node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,385
4
Brian_Snow:brian snow brian snow born september 5 1943 served u.s. national security agency 1971 2006 including six-year term technical director information assurance directorate iad defensive arm nsa charged protecting u.s. information security time research management positions nsa played key role promoting open collaborative relationship agency broader community security professionals early career snow mathematics professor ohio university helped develop college computer science department 1971 started working nsa 1970s 1980s designed cryptographic components secure systems several cryptographic systems employed u.s. government military used algorithms purposes nuclear command control tactical voice communications network security technical person high managerial responsibilities neal koblitz alfred menezes written snow strong supporter transition rsa elliptic curve cryptography ecc public key cryptographic technology cybersecurity policy expert susan landau attributes nsa harmonious collaboration industry academia selection advanced encryption standard aes 2000 — agency support choice strong encryption algorithm designed europeans rather americans — part snow represented nsa cochairman technical working group aes competition terrorist attacks 11 september 2001 nsa believed public support dramatic expansion surveillance activities according koblitz menezes period nsa trusted partner academia industry development cryptographic standards came end part change nsa post-september 11 era snow replaced technical director could longer effectively oppose proposed actions offensive arm nsa snow last years nsa retirement 2006 along clinton brooks led group drew draft ethics code intelligence officers since retiring nsa snow worked security ethics consultant member u.s. national academy sciences committee future research goals directions foundational science cybersecurity 2019 brian snow inducted national cyber security hall fame
[ 4969 ]
Train
2,386
5
Glftpd:glftpd glftpd freely available ftp server runs unix linux bsd operating systems number features like logins restricted particular set ip addresses transfer quotas per-user per-group basis user/groups stored system files make attractive private warez servers including topsites legitimate uses though—a number web development books recommend amongst general purpose ftp servers linux certification exams sair required knowledge integrate eggdrop irc channels glftpd stands greyline file transfer protocol daemon named initial developer greyline first public release glftpd dates back beginning 1998. glftpd well known detailed user permissions extensive scripting features securely efficiently transferring files sites using fxp support glftpd available irc efnet glftpd glhelp
[ 3915, 1984, 5571, 2142, 578, 3795, 1435 ]
Test
2,387
9
SrcML:srcml srcml source l document-oriented xml representation source code created collaborative effort michael l. collard jonathan i. maletic abbreviation srcml short source markup language srcml wraps source code text information abstract syntax tree ast tags single xml document original text preserved original source code document recreated srcml markup exception possibility newline normalization purpose srcml provide full access source code lexical documentary structural syntactic levels format also provides easy support fact-extraction transformation supported srcml toolkit maintained srcml website shown perform scalable lightweight fact-extraction transformation srcml toolkit consists command-line program called srcml translates source code srcml provided code file command line translates srcml source code srcml archive provided command line program also supports direct queries transformations srcml archives using tools like xpath xslt relaxng srcml toolkit actively maintained currently support c c++ c java srcml format consists text original source code file plus xml tags specifically text wrapped srcml elements indicate syntactic structure code short explicitly identifies syntactic structures code tags used srcml listed along category fall within srcml uses xml namespaces list prefix used denote namespace namespaces note srcml archive entire project contained within single root unit element individual file contained unit element within root unit element following shows srcml used single files following example converts c++ file main.cpp srcml file main.cpp.xml following command extract source code file main.cpp.xml place c++ file main.cpp following shows src2srcml srcml2src used entire project following example converts project 'project srcml file project.xml following command extract source code files file project.xml place directory project srcml allows use current xml apis tools write transformations also allows use xslt directly using argument—xslt= name .xls srcml2src command using srcml markup xslt allows user apply program transformations xml-like structure srcml obtain transformed xml written back source code representation using srcml2src tool application srcml program transformation explained detail collard et al following command run xslt program program.xsl srcml archive project.xml simplest form fact extraction using srcml leverages xpath order address parts srcml document pull information various entities characteristics source code course limited standard xml api may used application srcml fact extraction explained detail kagdi et al cpp directive cpp file cpp include cpp define cpp undef cpp line cpp cpp ifdef cpp ifndef cpp else cpp elif cpp endif cpp cpp pragma cpp errorliteral operator modifier example create srcml archive entire software project following command runs xpath path srcml archive project.xml work done providing convenient extension functions srcml brings lot advantages difference analysis source code one advantages ability query differences specific sections codebase well across versions codebase application srcml difference analysis explained detail maletic et al example srcml used xpath expression could used find classes source document //src class another example might finding comments within functions /src function//src comment due fact srcml based xml xml tools used srcml provides rich functionality
[ 7305, 3499 ]
Test
2,388
5
Isochronous_media_access_controller:isochronous media access controller isochronous media access controller i-mac media access control whereby data must transferred isochronously—in words data must transmitted steady rate without interruption
[]
Validation
2,389
7
Contact_Telecom:contact telecom contact telecom telecommunications services company develops data processing software services telecommunications industry established 1998 based manchester new hampshire contact telecom offers carriers service providers telecommunication companies internet service providers wireless voice ip competitive local exchange carriers incumbent local exchange carriers cable companies cloud computing providers way manage invoice usage data cost management revenue assurance customer care initiatives flagship service billing data analyzer bda automates data processing drive company overall profitability models
[ 2961 ]
Validation
2,390
4
Backup:backup information technology backup data backup copy computer data taken stored elsewhere may used restore original data loss event verb form referring process back whereas noun adjective form backup backups used recover data loss data deletion corruption recover data earlier time backups provide simple form disaster recovery however backup systems able reconstitute computer system complex configuration computer cluster active directory server database server backup system contains least one copy data considered worth saving data storage requirements large information repository model may used provide structure storage different types data storage devices used copying backups data already secondary storage onto archive files. ref group note name=archivefilemaynotcontainold/historicalmaterial contrast everyday use term archive data stored archive file necessarily old historical interest. /ref also different ways devices arranged provide geographic dispersion data security portability data selected extracted manipulated storage process include methods dealing live data including open files well compression encryption de-duplication additional techniques apply enterprise client-server backup backup schemes may include dry runs validate reliability data backed limitations human factors involved backup scheme backup strategy requires information repository secondary storage space data aggregates backups data sources repository could simple list backup media dvds etc dates produced could include computerized index catalog relational database backup data needs stored requiring backup rotation scheme system backing data computer media limits number backups different dates retained separately appropriate re-use data storage media overwriting backups longer needed scheme determines piece removable storage used backup operation long retained backup data stored unstructured repository may simply stack tapes dvd-rs external hdds minimal information backed method easiest implement unlikely achieve high level recoverability lacks automation repository using backup method contains complete source data copies taken one specific points time copying system images method frequently used computer technicians record known good configurations however imaging generally useful way deploying standard configuration many systems rather tool making ongoing backups diverse systems incremental backup stores data changed since reference point time duplicate copies unchanged data n't copied typically full backup files infrequent intervals serving reference point incremental repository subsequently number incremental backups made successive time periods restores begin last full backup apply incrementals backup systems create series incrementals thus providing equivalent frequently full backup done modify single archive file speeds restores recent versions files true continuous data protection cdp refers backup instantly saves copy every change made data allows restoration data point time comprehensive advanced data protection near-cdp backup applications frequently marketed cdp automatically take incremental backups specific intervals example every 15 minutes one hour 24 hours therefore allow restores fixed interval near-cdp backup applications use journaling typically based periodic snapshots read-only copy data frozen particular point time near-cdp except apple time machine intent-logs every change host system often saving byte block-level differences rather file-level differences backup method differs simple disk mirroring enables roll-back log thus restoration old images data intent-logging allows precautions consistency live data protecting self-consistent files requiring applications quiesced made ready backup near-cdp practicable ordinary personal backup applications opposed cdp must run conjunction virtual machine equivalent therefore generally used enterprise client-server backups reverse incremental backup method stores recent archive file mirror source data series differences mirror current state previous states reverse incremental backup method starts non-image full backup full backup performed system periodically synchronizes full backup live copy storing data necessary reconstruct older versions either done using hard links—as apple time machine using binary diffs differential backup saves data changed since last full backup means maximum two backups repository used restore data however time last full backup thus accumulated changes data increases time perform differential backup restoring entire system requires starting recent full backup applying last differential backup differential backup copies files created changed since last full backup regardless whether differential backups made since whereas incremental backup copies files created changed since recent backup type full incremental variations incremental backup include multi-level incrementals block-level incrementals compare parts files instead entire files regardless repository model used data copied onto archive file data storage medium medium used also referred type backup destination magnetic tape long time commonly used medium bulk data storage backup archiving interchange previously less expensive option longer case smaller amounts data tape sequential access medium rate continuously writing reading data fast many tape formats proprietary specific certain markets like mainframes particular brand personal computer 2014 lto become primary tape technology remaining viable super formats ibm 3592 also referred ts11xx series oracle storagetek t10000 use hard disk storage increased time become progressively cheaper hard disks usually easy use widely available accessed quickly however hard disk backups close-tolerance mechanical devices may easily damaged tapes especially transported mid-2000s several drive manufacturers began produce portable drives employing ramp loading accelerometer technology sometimes termed shock sensor 2010 industry average drop tests drives technology showed drives remaining intact working 36-inch non-operating drop onto industrial carpeting manufacturers also offer 'ruggedized portable hard drives include shock-absorbing case around hard disk claim range higher drop specifications period years stability hard disk backups shorter tape backups external hard disks connected via local interfaces like scsi usb firewire esata via longer-distance technologies like ethernet iscsi fibre channel disk-based backup systems via virtual tape libraries otherwise support data deduplication reduce amount disk storage capacity consumed daily weekly backup data optical storage uses lasers store retrieve data recordable cds dvds blu-ray discs commonly used personal computers generally cheap past capacities speeds discs lower hard disks tapes although advances optical media slowly shrinking gap many optical disc formats worm type makes useful archival purposes since data changed optical storage systems allow cataloged data backups without human contact discs allowing longer data integrity french study 2008 indicated lifespan typically-sold cd-rs 2–10 years one manufacturer later estimated longevity cd-rs gold-sputtered layer high 100 years sony optical disc archive 2016 reach read rate 250mb/s solid-state drives ssds use integrated circuit assemblies store data flash memory thumb drives usb flash drives compactflash smartmedia memory sticks secure digital card devices relatively expensive low capacity convenient backing relatively low data volumes solid-state drive contain movable parts making less susceptible physical damage huge throughput around 500 mbit/s 6 gbit/s available ssds become capacious cheaper flash memory backups stable fewer years hard disk backups remote backup services cloud backups involve service providers storing data offsite used protect events fires floods earthquakes could destroy locally stored backups cloud-based backup provides layer data protection however users must trust provider maintain privacy integrity data confidentiality enhanced use encryption speed availability limited user online connection users large amounts data may need use cloud seeding large-scale recovery various methods used manage backup media striking balance accessibility security cost media management methods mutually exclusive frequently combined meet user needs using on-line disks staging data sent near-line tape library common example online backup storage typically accessible type data storage begin restore milliseconds internal hard disk disk array maybe connected san example online backup type storage convenient speedy vulnerable deleted overwritten either accident malevolent action wake data-deleting virus payload nearline storage typically less accessible less expensive online storage still useful backup data storage mechanical device usually used move media units storage drive data read written generally safety properties similar on-line storage example tape library restore times ranging seconds minutes off-line storage requires direct action provide access storage media example inserting tape tape drive plugging cable data accessible via computer except limited periods written read back largely immune on-line backup failure modes access time varies depending whether media on-site off-site backup media may sent off-site vault protect disaster site-specific problem vault simple system administrator home office sophisticated disaster-hardened temperature-controlled high-security bunker facilities backup media storage data replica off-site also on-line e.g. off-site raid mirror replica fairly limited value backup backup site disaster recovery center used store data enable computer systems networks restored properly configure event disaster organisations heir data recovery centres others contract third-party due high costs backing rarely considered preferred method moving data dr site typical way would remote disk mirroring keeps dr data date possible backup operation starts selecting extracting coherent units data data modern computer systems stored discrete units known files files organized filesystems deciding back given time involves tradeoffs backing much redundant data information repository fill quickly backing insufficient amount data eventually lead loss critical information files actively updated called live present challenge back effective way back live data temporarily quiesce e.g. close files take snapshot resume live operations point snapshot backed normal methods snapshot instantaneous function filesystems presents copy filesystem frozen specific point time often copy-on-write mechanism snapshotting file changed results corrupted file unusable also case across interrelated files may found conventional database applications microsoft exchange server term fuzzy backup used describe backup live data looks like ran correctly represent state data single point time backup options data files quiesced include information stored computer stored files accurately recovering complete system scratch requires keeping track non-file data frequently useful required manipulate data backed optimize backup process manipulations improve backup speed restore speed data security media usage and/or reduced bandwidth requirements out-of-date data automatically deleted personal backup applications—as opposed enterprise client-server backup applications automated data grooming customized—the deletion globally delayed disabled various schemes employed shrink size source data stored uses less storage space compression frequently built-in feature tape drive hardware redundancy due backing similarly configured workstations reduced thus storing one copy technique applied file raw block level potentially large reduction called deduplication occur server data moves backup media sometimes referred source/client side deduplication approach also reduces bandwidth required send backup data target media process also occur target storage device sometimes referred inline back-end deduplication sometimes backups duplicated second set storage media done rearrange archive files optimize restore speed second copy different location different storage medium—as disk-to-disk-to-tape capability enterprise client-server backup high-capacity removable storage media backup tapes present data security risk lost stolen encrypting data media mitigate problem however encryption cpu intensive process slow backup speeds security encrypted backups effective security key management policy many computers backed destination storage devices ability use single storage device several simultaneous backups useful however cramming scheduled backup window via multiplexed backup used tape destinations process rearranging backup sets archive file known refactoring example backup system uses single tape day store incremental backups protected computers restoring one computers could require many tapes refactoring could used consolidate backups single computer onto single tape creating synthetic full backup especially useful backup systems incrementals forever style backups sometimes backups copied staging disk copied tape process sometimes referred d2d2t acronym disk disk tape useful problem matching speed final destination device source device frequently faced network-based backup systems also serve centralized location applying data manipulation techniques
[ 3599, 1438, 4292, 1076, 5022, 376, 1081, 3271, 5380, 4684, 3626, 2566, 1471, 5741, 1105, 5401, 5753, 6462, 2949, 6832, 5414, 6484, 7939, 6499, 6500, 5449, 6505, 5095, 2984, 459, 4759, 2278, 4761, 1536, 4398, 6526, 3702, 6187, 3711, 5839, ...
Test
2,391
6
Fork_(file_system):fork file system computer file system fork set data associated file-system object file systems without forks allow single set data contents file systems forks allow multiple contents every non-empty file must least one fork often default type depending file system file may one associated forks turn may contain primary data integral file metadata unlike extended attributes similar file system feature typically fixed size forks variable size possibly even larger file primary data fork size file sum sizes fork file systems without forks one may instead use multiple separate files associated particularly sidecar files metadata however connection files automatically preserved file system must instead handled program works files another alternative container file stores additional data within given file format archive file allows storing several files metadata within file within single fork requires programs process container file archive file rather file system handling forks alternatives require additional work programs using data benefit portability file systems support forks file system forks associated apple hierarchical file system hfs apple hfs original apple macintosh file system mfs allowed file system object two kinds forks data fork resource fork resource fork designed store non-compiled data would used system graphical user interface gui localizable text strings file icon used finder menus dialog boxes associated application however feature flexible additional uses found splitting word processing document content presentation storing part separate resources compiled software code also stored resource often applications would consist resource fork data fork one hfs+ obscure features file may arbitrary number custom named forks addition traditional data resource forks feature gone largely unused apple never added support mac os 8.1-10.3.9 beginning 10.4 partial implementation made support apple extended inline attributes mac os x v10.4 users running unix command line utilities tar included mac os x would risk data loss utilities updated handle resource forks files v10.4 starting 1985 novell netware file system nwfs successor novell storage services nss designed ground use variety methods store file metadata metadata resides novell directory services nds stored directory structure disk stored novell terms 'multiple data streams file multiple data streams also allow macintosh clients attach use netware servers ntfs file system introduced windows nt 3.1 supports file system forks known alternate data streams ads refs new file system introduced windows server 2012 originally support ads windows 8.1 64-bit server 2012 r2 support ads lengths 128k added refs ads originally intended add compatibility existing operating systems support forks computer program may directed open ads specifying name ads colon sign file path spite support programs including windows explorer dir command windows vista ignore ads windows explorer copies ads warns target file system support calculates main stream size list file folder streams dir command windows vista supports showing ads windows powershell v3.0 later supports manipulating ads windows 2000 uses ads store thumbnails image files store summary information title author file without changing main stream windows xp microsoft realized ads susceptible loss files containing moved ntfs volumes thus windows xp stores main stream whenever file format supports windows vista discontinued support adding summary information altogether microsoft decided sensitive ads handle use ads purposes stop service pack 2 windows xp introduced attachment execution service stores details origin downloaded files ads called zone identifier effort protect users downloaded files may present risk internet explorer windows 8 extended function smartscreen internet explorer also uses ads store favicons internet shortcut files solaris version 9 later allows files forks forks called extended attributes solaris although within usual meaning extended attribute maximum size solaris-type extended attribute maximum size file read written fashion files internally actually stored accessed like normal files ownership permissions differ parent file sub-directories administratively disabled names contain characters extended attributes network file system version 4 similar solaris-style extended attributes file system supports different forks applications aware security risks arise allowing legacy software access data without appropriate shims place primary culprit problems different system utilities disk explorer antivirus software archivers aware different forks following problems arise
[ 3599, 2547, 7161, 4672, 6431, 3626, 1471, 5049, 5401, 405, 6117, 759, 6854, 5437, 4375, 6500, 447, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 6537, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 160...
Test
2,392
2
Linuxcare:linuxcare linuxcare founded san francisco 1998 dave sifry arthur tyde dave laduke company initial goal 800 number linux operate 24 hours day due dot-com bubble early millennium years version linuxcare morphed levanta eventually closed doors 2008 1999 linuxcare developed linuxcare bootable toolbox also known linuxcare bbc bootable business card bbc live cd bootable linux distribution designed run entirely cd 1999 new concept preceded one linux distribution designed exclusively run cd demolinux demolinux designed show whole desktop experience linux distribution linuxcare bbc designed used mainly utility cd first live cd focus bbc distribution 50mb designed fit mini cd shaped like standard business card included utilities designed assist system administrators primarily text console operating system minimal blackbox x11 ui included linuxcare produced initial launch unversioned release pressed business card cds distributed linuxworld 1999 versions 1.2 1.5 1.6 later released online pressed released conventions linux user groups 1999 2001 may 8 2001 seth schoen announced original three developers linuxcare bootable toolbox left linuxcare fork project new community project named lnx-bbc release 1.6 released may 2001 served transition release linuxcare lnx-bbc projects offering release respective sites lnx-bbc produced three bbc releases 1.618 august 2001 2.0 january 2003 2.1 may 1 2003 early versions assembled hand later versions utilized gar software build system built around gnu automake lnx-bbc discontinued 2.1 release linuxcare brand repurchased arthur tyde incorporated llc dr. scott s. elliott partners state california new company provides services businesses related cloud computing linuxcare llc offices san francisco manila
[ 5200, 1629, 3444, 7251, 474, 7075, 1941, 578, 314, 2758, 1663, 2864, 6209, 6761, 2063, 2961, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 352, 3751, 7954, 6244, 788 ]
Validation
2,393
2
Pmset:pmset computing pmset command line utility manipulate power management settings darwin macos operating systems assign sleep settings schedule sleep wake times display power information pmset utility first appeared darwin 6.0.1 mac os x 10.2 jaguar updated periodically since introduction still available darwin 17.0 macos 10.13 high sierra utility sets lists power management settings functionality provided utility available gui interface energy saver preference pane however pmset allows greater flexibility access several options available gui utility set different power management settings depending usage scenario different settings applied machine running charger battery ups three appropriate flags follows additional arguments supplied assigning power management settings power management arguments discussed greater detail invoking command specified arguments modify power management options arguments already set unmodified pmset unless arguments specifically included utility schedule wake sleep power power events events recurring based arbitrary weekday time combinations scheduled future dates times syntax scheduling event follows previously stored events overwritten upon running command schedule multiple events must entered one command string example set shutdown event every day week 23:59 wake power event every day week 7:00 enter following get flag displays information current power management configuration log recent activity additional arguments supplied flag display current settings additional get arguments discussed greater detail get flag follows view currently scheduled events type utility also able configure hibernation safe sleep options change energy saver profiles pmset utility recognizes following arguments arguments passed serial form order bad syntax unrecognized argument cause entire command fail resulting error message brief help screen power management settings changed privileged user settings may adjusted independently circumstances machine attached charger running battery case laptop running ups available settings also adjusted four scenarios simultaneously default option usage flag specified power management options specified different profiles appending -c charger -b battery -u ups -a flags following example set machine sleep 10 minutes sleep display five minutes powered battery following command assign slightly different power management settings circumstances machine powered charger machine set sleep 30 minutes display set never sleep set charger issuing commands interfere arguments entered serial form set modify several power management parameters one command following command set machine never sleep sleep 0 enable sudden motion sensor sms 1 set display sleep 20 minutes displaysleep 20 disable processor speed reduction reduce 0 enable intermediate display dimness halfdim 1 enable machine wake lid opened lidwake 1 prevent system sleeping tty session ssh active ttyskeepawake 1 disable waking machine ac adapter inserted acwake 0 disable automatic restart power removed restored autorestart 0 enable dynamic change processor speed based system load dps 1 enable wake modem ring ring 1 enable wake receipt magic ethernet packet womp 1 disable hard disk sleep disksleep 0 example include usage flag settings specified apply usage scenarios subsequent commands specify usage flag affect settings usage scenario instance pmset -b sleep 10 cause machine sleep 10 minutes battery attached settings apply battery attached settings example apply charger ups attached least darwin 9.4 os x 10.5.4 leopard changes made pmset saved persistent preferences file /library/preferences/systemconfiguration/com.apple.powermanagement.plist file modified manually using defaults command changes taken immediately power management system manual edits com.apple.powermanagement.plist also stand risk overwritten command pmset touch reread existing settings disk apply system autopoweroff enabled machine got hibernate mode even hibernatemode 0 value autopoweroffdelay may seconds despite man page mavericks nov 9 2012 documenting minutes pmset command able schedule system sleep shutdown wakeup power events schedule argument setting one-time power events repeat setting daily weekly events scheduling events done privileged user schedule argument recognizes following additional arguments utility unforgiving improper syntax errors syntax cause command fail display brief help message syntax scheduled event follows one type event sleep wake et cetera specified date chosen must future utility expects able store information pmu may work reliably non-apple hardware date time string must enclosed quotation marks syntax repeating event follows scheduled wake sleep power events stored persistent preferences file /library/preferences/systemconfiguration/com.apple.autowake.plist file manually edited using defaults command changes made stand serious risk overwritten also edits immediately taken system list flag -g displays information current power configuration flag alone additional arguments display current power management settings additional arguments display specific information get functions pmset require privileged access utility recognizes following arguments one get argument passed pmset must preceded get flag instance display scheduled events type pmset -g sched utility return error one get argument provided first ignored sleep displaysleep show imposed value 0 disabled together list process ids impose value processes backup programs need machine stay awake example backup finished following examples demonstrate output pmset command apple powerbook g4 running mac os x 10.5.4 leopard following example put relevant computer sleep immediately following example apply laptops powered battery set machine sleep 5 minutes inactivity put display sleep 2 minutes spin hard disk 3 minutes privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example apply machines powered ups set machine perform emergency shutdown 5 percent battery remains ups 5 minutes estimated draw time remains whichever comes first privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example apply usage scenarios set machine wake receipt magic ethernet packet wake modem detects ring prevent system sleeping tty session active privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example sets one-time scheduled power event machine set shut 01/10/2009 10:00 pm 10 january 2009 – note us centric mm/dd/yyy time syntax privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g sched following example sets repeating power event machine wake power every weekday 8:00 privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g sched example output pmset -g. time machine powered charger simultaneously charging battery command prints current configuration example output pmset -g sched example machine already configured repeating event start wake every weekday 8:00 command prints repeating event note next occurrence appears scheduled power event example output pmset -g. time machine backed output shows pid backup program
[ 6295, 2254, 5571 ]
Test
2,394
8
SemanticGov:semanticgov semanticgov european union-funded research development project lasted 2006 2009 aimed building infrastructure software models services etc necessary enabling offering semantic web services public administration pa semanticgov aimed address longstanding challenges faced public administrations achieving interoperability amongst pa agencies within country well amongst countries easing discovery pa services customers facilitating execution complex services often involving multiple pa agencies interworkflows semanticgov project aimed capitalizing service oriented architectures paradigm implemented state-of-the-art semantic web services technology supported rigorous reusable public administration domain analysis modelling line major european programmes initiatives field e.g european interoperability framework previous work conducted eu idabc programme i2010 group member states representatives competitiveness innovation cip programme semanticgov project objectives support pa client identify needed services providing infrastructure mapping client needs pa services b discover service interest federal/national pa service directory c. execute monitor service workflow providing infrastructure on-the-fly semi-automated composition execution monitoring complex pa services ii support european citizens businesses access pan-european egovernment services pegs providing communal semantic gateway resolve semantic incompatibilities amongst different administration systems semanticgov project meant simply provide new electronic government solutions a. enhance administrative capacity national public administration systems providing new paradigm service provision b. pave way administrative dimension european unification aka “ common european administrative space ” facilitating communication amongst eu national administrative systems list consortium partners follows
[]
Validation
2,395
4
DivvyCloud:divvycloud divvy cloud corporation privately held venture-backed american cybersecurity company headquarters arlington virginia core product protects cloud container environments misconfigurations policy violations threats iam challenges automated real-time remediation divvycloud customers achieve continuous security compliance fully realize benefits cloud container technology divvycloud supports aws microsoft azure google cloud platform alibiba cloud kubernetes divvycloud category technology classified gartner cloud security posture management divvycloud founded may 2013 former electronic arts employees brian johnson chris deramus tenure electronic arts responsible large-scale infrastructure mmorpg titles writing proprietary tools manage complex environment left electronic arts created divvycloud may 2019 divvycloud secured 19 million funding round led providence strategic growth arm providence equity partners contributions existing investors missionog rtp ventures investment brought total capital raised date 29 million following 6 million series round september 2017 company numerous awards including cyber defense magazine editor ’ choice winner 2019 infosec awards cloud security category 2019 cyber security excellence awards
[ 5064, 3706 ]
Validation
2,396
4
Linked_timestamping:linked timestamping linked timestamping type trusted timestamping issued time-stamps related linked timestamping creates time-stamp tokens dependent entangled authenticated data structure later modification issued time-stamps would invalidate structure temporal order issued time-stamps also protected data structure making backdating issued time-stamps impossible even issuing server top authenticated data structure generally published hard-to-modify widely witnessed media like printed newspaper public blockchain long-term private keys use avoiding pki-related risks suitable candidates authenticated data structure include simplest linear hash chain-based time-stamping scheme illustrated following diagram linking-based time-stamping authority tsa usually performs following distinct functions linked timestamping inherently secure usual public-key signature based time-stamping consequential time-stamps seal previously issued ones hash chain authenticated dictionary use could built one way modifying issued time-stamps nearly hard finding preimage used cryptographic hash function continuity operation observable users periodic publications widely witnessed media provide extra transparency tampering absolute time values could detected users whose time-stamps relatively comparable system design absence secret keys increases system trustworthiness keys leak hash algorithms considered future-proof modular arithmetic based algorithms e.g rsa linked timestamping scales well hashing much faster public key cryptography need specific cryptographic hardware limitations common technology guaranteeing long-term attestation value issued time-stamps digitally signed data periodic over-time-stamping time-stamp token missing key-related risks plausible safety margin reasonably chosen hash function over-time-stamping period hash-linked token could order magnitude longer public-key signed token haber stornetta proposed 1990 link issued time-stamps together linear hash-chain using collision-resistant hash function main rationale diminish tsa trust requirements tree-like schemes operating rounds proposed benaloh de mare 1991 bayer haber stornetta 1992 benaloh de mare constructed one-way accumulator 1994 proposed use time-stamping used aggregation one-way accumulator requires one constant-time computation round membership verification surety started first commercial linked timestamping service january 1995 linking scheme described security analyzed following article haber sornetta buldas et al continued optimization formal analysis binary tree threaded tree based schemes skip-list based time-stamping system implemented 2005 related algorithms quite efficient security proof hash-function based time-stamping schemes presented buldas saarepera 2004 explicit upper bound formula_1 number time stamps issued aggregation period suggested probably impossible prove security without explicit bound so-called black-box reductions fail task considering known practically relevant efficient security proofs black-box negative result quite strong next 2005 shown bounded time-stamping schemes trusted audit party periodically reviews list time-stamps issued aggregation period made universally composable remain secure arbitrary environments compositions protocols instances time-stamping protocol buldas laur showed 2007 bounded time-stamping schemes secure strong sense satisfy so-called knowledge-binding condition security guarantee offered buldas saarepera 2004 improved diminishing security loss coefficient formula_1 formula_3 hash functions used secure time-stamping schemes necessarily collision-resistant even one-way secure time-stamping schemes probably possible even presence universal collision-finding algorithm i.e universal attacking program able find collisions hash function suggests possible find even stronger proofs based properties hash functions illustration hash tree based time-stamping system works rounds formula_4 formula_5 formula_6 ... one aggregation tree per round capacity system formula_1 determined tree size formula_8 formula_9 denotes binary tree depth current security proofs work assumption hard limit aggregation tree size possibly enforced subtree length restriction iso 18014 part 3 covers 'mechanisms producing linked tokens american national standard financial services trusted timestamp management security ansi asc x9.95 standard june 2005 covers linking-based hybrid time-stamping schemes ietf rfc standard draft linking based time-stamping rfc 4998 evidence record syntax encompasses hash tree time-stamp integrity guarantee long-term archiving
[ 6430, 6049, 7567, 3794 ]
Test
2,397
2
Open_(process):open process open nextstep macos command line process opens file folder url gui though user double clicked files opened default application type folders opened finder file system gui urls opened default browser
[ 4759 ]
Validation
2,398
2
XDA_Developers:xda developers xda developers also known simply xda often stylized xda-developers mobile software development community launched 20 december 2002 although discussion primarily revolves around android members also talk many operating systems mobile development topics many software hardware hacks rooting methods phone tablet specific tweaks originate members xda forum xda developers also hosts xda portal source android mobile phone development news well xda labs android app repository acts third-party application provider launched 2010 2016 respectively xda-developers.com created nah6 crypto products bv launched december 20th 2002 10 january 2011 xda-developers bought jb online media llc name xda developers originally derived xda marketed personal digital assistant pda extra features 2013 xda partnered swappa become official marketplace users buy sell devices site main purpose discussion troubleshooting development android sailfish os windows phone webos ubuntu touch firefox os tizen phones site also offers windows mobile android users general information devices rom upgrades technical support q reviews device applications accessories separate forums exist model phones manufactured google sony htc samsung lg electronics motorola nokia many others forums also available tablets many devices recently added new domain link shortener restricted devs joshua solan manages owns xda developers via company jb online media llc february 2009 microsoft asked xda developers remove roms created oems response petition raised signed 10,000 xda developers members petition put aside microsoft pursue removal customized images microsoft felt using custom images based roms originally provided microsoft acceptable roms work specific models portable devices original rom designed cnet asia suggested xda developers offers potential solutions problems many android-based mobile devices mobile phone reviews testers cnet preferred using xda developers roms carrying detailed reviews
[ 4116, 3933, 5195, 6697, 2003, 3848, 5372, 7431, 195, 6978, 5473, 6427, 7346, 561, 201, 474, 2107, 2017, 5919, 6183, 649, 1095, 4234, 5302, 7357, 2037, 2756, 7007, 136, 42, 4340, 501, 7749, 4166, 3310, 2591, 1399, 2417, 5771, 5775, 518, ...
Validation
2,399
6
Comparison_of_disk_encryption_software:comparison disk encryption software technical feature comparison different disk encryption software different modes operation supported software note encrypted volume use one mode operation
[ 5272, 3350, 5808, 3083, 3769, 6256, 1259, 2379, 902, 2204, 7258, 1008, 3866, 309, 578, 5582, 496, 6025, 6458, 4616, 6477, 5773, 6043, 2426, 6305, 4990, 6051, 6489, 2349, 5440, 2529, 4014, 4559, 88 ]
Validation
2,400
5
Subnetwork_Access_Protocol:subnetwork access protocol subnetwork access protocol snap mechanism multiplexing networks using ieee 802.2 llc protocols distinguished 8-bit 802.2 service access point sap fields snap supports identifying protocols ethernet type field values also supports vendor-private protocol identifier spaces used ieee 802.3 ieee 802.4 ieee 802.5 ieee 802.11 ieee 802 physical network layers well non-ieee 802 physical network layers fddi use 802.2 llc snap lsap fields added packets transmitting node order allow receiving node pass received frame appropriate device driver understands given protocol open systems interconnect osi model uses sap define communication layers like network transport session layers seven-layered model identify protocol process incoming message within given layer programs exchange data mutually agreed upon protocol mechanism pair programs support common protocol communicate thus multiple protocols coexist within layer necessary determine protocol invoked process service data unit delivered lower layer common reference sap including source service access point ssap destination service access point dsap refers boundary data link layer network layer common think sap terms use layer 2 specifically logical link control llc sub-layer defined ieee 802.2 standards link service access point lsap includes destination service access point dsap source service access point ssap enables mac station communicate upper layers via different protocols standard network layer protocols assigned reserved llc addresses recorded iso/iec tr 11802-1 one half llc address space reserved assignment protocols accommodated two ways one way local assignment lsaps half llc address space available second way use particular reserved llc address value assigned use conjunction sub-network access protocol snap called snap address snap address identifies mac sap single lsap thus protocol using snap must employ protocol identifier thus subnetwork access protocol snap mechanism multiplexing networks using ieee 802.2 llc protocols distinguished 8-bit 802.2 service access point sap fields snap supports identifying protocols ethernet type field values also supports vendor-private protocol identifier spaces used ieee 802.3 ieee 802.4 ieee 802.5 ieee 802.11 ieee 802 physical network layers well non-ieee 802 physical network layers fddi use 802.2 llc snap extension 802.2 llc specified ieee 802 overview architecture document 5-octet snap header follows 802.2 llc header destination sap dsap source sap ssap contain hexadecimal values aa ab snap header consists 3-octet ieee organizationally unique identifier oui followed 2-octet protocol id oui hexadecimal 000000 protocol id ethernet type ethertype field value protocol running top snap oui oui particular organization protocol id value assigned organization protocol running top snap snap usually used unnumbered information 802.2 protocol data units pdus control field value 3 lsap values usually hexadecimal aa 802.2 llc header snap packet usually aa aa 03 however snap used pdu types well ethernet 8 octets occupied llc snap headers reduce size available payload protocols internet protocol 1492 bytes compared use ethernet ii framing therefore protocols ethertype values packets usually transmitted ethernet ii headers rather llc snap headers network types llc snap headers required order multiplex different protocols link layer mac layer n't ethertype field alternative framing would larger available payload one might ask separate sub-network header necessary answer augment decision made layout llc header time llc header designed thought single octet 256 possible values header would enough specify protocol values vendors would want register values began reserved discovered llc header would soon run open values hexadecimal aa ab values reserved additional header—the snap header—was developed support ethertype values well multiple spaces private protocol values per ietf rfc 1042 ip datagrams arp datagrams transmitted ieee 802 networks using llc snap headers except ethernet/ieee 802.3 transmitted ethernet ii headers per rfc 894
[ 2062, 3821, 530, 2095, 2117, 3597, 3799 ]
Test
2,401
5
Simple_Update_Protocol:simple update protocol simple update protocol sup protocol developed friendfeed simplify speed rss atom websites supported sup meaning updates services appeared friendfeed within seconds support dropped eventually friendfeed shutdown 2015-04-09 sites include disqus identi.ca reddit brightkite supported sup shutdown april 2012 youtube supported sup according youtube v2 api sup documentation yet reference says youtube data api v2 officially deprecated march 4 2014 youtube data api v3 supports push notifications via pubsubhubbub instead longer sup section
[]
Test
2,402
0
Lesk_algorithm:lesk algorithm lesk algorithm classical algorithm word sense disambiguation introduced michael e. lesk 1986 lesk algorithm based assumption words given neighborhood section text tend share common topic simplified version lesk algorithm compare dictionary definition ambiguous word terms contained neighborhood versions adapted use wordnet implementation might look like frequently used example illustrating algorithm context pine cone following dictionary definitions used seen best intersection pine 1 ⋂ cone 3 2 simplified lesk algorithm correct meaning word given context determined individually locating sense overlaps dictionary definition given context rather simultaneously determining meanings words given context approach tackles word individually independent meaning words occurring context comparative evaluation performed vasilescu et al 2004 shown simplified lesk algorithm significantly outperform original definition algorithm terms precision efficiency evaluating disambiguation algorithms senseval-2 english words data measure 58 precision using simplified lesk algorithm compared 42 original algorithm note vasilescu et al implementation considers back-off strategy words covered algorithm consisting frequent sense defined wordnet means words possible meanings lead zero overlap current context word definitions default assigned sense number one wordnet simplified lesk algorithm smart default word sense vasilescu et al. 2004 computeoverlap function returns number words common two sets ignoring function words words stop list original lesk algorithm defines context complex way unfortunately lesk ’ approach sensitive exact wording definitions absence certain word radically change results algorithm determines overlaps among glosses senses considered significant limitation dictionary glosses tend fairly short provide sufficient vocabulary relate fine-grained sense distinctions lot work appeared offering different modifications algorithm works use resources analysis thesauruses synonyms dictionaries morphological syntactic models instance may use information synonyms different derivatives words definitions words definitions lot studies concerning lesk extensions
[ 4403 ]
Test
2,403
9
Object_file:object file object file file containing object code meaning relocatable format machine code usually directly executable various formats object files object code packaged different object files object file may also work like shared library addition object code object files may contain metadata used linking debugging including information resolve symbolic cross-references different modules relocation information stack unwinding information comments program symbols debugging profiling information object file format computer file format used storage object code related data many different object file formats originally type computer unique format advent unix portable operating systems formats coff elf defined used different kinds systems possible file format used linker input output thus library executable file format design and/or choice object file format key part overall system design affects performance linker thus programmer turnaround developing format used executables design also affects time programs take begin running thus responsiveness users object file formats structured separate sections data section containing certain type data sections known segments due term memory segment previously common form memory management program loaded memory loader loader allocates various regions memory program regions correspond segments object file thus usually known names others stack exist run time cases relocation done loader linker specify actual memory addresses however many programs architectures relocation necessary due handled memory management unit position-independent code systems segments object file copied paged memory executed without needing processing systems may done lazily segments referenced execution example via memory-mapped file backed object file types data supported typical object file formats segments different object files may combined linker according rules specified segments defined conventions exist segments shared object files instance dos different memory models specify names special segments whether may combined debugging information may either integral part object file format coff semi-independent format may used several object formats stabs dwarf gnu project binary file descriptor library bfd library provides common api manipulation object files variety formats
[ 1339, 4212, 6249, 4662, 4843, 6969, 7333, 3442, 5726, 6186, 4779, 3106, 3870, 1857, 3557, 7474, 757, 2418, 2420, 4728, 5606, 7687, 1894, 6498, 1989, 5190, 2084 ]
Test
2,404
1
Data_access:data access data access generic term referring process it-specific meaning connotations involving access rights broader legal and/or political sense former typically refers software activities related storing retrieving acting data housed database repository two fundamental types data access exist data access crucially involves authorization access different data repositories data access help distinguish abilities administrators users example administrators may ability remove edit add data general users may even read rights lack access particular information historically repository including different database file system etc might require use different methods languages many repositories stored content different incompatible formats years standardized languages methods formats developed serve interfaces often proprietary always idiosyncratic specific languages methods standards include sql 1974- odbc ca 1990- jdbc xqj ado.net xml xquery xpath 1999- web services standards enable translation data unstructured html free-text files structured xml sql structures connection strings dburls attempt standardise methods connecting databases right_of_access_to_personal_data
[ 6986, 4743, 5014, 5149, 2054, 2530, 5889 ]
Validation
2,405
9
AI_winter:ai winter history artificial intelligence ai winter period reduced funding interest artificial intelligence research term coined analogy idea nuclear winter field experienced several hype cycles followed disappointment criticism followed funding cuts followed renewed interest years decades later term first appeared 1984 topic public debate annual meeting aaai called american association artificial intelligence chain reaction begins pessimism ai community followed pessimism press followed severe cutback funding followed end serious research meeting roger schank marvin minsky—two leading ai researchers survived winter 1970s—warned business community enthusiasm ai spiraled control 1980s disappointment would certainly follow three years later billion-dollar ai industry began collapse hype common many emerging technologies railway mania dot-com bubble ai winter primarily collapse perception ai government bureaucrats venture capitalists despite rise fall ai reputation continued develop new successful technologies ai researcher rodney brooks would complain 2002 stupid myth ai failed ai around every second day 2005 ray kurzweil agreed many observers still think ai winter end story nothing since come ai field yet today many thousands ai applications deeply embedded infrastructure every industry enthusiasm optimism ai increased since low point early 1990s beginning 2012 artificial intelligence especially sub-field machine learning gained commercial acceptance funding increased dramatically two major winters 1974–1980 1987–1993 several smaller episodes including following cold war us government particularly interested automatic instant translation russian documents scientific reports government aggressively supported efforts machine translation starting 1954 outset researchers optimistic noam chomsky new work grammar streamlining translation process many predictions imminent 'breakthroughs however researchers underestimated profound difficulty word-sense disambiguation order translate sentence machine needed idea sentence otherwise made mistakes apocryphal example spirit willing flesh weak translated back forth russian became vodka good meat rotten similarly sight mind became blind idiot later researchers would call commonsense knowledge problem 1964 national research council become concerned lack progress formed automatic language processing advisory committee alpac look problem concluded famous 1966 report machine translation expensive less accurate slower human translation spending 20 million dollars nrc ended support careers destroyed research ended machine translation still open research problem 21st century met success google translate yahoo babel fish earliest work ai used networks circuits connected units simulate intelligent behavior examples kind work called connectionism include walter pitts warren mccullough first description neural network logic marvin minsky work snarc system late 1950s approaches abandoned researchers began explore symbolic reasoning essence intelligence following success programs like logic theorist general problem solver however one type connectionist work continued study perceptrons invented frank rosenblatt kept field alive salesmanship sheer force personality optimistically predicted perceptron may eventually able learn make decisions translate languages mainstream research perceptrons came abrupt end 1969 marvin minsky seymour papert published book perceptrons perceived outlining limits perceptrons could connectionist approaches abandoned next decade important work paul werbos discovery backpropagation continued limited way major funding connectionist projects difficult find 1970s early 1980s winter connectionist research came end middle 1980s work john hopfield david rumelhart others revived large scale interest neural networks rosenblatt live see however died boating accident shortly perceptrons published 1973 professor sir james lighthill asked uk parliament evaluate state ai research united kingdom report called lighthill report criticized utter failure ai achieve grandiose objectives concluded nothing done ai could n't done sciences specifically mentioned problem combinatorial explosion intractability implied many ai successful algorithms would grind halt real world problems suitable solving toy versions report contested debate broadcast bbc controversy series 1973 debate general purpose robot mirage royal institution lighthill versus team donald michie john mccarthy richard gregory mccarthy later wrote combinatorial explosion problem recognized ai beginning report led complete dismantling ai research england ai research continued universities edinburgh essex sussex created bow-wave effect led funding cuts across europe writes james hendler research would revive large scale 1983 alvey research project british government began fund ai war chest £350 million response japanese fifth generation project see alvey number uk-only requirements sit well internationally especially us partners lost phase 2 funding 1960s defense advanced research projects agency known arpa known darpa provided millions dollars ai research almost strings attached darpa director years j. c. r. licklider believed funding people projects allowed ai leaders marvin minsky john mccarthy herbert a. simon allen newell spend almost way liked attitude changed passage mansfield amendment 1969 required darpa fund mission-oriented direct research rather basic undirected research pure undirected research kind gone 1960s would longer funded darpa researchers show work would soon produce useful military technology ai research proposals held high standard situation helped lighthill report darpa study american study group suggested ai research unlikely produce anything truly useful foreseeable future darpa money directed specific projects identifiable goals autonomous tanks battle management systems 1974 funding ai projects hard find ai researcher hans moravec blamed crisis unrealistic predictions colleagues many researchers caught web increasing exaggeration initial promises darpa much optimistic course delivered stopped considerably short felt could n't next proposal promise less first one promised result moravec claims staff darpa lost patience ai research literally phrased darpa 'some people going taught lesson two-million-dollar-a-year contracts cut almost nothing moravec told daniel crevier autonomous tank project failure battle management system dynamic analysis replanning tool proved enormously successful saving billions first gulf war repaying darpas investment ai justifying darpa pragmatic policy darpa deeply disappointed researchers working speech understanding research program carnegie mellon university darpa hoped felt promised system could respond voice commands pilot sur team developed system could recognize spoken english words spoken particular order darpa felt duped 1974 cancelled three million dollar year grant many years later successful commercial speech recognition systems would use technology developed carnegie mellon team hidden markov models market speech recognition systems would reach 4 billion 2001 1980s form ai program called expert system adopted corporations around world first commercial expert system xcon developed carnegie mellon digital equipment corporation enormous success estimated saved company 40 million dollars six years operation corporations around world began develop deploy expert systems 1985 spending billion dollars ai in-house ai departments industry grew support including software companies like teknowledge intellicorp kee hardware companies like symbolics lisp machines inc. built specialized computers called lisp machines optimized process programming language lisp preferred language ai 1987 three years minsky schank prediction market specialized ai hardware collapsed workstations companies like sun microsystems offered powerful alternative lisp machines companies like lucid offered lisp environment new class workstations performance general workstations became increasingly difficult challenge lisp machines companies like lucid franz lisp offered increasingly powerful versions lisp example benchmarks published showing workstations maintaining performance advantage lisp machines later desktop computers built apple ibm would also offer simpler popular architecture run lisp applications 1987 become powerful expensive lisp machines desktop computers rule-based engines clips available alternatives left consumers reason buy expensive machine specialized running lisp entire industry worth half billion dollars replaced single year commercially many lisp companies failed like symbolics lisp machines inc. lucid inc. etc companies like texas instruments xerox abandoned field however number customer companies companies using systems written lisp developed lisp machine platforms continued maintain systems cases maintenance involved assumption resulting support work early 1990s earliest successful expert systems xcon proved expensive maintain difficult update could learn brittle i.e. could make grotesque mistakes given unusual inputs fell prey problems qualification problem identified years earlier research nonmonotonic logic expert systems proved useful special contexts another problem dealt computational hardness truth maintenance efforts general knowledge kee used assumption-based approach see nasa texsys supporting multiple-world scenarios difficult understand apply remaining expert system shell companies eventually forced downsize search new markets software paradigms like case-based reasoning universal database access maturation common lisp saved many systems icad found application knowledge-based engineering systems intellicorp kee moved lisp c++ variant pc helped establish object-oriented technology including providing major support development uml see uml partners 1981 japanese ministry international trade industry set aside 850 million fifth generation computer project objectives write programs build machines could carry conversations translate languages interpret pictures reason like human beings 1991 impressive list goals penned 1981 met indeed met 2001 2011 ai projects expectations run much higher actually possible 1983 response fifth generation project darpa began fund ai research strategic computing initiative originally proposed project would begin practical achievable goals even included artificial general intelligence long term objective program direction information processing technology office ipto also directed supercomputing microelectronics 1985 spent 100 million 92 projects underway 60 institutions half industry half universities government labs ai research generously funded sci jack schwarz ascended leadership ipto 1987 dismissed expert systems clever programming cut funding ai deeply brutally eviscerating sci schwarz felt darpa focus funding technologies showed promise words darpa surf rather dog paddle felt strongly ai next wave insiders program cited problems communication organization integration projects survived funding cuts including pilot assistant autonomous land vehicle never delivered dart battle management system noted successful survey reports early 2000s suggests ai reputation still less stellar many researchers ai mid 2000s deliberately called work names informatics machine learning analytics knowledge-based systems business rules management cognitive systems intelligent systems intelligent agents computational intelligence indicate work emphasizes particular tools directed particular sub-problem although may partly consider field fundamentally different ai also true new names help procure funding avoiding stigma false promises attached name artificial intelligence late 1990s early 21st century ai technology became widely used elements larger systems field rarely credited successes 2006 nick bostrom explained lot cutting edge ai filtered general applications often without called ai something becomes useful enough common enough labeled ai anymore rodney brooks stated around time stupid myth ai failed ai around every second day technologies developed ai researchers achieved commercial success number domains machine translation data mining industrial robotics logistics speech recognition banking software medical diagnosis google search engine fuzzy logic controllers developed automatic gearboxes automobiles 2006 audi tt vw touareg vw caravell feature dsp transmission utilizes fuzzy logic number škoda variants škoda fabia also currently include fuzzy logic-based controller camera sensors widely utilize fuzzy logic enable focus heuristic search data analytics technologies developed evolutionary computing machine learning subdivision ai research community techniques applied wide range real world problems considerable commercial success data analytics technology utilizing algorithms automated formation classifiers developed supervised machine learning community 1990s example tdidt support vector machines neural nets ibl used pervasively companies marketing survey targeting discovery trends features data sets researchers economists frequently judged status ai winter reviewing ai projects funded much trends funding often set major funding agencies developed world currently darpa civilian funding program called eu-fp7 provide much funding ai research us european union 2007 darpa soliciting ai research proposals number programs including grand challenge program cognitive technology threat warning system ct2ws human assisted neural devices sn07-43 autonomous real-time ground ubiquitous surveillance-imaging system argus-is urban reasoning geospatial exploitation technology urgent perhaps best known darpa grand challenge program developed fully automated road vehicles successfully navigate real world terrain fully autonomous fashion darpa also supported programs semantic web great deal emphasis intelligent management content automated understanding however james hendler manager darpa program time expressed disappointment government ability create rapid change moved working world wide web consortium transition technologies private sector eu-fp7 funding program provides financial support researchers within european union 2007–2008 funding ai research cognitive systems interaction robotics programme €193m digital libraries content programme €203m fet programme €185m marked increase ai funding development deployment commercial use led idea ai winter long concerns occasionally raised new ai winter could triggered overly ambitious unrealistic promise prominent ai scientists overpromising part commercial vendors several explanations put forth cause ai winters general ai progressed government-funded applications commercial ones new dynamics came play hype commonly cited cause explanations necessarily mutually exclusive ai winters partly understood sequence over-inflated expectations subsequent crash seen stock-markets exemplified railway mania dotcom bubble common pattern development new technology known hype cycle event typically technological breakthrough creates publicity feeds create peak inflated expectations followed trough disillusionment since scientific technological progress ca n't keep pace publicity-fueled increase expectations among investors stakeholders crash must follow ai technology seems exception rule another factor ai place organisation universities research ai often takes form interdisciplinary research ai therefore prone problems types interdisciplinary research face funding channeled established departments budget cuts tendency shield core contents department expense interdisciplinary less traditional research projects downturns country national economy cause budget cuts universities core contents tendency worsen effect ai research investors market likely put money less risky ventures crisis together may amplify economic downturn ai winter worth noting lighthill report came time economic crisis uk universities make cuts question programs go early computing history potential neural networks understood never realized fairly simple networks require significant computing capacity even today standards common see relationship basic research technology pipeline advances basic research give birth advances applied research turn leads new commercial applications often argued lack basic research lead drop marketable technology years line view advanced james hendler 2008 claimed fall expert systems late '80s due inherent unavoidable brittleness expert systems funding cuts basic research 1970s expert systems advanced 1980s applied research product development end decade pipeline run dry expert systems unable produce improvements could overcome brittleness secured funding fall lisp machine market failure fifth generation computers cases expensive advanced products overtaken simpler cheaper alternatives fits definition low-end disruptive technology lisp machine makers marginalized expert systems carried new desktop computers instance clips fall lisp machine market fall expert systems strictly speaking two separate events still failure adapt change outside computing milieu cited one reason 1980s ai winter several philosophers cognitive scientists computer scientists speculated ai might failed lies future hubert dreyfus highlighted flawed assumptions ai research past early 1966 correctly predicted first wave ai research would fail fulfill public promises making critics like noam chomsky argued ai headed wrong direction part heavy reliance statistical techniques chomsky comments fit larger debate peter norvig centered around role statistical methods ai exchange two started comments made chomsky symposium mit norvig wrote response
[ 6955, 6337, 7372, 7290, 2054, 5429, 4543, 5612, 87, 5008 ]
Test
2,406
4
Anti-worm:anti-worm anti-worm sometimes helpful worm computer worm designed something author feels helpful though necessarily permission executing computer owner concept anti-worm helpful worm proactive method dealing virus computer worm outbreaks type worm delivers payload helpful actions instead malicious actions like malicious computer worms anti-worms reach computers scanning ip ranges placing copy vulnerable hosts anti-worm patches computer vulnerability uses affected computer find vulnerable hosts anti-worms ability spread fast regular computer worms utilizing scan infect repeat model malicious computer worms use anti-worms used combat effects code red blaster santy worms welchia example helpful worm utilizing deficiencies exploited blaster worm welchia infected computers automatically began downloading microsoft security updates windows without users consent welchia automatically reboots computers infects installing updates one updates patch fixed exploit examples helpful worms den_zuko cheeze codegreen millenium santy worm released shortly christmas 2004 spread quickly using google search vulnerable versions phpbb worm exploited bug phpbb software infect host defacing website deleting messages stored forums worm poised spread hundreds thousands websites running phpbb forum approximately 10 days worm launch someone released another worm combat santy worm patch vulnerable phpbb forum anti-santy worm spread quickly affecting thousands servers running phpbb anti-santy worm however caused problems many site administrators reported anti-worm crashed systems flooding requests resulting denial-of-service attack still others reported patch work whether anti-worm significant positive impact curtailing spread santy worm unknown within several hours santy release google blocked search string worm using find vulnerable hosts thus worm could find new hosts infect way determine google actions anti-santy worm protect hosts many computer security experts denounced so-called anti-worm position code run system without system owner consent even though anything malicious helpful worms log events automatically reboot computer without user consent part installation process put strain network spread download updates worm code even author good intentions wreak havoc network overflow traffic capacity network author know exact configuration systems code run could render system useless intended purpose jurisdictions computer crime laws covering worms distinguish worms anti-worms though factors take account considering whether prosecute author code
[ 1691, 2724, 4759, 1992, 1805 ]
Test
2,407
4
Cross-application_scripting:cross-application scripting cross-application scripting cas vulnerability affecting desktop applications n't check input exhaustive way cas allows attacker insert data modifies behaviour particular desktop application makes possible extract data inside users systems attackers may gain full privileges attacked application exploiting cas vulnerabilities attack degree independent underlying operating system hardware architecture initially discovered emanuele gentili presented two researchers alessandro scoscia emanuele acri participated study technique implications presented first time security summit 2010 milan format string attack similar concept attack cas could considered generalization attack method aspects technique previously demonstrated clickjacking techniques like web interfaces modern frameworks realization graphical applications particular gtk+ qt allow use tags inside widgets attacker gains possibility inject tags gains ability manipulate appearance behaviour application exactly phenomenon seen use cross-site scripting xss web pages kind behavior named cross-application scripting cas typically desktop applications get considerable amount input support large number features certainly web interface makes harder developer check whether input program might get untrusted sources filtered correctly cross-application scripting application equivalent xss web applications cross-application request forgery carf equivalent cross-site request forgery csrf desktop applications carf concept “ link ” “ protocol ” inherited web extended involves components graphical environment cases operating system exploiting vulnerabilities amenable csrf requires interaction user requirement n't particularly limiting user easily led execute certain actions graphical interface altered right way many misleading changes look applications obtained use cas new kind “ phishing ” whose dangerousness amplified lack tools detect kind attack outside websites emails contrast xss techniques manipulate later execute commands users browser cas possible talk directly operating system graphical interface
[]
Test
2,408
2
Local_Security_Authority_Subsystem_Service:local security authority subsystem service local security authority subsystem service lsass process microsoft windows operating systems responsible enforcing security policy system verifies users logging windows computer server handles password changes creates access tokens also writes windows security log forcible termination lsass.exe result welcome screen losing accounts prompting restart machine lsass.exe crucial system file name often faked malware lsass.exe file used windows located directory codice_1 running location lsass.exe likely virus spyware trojan worm due way systems display fonts malicious developers may name file something like isass.exe capital instead lowercase l efforts trick users installing executing malicious file instead trusted system file
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 5401, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, ...
Validation
2,409
3
Eddie_Kidd_Jump_Challenge:eddie kidd jump challenge eddie kidd jump challenge stunt bike video game released acorn electron bbc micro commodore 64 msx zx spectrum first released 1984 licensed british stunt performer eddie kidd player takes role eddie kidd must make series jumps like real kidd player must start jumping bmx oil barrels work jumping cars motorbike player starts riding away jump get big enough run must set correct speed correctly selecting gears hit ramp enough speed clear obstacles much miss landing ramp air player lean forward back land correctly game first released late 1984 zx spectrum published software communications martech label version ported msx 1985 similar version released bbc micro acorn electron modified version game much zoomed camera angle screen display released commodore 64 also 1985 game cassette came sticker numbered competition entry card could used win prizes including bmx bikes computers tvs game reissued budget price part mastertronic ricochet label 1987 crash gave game overall score 56 concluding good simulation game exciting particularly addictive difficulty curve criticised early bmx-based levels skipped described doddle skill mastered game holds challenge clare edgeley sinclair user agreed replay bmx section failing advanced jumps seems waste time gave similar score 6/10 computer video games gave scores 7/10 8/10 particularly praising zoomed graphics improved sound commodore 64 version calling superb outshining spectrum game miles
[]
Test
2,410
0
Automated_Similarity_Judgment_Program:automated similarity judgment program automated similarity judgment program asjp collaborative project applying computational approaches comparative linguistics using database word lists database open access consists 40-item basic-vocabulary lists well half world languages continuously expanded addition isolates languages demonstrated genealogical groups database includes pidgins creoles mixed languages constructed languages words database transcribed simplified standard orthography asjpcode database used estimate dates language families diverged daughter languages method related still different glottochronology determine homeland urheimat proto-language investigate sound symbolism evaluate different phylogenetic methods several purposes asjp originally developed means objectively evaluating similarity words meaning different languages ultimate goal classifying languages computationally based lexical similarities observed first asjp paper two semantically identical words compared languages judged similar showed least two identical sound segments similarity two languages calculated percentage total number words compared judged similar method applied 100-item word lists 250 languages language families including austroasiatic indo-european mayan muskogean asjp consortium founded around 2008 came involve around 25 professional linguists interested parties working volunteer transcribers and/or extending aid project ways main driving force behind founding consortium cecil h. brown søren wichmann daily curator project third central member consortium eric w. holman created software used project word lists used originally based 100-item swadesh list statistically determined subset 40 100 items produced good slightly better classificatory results whole list subsequently word lists gathered contain 40 items less attestations lacking papers published since 2008 asjp employed similarity judgment program based levenshtein distance ld approach found produce better classificatory results measured expert opinion method used initially ld defined minimum number successive changes necessary convert one word another change insertion deletion substitution symbol within levenshtein approach differences word length corrected dividing ld number symbols longer two compared words produces normalized ld ldn ldn divided ldnd two languages calculated dividing average ldn word pairs involving meaning average ldn word pairs involving different meanings second normalization intended correct chance similarity asjp uses following 40-word list similar swadesh–yakhontov list differences asjp version 2016 uses following symbols encode phonemes p b f v w 8 z c n r l z c j 5 k g x n q x h 7 l 4 g e e 3 u represent 7 vowels 34 consonants found standard qwerty keyboard
[]
Test
2,411
1
Serializability:serializability concurrency control databases transaction processing transaction management various transactional applications e.g. transactional memory software transactional memory centralized distributed transaction schedule serializable outcome e.g. resulting database state equal outcome transactions executed serially i.e without overlapping time transactions normally executed concurrently overlap since efficient way serializability major correctness criterion concurrent transactions executions considered highest level isolation transactions plays essential role concurrency control supported general purpose database systems strong strict two-phase locking ss2pl popular serializability mechanism utilized database systems various variants since early days 1970s serializability theory provides formal framework reason analyze serializability techniques though mathematical nature fundamentals informally without mathematics notation introduced serializability used keep data data item consistent state serializability property transaction schedule history relates isolation property database transaction schedules serializable likely generate erroneous outcomes well known examples transactions debit credit accounts money related schedules serializable total sum money may preserved money could disappear generated nowhere violations possibly needed invariant preservations caused one transaction writing stepping erasing written another transaction become permanent database happen serializability maintained specific order transactions requested application enforced independently underlying serializability mechanisms mechanisms typically indifferent specific order generate unpredictable partial order typically compatible multiple serial orders transactions partial order results scheduling orders concurrent transactions data access operations depend many factors major characteristic database transaction atomicity means either commits i.e. operations results take effect database aborts rolled-back operations results effect database nothing semantics transaction real systems transactions abort many reasons serializability sufficient correctness schedules also need possess recoverability abort property recoverability means committed transactions read data written aborted transactions whose effects exist resulting database states serializability currently compromised purpose many applications better performance cases application correctness harmed compromising recoverability would quickly violate database integrity well transactions results external database schedule recoverability property recoverable schedule recovers aborts i.e. aborts harm integrity committed transactions resulting database false without recoverability likely integrity violations resulting incorrect database data need special typically manual corrective actions database implementing recoverability general form may result cascading aborts aborting one transaction may result need abort second transaction third results waste already partially executed transactions may result also performance penalty avoiding cascading aborts aca cascadelessness special case recoverability exactly prevents phenomena often practice special case aca utilized strictness strictness allows efficient database recovery failure note recoverability property needed even database failure occurs database recovery failure needed rather needed correctly automatically handle aborts may unrelated database failure recovery failure many applications unlike finances absolute correctness needed example retrieving list products according specification cases matter much product whose data updated short time ago appear list even meets specification typically appear list tried short time later commercial databases provide concurrency control whole range isolation levels fact controlled serializability violations order achieve higher performance higher performance means better transaction execution rate shorter average transaction response time transaction duration snapshot isolation example popular widely utilized efficient relaxed serializability method many characteristics full serializability still short unfit many situations another common reason nowadays distributed serializability relaxation see requirement availability internet products services requirement typically answered large-scale data replication straightforward solution synchronizing replicas updates database object including updates single atomic distributed transaction however many replicas transaction large may span enough number several computers networks likely unavailable thus transaction likely end abort miss purpose consequently optimistic replication lazy replication often utilized e.g. many products services google amazon yahoo like serializability relaxed compromised eventual consistency case relaxation done applications expected harmed technique classes schedules defined relaxed serializability properties either contain serializability class incomparable mechanisms enforce serializability need execute real time almost real time transactions running high rates order meet requirement special cases serializability sufficient conditions serializability enforced effectively utilized two major types serializability exist view-serializability conflict-serializability view-serializability matches general definition serializability given conflict-serializability broad special case i.e. schedule conflict-serializable also view-serializable necessarily opposite conflict-serializability widely utilized easier determine covers substantial portion view-serializable schedules determining view-serializability schedule np-complete problem class problems difficult-to-compute excessively time-consuming known solutions operations upon data read write write either insert modify delete two operations conflicting different transactions upon datum data item least one write pair conflicting operations conflict type either read-write write-read write-write conflict transaction second operation pair said conflict transaction first operation general definition conflicting operations also complex operations may consist several simple read/write operations requires noncommutative changing order also changes combined result operation needs atomic using proper system support order considered operation commutativity check example read-read operations commutative unlike read-write possibilities thus read-read conflict another complex example operations increment decrement counter write operations modify counter need considered conflicting write-write conflict type since commutative thus increment-decrement conflict e.g. already supported old ibm ims fast path precedence time order pairs conflicting non-commutative operations important checking equivalence serial schedule since different schedules consisting transactions transformed one another changing orders different transactions operations different transactions interleaving since changing orders commutative operations non-conflicting change overall operation sequence result i.e. schedule outcome outcome preserved order change non-conflicting operations typically conflicting operations change order means schedule transformed serial schedule without changing orders conflicting operations changing orders non-conflicting preserving operation order inside transaction outcome schedules schedule conflict-serializable definition conflicts reason blocking transactions delays non-materialized conflicts aborting transactions due serializability violation prevention possibilities reduce performance thus reducing number conflicts e.g. commutativity possible way increase performance transaction issue/request conflicting operation conflict another transaction conflicting operation delayed executed e.g. blocked lock executed materialized conflicting operations relevant conflict serializability see schedule compliance conflict serializability tested precedence graph serializability graph serialization graph conflict graph committed transactions schedule directed graph representing precedence transactions schedule reflected precedence conflicting operations transactions following observation key characterization conflict serializability cycles committed transactions prevented aborting undecided neither committed aborted transaction cycle precedence graph transactions otherwise turn cycle committed transactions committed transaction aborted one transaction aborted per cycle required sufficient number break eliminate cycle aborts possible happen mechanisms unnecessary serializability probability cycle generation typically low nevertheless situation carefully handled typically considerable amount overhead since correctness involved transactions aborted due serializability violation prevention restarted executed immediately serializability-enforcing mechanisms typically maintain precedence graph data structure rather prevent break cycles implicitly e.g. ss2pl strong strict two-phase locking ss2pl common mechanism utilized database systems since early days 1970s ss name ss2pl newer though enforce conflict serializability strictness special case recoverability allows effective database recovery failure schedule mechanism datum locked transaction accessing read write operation item marked associated lock certain type depending operation performed specific transaction implementation various models different lock types exist models locks may change type transaction life result access another transaction may blocked typically upon conflict lock delays completely prevents conflict materialized reflected precedence graph blocking conflicting operation depending lock type transaction access operation type employing ss2pl mechanism means locks data behalf transaction released transaction ended either committed aborted ss2pl name resulting schedule property well also called rigorousness ss2pl special case proper subset two-phase locking 2pl mutual blocking transactions results deadlock execution transactions stalled completion reached thus deadlocks need resolved complete transactions execution release related computing resources deadlock reflection potential cycle precedence graph would occur without blocking conflicts materialized deadlock resolved aborting transaction involved potential cycle breaking cycle often detected using wait-for graph graph conflicts blocked locks materialized also defined graph non-materialized conflicts conflicts materialized reflected precedence graph affect serializability indicates transaction waiting release one locks transaction transactions cycle graph means deadlock aborting one transaction per cycle sufficient break cycle transactions aborted due deadlock resolution restarted executed immediately known mechanisms include conflict serializability techniques general form provide recoverability special enhancements needed adding recoverability concurrency control techniques three major types main differences technique types conflict types generated pessimistic method blocks transaction operation upon conflict generates non-materialized conflict optimistic method block generates materialized conflict semi-optimistic method generates conflict types conflict types generated chronological orders transaction operations invoked independently type conflict cycle committed transactions materialized conflicts precedence graph conflict graph represents serializability violation avoided maintaining serializability cycle non-materialized conflicts wait-for graph represents deadlock situation resolved breaking cycle cycle types result conflicts broken technique type conflicts detected considered similar overhead materialized non-materialized conflicts typically using mechanisms like locking either blocking locks blocking recording conflict materialized conflicts blocking method typically context switching occurs upon conflict additional incurred overhead otherwise blocked transactions related computing resources remain idle unutilized may worse alternative conflicts occur frequently optimistic methods typically advantage different transaction loads mixes transaction types one technique type i.e. either optimistic pessimistic may provide better performance unless schedule classes inherently blocking i.e. implemented without data-access operations blocking e.g. 2pl ss2pl sco see chart also implemented using optimistic techniques e.g. serializability recoverability multi-version concurrency control mvcc common way today increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object depending scheduling method mvcc combined serializability techniques listed except serializablesi originally mvcc-based utilized general-purpose dbms products mvcc especially popular nowadays relaxed serializability see method snapshot isolation si provides better performance known serializability mechanisms cost possible serializability violation certain cases serializablesi efficient enhancement si make serializable intended provide efficient serializable solution serializablesi analyzed via general theory mvcc distributed serializability serializability schedule transactional distributed system e.g. distributed database system system characterized distributed transactions also called global transactions i.e. transactions span computer processes process abstraction general sense depending computing environment e.g. operating system thread possibly network nodes distributed transaction comprises one several local sub-transactions states described database transaction local sub-transaction comprises single process processes typically fail together e.g. single processor core distributed transactions imply need atomic commit protocol reach consensus among local sub-transactions whether commit abort protocols vary simple one-phase handshake among processes fail together sophisticated protocols like two-phase commit handle complicated cases failure e.g. process node communication etc failure distributed serializability major goal distributed concurrency control correctness proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones need effective distributed serializability techniques ensure correctness among distributed applications seems increase distributed serializability achieved implementing distributed versions known centralized techniques typically distributed versions require utilizing conflict information either materialized non-materialized conflicts equivalently transaction precedence blocking information conflict serializability usually utilized generated locally rather different processes remote locations thus information distribution needed e.g. precedence relations lock information timestamps tickets distributed system relatively small scale message delays across system small centralized concurrency control methods used unchanged certain processes nodes system manage related algorithms however large-scale system e.g. grid cloud due distribution information substantial performance penalty typically incurred even distributed versions methods vs. centralized ones used primarily due computer communication latency also information distributed related techniques typically scale well well-known example respect scalability problems distributed lock manager distributes lock non-materialized conflict information across distributed system implement locking techniques
[ 5209, 3951, 5289, 5571, 740, 6739, 3801, 4159, 2411, 3041, 2054, 7115, 5956, 2961, 8132, 6315, 2359 ]
Test
2,412
5
AICCU:aiccu aiccu automatic ipv6 connectivity client utility popular cross-platform utility automatically configuring ipv6 tunnel free software available bsd license utility originally provided sixxs tunnel broker also used variety tunnel brokers aiccu written maintained jeroen massar various patches persons incorporated persons acknowledged field contributions aiccu successor windows-only linux/bsd-variety heartbeat tool provided sixxs solely use heartbeat protocol ayiya protocol came existence decided support new protocol would better merge windows unix trees one program give better appearance name heartbeat tool changed reflect providing mere support heartbeats aiccu award excellence implementation category 2004 edition ipv6 application contest following tunneling protocols currently supported aiccu primarily uses tic protocol retrieve configuration parameters tunnel automatically user wants configured aiccu finds available tunnel brokers looking txt dns records _aiccu.sixxs.net latter allows local network add tunnel broker adding records domains configured search path non-local tunnel brokers added requesting sixxs staff add entry global dns records following operating systems/platforms/distributions supported aiccu various distributions aiccu package included distribution main usage aiccu combination sixxs tunnel broker service isps implemented parts protocols aiccu support instance czech isp netbox uses aiccu configure tunnels automatically users providing tic tunnel information control protocol implementation ignores username/password/tunnel_id uses source address tic connection originates determine return tunnel configuration using tic protocol aiccu uses configure tunnel
[ 6489, 3915, 4759, 6879, 5571, 578, 4441, 1435 ]
Train
2,413
9
Toi_(programming_language):toi programming language toi imperative type-sensitive language provides basic functionality programming language language designed developed ground-up paul longtine written c toi created intent educational experience serves learning tool toy hence name looking familiarize inner-workings programming language 0 void null data runtime context keeps track individual threads metadata context gives definition 'environment code executed key part operational computer language notion 'namespace notion 'namespace refers ability declare name along needed metadata call upon name retrieve values associated name definition namespace provide following key mechanisms scope argument single byte format follows scopes handled referencing either global scope local scope local scope denoted 0 scope argument referring names scope initialized evaluating new block code different block code called new scope added new namespace level namespace levels act context switches within function contexts example local namespace must 'returned local namespace context needs preserved return pushing 'namespace levels ensures every n function calls traverse n instances previous namespaces example take namespace level graphic level namespace instance function called another namespace level created local level increases like global scope names lsb == 1 scope argument persistent runtime handle function definitions objects names declared global scope local level references scope argument 0 refer accessing names namespace argument refers namespace variable exists namespace argument equals 0 current namespace referenced global namespace 1 default namespaces must declared using variables definition provide following mechanisms given variable v v defines following attributes variable handled generic container previous section notion namespace levels introduced much like names scoped generic variable containers must communicate scope terms location within given set scopes called 'ownership given runtime variable containers exist following structures stack instance bytecode arguments namespaces concept ownership differentiates variables existing one structures set place prevent accidental deallocation variable containers copied instead passed references structures functions virtual machine pointer set instructions program metadata parameters defined paradigm objects units encapsulate separate namespace collection methods bytecode arranged following order opcode single byte denoting subroutine call following arguments executed different opcodes different argument lengths 0 arguments others 3 arguments bytecode instruction single-byte opcode followed maximum 3 arguments following forms specification instructions short description instruction instruction category keywords 1 stack manipulation 2 variable management 3 type management types air moment 'll detail types time comes 4 binary ops ops take two top elements stack perform operation push result stack 5 conditional expressions things comparison forth behaves like arithmetic instructions besides instruction pushes boolean tos 6 loops 7 code flow instructions dictate code flow 8 generic object interface expects object tos f functions/classes 0 special bytes going code bytecode section first abstract notation code broken binary tree node argument parent node next instruction instruction nodes nodes produce instruction multiple based bytecode interpretation instruction example line code would translate functions expressed individual binary trees root file treated individual binary tree also function various instruction nodes follows various instruction nodes within tree call specific functions take arguments specified lookahead lookbehind formulate correct bytecode equivalent developer language paul longtine operates publicly available website blog called banna.tech named online alias 'banna
[ 1361, 3931, 263 ]
Test
2,414
7
OpSource:opsource opsource inc. cloud managed services hosting company headquartered santa clara california company also offices ashburn virginia ireland india data centers california virginia united kingdom opsource part ict company dimension data acquired opsource 2011 cloud business unit 2002 michael piacente dan rasmussen john rowell treb ryan founded opsource sunnyvale california company initially began provide application support microsoft hotmail product customers 2005 term software service saas becoming popular opsource began focus saas helping isvs focus software development marketing sales part product opsource created saas enablement product helped isvs adobe business objects bmc take product market created saas incubation program small businesses 2006 opsource launched annual saas summit conference held san francisco area since 2010 event renamed cloud presented conjunction software information industry association 2009 opsource released cloud computing service bills utility computing basis opsource received 56.5m funding artiman ventures crosslink capital intel capital key venture partners ntt nippon telegraph telephone corporation velocity mark spagnolo past ceo uunet flag telecom universal access metromedia fiber network chairman board opsource acquired dublin ireland based lecayla technologies 2008 founded 2004 lecayla technologies metering billing services allowed isvs offer software applications utility perpetual licensing hybrid pricing basis june 30 2011 opsource inc. acquired dimension data holdings named steve nola ceo dimension data cloud solutions new division included opsource opsource two main products managed hosting cloud computing managed hosting dedicated hosting service support multiple applications operating systems databases originally called optimal on-demand services designed support software service market opsource offers 100 uptime guarantee customers host applications managed hosting product cloud computing delivered infrastructure service offering cloud computing customers physical infrastructure instead avoiding capital expenditure renting usage third-party provider consume resources service pay resources use utility computing model paying services consumed opsource cloud offers 100 network uptime 1ms intra network latency guarantee opsource cloud product competes similar offerings rackspace amazon ibm service levels receive support via usual means e-mail telephone ticket systems designed fit needs different businesses 2010 always demand top 100 category winner br 2010 top 20 coolest cloud vendors
[ 2961, 4800, 2700, 3288, 330 ]
Validation
2,415
8
KHTML:khtml khtml browser engine developed kde project engine used konqueror web browser although seen significant development since 2016 still actively maintained engines descended khtml used world widely used browsers among google chrome safari opera vivaldi microsoft edge switch chromium distributed terms gnu lesser general public license khtml free software built kparts framework written c++ khtml relatively good support web standards render many pages possible extra abilities quirks internet explorer also supported even though non-standard khtml preceded earlier engine called khtmlw kde html widget developed torben weis martin jones implemented support html 3.2 http 1.0 html frames w3c dom css scripting khtml came existence november 4 1998 copy khtmlw library slight refactoring addition unicode support changes support move qt 2 waldo bastian among work creating early version khtml real work khtml actually started may october 1999 realization choice facing project either significant effort move khtml forward use mozilla adding support scripting highest priority may 1999 lars knoll began research eye toward implementing w3c dom specification finally announcing august 16 1999 checked amounted complete rewrite khtml library — changing khtml use standard w3c dom internal document representation turn allowed beginnings javascript support added october 1999 integration harri porten kjs following shortly afterwards closing months 1999 first months 2000 knoll work antti koivisto dirk mueller add css support refine stabilize khtml architecture work completed march 2000 among things changes enabled khtml become second browser internet explorer correctly support hebrew arabic languages written right-to-left — mozilla support kde 2.0 first kde release october 23 2000 include khtml rendering engine new konqueror file web browser replaced monolithic kde file manager ksvg first developed 2001 nikolas zimmermann rob buis however 2003 decided fork then-current ksvg implementation two new projects kdom/ksvg2 improve state dom rendering khtml underneath formidable svg 1.0 render state kcanvas abstract rendering done within khtml/ksvg2 single shared library multiple backends e.g. cairo/qt etc. ksvg2 also part webkit following standards supported khtml engine khtml kjs adopted apple 2002 use safari web browser apple publishes source code fork khtml engine called webkit 2013 google began development fork webkit called blink
[ 2812, 2451, 5984, 5017, 5549, 4685, 6011, 313, 3383, 2415, 4891, 3043, 7850, 5162, 1496, 6221, 3057, 5174, 3584, 2706, 4461 ]
Validation
2,416
9
Phyllis_Fox:phyllis fox phyllis ann fox american mathematician computer scientist fox raised colorado undergraduate studies wellesley college earning b.a mathematics 1944 1944 1946 worked general electric operator differential analyser project earned second baccalaureate b.s electrical engineering university colorado 1948 moved graduate studies massachusetts institute technology earning m.s 1949 electrical engineering doctorate sc.d mathematics 1954 supervision chia-chiao lin time also worked assistant whirlwind project mit jay forrester 1954 1958 fox worked numerical solution partial differential equations univac computing center united states atomic energy commission courant institute mathematical sciences new york university 1958 following husband returned forester system dynamics research group mit became part team wrote dynamo programming language became collaborator first lisp interpreter principal author first lisp manual 1963 moved mit newark college engineering became full professor 1972 time also consulted bell labs moved 1973 work highly portable numerics library port retired bell labs 1984
[ 7878, 1445, 1820, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 1557, 218, 1478, 5494, 4704, 3880, 4609, 6116, 3212, 5501, 6210, 1116, 144, 6471, 7481, 2144, 2600, 7852, 7298, 5515, 8025, 5077, 7032, 4543, 1889, 2156, 3749, ...
Test
2,417
2
Android_Ice_Cream_Sandwich:android ice cream sandwich android ice cream sandwich ninth version android mobile operating system developed google unveiled october 19 2011 android 4.0 builds upon significant changes made tablet-only release android honeycomb effort create unified platform smartphones tablets android 4.0 focused simplifying modernizing overall android experience around new set human interface guidelines part efforts introduced new visual appearance codenamed holo built around cleaner minimalist design new default typeface named roboto also introduced number new features including refreshed home screen near-field communication nfc support ability beam content another user using technology updated web browser new contacts manager social network integration ability access camera control music playback lock screen visual voicemail support face recognition device unlocking face unlock ability monitor limit mobile data usage internal improvements android 4.0 received positive reviews critics praised cleaner revamped appearance operating system comparison previous versions along improved performance functionality however critics still felt android 4.0 stock apps still lacking quality functionality comparison third-party equivalents regarded operating system new features particularly face unlock feature gimmicks statistics issued google indicate 0.3 android devices accessing google play run ice cream sandwich following tablet-only release honeycomb announced google i/o 2011 next version android code named ice cream sandwich ics would emphasized providing unified user experience smartphones tablets june 2011 details also began surface surrounding new nexus phone samsung accompany ics would notably exclude hardware navigation keys android blog rootzwiki released photos august 2011 showing nexus running build ics depicting new application menu layout resembling honeycomb new interface blue-colored accenting official launch event android 4.0 new nexus phone originally scheduled october 11 2011 ctia trade show san diego however respect death apple co-founder steve jobs google samsung postponed event october 19 2011 hong kong android 4.0 launch device galaxy nexus officially unveiled october 19 2011 andy rubin explained 4.0 intended provide enticing intuitive user experience across smartphones tablets matias duarte google vice president design explained development ice cream sandwich based around question soul new machine user studies concluded existing android interface complicated thus prevented users empowered devices overall visual appearance android streamlined ice cream sandwich building upon changes made tablet-oriented android 3.0 first project google duarte admitted team cut back support smaller screens honeycomb prioritize sufficient tablet support wanted android oems stop silly things like taking phone ui stretching 10-inch tablet judging android major competitors duarte felt interface ios skeuomorphic kitschy windows phone metro design language looked much like airport lavatory signage operating systems tried hard enforce conformity without leaving room content express ice cream sandwich team aimed provide interface design guidelines would evoke modern appearance still allowing flexibility application developers characterized revised look ice cream sandwich toned geeky nerd quotient comparison honeycomb carried futuristic appearance compared critics aesthetics tron january 2012 following official launch ice cream sandwich duarte google launched android design portal features human interface guidelines best practices resources developers building android apps designed ice cream sandwich galaxy nexus first android device ship android 4.0 android 4.0.3 released december 16 2011 providing bug fixes new social stream api internal improvements day google began rollout ice cream sandwich predecessor galaxy nexus nexus s. however december 20 2011 nexus roll-out paused company could monitor feedback related update march 29 2012 android 4.0.4 released promising performance improvements camera screen rotation bug fixes google play services support 4.0 ended february 2019 user interface android4.0 represents evolution design introduced honeycomb although futuristic aesthetics honeycomb scaled back favor flatter cleaner feel neon blue accenting hard edges drop shadows depth ice cream sandwich also introduces new default system font roboto designed in-house replace droid font family roboto primarily optimized use high-resolution mobile displays new visual appearance ice cream sandwich implemented widget toolkit known holo ensure access holo style across devices—even use customized interface skin elsewhere android devices certified ship google play store formerly android market must provide capability apps use unmodified holo theme honeycomb devices render navigation buttons— back home recent apps —on system bar across bottom screen removing need physical equivalents menu button present previous generations android devices deprecated favor presenting buttons actions within apps action bars menu items fit bar action overflow menus designated three vertical dots hardware search buttons also deprecated favor search buttons within action bars devices without menu key temporary menu key displayed on-screen running apps coded support new navigation scheme devices use hardware menu key action overflow buttons hidden apps mapped menu key default home screen ice cream sandwich displays persistent google search bar across top screen dock across bottom containing app drawer button middle four slots app shortcuts alongside folders apps formed dragging app hovering another app drawer split two tabs one apps latter holding widgets placed home screen pages widgets resizable contain scrolling content android4.0 contains increased use swiping gestures apps notifications removed recent apps menu dismissed notifications area sliding away number stock google apps use new form tabs users navigate different panes either tapping name strip swiping left right phone app updated holo design ability send pre-configured text message responses response incoming calls visual voicemail integration within call log display web browser app incorporates updated versions webkit v8 supports syncing google chrome override mode loading desktop-oriented version website rather mobile-oriented version well offline browsing contacts section phone app split new people app offers integration social networks google+ display recent posts synchronize contacts profile device user camera app redesigned reduction shutter lag face detection new panorama mode ability take still photos video recorded camcorder mode photo gallery app contains basic photo editing tools lock screen supports face unlock includes shortcut launching camera app house playback controls music players keyboard incorporates improved autocomplete algorithms improvements voice input allow continuous dictation ability take screenshots holding power volume buttons together also added devices supporting near-field communication nfc android beam allows users share links content compatible apps holding back device back another nfc-equipped android device tapping screen prompted certain system apps particularly pre-loaded carriers uninstalled disabled hides application prevents launching application removed storage android4.0 introduced features managing data usage mobile networks users display total amount data used period time display data usage per-app background data usage disabled globally per-app basis cap set automatically disable data usage reaches certain quota calculated device android 4.0 inherits platform additions honeycomb also adds support ambient temperature humidity sensors bluetooth health device profile near-field communication nfc wi-fi direct operating system also provides improved support stylus mouse input along new accessibility calendar keychain spell checking social networking virtual private network apis multimedia support android4.0 also adds support adts aac matroska containers vorbis vp8 webp streaming vp8 openmax al http live streaming 3.0 android4.0 released positive reception ars technica praised holo user interface sense identity visual coherence previously lacking comparison previous versions android also believing new interface style could help improve quality third-party apps stock apps android4.0 also praised slightly better functionality comparison previous versions features noted improvements text voice input along data usage controls especially given increasing use metered data plans overall performance improvements comparison gingerbread however face unlock feature panned insecure gimmick although providing improved experience previous version stock applications email client panned still inferior third-party alternatives engadget also acknowledged maturing quality android experience ice cream sandwich praised modern feel new interface comparison android 2.3 along new features provided google stock apps operating system conclusion engadget felt android4.0 gorgeous os offers great performance and—for part—does n't feel like half-baked effort however engadget still felt android4.0 new features face unlock beta feel noted lack facebook integration new people app operating system still intuitive new users competitors pc magazine acknowledged influence windows phone 7 new people app improved benchmark performance web browser considered android beam face unlock gimmicks criticized lack support certain apps adobe flash launch
[ 3933, 5372, 6427, 1095, 740, 4340, 42, 3309, 3310, 7924, 2591, 5771, 5775, 4014, 6153, 7956, 1522, 5455, 6176, 5473, 474, 6183, 822, 831, 5141, 136, 2317, 2673, 6209, 1581, 1582, 2683, 855, 6937, 1599, 168, 6232, 6950, 2712, 4116, 5195,...
Test
2,418
2
XCOFF:xcoff xcoff extended coff improved expanded version coff object file format defined ibm used aix early versions powerpc macintosh also supported xcoff beos xcoff additions include use csects provide subsection granularity cross-references use stabs debugging information handling shared libraries also elaborate plain coff recently ibm defined xcoff64 version supporting 64-bit aix used xcoff32 mean original file format
[ 7096, 1339, 5606, 4662, 4843, 1894, 1989, 3870, 2403, 2357, 2084 ]
Validation
2,419
4
Alexander_Petrov_(hacker):alexander petrov hacker alexander petrov two men responsible ddos hire extortion multinational law enforcement group british american russian private individuals law enforcement agents captured alexander petrov two accomplices ivan maksakov denis stepanov three heading extortion ring extorting money various online services e.g banks internet casinos web based businesses reportedly damages caused ring millions dollars range october 8 2007 petrov maksakov stenanov found guilty sentenced eight years prison russian federation 100,000 ruble penalty
[]
Test
2,420
9
Runtime_system:runtime system runtime system also called run-time system runtime environment run-time environment primarily implements portions execution model confused runtime lifecycle phase program runtime system operation languages form runtime system provides environment programs run environment may address number issues including layout application memory program accesses variables mechanisms passing parameters procedures interfacing operating system otherwise compiler makes assumptions depending specific runtime system generate correct code typically runtime system responsibility setting managing stack heap may include features garbage collection threads dynamic features built language every programming language specifies execution model many implement least part model runtime system one possible definition runtime system behavior among others behavior directly attributable program definition includes part runtime system things putting parameters onto stack function call behavior disk i/o parallel execution related behaviors definition essentially every language runtime system including compiled languages interpreted languages embedded domain-specific languages even api invoked stand alone execution models pthreads runtime system implementation execution model behavior scholarly papers runtime systems focus implementation details parallel runtime systems notable example parallel runtime system cilk popular parallel programming model addition proto-runtime toolkit created simplify creation parallel runtime systems addition execution model behavior runtime system may also perform support services type checking debugging code generation optimization runtime system also gateway running program interacts runtime environment contains state values accessible program execution also active entities interacted program execution like disk drives people via keyboards example environment variables features many operating systems part runtime environment running program access via runtime system likewise hardware devices dvd drive active entities program interact via runtime system unique application runtime environment rte within operating system os allows rte run meaning boot power-down entire os dedicated application running within rte code tries run failures application break rte breaks os stops processing requires re-boot boot read-only memory extremely secure simple single-mission system created simple example basic runtime system runtime system c language particular set instructions inserted executable image compiler among things instructions manage processor stack create space local variables copy function-call parameters onto top stack often clear criteria deciding language behavior considered inside runtime system versus behavior part source program c setup stack part runtime system opposed part semantics individual program maintains global invariant holds executions systematic behavior implements execution model language opposed implementing semantics particular program text directly translated code computes results one way observe separation semantics particular program runtime environment compile program object file containing functions versus compiling entire program executable binary object file contain assembly code relevant functions executable binary contain additional code used implement runtime environment object file one hand may missing information runtime environment resolved linking hand code object file still depends assumptions runtime system example function may read parameters particular register stack location depending calling convention used runtime environment another example case using application programming interface api interact runtime system calls api look calls regular software library however point call execution model changes runtime system implements execution model different language library written terms person reading code normal library would able understand library behavior knowing language library written however person reading code api invokes runtime system would able understand behavior api call knowing language call written point via mechanism execution model stops language call written switches execution model implemented runtime system example trap instruction one method switching execution models difference distinguishes api-invoked execution model posix threads usual software library posix threads calls software library calls invoked via api posix threads behavior understood terms language call rather posix threads calls bring play outside execution model implemented posix threads runtime system runtime system often os kernel extreme example physical cpu viewed implementation runtime system specific assembly language view execution model implemented physical cpu memory systems analogy runtime systems higher-level languages implemented using languages creates hierarchy runtime systems cpu itself—or actually logic microcode layer below—acting lowest-level runtime system compiled interpreted languages provide interface allows application code interact directly runtime system example codice_1 class java language class allows code animated one thread things start stop threads normally core aspects language behavior task scheduling resource management accessible fashion higher-level behaviors implemented runtime system may include tasks drawing text screen making internet connection often case operating systems provide kinds behaviors well available runtime system implemented abstraction layer translates invocation runtime system invocation operating system hides complexity variations services offered different operating systems also implies os kernel viewed runtime system set os calls invoke os behaviors may viewed interactions runtime system limit runtime system may provide services p-code machine virtual machine hide even processor instruction set approach followed many interpreted languages awk languages like java meant compiled machine-independent intermediate representation code bytecode arrangement simplifies task language implementation adaptation different machines improves efficiency sophisticated language features reflection also allows program executed machine without explicit recompiling step feature become important since proliferation world wide web speed execution runtime systems feature just-in-time compilation machine code modern aspect runtime systems parallel execution behaviors behaviors exhibited mutex constructs pthreads parallel section constructs openmp runtime system parallel execution behaviors may modularized according proto-runtime approach notable early examples runtime systems interpreters basic lisp environments also included garbage collector forth early example language designed compiled intermediate representation code runtime system virtual machine interpreted code another popular theoretical example donald knuth mix computer c later languages supported dynamic memory allocation runtime system also included library managed program memory pool object-oriented programming languages runtime system often also responsible dynamic type checking resolving method references
[ 361, 5012, 4662, 2549, 6796, 16, 3623, 7176, 5401, 36, 1854, 5757, 5409, 2592, 5771, 1128, 5082, 1889, 5784, 84, 4745, 3005, 6181, 1181, 5480, 4786, 505, 6210, 150, 6567, 861, 1990, 1992, 5190, 6960, 1616, 4469, 3772, 6982, 4136, 5218, ...
Test
2,421
1
Kaii-Yōkai_Denshō_Database:kaii-yōkai denshō database database yōkai mystery stories collected japanese folklore database published international research center japanese studies prototype created march 19 2002 first live version released june 20 2002. project supervisor kazuhiko komatsu japanese folklorist professor study yōkai database includes verbal information without visual information data collected item database abstract around 100 characters full text searchable database searched name region item found
[]
Test
2,422
9
Java_Mobile_Media_API:java mobile media api mobile media api mmapi api specification java platform cdc cldc devices mobile phones depending implemented apis allow applications play record sounds video capture still images mmapi developed java community process jsr 135 multimedia java api based around four main types classes codice_1 package—the codice_2 codice_3 codice_4 various types codice_5 java programmers wishing use jsr 135 would first make use static methods codice_2 class although methods codice_7 main method used codice_8 takes either uri mime type cases uris used common uri protocols used include mime type optional inferred data passed supplied codice_8 method returns implementation codice_3 interface even use capture protocol uri core methods applicable players starting stopping media requesting loop also codice_11 object implementing codice_4 interface receive various events related clip starting stopping media finishing etc codice_3 classes also codice_14 method returns implementation particular codice_5 codice_5 handles optional apis applicable media types given codice_3 may may able supply implementation given codice_5 set controls implemented codice_3 limited however standard ones defined codice_22 package jsr others may defined jsr 234 advanced multimedia supplements subset jsr 135 defined jsr 118 midp 2.0 regardless protocol media type involved codice_3 moves discrete states lifecycle states listed table java specifications implementations differ despite best efforts specification authors ensure consistency two obvious areas differences controls supported acceptable uri types first place obscure areas whether mixing supported many games would like play midi music track layer pcm sound effects top another source extreme variance performance example http clip requested point clip get downloaded specification recognises providing two codice_3 methods called advance actually playing codice_25 codice_26 depending implementation may work getting clip playable state thus making quicker actually play clip needed implementations sophisticated enough actually stream clip request whilst played symbian os contains complete implementation jsr 135 even highly dependent underlying multimedia capabilities device device manufacturers may choose expose obscure parts java recording implementation consistency ensured forcing implementations pass java technology compatibility kit tck ensures supported uri schema mime type control tested test every permutation optional parts
[ 4970, 6510, 2520, 484, 6280, 1803 ]
Test
2,423
4
Brewer_and_Nash_model:brewer nash model brewer nash model constructed provide information security access controls change dynamically security model also known chinese wall model designed provide controls mitigate conflict interest commercial organizations built upon information flow model brewer nash model information flow subjects objects way would create conflict interest
[ 2557, 4304 ]
Validation
2,424
4
Trust_boundary:trust boundary trust boundary term computer science security used describe boundary program data execution changes level trust term refers distinct boundary within system trusts sub-systems including data example execution trust boundary would application attains increased privilege level root data trust boundary point data comes untrusted source example user input network socket trust boundary violation refers vulnerability computer software trusts data validated crossing boundary
[ 3932, 1584, 5449, 1805 ]
Validation
2,425
3
Microarchitecture_simulation:microarchitecture simulation microarchitecture simulation important technique computer architecture research computer science education tool modeling design behavior microprocessor components alu cache memory control unit data path among others simulation allows researchers explore design space well evaluate performance efficiency novel microarchitecture features example several microarchitecture components branch predictors re-order buffer trace cache went numerous simulation cycles become common components contemporary microprocessors today addition simulation also enables educators teach computer organization architecture courses hand-on experiences system-level simulation computer hardware please refer full system simulation microarchitecture simulation classified multiple categories according input types level details specifically input trace collected execution program real microprocessor called trace-driven simulation program called execution-driven simulation trace-driven simulation reads fixed sequence trace records file input trace records usually represent memory references branch outcomes specific machine instructions among others trace-driven simulation known comparatively fast results highly reproducible also requires large storage space hand execution-driven simulation reads program simulates execution machine instructions fly program file typically several magnitudes smaller trace file however execution-driven simulation much slower trace-driven simulation process instruction one-by-one update statuses microarchitecture components involved thus selection input types simulation trade-off space time particular detailed trace highly accurate simulation requires large storage space whereas accurate execution-driven simulation takes long time execute instructions program apart input types level details also used classify simulation particular piece software simulates microprocessor executing program cycle-by-cycle basis known cycle-accurate simulator whereas instruction set simulator models execution program microprocessor eyes instruction scheduler along coarse timing instruction execution computer science classes computer architecture hand-on experiences adopt instruction set simulators tools teaching whereas cycle-accurate simulators deployed mostly research projects due complexities resource consumption microarchitecture simulators deployed variety purposes allows researchers evaluate ideas without need fabricate real microprocessor chip expensive time consuming instance simulating microprocessor thousand cores along multiple levels cache memory incurs little cost comparing fabrication prototyping chip researchers also play several configurations cache hierarchy using different cache models simulator instead fabricate new chip every time want test something different another usage microarchitecture simulator education given course computer architecture teaches students many different microprocessor features architectures microarchitecture simulator ideal modeling experimenting different features architectures course semester example students may start microarchitecture simulator models simple microprocessor design beginning semester semester progresses additional features instruction pipelining register renaming reservation stations out-of-order execution scoreboarding modeled added simulator introduced classroom microarchitecture simulator provides flexibility reconfiguration testing minimal costs
[ 1568, 1713, 5339, 5737, 6922, 4847, 3156, 7499, 7507 ]
Test
2,426
6
Linux_Unified_Key_Setup:linux unified key setup linux unified key setup luks disk encryption specification created clemens fruhwirth 2004 originally intended linux disk encryption software implements different incompatible undocumented formats luks implements platform-independent standard on-disk format use various tools facilitates compatibility interoperability among different programs also assures implement password management secure documented manner reference implementation luks operates linux based enhanced version cryptsetup using dm-crypt disk encryption backend microsoft windows luks-encrypted disks used defunct librecrypt formerly doxbox luks designed conform tks1 secure key setup scheme
[ 5540, 5453, 5803, 3350, 5808, 3174, 1535, 2728, 1260, 6892, 7528, 1176, 2559, 6725, 2399, 578, 6736, 6025, 6458, 7555, 6117, 3559, 5773, 2426, 1227, 4990, 5440, 2529, 4014 ]
Test
2,427
4
Cyberweapon:cyberweapon cyberweapon malware agent employed military paramilitary intelligence objectives requirements term vary widely common criteria seem malware agent part distinction malware agent sponsored —that commissioned developed and/or actually used—not black-hat hacker organized criminal group instead state non-state actor latter potentially including terrorist groups entities proposed fourth-generation warfare 4gw doctrines cyberweapon performs action would normally require soldier spy would considered either illegal act war performed directly human agent sponsor peacetime legal issues include violating privacy target sovereignty host nation actions include limited cyberweapon almost certainly results either direct indirect financial damages target group direct financial gains sponsor transfer funds primary objective class agent unlike malware used script kiddies organize botnets ownership physical location normal role machines attacked largely irrelevant cyberweapons show high selectivity either employment operation attack cyberweapons usually identify target using different methods likewise malware employed fraudsters theft personal financial information demonstrates lower selectivity wider distribution note self-replication requirement cyberweapons viruses viruses necessarily cyberweapons without capability however alternate vector required get agent onto target system likewise compromised access alone provided rootkit diagnostic employment cyberweapon term frequently used press articles avoid instead using terms like internet weapon virus mainstream researchers debate requirements term still referring employment agent weapon software development community particular uses term rarely following malware agents generally meet criteria formally referred manner industry security experts described way government military statements 2017 data breaches showed supposedly secure hacking tools used government agencies obtained − sometimes exposed − third parties furthermore reported losing control tools government appears leave exploits open re-used scammers criminals anyone else − purpose claudio guarnieri technologist amnesty international states learn disclosures leaks last months unknown vulnerabilities maintained secret even 've clearly lost plain irresponsible unacceptable also year wikileaks released vault 7 documents series contain details cia exploits tools julian assange stating working disarm publication disarmament cyber weapons may come form contacting respective software vendors information vulnerabilities products well potential help autonomous development open source software patches
[ 6526, 860, 1886, 4025, 5401, 2791, 208, 3393, 6823, 2190, 6589, 6756, 2693 ]
Test
2,428
2
TurboDOS:turbodos turbodos multi user cp/m like operating system z80 8086 cpus developed software 2000 inc released around 1982 s100 bus based systems northstar horizon commercial systems line multiprocessor systems including csi-50 csi-75 sci-100 csi-150 multiprocessor nature turbodos unusual feature unlike operating systems time networking processors either afterthought support file transfer protocol turbodos designed ground multiprocessor operating system modular construction operating system generation based relocating linking loader program makes incorporation different hardware driver modules quite easy particularly bus-oriented machines ieee-696 s-100 bus commonly used turbodos systems turbodos highly modular consisting forty separate functional modules distributed relocatable form modules building blocks combine various ways produce family compatible operating systems section describes modules detail describes combine various configurations possible turbodos configurations include numerous subtle variations possible categories architecture turbodos viewed three-level hierarchy highest level hierarchy process level turbodos support many concurrent processes level intermediate level hierarchy kernel level kernel supports 93 c-functions t-functions controls sharing computer resources processor time memory peripheral devices disk files processes make requests kernel entrypoint module osntry decodes c-function t-function number invokes appropriate kernel module c functions include cp/m bdos functions selected mp/m functions lowest level hierarchy driver level contains device-dependent drivers necessary interface turbodos particular hardware used drivers must provided peripherals including console printers disks communications channels network interface drivers also required real-time clock periodic interrupt source bank-switched memory applicable turbodos designed interface almost kind peripheral hardware operates efficiently interrupt-driven dma-type interfaces also work fine using polled programmed-i/o devices turbodos loader osload.com program containing abbreviated version kernel drivers purpose load full turbodos operating system disk file osserver.sys memory system cold-start functional modules distributed relocatable format .rel gen command specialized linker builds executable version system turbodos resident commands commands executable files standard commands
[ 1522, 7325, 7605, 280, 2818, 4759, 190, 4670, 5021, 8066, 4397, 13, 8167, 5644, 3271, 5116, 6984, 299, 3626, 7142, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 1992, 405, 6367, 6922, 8115, 5161, 5865, 7396, 65, 861, 5962, 5783, ...
Test
2,429
1
Tokyo_Cabinet_and_Kyoto_Cabinet:tokyo cabinet kyoto cabinet tokyo cabinet kyoto cabinet two libraries routines managing key-value databases tokyo cabinet sponsored japanese social networking site mixi multithreaded embedded database manager announced authors modern implementation dbm kyoto cabinet designated successor tokyo cabinet tokyo cabinet features on-disk b+ trees hash tables key-value storage support transactions
[ 3863, 1989, 7182, 3244, 2097, 3873, 1105 ]
Test
2,430
5
BitTorrent:bittorrent bittorrent abbreviated bt communication protocol peer-to-peer file sharing p2p used distribute data electronic files internet bittorrent one common protocols transferring large files digital video files containing tv shows video clips digital audio files containing songs peer-to-peer networks estimated collectively account approximately 43 70 internet traffic depending location february 2013 bittorrent responsible 3.35 worldwide bandwidth half 6 total bandwidth dedicated file sharing send receive files person uses bittorrent client internet-connected computer bittorrent client computer program implements bittorrent protocol popular clients include μtorrent xunlei transmission qbittorrent vuze deluge bitcomet tixati bittorrent trackers provide list files available transfer allow client find peer users known seeds may transfer files programmer bram cohen former university buffalo student designed protocol april 2001 released first available version 2 july 2001 recent version 2013 bittorrent clients available variety computing platforms operating systems including official client released bittorrent inc. bittorrent 15–27 million concurrent users time bittorrent utilized 150 million active users based figure total number monthly bittorrent users may estimated quarter billion bittorrent protocol used reduce server network impact distributing large files rather downloading file single source server bittorrent protocol allows users join swarm hosts upload to/download simultaneously protocol alternative older single source multiple mirror sources technique distributing data work effectively networks lower bandwidth using bittorrent protocol several basic computers home computers replace large servers efficiently distributing files many recipients lower bandwidth usage also helps prevent large spikes internet traffic given area keeping internet speeds higher users general regardless whether use bittorrent protocol first release bittorrent client search engine peer exchange users wanted upload file create small torrent descriptor file would upload torrent index site first uploader acted seed downloaders would initially connect peers see diagram right wish download file would download torrent client would use connect tracker list ip addresses seeds peers swarm peer completed download complete file could turn function seed file distributed divided segments called pieces peer receives new piece file becomes source piece peers relieving original seed send piece every computer user wishing copy bittorrent task distributing file shared want entirely possible seed send single copy file eventually distribute unlimited number peers piece protected cryptographic hash contained torrent descriptor ensures modification piece reliably detected thus prevents accidental malicious modifications pieces received nodes node starts authentic copy torrent descriptor verify authenticity entire file receives pieces typically downloaded non-sequentially rearranged correct order bittorrent client monitors pieces needs pieces upload peers pieces size throughout single download example 10 mb file may transmitted ten 1 mb pieces forty 256 kb pieces due nature approach download file halted time resumed later date without loss previously downloaded information turn makes bittorrent particularly useful transfer larger files also enables client seek readily available pieces download immediately rather halting download waiting next possibly unavailable piece line typically reduces overall time download eventual transition peers seeders determines overall health file determined number times file available complete form distributed nature bittorrent lead flood-like spreading file throughout many peer computer nodes peers join swarm likelihood successful download particular node increases relative traditional internet distribution schemes permits significant reduction original distributor hardware bandwidth resource costs distributed downloading protocols general provide redundancy system problems reduce dependence original distributor provide sources file generally transient therefore single point failure one way server-client transfers bittorrent client capable preparing requesting transmitting type computer file network using protocol 2005 way share files creating small text file called torrent files contain metadata files shared trackers keep track seeds peers users want download file first obtain torrent file connect tracker seeds 2005 first vuze bittorrent client introduced distributed tracking using distributed hash tables allowed clients exchange data swarms directly without need torrent file 2006 peer exchange functionality added allowing clients add peers based data found connected nodes though ultimately transfer files network bittorrent download differs one way server-client download typical http ftp request example several fundamental ways taken together differences allow bittorrent achieve much lower cost content provider much higher redundancy much greater resistance abuse flash crowds regular server software however protection theoretically comes cost downloads take time rise full speed may take time enough peer connections established may take time node receive sufficient data become effective uploader contrasts regular downloads http server example vulnerable overload abuse rise full speed quickly maintain speed throughout beginning bittorrent non-contiguous download methods made harder support streaming playback however recently clients offering streaming options bittorrent protocol provides way index torrent files result comparatively small number websites hosted large majority torrents many linking copyrighted works without authorization copyright holders rendering sites especially vulnerable lawsuits bittorrent index list .torrent files typically includes descriptions information torrent content several types websites support discovery distribution data bittorrent network public torrent-hosting sites pirate bay allow users search download collection torrent files users typically also upload torrent files content wish distribute often sites also run bittorrent trackers hosted torrent files two functions mutually dependent torrent file could hosted one site tracked another unrelated site private host/tracker sites operate like public ones except may restrict access registered users may also keep track amount data user uploads downloads attempt reduce leeching web search engines allow discovery torrent files hosted tracked sites examples include pirate bay torrentz isohunt btdigg sites allow user ask content meeting specific criteria containing given word phrase retrieve list links torrent files matching criteria list often sorted respect several criteria relevance seeders-leechers ratio one popular useful due way protocol behaves download bandwidth achievable sensitive value metasearch engines allow one search several bittorrent indices search engines dht search engines monitors dht network indexes torrents via metadata exchange peers tribler bittorrent client among first incorporate built-in search capabilities tribler users find .torrent files held random peers taste buddies adds ability bittorrent protocol using gossip protocol somewhat similar exeem network shut 2005 software includes ability recommend content well dozen downloads tribler software roughly estimate download taste user recommend additional content may 2007 researchers cornell university published paper proposing new approach searching peer-to-peer network inexact strings could replace functionality central indexing site year later team implemented system plugin vuze called cubit published follow-up paper reporting success somewhat similar facility slightly different approach provided bitcomet client torrent exchange feature whenever two peers using bitcomet torrent exchange enabled connect exchange lists torrents name info-hash torrent share storage torrent files previously downloaded user chose enable sharing torrent exchange thus client builds list torrents shared peers connected current session even maintain list sessions instructed time user search torrent collection list certain torrent sort list categories user chooses download torrent list .torrent file automatically searched info-hash value dht network found downloaded querying client create initiate downloading task users find torrent interest torrent index site using search engine built client download open bittorrent client client connects tracker seeds specified torrent file receives list seeds peers currently transferring pieces file client connects peers obtain various pieces swarm contains initial seeder client connects directly begins request pieces clients incorporate mechanisms optimize download upload rates effectiveness data exchange depends largely policies clients use determine send data clients may prefer send data peers send data back tit tat exchange scheme encourages fair trading strict policies often result suboptimal situations newly joined peers unable receive data n't pieces yet trade two peers good connection exchange data simply neither takes initiative counter effects official bittorrent client program uses mechanism called optimistic unchoking whereby client reserves portion available bandwidth sending pieces random peers necessarily known good partners called preferred peers hopes discovering even better partners ensure newcomers get chance join swarm although swarming scales well tolerate flash crowds popular content less useful unpopular niche market content peers arriving initial rush might find content unavailable need wait arrival seed order complete downloads seed arrival turn may take long happen termed seeder promotion problem since maintaining seeds unpopular content entails high bandwidth administrative costs runs counter goals publishers value bittorrent cheap alternative client-server approach occurs huge scale measurements shown 38 new torrents become unavailable within first month strategy adopted many publishers significantly increases availability unpopular content consists bundling multiple files single swarm sophisticated solutions also proposed generally use cross-torrent mechanisms multiple torrents cooperate better share content peer distributing data file treats file number identically sized pieces usually byte sizes power 2 typically 32 kb 16 mb peer creates hash piece using sha-1 hash function records torrent file pieces sizes greater 512 kb reduce size torrent file large payload claimed reduce efficiency protocol another peer later receives particular piece hash piece compared recorded hash test piece error-free peers provide complete file called seeders peer providing initial copy called initial seeder exact information contained torrent file depends version bittorrent protocol convention name torrent file suffix codice_1 torrent files announce section specifies url tracker info section containing suggested names files lengths piece length used sha-1 hash code piece used clients verify integrity data receive though sha-1 shown signs cryptographic weakness bram cohen initially consider risk big enough backward incompatible change example sha-3 bittorrent preparing move sha-256 early days torrent files typically published torrent index websites registered least one tracker tracker maintained lists clients currently connected swarm alternatively trackerless system decentralized tracking every peer acts tracker azureus first bittorrent client implement system distributed hash table dht method alternative incompatible dht system known mainline dht released mainline bittorrent client three weeks later though development since 2002 subsequently adopted µtorrent transmission rtorrent ktorrent bitcomet deluge clients dht adopted private flag – analogous broadcast flag – unofficially introduced telling clients restrict use decentralized tracking regardless user desires flag intentionally placed info section torrent disabled removed without changing identity torrent purpose flag prevent torrents shared clients access tracker flag requested inclusion official specification august 2008 accepted yet clients ignored private flag banned many trackers discouraging practice bittorrent offer users anonymity one usually see ip addresses peers swarm one client firewall program may expose users insecure systems attacks countries copyright organizations scrape lists peers send takedown notices internet service provider users participating swarms files copyright jurisdictions copyright holders may launch lawsuits uploaders downloaders infringement police may arrest suspects cases various means used promote anonymity example bittorrent client tribler makes available tor-like onion network optionally routing transfers peers obscure client requested data exit node would visible peers swarm tribler organization provides exit nodes one advantage tribler clearnet torrents downloaded small decrease download speed one hop routing i2p provides similar anonymity layer although case one download torrents uploaded i2p network bittorrent client vuze allows users concerned anonymity take clearnet torrents make available i2p network bittorrent clients designed provide anonymity used tor debate whether torrenting tor acts drag network private torrent trackers usually invitation require members participate uploading downside single centralized point failure oink pink palace what.cd examples private trackers shut seedbox services download torrent files first company servers allowing user direct download file one ip address would visible seedbox provider third parties virtual private networks encrypt transfers substitute different ip address user anyone monitoring torrent swarm see address growing number individuals organizations using bittorrent distribute licensed works e.g indie bands distributing digital files new songs independent adopters report without using bittorrent technology dramatically reduced demands private networking hardware bandwidth could afford distribute files uses bittorrent file sharing may violate laws jurisdictions see legal issues section bittorrent 100 million users greater share network bandwidth netflix hulu combined early 2015 estimates bittorrent represents 20 broadband traffic routers use network address translation nat must maintain tables source destination ip addresses ports typical home routers limited 2000 table entries expensive routers larger table capacities bittorrent frequently contacts 20–30 servers per second rapidly filling nat tables known cause home routers ceasing work correctly bittorrent protocol still development may therefore still acquire new features enhancements improved efficiency 2 may 2005 azureus 2.3.0.0 known vuze released introducing support trackerless torrents system called distributed database system distributed hash table implementation allows client use torrents working bittorrent tracker following month bittorrent inc. released version 4.2.0 mainline bittorrent client supported alternative dht implementation popularly known mainline dht outlined draft website incompatible azureus recent measurement shows users mainline dht 10 million 25 million daily churn least 10 million mainline dht arguably largest realistic dht world current versions official bittorrent client µtorrent bitcomet transmission bitspirit share compatibility mainline dht dht implementations based kademlia version 3.0.5.0 azureus also supports mainline dht addition distributed database use optional application plugin potentially allows azureus/vuze client reach bigger swarm another idea surfaced vuze virtual torrents idea based distributed tracker approach used describe web resource currently used instant messaging implemented using special messaging protocol requires appropriate plugin anatomic p2p another approach uses decentralized network nodes route traffic dynamic trackers bittorrent clients also use peer exchange pex gather peers addition trackers dht peer exchange checks known peers see know peers 3.0.5.0 release vuze major bittorrent clients compatible peer exchange web seeding implemented 2006 ability bittorrent clients download torrent pieces http source addition swarm advantage feature website may distribute torrent particular file batch files make files available download web server simplify long-term seeding load balancing use existing cheap web hosting setups theory would make using bittorrent almost easy web publisher creating direct http download addition would allow web seed disabled swarm becomes popular still allowing file readily available feature two distinct specifications supported libtorrent 26+ clients use first created john theshad0w hoffman created bittornado first specification requires running web service serves content info-hash piece number rather filename specification created getright authors rely basic http download space using byte serving september 2010 new service named burnbit launched generates torrent url using webseeding server-side solutions provide initial seeding file webserver via standard bittorrent protocol number external seeders reach limit stop serving file original source technique called broadcatching combines rss feeds bittorrent protocol create content delivery system simplifying automating content distribution steve gillmor explained concept column ziff-davis december 2003 discussion spread quickly among bloggers ernest miller chris pirillo etc. article entitled broadcatching bittorrent scott raymond explained rss feed track content bittorrent ensures content integrity cryptographic hashing data feed subscribers receive uncorrupted content one first popular software clients free open source broadcatching miro free software clients penguintv katchtv also supporting broadcatching bittorrent web-service movedigital added ability make torrents available web application capable parsing xml standard rest-based interface 2006 though since discontinued additionally torrenthut developing similar torrent api provide features help bring torrent community web 2.0 standards alongside release first php application built using api called pep parse really simple syndication rss 2.0 feed automatically create seed torrent enclosure found feed since bittorrent makes large proportion total traffic isps chosen throttle slow bittorrent transfers reason methods developed disguise bittorrent traffic attempt thwart efforts protocol header encrypt phe message stream encryption/protocol encryption mse/pe features bittorrent clients attempt make bittorrent hard detect throttle november 2015 vuze bitcomet ktorrent transmission deluge µtorrent moopolice halite qbittorrent rtorrent latest official bittorrent client v6 support mse/pe encryption september 2006 reported software could detect throttle bittorrent traffic masquerading http traffic reports august 2007 indicated comcast preventing bittorrent seeding monitoring interfering communication peers protection efforts provided proxying client-tracker traffic via encrypted tunnel point outside comcast network comcast recently called truce bittorrent inc. intention shaping traffic protocol-agnostic manner questions ethics legality comcast behavior led renewed debate net neutrality united states general although encryption make difficult determine shared bittorrent vulnerable traffic analysis thus even mse/pe may possible isp recognize bittorrent also determine system longer downloading uploading data terminate connection injecting tcp rst reset flag packets another unofficial feature extension bittorrent metadata format proposed john hoffman implemented several indexing websites allows use multiple trackers per file one tracker fails others continue support file transfer implemented several clients bitcomet bittornado bittorrent ktorrent transmission deluge µtorrent rtorrent vuze frostwire trackers placed groups tiers tracker randomly chosen top tier tried moving next tier trackers top tier fail torrents multiple trackers decrease time takes download file also consequences bittorrent specification free use many clients open source bittorrent clients created common operating systems using variety programming languages official bittorrent client µtorrent qbittorrent transmission vuze bitcomet popular clients bittorrent implementations mldonkey torrentflux designed run servers example used centralize file sharing single dedicated server users share access network server-oriented bittorrent implementations also hosted hosting providers co-located facilities high bandwidth internet connectivity e.g. datacenter provide dramatic speed benefits using bittorrent regular home broadband connection services imageshack download files bittorrent user allowing download entire file http finished opera web browser supports bittorrent wyzo bitlet allows users download torrents directly browser using java applet increasing number hardware devices made support bittorrent include routers nas devices containing bittorrent-capable firmware like openwrt proprietary versions protocol implement drm encryption authentication found within managed clients pando unimplemented unofficial feature similarity enhanced transfer set technique improving speed peer-to-peer file sharing content distribution systems share data set proposed researchers pucha andersen kaminsky works spotting chunks identical data files exact near match one needed transferring data client exact data present experiments suggested set help greatly less popular files much popular data many peers already downloading andersen believes technique could immediately used developers bittorrent file sharing system bittorrent inc. working oversi new policy discover protocols query isp capabilities network architecture information oversi isp hosted netenhancer box designed improve peer selection helping peers find local nodes improving download speeds reducing loads isp network although protocol legal problems stem using protocol traffic copyright infringing works much controversy use bittorrent trackers bittorrent metafiles store file contents whether publishers bittorrent metafiles violate copyrights linking copyrighted works without authorization copyright holders controversial various jurisdictions pursued legal action websites host bittorrent trackers high-profile examples include closing suprnova.org torrentspy lokitorrent btjunkie mininova oink pink palace what.cd pirate bay torrent website formed swedish group noted legal section website letters replies subject alleged copyright infringements publicly displayed 31 may 2006 pirate bay servers sweden raided swedish police allegations mpaa copyright infringement however tracker running three days later study used value nbc universal merger comcast envisional examined 10,000 torrent swarms managed publicbt active downloaders excluding pornographic unidentifiable content found one swarm offered legitimate content united states 200,000 lawsuits filed copyright infringement bittorrent since 2010 30 april 2012 uk high court ordered five isps block bittorrent search engine pirate bay see list websites blocked united kingdom one concern udp flood attack bittorrent implementations often use µtp communication achieve high bandwidths underlying protocol used udp allows spoofing source addresses internet traffic possible carry denial-of-service attacks p2p lab environment users running bittorrent clients act amplifiers attack another service however always effective attack isps check source address correct leeches users download share bittorrent collaborative distributed platform section community wants solutions punish discourage behaviour several studies bittorrent indicated exist files containing malware available download via bittorrent particular one small sample indicated 18 executable programs available download contained malware another study claims much 14.5 bittorrent downloads contain zero-day malware bittorrent used distribution mechanism 47 zero-day malware found due sha1 collisions attacker alter execution path executable serving altered chunks victim downloading executable using bittorrent protocol despite fact proof concept exists attack may succeed limited cases small chunk size 32kb selecting larger chunks i.e 256kb amount resources required find sha1 collision tremendous makes attack virtually impossible
[ 7880, 375, 376, 1456, 7169, 6806, 3627, 2212, 403, 6117, 5064, 5414, 4725, 2961, 6492, 6499, 3338, 4014, 84, 6502, 1514, 2984, 1525, 4386, 2988, 6879, 7613, 7637, 5135, 2664, 3383, 3028, 499, 7656, 842, 4434, 2681, 2696, 2700, 5531, 588...
Test
2,431
2
IBM_7090/94_IBSYS:ibm 7090/94 ibsys ibsys discontinued tape-based operating system ibm supplied ibm 7090 ibm 7094 computers similar operating system several significant differences also called ibsys provided ibm 7040 ibm 7044 computers ibsys based fortran monitor system fms likely bell labs besys q.v rather share operating system ibsys really basic monitor program read control card images placed decks program data cards individual jobs ibsys control card began column 1 immediately followed control name selected various ibsys utility programs needed set run job card deck images read magnetic tapes prepared offline usually directly punched card reader
[ 1522, 4291, 7605, 6518, 7800, 4670, 6705, 8173, 7172, 299, 5481, 5571, 5041, 7546, 4421, 5396, 7003, 3874, 402, 839, 4428, 850, 5244, 1774, 2786, 607, 3664, 6849, 4366, 265, 1516, 1994 ]
Test
2,432
2
The_Hessling_Editor:hessling editor hessling editor open source text editor first released august 1992 ten years written maintained mark hessling along original author also maintainer regina open source rexx interpreter ported unix platforms according developers text editor modeled vm/cms editor xedit adding best features mansfield software kedit folding controlled command permits one display work lines file contain given pattern example command codice_1 display lines include string global changes one makes slice example replace string command reflected file cases convenient way make global changes file order restore visibility lines one needs enter without target string similar xedit uses ibms rexx macro language makes highly configurable versatile provides ability create powerful extensions editor and/or customize specialized needs example one create edit commands would allows one manipulate columns text e.g copy/move insert/delete column text within file rexx one also integrate os commands external functions edit session since version 3.0 also user-configurable syntax highlighting xedit gui editors syntax highlighting language definition codice_2 file format comparable kedit codice_3 format free software distributed terms gnu general public license available many operating systems posix unix platforms program text-mode native x11 qnx os/2 dos beos amiga windows 95/98/me/nt/2000/xp
[ 4759, 5571, 1435 ]
Train
2,433
3
SPARC64_V:sparc64 v sparc64 v zeus sparc v9 microprocessor designed fujitsu sparc64 v basis series successive processors designed servers later supercomputers servers series sparc64 v+ vi vi+ vii vii+ x x+ xii sparc64 vi successors vii+ used fujitsu sun later oracle sparc enterprise m-series servers addition servers version sparc64 vii also used commercially available fujitsu fx1 supercomputer october 2017 sparc64 xii latest server processor used fujitsu oracle m12 servers supercomputer series based sparc64 vii sparc64 viifx ixfx xifx sparc64 viiifx used k computer sparc64 ixfx commercially available primehpc fx10 july 2016 sparc64 xifx latest supercomputer processor used fujitsu primehpc fx100 supercomputer late 1990s hal computer systems subsidiary fujitsu designing successor sparc64 gp sparc64 v. first announced microprocessor forum 1999 hal sparc64 v would operated 1 ghz wide superscalar organization superspeculation l1 instruction trace cache small fast 8 kb l1 data cache separate l2 caches instructions data designed fujitsu cs85 process 0.17 μm cmos process six levels copper interconnect would consisted 65 million transistors 380 mm die originally scheduled late 2001 release fujitsu granpower servers canceled mid-2001 hal closed fujitsu replaced fujitsu design first fujitsu sparc64 vs fabricated december 2001 operated 1.1 1.35 ghz fujitsu 2003 sparc64 roadmap showed company planned 1.62 ghz version release late 2003 early 2004 canceled favor sparc64 v+ sparc64 v used fujitsu primepower servers sparc64 v first presented microprocessor forum 2002 introduction highest clock frequency sparc 64-bit server processors production highest spec rating sparc processor sparc64 v four-issue superscalar microprocessor out-of-order execution based fujitsu gs8900 mainframe microprocessor sparc64 v fetches eight instructions instruction cache first stage places 48-entry instruction buffer next stage four instructions taken buffer decoded issued appropriate reserve stations sparc64 v six reserve stations two serve integer units one address generators two floating-point units one branch instructions integer address generator floating-point unit eight-entry reserve station reserve station dispatch instruction execution unit instruction dispatched firstly depends operand availability age older instructions given higher priority newer ones reserve stations dispatch instructions speculatively speculative dispatch instructions dispatched execution units even operands yet available execution begins stage six six instructions dispatched register files read stage seven sparc architecture separate register files integer floating-point instructions integer register file eight register windows jwr joint work register contains 64 entries eight read ports two write ports jwr contains subset eight register windows previous current next register windows purpose reduce size register file microprocessor operate higher clock frequencies floating-point register file contains 64 entries six read ports two write ports execution begins stage nine six execution units two integer two loads stores two floating-point two integer execution units designated exa exb arithmetic logic unit alu shift unit exa multiply divide units loads stores executed two address generators ags designated aga agb simple alus used calculate virtual addresses two floating-point units fpus designated fla flb fpu contains adder multiplier fla graphics unit attached execute add subtract multiply divide square root multiply–add instructions unlike successor sparc64 vi sparc64 v performs multiply–add separate multiplication addition operations thus two rounding errors graphics unit executes visual instruction set vis instructions set single instruction multiple data simd instructions instructions pipelined except divide square root executed using iterative algorithms fma instruction implemented reading three operands operand register multiplying two operands forwarding result third operand adder adding produce final result results execution units loads written register file maintain program order written update buffers reside committed sparc64 v separate update buffers integer floating-point units 32 entries integer register eight read ports four write ports half write ports used results integer execution units half data returned loads floating-point update buffer six read ports four write ports commit takes place stage ten earliest sparc64 v commit four instructions per cycle stage eleven results written register file becomes visible software sparc64 v two-level cache hierarchy first level consists two caches instruction cache data cache second level consists on-die unified cache level 1 l1 caches capacity 128 kb two-way set associative 64-byte line size virtually indexed physically tagged instruction cache accessed via 256-bit bus data cache accessed two 128-bit buses data cache consists eight banks separated 32-bit boundaries uses write-back policy data cache writes l2 cache 128-bit unidirectional bus second level cache capacity 1 2 mb set associativity depends capacity microprocessor 128-bit system bus operates 260 mhz bus operate two modes single-data rate sdr double-data ddr rate yielding peak bandwidth 4.16 8.32 gb/s respectively sparc64 v consisted 191 million transistors 19 million contained logic circuits fabricated 0.13 µm eight-layer copper metallization complementary metal–oxide–semiconductor cmos silicon insulator soi process die measured 18.14 mm 15.99 mm die area 290 mm 1.3 ghz sparc64 v power dissipation 34.7 w. fujitsu primepower servers use sparc64 v supply slightly higher voltage microprocessor enable operate 1.35 ghz increased power supply voltage operating frequency increased power dissipation ~45 w. sparc64 v+ code-named olympus-b development sparc64 v. improvements sparc64 v included higher clock frequencies 1.82–2.16 ghz larger 3 4 mb l2 cache first sparc64 v+ 1.89 ghz version shipped september 2004 fujitsu primepower 650 850 december 2004 1.82 ghz version shipped primepower 2500 versions 3 mb l2 cache february 2006 four versions introduced 1.65 1.98 ghz versions 3 mb l2 caches shipped primepower 250 450 2.08 2.16 ghz versions 4 mb l2 caches shipped mid-range high-end models contained approximately 400 million transistors 18.46 mm 15.94 mm die area 294.25 mm fabricated 90 nm cmos process ten levels copper interconnect sparc64 vi code-named olympus-c two-core processor first multi-core sparc64 processor succeeded sparc64 v+ fabricated fujitsu 90 nm 10-layer copper cmos silicon insulator soi process enabled two cores l2 cache integrated die core modified sparc64 v+ processor one main improvements addition two-way coarse-grained multi-threading cmt fujitsu called vertical multi-threading vmt cmt thread executed determined time-sharing thread executing long-latency operation execution switched thread addition cmt required duplication program counter control integer floating-point registers one set every thread floating-point fused multiply-add fma instruction also added first sparc processor cores share 6 mb on-die unified l2 cache l2 cache 12-way set associative 256-byte lines cache accessed via two unidirectional buses 256-bit read bus 128-bit write bus sparc64 vi new system bus jupiter bus sparc64 vi consisted 540 million transistors die measures 20.38 mm 20.67 mm 421.25 mm sparc64 vi originally introduced mid-2004 fujitsu primepower servers development primerpowers canceled fujitsu sun microsystems announced june 2004 would collaborate new servers called advanced product line apl servers scheduled introduced mid-2006 delayed april 2007 introduced sparc enterprise sparc64 vi processors featured sparc enterprise announcement 2.15 ghz version 5 mb l2 cache 2.28 2.4 ghz versions 6 mb l2 caches sparc64 vii previously called sparc64 vi+ code-named jupiter development sparc64 vi announced july 2008 quad-core microprocessor core capable two-way simultaneous multithreading smt replaces two-way coarse-grained multithreading termed vertical multithreading vmt fujitsu thus execute eight threads simultaneously changes include ras features integer register file protected ecc number error checkers increased around 3,400 consists 600 million transistors 21.31 mm × 20.86 mm 444.63 mm large fabricated fujitsu 65 nm cmos copper interconnect process sparc64 vii featured sparc enterprise socket-compatible predecessor sparc64 vi field-upgradeable sparc64 viis could coexist whilst operating native clock frequency alongside sparc64 vis first versions sparc64 vii 2.4 ghz version 5 mb l2 cache used sparc enterprise m4000 m5000 2.52 ghz version 6 mb l2 cache 28 october 2008 2.52 ghz version 5 mb l2 cache introduced sparc enterprise m3000 13 october 2009 fujitsu sun introduced new versions sparc64 vii code-named jupiter+ 2.53 ghz version 5.5 mb l2 cache m4000 m5000 2.88 ghz version 6 mb l2 cache m8000 m9000 12 january 2010 2.75 ghz version 5 mb l2 cache introduced m3000 sparc64 vii+ jupiter-e referred m3 oracle development sparc64 vii clock frequency increased 3 ghz l2 cache size doubled 12 mb version announced 2 december 2010 high-end sparc enterprise m8000 m9000 servers improvements resulted approximately 20 increase overall performance 2.66 ghz version mid-range m4000 m5000 models 12 april 2011 2.86 ghz version two four cores 5.5 mb l2 cache announced low-end m3000 vii+ socket-compatible predecessor vii existing high-end sparc enterprise m-series servers able upgrade vii+ processors field sparc64 viiifx venus eight-core processor based sparc64 vii designed high-performance computing hpc result viiifx succeed vii existed concurrently consists 760 million transistors measures 22.7 mm 22.6 513.02 mm fabricated fujitu 45 nm cmos process copper interconnects 1,271 i/o pins viiifx peak performance 128 gflops typical power consumption 58 w 30 °c efficiency 2.2 gflops/w viiifx four integrated memory controllers total eight memory channels connects 64 gb ddr3 sdram peak memory bandwidth 64 gb/s viiifx developed next-generation supercomputer project also called kei soku keisenki project keisoku initiated japan ministry education culture sports science technology january 2006 project aimed produce world fastest supercomputer performance 10 pflops march 2011 companies contracted develop supercomputer fujitsu hitachi nec supercomputer originally envisioned hybrid architecture containing scalar vector processors fujitsu-designed viiifx scalar processor vector processor jointly designed hitachi nec however due financial crisis 2007–2008 hitachi nec announced may 2009 would leave project manufacturing hardware responsible would result financial losses afterwards fujitsu redesigned supercomputer use viiifx processor type 2010 supercomputer would built project named k computer located riken advanced institute computational science aics kobe japan obtains performance 88,128 viiifx processors june 2011 top500 project committee announced k computer still incomplete 68,544 processors topped linpack benchmark 8.162 pflops realizing 93 peak performance making fastest supercomputer world time viiifx core based sparc64 vii numerous modifications hpc namely high performance computing-arithmetic computational extensions hpc-ace fujitsu-designed extension sparc v9 architecture front-end coarse-grained multi-threading removed l1 instruction cache halved size 32 kb number branch target address cache btac entries reduced 1,024 8,192 associativity reduced two eight extra pipeline stage inserted instruction decoder stage accommodated greater number integer floating-point registers defined hpc-ace sparc v9 architecture designed 32 integer 32 floating-point number registers sparc v9 instruction encoding limited number registers specifiable 32 specify extra registers hpc-ace prefix instruction would immediately follow one two sparc v9 instructions prefix instruction contained primarily portions register numbers could fit within sparc v9 instruction extra pipeline stage four sparc v9 instructions combined two prefix instructions preceding stage combined instructions decoded next pipeline stage back-end also heavily modified number reservation station entries branch integer instructions reduced six ten respectively integer floating-point register files registers added integer register file gained 32 total 256 floating-point registers extra integer registers part register windows defined sparc v9 always accessible via prefix instruction 256 floating-point registers could used scalar floating-point instructions integer floating-point simd instructions extra pipeline stage added beginning floating-point execution pipeline access larger floating-point register file 128-bit simd instructions hpc-ace implemented adding two extra floating-point units total four simd execution perform four single- double-precision fused-multiply-add operations eight flops per cycle number load queue entries increased 20 16 l1 data cache halved size 32 kb number commit stack entries determined number instructions could in-flight back-end reduced 48 64 sparc64 ixfx improved version sparc64 viiifx designed fujitsu lsi first revealed announcement primehpc fx10 supercomputer 7 november 2011 along primehpc fx10 commercialization technologies first appeared viiifx k computer compared viiifx organizational improvements included doubling number cores 16 doubling amount shared l2 cache 12 mb increasing peak ddr3 sdram memory bandwidth 85 gb/s ixfx operates 1.848 ghz peak performance 236.5 gflops consumes 110 w power efficiency 2 gflops per watt consisted 1 billion transistors implemented 40 nm cmos process copper interconnects sparc64 x 16-core server microprocessor announced 2012 used fujitsu m10 servers also marketed oracle sparc64 x based sparc64 vii+ significant enhancements core chip organization cores improved inclusion pattern history table branch prediction speculative execution loads execution units support hpc-ace extension originally sparc64 viiifx deeper pipeline 3.0 ghz clock frequency accelerators cryptography database decimal floating-point number arithmetic conversion functions 16 cores share unified 24 mb 24-way set-associative l2 cache chip organization improvements include four integrated ddr3 sdram memory controllers glueless four-way symmetrical multiprocessing ten serdes channels symmetrical multiprocessing scalability 64 sockets two integrated pci express 3.0 controllers sparc64 x contains 2.95 billion transistors measures 23.5 mm 25 mm 637.5 mm fabricated 28 nm cmos process copper interconnects sparc64 x+ enhanced sparc64 x processor announced 2013 features minor improvements core organization higher 3.5 ghz clock frequency obtained better circuit design layout contained 2.99 billion transistors measured 24 mm 25 mm 600 mm fabricated process sparc64 x 8 april 2014 3.7 ghz speed-binned parts became available response introduction new xeon e5 e7 models intel impending introduction power8 ibm fujitsu introduced sparc64 xifx august 2014 hot chips symposium used fujitsu primehpc fx100 supercomputer succeeded primehpc fx10 xifx operates 2.2 ghz peak performance 1.1 tflops consists 3.75 billion transistors fabricated taiwan semiconductor manufacturing company 20 nm high-κ metal gate hkmg process microprocessor report estimated die area 500 mm typical power consumption 200 w. xifx 34 cores 32 compute cores used run user applications 2 assistant cores used run operating system system services delegation user applications operating system dedicated cores improves performance ensuring private caches compute cores shared disrupted non-application instructions data 34 cores organized two core memory groups cmgs consisting 16 compute cores 1 assistant core sharing 12 mb l2 unified cache division cores cmgs enabled 34 cores integrated single die easing implementation cache coherence avoiding need l2 cache shared 34 cores two cmgs share memory ccnuma organization xifx core based sparc64 x+ organizational improvements xifx implements improved version hpc-ace extensions hpc-ace2 doubled width simd units 256 bits added new simd instructions compared sparc64 ixfx xifx improvement factor 3.2 double precision 6.1 single precision complement increased width simd units l1 cache bandwidth increased 4.4 tb/s improvements soc organization memory interconnect interfaces integrated memory controllers replaced four hybrid memory cube hmc interfaces decreased memory latency improved memory bandwidth according microprocessor report ixfx first processor use hmcs xifx connected 32 gb memory provided eight 4 gb hmcs hmcs 16-lane versions lane operating 15 gbit/s cmg two hmc interfaces hmc interface connected two hmcs via ports cmg 240 gb/s 120 gb/s 120 gb/s memory bandwidth xifx replaced ten serdes channels external tofu interconnect controller ten-port integrated controller second-generation tofu2 interconnect tofu2 6d mesh/torus network 25 gb/s full-duplex bandwidth 12.5 gb/s per direction 125 gb/s ten ports improved routing architecture sparc64-xii cores run 3.9 ghz 20 nanometer processes tsmc l3 cache 5.5 billion transistors 153 gb/sec memory bandwidth unix vendor able run solaris 10 bare metal fujitsu announced international supercomputing conference june 2016 future exascale supercomputer feature processors design implement armv8 architecture processors also implement extensions armv8 architecture equivalent hpc-ace2 fujitsu developing arm holdings
[ 4847, 5373, 5822, 5737, 6806, 1185, 7180, 5042, 5760, 2054, 6474, 1678, 515, 1042, 2433, 5521, 7499, 6148, 1237, 3156, 971, 6956 ]
Test
2,434
4
User_behavior_analytics:user behavior analytics user behavior analytics uba defined gartner cybersecurity process detection insider threats targeted attacks financial fraud uba solutions look patterns human behavior apply algorithms statistical analysis detect meaningful anomalies patterns—anomalies indicate potential threats instead tracking devices security events uba tracks system users big data platforms like apache hadoop increasing uba functionality allowing analyze petabytes worth data detect insider threats advanced persistent threats problem uba responds described nemertes research ceo johna till johnson security systems provide much information tough uncover information truly indicates potential real attack analytics tools help make sense vast amount data siem ids/ips system logs tools gather uba tools use specialized type security analytics focuses behavior systems people using uba technology first evolved field marketing help companies understand predict consumer-buying patterns turns uba extraordinarily useful security context developments uba technology led gartner evolve category user entity behavior analytics ueba september 2015 gartner published market guide user entity analytics vice president distinguished analyst avivah litan provided thorough definition explanation ueba referred earlier gartner reports much depth expanding definition uba includes devices applications servers data anything ip address moves beyond fraud-oriented uba focus broader one encompassing malicious abusive behavior otherwise went unnoticed existing security monitoring systems siem dlp addition entity reflects devices may play role network attack may also valuable uncovering attack activity end users compromised malware lay dormant go undetected months rather trying find outsider entered uebas allow quicker detection using algorithms detect insider threats particularly computer security market many vendors ueba applications differentiated whether designed monitor on-premises cloud-based software service saas applications methods obtain source data type analytics use i.e. packaged analytics user-driven vendor-written service delivery method i.e. on-premises cloud-based according 2015 market guide released gartner ueba market grew substantially 2015 ueba vendors grew customer base market consolidation began gartner client interest ueba security analytics increased report projected next three years leading ueba platforms become preferred systems security operations investigations organizations serve be—and cases already is—much easier discover security events analyze individual offenders ueba many legacy security monitoring systems
[ 2961, 429, 3743, 2884, 3888, 7177, 7359, 8012, 330, 5509, 3997, 3680, 1805 ]
Test
2,435
8
Canvas_fingerprinting:canvas fingerprinting canvas fingerprinting one number browser fingerprinting techniques tracking online users allow websites identify track visitors using html5 canvas element instead browser cookies similar means technique received wide media coverage 2014 researchers princeton university ku leuven university described paper web never forgets canvas fingerprinting works exploiting html5 canvas element described acar et al variations graphics processing unit gpu installed graphics driver cause variations fingerprint fingerprint stored shared advertising partners identify users visit affiliated websites profile created user browsing activity allowing advertisers target advertising user inferred demographics preferences since fingerprint primarily based browser operating system installed graphics hardware uniquely identify users small-scale study 294 participants amazon mechanical turk experimental entropy 5.7 bits observed authors study suggest entropy could likely observed wild patterns used fingerprint sufficient uniquely identify users fingerprint could combined sources entropy provide unique identifier claimed technique effectively fingerprinting gpu entropy orthogonal entropy previous browser fingerprint techniques screen resolution browser javascript capabilities tor project reference documentation states plugins plugin-provided information believe html5 canvas single largest fingerprinting threat browsers face today tor browser notifies user canvas read attempts provides option return blank image data prevent fingerprinting however tor browser currently unable distinguish legitimate uses canvas element fingerprinting efforts warning taken proof website intent identify track visitors browser add-ons like privacy badger donottrackme adblock plus manually enhanced easyprivacy list able block third-party ad network trackers block canvas fingerprinting provided tracker served third party server opposed implemented visited website may 2012 keaton mowery hovav shacham researchers university california san diego wrote paper pixel perfect fingerprinting canvas html5 describing html5 canvas could used create digital fingerprints web users social bookmarking technology company addthis began experimenting canvas fingerprinting early 2014 potential replacement cookies 5 top 100,000 websites used canvas fingerprinting deployed according addthis ceo richard harris company used data collected tests conduct internal research users able install opt-out cookie computer prevent tracked addthis canvas fingerprinting software developer writing forbes stated device fingerprinting utilized purpose preventing unauthorized access systems long used tracking users without consent 2014 technique widespread many websites least dozen high-profile web ads user tracking suppliers using
[ 7442, 2451, 6541, 7910 ]
Test
2,436
5
Message_Send_Protocol:message send protocol message send protocol msp application layer protocol used send short message nodes network original version protocol published 1990 updated message send protocol 2 1992 one message send service defined connection-based application tcp service listens tcp connections port 18 connection established short message transmitted sender receiver connection sender closes connection sending message another message send service defined datagram-based application udp service listens udp datagrams port 18 datagram received receiver answering datagram sent back sender containing exactly data
[ 7637 ]
Validation
2,437
9
Paul_Irish:paul irish paul irish american front-end engineer developer advocate google chrome web browser widely recognized thought leader leading evangelist web technologies including javascript css 2011 named developer year net awards contributions web development landscape participation many popular open source projects irish created contributed led development many front-end web development projects javascript libraries irish created key contributor many websites effort encourage browser web developers move html5
[ 3559, 2451, 84 ]
Train
2,438
2
EBCDIC:ebcdic extended binary coded decimal interchange code ebcdic eight-bit character encoding used mainly ibm mainframe ibm midrange computer operating systems descended code used punched cards corresponding six-bit binary-coded decimal code used ibm computer peripherals late 1950s early 1960s supported various non-ibm platforms fujitsu-siemens bs2000/osd os-iv msp msp-ex sds sigma series unisys vs/9 burroughs mcp icl vme ebcdic devised 1963 1964 ibm announced release ibm system/360 line mainframe computers eight-bit character encoding developed separately seven-bit ascii encoding scheme created extend existing binary-coded decimal bcd interchange code bcdic devised efficient means encoding two zone number punches punched cards six bits distinct encoding using position 2 instead 1 maintained punched cards desirable hole punches close ensure integrity physical card ibm chief proponent ascii standardization committee company time prepare ascii peripherals card punch machines ship system/360 computers company settled ebcdic system/360 became wildly successful together clones rca spectra 70 icl system 4 fujitsu facom thus ebcdic ibm mainframe midrange peripherals operating systems use ebcdic inherent encoding toleration ascii example ispf z/os browse edit ebcdic ascii encoded files software many hardware peripherals translate encodings modern mainframes ibm zseries include processor instructions hardware level accelerate translation character sets ebcdic-oriented unicode transformation format called utf-ebcdic proposed unicode consortium designed allow easy updating ebcdic software handle unicode intended used open interchange environments even systems extensive ebcdic support popular example z/os supports unicode preferring utf-16 specifically z/os limited support utf-ebcdic ibm aix running rs/6000 descendants including ibm power systems linux running z systems operating systems running ibm pc descendants use ascii aix/370 aix/390 running system/370 system/390 mainframes fact code points different less problem inter-operating ascii fact sorting ebcdic put lowercase letters uppercase letters letters numbers exactly opposite ascii programming languages file formats network protocols designed ascii quickly made use available punctuation marks curly braces exist ebcdic making translation ebcdic ambiguous also prevented various attempts make internationalized versions ascii also replaced punctuation marks letters gaps letters made simple code worked ascii fail ebcdic example codice_1 would set codice_2 26 letters ascii alphabet 41 characters including number unassigned ones ebcdic fixing required complicating code function calls greatly resisted programmers using eight bits ebcdic may encouraged use eight-bit byte ibm ascii likely adopted systems 36 bits five seven-bit ascii characters fit one word eight-bit bytes became widespread ascii systems sometimes used unused bit purposes metacharacters mark borders records words made difficult change code work ebcdic pdp-11 bytes high bit set treated negative numbers behavior copied c causing unexpected problems ebcdic problems also hindered adoption extended ascii character sets table shows invariant subset ebcdic characters assignments ebcdic code pages also shows gray missing ascii ebcdic punctuation located ccsid 037 one code page variants ebcdic unassigned codes typically filled international region-specific characters various ebcdic code page variants characters gray often moved around swapped well table cell first row abbreviation control code printable characters character second row unicode code blank controls n't exist unicode open-source software advocate software developer eric s. raymond writes jargon file ebcdic loathed hackers meant members subculture enthusiastic programmers jargon file 4.4.7 gives following definition ebcdic design also source many jokes one joke went references ebcdic character set made classic infocom adventure game series zork machine room zork ii ebcdic used imply incomprehensible language
[ 4112, 3764, 7331, 630, 7798, 1457, 299, 7142, 5571, 7733, 3870, 2576, 7270, 1114, 3990, 850, 7024, 7305, 2521, 6957, 2621, 1435, 7696 ]
Test
2,439
9
NIL_(programming_language):nil programming language new implementation lisp nil programming language dialect language lisp developed massachusetts institute technology mit intended successor language maclisp 32-bit implementation part response digital equipment corporation dec vax computer project headed jon l white stated goal maintaining compatibility maclisp fixing many problems lisp language invented 1958 john mccarthy massachusetts institute technology mit inception lisp closely connected artificial intelligence ai research community especially pdp-10 systems 36-bit word size pdp-6 pdp-10 influenced usefulness two lisp 18-bit pointers one word pdp-6 project started early 1963 24-bit machine grew 36 bits lisp design goal lisp used implementation programming language micro planner foundation famous ai system shrdlu lisp particular maclisp named originated mit project mac also used implement macsyma computer algebra system 1970s ai research spawned commercial offshoots performance extant lisp systems became growing problem partly garbage collection lisp would use stop-and-copy garbage collection single heap memory allocation partly representation internal structures lisp became difficult run memory-limited stock computer hardware day led creating lisp machines dedicated hardware running lisp environments programs alternative use powerful commodity hardware becoming available especially digital equipment corporation dec vax nil implementation lisp developed mit mid late 1970s intended modern successor maclisp able run stock hardware contrast lisp machine lisp lisp machines originally designed first modern lisp dialect stock hardware development lisp machine lisp mit went become one main influences design common lisp pg 63/294 since users macsyma program represented large potential user base nil necessary nil would large complex system speed would imperative example high-speed bignums requirement support macsyma since nil would failure slow bignums consequently nil ended large base vax assembly language requirements led aggressive complex optimization strategy applied prematurely negative results final system concurrent effort write nil research group stanford university lawrence livermore national laboratory headed richard p. gabriel investigating design lisp run s-1 mark iia supercomputer s-1 lisp lisp never fully functional test bed implementing advanced compiler methods lisp eventually s-1 nil groups began collaborating although unsuccessful meeting goals used language nil important several ways first brought together jon l. white guy l. steele jr. richard p. gabriel later define common lisp second jonathan rees worked part nil project year away yale university returning yale hired computer science department write new lisp became optimizing native code scheme system named t. part nil begat name since nil
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 1116, 6471, 1494, 7573, 2600, 5077, 1885, 1889, 785, 6507, 795, 6876, 6888, 1557, 4789, 5494, 5501, 6210, 144, 4074, 5506, 4085, 7298, 859, 5515, 8025, 3749, ...
Test
2,440
9
Advanced_Continuous_Simulation_Language:advanced continuous simulation language advanced continuous simulation language acsl pronounced axle computer language designed modeling evaluating performance continuous systems described time-dependent nonlinear differential equations like simcos tutsim acsl dialect continuous system simulation language cssl originally designed simulation councils inc sci 1967 attempt unify continuous simulations field acsl equation-oriented language consisting set arithmetic operators standard functions set special acsl statements macro capability allows extension special acsl statements acsl intended provide simple method representing mathematical models digital computer working equation description problem block diagram user writes acsl statements describe system investigation important feature acsl sorting continuous model equations contrast general purpose programming languages fortran program execution depends critically statement order applications acsl new areas developed constantly typical areas acsl currently applied include control system design aerospace simulation chemical process dynamics power plant dynamics plant animal growth toxicology models vehicle handling microprocessor controllers robotics acslx family products aegis technologies group inc modular modeling system mms nhance technologies inc
[ 2200, 2803 ]
Test
2,441
7
Comparison_of_cluster_software:comparison cluster software following tables compare general technical information notable computer cluster software software grossly separated four categories job scheduler nodes management nodes installation integrated stack table explanation table explanation
[ 6690, 4759, 1256, 1923, 5109, 817, 3783, 2651, 578, 4159, 1578, 7930, 3667, 5965, 1435, 5890 ]
Test
2,442
3
Failover:failover computing related technologies networking failover switching redundant standby computer server system hardware component network upon failure abnormal termination previously active application server system hardware component network failover switchover essentially operation except failover automatic usually operates without warning switchover requires human intervention systems designers usually provide failover capability servers systems networks requiring near-continuous availability high degree reliability server level failover automation usually uses heartbeat system connects two servers either using separate cable example rs-232 serial ports/cable network connection long regular pulse heartbeat continues main server second server second server bring systems online may also third spare parts server running spare components hot switching prevent downtime second server takes work first soon detects alteration heartbeat first machine systems ability send notification failover certain systems intentionally failover entirely automatically require human intervention automated manual approval configuration runs automatically human approved failover failback process restoring system component service previously state failure back original working state standby system go functioning back standby use virtualization software allowed failover practices become less reliant physical hardware process referred migration running virtual machine moved one physical host another little disruption service term failover although probably use engineers much earlier found 1962 declassified nasa report term switchover found 1950s describing hot cold standby systems current meaning immediate switchover running system hot delayed switchover system needs starting cold conference proceedings 1957 describes computer systems emergency switchover i.e failover scheduled failover maintenance
[ 6967, 625, 4926, 5809, 108, 644, 5738, 2655, 1554, 2853, 6915, 4062, 1112, 841, 1391, 1394, 670, 6748, 2776, 2780, 6045, 1315, 7213, 2885, 4554, 4199, 6860, 5447 ]
Test
2,443
3
Stanford_MIPS:stanford mips mips acronym microprocessor without interlocked pipeline stages research project conducted john l. hennessy stanford university 1981 1984 mips investigated type instruction set architecture isa called reduced instruction set computer risc implementation microprocessor large scale integration vlsi semiconductor technology effective exploitation risc architectures optimizing compilers mips together ibm 801 berkeley risc three research projects pioneered popularized risc technology mid-1980s recognition impact mips made computing hennessey awarded ieee john von neumann medal 2000 ieee shared david a. patterson eckert–mauchly award 2001 association computing machinery seymour cray computer engineering award 2001 ieee computer society david patterson turing award 2017 acm project initiated 1981 response reports similar projects ibm 801 university california berkeley risc mips conducted hennessy graduate students conclusion 1984 hennessey founded mips computer systems year commercialize technology developed project 1985 mips computer systems announced new isa also called mips first implementation r2000 microprocessor commercial mips isa implementations went widely used appearing embedded computers personal computers workstations servers supercomputers may 2017 commercial mips isa owned imagination technologies used mainly embedded computers late 1980s follow-up project called mips-x conducted hennessy stanford mips isa based 32-bit word supported 32-bit addressing word-addressed load/store architecture—all references memory used load store instructions copied data main memory 32 general-purpose registers gprs instructions integer arithmetic operated gprs possessed basic instruction set consisting instructions control flow integer arithmetic logical operations minimize pipeline stalls instructions except load store executed one clock cycle instructions integer multiplication division operations floating-point numbers architecture exposed hazards caused five-stage pipeline delay slots compiler scheduled instructions avoid hazards resulting incorrect computation whilst simultaneously ensuring generated code minimized execution time mips instructions 16 32 bit long decision expose hazards motivated desire maximize performance minimizing critical paths interlock circuits lengthened instructions packed 32-bit instruction words mips word-addressed 32-bit instruction word could contain two 16-bit operations included reduce size machine code mips microprocessor implemented nmos logic
[ 2903, 5893, 5804, 6074, 551, 895, 3690, 5208, 290, 6177, 6865, 7529, 5917, 4408, 650, 3014, 5483, 5740, 1556, 2929, 1854, 5055, 4885, 4251, 2130, 2226, 1023, 1772, 949, 4365, 4368, 4370, 3747, 4372, 5614, 6236, 534, 1430, 536, 971 ]
Train
2,444
4
NebuAd:nebuad nebuad american online advertising company based redwood city california offices new york london funded investment companies sierra ventures menlo ventures one several companies originally developed behavioral targeting advertising systems sought deals isps enable analyse customer websurfing habits order provide relevant micro-targeted advertising phorm similar company operating europe adzilla project rialto also appear developing similar systems one point nebuad signed 30 customers mostly internet access providers agreements providers covered 10 percent broadband users america due fallout following public congressional concern nebuad largest isp customers pulled nebuad closed business uk august 2008 followed us may 2009 nebuad uk ltd dissolved february 2010 nebuad platform comprised three main parts hardware hosted within isp capable inserting content pages off-site server complex analyse categorise contents users internet communications relationships advertising networks willing present nebuad targeted advertising system consisted hardware device installed within isp client network device capable monitoring 50,000 users users could opt-out nebuad ’ information collection targeted ads way users prevent isps sending data nebuad first place since isps route customers traffic important vantage point monitor traffic to-and-from consumer using deep packet inspection dpi analysing traffic nebuad reported gained information customers particular interests less intrusive methods nebuad privacy policy claimed specifically store use information relating confidential medical information racial ethnic origins religious beliefs sexuality tied personally identifiable information 'sensitive personal information also advises information collect stored processed nebuad servers united states result information may subject access requests governments courts law enforcement least 2 customers middle america isp wow noticed unexpected cookies appearing sites nebuad.adjuggler.com using google read written wow support department contacted wow initially denied responsibility activity noticing problems google loading slowly creation non-google cookies one customer spent hours trying disinfect machine incorrectly thought infected spyware proved ineffective resorted reinstalling machine os scratch discover problem go away july 9 2008 wow suspended use nebuad services subscribers according nebuad sales less 1 users opt-out one isp expected earn least 2.50 per month user nebuad bought impressions ad networks including valueclick nebuad argued behavioral targeting enriches internet several fronts firstly website owners offered improved click-through rate ctr could increase profits reduce amount page-space dedicated advertising owners previously thought ad-unfriendly websites offered chance make money subject matter website interests visitors advertisers offered better targeted adverts hence reducing scattergun approach publishing many ads possible hope catching client users offered relevant adverts isps paid allowing nebuad access network per-user per-active profile basis nebuad used data web search terms page views page ad clicks time spent specific sites zip code browser info connection speed categorise user interests nebuad access user identification information isp may able discover traffic monitoring example email traffic may tie email address ip address bob dykes nebuad ceo claimed 2008 800 consumer interest segments today 're expanding multiple thousands generally nebuad provided additional revenue network operators may maintain lower consumers internet access bills critics dpi targeted advertising believe raw content internet communications entrusted isp handling without inspected modified sale privacy advocates criticize lack disclosure isps provided prior partnering nebuad weak opt-out method lack oversight third-party company contents internet communications conflicts united states wiretap laws company refusal name partner isps february 2008 one american cable operator wide open west wow started rolling nebuad roll-out completed first week march 2008 wow updated terms conditions include mention nebuad cases informed customers terms updated however customers explicitly notified nebuad later sometime third week march 2008 response inquiry members united states house representatives telecommunications subcommittee pilot test nebuad services embarq said notified consumers revising privacy policy 2 weeks prior sending users data streams nebuad knology user knoxville tennessee reported notified internet use monitored may 2008 charter communications announced planned monitor websites visited customers via partnership nebuad customers voiced concerns charter changed mind june plans implement nebuad agree isp employees including one employee planned re-route traffic avoid nebuad deep packet inspection hardware altogether members us congress ed markey chairman house subcommittee telecommunications internet joe barton ranking member house committee energy commerce argued services must opt-in comply provisions laid section 631 us communications act wrote charter request suspend test respectfully request move forward charter communications proposed venture nebuad opportunity discuss issues raised proposed venture writer wired news questioned whether charter users could really opt monitored able opt receiving targeted ads writer asked would breach anti-wiretapping laws engineer examined system confirmed way opt nebuad monitoring inbound outbound information intercepted sent nebuad offsite server processed even user opted service prevent isp sending data nebuad report robert m. topolski chief technology consultant free press public knowledge showed nebuad devices created cookies end-users machines injecting specious packet end data stream returned response web page requests submitted search engines including google yahoo content specious packet would added end web page rendered end-user browser contained html script tags cause browser request javascript http //a.faireagle.com critics concerned nebuad superimposed advertising ads advertisers placing additional advertising page concerns originated nebuad fair eagle operation patent application data mentioned inventions loose relationship claria corporation whose products history suggest tactics well following 2007 reported redmoon texas-based isp using nebuad technology inject redmoon advertising pages visited users fair eagle advertisement hardware provided nebuad inserted additional advertising alongside content web pages ads featured window fair eagle title bar injected ads stopped appearing toward end june 2007 senior staff members nebuad worked previously defunct ad company named claria corporation formerly gator corporation well known ad software known gator claria nebuad located redwood city california june 2006 creation nebuad.com coincides timing claria decision shut gator service nebuad repeatedly denied corporate connection claria describing hiring claria employees result company shedding employees tight market experienced advertising sales staff valley isps tried deployed prepared deploy nebuad included following following isps listed legal documents related class action notice see deployed nebuad hardware isps ended suspended relationship nebuad nebuad closed uk august 2008 us may 2009 proposed settlement class-action lawsuit nebuad underway october 2011 subscribers isps listed january 1 2007 july 1 2008 considered mandatory class members opt could choose opt terms proposed settlement nebuad would create settlement fund approximately 2,410,000 used administration settlement covering legal fees incentive award 5,000 individual brought complaint providing 1000 named representatives money going support non-profits providing consumer education privacy research
[ 6382 ]
Test
2,445
1
Oracle_Spatial_and_Graph:oracle spatial graph oracle spatial graph formerly oracle spatial forms separately-licensed option component oracle database spatial features oracle spatial graph aid users managing geographic location-data native type within oracle database potentially supporting wide range applications — automated mapping facilities management geographic information systems am/fm/gis wireless location services location-enabled e-business graph features oracle spatial graph include oracle network data model ndm graphs used traditional network applications major transportation telcos utilities energy organizations rdf semantic graphs used social networks social interactions linking disparate data sets address requirements research health sciences finance media intelligence communities geospatial feature oracle spatial graph provides sql schema functions facilitate storage retrieval update query collections spatial features oracle database spatial component spatial feature consists geometric representation shape coordinate space — referred geometry oracle spatial geospatial data features consist network data model feature property graph model used model analyze physical logical networks used industries transportation logistics utilities features include rdf semantic graph feature supports world wide web consortium w3c rdf standards provides rdf data management querying inferencing commonly used variety applications ranging semantic data integration social network analysis linked open data applications features include oracle spatial graph option oracle enterprise edition must licensed separately also included oracle database cloud service high performance edition extreme performance edition included oracle standard edition oracle standard edition one however latter two editions allow use subset spatial features called oracle locator extra cost appendix oracle spatial graph developer guide specifies functions allowed locator oracle rdbms first incorporated spatial-data capability modification oracle 4 made scientists working canadian hydrographic service chs joint development team chs oracle personnel subsequently redesigned oracle kernel resulting spatial data option sdo oracle 7 sdo_ prefix continues use within oracle spatial implementations spatial indexing system sdo involved adaptation riemannian hypercube data-structures invoking helical spiral 3-dimensional space allows n-size features also permitted highly efficient compression resulting data suitable petabyte-size data repositories chs major corporate users required also improving search retrieval times helical hyperspatial code hhcode developed chs implemented oracle spatial comprises form space-filling curve oracle 8 oracle corporation marketing dubbed spatial extension simply oracle spatial primary spatial indexing system longer uses hhcode standard r-tree index since july 2012 option named oracle spatial graph highlight graph database capabilities product network data model graph introduced oracle database 10g release 1 rdf semantic graph introduced oracle database 10g release 2 oracle documentation library http //www.oracle.com/pls/db121/portal.portal_db selected=7 frame= see
[ 3928, 7071, 8155, 7213, 4635, 4866, 7330, 3915, 5571, 7290, 2872, 7346 ]
Test
2,446
4
Network_Crack_Program_Hacker_Group:network crack program hacker group network crack program hacker group ncph group chinese hacker group based zigong sichuan province group first gained notoriety hacking 40 hacker association websites china attacks grew sophistication notoriety 2006 received international media attention early 2007. idefense linked ginwui rootkit developed leader tan dailin wicked rose attacks us department defense may june 2006. idefense linked group many 35 zero-day hacker proof-of-concept codes used attacks period 90 days summer 2006 also known remote-network-control programs offer download wicked rose announced blog post group paid work group sponsor unknown group four core members 2006 wicked rose kungbim charles rodag approximately 10 members total group current membership unknown wicked rose also known meigui 玫瑰 pseudonym chinese hacker tan dailin first noted hacker patriotic attacks 2001 2005 wicked rose contracted sichuan military command communication department instructed participate chengdu military command network attack/defense competition winning local competition received month intense training simulating attacks designing hacking tools drafting network-infiltration strategies team represented sichuan military command competition provinces went win wicked rose also credited development ginwui rootkit used attacks us department defense 2006 group leader responsible managing relationships sponsors paying ncph members work april 2009 arrested committing distributed denial service attacks hackbase hackerxfiles 3800hk possibly purpose committing blackmail organizations attacked collected information attack turned public security department authorities conducted investigation shut website hackbase reported wicked rose arrested faces 7 years prison group expelled hacker wzt 20 may 2006 although cause unknown group ejected soon zero-day attacks publicly disclosed wzt coding expert within group former ncph member associates chinese hacker li0n founder honker union china huc wicked rose credits chinese hacker whg also known fig one developers ginwui rootkit whg expert malicious code security firms researching wicked rose activities connected chinese hacker group evil security team group known remote-network-control programs offer free website exploitation zero-day vulnerabilities microsoft office suite products founding 2004 group earned reputation among hacking groups hacking 40 hacker association websites china wicked rose creator ginwui rootkit code support posts chinese hacker message boards also available ncph blog security researchers discovered rootkit 18 may 2006 attackers utilized attacks us japan attackers introduced us attack department defense entity used two different versions rootkit attacks may june 2006 according f-secure ginwui fully featured backdoor rootkit characteristics distributed word documents backdoor ginwui creates allows controlling hacker control certain processes compromised computer including ability idefense links ncph many 35 zero-day proof-of-concept codes used attacks microsoft office products period 90 days summer 2006 due use malware developed wicked rose available public domain time group graduated early attacks exploiting microsoft word end 2006 also using power point excel attacks ncph utilizes exploits spear phishing attacks blog wicked rose discussed preference spear phishing attacks first collection phase information gathered using open source information employee databases mailboxes company system may also conduct analysis user id allows track understand activities finally conducts attack using information collected someone likely open infected document spear phishing attacks attributed ncph increased sophistication time phishing attacks beginning 2006 targeted large numbers employees one attack attributed group later year targeted one individual us oil company using socially engineered emails infected power point documents winning military network attack/defense competition group obtained sponsor paid 2000 rmb per month idefense believes sponsor likely people liberation army pla definitive evidence support claim 2006 attacks took place sponsor increased pay 5000 rmb group current sponsor unknown time reporter simon elegant interviewed eight members group december 2007 part article chinese government cyber operations us government interview members referred using code names security firm idefense published reports group exploits devoted webinar group capabilities relationships chinese hackers scott henderson chinese linguistics chinese hacker expert also devoted several blog posts group ongoing activities four core members group blogged activities one point another group blog ncph.net also offered network-infiltration programs download scott henderson describes wicked rose early blog posts revealing damning thing ever seen chinese hacker write interview time reporter wicked rose took group blog blog july 2008 group blog returned modified content withered rose also began blogging saying busy time blog new job allows time blog chinese officials removed blogs arrest april 2009 rodag also blogs recent post august 2008 last post ie vulnerabilities attackers used exploit user desktop
[ 8041, 6823 ]
Validation
2,447
4
Budapest_Declaration_on_Machine_Readable_Travel_Documents:budapest declaration machine readable travel documents budapest declaration machine readable travel documents declaration issued future identity information society fidis network excellence raise concern public risks associated security architecture related management machine readable travel documents mrtds current implementation passports european union creates threats related identity theft privacy declaration proclaimed budapest september 2006
[ 7461 ]
Validation
2,448
3
Execution_unit:execution unit computer engineering execution unit also called functional unit part central processing unit cpu performs operations calculations instructed computer program may internal control sequence unit confused cpu main control unit registers internal units arithmetic logic unit alu address generation unit agu floating-point unit fpu load-store unit lsu branch execution unit beu smaller specific components common modern cpus multiple parallel execution units referred superscalar design simplest arrangement use one bus manager manage memory interface others perform calculations additionally modern cpus execution units usually pipelined
[ 5012, 1447, 5371, 3948, 1083, 7527, 7529, 5737, 7541, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 5079, 2248, 6148, 441, 6865, 2266, 1922, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 2351, ...
Test
2,449
3
X87:x87 x87 floating-point-related subset x86 architecture instruction set originated extension 8086 instruction set form optional floating-point coprocessors worked tandem corresponding x86 cpus microchips names ending 87 also known npx numeric processor extension like extensions basic instruction set x87 instructions strictly needed construct working programs provide hardware microcode implementations common numerical tasks allowing tasks performed much faster corresponding machine code routines x87 instruction set includes instructions basic floating-point operations addition subtraction comparison also complex numerical operations computation tangent function inverse example x86 processors since intel 80486 x87 instructions implemented main cpu term sometimes still used refer part instruction set x87 instructions standard pcs compilers programmers use rather slow library calls perform floating-point operations method still common low-cost embedded systems x87 registers form 8-level deep non-strict stack structure ranging st 0 st 7 registers directly accessed either operand using offset relative top well pushed popped scheme may compared stack frame may pushed/popped indexed instructions push calculate pop values top stack unary operations fsqrt fptan etc implicitly address topmost st 0 binary operations fadd fmul fcom etc implicitly address st 0 st 1 non-strict stack model also allows binary operations use st 0 together direct memory operand explicitly specified stack register st x role similar traditional accumulator combined destination left operand also reversed instruction-by-instruction basis st 0 unmodified operand st x destination furthermore contents st 0 exchanged another stack register using instruction called fxch st x properties make x87 stack usable seven freely addressable registers plus dedicated accumulator seven independent accumulators especially applicable superscalar x86 processors pentium 1993 later exchange instructions codes d9c8..d9cf optimized zero clock penalty using one integer paths fxch st x parallel fpu instruction despite natural convenient human assembly language programmers compiler writers found complicated construct automatic code generators schedule x87 code effectively stack-based interface potentially minimize need save scratch variables function calls compared register-based interface although historically design issues original implementation limited potential x87 provides single-precision double-precision 80-bit double-extended precision binary floating-point arithmetic per ieee 754-1985 standard default x87 processors use 80-bit double-extended precision internally allow sustained precision many calculations see ieee 754 design rationale given sequence arithmetic operations may thus behave slightly differently compared strict single-precision double-precision ieee 754 fpu may sometimes problematic semi-numerical calculations written assume double precision correct operation avoid problems x87 configured using special configuration/status register automatically round single double precision operation since introduction sse2 x87 instructions essential remain important high-precision scalar unit numerical calculations sensitive round-off error requiring 64-bit mantissa precision extended range available 80-bit format clock cycle counts examples typical x87 fpu instructions register-register versions shown ... b notation minimum maximum covers timing variations dependent transient pipeline status arithmetic precision chosen 32 64 80 bits also includes variations due numerical cases number set bits zero etc. l → h notation depicts values corresponding lowest l highest h maximal clock frequencies available companies designed manufactured floating-point units compatible intel 8087 later models include amd 287 387 486dx 5x86 k5 k6 k7 k8 chips technologies super math coprocessors cyrix fasmath cx87slc cx87dlc etc. 6x86 cyrix mii fujitsu early pentium mobile etc harris semiconductor manufactured 80387 486dx processors ibm various 387 486 designs idt winchip c3 c7 nano etc iit 2c87 3c87 etc lc technology green math coprocessors national semiconductor geode gx1 geode gxm etc nexgen nx587 rise technology mp6 st microelectronics manufactured 486dx 5x86 etc texas instruments manufactured 486dx processors etc transmeta tm5600 tm5800 ulsi math·co coprocessors via c3 c7 nano etc xtend 83s87sx-25 coprocessors 8087 first math coprocessor 16-bit processors designed intel built paired intel 8088 8086 microprocessors intel earlier 8231 8232 floating-point processors marketed use i8080 cpu fact licensed versions amd am9511 am9512 fpus 1977 1979 80187 80c187 math coprocessor intel 80186 cpu incapable operating 80188 80188 8-bit data bus 80188 use 8087 80187 appear time 80186 80188 fact launched 80287 80387 although interface main processor 8087 core 80387 thus fully ieee 754-compliant capable executing 80387 extra instructions 80287 i287 math coprocessor intel 80286 series microprocessors intel models included variants specified upper frequency limits ranging 6 12 mhz later followed i80287xl 387 microarchitecture i80287xlt special version intended laptops well variants 80287xl actually 80387sx 287 pinout contains internal 3/2 multiplier motherboards ran coprocessor 2/3 cpu speed could instead run fpu speed cpu 287 models 387-like performance intel 80c287 built using chmos iii amd 80ec287 manufactured amd cmos process using fully static gates 80287 80287xl work 80386 microprocessor initially coprocessors available 80386 introduction 80387 1987 finally able work cyrix cx486slc however chips 80387 strongly preferred higher performance greater capability instruction set 80387 387 i387 first intel coprocessor fully compliant ieee 754-1985 standard released 1987 full two years 386 chip i387 includes much improved speed intel previous 8087/80287 coprocessors improved characteristics trigonometric functions 8087 80287 fptan fpatan instructions limited argument range ±π/4 ±45° 8087 80287 direct instructions sin cos functions without coprocessor 386 normally performs floating-point arithmetic relatively slow software routines implemented runtime software exception handler math coprocessor paired 386 coprocessor performs floating-point arithmetic hardware returning results much faster emulating software library call i387 compatible standard i386 chip 32-bit processor bus later cost-reduced i386sx narrower 16-bit data bus interface i387 32-bit bus i386sx requires coprocessor 80387sx compatible sx narrower 16-bit data bus i487sx p23n marketed floating-point unit coprocessor intel i486sx machines actually contained full-blown i486dx implementation installed i486sx system i487 disabled main cpu took cpu operations i487 took measures detect presence i486sx would function without original cpu place nx587 last fpu x86 manufactured separately cpu case nexgen nx586
[ 708, 1252, 2814, 5012, 5802, 1162, 4845, 4479, 6332, 3942, 6698, 3849, 4765, 6170, 3443, 6344, 4108, 1361, 1465, 2744, 7449, 3020, 7364, 3717, 5669, 5670, 3803, 410, 1867, 3565, 4077, 336, 4985, 1881, 766, 691, 5343, 694, 4098, 6057, 67...
Test
2,450
5
Yahoo!_Messenger_Protocol:yahoo messenger protocol yahoo messenger protocol ymsg underlying network protocol used yahoo messenger instant messaging client yahoo instant messager supports many features beyond messaging including off-line messaging file transfer chat conferencing voice chat webcams avatars ymsg protocol provides language series conventions software communicating yahoo instant messaging service essence ymsg performs role yahoo im http world wide web unlike http however ymsg proprietary protocol closed standard aligned yahoo messaging service rival messaging services protocols based open standards others proprietary effectively fulfilling role different mechanics one fundamental tenets instant messaging notion users see someone connected network—known industry 'presence ymsg protocol uses mechanics standard internet connection achieve presence—the connection uses send receive data order user remain 'visible users service thereby signaling availability yahoo im client software must maintain functional open network connection linking client yahoo im servers organizations block communication port used yahoo im either choose whitelist certain types internet usage web surfing email example seek blacklist instant messaging services yahoo provides alternative route connecting service mimics http protocol used world wide web however http inherent sense persistent connection yahoo instead relies client frequently contacting server order approximate sense connection required give user presence im network originally ymsg login procedure suffered security flaw known replay attack given password authentication information always identically scrambled sent across network allowed attacker witnesses transmission merely reproduce message verbatim order successfully log without actually needing know original password details generated time around 2000 2001 yahoo upgraded service introduce random element login attempt defeating potential replay attacks exception login authentication details data sent ymsg connection encrypted ymsg uses binary format text portions data transmitted plain view therefore difficult attacker seize control yahoo im account quite easy read messages sent account holder along details list friends attacker control one computers data routed ymsg protocol communicates client application server using tcp/ip connection port 5050 default ports may used port blocked alternatively http route available clients behind well-secured firewall http requests used upload messages client downloading messages accumulated server since last request client remains logged long tcp/ip connection kept open case client connected via http client fails send request time 'ping messages sent every thirty seconds ymsg packets consist twenty byte header consists four bytes ymsg two bytes version current version 19 two bytes vendor id typically 0 two bytes packet length content include 20 byte header two bytes service type ymsg packet 4 bytes status related buddy status though used log invisible four bytes session id rest packet variable length table key/value pairs key ascii representation numeric code representing field type value associated data two byte separator hexadecimal values c0 80 used delimit entry table parts ymsg rely protocols example file transfer initially negotiated using ymsg actual transfer file done via http webcams also use ymsg discover request permission view http actually feed jpeg 2000 images one client another chatroom categories rooms lobbies retrieved using http xml documents regular webcam connections use h.323 yahoo voice uses sip calls voip handled indirectly yahoo servers chat client direct access yahoo chat conference voice however use older form audio compression called truespeech developed dsp group chatroom categories retrieved login process multi-step process spans two protocols client successfully establishing tcp connection ymsg server sends authentication packet contains user name user wishes log ymsg server ymsg server responds authentication packet containing challenge string key/value field 96 https process starts connecting login.yahoo.com sending token_get string constructed username password account client trying log https response token login successful contain token string another https request sent login.yahoo.com token_login constructed token successful response contain three strings crumb tcookie ycookie client combines crumb challenge strings performs md5 hash combined string converts resulting 16-byte value base64 string performs negligible amount manipulation resulting base64 string making three character replacements '+ '= '- '/ resultant base64 string used building authenticationresponse packet whose key 307 contains resultant base64 string value client sends authenticationresponse packet authenticationresponse packet successful client receive list listv15 statusv15 newmail ping number y7 buddy authorization message packets offline messages buddy requests list packet contains aliases user accounts yahooid listv15 contains users friends groups ignored user list statusv15 packet contains users listv15 online busy idle well status messages users may potentially string represents resource another http server user display image
[ 7148, 3762, 3350, 7967, 2284, 6092, 7170, 2201, 6624, 1369, 6629, 1014, 4337, 1958, 2048, 3050, 2880, 4634, 6062, 2894, 84, 5535 ]
Test
2,451
9
JavaScript:javascript javascript often abbreviated js high-level interpreted scripting language conforms ecmascript specification javascript curly-bracket syntax dynamic typing prototype-based object-orientation first-class functions alongside html css javascript one core technologies world wide web javascript enables interactive web pages essential part web applications vast majority websites use major web browsers dedicated javascript engine execute multi-paradigm language javascript supports event-driven functional imperative including object-oriented prototype-based programming styles apis working text arrays dates regular expressions dom language include i/o networking storage graphics facilities relies upon host environment embedded provide features initially implemented client-side web browsers javascript engines embedded many types host software including server-side web servers databases non-web programs word processors pdf software runtime environments make javascript available writing mobile desktop applications including desktop widgets terms vanilla javascript vanilla js refer javascript extended frameworks additional libraries scripts written vanilla js plain javascript code although similarities javascript java including language name syntax respective standard libraries two languages distinct differ greatly design javascript influenced programming languages self scheme json serialization format used store data structures files transmit across networks based javascript 1993 national center supercomputing applications ncsa unit university illinois urbana-champaign released ncsa mosaic first popular graphical web browser played important part expanding growth nascent world wide web beyond nextstep niche worldwideweb formed three years earlier 1994 company called mosaic communications founded mountain view california employed many original ncsa mosaic authors create mosaic netscape however intentionally shared code ncsa mosaic internal codename company browser mozilla portmanteau mosaic godzilla first version web browser mosaic netscape 0.9 released late 1994 within four months already taken three-quarters browser market became main web browser 1990s avoid trademark ownership problems ncsa browser subsequently renamed netscape navigator year company took name netscape communications netscape communications realized web needed become dynamic marc andreessen founder company believed html needed glue language easy use web designers part-time programmers assemble components images plugins code could written directly web page markup 1995 netscape communications recruited brendan eich goal embedding scheme programming language netscape navigator could get started netscape communications collaborated sun microsystems include sun static programming language java netscape navigator compete microsoft user adoption web technologies platforms netscape communications decided scripting language wanted create would complement java similar syntax excluded adopting languages perl python tcl scheme defend idea javascript competing proposals company needed prototype eich wrote one 10 days may 1995 although developed name mocha language officially called livescript first shipped beta releases netscape navigator 2.0 september 1995 renamed javascript deployed netscape navigator 2.0 beta 3 december final choice name caused confusion giving impression language spin-off java programming language choice characterized marketing ploy netscape give javascript cachet hot new web programming language common misconception javascript influenced earlier web page scripting language developed nombas named cmm confused later c -- created 1997 brendan eich however never heard cmm created livescript nombas pitch embedded web page scripting netscape though web page scripting new concept shown violawww web browser nombas later switched offering javascript instead cmm scriptease product part tc39 group standardized ecmascript december 1995 soon releasing javascript browsers netscape introduced implementation language server-side scripting netscape enterprise server since 1996 iis web-server supported microsoft implementation server-side javascript—jscript—in asp .net pages since mid-2000s additional server-side javascript implementations introduced node.js 2009 microsoft script technologies including vbscript jscript released 1996 jscript reverse-engineered implementation netscape javascript part internet explorer 3 jscript also available server-side scripting internet information server internet explorer 3 also included microsoft first support css various extensions html case implementation noticeably different found netscape navigator time differences made difficult designers programmers make single website work well browsers leading use best viewed netscape best viewed internet explorer logos characterized early years browser wars javascript began acquire reputation one roadblocks cross-platform standards-driven web developers took difficult task trying make sites work major browsers many could afford time release internet explorer 4 microsoft introduced concept dynamic html differences language implementations different proprietary document object models remained obstacles widespread take-up javascript web november 1996 netscape submitted javascript ecma international carve standard specification browser vendors could implement based work done netscape led official release language specification ecmascript published first edition ecma-262 standard june 1997 javascript well known implementations actionscript jscript well-known implementations ecmascript release ecmascript 2 june 1998 continued standards process cycle conforming modifications iso/iec 16262 international standard ecmascript 3 released december 1999 modern-day baseline javascript original ecmascript 4 work led waldemar horwat netscape google started 2000 microsoft initially participated implemented proposals jscript .net language time clear microsoft intention cooperating implementing proper javascript internet explorer even though competing proposal partial diverged point implementation .net server side 2003 original ecmascript 4 work mothballed next major event 2005 two major happenings javascript history first brendan eich mozilla rejoined ecma international not-for-profit member work started ecmascript xml e4x ecma-357 standard came ex-microsoft employees bea systems originally acquired crossgain led working jointly macromedia later acquired adobe systems implementing e4x actionscript 3 actionscript 3 fork original ecmascript 4 along macromedia work restarted ecmascript 4 goal standardizing actionscript 3 end adobe systems released actionscript virtual machine 2 code named tamarin open source project tamarin actionscript 3 different web javascript converge realized parties 2007 2008 alas still turmoil various players douglas crockford—then yahoo —joined forces microsoft 2007 oppose ecmascript 4 led ecmascript 3.1 effort development ecmascript 4 never completed work influenced subsequent versions happening open source developer communities set work revolutionize could done javascript community effort sparked 2005 jesse james garrett released white paper coined term ajax described set technologies javascript backbone used create web applications data loaded background avoiding need full page reloads leading dynamic applications resulted renaissance period javascript usage spearheaded open source libraries communities formed around libraries prototype jquery dojo toolkit mootools others released july 2008 disparate parties either side came together oslo led eventual agreement early 2009 rename ecmascript 3.1 ecmascript 5 drive language forward using agenda known harmony ecmascript 5 finally released december 2009 june 2011 ecmascript 5.1 released fully align third edition iso/iec 16262 international standard ecmascript 2015 released june 2015 ecmascript 2016 released june 2016 current version ecmascript 2017 released june 2017 javascript become one popular programming languages web however many professional programmers initially denigrated language due perceived target audience web authors amateurs advent ajax returned javascript spotlight brought professional programming attention result proliferation comprehensive frameworks libraries improved javascript programming practices increased usage javascript outside web browsers seen proliferation server-side javascript platforms january 2009 commonjs project founded goal specifying common standard library mainly javascript development outside browser rise single-page applications javascript-heavy sites increasingly used compile target source-to-source compilers dynamic languages static languages javascript trademark oracle corporation united states used license technology invented implemented netscape communications current entities mozilla foundation following features common conforming ecmascript implementations unless explicitly specified otherwise popular modern web browsers support javascript built-in interpreters javascript supports much structured programming syntax c e.g. codice_1 statements codice_2 loops codice_3 statements codice_4 loops etc. one partial exception scoping javascript originally function scoping codice_5 ecmascript 2015 added keywords codice_6 codice_7 block scoping meaning javascript function block scoping like c javascript makes distinction expressions statements one syntactic difference c automatic semicolon insertion allows semicolons would normally terminate statements omitted javascript almost entirely object-based javascript object associative array augmented prototype see string key provides name object property two syntactical ways specify name dot notation codice_9 bracket notation codice_10 property may added rebound deleted run-time properties object property belongs object prototype inheritance chain enumerated using codice_11 loop javascript small number built-in objects including codice_12 codice_13 function first-class function considered object function may properties methods codice_23 codice_24 nested function function defined within another function created time outer function invoked addition nested function forms lexical closure lexical scope outer function including constant local variable argument value becomes part internal state inner function object even execution outer function concludes javascript also supports anonymous functions javascript supports implicit explicit delegation javascript officially managed mozilla foundation new language features added periodically however javascript engines support new features variables javascript defined using either codice_5 codice_6 codice_7 keywords var x // declares variable x assigns special value undefined confused undefined value var 2 // declares variable assigns value 2 var z hello world // declares variable z assigns string containing hello world note comments example preceded two forward slashes built-in input/output functionality javascript run-time environment provides ecmascript specification edition 5.1 mentions indeed provisions specification input external data output computed results however runtime environments codice_38 object used print output minimalist hello world program javascript console.log hello world simple recursive function function factorial n factorial 3 // returns 6 anonymous function lambda function counter var closure counter closure // returns 1 closure // returns 2 closure // returns 3 example shows javascript function closures capture non-local variables reference arrow functions first introduced 6th edition ecmascript 2015 shorten syntax writing functions javascript arrow functions anonymous nature variable needed refer order invoke creation example arrow function // arrow functions let us omit function keyword long_example // points anonymous function value const long_example input1 input2 // arrow functions also let us automatically return expression right // arrow input 5 omitting braces return keyword const short_example input input 5 long_example 2 3 // prints hello world returns 5. short_example 2 // returns 7 javascript objects created way functions known function object object example function ball r var myball new ball 5 // creates new instance ball object radius 5 myball.show // instance ball object show function performed variadic function demonstration codice_30 special variable function sum sum 1 2 // returns 3 sum 1 2 3 // returns 6 immediately-invoked function expressions often used create modules ecmascript 2015 built-in module construct language modules allow gathering properties methods namespace making private var counter function // module counter.get // shows 0 counter.set 6 counter.increment // shows 7 counter.increment // shows 8 exporting importing modules javascript export example /* mymodule.js */ // function remains private exported let sum b // export variables export var name 'alice export let age 23 // export named functions export function add num1 num2 // export class export class multiplication import example // import one property import add './mymodule.js console.log add 1 2 // 3 // import multiple properties import name age './mymodule.js console.log name age // alice 23 // import properties module import './module.js' console.log name age // alice 23 console.log add 1,2 // 3 sample code displays various javascript features /* finds lowest common multiple lcm two numbers */ function lcmcalculator x // constructor function // prototype object instances created constructor // constructor prototype property lcmcalculator.prototype // object literal // define generic output function implementation works web browsers function output x // note array map foreach defined javascript 1.6 // used demonstrate javascript inherent functional nature .map function pair // array literal mapping function function printresult obj following output displayed browser window lcmcalculator 28 b 56 gcd 28 lcm 56 lcmcalculator 21 b 56 gcd 7 lcm 168 lcmcalculator 25 b 55 gcd 5 lcm 275 lcmcalculator 22 b 58 gcd 2 lcm 638 94.5 10 million popular web pages used javascript common use javascript add client-side behavior html pages also known dynamic html dhtml scripts embedded included html pages interact document object model dom page simple examples usage javascript code run locally user browser rather remote server increasing application overall responsiveness user actions javascript code also detect user actions html alone individual keystrokes applications gmail take advantage much user-interface logic written javascript javascript dispatches requests information content e-mail message server wider trend ajax programming similarly exploits strength javascript engine also known javascript interpreter javascript implementation interpreter interprets javascript source code executes script accordingly first javascript engine created brendan eich netscape netscape navigator web browser engine code-named spidermonkey implemented c. since updated javascript 1.5 conform ecmascript 3 rhino engine created primarily norris boyd formerly netscape google javascript implementation java rhino like spidermonkey ecmascript 3 compliant web browser common host environment javascript however web browser execute javascript code example text-based browsers javascript engines users browsers may disable scripts preference extension web browser typically creates host objects represent dom javascript web server another common host environment javascript web server would typically expose host objects representing http request response objects javascript program could interrogate manipulate dynamically generate web pages javascript language popular browsers share support inadvertently become target language frameworks languages increasing speed javascript engines made language feasible compilation target despite performance limitations inherent dynamic nature minimal example standards-conforming web page containing javascript using html 5 syntax dom doctype html html /html javascript runs widely varying environments important part testing debugging test verify javascript works across multiple browsers dom interfaces officially defined w3c standardization effort separate javascript implementation dom interfaces differ web browsers javascript authors deal differences writing standards-compliant code executed correctly browsers failing write code behaves differently absence certain browser features authors may also find practical detect browser running two browsers may implement feature differing behavior libraries toolkits take browser differences account also useful programmers furthermore scripts may work users example user may support users web authors try create pages degrade gracefully user agents browsers support page javascript particular page remain usable albeit without extra features javascript would added sites use html codice_40 tag contains alt content js disabled alternative approach many find preferable first author content using basic technologies work browsers enhance content users javascript enabled javascript dom provide potential malicious authors deliver scripts run client computer via web browser authors minimize risk using two restrictions first scripts run sandbox perform web-related actions general-purpose programming tasks like creating files second scripts constrained same-origin policy scripts one web site access information usernames passwords cookies sent another site javascript-related security bugs breaches either origin policy sandbox subsets general javascript—adsafe secure ecmascript ses —that provide greater levels security especially code created third parties advertisements caja another project safe embedding isolation third-party javascript html content security policy main intended method ensuring trusted code executed web page common javascript-related security problem cross-site scripting xss violation same-origin policy xss vulnerabilities occur attacker able cause target web site online banking website include malicious script webpage presented victim script example access banking application privileges victim potentially disclosing secret information transferring money without victim authorization solution xss vulnerabilities use html escaping whenever displaying untrusted data browsers include partial protection reflected xss attacks attacker provides url including malicious script however even users browsers vulnerable xss attacks malicious code stored database correct design web applications server side fully prevent xss xss vulnerabilities also occur implementation mistakes browser authors another cross-site vulnerability cross-site request forgery csrf csrf code attacker site tricks victim browser taking actions user intend target site like transferring money bank target sites rely solely cookies request authentication requests originating code attacker site carry valid login credentials initiating user general solution csrf require authentication value hidden form field cookies authenticate request might lasting effects checking http referrer header also help javascript hijacking type csrf attack codice_29 tag attacker site exploits page victim site returns private information json javascript possible solutions include developers client-server applications must recognize untrusted clients may control attackers application author assume javascript code run intended secret embedded code could extracted determined adversary implications package management systems npm bower popular javascript developers systems allow developer easily manage program dependencies upon developer program libraries developers trust maintainers libraries keep secure date always case vulnerability emerged blind trust relied-upon libraries new releases cause bugs vulnerabilities appear programs rely upon libraries inversely library go unpatched known vulnerabilities wild study done looking sample 133k websites researchers found 37 websites included library at-least one known vulnerability median lag oldest library version used website newest available version library 1,177 days alexa development libraries still active use ceased years ago another possibility maintainer library may remove library entirely occurred march 2016 azer koçulu removed repository npm caused tens thousands programs websites depending upon libraries break javascript provides interface wide range browser capabilities may flaws buffer overflows flaws allow attackers write scripts would run code wish user system code means limited another javascript application example buffer overrun exploit allow attacker gain access operating system api superuser privileges flaws affected major browsers including firefox internet explorer safari plugins video players adobe flash wide range activex controls enabled default microsoft internet explorer may also flaws exploitable via javascript flaws exploited past windows vista microsoft attempted contain risks bugs buffer overflows running internet explorer process limited privileges google chrome similarly confines page renderers sandbox web browsers capable running javascript outside sandbox privileges necessary example create delete files privileges intended granted code web incorrectly granting privileges javascript web played role vulnerabilities internet explorer firefox windows xp service pack 2 microsoft demoted jscript privileges internet explorer microsoft windows allows javascript source files computer hard drive launched general-purpose non-sandboxed programs see windows script host makes javascript like vbscript theoretically viable vector trojan horse although javascript trojan horses uncommon practice 2015 javascript-based proof-of-concept implementation rowhammer attack described paper security researchers 2017 javascript-based attack via browser demonstrated could bypass aslr called aslr⊕cache anc addition web browsers servers javascript interpreters embedded number tools applications provides object model provides access host environment core javascript language remains mostly application within javascript access debugger becomes invaluable developing large non-trivial programs implementation differences various browsers particularly within dom useful access debugger browsers web application targets script debuggers integrated within many mainstream browsers internet explorer firefox safari google chrome opera node.js addition native internet explorer developer tools three debuggers available internet explorer microsoft visual studio features three closely followed microsoft script editor component microsoft office finally free microsoft script debugger free microsoft visual web developer express provides limited version javascript debugging functionality microsoft visual studio comparison internet explorer firefox comprehensive set developer tools includes debugger well old versions firefox without tools used firefox addon called firebug older venkman debugger webkit web inspector includes javascript debugger used safari modified version called blink devtools used google chrome node.js node inspector interactive debugger integrates blink devtools opera includes set tools called dragonfly addition native computer software online javascript integrated development environment ides debugging aids written javascript built run web example program jslint developed douglas crockford written extensively language jslint scans javascript code conformance set standards guidelines many libraries javascript three.js provide links demonstration code edited users demonstration codes also used pedagogical tool institutions khan academy allow students experience writing code environment see output programs without needing setup beyond web browser javascript increased usage web development warrants considerations performance frontend code inherited many responsibilities previously handled backend mobile devices particular may encounter problems rendering poorly optimized frontend code library benchmarks benchmark.js benchmarking library supports high-resolution timers returns statistically significant results another tool jsben.ch online javascript benchmarking tool code snippets tested javascript initially developed 1996 use netscape navigator web browser year microsoft released implementation internet explorer implementation called jscript due trademark issues 1997 first standardized version language released name ecmascript first edition ecma-262 standard explicit versioning opt-in language features mozilla-specific removed later firefox versions least firefox 59 firefox 4 last version referred explicit javascript version 1.8.5 new editions ecma-262 standard javascript language features often mentioned initial definition ecma-262 editions following table explicitly versioned javascript versions based information multiple sources javascript widely supported client-side language run within web browser become intermediate language languages also called transpilers target included newly created languages ports existing languages include javascript unusual limitations – explicit integer type double-precision binary floating point – languages compile javascript take care use integer-converting shift bitwise logical operators may slightly different behavior environments common misconception javascript similar closely related java true c-like syntax c language immediate common ancestor language also typically sandboxed used inside browser javascript designed java syntax standard library mind particular java keywords reserved original javascript javascript standard library follows java naming conventions javascript objects based classes java 1.0 similarities end java javascript first appeared 1995 java developed james gosling sun microsystems javascript brendan eich netscape communications differences two languages prominent similarities java static typing javascript typing dynamic java loaded compiled bytecode javascript loaded human-readable source code java objects class-based javascript prototype-based finally java support functional programming java 8 javascript done beginning influenced scheme starting 2017 web browsers began supporting webassembly technology standardized w3c webassembly standard specifies binary format produced compiler toolchain llvm execute browser near native speed webassembly allows programming languages c c++ c java used well javascript author client-side code world wide web
[ 5717, 4296, 4302, 10, 1450, 5726, 7166, 4315, 1458, 4324, 40, 4338, 1485, 54, 4352, 1496, 5773, 7209, 5778, 70, 2966, 5781, 74, 5782, 7218, 5786, 5787, 84, 87, 1525, 1528, 4390, 7246, 103, 109, 5821, 1550, 7261, 7262, 1556, 3017, 5846...
Test
2,452
2
Windows_Home_Server_2011:windows home server 2011 windows home server 2011 code named vail home server operating system microsoft designed small office/home offices homes multiple connected pcs offer protected file storage file sharing automated pc backup remote access remote control pc desktops released 6 april 2011 following release power pack 3 aging predecessor windows home server windows home server 2011 last windows home server release succeeded windows server 2012 essentials windows home server 2011 based windows server 2008 r2 windows 7 requires x86-64 cpus 64-bit predecessor worked older ia-32 32-bit architecture well coupled fundamental changes structure client backups shared folders clear method migrating previous version windows home server 2011 windows home server 2011 includes additional entertainment capabilities 'add feature app store including web-based media functionality initial speculation technology columnist mary jo foley fueled idea 'vail would integrate windows media center prompted response time tell microsoft windows home server product planner todd headrick time public beta microsoft decided integrate windows media center 'vail 23 november 2010 microsoft announced drive extender would removed windows home server 2011 announcement led astonishment outrage testers users criticism drive extender removal mainly related seen core feature windows home server key reason adoption windows home server 2011 developer michael leworthy expressed concern implementation drive extender might lead data error issues result third-party products entered market fill void left drive extender including drive bender division drivepool stablebit volume spanning feature drive extender two drives used one large storage volume available using dynamic disks feature windows server release
[ 448, 1522, 458, 4759, 5637, 4670, 1536, 6256, 7616, 3180, 3187, 2472, 4500, 4687, 1097, 5571, 6731, 5313, 224, 6289, 7660, 8118, 2329, 3048, 6136, 3907, 2066, 5781, 2885, 6580, 7685, 3585, 3751, 5442, 4377, 5794, 444, 447 ]
Test
2,453
2
Fdm_(software):fdm software fdm fetch/filter deliver mail mail delivery agent email filtering software unix-like operating systems similar fetchmail procmail started 2006 developer later also started tmux 2007. fdm available package many unix-like operating systems included openbsd ports since 2007-01-18 2014 last maintainer procmail posted message openbsd mailing list suggesting remove procmail port suggested well-known openbsd ports maintainer fdm natural alternative procmail port however removed remains place 2019 fdm listed openbsd innovations page section projects maintained openbsd developers outside openbsd
[ 1152, 6965, 6414, 2001, 191, 5373, 7975, 6721, 5571, 6630, 735, 1475, 6908, 1572, 2131, 1394, 3559, 7752, 4352, 5070, 3572, 4990, 1133, 2883, 6242, 6582, 7592, 6588, 1245, 5887, 4918, 1435 ]
Test
2,454
7
XOS_Webtop:xos webtop xos webtop open source webtop os mainly written html5 php javascript xos includes desktop mobile environment features applications system utilities features continuously added accessible windows mac linux ios apple android operating system web browser first version xos webtop started development december 2010 later became available may 14 2011 several months development initial webtop work entirely planned xproduct posted version xos 2.0 desktop edition online public use quickly went back development work would later become xos webtop 3.0 development version follow version 2.0 first started beta testing version release xos 2.0 desktop edition beta reworked ground become entirely new version xos early july beta xos webtop 3.0 came soon xos webtop seen webtop catching market first development updates version fast-paced point rushed resulted sub-par experience many problems continued development desktop edition xos version 3.0 mobile version also released name xos 3.0 mobile continued tested developed well january 5 2012 xproduct released newest version xos desktop edition version 3.1 version includes heavily updated interface fix bugs glitches occurring version 3.0 well slightly improved setup additional features updated mobile edition also version 3.1 released coincide release version 3.1 desktop edition featuring updated interface design previous version version 3.1 first version webtop utilize xproduct new server website updated new domain xproduct.net upon release version 3.1 development cancelled original programmer however code open-sourced development includes fixing bugs uploading fixes soon possible testing make sure program works properly secure unlike earlier versions desktop edition xproduct releasing updates unless actually work tested tablet version xos works add desktop mobile platforms developer page available xos webtop website interested development
[ 6029, 2451, 3915, 5571, 578 ]
Test
2,455
9
Alfred_Aho:alfred aho alfred vaino aho born august 9 1941 canadian computer scientist best known work programming languages compilers related algorithms textbooks art science computer programming aho received b.a.sc engineering physics university toronto ph.d. electrical engineering/computer science princeton university conducted research bell labs 1967 1991 1997 2002 vice president computing sciences research center holds lawrence gussman chair computer science columbia university served chair department 1995 1997 spring 2003 phd thesis aho created indexed grammars nested-stack automaton vehicles extending power context-free languages retaining many decidability closure properties indexed grammars used model parallel rewriting systems particularly biological applications graduating princeton aho joined computing sciences research center bell labs devised efficient regular expression string-pattern matching algorithms implemented first versions unix tools codice_1 codice_2 codice_2 algorithm become known aho-corasick algorithm used several bibliographic search-systems including one developed margaret j. corasick string-searching applications bell labs aho worked closely steve johnson jeffrey ullman develop efficient algorithms analyzing translating programming languages steve johnson used bottom-up lalr parsing algorithms create syntax-analyzer generator yacc michael e. lesk eric schmidt used aho regular-expression pattern-matching algorithms create lexical-analyzer generator lex lex yacc tools derivatives used develop front ends many today programming language compilers aho ullman wrote series textbooks compiling techniques codified theory relevant compiler design 1977 textbook principles compiler design green dragon front cover became known green dragon book 1986 aho ullman joined ravi sethi create new edition red dragon book briefly shown 1995 movie hackers 2007 also monica lam create purple dragon book dragon books widely used compiler textbooks throughout world 1974 aho john hopcroft ullman wrote design analysis computer algorithms codifying early research algorithms book became one highly cited books computer science several decades helped stimulate creation algorithms data structures central course computer science curriculum aho also widely known co-authorship awk programming language peter j. weinberger brian kernighan stands aho aho research interests include programming languages compilers algorithms quantum computing part language compilers research-group columbia university overall works cited 81,040 times h-index 66 may 8 2019 aho received many prestigious honors including ieee john von neumann medal membership national academy engineering elected fellow american academy arts sciences 2003 holds honorary doctorates university waterloo university helsinki university toronto fellow american association advancement science acm bell labs ieee aho twice served chair advisory committee computer information science engineering directorate national science foundation past president acm special interest group algorithms computability theory aho taught columbia university city new york since 1995 great teacher award society columbia graduates 2003
[ 1361, 4403, 361, 5606, 7703, 6275, 939, 1243, 3816 ]
Test
2,456
9
Adobe_ColdFusion_Builder:adobe coldfusion builder adobe coldfusion builder name adobe eclipse-based development ide used build applications coldfusion product original codename bolt reference original lightning icon coldfusion allaire days 2010 adobe released product officially renamed adobe coldfusion builder often referred cfbuilder coldfusion builder became available march 22 2010 along flash builder 4 features include coldfusion builder 2.0 codename storm confirmed previewed adobe max 2010 adobe major features include improved code navigation searching improvements code formatting automatic method stub creation product officially released may 3 2011 new features coldfusion builder 3.0 codename thunder officially released april 29 2014 new features coldfusion builder 2016 3.1.3.300344 officially released february 16 2016
[ 4759, 6704, 103, 7892, 3186, 6095, 5571, 6015, 6016, 5490, 2752, 3543, 6362, 405 ]
Test
2,457
2
Merge_Module:merge module merge module special kind windows installer database contains components needed install discrete software bundle merge module installed alone must merged standard windows installer installation creation installation typically merge module collection merge modules related dependencies installs software product portion product runtime purpose merge modules let add self-contained software modules multiple installations example number applications require specifically configured component would possible create merge module installs configures component merge module could added installation packages product required particular component saves effort individually add necessary files registry entries components every installation also saves time updates needed instead updating installations applications merge module updated installations need rebuilt standard merge modules .msm file extension merge modules may configurable merge modules merge modules contain certain values set specify module behaves installation example author configurable merge module may allow attributes set components enable disable isolated components specify bitmap dialog specify custom action run configurable merge modules supported windows installer 2.0 higher exist number pre-created merge modules install commonly used microsoft software packages mdac activex controls mfc sapi dcom
[ 6989, 6991, 4759, 150, 7438 ]
Test
2,458
3
PowerPC_970:powerpc 970 powerpc 970 powerpc 970fx powerpc 970gx powerpc 970mp 64-bit powerpc processors ibm introduced 2002 used powerpc-based macintosh computers apple referred powerpc g5 970 family created collaboration ibm apple project went codename gp-ul giga processor ultra light giga processor codename power4 core derived apple introduced power mac g5 stated five-year collaborative effort multiple future generations short-lived apple retract promise deliver 3 ghz processor one year introduction ibm could never get power consumption far enough processors fit portable computer apple used three variants processor ibm ’ js20/js21 blade modules low-end workstations system p servers based powerpc 970 also used high end embedded systems like mercury ’ momentum xsa-200 ibm also licensing powerpc 970 core use custom applications powerpc 970 single core derivative power4 process 32-bit 64-bit powerpc instructions natively hardware prefetch unit three way branch prediction unit like power4 front-end nine stages long powerpc 970 fetch decode eight instructions dispatch five reserve stations issue eight execution units retire five per cycle execution pipelines lengthened compared power4 achieve higher clock frequencies eight execution units two arithmetic logic units alus two double precision floating-point units two load/store units two altivec units one altivec units executes integer floating-point instructions permute instructions latter three subunits simple integer complex integer floating-point instructions units pipelines varying lengths 10 stages simple integer permute instructions 13 stages complex integer instructions 16 stage floating-point instructions processor two unidirectional 32-bit double data rate ddr buses one reads writes system controller chip northbridge running one quarter processor core speed buses also carry addresses control signals addition data percentage peak bandwidth realized 6.4 gb/s 450 mhz buses unidirectional direction realize half aggregate bandwidth 3.2 gb/s powerpc 970 announced ibm october 2002 released apple computer power mac g5 june 2003 keeping previous naming conventions apple termed powerpc 970 based products g5 fifth generation powerpc microprocessors ibm released first powerpc 970 blade servers bladecenter js20 november 2003 powerpc 970 512 kb full-speed l2 cache clock speeds 1.6 2.0 ghz front side bus ran half processor clock speed powerpc 970fx used 90 nm manufacturing process maximum power rating 11 watts 149 degrees fahrenheit 65 °c clocked 1 ghz maximum 48 watts 2 ghz powerpc 970 pipeline lengthened 9 stages 16 21 stages powerpc 970 fx 10 functional units 2 fixed-point units 2 load/store units 2 floating point units 1 branch unit 1 simd alu unit 1 simd permute unit 1 condition register supports 215 instructions in-flight 16 instruction fetch unit 67 instruction decode unit 100 functional units 32 store queue 64 kbytes directly-mapped instruction cache 32 kbytes d-cache apple released 970fx-powered machines throughout 2004 xserve g5 january power mac g5 june imac g5 august power mac introduced top clock speed 2.5 ghz liquid-cooled eventually reaching high 2.7 ghz april 2005 imac ran front side bus third clock speed despite intense user demand faster laptop cpu g4 apple never used g5 series cpu powerbook laptops original 970 used far much power never seriously viewed candidate portable computer 970fx reduced thermal design power tdp 30 w 1.5 ghz figure led many users believe powerbook g5 might possible however several obstacles prevented even 970fx used application 1.5 ghz g5 substantially faster 1.5 1.67 ghz g4 processors apple used powerbooks instead furthermore northbridge chips available interface 970fx memory devices designed portable computers consumed much power finally 970fx inadequate power saving features portable cpu minimum idle power much high would led poor battery life figures notebook computer ibm announced powerpc 970mp code-named antares 7 july 2005 power everywhere forum tokyo 970mp dual-core derivative 970fx clock speeds 1.2 2.5 ghz maximum power usage 75 w 1.8 ghz 100 w 2.0 ghz core 1 mb l2 cache twice 970fx like 970fx chip produced 90 nm process one cores idle enter doze state shut 970mp also includes partitioning virtualization features powerpc 970mp replaced powerpc 970fx apple high-end power mac g5 computers imac g5 legacy pci-x power mac g5 continued use powerpc 970fx processor powerpc 970mp used ibm js21 blade modules ibm intellistation power 185 workstation ydl powerstation due high power requirements ibm chosen discontinue parts running faster 2.0 ghz powerpc 970gx cancelled single-core version powerpc 970mp featured 1 mb l2 cache would available frequencies 1.2 3 ghz power dissipation would 16 w 1.6 ghz 85 w 3 ghz fabricated 90 nm fabrication process 970mp illustrations different generations 970 processors manufactured ibm east fishkill plant new york white ceramic substrate typical ibm high end processors era two dedicated northbridges powerpc 970-based computers manufactured ibm also cancelled cpc965 northbridge slated release 2007 uniprocessor-only northbridge features 533 mhz ddr2 controller supported 8 gb ecc memory 8x pcie bus integrated four-port gigabit ethernet ipv4 tcp/udp offloading usb 2.0 ports flash-interface northbridge contains integrated powerpc 405 core provide system management configuration capabilities ibm uses proprietary elastic interface bus modules
[ 7327, 2719, 3348, 4661, 3936, 1075, 1346, 3440, 1083, 1265, 4408, 5652, 912, 5737, 7817, 7637, 3015, 7361, 2845, 3708, 7453, 5665, 4702, 1199, 1386, 4336, 1388, 6204, 7099, 234, 2501, 239, 6474, 763, 3819, 4815, 8125, 1131, 608, 6226, 1...
Validation
2,459
3
Bad_command_or_file_name:bad command file name bad command file name common confusing error message ms-dos operating systems command.com primary user interface ms-dos produces error message first word command could interpreted ms-dos word must name internal command executable file batch file error message provided accurate description problem easily confused novices though source error often mistyped command wording gave impression files named later words damaged illegal filenames later wording error message changed clarity windows nt displays following error message instead foo replaced word causing error early unix shells produced equally cryptic reasons modern shells produce error message similar
[ 1815, 6380, 4415, 4009, 5441, 6256, 1176, 6915 ]
Train
2,460
9
Deforestation_(computer_science):deforestation computer science theory programming languages computer science deforestation also known fusion program transformation eliminate intermediate lists tree structures created immediately consumed program term deforestation originally coined philip wadler 1990 paper deforestation transforming programs eliminate trees deforestation typically applied programs functional programming languages particularly non-strict programming languages haskell one particular algorithm deforestation shortcut deforestation implemented glasgow haskell compiler deforestation closely related escape analysis
[ 5082, 5203, 3499, 1854 ]
Validation
2,461
4
Eugene_Schultz:eugene schultz eugene schultz 1946 2011 american computer security researcher expert cybersecurity schultz born september 10 1946 chicago e. eugene sr. elizabeth schultz married cathy brown 36 years couple three daughters died stroke october 2 2011 completed bachelor degree ucla later earned ms phd cognitive sciences purdue university founder u.s. department energy computer incident advisory capability ciac managed several years chief technology officer emagined security authored several books papers computer security editor-in-chief computers security oldest journal computing security adjunct professor several universities winner department energy excellence award
[ 2961 ]
Test
2,462
4
Security_modes:security modes generally security modes refer information systems security modes operations used mandatory access control mac systems often systems contain information various levels security classification mode operation determined mode operation users must users access data system high mode operation users must users access data based need know mode operation users must users access data based need know formal access approval multilevel security mode operation also called controlled security mode users must users access data based need know clearance formal access approval
[ 8031, 4834, 3794, 7090 ]
Validation
2,463
9
LotusScript:lotusscript lotusscript object oriented programming language used lotus notes since version 4.0 ibm lotus software products lotusscript similar visual basic developers familiar one easily understand syntax structure code major differences two respective integrated development environments product-specific object classes provided language included vb includes richer set classes ui manipulation whereas lotusscript includes richer set application-specific classes lotus notes lotus word pro lotus 1-2-3 case lotus notes classes work notes databases documents records databases etc classes also used ole automation objects outside lotus notes environment visual basic lotusscript also allows definition user-defined types classes although possible inherit product-specific classes lotusscript programs access microsoft office documents using ole automation libraries ms office
[ 3929, 5367, 1255, 12, 5910, 6891, 8183, 4139, 5651, 2925, 7448, 5926, 5129, 7906, 5137, 5234, 2941, 3303, 1304, 61, 6394, 4003, 7864, 1789, 5877, 4012, 4745, 1064 ]
Test
2,464
2
IPhone_XR:iphone xr iphone xr stylized marketed iphone roman numeral x pronounced ten smartphone designed manufactured apple inc twelfth generation iphone announced phil schiller september 12 2018 steve jobs theater apple park campus alongside higher-priced iphone xs iphone xs max pre-orders began october 19 2018 official release october 26 2018 phone 6.1-inch liquid retina lcd display apple claims advanced lcd industry least expensive device apple iphone x line devices starting price 749 united states 1029 canada £749 united kingdom €849 eurozone countries 6499 yuan china features processor xs xs max apple a12 bionic chip built 7 nanometer process apple claims smartest powerful chip ever put smartphone available six colors black white capri yellow coral shade pink orange product red xr available three storage capacities 64gb 128gb 256gb second iphone released yellow capri first iphone 5c 2013 internationally phone supports dual sims nano-sim esim mainland china hong kong macau dual nano-sim single tray offered instead despite receiving criticism lower display resolution comparison previous iphone models roughly price point xr received mostly positive reviews critics users release xr apple best selling 2018 model according apple xr battery lasts one-and-a-half hours longer direct predecessor iphone 8 xr similar design iphone x iphone xs however slightly larger bezels aluminum frame available wide variety colors similar x-branded iphones models come black front xr ip67 rating dust water resistance means immersed 1-meter deep water 30 minutes xr similar hardware xs features removed reduce price instead 3d touch xr comes haptic touch user long presses feel vibration taptic engine xr also lcd display known liquid retina instead oled screen used x xs xs max display xr resolution 1792×828 pixels pixel density 326 ppi compared 458 ppi x-branded iphones screen-to-body ratio xr 79.3 much higher 67.5 iphone 8 plus still lower phones price category unlike phones x-series xr ships single camera rear phone featuring exactly main camera sensor xs xs max utilizing 1/2.55 sensor size 1.4μm pixel size unlike xs optical zoom single camera dxomark gave camera iphone xr rating 101 giving title “ top-ranked single-lens phone. ” despite rear single-camera setup modified version portrait mode included works unaltered using truedepth front camera rear camera attempts calculate depth field using combination focus pixels image sensor ai resulting limitations including lower resolution depth data subjects close enough due wide-angle lens used instead missing telephoto lens like iphone xs xs max iphone xr also offers adjustable depth field software allowing user adjust background bokeh effect taking photo xr shipped ios 12 installed box compatible ios 13
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 740, 5752, 405, 6125, 2954, 1123, 7572, 6482, 768, 6847, 6142, 2609, 1895, 4373, 7226, 4376, 2978, 5091, 4749, 5450, 7601, 3346, 6874, 6165, 4389, 5463, 102, 5469, 4768, 30...
Test
2,465
4
Sandboxie:sandboxie sandboxie sandbox-based isolation program developed sophos acquired invincea acquired earlier original author ronen tzur 32- 64-bit windows nt-based operating systems creates sandbox-like isolated operating environment applications run installed without permanently modifying local mapped drive isolated virtual environment allows controlled testing untrusted programs web surfing december 2013 invincea announced acquisition sandboxie original developer ronen tzur announced longer involved program february 2017 sophos announced acquisition invincea invincea posted assurance sandboxie website time sandboxie development support continue normal april 2019 official site shut preventing downloads installations purchases prompted creation temporary forum company domain may 2019 official site partially back purchase options regular forums still shut version 4.02 sandboxie full support 64-bit versions windows exception windows xp 64-bit never supported sandboxie released proprietary end-user license agreement eula home users may continue using sandboxie free without paying register however two functions remain disabled automatically running programs sandboxie simultaneous use multiple sandboxes 30 days sandboxie starts registration nagware message user dismiss 5-second delay sandboxie included brothersoft 2010 editors pick list gizmo freeware gave sandboxie rating 9 10 stars included editors choice list best free browser protection utility softonic given sandboxie rating 8 10 elena santos stating review sandboxie handy tool test untrustworthy software without putting system danger
[ 3781, 4498, 3495, 5571, 6256, 5904, 5159, 3096, 6305 ]
Test
2,466
4
Snort_(software):snort software snort free open source network intrusion detection system ids intrusion prevention system ips created 1998 martin roesch founder former cto sourcefire snort developed cisco purchased sourcefire 2013 2009 snort entered infoworld open source hall fame one greatest pieces open source software time snort open source network-based intrusion detection/prevention system ids/ips ability perform real-time traffic analysis packet logging internet protocol ip networks snort performs protocol analysis content searching matching program also used detect probes attacks including limited operating system fingerprinting attempts semantic url attacks buffer overflows server message block probes stealth port scans snort configured three main modes sniffer packet logger network intrusion detection sniffer mode program read network packets display console packet logger mode program log packets disk intrusion detection mode program monitor network traffic analyze rule set defined user program perform specific action based identified several third-party tools interfacing snort administration reporting performance log analysis
[ 5454, 1533, 3613, 3088, 3680, 2554, 4590, 7534, 5571, 1435, 4783, 6363, 7275, 1019, 1663, 5857, 5953, 5163, 3821, 6574, 3915, 4100, 4914, 4208 ]
Test
2,467
2
UnixWare:unixware unixware unix operating system originally released univel jointly owned venture unix system laboratories usl novell taken novell via santa cruz operation sco went caldera systems caldera international sco group sold unxis xinuos unixware typically deployed server rather desktop binary distributions unixware available x86 architecture computers unixware primarily marketed server operating system svr4 effort merge sunos system v unix system laboratories usl formed univel partnership novell develop desktop version unix codenamed destiny destiny based unix system v release 4.2 kernel moolit toolkit used windowing system allowing user choose open look motif-like look feel run time order make system robust commodity desktop hardware veritas vxfs journaling file system used place ufs file system used svr4 networking support unixware included tcp/ip interoperability novell netware protocols ipx/spx former standard among unix users time development pc networking much commonly based netware destiny released 1992 unixware 1.0 intention unifying fragmented pc unix market behind single variant operating system system earlier reach corporate computing market microsoft windows nt observers period remarked unixware another flavor unix novell involvement marketing ploy significant influx technology os existed two editions personal edition included novell ipx networking tcp/ip advanced server edition tcp/ip server software personal edition limited two active users server edition included unlimited user license around 35,000 copies unixware 1.0 sold 1993 novell purchased usl merged usl univel new unix systems group 1994 novell released unixware 1.1 included tcp/ip personal advanced server editions motif 1.2 runtime libraries included cose compliance nuc netware unix client software included integration novell netware servers advanced merge application installed server personal editions allow running dos windows 3.1 applications novell later released bug-fix versions 1.1.1 1.1.2 1.1.3 finally 1.1.4 19 june 1995 unixware 2.0 based unix system v release 4.2mp kernel added support multiprocessing began shipping oems developers december 1994 consumer market march 1995 personal server editions supported two processor systems possibility buying extra processor upgrade licenses server edition supported multiprocessor systems included standard intel mp 1.1 smp machines corollary c-bus systems system supported netware odi network drivers effort increase number supported network interfaces new features release included posix threads library addition older ui threads library sco licensed unixware 1995 novell also announced project create supernos based netware 4.1 unixware 2.0 technologies future however never materialized instead netware 4.10 server linux offered caldera netware linux openlinux since 1998 novell open enterprise server finally came 2005 1995 santa cruz operation sco acquired unixware novell exact terms transaction disputed see sco vs novell courts subsequently determined novell retained ownership unix transfer made public sco announced would work towards merging unixware openserver svr3.2 based os first release unixware sco version 2.1 1996 release unixware 2.1 announced proposed unixware/openserver merger known project gemini available 1997 64-bit version unixware developed 1998 one controversial change adoption openserver like user licensing policy univel novell releases unixware allowed 2 users personal edition unlimited numbers users server edition unixware 2.1 server edition included license 5 users customers wanting users could buy 10 25 100 500 unlimited user license extensions sco released three updates unixware 2.1 unixware 2.1.1 released 1996 achieved unix 95 branding unixware 2.1.2 2.1.3 available 1998 largely bug fix releases 1998 compaq released package known integrity xc consisting single-system image cluster proliant servers version unixware 2.1 unixware nonstop clusters first results gemini project made available early 1998 unixware 7 sco named kernel version unix system v release 5 system largely based unixware 2.1 features driver compatibility openserver allowing use openserver network drivers system administration utilities openserver scoadmin replaced original unixware sysadm utility major new features unixware 7 included multi-path i/o large files file systems support large memory systems unixware 7 lacked xenix compatibility features ancestors licensing reasons avoid paying microsoft code included svr3.2 1999 sco released unixware 7.1 update increased number editions business 5-user department 25 user enterprise 50 user editions replaced earlier personal server editions webtop application tarantella inc. included 2000 sco released unixware 7.1.1 update simultaneously unixware nonstop clusters 7.1.1+ip single-system image cluster package released new package allowed commodity hardware used well proprietary compaq hardware supported earlier integrity xc product directly available sco 2 august 2000 santa cruz operation sco announced would sell server software services divisions well rights openserver unixware products caldera systems march 2001 caldera systems became caldera international cii sco purchase completed may 2001 remaining part santa cruz operation company tarantella division changed name tarantella inc. caldera international initial release unixware renamed openunix 8 release would unixware 7.1.2 caldera international renamed sco group august 2002 broadening product line include mobile products services later newly renamed sco group reverted previous unixware brand version release numbering releasing unixware 7.1.3 7.1.4 openunix releases made available openunix 8.1.2 ou812 never released sco group continued maintain unixware issues periodic maintenance updates support 2007 2011 sco group engaged series legal battles september 2007 sco group filed chapter 11 bankruptcy protection 11 april 2011 unxis bought sco group operating assets intellectual property rights approved bankruptcy court delaware sco group inc. renamed tsg group inc. sco operations inc. became tsg operations inc. august 2012 filed convert chapter 11 chapter 7 rights unixware well openserver acquired unxis 2011 june 2013 unxis renamed xinuos announced product availability sco unixware 7.1.4+ supporting physical virtual machines versions unixware included significant open source components including bind/x11/sendmail/dhcp/perl/tcl others later releases bundled numerous additional open source applications including apache samba mysql postgresql openssh mozilla software versions sco operating system distributions including unixware also extensive set open source packages available free download via sco skunkware site
[ 1807, 5362, 6085, 5048, 4344, 1493, 759, 6842, 7581, 4733, 83, 6500, 443, 1522, 4751, 473, 5481, 2294, 2300, 486, 2680, 4447, 6577, 3751, 3422, 1614, 7702, 4478, 6256, 554, 900, 6267, 5216, 5571, 6997, 578, 5232, 1666, 5591, 5597, 8120,...
Test
2,468
4
Norton_Confidential:norton confidential norton confidential program designed encrypt passwords online detect phishing sites
[]
Test
2,469
8
Session_replay:session replay session replay ability replay visitor journey web site within mobile application web application replay include user view browser screen output user input keyboard mouse inputs logs network events console logs supposed help improve customer experience identify obstacles conversion processes websites however also used study web site usability customer behavior well handling customer service questions customer journey interactions replayed organizations even use capability analyse fraudulent behavior websites solutions augment session replay advanced analytics identify segments customers struggling use website means replay capability used much efficiently reduce need replay customer sessions unnecessarily generally two ways capture replay visitor sessions client side tag-free server side many tag-based solutions offer video-like replay visitors session replay analogous video accurately reproduction specific user experience mouse movements clicks taps scrolls underlying data session recordings captured tagging pages advanced tools able access dom directly play back interactions within dom including mutations high degree accuracy number tools provide similar functions advantage replay movie-like format full client experience also deal modern single-page applications disadvantage tracking script easily detected blocked ad blocker becomes normal 2017 615m devices active adblock solutions capture website traffic replay every visitor interaction every device including mobile users location sessions replayed step-by-step providing ability search locate analyse aspects visitors session including clicks form entry server-side solutions require hardware software installed premises advantage server-side recording solution ca n't blocked unfortunately wo n't able see video like replay client-side activities scrolling mouse movements deals badly modern single-page applications hybrid approach combines advantages without weaknesses hybrid approach ensures every session recorded important compliance server-side capturing enriched client-side tracking data mouse movements clicks scrolling key strokes user behavior driven customer experience insights works well modern single-page applications benefit movie-like replay additionally ensure 100 compliant capturing deployed either premises saas tools listed available software service saas solutions
[ 3857, 591, 4600, 330, 5467 ]
Train
2,470
7
Cross-platform_support_middleware:cross-platform support middleware cross-platform support middleware cpsm software abstraction layer guarantees existence correct implementation set services top set platforms abstraction method cpsm development method used compile concrete source code given platform without compromising abstract interfaces provided commonly used abstraction methods cpsm development conditional compilation directory separation sources first method consists embedding preprocessor instructions source code conditionally select source subtree compatible given platform second method takes advantage filesystem organization divide source code different folders one incompatible platform thus delegating selection problem build system distributions like msys cygwin may help build cross-platform code unix-like environment even microsoft windows distributions provide decent version gnu make direct build process cross-platform fashion
[ 4469, 7310, 6680, 2639 ]
Test
2,471
7
ReplicaNet:replicanet distributed computing distributed object systems designed allow software modules objects work together objects located different computers connected network interactive computer simulations computer games use object-oriented programming languages c++ maintain database entities player characters monsters tanks anything exist simulated world using object description language programmatically registering filter classes machine knows create update c++ class object object treated potential network shareable object machine allocates machine control c++ classes change variables call member functions normal object ready shared machines object published replicanet network session underlying replicanet software detects changes object automatically updates replicated classes machines connected network session changes made member variables c++ classes extrapolated replicanet using several pre-defined filters reduce amount network traffic transmitting changes object approach describing objects processed computers similar systems corba java remote method invocation distributed component object model 2011 game developer magazine announced replicanet 7.0 one networking finalists front line awards honors best networking middleware computer games industry game programming c++ start finish erik yuzwa http //gameprogrammingstarttofinish.wazooinc.com/ massively multiplayer game development 2 page 220 charles river media
[ 6989, 2109, 2054 ]
Validation
2,472
2
Windows_Me:windows windows millennium edition windows marketed pronunciation pronoun codenamed millennium graphical operating system developed microsoft part windows 9x family operating systems successor windows 98 released manufacturing june 19 2000 general availability september 14 2000 windows last operating system released windows 9x series targeted specifically home pc users included internet explorer 5.5 windows media player 7 new windows movie maker software provided basic video editing designed easy use home users microsoft also updated graphical user interface shell features windows explorer first introduced windows 2000 released business-oriented operating system seven months earlier windows could upgraded internet explorer 6 sp1 sp2 sv1 internet explorer 7 outlook express 6 sp1 windows media player 9 series microsoft .net framework including version 2.0 supported however versions 2.0 sp1 3.x greater office xp last version microsoft office compatible windows windows continuation windows 9x model still dos-based like predecessors restricted access real mode ms-dos order decrease system boot time october 2001 windows xp released became windows successor popularizing features introducing visual themes including reliable windows nt kernel 1998 microsoft stated would version windows 9x windows 98 may 1999 however microsoft released windows 98 second edition announced new version windows 9x later revealed codenamed millennium 2000 released windows millennium edition windows least three beta versions windows available development phase september 24 1999 microsoft announced windows millennium beta 1 released windows millennium beta 2 released november 24 1999 added couple new features system file protection game options control panel several interim builds released beta 1 2 added features automatic updates personalized menus beta 3 released april 11 2000 version marked first appearance final version startup shutdown sounds derived windows 2000 previous betas used windows 98 startup shutdown sounds final version boot screen first featured pre-beta 3 build 2470 general availability date windows millennium edition september 14 2000 launch time microsoft announced time-limited promotion september 2000 – january 2001 entitled windows 95 windows 98 users upgrade windows 59.95 instead regular retail upgrade price 109 shortly windows released manufacturing june 19 2000 microsoft launched campaign-initiative promote windows u.s. dubbed meet tour national partnered promotional program featured windows oems partners interactive multimedia attraction 25 cities across u.s launched september 14 2000 compared releases windows windows short shelf-life year microsoft aimed make first consumer windows os based nt kernel however happen windows rushed market neptune project canceled windows along windows 2000 eventually succeded nt-based windows xp launched august 24 2001 windows featured shell enhancements inherited windows 2000 personalized menus customizable windows explorer toolbars auto-complete windows explorer address bar run box windows 2000 advanced file type association features displaying comments shortcuts tooltips extensible columns details view icolumnprovider interface icon overlays integrated search pane windows explorer sort name function menus places bar common dialogs open save cascading start menu special folders plus 95 plus 98 themes updated graphics notification area windows later supported 16-bit high color icons multimedia control panel also updated windows 98 se taskbar start menu options allowed disabling drag drop feature could prevent moving resizing taskbar easier new users windows restricted support real mode ms-dos result codice_5 windows disregards codice_1 codice_21 codice_22 directly executes codice_23 default configuration system would neither boot ms-dos command prompt exit dos windows real mode drivers codice_24 could loaded older applications require real mode could run microsoft argued change improved speed reliability boot process windows codice_1 codice_2 files used set global environment variables two files present scanned settings relating environment variables commands present removed windows registry key see two files thus contain settings preferences configure global environment computer boot phase starting new virtual dos machine vdm specify edit startup values windows 98 would present codice_2 file user must edit following windows registry key troubleshooting crash recovery windows cd-rom windows startup disk user-createable floppy disk known emergency boot disk ebd allowed booting real mode ms-dos possible restore real mode dos functionality various unofficial means additionally registry setting exists re-enables restart ms-dos mode option shutdown dialog box unlike past versions windows 9x windows entirely aimed home users thus certain enterprise-oriented features removed several features predecessors work officially unsupported microsoft windows including automated installation active directory client services system policy editor personal web server asp features supported predecessors windows 98 windows 95 resource kit publication targeted towards system administrators never published windows features removed never updated work windows included microsoft fax quickview drivespace well gui fat32 conversion tool several windows explorer commands removed windows windows heavily panned many users critics mainly due stability issues due many bugs glitches windows considered one worst operating systems time pc world article dubbed windows mistake edition placed 4th worst tech products time feature 2006 article states shortly appeared late 2000 users reported problems installing getting run getting work hardware software getting stop running byron hinson julien jay writing activewin took appreciative look operating system removal real mode dos noted removal dos clearly made difference windows terms stability far less blue screens death seen booting speed greatly increased recommendation operating system upgrade users windows 95 98 stated windows n't revolutionary os clear microsoft focused efforts make user-friendly stable packed full multimedia options result great enhancements added really worth wait along windows 2000 nt family windows last version windows lacked product activation system restore suffered bug date-stamping functionality could cause system restore date-stamp snapshots taken 8 september 2001 incorrectly could prevent system restore locating snapshots cause system restore process fail microsoft released update fix problem one common errors startup shutdown computer would display blue screen death instead starting shutting well logo graphic failing load boot microsoft planned stop support windows december 31 2004 however order give customers time migrate newer windows versions particularly developing emerging markets microsoft decided maintain support july 11 2006 support windows 98 also ended date microsoft ended support products company considers obsolete running products expose users security risks 2011 microsoft removed update website windows updates site windows 98 windows 98 se also terminated year windows also contained microsoft java virtual machine caused well windows 98 windows 98 se pulled microsoft developer network end 2003 windows designed handle 512 mb ram default systems larger ram pools may lose stability however depending hardware software configuration sometimes possible manually tweak installation continue working somewhat larger amounts ram well systems 1.5 gb ram may reboot continuously startup windows windows spellings used referring operating system windows used microsoft pc world
[ 4291, 4293, 7161, 714, 6802, 2204, 4687, 1097, 5401, 6844, 6136, 5781, 5442, 4377, 5794, 444, 6504, 447, 448, 458, 4759, 7616, 1536, 818, 5480, 7263, 1213, 7660, 150, 2329, 3048, 157, 519, 3052, 6580, 7685, 3751, 1992, 3431, 6256, 204, ...
Train
2,473
3
First_Responder_Network_Authority:first responder network authority first responder network authority firstnet united states created middle class tax relief job creation act 2012 mctrjca independent authority within national telecommunications information administration ntia purpose firstnet establish operate maintain interoperable public safety broadband network fulfill objectives congress allotted 7 billion 20 mhz valuable radio spectrum build network first responder network authority board directors team 15 experts firstnet board established part middle class tax relief job creation act 2012 representatives include secretary homeland security attorney general director office management budget permanent members remaining members selected secretary commerce public safety technical network and/or financial expertise construction nationwide firstnet network requires state radio access network ran connect firstnet network core according mctrjca firstnet responsible consulting states local communities tribal governments develop requirements ran deployment plan efforts began may 2013 however state option either allow firstnet create ran opt create ran even state chooses opt receives approval federal communications commission fcc develop ran ran must use firstnet network core must meet firstnet requirements state receive fcc approval must demonstrate following abilities states meet criteria receive fcc approval may apply grant funding ntia calls nationwide broadband system came september 11 2001 federal government working toward system ever since time 9/11 attacks highlighted inability deployed public safety networks handle true crisis situation firstnet early stages creating first nationwide high-speed broadband wireless network providing single interoperable platform law enforcement firefighters paramedics public safety officials every state county locality tribal area. ” april 2016 article spokesman firstnet said “ firstnet going really revolutionize communications technology first responders next-generation technology ’ going save lives ’ going keep first responders safer make communities safer ’ going provide extra situational awareness people field. ” currently around 10,000 different incompatible “ land mobile radio networks first responders u.s. use jobs patchwork different systems get way first responders able effectively communicate emergencies states able opt firstnet new nationwide broadband network firstnet assists states providing guide helps states deploy communications networks interoperability systems federal communications commission national telecommunications information administration also involved coordinating broadband system u.s. senate hearing july 2016 senators brian schatz d-hawaii roger wicker r-mississippi expressed concern firstnet ceo testifying hearing various issues related national broadband system schatz said would rather see firstnet partner states instead establishing 'grantee-grantor relationship wicker said concerned 7 billion budget program enough funding august 2016 firstnet held border security forum phoenix arizona firstnet officials met federal local security officials discuss problems communications networks updates firstnet deployment national broadband wireless network firstnet representatives said lte technology data apps people smart phones help emergency responders public emergencies firstnet headquartered reston virginia technical headquarters boulder colorado authority board created public-private partnership march 2017 build firstnet december 2017 50 states opted network plan questions remained would deployed cost-effective firstnet characterized wasteful post-9/11 initiative journalist steven brill
[ 7585 ]
Test
2,474
5
BumperCar:bumpercar bumpercar mac os x web browser freeverse software aimed towards kids bumpercar contains extensive parental controls including filtering personal information blocking whitelists blacklists time limits full support icra tags version 2 based webkit well technologies omni group
[ 405, 5571 ]
Test
2,475
2
Flutter_(software):flutter software flutter open-source mobile application development framework created google used develop applications android ios well primary method creating applications google fuchsia first version flutter known codename sky ran android operating system unveiled 2015 dart developer summit stated intent able render consistently 120 frames per second keynote google developer days shanghai google announced flutter release preview 2 last big release flutter 1.0 december 4th 2018 flutter 1.0 released flutter live event denoting first stable version framework major components flutter include flutter apps written dart language make use many language advanced features android windows macos linux via semi-official flutter desktop embedding project flutter runs dart virtual machine features just-in-time execution engine due app store restrictions dynamic code execution flutter apps use ahead-of-time aot compilation ios notable feature dart platform support hot reload modifications source files injected running application flutter extends support stateful hot reload cases changes source code reflected immediately running app without requiring restart loss state feature implemented flutter received widespread praise flutter engine written primarily c++ provides low-level rendering support using google skia graphics library additionally interfaces platform-specific sdks provided android ios flutter engine portable runtime hosting flutter applications implements flutter core libraries including animation graphics file network i/o accessibility support plugin architecture dart runtime compile toolchain developers interact flutter via flutter framework provides modern reactive framework rich set platform layout foundation widgets foundation library written dart provides basic classes functions used construct applications using flutter apis communicate engine ui design flutter typically involves assembling and/or creating various widgets widget flutter represents immutable description part user interface graphics including text shapes animations created using widgets complex widgets created combining many simpler ones however use widgets strictly required build flutter apps alternative option use foundation library methods directly interfacing canvas commands draw shapes text imagery directly screen property flutter utilized frameworks open-source flame game engine flutter framework contains two sets widgets conform specific design languages material design widgets implement google design language name cupertino widgets imitate apple ios design
[ 2902, 3507, 4116, 5455, 6697, 4759, 4762, 3848, 3850, 5372, 7431, 7967, 6978, 6176, 993, 6427, 561, 7346, 201, 5476, 2107, 6002, 5302, 2569, 831, 578, 2037, 7007, 5141, 136, 2317, 2673, 8107, 3309, 2867, 7285, 6297, 2591, 2417, 2683, 79...
Test
2,476
4
WatchGuard:watchguard watchguard formally known watchguard technologies inc seattle washington-based network security vendor products designed protect computer networks outside threats malware ransomware company founded 1996 watchguard founded 1996 seattle software labs inc. first product network firewall called watchguard security management system included watchguard firebox firewall box security appliance along configuration administration software 1997 company changed name watchguard technologies inc july 1999 company went public nasdaq october 2006 company acquired 151 million private equity firms francisco partners vector capital bruce coleman brought interim ceo august 2007 joe wang became company permanent ceo replacing coleman may 2014 ceo wang stepped replaced interim ceo michael kohlsdorf operating partner francisco partners april 2015 kohlsdorf succeeded ceo prakash panjwani announced panjwani kohlsdorf joining watchguard board june 2016 company acquired hawkeye g threat-detection response technology hexis cyber solutions sensage part keyw holding corp october company launched watchguard wi-fi cloud extend network security wi-fi networks august 2017 watchguard acquired datablink provider multi-factor authentication software used secure laptops servers devices january 2018 company acquired percipient networks domain name system service provider july 2018 company announced application called authpoint designed provide multi-factor authentication security businesses company develops security products services businesses three product groups network security secure wi-fi multi-factor authentication network security devices categorized unified threat management utm whereby single device provides multiple security features devices include watchguard dimension network discovery tool allows administrators identify devices network including mobile devices watchguard cloud giving devices access online threat intelligence wi-fi product line consists secure indoor outdoor wave 1 wave 2 802.11ac wi-fi hardware security subscription services watchguard wi-fi cloud management platform used control devices multi-factor authentication group includes company authpoint application multi-factor authentication management reporting tool prevents unauthorized users accessing sensitive cloud applications vpns networks company also issues quarterly security report based feed data watchguard utm appliances installed customer sites report highlights type frequency malicious attacks occurring computer networks
[ 4591, 651, 7865, 2746, 5813, 1805 ]
Test
2,477
7
Open_Cloud_Computing_Interface:open cloud computing interface open cloud computing interface occi set specifications delivered open grid forum cloud computing service providers occi set implementations act proofs concept builds upon world wide web fundamentals using representational state transfer rest approach interacting services aim open cloud computing interface development open specification api cloud offerings focus infrastructure-as-a-service iaas based offerings interface extended support platform software service offerings well iaas one three primary segments cloud computing industry compute storage network resources provided services api based review existing service-provider functionality set use cases contributed working group occi boundary api acts service front-end iaas provider ’ internal infrastructure management framework occi provides commonly understood semantics syntax means management domain consumer-to-provider iaas covers management entire life-cycle occi-defined model entities compatible existing standards open virtualization format ovf cloud data management interface cdmi notably serves integration point standardization efforts including distributed management task force internet engineering task force storage networking industry association occi began march 2009 initially led sun microsystems rabbitmq complutense university madrid today working group 250 members includes numerous individuals industry academic parties occi operates umbrella open grid forum ogf using wiki mailing list collaboration implement specific extensions occi particular service iaas paas brokering etc several implementations announced released frameworks build occi apis complementing variety developer tools alternative approaches include use cloud infrastructure management interface cimi related standards set dmtf amazon web services interfaces amazon latter endorsed known standards organization opennebula conducted survey users results showed 38 expose cloud apis users interface sunstone gui 36 mostly use amazon web services api 26 mostly use opennebula ’ occi api occi api offered rocci
[ 2961, 868, 5064, 84, 737, 5539 ]
Test
2,478
4
SAINT_(software):saint software saint security administrator ’ integrated network tool computer software used scanning computer networks security vulnerabilities exploiting found vulnerabilities saint scanner screens every live system network tcp udp services service finds running launches set probes designed detect anything could allow attacker gain unauthorized access create denial-of-service gain sensitive information network saint provides support security content automation protocol scap specification unauthenticated vulnerability scanner authenticated vulnerability patch scanner saint also approved scanning vendor payment card industry pci four steps saint scan saint group vulnerabilities according severity type count also provide information particular host group hosts saint describes vulnerabilities locates references common vulnerabilities exposures cve cert advisories iava information assurance vulnerability alerts describes ways correct vulnerabilities many cases saint scanner provides links patches new software versions eliminate detected vulnerabilities vulnerability flaw system device application leveraged attacker could impact security system exploits take advantage vulnerability compromising destructing vulnerable system device application remediation process repairing providing remedy vulnerability thereby eliminating risk exploited vulnerability scanning used identify evaluate security posture network historically scanners developed specific purposes scanning windows desktops applications network devices saint offers heterogeneous scanning identifies vulnerabilities across operating systems desktop applications network devices web applications databases integrated penetration testing tool saintexploit demonstrates path attacker could use breach network quantifies risk network saintexploit includes web site emulator e-mail forgery tool penetration testing tools saint designed simulate internal external real-world attacks type testing identifies methods gaining access target understanding techniques used attackers many levels types penetration testing scope project well defined targets included scope could include popular protocols network devices databases web applications desktop applications various flavors operating systems saint focuses development exploits shell established shell shellcode exploits included offer command shell/direct connection target computer performing testing exploits target operating systems desktop applications databases web applications protocols network devices common exploit types included saintexploit include following • remote exploit – attacks launched across internet network vulnerable target without user previous access system • client exploit – victim must access attacker ’ resource successful attack take place common client exploits include e-mail forgery attacks enticing user visit web site open file • local exploit – order launch local attack attacker must previous access victim also known privilege elevation tunneling case victim machine used launch pad connecting vulnerable targets saint ’ remote management console saintmanager enables enterprise-wide vulnerability scanning browser-based console provides ability centrally manage entire network saint vulnerability scanners single interface saintcloud enables cloud based vulnerability scanning penetration testing compliance audits without download install software saint security administrator integrated network tool network vulnerability scanner based satan security administrator tool analyzing networks developed dan farmer wietse venema released 1995 saint corporation formerly world wide digital security inc. wwdsi continued development released saint july 1998 wwdsi changed name saint corporation january 2002 saint products developed saint corporation headquartered bethesda maryland
[ 3932, 1691, 7637, 2891, 1942, 3088, 6129, 1949, 5051 ]
Test
2,479
4
PoSeidon_(malware):poseidon malware poseidon name family malicious computer programs targeting computerized point-of-sale systems cisco talos computer security research laboratory discovered introduced family malware nickname poseidon security blog 20 march 2015 malware attempts steal keystrokes credit card numbers stored system memory scanning ram discover visa mastercard amex issued credit cards credit card data encrypted sent exfiltrated number predefined russian servers commercial remote administration software logmein installed logmein settings modified forcing next remote user enter username password allows username password read keylogger exfiltrated
[]
Test
2,480
4
YARA:yara yara name tool primarily used malware research detection provides rule-based approach create descriptions malware families based textual binary patterns description essentially yara rule name rules consist sets strings boolean expression language used traits perl compatible regular expressions yara originally developed victor alvarez virustotal name either abbreviation yara yet another recursive acronym yet another ridiculous acronym yara default comes modules process pe elf analysis well support open-source cuckoo sandbox
[ 5452, 5983, 3495, 7848, 3733 ]
Test
2,481
1
Visual_Expert:visual expert visual expert static program analyzer extracting design technical information software source code reverse-engineering used programmers software maintenance modernization optimization designed parse several programming languages time pl/sql transact-sql powerbuilder ... analyze cross-language dependencies addition language source code visual expert used several contexts
[ 7213, 1554, 5571, 1011, 4014, 7715, 7093 ]
Validation
2,482
4
Hashcash:hashcash hashcash proof-of-work system used limit email spam denial-of-service attacks recently become known use bitcoin cryptocurrencies part mining algorithm hashcash proposed 1997 adam back described formally back paper hashcash denial service counter-measure similar idea first proposed cynthia dwork moni naor eli ponyatovski 1992 paper pricing via processing combatting junk mail using weakened signature schemes rather simpler efficient hash-based approach introduced hashcash hashcash independent rediscovery proof work concept author aware dwork et al work hashcash cryptographic hash-based proof-of-work algorithm requires selectable amount work compute proof verified efficiently email uses textual encoding hashcash stamp added header email prove sender expended modest amount cpu time calculating stamp prior sending email words sender taken certain amount time generate stamp send email unlikely spammer receiver negligible computational cost verify stamp valid however known way find header necessary properties brute force trying random values answer found though testing individual string easy satisfactory answers rare enough require substantial number tries find answer hypothesis spammers whose business model relies ability send large numbers emails little cost per message cease profitable even small cost spam send receivers verify whether sender made investment use results help filter email header line looks something like header contains header contains recipient email address date message information proving required computation performed presence recipient email address requires different header computed recipient date allows recipient record headers received recently ensure header unique email message sender prepares header appends counter value initialized random number computes 160-bit sha-1 hash header first 20 bits i.e 5 significant hex digits hash zeros acceptable header sender increments counter tries hash 2 possible hash values 2 hash values satisfy criterion thus chance randomly selecting header 20 zeros beginning hash 1 2 approx 10 one million number times sender needs try get valid hash value modeled geometric distribution hence sender average try 2 values find valid header given reasonable estimates time needed compute hash would take one second find efficient method brute force approach known find valid header normal user desktop pc would significantly inconvenienced processing time required generate hashcash string however spammers would suffer significantly due large number spam messages sent technically system implemented following steps hash string passes tests considered valid hash string tests take far less time disk space receiving body content e-mail time needed compute hash collision exponential number zero bits zero bits added doubling amount time needed compute hash additional zero bit expensive spammers generate valid header lines confirming header valid always takes amount time matter many zero bits required valid header since requires single hashing operation hashcash system advantage micropayment proposals applying legitimate e-mail real money involved neither sender recipient need pay thus administrative issues involved micropayment system moral issues related charging e-mail entirely avoided hand hashcash requires potentially significant computational resources expended e-mail sent somewhat difficult tune ideal amount average time one wishes clients expend computing valid header mean sacrificing accessibility low-end embedded systems else running risk hostile hosts challenged enough provide effective filter spam hashcash also fairly simple implement mail user agents spam filters central server needed hashcash incrementally deployed—the extra hashcash header ignored received mail clients understand one plausible analysis concluded one following cases likely either non-spam e-mail get stuck due lack processing power sender spam e-mail bound still get examples include respectively centralized e-mail topology like mailing list server send enormous amount legitimate e-mails botnets cluster farms spammers increase processing power enormously issues may addressed e.g. botnets may expire faster users notice high cpu load take counter-measures mailing list servers registered white lists subscribers hosts thus relieved hashcash challenges represent serious obstacles hashcash deployment remain addressed another projected problem computers continue get faster according moore law difficulty calculations required must increased time however developing countries expected use older hardware means find increasingly difficult participate e-mail system also applies lower-income individuals developed countries afford latest hardware like hashcash cryptocurrencies use hash function proof-of-work system rise cryptocurrency created demand asic-based mining machines although cryptocurrencies use sha-256 hash function asic technology could used create hashcash solvers three orders magnitude faster consumer cpu reducing computational hurdle spammers contrast hashcash mail applications relies recipients set manually amount work intended deter malicious senders bitcoin cryptocurrency network employs different hashing-based proof-of-work challenge enable competitive bitcoin mining bitcoin miner runs computer program collects unconfirmed transactions coin dealers network data form block earn payment miner block accepted network miner discovers trial error nonce number included block yields hash sufficient number leading zero bits meet network difficulty target blocks accepted miners form bitcoin blockchain growing ledger every bitcoin transaction since coin first creation hashcash uses sha-1 hash requires first 20 160 hash bits zero bitcoin proof work uses two successive sha-256 hashes originally required least first 32 256 hash bits zero however bitcoin network periodically resets difficulty level keep average rate block creation 6 per hour january 2019 block 556678 bitcoin network responded deployments ever faster hashing hardware miners hardening requirement first 74 256 hash bits must zero hashcash used potential solution false positives automated spam filtering systems legitimate users rarely inconvenienced extra time takes mine stamp spamassassin able check hashcash stamps since version 2.70 assigning negative score i.e less likely spam valid unspent hashcash stamps however although hashcash plugin initially default still needs configured list address patterns must match hashcash resource field n't actually work default penny post software project sourceforge implements hashcash mozilla thunderbird email client project named historical availability conventional mailing services cost sender one penny see penny post information mailing services history microsoft also designed implemented deprecated open spec similar yet incompatible hashcash email postmark part coordinated spam reduction initiative csri microsoft email postmark variant hashcash implemented microsoft mail infrastructure components exchange outlook hotmail format differences hashcash microsoft email postmark postmark hashes body addition recipient uses modified sha-1 hash function uses multiple sub-puzzles reduce proof work variance like e-mail blogs often fall victim comment spam blog owners used hashcash scripts written javascript language slow comment spammers scripts wp-hashcash claim implement hashcash instead depend javascript obfuscation force client generate matching key require processing power use hashcash algorithm hashcash stamps hashcash patented reference implementation implementations free software hashcash included available many linux distributions rsa made ipr statements ietf client-puzzles context rfc described client-puzzles hashcash rfc included hashcash title referenced hashcash mechanism described known-solution interactive challenge akin client-puzzles hashcash non-interactive therefore known solution case rsa ipr statement apply hashcash hashcash predates march 1997 client-puzzles publication feb 1999 client-puzzles patent filing us7197639 february 2000
[ 6430, 1592, 2451, 3031, 1691, 1649, 7164, 3379, 7975, 744 ]
Test
2,483
1
Object_Exchange_Model:object exchange model object exchange model oem model exchanging semi-structured data object-oriented databases serves basic data model numerous projects stanford university database group including tsimmis lore c3 slight variations oem evolved across different stanford projects lore labels actually parent-child links rather objects example oem object multiple parents different parent objects may use different labels identify object atomic value encoding person name might included one complex object using label author another complex object using label editor c3 additional attributes required object annotate changes object occurred time textual oem interchange format used lore goals interchange format textual encodings oem easy read easy edit easy generate parse program
[]
Test
2,484
8
Peter_Zandan:peter zandan peter a. zandan born 1953 american entrepreneur field market research data science zandan currently global vice chairman hill+knowlton strategies leads company worldwide research operations founder intelliquest information group inc. austin-based global research firm served chairman ceo 1984 1998 taking company public 1996 intelliquest zandan pioneered use electronic surveys internet field market research 1999 zandan founded served ceo zilliant pricing optimization company zandan played active role austin texas community 2014 developed sponsored zandan poll annual survey among austin residents covers variety topics including economy affordability growth education policy issues overall cultural identity austin zandan currently member president circle national academies sciences engineering medicine zandan also serves board klru public television station austin texas member advisory council red mccombs school business ut austin moved austin 1970s zandan earned mba ph.d. evaluation research university texas austin born longmeadow massachusetts zandan received bachelor degree history university massachusetts 1975 latter half 1970s zandan moved mexico pursue international studies several years abroad returned united states earned mba ph.d. evaluation research 1983 university texas zandan founded first major company 1984 name intelliquest intelliquest focused changing way companies performed market research pioneering ‘ disk-by-mail ’ methodologies later utilizing internet based electronic surveys zandan served company chairman ceo 15 years intelliquest fastest growing market research company worldwide 1990s provided new product marketing branding services corporations apple ibm mckinsey co. microsoft hewlett-packard intelliquest provided marketing information technology companies direct marketing services internet marketers additionally supplied information tech markets subscription proprietary project basis zandan leadership intelliquest grew 500 employees offices austin silicon valley new york city london zandan took company public 1996 nasdaq exchange acquired wpp 1999 1998 company bought zandan stepped away day-to-day management operations company pursue interests 1998 peter zandan founded zilliant inc another austin-based corporation zilliant developed leader strategic pricing management providing software solutions enable corporations outline manage e-commerce pricing understood “ internet allows companies better understand customers preferences ” zandan helped develop flagship product called zilliant intelligent pricing solution zips tested real-time customer pricing behavior monitored activity market opportunities offering business-to-business predictive pricing sales applications zilliant grew quickly continues operate successfully peter zandan currently global vice chairman hill+knowlton strategies developed firm reputation management communications research offerings zandan provided assistance international brand development clients financial services energy technology healthcare retail industries specifically zandan leads research+data insights rdi corporation underneath umbrella organization hill+knowlton strategies zandan helped rdi yield data-based insights deliver metrics counsel brand health communication data analytics june 2013 zandan selected member president circle national academy science purpose president circle engage leaders various scientific disciplines engineering medicine effort ensure intellectual financial resources sustain/enhance research president circle honorary association membership acquired invitations presidents three academies along honored 1998 lifetime member mccombs business school advisory council starting zandan served board public television station klru since year also invested advised new media companies including wize inc. klout sold lithium technologies next big sound sold pandora peter zandan angel investing companies next big sound allowed continue remain active part startup company scene peter zandan impacted austin community social analytics work external involvement zandan poll annual report surveys austin-area residents assess attitudes community economy health transportation city longtime citizen austin zandan watched community grow years wanted create objective tool measure austinites felt community evolving zandan provides gift austin community help klru hill+knowlton strategies rdi cambia information group poll expanded areas “ cultural identity ” affordability order increase understanding dialogue key community issues zandan also received austin “ soul city ” business award contributions community co-chair austin 360 summit one-day issues conference austin high-tech executives additionally chairs austin city limits committee member board directors klru-tv growing intelliquest one fastest-growing market research firms 1990s peter zandan received ernst young entrepreneur year award 1993 high technology electronics award represents elite corp men women recognized exceptional entrepreneurial achievements due extensive work austin area peter zandan also awarded “ best visionary ” award austin chronicle weekly newspaper austin texas
[ 3764, 3814 ]
Test