce developed egee sites choose install provide types gg responsible accepting jobs dispatching execution wns via lrms glite 3.1 supported lrms types openpbs/pbspro platform lsf maui/torque bqs condor sun grid engine storage element se provides uniform access data storage resources storage element may control simple disk servers large disk arrays tape-based mass storage systems mss wlcg/egee sites provide least one se storage elements support different data access protocols interfaces simply speaking gsiftp gsi-secure ftp protocol whole-file transfers local remote file access performed using rfio gsidcap storage resources managed storage resource manager srm middle-ware service providing capabilities like transparent file migration disk tape file pinning space reservation etc however different ses may support different versions srm protocol capabilities vary number srm implementations use varying capabilities disk pool manager dpm used fairly small ses disk-based storage castor designed manage large-scale mss front-end disks back-end tape storage dcache targeted mss large-scale disk array storage systems srm implementations development srm protocol specification also evolving classic ses srm interface provide simple disk-based storage model process phased information service provides information wlcg/egee grid resources status information essential operation whole grid via resources discovered published information also used monitoring accounting purposes much data published conforms glue schema defines common conceptual data model used grid resource monitoring discovery information system used glite 3.1 inherits main concepts globus monitoring discovery service mds however gris giis mds replaced berkeley database information index essentially openldap server updated external process purpose workload management system wms accept user jobs assign appropriate computing element record status retrieve output resource broker rb machine wms services run jobs submitted described using job description language jdl specifies example executable run parameters files moved worker node job run input grid files needed requirements ce worker node choice ce job sent made process called match-making first selects among available ces fulfill requirements expressed user close specified input grid files chooses ce highest rank quantity derived ce status information expresses goodness ce typically function numbers running queued jobs rb locates grid input files specified job description using service called data location interface dli provides generic interface file catalogue way resource broker talk file catalogs lfc provided dli interface recent implementation wms egee allows submission single jobs also collections jobs possibly dependencies much efficient way old lcg-2 wms many new options finally logging bookkeeping service lb tracks jobs managed wms collects events many wms components records status history job glite components services contributing partners
[ 4159, 138, 2721, 5571, 6298, 1923, 3947, 5666, 5093 ]
Validation
2,363
9
Singleton_variable:singleton variable computer programming singleton variable variable referred examples variable might referenced dummy argument function call address assigned another variable subsequently accesses allocated storage singleton variables sometimes occur mistake made – assigning value variable forgetting use later mistyping one instance variable name compilers lint-like tools flag occurrences singleton variables
[ 1361 ]
Validation
2,364
4
Security_Shield:security shield security shield also known securityshield series rogue security software programs asks amount money get full version protection minor non-existent viruses
[ 6463 ]
Train
2,365
0
Lessac_Technologies:lessac technologies lessac technologies inc. lti american firm develops voice synthesis software licenses technology sells synthesized novels mp3 files firm currently seven patents granted lti technology partly based work late arthur lessac professor theater state university new york creator lessac kinesensic training lti licensed exclusive rights exploit arthur lessac copyrighted works fields speech synthesis speech recognition based view music speech speech music lessac work books focused body speech energies go together arthur lessac textual annotation system originally developed assist actors singers orators marking scripts prepare performance adapted lti speech synthesis system basic representation speech synthesized lessemes contrast many systems use phonetic representation lti ’ software two major components 1 linguistic front-end converts plain text sequence prosodic phonosensory graphic symbols lessemes based arthur lessac annotation system specify speech units synthesized 2 signal-processing back-end takes lessemes acoustic data produces human-sounding synthesized speech output using unit selection concatenation lti ’ text-to-speech system came second world-wide blizzard challenge 2011 2012 first-place team 2011 also employed lti front-end technology back-end blizzard challenge conducted language technologies institute carnegie mellon university devised way evaluate speech synthesis techniques different research groups build voices voice-actor recordings comparing results listening tests lti founded 2000 h. donald wilson chairman lawyer lexisnexis entrepreneur business associate arthur lessac gary a. marple chief inventor marple suggested arthur lessac kinesensic voice training might applicable computational linguistics wilson ’ death 2006 nephew john reichenbach became firm ’ ceo
[ 1314, 2900 ]
Test
2,366
9
Paul_Graham_(programmer):paul graham programmer paul graham born 13 november 1964 english-born computer scientist entrepreneur venture capitalist author essayist best known work lisp former startup viaweb later renamed yahoo store co-founding influential startup accelerator seed capital firm combinator blog hacker news author several programming books lisp 1993 ansi common lisp 1995 hackers painters 2004 technology journalist steven levy described graham hacker philosopher paul graham family moved pittsburgh pennsylvania 1968 attended gateway high school graham received bachelor arts philosophy cornell university 1986 attended harvard university earning master science 1988 doctor philosophy 1990 degrees computer science also studied painting rhode island school design accademia di belle arti florence 1996 graham robert morris founded viaweb first application service provider asp viaweb software written mostly common lisp allowed users make internet stores summer 1998 viaweb sold yahoo 455,000 shares yahoo stock valued 49.6 million acquisition product became yahoo store later gained fame essays posts personal website paulgraham.com essay subjects range beating averages compares lisp programming languages introduced hypothetical programming language blub nerds unpopular discussion nerd life high school collection essays published hackers painters o'reilly includes discussion growth viaweb graham perceives advantages lisp program 2001 graham announced working new dialect lisp named arc years since written several essays describing features goals language internal projects combinator written arc notably hacker news web forum news aggregator program 2005 giving talk harvard computer society later published start startup graham along trevor blackwell jessica livingston robert morris started combinator provide seed funding large number startups particularly started younger technically oriented founders combinator invested 1300 startups including justin.tv xobni dropbox airbnb stripe businessweek included paul graham 2008 edition annual feature 25 influential people web 2008 paul graham married jessica livingston response proposed stop online piracy act sopa graham announced late 2011 representatives company supporting would invited combinator demo day events graham proposed disagreement hierarchy 2008 essay disagree putting types argument seven-point hierarchy observing moving disagreement hierarchy makes people less mean make happier graham also suggested hierarchy thought pyramid highest forms disagreement rarer following hierarchy graham notes articulate forms name-calling e.g author self-important dilettante different crude insults graham considers hierarchy programming languages example blub hypothetically average language right middle abstractness continuum powerful language powerful cobol machine language used graham illustrate comparison beyond turing completeness programming language power specifically illustrate difficulty comparing programming language one knows one one graham considers hypothetical blub programmer programmer looks power continuum considers lower languages less powerful miss feature blub programmer used looks fails realise looking merely sees weird languages unnecessary features assumes equivalent power hairy stuff thrown well graham considers point view programmer using language higher blub describes programmer looking blub noting missing features point view higher language graham describes blub paradox concludes induction programmers position see differences power various languages understand powerful one concept cited writers joel spolsky
[ 7878, 1445, 4302, 6796, 6087, 6092, 5734, 6102, 1478, 4704, 5757, 6116, 1116, 6471, 2600, 5077, 1889, 1145, 6888, 1557, 5494, 5501, 7658, 6210, 144, 7298, 5515, 8025, 1233, 3749, 5883, 4837, 5190, 897, 6981, 2734, 218, 7032, 4543, 2439, ...
Test
2,367
4
AMD_Platform_Security_Processor:amd platform security processor amd platform security processor psp officially known amd secure technology trusted execution environment subsystem incorporated since 2013 amd microprocessors according amd developer guide subsystem responsible creating monitoring maintaining security environment functions include managing boot process initializing various security related mechanisms monitoring system suspicious activity events implementing appropriate response critics worry used backdoor security concern amd denied requests open source code runs psp psp similar intel management engine intel processors psp arm core inserted main cpu september 2017 google security researcher cfir cohen reported vulnerability amd psp subsystem could allow attacker access passwords certificates sensitive information patch rumored become available vendors december 2017 march 2018 handful alleged serious flaws announced amd zen architecture cpus epyc ryzen ryzen pro ryzen mobile israeli security company related psp could allow malware run gain access sensitive information amd announced firmware updates handle flaws claims flaws published purpose stock manipulation validity technical standpoint upheld independent security experts reviewed disclosures although high risks claimed cts labs often dismissed said independent experts
[ 3139, 1805 ]
Test
2,368
2
IPad_Air_(2019):ipad air 2019 third-generation ipad air tablet computer designed developed marketed apple inc announced march 18 2019 alongside 5th generation ipad mini device similar ipad air 2 10.5-inch ipad pro features apple a12 bionic chip 64 256 gb storage upgraded 10.5-inch retina display support apple pencil 1st generation bluetooth 5.0 faster memory lpddr4x instead ipad air 2 lpddr3 third-generation ipad air features upgraded front camera system 7mp 1080p camera used since 2016 starting iphone 7 continued iphone xs continues older 8mp 1080p rear camera system used since ipad air 2 2014 record 4k ipad air retains lightning port keeps headphone jack third-generation ipad air 2.49ghz six-core processor apple a12 bionic chip chip 66 faster clock speed 1.5ghz triple-core apple a8x third-generation ipad air predecessor ipad air 2 third-generation ipad air true tone display allows lcd adapt ambient lighting change color intensity different environments 3x faster ipad air 2 battery last 10 hours
[ 6788, 3940, 7890, 722, 1094, 4320, 2926, 4690, 734, 5752, 6125, 2954, 1123, 6847, 6142, 1895, 4749, 7601, 6165, 2284, 3008, 5477, 1940, 2300, 3025, 2665, 2327, 6565, 2331, 3050, 4820, 6582, 1234, 1237, 7311, 5189, 889, 550, 552, 7335, 3...
Test
2,369
3
Tao_ExDOS:tao exdos tao exdos emulator software application designed allow users old ms-dos applications run applications new operating systems windows 10 windows 8 windows 7 windows vista windows xp windows 2000 windows terminal server tao exdos enables users dos applications work applications new operating systems using built-in virtual 8086 mode x86 cpu tao exdos enables dos 16-bit windows applications run dos run effectively 32-bit windows desktop environments including windows 10/8/7/vista/xp/2000 windows terminal server 2003/2008 support 64-bit systems available windows 7 via virtual xp mode downloaded free microsoft windows 7 professional ultimate enterprise versions additional modules allow dos users print printers connected usb ports network printers fax printers pdf microsoft word html image files
[ 2885, 6380, 5571, 336 ]
Validation
2,370
2
WebOS_version_history:webos version history webos linux operating system smart devices formerly mobile operating system initially developed palm later acquired hewlett-packard lg electronics palm launched webos january 2009 various versions webos featured several devices including pre pixi veer phones hp touchpad tablet latest version 3.0.5 released 12 january 2012
[ 4317, 3764, 7919, 5571, 1581, 1582, 1702, 578 ]
Test
2,371
9
JavaServer_Pages_Standard_Tag_Library:javaserver pages standard tag library javaserver pages standard tag library jstl component java ee web application development platform extends jsp specification adding tag library jsp tags common tasks xml data processing conditional execution database access loops internationalization jstl developed java community process jcp java specification request jsr 52 may 8 2006 jstl 1.2 released followed jstl 1.2.1 dec 7 2011 jstl provides effective way embed logic within jsp page without using embedded java code directly use standardized tag set rather breaking java code leads maintainable code enables separation concerns development application code user interface total six jstl tag library descriptors addition jstl jcp following jsrs develop standard jsp tag libraries
[ 7347, 6986, 5571, 1479, 2126, 841, 2322, 2054, 3488, 2517, 773, 2519, 4640, 2799 ]
Test
2,372
7
IceWall_SSO:icewall sso icewall sso web federated single sign-on software developed marketed hewlett packard enterprise globe released 1997 icewall sso evolved last 18 years.originally developed hp japan marketed global markets provides highly convenient comfortable yet highly secure environment since first release 1997 icewall sso seen adoption intranet b-to-c b-to-b many services globally 40 million user licenses sold far world latest version icewall sso 10.0 provides support new leading-edge technologies cloud virtualization icewall sso product line extended include windows support addition existing hp-ux linux versions furthermore support services icewall sso planned continue 2024 making product long stable service life latest version available 10.0 august 2010 supported platforms red hat enterprise linux hp-ux windows server icewall sso mainly reverse proxy type implementation configured work agent type well depending requirements icewall sso mainly consists two modules cgi process works reverse proxy accepts http/https requests web browser forwards backend applications.forwarder also handles loginprocess authorizations communicating authentication module mentioned daemon program accepts requests forwarder performs authentication getting user information certification db directory services rdb icp icewall cert protocol used forwarder authentication module
[ 5822, 1134, 6462, 900, 3795 ]
Validation
2,373
2
Collaboration_Data_Objects:collaboration data objects collaboration data objects cdo previously known ole messaging active messaging application programming interface included microsoft windows microsoft exchange server products library allows developers access global address list server objects addition contents mailboxes public folders cdo technology building messaging collaboration applications cdo used separately connection outlook object model gain access outlook cdo part outlook object model n't provide event-based functionality outlook objects manipulated using cdo starting exchange 2007 neither messaging api mapi client libraries cdo 1.2.1 provided part base product installation available downloads
[ 7607, 6991, 4759, 6908, 6000 ]
Test
2,374
4
Cube_attack:cube attack cube attack method cryptanalysis applicable wide variety symmetric-key algorithms published itai dinur adi shamir september 2008 preprint revised version preprint placed online january 2009 paper also accepted presentation eurocrypt 2009 cipher vulnerable output bit represented sufficiently low degree polynomial gf 2 key input bits particular describes many stream ciphers based lfsrs des aes believed immune attack works summing output bit value possible values subset public input bits chosen resulting sum linear combination secret bits repeated application technique gives set linear relations secret bits solved discover bits authors show cipher resembles random polynomial sufficiently low degree sets public input bits exist high probability discovered precomputation phase black box probing relationship input output various choices public secret input bits making use information construction cipher paper presents practical attack authors implemented tested stream cipher previous known attack would effective state 10,000 bit lfsr secret dense feedback polynomial filtered array 1000 secret 8-bit 1-bit s-boxes whose input based secret taps lfsr state whose output xored together bit lfsr initialized different secret dense quadratic polynomial 10 000 key iv bits lfsr clocked large secret number times without producing outputs first output bit given iv made available attacker short preprocessing phase attacker query output bits variety key iv combinations 2 bit operations required discover key cipher authors also claim attack version trivium reduced 735 initialization rounds complexity 2 conjecture techniques may extend breaking 1100 trivium 1152 initialization rounds maybe even original cipher best attack known trivium attack however embroiled two separate controversies firstly daniel j. bernstein disputes assertion previous attack 10,000-bit lfsr-based stream cipher existed claims attack reduced-round trivium n't give real reason think full trivium attacked claims cube paper failed cite existing paper xuejia lai detailing attack ciphers small-degree polynomials believes cube attack merely reinvention existing technique secondly dinur shamir credit michael vielhaber algebraic iv differential attack aida precursor cube attack dinur stated eurocrypt 2009 cube generalises improves upon aida however vielhaber contends cube attack attack another name however acknowledged parties involved cube use efficient linearity test blr test results new attack needing less time aida although substantial particular change remains dispute way cube aida differ vielhaber claims instance linear polynomials key bits obtained attack unusually sparse yet supplied evidence claims evidence appear forthcoming paper entitled algebraic iv differential attack aida attacking full trivium clear whether alleged sparsity applies ciphers trivium
[ 4917, 6049, 1353 ]
Test
2,375
3
The_Black_Onyx:black onyx memory limitations another part game released separately platforms added magic system two parts announced allowed party explore wilderness allowed party take part arena battles sg-1000 version one last releases console succeeded portrait loretta english-language fan-translation made available sg-1000 version back-porting abandoned source files similar hobby conversion project colecovision system group called team pixelboy later used source files complete project released unofficial english-language colecovision game 2013 player create five-member party 4 members gbc ask friendly encounters join party fill empty slots party explore dungeons town utsuro ウツロ obtain legendary black onyx break curse binds town eternal night combat system concept distance bows similar missile weapons melee weapons shields armor however hospital town offer examinations display pcs stats bank town heroes deposit money protects money thieves interest deposits since time system labyrinth town several entrances hidden one locations town labyrinth six floors corresponding six colors computer display must solved proper order depends platform order create stairway black tower onyx resides black onyx adapted manga titled published gamest comics collection april 1999 drawn kouta hirano
[ 4907 ]
Test
2,376
4
Festi_botnet:festi botnet festi botnet also known alias spamnost botnet mostly involved email spam denial service attacks festi botnet first discovered around autumn 2009 time estimated botnet consisted roughly infected machines spam volume capacity roughly 2.5 billion spam emails day recent estimates dated august 2012 display botnet sending spam unique ip addresses quarter total amount 1 million detected ip sending spam mails besides capable sending email spam research festi botnet demonstrated also capable performing denial service attacks
[ 2173, 2632, 1632, 6715, 7441, 3281, 651, 7186, 5401, 2577, 6740, 6370, 5675, 7657, 51, 7294, 2693, 2789, 7307, 3154, 7600, 2535, 4110, 6328 ]
Train
2,377
3
Continental_Circus:continental circus continental circus racing simulation arcade game created manufactured taito 1987 1989 ports released amiga amstrad cpc atari st commodore 64 msx zx spectrum arcade version game comes upright sit-down models feature shutter-type 3d glasses hanging player head according computer video games 1988 world first three dimensional racing simulation home conversions continental circus lack full-on 3d special glasses arcade version circus common term racing france japan likely stemming latin term racecourse unrelated 1972 french film motor racing also called continental circus 2005 game made available playstation 2 xbox pc part taito legends in-game vehicle 1987 camel-sponsored honda/lotus 99t formula one car driven ayrton senna satoru nakajima due licensing reasons sponsor names camel delonghi intentionally misspelled prevent copyright infringement japanese law player must successfully qualify eight different races win beginning player must take 80th place better advance player advances worst possible position qualify player fails meet qualify timer runs game player however option continue player fails qualify final race game automatically player continue real f1 races car susceptible damage contact another car player hits car piece trackside scenery called pits let car smoke long catch fire message impending explosion appear either way fail make back hit another car crash explode costing several seconds also car reaches speeds excess 380 km/h speedometer turn yellow warning player let know car going much fast car hits another car behind collision send car devastating cartwheel explodes costing several seconds light going fast turn cause car lose grip road car loses grip spin control low chance wreck happening definitely take several seconds clock also time time thunderstorm occur causing track become wet causing car lose traction case message change tires appear player must immediately get pits change wet-tyres storm dies road covered puddles pose threat continental circus music race plays intro/outro music race vein pole position afterwards screen cuts start line race course announcement gentlemen start engines 30 seconds start spoken line lifted 1972 french documentary game bears name entire collection musical scores sound effects voice clips featured compilation soundtrack known 究極tiger -g.s.m.taito 2- musical score composed zuntata taito house band excerpts arcade soundtrack included sinclair user cover tape music home versions composed ben daglish game commercially successful number-two coinslot dedicated arcade game chart behind street fighter home conversion went number 2 uk sales chart behind power drift january 1989 issue sinclair user gave award 1988 cock-up year title continental circus appearing spell circuit incorrectly
[ 6943, 8187, 440, 926 ]
Test
2,378
2
Soname:soname unix unix-like operating systems soname field data shared object file soname string used logical name describing functionality object typically name equal filename library prefix thereof e.g codice_1 soname often used provide version backwards-compatibility information instance versions 1.0 1.9 shared library codice_2 provide identical interfaces would soname e.g codice_3 system includes version 1.3 shared object filename codice_4 soname field shared object tells system used fill dependency binary originally compiled using version 1.2 note codice_5 particular case complex history see gnu c library application binary interface abi library changes backward-incompatible way soname would incremented e.g codice_6 codice_7 gnu linker uses codice_8 codice_9 specify library name field internally linker create codice_10 field populate codice_11 given shared object file one use following command get information within library file using objdump objdump -p libx.so.1.3 grep soname
[ 1989, 578 ]
Validation
2,379
5
Usenet:usenet usenet worldwide distributed discussion system available computers developed general-purpose unix-to-unix copy uucp dial-up network architecture tom truscott jim ellis conceived idea 1979 established 1980 users read post messages called articles posts collectively termed news one categories known newsgroups usenet resembles bulletin board system bbs many respects precursor internet forums widely used today discussions threaded web forums bbss though posts stored server sequentially name comes term users network major difference bbs web forum usenet absence central server dedicated administrator usenet distributed among large constantly changing conglomeration servers store forward messages one another so-called news feeds individual users may read messages post messages local server operated commercial usenet provider internet service provider university employer server usenet culturally historically significant networked world given rise popularized many widely recognized concepts terms faq flame sockpuppet spam 1990s internet became commonly affordable usenet connections via fidonet dial-up bbs networks made long-distance worldwide discussions communication widespread needing server local telephone service usenet conceived 1979 publicly established 1980 university north carolina chapel hill duke university decade world wide web went online general public received access internet making one oldest computer network communications systems still widespread use originally built poor man arpanet employing uucp transport protocol offer mail file transfers well announcements newly developed news software news name usenet emphasized creators hope usenix organization would take active role operation articles users post usenet organized topical categories known newsgroups logically organized hierarchies subjects instance sci.math sci.physics within sci hierarchy science talk.origins talk.atheism talk hierarchy user subscribes newsgroup news client software keeps track articles user read newsgroups majority articles responses article set articles traced one single non-reply article called thread modern newsreaders display articles arranged threads subthreads example wine-making newsgroup rec.crafts.winemaking someone might start thread called best yeast thread conversation might grow dozens replies long perhaps six eight different authors several days conversation different wine yeasts might branch several sub-threads tree-like form user posts article initially available user news server news server talks one servers newsfeeds exchanges articles fashion article copied server server eventually reach every server network later peer-to-peer networks operate similar principle usenet normally sender rather receiver initiates transfers usenet designed conditions networks much slower always available many sites original usenet network would connect twice day batch-transfer messages largely pots network typically used transfers phone charges lower night format transmission usenet articles similar internet e-mail messages difference two usenet articles read user whose news server carries group message posted opposed email messages one specific recipients today usenet diminished importance respect internet forums blogs mailing lists social media usenet differs media several ways usenet requires personal registration group concerned information need stored remote server archives always available reading messages require mail web client news client however possible read participate usenet newsgroups large degree using ordinary internet browsers since newsgroups copied several internet sites groups alt.binaries still widely used data transfer many internet service providers many internet sites operate news servers users access isps operate servers directly often offer users account another provider specifically operates newsfeeds early news implementations server newsreader single program suite running system today one uses separate newsreader client software program resembles email client accesses usenet servers instead clients mozilla thunderbird outlook express provide abilities isps run news servers news server one difficult internet services administer large amount data involved small customer base compared mainstream internet services email web access disproportionately high volume customer support incidents frequently complaining missing news articles isp fault isps outsource news operation specialist sites usually appear user though isp ran server many sites carry restricted newsfeed limited number newsgroups commonly omitted newsfeed foreign-language newsgroups alt.binaries hierarchy largely carries software music videos images accounts 99 percent article data also usenet providers specialize offering service users whose isps carry news carry restricted feed see also news server operation overview news systems implemented newsgroups typically accessed newsreaders applications allow users read reply postings newsgroups applications act clients one news servers although historically usenet associated unix operating system developed newsreaders available major operating systems modern mail clients communication suites commonly also integrated newsreader often however integrated clients low quality compared standalone newsreaders incorrectly implement usenet protocols standards conventions many integrated clients example one microsoft outlook express disliked purists misbehavior rise world wide web www web front-ends web2news become common web front ends lowered technical entry barrier requirements one application usenet nntp server account numerous websites offering web based gateways usenet groups although people begun filtering messages made web interfaces one reason another google groups one web based front end web browsers access google groups via news protocol links directly minority newsgroups moderated meaning messages submitted readers distributed directly usenet instead emailed moderators newsgroup approval moderator receive submitted articles review inject approved articles properly propagated worldwide articles approved moderator must bear approved header line moderators ensure messages readers see newsgroup conform charter newsgroup though required follow rules guidelines typically moderators appointed proposal newsgroup changes moderators follow succession plan historically mod hierarchy existed usenet reorganization moderated newsgroups may appear hierarchy typically .moderated added group name usenet newsgroups big-8 hierarchy created proposals called request discussion rfd rfd required following information newsgroup name checkgroups file entry moderated unmoderated status group moderated least one moderator valid email address must provided information beneficial required includes charter rationale moderation policy group moderated discussion new newsgroup proposal follows finished members big-8 management board making decision vote either approve disapprove new newsgroup unmoderated newsgroups form majority usenet newsgroups messages submitted readers unmoderated newsgroups immediately propagated everyone see minimal editorial content filtering vs propagation speed form one crux usenet community one little cited defense propagation canceling propagated message usenet users use command news readers offer cancellation commands part article storage expires relatively short order anyway almost unmoderated usenet groups become collections spam usenet set protocols generating storing retrieving news articles resemble internet mail messages exchanging among readership potentially widely distributed protocols commonly use flooding algorithm propagates copies throughout network participating servers whenever message reaches server server forwards message network neighbors n't yet seen article one copy message stored per server server makes available demand typically local readers able access server collection usenet servers thus certain peer-to-peer character share resources exchanging granularity exchange however different scale modern peer-to-peer system characteristic excludes actual users system connect news servers typical client-server application much like email reader rfc 850 first formal specification messages exchanged usenet servers superseded rfc 1036 subsequently rfc 5536 rfc 5537 cases unsuitable content posted usenet support automated removal posting whole network creating cancel message although due lack authentication resultant abuse capability frequently disabled copyright holders may still request manual deletion infringing material using provisions world intellectual property organization treaty implementations united states online copyright infringement liability limitation act would require giving notice individual news server administrator internet usenet transported via network news transfer protocol nntp tcp port 119 standard unprotected connections tcp port 563 ssl encrypted connections offered sites major set worldwide newsgroups contained within nine hierarchies eight operated consensual guidelines govern administration naming current big eight see also great renaming alt hierarchy subject procedures controlling groups big eight result less organized groups alt hierarchy tend specialized specific—for example might newsgroup big eight contains discussions children books group alt hierarchy may dedicated one specific author children books binaries posted alt.binaries making largest hierarchies many hierarchies newsgroups distributed alongside regional language-specific hierarchies ne serve specific countries regions japan malta new england companies projects administer hierarchies discuss products offer community technical support historical hierarchy free software foundation microsoft closed newsserver june 2010 providing support products forums users prefer use term usenet refer big eight hierarchies others include alt well general term netnews incorporates entire medium including private organizational news systems informal sub-hierarchy conventions also exist *.answers typically moderated cross-post groups faqs faq would posted within one group cross post *.answers group head hierarchy seen refining information news group subgroups recursive—to point silliness alt.* usenet originally created distribute text content encoded 7-bit ascii character set help programs encode 8-bit values ascii became practical distribute binary files content binary posts due size often-dubious copyright status time restricted specific newsgroups making easier administrators allow disallow traffic oldest widely used encoding method binary content uuencode unix uucp package late 1980s usenet articles often limited 60,000 characters larger hard limits exist today files therefore commonly split sections require reassembly reader header extensions base64 quoted-printable mime encodings new generation binary transport practice mime seen increased adoption text messages avoided binary attachments operating systems metadata attached files use specialized encoding formats mac os binhex special mime types used lesser known encoding systems may used one time btoa xx encoding boo usr encoding attempt reduce file transfer times informal file encoding known yenc introduced 2001 achieves 30 reduction data transferred assuming 8-bit characters safely transferred across network without first encoding 7-bit ascii space common method uploading large binary posts usenet convert files rar archives create parchive files parity files used recreate missing data every part files reaches server news server generally allocates certain amount storage space post content newsgroup storage filled time new post arrives old posts deleted make room new content network bandwidth available server high storage allocation small possible huge flood incoming content overflow allocation push everything group flood large enough beginning flood begin deleted even last part flood posted binary newsgroups able function reliably sufficient storage allocated group allow readers enough time download parts binary posting flushed group storage allocation one time posting undesired content countered newsgroup would flooded random garbage data posts sufficient quantity push content suppressed compensated service providers allocating enough storage retain everything posted day including spam floods without deleting anything average length time posts able stay group deleted commonly called retention time generally larger usenet servers enough capacity archive several years binary content even flooded new data maximum daily speed available good binaries service provider must accommodate users fast connections 3 megabit also users slow connections 256 kilobit less need time download content period several days weeks major nsps retention time 4 years results 33 petabytes 33000 terabytes storage part long retention times well growing internet upload speeds usenet also used individual users store backup data practice called usenet backup ubackup commercial providers offer easy use online backup services storing data usenet free charge although access usenet may method requires user manually select prepare upload data anyone potentially download backup files data typically encrypted files uploaded uploader control files automatically copied usenet providers multiple copies spread different geographical locations around world—desirable backup scheme binary newsgroups used distribute completely legal user-created works open-source software public domain material binary groups used illegally distribute commercial software copyrighted media pornographic material isp-operated usenet servers frequently block access alt.binaries groups reduce network traffic avoid related legal issues commercial usenet service providers claim operate telecommunications service assert responsible user-posted binary content transferred via equipment united states usenet providers qualify protection dmca safe harbor regulations provided establish mechanism comply respond takedown notices copyright holders removal copyrighted content entire usenet network nearly impossible task due rapid propagation servers retention done server petitioning usenet provider removal removes one server retention cache others possible special post cancellation message distributed remove servers many providers ignore cancel messages standard policy easily falsified submitted anyone takedown petition effective across whole network would issued origin server content posted propagated servers removal content early stage would prevent propagation modern high speed links content propagated fast arrives allowing time content review takedown issuance copyright holders establishing identity person posting illegal content equally difficult due trust-based design network like smtp email servers generally assume header origin information post true accurate however smtp email usenet post headers easily falsified obscure true identity location message source manner usenet significantly different modern p2p services p2p users distributing content typically immediately identifiable users network address origin information usenet posting completely obscured unobtainable propagated past original server also unlike modern p2p services identity downloaders hidden view p2p services downloader identifiable others network address usenet downloader connects directly server server knows address connecting usenet providers keep usage logs make logged information casually available outside parties recording industry association america existence anonymising gateways usenet also complicates tracing postings true origin newsgroup experiments first occurred 1979 tom truscott jim ellis duke university came idea replacement local announcement program established link nearby university north carolina using bourne shell scripts written steve bellovin public release news form conventional compiled software written steve daniel truscott 1980 usenet connected arpanet connections usenet arpanet mark horton graduate student set connection began feeding mailing lists arpanet usenet fa arpanet identifier usenet gained 50 member sites first year including reed college university oklahoma bell labs number people using network increased dramatically however still longer usenet users could contribute arpanet uucp networks spread quickly due lower costs involved ability use existing leased lines x.25 links even arpanet connections 1983 thousands people participated 500 hosts mostly universities bell labs sites also growing number unix-related companies number hosts nearly doubled 940 1984 100 newsgroups existed 20 devoted unix computer-related topics least third recreation mesh uucp hosts rapidly expanded became desirable distinguish usenet subset overall network vote taken 1982 usenix conference choose new name name usenet retained established applied news name uucpnet became common name overall network addition uucp early usenet traffic also exchanged fidonet dial-up bbs networks mid-1990s almost 40,000 fidonet systems operation possible communicate millions users around world local telephone service widespread use usenet bbs community facilitated introduction uucp feeds made possible ms-dos implementations uucp ufgate uucp fidonet gateway fsuucp uupc 1986 rfc 977 provided network news transfer protocol nntp specification distribution usenet articles tcp/ip flexible alternative informal internet transfers uucp traffic since internet boom 1990s almost usenet distribution nntp early versions usenet used duke news software designed one two articles day matt glickman horton berkeley produced improved version called b news could handle rising traffic 50 articles day late 1983 message format offered compatibility internet mail improved performance became dominant server software c news developed geoff collyer henry spencer university toronto comparable b news features offered considerably faster processing early 1990s internetnews rich salz developed take advantage continuous message flow made possible nntp versus batched store-and-forward design uucp since time inn development continued news server software also developed usenet first internet community place many important public developments pre-commercial internet place tim berners-lee announced launch world wide web linus torvalds announced linux project marc andreessen announced creation mosaic browser introduction image tag revolutionized world wide web turning graphical medium many jargon terms common use internet originated popularized usenet likewise many conflicts later spread rest internet ongoing difficulties spamming began usenet sascha segan pc magazine said 2008 usenet dying years segan said people pointed eternal september 1993 beginning usenet decline segan believes pornographers software crackers began putting large non-text files usenet late 1990s usenet disk space traffic increased correspondingly internet service providers questioned needed host space pornography unauthorized software state new york opened investigation child pornographers used usenet many isps dropped usenet access access alt hierarchy response john biggs techcrunch said long folks think command line better mouse original text-only social network live aol discontinued usenet access 2005 may 2010 duke university whose implementation kicked usenet 30 years earlier decommissioned usenet server citing low usage rising costs 32 years usenet news service link university north carolina chapel hill news.unc.edu retired february 4 2011 time amount usenet traffic steadily increased number text posts made big-8 newsgroups averaged 1,800 new messages every hour average 25,000 messages per day however averages minuscule comparison traffic binary groups much traffic increase reflects increase discrete users newsgroup discussions instead combination massive automated spamming increase use .binaries newsgroups large files often posted publicly small sampling change measured feed size per day follows 2008 verizon communications time warner cable sprint nextel signed agreement attorney general new york andrew cuomo shut access sources child pornography time warner cable stopped offering access usenet verizon reduced access big 8 hierarchies sprint stopped access alt hierarchies stopped access alt.binaries hierarchies cuomo never specifically named usenet anti-child pornography campaign david dejean pc world said worry isps used cuomo campaign excuse end portions usenet access costly internet service providers high demand customers 2008 aol longer offered usenet access four providers responded cuomo campaign five largest internet service providers united states 50 u.s. isp marketshare june 8 2009 announced would longer provide access usenet service july 15 2009 aol announced would discontinue integrated usenet service early 2005 citing growing popularity weblogs chat forums on-line conferencing aol community tremendous role popularizing usenet 11 years earlier august 2009 verizon announced would discontinue access usenet september 30 2009 janet announced would discontinue usenet service effective july 31 2010 citing google groups alternative microsoft announced would discontinue support public newsgroups msnews.microsoft.com june 1 2010 offering web forums alternative primary reasons cited discontinuance usenet service general isps include decline volume actual readers due competition blogs along cost liability concerns increasing proportion traffic devoted file-sharing spam unused discontinued groups isps include pressure cuomo campaign child pornography one reasons dropping usenet feeds part services isps cox atlantic communications resisted 2008 trend eventually drop respective usenet feeds 2010 public archives usenet articles existed since early days usenet system created kenneth almquist late 1982 distributed archiving usenet posts suggested november 1982 scott orshan proposed every site keep articles posted forever also november year rick adams responded post asking anyone archived netnews anyone plan stating afraid admit started archiving 'useful newsgroups september 18 june 1982 gregory g. woodbury proposed automatic access archives system consisted automatic answering fixed-format messages special mail recipient specified machines 1985 two news archiving systems one rfc posted internet first system called keepnews mark m. swenson university arizona described program attempts provide sane way extracting keeping information comes usenet main advantage system allow users mark articles worthwhile retain second system ya news archiver chuq von rospach similar keepnews designed work much larger archives wonderful quadratic search time feature unix ... becomes real problem von rospach early 1985 posted detailed rfc archiving accessing usenet articles keyword lookup rfc described program could generate maintain archive usenet articles allow looking articles based article-id subject lines keywords pulled article also included c code internal data structure system desire fulltext search index archived news articles new either one request made april 1991 alex martelli sought build sort keyword index news archive early may mr. martelli posted summary responses usenet noting popular suggestion award must definitely go 'lq-text package liam quin recently posted alt.sources huge site http //asstr.org archives indexes erotic pornographic stories posted usenet group alt.sex.stories today archiving usenet led fear loss privacy archive simplifies ways profile people partly countered introduction x-no-archive yes header controversial web-based archiving usenet posts began 1995 deja news large searchable database 2001 database acquired google google groups hosts archive usenet posts dating back may 1981 earliest posts date may 1981 june 1991 donated google university western ontario help david wiseman others originally archived henry spencer university toronto zoology department archives late 1991 early 1995 provided kent landfield netnews cd series jürgen christoffel gmd archive posts march 1995 onward started company dejanews later deja purchased google february 2001 google began archiving usenet posts starting second week august 2000 google criticized vice wired contributors well former employees stewardship archive breaking search functionality usenet whole administrators server administrator free whatever pleases long end users peer servers tolerate accept nevertheless famous administrators
[ 4655, 3930, 1809, 707, 5012, 6415, 7880, 2546, 5374, 6802, 7169, 5378, 2559, 7537, 2566, 6441, 3291, 2574, 5401, 1480, 6460, 6118, 412, 3987, 4352, 1128, 4361, 4734, 6492, 7588, 84, 445, 447, 1152, 1154, 1155, 2984, 2272, 3346, 4751, 36...
Test
2,380
4
Winlogon:winlogon computing winlogon component microsoft windows operating systems responsible handling secure attention sequence loading user profile logon optionally locking computer screensaver running requiring another authentication step actual obtainment verification user credentials left components winlogon common target several threats could modify function memory usage increased memory usage process might indicate hijacked windows vista later operating systems winlogon roles responsibilities changed significantly winlogon handles interface functions independent authentication policy creates desktops window station implements time-out operations versions windows prior windows vista provides set support functions gina takes responsibility configuring machine user group policy winlogon also checks copy windows legitimate license windows xp later versions winlogon following responsibilities
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 5869, ...
Test
2,381
4
Tripwire_(company):tripwire company tripwire inc. software company based portland oregon develops markets sells information technology security compliance automation graduate student purdue university gene kim tripwire co-founder former chief technology officer along professor gene spafford created initial version software 1992 academic source release pioneered many techniques used intrusion detection received widespread support among corporate education government security professionals 1997 gene kim co-founded tripwire inc rights tripwire name technology attained commercial version product tripwire servers released soon thereafter 2000 tripwire contributed source code functionally equivalent academic source release open source community enable open source tripwire 2005 tripwire released first version tripwire enterprise company flagship product designed help organizations configuration control detecting assessing reporting remediating file configuration changes january 2010 tripwire announced release tripwire log center log security information event management siem software stores correlates reports log security event data two products integrated enable correlation change event data august 21 2009 tripwire acquired activeworx technologies crosstec corporation includes log center security center event management snort management center revenues grew 74 million 2009 october 2009 company 261 employees number grew 336 june 2010 may–june 2010 company 5,500 customers announced filed registration statement securities exchange commission proposed initial public offering common stock year later company announced sale private equity firm thoma bravo llc ending 86 million ipo plans ceo jim johnson cited firm failure reach 100 million revenue milestone 2010 well changing ipo market expectations reasons going ipo day following acquisition company laid 50 350 employees johnson expects company eventually go public though unlikely happen 2015 acquisition ncircle 2013 tripwire added asset discovery vulnerability management portfolio tripwire ip360™ enables organizations identify system vulnerabilities advanced intelligence prioritizes critical issues fix december 2014 belden inc announced plans buy tripwire 710 million acquisition completed january 2 2015
[ 4449, 2206, 1787, 6301 ]
Test
2,382
4
InfraGard:infragard infragard non-profit organization serving public-private partnership u.s. businesses federal bureau investigation organization information sharing analysis effort serving interests combining knowledge base wide range private sector government members infragard association individuals facilitates information sharing intelligence businesses academic institutions state local law enforcement agencies participants dedicated prevent hostile acts united states infragard mutual nondisclosure agreements among members individuals fbi promotes trusted discussions vulnerabilities solutions companies individuals may hesitant place public domain provide access additional threat information fbi infragard began cleveland ohio field office 1996 since expanded become national-level program infragard coordinators every fbi field office originally local effort gain support information technology industry academia fbi investigative efforts cyber arena since expanded much wider range activities surrounding nation critical infrastructure program expanded fbi field offices 1998 fbi assigned national program responsibility infragard former national infrastructure protection center nipc directed radm james b. plehal fbi cyber division 2003 since 2003 infragard alliances fbi said developed trust-based public-private sector partnership ensure reliability integrity information exchanged various terrorism intelligence criminal security matters supports fbi priorities areas counterterrorism foreign counterintelligence cybercrime infragard focused protecting 16 critical infrastructures outlined presidential directive 21 critical infrastructure security resilience sharing threat information assisting fbi finding prosecuting attack critical infrastructure physical cyber means provide training active shooter scenarios cyber defense threats nation organization committed providing tools resources needed operate nation critical infrastructure protect enterprises maintain services necessary safe prosperous nation infragard chapters also participate assure critical infrastructure owners operators—estimated 85 private sector—are engaged represented local regional planning efforts working 16 critical infrastructure sectors organization provides resources information prevention also building resilience response capabilities infragard chapters around nation also provide cyber physical security training sessions focus latest threats identified fbi sessions include threat briefings technical sessions cyber physical attack vectors response training resources help cisos csos protect enterprise infragard approaches threats critical infrastructure tactical strategic level addressing needs front lines security well decision makers tasked assessing enterprise vulnerabilities allocating resources protect information sharing organization government criticized protecting civil liberties concerned membership would surrogate eyes ears fbi group also subject hacking attacks intended embarrass fbi local chapters regularly meet discuss latest threats listen talks subject matter experts security issues membership open u.s. citizens cost july 2012 organization reported membership 54,677 including fbi infragard focuses development management protection critical infrastructure infragard nationwide focus group reviews threats could disrupt critical infrastructure nationwide month named electromagnetic pulse special interest group emp sig all-hazards approach looks manmade natural electromagnetic pulse emp cyber attack coordinated physical attack pandemics insider threats mitigating actions could minimize threats mitigation strategies include hardening prevention strategies addition development local infrastructure could make local communities robust sustainable see emp sig press release guidance document see also website association universities involved public policy policy studies organization produces technology policy conference called dupont summit infragard national emp sig brought public private sector leaders discuss emerging threat issues http //www.ipsonet.org/conferences/the-dupont-summit/dupont-summit-2012/infragard-emp-sig partnerships government agencies private organizations critics concerned civil liberties american civil liberties union aclu warned evidence infragard may closer corporate tips program turning private-sector corporations — may position observe activities millions individual customers — surrogate eyes ears fbi concluding program institutionalizes close secretive ties organizations raises serious questions scope activities future others describing infragard state architecture internet—and many possible methods attack— requires governments corporations private parties work together protect network security head threats occur responding aclu criticism chairwoman kathleen kiernan infragard national members alliance inma denies infragard anything beneficial americans stating elitist group way shape form says 're trying protect everybody u.s. citizen planet eligible apply infragard 2011 lulzsec claimed responsibility attacking chapter websites managed local members connecticut atlanta order embarrass fbi simple hacks group leaked infragard member e-mails database local users group defaced website posting following message let flow stupid fbi battleships accompanied video lulzsec posted following message regarding attack
[ 3480, 3264, 7646, 3486, 1805 ]
Train
2,383
4
Maureen_Baginski:maureen baginski maureen a. baginski former signals intelligence sigint director national security agency nsa executive assistant director intelligence federal bureau investigation fbi beginning intelligence career baginski graduated ba slavic languages linguistics university albany also received honorary doctorate humane letters 2005 service nation baginski began career intelligence 1979 russian language instructor nsa cold war held various positions nearly quarter-century nsa including lead analyst soviet union assistant deputy director technology systems chief officer director executive assistant director nsa/central security service senior operations officer national security operations center sigint director nsa third highest position baginski sigint director september 11 2001 critical nsa response terrorist attacks also directing extended sigint enterprise order acquire produce disseminate foreign sigint variety government military customers documentary film “ good american ” then-senior nsa executive thomas drake quotes baginski saying “ 9/11 gift nsa ’ gon na get money need ” immediate aftermath 9/11 retired nsa analyst bill binney star film describes baginski ’ reaction “ sickening. ” 2003 baginski left position nsa become executive assistant director intelligence fbi executive assistant director intelligence fbi 2003-2005 baginski successfully led bureau first-ever intelligence program charge adapting fbi intelligence capabilities information technologies created intelligence-sharing platform helped identify stop terror plots head intelligence fbi baginski helped develop intelligence career service intelligence professionals would able advance careers fbi many high-ranking government officials including president george w. bush fbi director mueller acknowledged applauded baginski significant changes fbi improved capabilities safeguard united states america upon retirement fbi director mueller asked baginski remain senior advisor fbi position accepted since retiring fbi baginski held multiple positions within private sector board member bearingpoint inc. argon st si international inc. baginski also president national security systems sparta inc. chief executive officer national security partners llc chairwoman emeriti afcea throughout distinguished career public sector baginski received several awards including two presidential rank awards two director central intelligence national achievement medals director military intelligence ’ leadership award nsa ’ exceptional civilian service award fbi intelligence analysts association award
[]
Validation
2,384
4
Biba_Model:biba model biba model biba integrity model developed kenneth j. biba 1975 formal state transition system computer security policy describes set access control rules designed ensure data integrity data subjects grouped ordered levels integrity model designed subjects may corrupt data level ranked higher subject corrupted data lower level subject general model developed address integrity core principle direct inverse bell–lapadula model general preservation data integrity three goals security model directed toward data integrity rather confidentiality characterized phrase read write contrast bell-lapadula model characterized phrase read write biba model users create content integrity level monk may write prayer book read commoners one read high priest conversely users view content integrity level monk may read book written high priest may read pamphlet written lowly commoner another analogy consider military chain command general may write orders colonel issue orders major fashion general original orders kept intact mission military protected thus read integrity conversely private never issue orders sergeant may never issue orders lieutenant also protecting integrity mission write biba model defines set security rules first two similar bell–lapadula model first two rules reverse bell–lapadula rules
[ 843, 5785, 3461, 6998, 7827, 578, 7090, 1805 ]
Test