node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
2,485 | 4 | DDoS_attacks_during_the_October_2011_South_Korean_by-election:ddos attacks october 2011 south korean by-election ddos attacks october 2011 south korean by-election allegedly two separate distributed denial-of-service ddos attacks occurred october 26 2011 attacks took place october 2011 seoul mayoral by-election targeted websites national election commission nec then-mayoral candidate park won-soon investigators assert attacks carried hopes suppressing young voters benefit grand national party aide grand national party legislator choi gu-sik found responsible attacks attacks consisted two separate denial-of-service attacks independent national election commission mayoral candidate park won-soon carried help botnet 200 infected computers attacks conducted morning citizens -- particularly young voters looking vote work -- would expected look polling station locations theorized attacks conducted belief may reduce voter turnout benefit grand national party candidate na kyung-won police stated attack nec lasted two hours specifically impacting part website information polling locations park won-soon website attacked twice day national police agency later revealed aide grand national part lawmaker referred media surname gong responsible two attacks national police agency later arrested gong four associates researchers however questioned official narrative doubts raised whether gong technical expertise resources pull attack others pointed ddos attack would unusual parts website offline online suggesting perhaps technical failure instead events caused collective panic amongst gnp members often denounce online activities south korean progressives exposure role attacks led choi gu-sik officially resigning position lawmaker along several members gnp wake scandal reformists conservative grand national party put pressure core members party closely affiliated lee myung-bak government turn led park geun-hye brought back spotlight reorganize gnp 30 university student associations made joint statement calling thorough investigation attacks | [] | Test |
2,486 | 4 | Compartmentalization_(information_security):compartmentalization information security compartmentalization information security whether public private limiting access information persons entities need-to-know basis perform certain tasks originated handling classified information military intelligence applications dates back antiquity successfully used keep secret greek fire basis compartmentalization idea fewer people know details mission task risk likelihood information compromised fall hands opposition decreased hence varying levels clearance within organizations exist yet even someone highest clearance certain compartmentalized information identified codewords referring particular types secret information may still restricted certain operators even lower overall security clearance information marked way said codeword–classified one famous example ultra secret documents marked top secret ultra top secret marked security level ultra keyword restricted readership cleared read ultra documents compartmentalization also used commercial security engineering technique protect information medical records example compartmentalization manhattan project personnel oak ridge constructed operated centrifuges isolate uranium-235 naturally occurring uranium know exactly knew know parts weapon separately designed teams know parts interacted | [
7570,
1972,
4834
] | Test |
2,487 | 5 | Java_Naming_and_Directory_Interface:java naming directory interface java naming directory interface jndi java api directory service allows java software clients discover look data resources form java objects via name like java apis interface host systems jndi independent underlying implementation additionally specifies service provider interface spi allows directory service implementations plugged framework information looked via jndi may supplied server flat file database choice implementation used typical uses jndi include java rmi java ee apis use jndi api look objects network api provides spi portion allows support practically kind naming directory service including sun microsystems first released jndi specification march 10 1997. current version jndi 1.2 jndi java naming directory interface organizes names hierarchy name string com.example.ejb.mybean name also object implements codice_1 interface however string common way name object name bound object directory storing either object reference object directory service identified name jndi api defines context specifies look object initial context typically used starting point simplest case initial context must created using specific implementation extra parameters required implementation initial context used look name initial context analogous root top directory tree file system example creating initial context context used look previously bound names context example alternative code context object also configured adding jndi.properties file classpath containing initial context factory class name provider url code reduced shown context used look previously bound names context example attributes may attached special entries called directories directories enable searching objects associated attributes directories type context restrict name space much like directory structure file system | [
3077,
631,
7347,
7459,
3879,
2043,
2517,
2519,
2520,
6319,
2619,
4287
] | Test |
2,488 | 4 | Blue_Coat_Systems:blue coat systems blue coat systems company provided hardware software services designed cybersecurity network management 2016 acquired folded symantec company known cacheflow 2002 company broad security portfolio including hardware software services company best known web gateway appliances scan internet traffic security threats authenticate users manage encrypted traffic well products monitor filter employee internet activity also produced consumer products parental control software company products initially sold internet service providers later products intended large companies march 1996 company founded cacheflow inc. redmond washington michael malcolm computer scientist professor university waterloo joe pruskowski doug crow company initially raised 1 million seed money dozen angel investors company goal develop appliances would increase website speed storing frequently accessed web data cache october 1996 benchmark capital purchased 25 company 2.8 million equivalent price 87.5 cents per share february 1997 company raised 5.1 million december 1997 u.s. venture partners acquired 17 company 6 million 1997 company moved headquarters silicon valley january 1998 company released first product cacheflow 1000 cached website objects users likely use repeatedly increase load speed october 1999 cacheos operating system released april 1998 company released cacheflow 100 mid-1998 dot-com bubble company made first sales earning 809,000 three months investors started pushing initial public offering ipo march 1999 technology crossover ventures invested 8.7 million 7 company equivalent price 4.575 per share september 1999 company released cacheflow 500 list price 9,995 competitive review caching appliances pc magazine gave cacheflow 500 editor choice editor said excellent performance plug-and-go setup good management tools review noted noteworthy features dns caching object pipelining techniques allowed page data delivered parallel rather sequential streams early november 1999 marc andreessen invested 3.1 million shares price 11.04 per share november 19 1999 peak dot-com bubble company became public company via initial public offering raising 132 million shares rose fivefold first day trading however company profitable product unproven time company 3.6 million revenue 6.6 million losses prior 3 months company initially hoped price shares 11-13 raise 50 million due strong demand priced shares 26 one month later traded high 182 1999 board directors member andrew rachleff benchmark capital investor brought brian nesmith sold company ipsilon networks nokia 120 million chief executive officer 2000 introduced cacheflow server accelerator product family offloads content delivery tasks web servers tests network world found server accelerator 725 increased website load speed eight-fold cacheflow client accelerator 600 product family also introduced 2000 company first product family corporate networks caching web multimedia content directly corporate network revenues grew 7 million 1998 29 million 1999 97 million 2001 already 25 overall market caching 35 caching appliance market still profitable march 2000 company integrated products akamai technologies may 2000 company updated cacheflow os cache multimedia content including realnetworks realsystem microsoft windows media apple quicktime formats june 2000 company acquired springbank networks internet device company 180 million december 2000 company acquired entera digital content streaming company 440 million 2001 new features specifically streaming media introduced name ciq later 2001 company renamed blue coat systems focus security appliances simultaneously released sg800 appliance sat behind corporate firewalls filter website traffic viruses worms harmful software custom operating system called security gateway provided many security features partners like symantec trend micro company lost 97 value october 2000 march 2001 dot-com bubble burst company continued lose money 2002 several competing internet caching companies abandoned market due slow adoption caching technology cacheflow revenues came security products february 2002 company closed redmond wa office laid 60 workers around dozen redmond workers offered transfers sunnyvale ca office april 2002 company launched fifth version operating system security gateway 600/6000 series company newest product family range security features authentication internet use policies virus scanning content filtering bandwidth restrictions streaming video applications august 2002 company started adding security features also august 2002 company changed name blue coat systems new name intended evoke image police officer guard focusing internet security appliances products primarily used control monitor secure internet use employees example company could limit employee access online gaming video streaming well scan attachments viruses shift focus followed smaller losses revenues first eventually company growth losses 2002 rename 247 million half prior year losses 2003 company 250 employees 150 million annual revenue 2003 3 new products introduced small medium-sized businesses smbs 50 100 250 users bundles websense secure computing although websense partnership later least partially dismantled two vendors slinging mud var community followed second generation proxysg product family added security features instant messaging review eweek said new proxysg line effective easy deploy ongoing maintenance fees expensive october 2003 company acquired ositis software maker antivirus appliances 1.36 million july 2004 company acquired cerberian url filtering company 17.5 million 2005 company introduced anti-spyware appliance called spyware interceptor following year announced upcoming wan optimization products followed ssl-vpn security appliances secure remote connections 2005 company profitable first time 2006 company introduced free web-tool k9 web protection monitor internet traffic block certain websites identify phishing scams november 2008 review pc world gave 4.25 5 stars march 2006 company acquired permeo technologies end point security company 60 million june 2006 company acquired netcache assets netapp involved proxy caching 30 million june 2008 company acquired packeteer engaged wan optimization 268 million 2009 company introduced plugin packetshaper throttle applications spotify review packetshaper 12000 pro gave four five stars review said wo n't find superior wan traffic management anywhere else hardware platform could date considering price november 2009 company went restructuring included layoffs 280 1,500 employees closing facilities latvia new jersey netherlands february 2010 company acquired s7 software solutions research development firm based bangalore 5.25 million august 2010 michael j. borman named president ceo company august 2011 ceo michael borman fired failing meet performance goals replaced greg clark december 2011 thoma cressey bravo acquired company 1.3 billion march 2012 david murphy named chief operating officer president company december 2012 company acquired crossbeam systems maker x-series security appliances may 2013 company acquired solera networks involved big data security december 2013 company acquired norman shark anti malware firm 2014 elastica technology incorporated blue coat products audit subscription service merged blue coat appfeed proxysg gateways june 2015 company acquired perspecsys involved cloud security also march 2015 company integrated technologies acquisitions norman shark solera networks create cloud-based product family called global intelligence network also march 2015 company pressured security researcher raphaël rigo canceling talk syscan '15 although raphaël talk contain information vulnerabilities proxysg platform company still cited concerns talk going provide information useful ongoing security assessments proxysg blue coat canceling talk met harsh criticism various prominent security researchers professionals alike generally welcome technical information various security products widely used march 2015 bain capital acquired company thoma bravo 2.4 billion bain indicated hoped launch another ipo several months later anonymous sources said company looking investment banks purpose august 2015 company launched alliance ecosystem endpoint detection response edr share information security threats across vendors companies first channel program started march cloud ready partner program announced following april november 2015 company acquired elastica involved cloud security 280 million 2015 company 200 million annual profits 600 million revenues 50 increase 2011 june 2 2016 company filed plans initial public offering however june 13 2016 company abandoned ipo plans announced symantec agreed acquire company 4.65 billion acquisition completed august 1 2016 company products integrated symantec blue coat ceo greg clark named ceo symantec blue coat coo michael fey named president coo symantec blue coat devices known dual-use technology used defend corporate networks governments censor monitor public internet traffic appliances see types encrypted traffic block websites record website traffic october 2011 u.s. government examined claims made telecomix hacktivist group syria using blue coat systems products internet censorship telecomix released 54gb log data alleged taken 7 blue coat web gateway appliances depict search terms including israel proxy blocked country using appliances company later acknowledged systems used syria asserted equipment sold intermediaries dubai use iraqi governmental agency despite systems consistently sending heartbeat pings directly back blue coat company claimed monitoring logs identify country appliance communicating blue coat announced would halt providing updates support services systems operating syria april 2013 bureau industry security announced 2.8 million civil settlement computerlinks fzco dubai reseller violations export administration regulations related transfer syria blue coat products april 2013 blue coat systems personnel caught red handed monitoring tracking commenting edward snowden articles authored glenn greenwald guardian company devices also used block public viewing certain websites bahrain qatar u.a.e. among others 2013 citizen lab published 3 reports regarding company devices found countries known using technology violate human rights identified 61 countries using blue coat devices including known censoring surveilling citizens internet activity china egypt russia venezuela however remains unclear exactly technologies used experts say tools could empower repressive governments spy opponents | [
5452,
3842,
803,
6419,
5552,
7522,
4398,
3777,
5560,
1640,
4138,
909,
4596,
7506,
2032,
7738,
5401,
1666,
1863,
3393,
5856,
1583,
6842,
7762,
689,
5700,
4828,
4645,
3338,
7597,
6962
] | Test |
2,489 | 4 | Identity_management:identity management identity management idm also known identity access management iam framework policies technologies ensuring proper people enterprise appropriate access technology resources idm systems fall overarching umbrella security data management identity access management systems identify authenticate authorize individuals utilizing resources also hardware applications employees need access identity access management solutions become prevalent critical recent years regulatory compliance requirements become increasingly rigorous complex addresses need ensure appropriate access resources across increasingly heterogeneous technology environments meet increasingly rigorous compliance requirements terms identity management idm identity access management used interchangeably area identity access management identity-management systems products applications platforms manage identifying ancillary data entities include individuals computer-related hardware software applications idm covers issues users gain identity roles sometimes permissions identity grants protection identity technologies supporting protection e.g. network protocols digital certificates passwords etc. identity management idm task controlling information users computers information includes information authenticates identity user information describes information actions authorized access and/or perform also includes management descriptive information user information accessed modified managed entities typically include users hardware network resources even applications digital identity entity online presence encompassing personal identifying information pii ancillary information see oecd nist guidelines protecting pii interpreted codification identity names attributes physical instance way facilitates processing real-world context engineering online systems identity management involve four basic functions general model identity constructed small set axioms example identities given namespace unique identities bear specific relationship corresponding entities real world axiomatic model expresses pure identity sense model constrained specific application context general entity real virtual multiple identities identity encompass multiple attributes unique within given name space diagram illustrates conceptual relationship identities entities well identities attributes theoretical practical models digital identity given identity object consists finite set properties attribute values properties record information object either purposes external model operate model example classification retrieval pure identity model strictly concerned external semantics properties common departure pure identity practice occurs properties intended assure aspect identity example digital signature software token model may use internally verify aspect identity satisfaction external purpose extent model expresses semantics internally pure model contrast situation properties might externally used purposes information security managing access entitlement simply stored maintained retrieved without special treatment model absence external semantics within model qualifies pure identity model identity management defined set operations given identity model generally set capabilities reference practice identity management often expands express model contents provisioned reconciled among multiple identity models user access enables users assume specific digital identity across applications enables access controls assigned evaluated identity use single identity given user across multiple systems eases tasks administrators users simplifies access monitoring verification allows organizations minimize excessive privileges granted one user user access tracked initiation termination user access organizations deploy identity management process system motivation normally primarily manage set identities rather grant appropriate access rights entities via identities words access management normally motivation identity management two sets processes consequently closely related organizations continue add services internal users customers many services require identity management properly provide services increasingly identity management partitioned application functions single identity serve many even organization activities internal use identity management evolving control access digital assets including devices network equipment servers portals content applications and/or products services often require access extensive information user including address books preferences entitlements contact information since much information subject privacy and/or confidentiality requirements controlling access vital name implies identity federation comprises one systems federate user access allow users log based authenticating one systems participating federation trust several systems often known circle trust setup one system acts identity provider idp system acts service provider sp user needs access service controlled sp he/she first authenticates idp upon successful authentication idp sends secure assertion service provider saml assertions specified using mark language intended describing security assertions used verifier make statement relying party identity claimant saml assertions may optionally digitally signed addition creation deletion modification user identity data either assisted self-service identity management controls ancillary entity data use applications contact information location putting personal information onto computer networks necessarily raises privacy concerns absent proper protections data may used implement surveillance society social web online social networking services make heavy use identity management helping users decide manage access personal information become issue broad concern identity theft happens thieves gain access identity information personal details needed get access bank account research related management identity covers disciplines technology social sciences humanities law within seventh research framework programme european union 2007 2013 several new projects related identity management started picos project investigates develops state-of-the-art platform providing trust privacy identity management mobile communities primelife develops concepts technologies help individuals protect autonomy retain control personal information irrespective activities swift focuses extending identity functions federation network addressing usability privacy concerns leverages identity technology key integrate service transport infrastructures benefit users providers ongoing projects include future identity information society fidis guide prime academic journals publish articles related identity management include less specialized journals publish topic instance special issues identity iso specifically iso/iec jtc1 sc27 security techniques wg5 identity access management privacy techniques conducting standardization work identity management elaboration framework identity management including definition identity-related terms published standards current work items includes following organization normally role department responsible managing schema digital identities staff objects represented object identities object identifiers oid | [
1998,
8157,
7608,
1625,
2185,
6795,
803,
3357,
5556,
4770,
6986,
1368,
4237,
5392,
921,
5135,
3794,
5582,
7368,
661,
2489,
406,
3884,
5149,
4261,
59,
3227,
1505,
7865,
5702,
3589,
2973,
3923,
1805,
1436
] | Test |
2,490 | 4 | Tõnu_Samuel:tõnu samuel tõnu samuel born 3 july 1972 estonian hacker commonly cited mainstream media topics regarding network security samuel born tallinn 1979 1988 attended tallinn secondary science school 1990–1992 took courses business financial management career programmer began 1991 working estonian ministry communication 2011 samuel moved work japan lived 10 years räpina southeastern estonia | [
651,
3486
] | Test |
2,491 | 4 | Logic_bomb:logic bomb logic bomb piece code intentionally inserted software system set malicious function specified conditions met example programmer may hide piece code starts deleting files salary database trigger ever terminated company software inherently malicious viruses worms often contain logic bombs execute certain payload pre-defined time condition met technique used virus worm gain momentum spread noticed viruses attack host systems specific dates friday 13th april fools day trojans computer viruses activate certain dates often called time bombs considered logic bomb payload unwanted unknown user software example trial programs code disables certain functionality set time normally regarded logic bombs reported 1982 trans-siberian pipeline incident occurred logic bomb later reported story may hoax kgb operative reported stolen plans sophisticated control system software canadian firm use siberian pipeline central intelligence agency cia supposedly tipped documents farewell dossier company insert logic bomb program sabotage purposes | [
1710,
623,
3932,
6694,
6515,
3681,
3448,
2105,
1461,
651,
2566,
6725,
2747,
5485,
575,
1376,
7050,
3794,
5401,
2310,
6823,
5149,
6376,
3726,
7287,
1584,
598,
4440,
6756,
3997,
3486,
1594,
2789,
74,
7865,
7319,
3680,
1805
] | Test |
2,492 | 2 | Microsoft_Venus:microsoft venus microsoft venus aborted venture microsoft low-end personal computing market people republic china product set-top operating system designed work low-end televisions somewhat similar msn tv united states announced then-microsoft chairman bill gates march 10 1999 shenzhen made available january 2000 never made microsoft lab however slowly dying less year announcement relatively little known microsoft venus since project never made beyond prototype stage designed exclusive people republic china known project appears show microsoft designed venus response largely untapped chinese computing market low-end set-top box designed combination internet accessibility basic features personal computer rudimentary word processor hoped tap market gaining market share profit world fastest-growing economy process despite initial support chinese government — included limited discounts assorted subsidies — lucrative distribution agreements acer philips lenovo companies planned venture faced many problems largest massive cost overrun units reported sell 3,000 yuan us 360 time large sum general chinese public 1999 progressed 2000 began chinese government relations microsoft continued sour production costs venus tension reached fever pitch january 2000 chinese government ordered windows 2000 uninstalled ministerial computers opting use locally produced red flag linux instead january 2000 passed without venus release product remained vaporware microsoft aforementioned brief showdown chinese government month talk venus appears ceased news media venus never released went microsoft attempt selling low-cost computing chinese masses microsoft first attempt bringing computing chinese masses failure later events proved favorable company lenovo purchase ibm windows-based computing division 2005 gave consumer electronics corporation partially owned chinese government strong presence windows computing market home china abroad persisted since initial acquisition however lenovo computers full-fledged pcs bear strong resemblance all-in-one television component microsoft envisioned becoming large success china according reuters account initial unveiling venus prototype box intended combine internet browser rudimentary word processing graphic design suite cd player one set-top television component gates touted computer learning capabilities ability intended combined contract forty chinese governmental ministries produce application known government online would served stated purpose bringing chinese bureaucracy closer masses microsoft reportedly intended venus boxes run special version windows ce fine-tuned display television sets exact processor speeds never released microsoft believed comparable low-end windows computers time | [
3076,
8054,
4759,
7619,
8076,
5563,
5571,
6110,
224,
3028,
6294,
7660,
7848,
8118,
432,
6054
] | Test |
2,493 | 4 | CERIAS:cerias center education research information assurance security cerias purdue university united states center research education areas information security computing communication infrastructures research focused following areas cerias one world ’ leading academic institutions area one nsf original seven centers academic excellence information assurance education cerias rooted coast research group computer operations audit security technology established 1991 computer sciences department purdue research groups professors eugene spafford samuel wagstaff jr.. coast initially funded sun microsystems schlumberger bell northern research bnr nortel hughes research laboratories coast subsumed cerias january 1 1999 | [
3143,
3742,
7641
] | Validation |
2,494 | 3 | Thermal_Head:thermal head thermal head component metrological device created aid development new cpus chipsets first thermal head constructed 1996 james kerner initially designed control slot 1 intel processor temperature making computations test platform thermal head attached cpu may also increase cpu performance computation today used test/validation processor conjunction thermal management system consisting temperature controller attached thermal head way electrical umbilical thermal head always used conjunction thermal tool system among ustc thermal tool system products integrated thermal management system itms hybrid air thermal management system hatms rack integrated thermal management system ritms temperature control system tcs thermal heads th integrating cooling modules tcs one enclosure liquid working fluid combined th itms executes temperature control tasks without components using air cooling media hatms executes tasks like itms ritms includes smart tcs unit automatically adjusts parameters temperature control ultra-low noise level low power consumption tcs standard temperature control unit th dissipate heat heat-generated device like computer ritms tcs combined chiller heat exchanger th provide standard way control temperature dissipate heat electronic components production validation tests | [
2685
] | Train |
2,495 | 4 | Physical_access:physical access physical access term computer security refers ability people physically gain access computer system according gregory white given physical access office knowledgeable attacker quickly able find information needed gain access organization computer systems network physical access opens variety avenues hacking michael meyers notes best network software security measures rendered useless fail physically protect systems since intruder could simply walk server crack password leisure physical access also allows hardware keyloggers installed intruder may able boot cd external media read unencrypted data hard drive may also exploit lack access control boot loader instance pressing f8 certain versions microsoft windows booting specifying 'init=/bin/sh boot parameter linux usually done editing command line grub etc one could also use rogue device access poorly secured wireless network signal sufficiently strong one might even need breach perimeter security standards united states typically call physical access limited locked server rooms sign-in sheets etc physical access systems security systems historically administered separate departments organizations increasingly seen interdependent functions needing single converged security policy department could instance check security log entries suspicious logons occurring business hours use keycard swipe records building access control system narrow list suspects building time surveillance cameras might also used deter detect unauthorized access | [
454,
1987,
6419,
1805
] | Test |
2,496 | 3 | DOPIPE:dopipe dopipe parallelism method perform loop-level parallelism pipelining statements loop pipelined parallelism may exist different levels abstraction like loops functions algorithmic stages extent parallelism depends upon programmers ability make best use concept also depends upon factors like identifying separating independent tasks executing parallelly main purpose employing loop-level parallelism search split sequential tasks program convert parallel tasks without prior information algorithm parts data recurring consume significant amount execution time good candidates loop-level parallelism common applications loop-level parallelism found mathematical analysis uses multiple-dimension matrices iterated nested loops different kind parallelization techniques used basis data storage overhead degree parallelization data dependencies known techniques doall doacross dopipe doall technique used parallelize iteration loop without interaction iterations hence overall run-time gets reduced n serial processor execution time iteration since n iterations executed parallel doacross technique used wherever possibility data dependencies hence parallelize tasks manner data independent tasks executed parallel dependent ones executed sequentially degree synchronization used sync dependent tasks across parallel processors dopipe pipelined parallelization technique used programs element produced iteration consumed later iteration following example shows implement dopipe technique reduce total execution time breaking tasks inside loop executing pipelined manner breaking tasks takes place way dependencies within loop unidirectional i.e following iteration depend previous iteration program shows pseudocode dopipe parallelization code see three tasks f0 f1 f2 inside loop iterating codice_1 1 codice_2 following list dependencies code f1 j → f1 j+1 implies statement f1 iteration codice_3 must executed statement f1 iteration codice_1 also known true dependency f1 j → f2 j implies statement f2 iteration codice_1 must executed statement f1 iteration codice_1.if code would executed sequentially total time consumed would equal n denote execution time functions f0 f1 f2 respectively per iteration parallelize loop pipelining statements inside loop following manner since f0 independent function i.e loop-carried dependency dependence codice_3 codice_8 iterations neither dependency across statements loop hence completely separate function run parallelly using doall parallelism hand statements f1 f2 dependent explained therefore split two different loops execute pipelined fashion use codice_9 codice_10 synchronize f1 f2 loops starting first iteration codice_1 statement f1 gets executed time meanwhile f2 getting executed since waiting value codice_12 produced f1 f1 completes execution iteration codice_1 posts value using codice_9 waiting f1 execution using codice_10 f2 starts execution since value codice_12 available use also since f1 execution restricted f2 hence f1 executes codice_3 simultaneously figure shows execution timeline statements figure see total time execute f0 since iterations f0 executed parallel f1 f2 total execution time equal n considering negligible synchronization time considerably less time obtained sequential execution doall parallelism mainly works principle divide conquer tasks run different iterations use unique set data problem implementation large amount data works computed together large cache space needed work different threads since dependencies threads overhead inter thread communication dopipe synchronization overhead threads due pipelined structure requires less cache space data produced immediately consumed consumer | [
5947,
1640
] | Test |
2,497 | 3 | BurgerTime:burgertime united states data east usa licensed burgertime distribution bally midway standard dedicated arcade game data east also released version burgertime united states deco cassette system data east midway versions distinguished manufacturer name title screen marquee cabinet artworks game identical game original japanese title changed outside japan burgertime reportedly avoid potential trademark issues addition releases western world burgertime also name used japanese ports sequels data east went bankrupt 2003 g-mode bought data east intellectual properties including burgertime burgertime deluxe super burgertime peter pepper ice cream factory object game complete number hamburgers avoiding enemy foods player controls protagonist chef peter pepper four-position joystick button board consists maze planks ladders giant burger ingredients buns patties lettuce/tomato etc laid peter walks full length ingredient falls level knocking ingredient happens burger completed vertically aligned ingredients dropped maze onto waiting plate player must complete burgers finish board three types enemy food items wander maze mr hot dog mr. pickle mr egg player score extra points either crushing falling ingredient dropping ingredient standing latter case ingredient falls two extra levels every enemy caught crushed dropped enemies return maze short time start game player given limited number pepper shots use enemies pressing button causes peter shake cloud pepper direction facing enemy touching cloud stunned seconds peter safely move bonus food items coffee ice cream appear occasion awarding bonus points one extra pepper shot collected six boards increasing difficulty burgers/ingredients enemies and/or layouts make easier peter become cornered enemies player completes sixth board cycle repeats player loses one life whenever peter touches non-stunned enemy lives lost game mattel electronics obtained rights burgertime data east released intellivision version 1983 year also released versions atari 2600 ibm pc apple ii aquarius 1984 mattel produced colecovision version distributed coleco data east produced version ti-99/4a 1983 famicom 1985 msx 1986 nes 1987 burgertime received certificate merit category 1984 videogame year less 16k rom 5th annual arkie awards deseret news called burgertime one real surprises 1983 intellivision gave colecovision version three one half stars arcade spin-off peter pepper ice cream factory 1984 arcade sequel 1990 widely released super burgertime stars peter pepper jr. allows two players play fairly true original many added features greatly improved graphics console-only sequel diner created 1984 purchase intellivision mattel intv corp programmed ray kaestner programmer intellivision version burgertime diner peter pepper must kick balls food roll platforms ramps land large plate bottom screen avoiding crushing enemy food items trying stop burgertime deluxe released game boy 1991 namco released burgertime delight mobile devices 2007 includes new graphics characters power-ups six arcade levels eight enhanced mode levels perils falling ice rising fire grill besides pepper classic game salt shaker collected stuns enemies screen 3d update burgertime world tour released 2011 xbox live arcade playstation network 2012 wiiware delisted xbox live arcade april 30 2014 arcade version burgertime included various collections including arcade greatest hits midway collection 2 playstation data east arcade classics wii nes version available wii virtual console burgertime deluxe released 3ds virtual console 2011 nes version also included 2017 compilation data east all-star collection nintendo entertainment system clones home systems include mr. wimpy burger chase burger time interceptor micros burgerspace chip factory burger boy basic burger barmy burgers burger builder lunchtime peter pepper appeared movies wreck-it ralph pixels elements burgertime episode gameboy 1984 billy mitchell achieved record score 7,881,050 beaten september 5 2005 bryan l. wagner turbotville pennsylvania score 8,601,300 improved exactly 9,000,000 june 2 2006 according twin galaxies improved 11,512,500 points september 19 2008 challenge arcade wyomissing pennsylvania mame world record verified twin galaxies december 2 2016 7,837,750 roger edwin blair iii mountain city tennessee | [
6380
] | Test |
2,498 | 2 | Mobile_Internet_device:mobile internet device mobile internet device mid multimedia-capable mobile device providing wireless internet access designed provide entertainment information location-based services personal business use allow 2-way communication real-time sharing described filling niche smartphones tablet computers features mid started becoming available smartphones tablets term mostly used refer low-end well high-end tablets form factor mobile internet tablets archos similar lenovo image right class included multiple operating systems windows ce windows 7 android android tablet uses arm cortex cpu touchscreen intel announced prototype mid intel developer forum spring 2007 beijing mid development kit sophia systems using intel centrino atom announced april 2008 intel mid platforms based intel processor chipset consume less power x86 derivatives platforms announced listed intel first generation mid platform codenamed mccaslin contains 90 nm intel a100/a110 processor codenamed stealey runs 600–800 mhz 2 march 2008 intel introduced intel atom processor brand new family low-power processor platforms components thin small designs work together enable best mobile computing internet experience mobile low-power devices intel second generation mid platform codenamed menlow contains 45 nm intel atom processor codenamed silverthorne run 2.0 ghz system controller hub codenamed poulsbo includes intel hd audio codenamed azalia platform initially branded centrino atom practice discontinued q3 2008 intel third generation mid/smartphone platform codenamed moorestown contains 45 nm intel atom processor codenamed lincroft 65 nm platform controller hub codenamed langwell since memory controller graphics controller integrated processor northbridge removed processor communicates directly southbridge via dmi bus interface intel fourth generation mid/smartphone platform codenamed medfield contains 32 nm intel atom soc codenamed penwell intel mid/smartphone platform codenamed clover trail+ based clover trail tablet platform contains 32 nm intel atom soc codenamed cloverview intel fifth generation mid/smartphone platform codenamed merrifield contains 22 nm intel atom soc codenamed tangier intel sixth generation mid/smartphone platform codenamed moorefield contains 22 nm intel atom soc codenamed anniedale intel seventh generation mid/smartphone platform codenamed morganfield contains 14 nm intel atom soc codenamed broxton intel announced collaboration ubuntu create ubuntu mobile internet devices distribution known ubuntu mobile ubuntu website said new distribution provide rich internet experience users intel ’ 2008 mobile internet device mid platform | [
3173,
5103,
6336,
7520,
4765,
6523,
6616,
7453,
740,
5669,
1017,
584,
6647,
1023,
1864,
2498,
1770,
4627,
2240,
3139,
2332,
5165,
2338,
5431,
6675,
7132
] | Test |
2,499 | 2 | Microsoft_JhengHei:microsoft jhenghei microsoft jhenghei 微軟正黑體 sans-serif typeface included windows vista later microsoft office 2007 follows standard form national characters prescribed ministry education republic china taiwan intended used traditional chinese language environments using cleartype version microsoft jhenghei alternate character design versions microsoft jhenghei microsoft jhenghei ui respectively sold monotype family includes light version font microsoft jhenghei tc light microsoft jhenghei ui tc light downloading installing traditional chinese cleartype fonts windows xp microsoft also makes microsoft jhenghei available windows xp microsoft jhenghei ui included windows 8 later | [
1832,
2920,
6645,
5871,
2927,
1029,
4759,
2931,
5837,
2917
] | Validation |
2,500 | 4 | Banner_grabbing:banner grabbing banner grabbing technique used gain information computer system network services running open ports administrators use take inventory systems services network however intruder use banner grabbing order find network hosts running versions applications operating systems known exploits examples service ports used banner grabbing used hyper text transfer protocol http file transfer protocol ftp simple mail transfer protocol smtp ports 80 21 25 respectively tools commonly used perform banner grabbing telnet nmap zmap netcat example one could establish connection target web server using netcat send http request response typically contain information service running host information may used administrator catalog system intruder narrow list applicable exploits prevent network administrators restrict access services networks shut unused unnecessary services running network hosts shodan search engine banners grabbed portscanning internet | [
7765,
3085,
1942,
6908
] | Test |
2,501 | 3 | PowerPC_e600:powerpc e600 powerpc e600 family 32-bit powerpc microprocessor cores developed freescale primary use high performance system-on-a-chip soc designs speed ranging 2 ghz thus making ideal high performance routing telecommunications applications e600 continuation powerpc 74xx design e600 superscalar out-of-order risc core 32/32 kb l1 data/instruction caches seven-stage three-issue pipeline load/store system register powerful branch prediction integer unit double precision fpu enhanced 128-bit altivec unit limited out-of-order execution core designed work multiprocessing multi core designs take large amounts l2 caches die e600 core completely backwards compatible powerpc 74xx cores derives 2004 freescale renamed powerpc 74xx core e600 changed focus general cpus high end embedded soc devices introduced new naming scheme mpc86xx 7448 last pure 74xx formed base new e600 core 7448 evolution powerpc 7447 essentially faster 2 ghz power-efficient version 7447a manufactured 90 nm 1 mb l2 cache 200 mhz front side bus features freescale new standard core e600 problems associated bandwidth-constrained external mpx bus interface found 74xx series relieved single mpc8641 dual mpc8641d e600 cores faster system interface via rapidio dual x8 pci express on-die 667 mhz mpx interconnect i/o cores dual 64-bit ddr2-memory controllers ecc product also features four on-chip gigabit ethernet controllers tcp/udp offloading features dual core mpc8641d support asymmetric multiprocessing enables two operating systems run device simultaneously sharing resources largely unaware mpc8641 single core mpc8641d dual core manufactured 90 nm soi based process 8641 draws less 16w 1.33 ghz 8641d less 25w 1.5 ghz introduced summer 2008 mpc8640 mpc8640d low power low cost versions mpc8641 parts clocked 1-1.25 ghz draw 14-21w power identical older brethren respects introduced 2007 mpc8610 host processor integrated graphics processor supporting 24-bit screens sizes 1280x1024 pixels single core cpu 256 kb die l2 cache manufactured 90 nm process reaches speeds 667 1333 mhz list complete list known core e600 based designs excluding older 74xx designs pictures illustrations scale | [
4661,
3936,
1075,
1454,
1083,
5737,
7905,
6111,
4702,
6474,
1131,
5079,
2257,
3674,
441,
5097,
3348,
5100,
4408,
7637,
3708,
7990,
1199,
7654,
4815,
6226,
2353,
2719,
7327,
4847,
4479,
3440,
912,
5571,
7361,
234,
239,
2781,
8125,
2785,
... | Test |
2,502 | 1 | TOra:tora tora toolkit oracle free software database development administration gui available gnu general public license features pl/sql debugger sql worksheet syntax highlighting database browser comprehensive set database administration tools addition oracle database support support mysql postgresql teradata databases added since initial launch uses qt use qscintilla2 library oracle connector uses oracle template library tora originally written henrik johnson copyright globecom ab acquired quest software start conversion maintained open source project made 2005-02-17 version 1.3.15 qt4 conversion took place 2009 version 1.4 | [
7213,
2054,
6386,
5956
] | Test |
2,503 | 2 | B2G_OS:b2g os b2g os community-developed successor firefox os developed mozilla foundation follows firefox os vision providing complete community-based alternative operating system runs software web applications software 'applications therefore use open web standards programming languages javascript html5 robust privilege model open web apis communicate directly device hardware basis kaios jan 2019 17 percent indian mobile phone market third popular phone os kaios closed-source b2g os forked firefox os following mozilla decision discontinue support mobile operating system decision made according ari jaaksi david bryant order evolve quickly enable substantial new architectural changes gecko mozilla ’ platform engineering organization needs remove b2g-related code mozilla-central 2017 b2g os longer maintained | [
2451,
2187,
4400,
3097,
474,
2564,
5391,
5486,
5579,
740,
5232,
5055,
5236,
1399,
1582,
5068,
2240,
424,
7030,
7126,
2520,
4549,
2071,
349,
352,
3751,
5449,
6158,
7956
] | Test |
2,504 | 3 | Bounder_(video_game):bounder video game courses composed numerous tiles suspended high ground ball must bounced past walls enemies coming contact either plummeting edge course results loss one player seven lives courses feature power squares push tennis ball forward allow longer jumps must utilized complete course power squares also used enable tennis ball reach mystery spaces tiles question marks contain extra lives bonus jumps used bonus screens mystery spaces also destroy tennis ball resulting loss life instant destruction freezing ball place missile flies across play area explodes bonus screen accessed every time course completed consists mystery spaces increase player score bounced player receive 40 bounces allowed bonus screen though figure increased player uncovering mystery squares preceding course bounces used mystery spaces bounced play moves next course bouncing mystery spaces awards player 10,000 points well extra life bounder received gold medal award commodore 64 magazine zzap 64 well sinclair mega game award remake bounder released mobile game swivel creations may 2019 | [] | Test |
2,505 | 4 | National_Cyber_Investigative_Joint_Task_Force:national cyber investigative joint task force national cyber investigative joint task force ncijtf officially established 2008 ncijtf comprises 20 partnering agencies across law enforcement intelligence community department defense representatives co-located work jointly accomplish organization ’ mission since 2008 ncijtf primary american agency responsible coordinating cyber threats investigations liaisons central intelligence agency cia department defense dod department homeland security dhs national security agency nsa multi-agency cyber center ncijtf coordinates integrates shares information support cyber threat investigations supply support intelligence analysis community decision-makers support efforts fight cyber threats task force uses collective resources members collaborates international private sector partners bring available resources bear domestic cyber threats perpetrators | [
1501,
3264,
7181
] | Test |
2,506 | 8 | Jetty_(web_server):jetty web server eclipse jetty java http web server java servlet container web servers usually associated serving documents people jetty often used machine machine communications usually within larger software frameworks jetty developed free open source project part eclipse foundation web server used products apache activemq alfresco scalatra apache geronimo apache maven apache spark google app engine eclipse fuse idempiere twitter streaming api zimbra jetty also server open source projects lift eucalyptus opennms red5 hadoop i2p jetty supports latest java servlet api jsp support well protocols http/2 websocket jetty started independent open source project 1995 2009 jetty moved eclipse jetty provides web services embedded java application already component eclipse ide supports ajp jaspi jmx jndi osgi websocket java technologies originally developed software engineer greg wilkins jetty originally http server component mort bay server originally called issuetracker original application mbservler mort bay servlet server neither much liked jetty finally picked jetty started 1995 hosted mortbay creating version 1.x 2.x 2000 2000 2005 jetty hosted sourceforge.net version 3.x 4.x 5.x produced 2005 entire jetty project moved codehaus.org 2009 core components jetty moved eclipse.org codehaus.org continued provide integrations extensions packaging jetty versions 7.x 8.x 9.x 2016 main repository jetty moved github still developed eclipse ip process documentation | [
6966,
3168,
4295,
1349,
5369,
5206,
5820,
5646,
5214,
2646,
6270,
1834,
2291,
8182,
6536,
26,
8189,
5571,
7544,
7988,
4601,
3543,
4701,
2040,
1392,
7786,
417,
3135,
1686,
3408,
5426,
2519,
3915,
1602,
6586,
2807,
6061,
7411,
7952,
2623
] | Test |
2,507 | 4 | TeleSign:telesign telesign corporation communications platform service company founded security based los angeles california founded 2005 darren berkovitz ryan disraeliand stacy stubblefield company mainly provides two-factor authentication services secure supplementary method preventing illicit access online accounts used many companies like itunes yahoo gmail outlook twitter facebook bank america chase discover paypal etsy salesforce company also offers variety cloud communications apis via self-service portal ryan disraeli current ceo company along co-founders disraeli stubblefield berkowitz named usc alumni entrepreneurs year telesign early project technology incubator curious minds company raised 49 million funds april 2017 telesign announced acquired bics belgium-based company 230 million | [] | Test |
2,508 | 3 | Hardware_performance_counter:hardware performance counter computers hardware performance counters hardware counters set special-purpose registers built modern microprocessors store counts hardware-related activities within computer systems advanced users often rely counters conduct low-level performance analysis tuning number available hardware counters processor limited cpu model might lot different events developer might like measure counter programmed index event type monitored like l1 cache miss branch misprediction one first processors implement counter associated instruction codice_1 access intel pentium documented terje mathisen wrote article reverse engineering byte july 1994 following table shows examples cpus number available hardware counters compared software profilers hardware counters provide low-overhead access wealth detailed performance information related cpu functional units caches main memory etc another benefit using source code modifications needed general however types meanings hardware counters vary one kind architecture another due variation hardware organizations difficulties correlating low level performance metrics back source code limited number registers store counters often force users conduct multiple measurements collect desired performance metrics modern superscalar processors schedule execute multiple instructions out-of-order one time in-flight instructions retire time depending memory access hits cache stalls pipeline many factors cause performance counter events attributed wrong instructions making precise performance analysis difficult impossible amd introduced methods mitigate drawbacks example opteron processors implemented 2007 technique known instruction based sampling ibs amd implementation ibs provides hardware counters fetch sampling front superscalar pipeline op sampling back pipeline results discrete performance data associating retired instructions parent amd64 instruction | [
7980,
5405,
6618,
6719,
2719,
4845,
694,
4847,
1237,
5305,
463,
4985,
971,
1335,
446
] | Validation |
2,509 | 3 | Extended_Display_Identification_Data:extended display identification data extended display identification data edid metadata format display devices describe capabilities video source e.g graphics card set-top box data format defined standard published video electronics standards association vesa edid data structure includes manufacturer name serial number product type phosphor filter type timings supported display display size luminance data digital displays pixel mapping data displayid vesa standard targeted replace edid e-edid extensions uniform format suited pc monitor consumer electronics devices edid structure versions range v1.0 v1.4 define upwards-compatible 128-byte structures version 2.0 defined new 256-byte structure deprecated replaced v1.3 supports multiple extension blocks hdmi versions 1.0–1.3c use edid structure v1.3 display data channel ddc edid defined standard way graphics card know kind display device connected vga connectors personal computers provided basic form identification connecting one two three pins ground coding standardized channel transmitting edid display graphics card usually i²c-bus defined ddc2b ddc1 used different serial format never gained popularity edid often stored monitor memory device called serial prom programmable read-only memory eeprom electrically erasable prom accessible via i²c-bus address edid prom often read host pc even display turned many software packages read display edid information read-edid linux dos powerstrip microsoft windows xfree86 linux bsd unix mac os x natively reads edid information programs switchresx displayconfigx display information well use define custom resolutions enhanced edid introduced time e-ddc introduced edid structure version 1.3 supports multiple extensions blocks deprecated edid version 2.0 structure although supported extension data fields preferred timing range limits monitor name required e-edid e-edid also supports dual gtf timings aspect ratio change use extensions e-edid string lengthened 32 kbytes graphics card drivers historically coped poorly edid using standard timing descriptors rather detailed timing descriptors dtds even cases dtds read drivers are/were still often limited standard timing descriptor limitation horizontal/vertical resolutions must evenly divisible 8 means many graphics cards express native resolutions common wide screen flat panel displays liquid crystal display televisions number vertical pixels calculated horizontal resolution selected aspect ratio fully expressible size wide screen display must thus multiple 16×9 pixels 1366×768 pixel wide xga panels nearest resolution expressible edid standard timing descriptor syntax 1360×765 pixels typically leading 3 pixel thin black bars specifying 1368 pixels screen width would yield unnatural screen height 769.5 pixels many wide xga panels advertise native resolution standard timing descriptors instead offering resolution 1280×768 panels advertise resolution slightly smaller native 1360×765 panels able show pixel perfect image edid data must ignored display driver driver must correctly interpret dtd able resolve resolutions whose size divisible 8 special programs available override standard timing descriptors edid data even always possible vendors graphics drivers notably intel require specific registry hacks implement custom resolutions make difficult use screen native resolution used another descriptor pixel clock bytes set 0 currently defined descriptor types cea edid timing extension first introduced eia/cea-861 since updated several times notably −861b revision version 3 extension adding short video descriptors advanced audio capability/configuration information −861d published july 2006 containing updates audio segments −861e −861f published june 4 2013 according brian markwalter senior vice president research standards cea −861f includes number noteworthy enhancements including support several new ultra hd widescreen video formats additional colorimetry schemes. ” recent version cta-861-g originally published november 2016 made available free november 2017 necessary changes due trademark complaint version 1 defined −861 allowed specification video timings use 18-byte detailed timing descriptors dtd detailed edid 1.3 data format cases preferred timing first dtd listed cea edid timing extension version 2 defined −861a added capability designate number dtds native also included basic discovery functionality whether display device contains support basic audio ycbcr pixel formats underscan version 3 −861b spec allows two different ways specify timings available digital tv formats version 1 2 use 18-byte dtds use short video descriptor svd see hdmi 1.0–1.3c uses version version 3 also includes four new optional types data blocks video data blocks containing aforementioned short video descriptor svd audio data blocks containing short audio descriptors sad speaker allocation data blocks containing information speaker configuration display device vendor specific data blocks contain information specific given vendor use data block collection contains one data blocks detailing video audio speaker placement information display blocks placed order initial byte block defines type length one data block ended next byte assumed beginning next data block case byte designated byte 2 dtds known begin audio data blocks contain one 3-byte short audio descriptors sads sad details audio format channel number bitrate/resolution capabilities display follows video data blocks contain one 1-byte short video descriptors svds notes parentheses indicate instances pixels repeated meet minimum speed requirements interface example 720x240p case pixels line double-clocked 2880 x480i case number pixels line thus number times repeated variable sent dtv monitor source device increased hactive expressions include “ 2x ” “ 4x ” indicate two four times reference resolution respectively video modes vertical refresh frequency multiple 6hz i.e 24 30 60 120 240hz considered timing equivalent ntsc modes vertical refresh adjusted factor 1000/1001 vesa dmt specifies 0.5 pixel clock tolerance 5 times required change pixel clocks adjusted maintain ntsc compatibility typically 240p 480p 480i modes adjusted 576p 576i hdtv formats vendor specific data block contains first three bytes vendor ieee 24-bit registration number lsb first hdmi always hdmi licensing llc followed two byte source physical address lsb first source physical address provides cec physical address upstream cec devices remainder vendor specific data block data payload anything vendor considers worthy inclusion edid extension block hdmi 1.3a specifies requirements data payload see spec detailed info bytes speaker allocation data block present consist three bytes second third reserved first contains information speakers present display device | [
6307,
3346,
6490,
578,
4551,
4759,
1920,
2509,
6367
] | Test |
2,510 | 4 | Bounce_Address_Tag_Validation:bounce address tag validation computing bounce address tag validation batv method defined internet draft determining whether bounce address specified e-mail message valid designed reject backscatter bounce messages forged return addresses basic idea send e-mail return address includes timestamp cryptographic token forged e-mail returned bounce without valid signature rejected e-mail bounced back empty null return address bounces never created bounce therefore ca n't get messages bouncing back forth forever batv replaces envelope sender like codice_1 codice_2 codice_3 called simple private signature one possible tagging schemes actually one fully specified draft batv draft gives framework possible techniques fit types implementations using public key signatures verified third parties mentioned left undefined overall framework vague/flexible enough similar systems sender rewriting scheme fit framework sami farin proposed anti-bogus bounce system 2003 news.admin.net-abuse.email used basic idea putting hard forge hash message bounce address late 2004 goodman et al proposed much complex signed envelope sender included hash message body intended address wide variety forgery threats including bounces forged mail several months later levine crocker proposed batv current name close current form draft anticipates problems running batv also problems prevent batv systems eliminating backscatter | [
2379,
6908,
7624,
2578,
1781
] | Test |
2,511 | 2 | XSplash:xsplash xsplash software project ubuntu community uses x window system replace scrolling-text screens appear booting linux-based computer graphical splash screen xsplash replaced usplash uses linux framebuffer ubuntu 9.10 karmic koala bringing ubuntu closer goal 10-second boot time ubuntu 10.04 lts lucid lynx improved boot performance usplash boot systems achieved prioritizing startup processes related x server using single x server throughout boot process | [
8169,
5912,
642,
3780,
2297,
5571,
5658,
314,
578,
7463,
2585,
4165,
5156,
2143,
3738,
4632,
4991,
4187,
5523,
5704,
2074,
6951,
968,
2260,
7873
] | Test |
2,512 | 2 | Michael_J._Karels:michael j. karels michael j mike karels american software engineer one key people history bsd unix graduate university notre dame bachelor science microbiology mike went university california berkeley advanced degree microbiology mike access department computer since administrator pdp-11 enough time mike started helping making changes system mike started contribution unix 2.9bsd release distributed pdp-11 mike saw job posting computer systems research group bsd project decided jump 1982 mike took bill joy responsibilities mr. joy left csrg system architect 4.3bsd important bsd release base development number commercial unix flavors available today including solaris release introduced world deep detail all-time famous book design implementation 4.3bsd unix operating system black cover smiling beastie mike csrg principal programmer 8 years mike worked closely van jacobson number widely accepted algorithms tcp implementation including jacobson/karels algorithm tcp slow start routing radix tree probably famous ones mike spends little time taking credit work hand uses every opportunity mention names people one way role contribution tcp/ip implementation unix 1993 usenix association gave lifetime achievement award flame computer systems research group university california berkeley honoring 180 individuals including karels contributed csrg 4.4bsd-lite release later mike moved bsdi berkeley software design designed bsd/os years commercially available bsd style unix intel platform bsd/os reliable os platform designed internet services bsdi software asset bought wind river april 2001 mike joined wind river principal technologist bsd/os platform 2009 mike sr principal engineer mcafee 2015 worked intel later forcepoint llc | [
5268,
3838,
4751,
1068,
1341,
5275,
4030,
7514,
6794,
191,
6085,
6711,
1356,
3856,
908,
1547,
7355,
481,
3457,
1279,
8194,
8096,
1193,
6017,
738,
3636,
4059,
6367,
496,
6369,
2583,
8001,
2043,
6918,
5760,
5065,
594,
4441,
5865,
4534,
64... | Test |
2,513 | 4 | IT_risk:risk information technology risk risk it-related risk cyber risk risk related information technology information long appreciated valuable important asset rise knowledge economy digital revolution led organizations becoming increasingly dependent information information processing especially various events incidents compromise way therefore cause adverse impacts organization business processes mission ranging inconsequential catastrophic scale assessing probability likelihood various types event/incident predicted impacts consequences occur common way assess measure risks alternative methods measuring risk typically involve assessing contributory factors threats vulnerabilities exposures asset values risk potential given threat exploit vulnerabilities asset group assets thereby cause harm organization measured terms combination probability occurrence event consequence committee national security systems united states america defined risk different documents national information assurance training education center defines risk field many nist publications define risk context different publications fismapedia term provide list nist sp 800-30 defines risk probable frequency probable magnitude future loss isaca published risk framework order provide end-to-end comprehensive view risks related use risk defined according risk risk broader meaning encompasses negative impact operations service delivery bring destruction reduction value organization also benefit\value enabling risk associated missing opportunities use technology enable enhance business project management aspects like overspending late delivery adverse business impact measuring risk cyber risk occur many levels business level risks managed categorically front line departments noc tend measure discreet individual risks managing nexus key role modern ciso measuring risk kind selecting correct equation given threat asset available data important step subject unto common components risk equations helpful understand four fundamental forces involved risk management also apply cybersecurity assets impact threats likelihood internal knowledge fair amount control assets tangible intangible things value also control impact refers loss damage asset however threats represent adversaries methods attack external control likelihood wild card bunch likelihoods determine threat materialize succeed damage never fully control likelihoods shaped influenced manage risk mathematically forces represented formula formula_1 p likelihood threat materialize/succeed asset likelihood various levels damage may occur field risk management spawned number terms techniques unique industry industry terms yet reconciled example term vulnerability often used interchangeably likelihood occurrence problematic often encountered risk management terms techniques include risk r product likelihood l security incident occurring times impact incurred organization due incident likelihood security incident occurrence function likelihood threat appears likelihood threat successfully exploit relevant system vulnerabilities consequence occurrence security incident function likely impact incident organization result harm organization assets sustain harm related value assets organization asset different values different organizations r function four factors numerical values money impact probabilities factors risk expressed monetary terms compared cost countermeasures residual risk applying security control always practical express values first step risk evaluation risk graded dimensionless three five steps scales owasp proposes practical risk measurement guideline based nist cybersecurity framework encourages organizations manage risk part identify id function risk assessment id.ra organization understands cybersecurity risk organizational operations including mission functions image reputation organizational assets individuals risk management strategy id.rm organization ’ priorities constraints risk tolerances assumptions established used support operational risk decisions following brief description applicable rules organized source oecd issued following european union issued following divided topic united states issued following divided topic list chiefly based | [
2810,
3932,
5201,
1531,
284,
4036,
5908,
7630,
5568,
1186,
8091,
308,
2213,
5051,
3474,
6208,
8109,
3726,
6756,
943,
8121,
3486,
7486,
8123,
429,
690,
5255,
7048,
1805
] | Test |
2,514 | 9 | Abstract_syntax:abstract syntax computer science abstract syntax data structure described data type possibly necessarily abstract data type independent particular representation encoding particularly used representation text computer languages generally stored tree structure abstract syntax tree abstract syntax consists structure data contrasted concrete syntax also includes information representation example concrete syntax includes features like parentheses grouping commas lists included abstract syntax implicit structure abstract syntaxes classified first-order abstract syntax foas structure abstract names identifiers still concrete thus requires name resolution higher-order abstract syntax names abstract implemented either computation communications mapping abstract syntax specific machine representations encodings must defined may called concrete syntax language implementation transfer syntax communications compiler internal representation program typically specified abstract syntax terms categories statement expression identifier independent source syntax concrete syntax language compiled though often similar parse tree similar abstract syntax tree typically also contain features parentheses syntactically significant implicit structure abstract syntax tree algebraic data types particularly well-suited implementation abstract syntax | [
1361,
7071,
7375,
3659,
5731
] | Validation |
2,515 | 1 | Query_by_Example:query example query example qbe database query language relational databases devised moshé m. zloof ibm research mid-1970s parallel development sql first graphical query language using visual tables user would enter commands example elements conditions many graphical front-ends databases use ideas qbe today originally limited purpose retrieving data qbe later extended allow operations inserts deletes updates well creation temporary tables motivation behind qbe parser convert user actions statements expressed database manipulation language sql behind scenes statement actually executed suitably comprehensive front-end minimize burden user remember finer details sql easier productive end-users even programmers select tables columns selecting rather typing names context information retrieval qbe somewhat different meaning user submit document several documents ask similar documents retrieved document database see search multiple examples similarity search based comparing document vectors see vector space model qbe seminal work end-user development frequently cited research papers early example topic currently qbe supported several relational database front ends notably microsoft access implements visual query example well microsoft sql server enterprise manager also implemented several object-oriented databases e.g db4o qbe based logical formalism called tableau query although qbe adds extensions much like sql based relational algebra example using suppliers parts database given illustrate qbe works term also refers general technique influenced zloof work whereby items search values used filter results provides way software user perform queries without know query language sql software automatically generate queries user usually behind scenes examples example form b resulting sql note blank items generate sql terms since address blank clause generated example form c resulting sql advanced versions qbe comparison operator options often via pull-down menu contains contains starts greater-than forth another approach text comparisons allow one wildcard character characters example asterisk designated wild wildcard character particular system searching last names using rob* would return match last names rob robert robertson roberto etc | [
184,
3255,
6462,
7215,
7618,
2054,
4181,
684,
3005
] | Train |
2,516 | 9 | MAI_Basic_Four:mai basic four mai basic four sometimes written basic/four corporation basic 4 refers variety business basic computers ran company sold name various times given mai basic four inc. mai basic four information systems mai systems corporation mai systems corporation became wholly owned subsidiary softbrands inc. 2006 basic/four corporation created subsidiary management assistance inc. irvine california basic/four sold small business minicomputers assembled microdata corporation cpus mai basic four business basic one first commercially available business basic interpreters mai basic four company originally sold minicomputers later offered superminicomputers microcomputers computers ran operating system basic interpreter integrated 1985 wall street financier bennett s. lebow purchased company experienced significant operating financial losses 1988 lebow used company platform unsuccessful attempted hostile takeover much larger prime computer company released accounting software third-party microcomputers mid 1980 1988 released 80286-based workstation basic4 system utilized many small banks credit unions 1990 company changed name mai systems corp. changed business system integrator instead combined hardware software manufacturer reselling third-party computers installing customer-specific software system | [
1522,
7467
] | Test |
2,517 | 9 | Java_Message_Service:java message service java message service jms api java message-oriented middleware api sending messages two clients implementation handle producer–consumer problem jms part java platform enterprise edition java ee defined specification developed sun microsystems since guided java community process messaging standard allows application components based java ee create send receive read messages allows communication different components distributed application loosely coupled reliable asynchronous messaging form loosely coupled distributed communication context term 'communication understood exchange messages software components message-oriented technologies attempt relax tightly coupled communication tcp network sockets corba rmi introduction intermediary component approach allows software components communicate indirectly benefits include message senders needing precise knowledge receivers advantages messaging include ability integrate heterogeneous platforms reduce system bottlenecks increase scalability respond quickly change jms 2.0 currently maintained java community process jsr 343 following jms elements jms api supports two distinct models point-to-point messaging system messages routed individual consumers maintain queues incoming messages messaging type built concept message queues senders receivers message addressed specific queue receiving clients extract messages queues established hold messages number producers send messages queue message guaranteed delivered consumed one consumer queues retain messages sent messages consumed messages expire consumers registered consume messages queue holds consumer registers consume publish-and-subscribe model supports publishing messages particular message topic subscribers may register interest receiving messages published particular message topic model neither publisher subscriber knows good analogy anonymous bulletin board jms provides way separating application transport layer providing data java classes used communicate different jms providers using java naming directory interface jndi information desired provider classes first use connection factory connect queue topic use populate send publish messages receiving side clients receive subscribe messages rfc 6167 defines codice_1 uri scheme java message service use jms one must jms provider manage sessions queues topics starting java ee version 1.4 jms provider contained java ee application servers implemented using message inflow management java ee connector architecture first made available version following list common jms providers | [
3172,
6415,
2371,
7347,
7722,
3531,
6986,
7637,
7368,
1479,
2487,
2126,
7921,
2322,
148,
4530,
1125,
3488,
773,
2519,
5874,
2799,
2530,
7315,
1147,
1803,
2807
] | Test |
2,518 | 4 | Diane_Beckman:diane beckman brigadier general m. diane beckman usaf fictional character nbc television series chuck beckman senior official national security agency working within office director national intelligence holds rank brigadier general united states air force revealed spent significant amount time resources hunting orion intersect chief designer re-appeared made deal government little information personal life past service revealed first entered military prior august 14 1974 fought two battles gulf war non-exclusive romantic relationship roan montgomery 20 years see personality beckman also maintains close friendship dr. condoleezza rice general beckman first appeared chuck versus helicopter replacing national intelligence director wendy makkena overseer operation bartowski initially casey sarah protect chuck replacement intersect back online sarah chuck believed occurred chuck would free go back normal life however beckman secretly issued orders casey chuck killed prevent government secrets retained falling wrong hands however destruction second intersect order rescinded additionally operation bartowski effective weapon cia splinter group fulcrum beckman decided chuck far important valuable resource released therefore blocked attempts contact orion intersect removed beckman also made clear chuck ever identified taken protective custody beckman primary role series provide team bartowski intelligence updates chuck flashes assign mission objectives time missions result something chuck flashes course normal day however several occasions beckman issued assignment devising based events elsewhere chuck abilities intersect particularly well-suited beckman seldom personally involved assignments allows team proceed however chuck versus crown vic benched team flash chuck went bad ordered casey locked personal vendetta former mentor botched mission beckman personally involved chuck contacted orion rogue search flew burbank debrief team first time since pilot episode one team supervisors met in-person also first time directly involved episode mission general beckman typically declines interfere directly team dynamics however sarah confrontational attitude towards treatment chuck chuck versus predator led concern sarah emotionally close asset casey attempted cover requested provide unedited report chuck sarah relationship led reassigning cia agent alexandra forrest chuck cia handler directive 49-b forrest subsequently failed protect chuck lacked sarah close personal connection understanding beckman forced acknowledge sarah feelings asset made best choice protect chuck failed operation locate father allowed jill escape beckman decided pull plug operation bartowski ordered casey sarah take chuck permanent custody reversed decision intersect removed chuck head chuck versus colonel chuck versus ring offered chuck analyst position intersect project freed casey return old unit reassigned sarah intersect project bryce larkin rounding beckman interference team ordered sarah apprehend casey upon learning stolen valuable item cia facility casey broken came castle ordered sarah chuck capture dead alive despite three agents eventually working together taking ring cell coerced stealing cia first place beckman could brook casey treason dismissed spot beckman also wished discuss sarah transferring burbank chuck needed less less beckman look lightly three years untold millions dollars spent helping chuck reach potential become understanding chuck hand-wringing second-guessing part process beckman insists seeing video recovered ring knowledge sarah killed shaw wife season 3 finale beckman higher ups cia concerned state operation bartowski chuck particular gets swept away setup staged much alive shaw purpose discredit could take place spies convention five elders ring going take nsa cia team bartowski arrests elders along daniel shaw justin sullivan leading disintegration ring chuck later reveals ellie beckman reinstated allowed resign spy world season 4 premier federal government rebuilt burbank buy secret joint nsa/cia station staffed undercover spies beckman initially installs on-site guise buy manager using big mike old office displaying real forename middle name diane name tag although incongruously prefers personnel continue address general even undercover store withdrawn approval chuck resignation systematically eliminates private sector job opportunities order force return cia buy new improvements buy include trap door drops reluctant chuck bespin-esque tube slide castle rehiring morgan grimes green shirter salesman upstairs operative downstairs beckman reluctantly concedes observation buy undercover staff far efficient pleasant rendering cover virtually transparent accordingly authorizes morgan rehire store former staff appoints store manager stead general beckman series regular character based san fernando valley usually seen video conferences office still on-site management buy reconstruction time shown away fort meade desk field two consecutive episodes supervising arrest alexei volkoff bartowski family forest cabin subsequently participating capture fatima tazi rescue roan montgomery marrakesh morocco latter case called air strike tazi counterfeiting presses personally employed rocket-propelled grenade disable tazi prevent montgomery execution noticeably general dresses usual service uniform even field subordinate military personnel fatigue uniform also occasionally visits team bartowski burbank particularly season 4 although position prevents openly beckman ultimately proves loyalty team chuck versus cliffhanger chuck casey burned clyde decker attempt free alexei volkoff save sarah life beckman provides information volkoff taken identity card enter castle also supposedly left chuck pair sunglasses intent restoring intersect suppressed decker however accidentally put morgan first however noticeably absent chuck sarah wedding end season 4 government concluded operation bartowski stripped castle equipment sold buy more/castle complex concurrently beckman terminated civil service employment chuck sarah morgan although three employed cia nsa arranged either retirement second dismissal casey marine corps beckman involvement chuck intersect project appeared concluded intersect-embedded sunglasses meant chuck addressed gift beckman chuck versus frosted tips beckman came chuck hire carmichael industries help capture man named zorn prevent selling cia secrets later sarah calls beckman regarding intersect glasses learn never sent glasses implied clyde decker responsible end episode beckman clandestinely meets chuck warning since morgan outed intersect decker put kill order subsequently morgan hidden castle beckman arrived remove intersect going call kill order unfortunately one assassins called decker announced viper team bartowski catches viper beckman decker tell hit chuck versus curse beckman calls team officially condemn treason death decker stealing omen virus tapping morse code team flee later rendezvoused casey abandoned bar well sending agent escort woodcombs unfortunately woodcombs assumed beckman agent hostile fled captured rogue agent robyn cunnings chuck brashly gives virus save family casey sarah able arrest cunnings afterwards casey beckman interrogated cunnings threatening use torture device confirming conspiracy cia team bartowski cleared charge treason well casey criminal record however cunnings already released omen virus turn released shaw mastermind behind decker team rogue actions shaw holding sarah hostage beckman forced help chuck infiltrate cia retrieve macau device decker office mission forced kiss chuck dressed santa throw suspicions soon shaw defeated suppressed ring intersect beckman agrees use government funds help team enjoy christmas team bartowski ultimately one last enemy named nicholas quinn ex-cia agent supposed receive original intersect kidnapped sarah uploaded infected intersect morgan brainwashed bidding beckman tried best help team quinn escaped intersect glasses however could use intersect without damaging brain sought pieces key device could alter intersect beckman unaware held piece unexpectedly taken hostage attending concert chinese counterpart quinn placed bomb beneath seat set go music ended luckily jeff lester able delay explosion chuck forced upload perfected intersect save beckman beckman commended former team work offered employ wish beckman portrayed stern woman little tolerance confrontation subordinates abrupt point shows little interest chuck life beyond service intersect beckman frequently overrules chuck sarah objections placing situations put danger compromise personal life ethics firmly believes war fulcrum must use whatever weapons arsenal defeat operation bartowski successful asset fight refuses allow chuck intersect removed demands become spy beckman wryness led actress bonita friedericy name chuckles beckman frequently lies withholds information members team bartowski mostly chuck interest national security beta intersect completed graham released chuck obligations cia nsa immediately ordered casey eliminate order hinted several times first season beckman lied often subject orion solely purpose keeping intersect chuck head forcing become spy later ordered sarah betray chuck chuck could taken underground rescinded chuck resignation end season 3 despite chuck saving life career operation bartowski declared unmitigated success beckman sabotages attempts chuck made gain employment outside cia declaring chuck says later insists chuck sister ellie woodcomb involuntarily used provide government intel intersect orion laptop seems configured allow access program objections team little shown general personal life known friends dr. condoleezza rice beckman one two concurrent nbc fictional characters jack donaghy 30 rock friends former secretary state first episode explore beckman past relationships detail season four episode chuck versus seduction impossible episode confirmed roan montgomery john laroquette maintained ongoing romantic relationship sorts twenty years enjoying periodic rendezvous fall berlin wall pair engaged tryst promised retire 2009 survived subsequently angered montgomery went rogue operation rather meet promised although ongoing committed relationship per se although montgomery professional expertise seduction honey traps beckman entirely conceal jealousy resentment diane admitted intended cancel plans retire recognizing involved work comfortable settling normal life beckman montgomery tracked n't run general montgomery ncs director jane bentley mary bartowski among characters diane comfortable addressing forename beckman puts strongly professional attitude dealing team rarely shows signs emotion caught off-guard chuck announcement orion identified contacted also humorous effect flustered montgomery charms aided team recovering cipher asked chuck life outside nsa reassured casey objected question n't bothered admitted n't uniform chuck versus angel de la muerte first time shown uniform interrupted cocktail party beckman also highly driven tenacious tracked orion years shows wounded pride shock chuck succeeded finding weeks deeply angered chuck insistence freed intersect taken fight fulcrum personally due increasing number men women sent deaths trying defeat sees chuck team group found chink armor outcome going rest squarely chuck shoulders although generally unflappable beckman openly upset pleaded daniel shaw allowed disclose full details team recently completed mission carina chuck versus three words despite professionalism front subordinates also times displayed genuine sympathy concern well-being team visibly concerned realization shaw knowledge sarah killing wife placed sarah danger beckman known reader ayn rand strict professional beckman officially approve chuck sarah beginning romantic relationship however record even acknowledged damn time beckman openly admitted caring chuck chuck versus tooth became apparent intersect taking devastating effect chuck mental state like col. casey bg beckman begrudgingly grown appreciate morgan grimes unusual talents importance keeping intersect i.e. chuck mind functioning properly although initially hired duress condition casey delivery ring director demanded involuntary reinstatement resignation months later almost immediately appointed manager buy recognition knowledge understanding keep cover store appearance genuine morgan regular character shown address forename diane captain although corrected time response displeasure close-ups ms. friedericy costume available infobox several ribbons sequence shown order worn character example kuwait liberation medals saudi arabia kuwait foreign awards follow united states awards precede gwotem gwotsm two stars southwest asia service medal show served two five distinct campaigns gulf war general beckman three awards national defense service medal evidence first entered military prior august 14 1974 three recent periods service medal issued vietnam war january 1 1961 august 14 1974 gulf war august 2 1990 november 30 1995 war terrorism september 11 2001 chuck versus intersect actress wendy makkena appeared role credited national intelligence director casting lists character identified general mary beckman episode intelligence director briefed casey alongside director graham intersect theft dispatching burbank track bryce larkin contact makkena continue appearing role however forced drop unspecified reasons pilot filmed bonita friedericy also auditioned role took makkena left although intelligence director name never used pilot schwartz fedak officially confirmed friedericy suggested two characters general beckman id card reads gen. m. beckman shown chuck chart first seen second-season episode chuck versus lethal weapon matches unofficial name makkena character pilot compounded original pilot script general mary beckman seen speaking director graham video conference screen shown immediately conferences beckman displays large seal essentially u.s coat arms crest replaced globe ringed satellites around words office director national intelligence united states america also suggesting characters | [] | Test |
2,519 | 9 | Java_Platform,_Enterprise_Edition:java platform enterprise edition java enterprise edition java ee formerly java 2 platform enterprise edition j2ee currently jakarta ee set specifications extending java se 8 specifications enterprise features distributed computing web services java ee applications run reference runtimes microservices application servers handle transactions security scalability concurrency management components deploying java ee defined specification specification defines apis application programming interface interactions java community process specifications providers must meet certain conformance requirements order declare products java ee compliant examples contexts java ee referencing runtimes used e-commerce accounting banking information systems platform known java 2 platform enterprise edition j2ee version 1.2 name changed java platform enterprise edition java ee version 1.5 current version called java ee 8 java ee maintained oracle java community process september 12 2017 oracle corporation announced would submit java ee eclipse foundation eclipse top-level project named eclipse enterprise java ee4j eclipse foundation forced change name java ee oracle owns trademark name java february 26 2018 announced new name java ee jakarta ee java ee includes several specifications serve different purposes like generating web pages reading writing database transactional way managing distributed queues java ee apis include several technologies extend functionality base java se apis enterprise javabeans connectors servlets javaserver pages several web service technologies attempt limit footprint web containers physical conceptual terms web profile created subset java ee specifications java ee web profile comprises following although definition java ee implementations provide base level technologies namely java ee spec associated apis differ considerably respect extra features like connectors clustering fault tolerance high availability security etc installed size memory footprint startup time etc code sample shown demonstrates various technologies java ee 7 used together build web form editing user java ee web ui built using servlet javaserver pages jsp javaserver faces jsf facelets example uses jsf facelets explicitly shown input components use java ee bean validation api covers validate constraints assist view java ee uses concept called backing bean example uses contexts dependency injection cdi enterprise javabean ejb implement business logic enterprise javabean ejb dedicated technology java ee actual persistence jdbc java persistence api jpa used example uses ejb jpa explicitly shown jta used covers ejb control transactional behavior defining entity/model classes java ee provides java persistence api jpa expressing constraints entities provides bean validation api example uses technologies | [
5015,
3951,
1479,
401,
5408,
773,
6156,
2619,
2980,
2624,
4384,
5822,
2322,
6586,
5536,
3077,
2371,
5209,
7347,
6270,
6986,
6280,
6281,
3488,
4185,
2799,
6319,
2807,
631,
1003,
7459,
7460,
2487,
2126,
3879,
7109,
2506,
2517,
2520,
4997,
... | Train |
2,520 | 9 | Java_Platform,_Micro_Edition:java platform micro edition java platform micro edition java computing platform development deployment portable code embedded mobile devices micro-controllers sensors gateways mobile phones personal digital assistants tv set-top boxes printers java formerly known java 2 platform micro edition j2me platform uses object-oriented java programming language part java software-platform family java designed sun microsystems acquired oracle corporation 2010 platform replaced similar technology personaljava originally developed java community process jsr 68 different flavors java evolved separate jsrs oracle provides reference implementation specification tended provide free binary implementations java runtime environment mobile devices rather relying third parties provide 22 december 2006 java source code licensed gnu general public license released project name phoneme 2008 java platforms currently restricted jre 1.3 features use version class file format internally known version 47.0 oracle ever declare new round java configuration versions support later class file formats language features corresponding jre 1.5 1.6 notably generics entail extra work part platform vendors update jres java devices implement profile common mobile information device profile aimed mobile devices cell phones personal profile aimed consumer products embedded devices like set-top boxes pdas profiles subsets configurations currently two connected limited device configuration cldc connected device configuration cdc 2.1 billion java enabled mobile phones pdas popular sub- 200 devices nokia series 40 also used bada operating system symbian os along native software users windows ce windows mobile maemo meego android download java respective environments proof-of-concept android connected limited device configuration cldc contains strict subset java-class libraries minimum amount needed java virtual machine operate cldc basically used classifying myriad devices fixed configuration configuration provides basic set libraries virtual-machine features must present implementation j2me environment coupled one profiles connected limited device configuration gives developers solid java platform creating applications consumer embedded devices configuration designed devices 160kb 512kb total memory minimum 160kb rom 32kb ram available java platform designed mobile phones mobile information device profile includes gui data storage api midp 2.0 includes basic 2d gaming api applications written profile called midlets almost new cell phones come midp implementation de facto standard downloadable cell phone games however many cellphones run midlets approved carrier especially north america jsr 271 mobile information device profile 3 final release 09 dec 2009 specified 3rd generation mobile information device profile midp3 expanding upon functionality areas well improving interoperability across devices key design goal midp3 backward compatibility midp2 content information module profile imp profile embedded headless devices vending machines industrial embedded applications security systems similar devices either simple display limited network connectivity originally introduced siemens mobile nokia jsr-195 imp 1.0 strict subset midp 1.0 except n't include user interface apis — words n't include support java package codice_1 jsr-228 also known imp-ng imp next generation based midp 2.0 leveraging midp 2.0 new security networking types apis apis codice_2 codice_3 n't include ui apis game api connected device configuration subset java se containing almost libraries gui related richer cldc foundation profile java connected device configuration cdc profile profile intended used devices requiring complete implementation java virtual machine including entire java platform standard edition api typical implementations use subset api set depending additional profiles supported specification developed java community process personal basis profile extends foundation profile include lightweight gui support form awt subset platform bd-j built upon sun provides reference implementation configurations profiles midp cdc starting javame 3.0 sdk netbeans-based ide support single ide contrast numerous binary implementations java platform built sun servers workstations sun provide binaries platforms java targets exception midp 1.0 jre jvm palm os sun provides j2me jre microsoft windows mobile pocket pc based devices despite open-letter campaign sun release rumored internal implementation personaljava known code name captain america third party implementations widely used windows mobile vendors operating systems targeting java implemented docomo form doja savaje savaje os latter company purchased sun april 2007 forms basis sun javafx mobile open-source mika vm aims implement javame cdc/fp certified certified implementations required charge royalties impractical open-source project consequently devices use implementation allowed claim javame cdc compatibility linux-based android operating system uses proprietary version java similar identical java esr consortium devoted standards embedded java especially cost effective standards typical applications domains industrial control machine-to-machine medical e-metering home automation consumer human-to-machine-interface ... | [
5015,
2564,
5391,
740,
401,
5408,
6465,
5062,
5068,
2240,
4726,
424,
7947,
6156,
2619,
5794,
6158,
7956,
2624,
7235,
6510,
4400,
1544,
2300,
5486,
484,
4055,
6190,
5499,
3039,
1582,
3044,
5872,
1616,
3077,
3081,
7347,
3097,
4147,
6280,
... | Test |
2,521 | 2 | NeXT_character_set:next character set next character set often aliased nextstep encoding vector we8nextstep next-multinational used nextstep openstep operating systems next workstations beginning 1988 based adobe systems postscript ps character set aka adobe standard encoding unused code points filled characters iso 8859-1 latin 1 although differing code points following table shows next character set character shown potential unicode equivalent code points differing adobe standard encoding shown boxed codepoints 00 0 7f 127 nearly identical ascii | [
3764,
1598,
5450,
5101,
7798,
2438,
6016,
1457,
2621,
246
] | Train |
2,522 | 6 | IOzone:iozone iozone file system benchmark utility originally made william norcott enhanced capps others.. source code available iozone.org mmap file i/o uses posix threads 2007 infoworld bossie awards best file i/o tool windows version iozone uses cygwin builds available aix bsdi hp-ux irix freebsd linux openbsd netbsd osfv3 osfv4 osfv5 sco openserver solaris mac os x windows 95/98/me/nt/2k/xp available test profile phoronix test suite | [
1458,
7442,
2451,
7635,
7403,
2743,
578,
3156,
352,
1451,
1331,
900,
1435
] | Test |
2,523 | 4 | Passports_of_the_EFTA_member_states:passports efta member states passports issued european free trade association efta member states iceland liechtenstein norway switzerland used citizens exercise right free movement within efta european economic area eea consists iceland liechtenstein norway addition member states european union instead part eea switzerland series bilateral agreements eu european single market consequently extended exceptions efta member states efta member states also signatories schengen agreement part schengen area citizens efta member states generally rights eu citizens eea countries treated eu citizens purposes travel entry eea countries going border controls enter efta eea member state efta eu citizens possessing valid biometric passports sometimes able use automated gates instead immigration counters whilst citizens using national identity card non-biometric passport non-eea citizens must use immigration counter anyone travelling children must also use immigration counter note efta organisation issue rules passport design validity four countries european union schengen regulations besides global icao regulations efta article used common name countries international civil aviation organization icao issues passport standards treated recommendations national governments size passport booklets normally complies iso/iec 7810 id-3 standard specifies size size b7 format passport cards issued id-1 credit card sized standard efta member states except liechtenstein icao members liechtenstein delegated switzerland implement treaty make applicable territory liechtenstein according council regulation ec 2252/2004 passports travel documents issued schengen member states shall comply minimum security standards passports must incorporate storage medium chip contains holder facial image fingerprints obligation apply identity cards temporary passports travel documents validity one year less regulation limited harmonization security features addition harmonization security features biometrics member states european union started harmonise aspects designs ordinary passports types passports diplomatic service emergency passports passports issued eu member states common recommended lay burgundy colour words “ european union ” followed name country efta member states norway passport burgundy color however coat arms placed name issuing state norway instead name state word passport eu passports iceland liechtenstein hand follows order eu passports issues blue ordinary passports burgundy passports travel document shall contain machine-readable biographical data page shall comply part 1 machine-readable passports icao document 9303 way issued shall comply specifications machine-readable passports set therein newer efta passports contain machine-readable zone contains name nationality information identification page designed way computers fairly easily read information although still human readable since contains letters a–z digits space character bar graph similar apostrophes similar omitted hyphens spaces replaced angle bracket diacritical marks permitted mrz even though may useful distinguish names use diacritical marks mrz could confuse machine-reading equipment names containing non-english letters usually spelled correct way visual non-machine-readable zone passport mapped a-z according standards international civil aviation organization icao machine-readable zone following mapping specified languages efta countries å → aa æ → ae ä → ae ð → ø → oe ö → oe ß → ss þ → th ü → ue letters accents otherwise replaced simple letters françois becomes francois etc. example german names müller becomes mueller groß becomes gross gößmann becomes goessmann icao mapping mostly used computer-generated internationally used documents air tickets sometimes like us visas also simple letters used muller gossmann three possible spelling variants name e.g müller mueller muller different documents sometimes lead confusion use two different spellings within document like passports german-speaking countries may give people unfamiliar foreign orthography impression document forgery recommended use spelling used machine-readable passport zone visas airline tickets etc. refer zone questioned thing applies name long fit airline ticket system otherwise problems arise machine-readable room 39 letters name visual zone contain many fit icelandic passports blue icelandic coat arms emblazoned centre front cover words ísland icelandic iceland english islande french inscribed coat arms words vegabréf icelandic passport english passeport french inscribed coat arms icelandic passports standard biometric symbol bottom vegabréf literally means road letter word used scandinavia historic centuries meaning internal passport icelandic passport includes following data information page ends machine readable zone liechtenstein passports blue coat arms liechtenstein emblazoned centre words fürstentum liechtenstein inscribed coat arms reisepass international biometric passport symbol information page ends machine readable zone regular norwegian passports burgundy colour norway coat arms emblazoned top front cover words norge noreg norway norway bokmål norwegian one two forms norwegian nynorsk norwegian form norwegian english respectively inscribed coat arms word pass passport emblazoned name country new biometric passport standard biometric symbol bottom norwegian passport includes following data information page ends machine-readable zone starting p x x indicates type passport example ordinary passports contain pvnor v presumably means vanlig ordinary norwegian swiss passports red colour words schweizer pass german passeport suisse french passaporto svizzero italian passaport svizzer romansh swiss passport english top right corner swiss equilateral white cross standard biometric symbol placed bottom right hand side swiss passport includes following data full plastic information page information page ends machine readable zone visa requirements administrative entry restrictions authorities states placed citizens european free trade association efta member states efta member states citizens enjoy freedom movement territories accordance efta convention efta nationals also enjoy freedom movement european union eu efta nationals eu citizens visa-exempt legally entitled enter reside countries citizens ’ rights directive also sometimes called free movement directive defines right free movement citizens european economic area eea includes three efta members iceland norway liechtenstein member states eu switzerland member efta eea bound directive rather separate bilateral agreement free movement eu result de facto citizen efta country live work efta countries eu countries citizen eu country live work efta countries voting working sensitive fields government police military citizenship often required non-citizens may rights welfare unemployment benefits citizens efta member states part schengen area area comprising 26 european states officially abolished passport types border control mutual borders area mostly functions single country international travel purposes common visa policy area named schengen agreement since implementation schengen rules border posts closed often entirely removed participating countries pro forma borders subject photo-journalistic art project schengen borders code requires participating states remove obstacles free traffic flow internal borders thus road rail air passengers longer identity checked border guards travelling schengen countries although security controls carriers still permissible travellers still bring passport national identity card one may required alternative holding passport valid national identity card also used exercise right free movement within eea switzerland strictly speaking necessary eea swiss citizen possess valid passport national identity card enter eea switzerland theory eea swiss citizen outside eea switzerland prove his/her nationality means e.g presenting expired passport national identity card citizenship certificate he/she must permitted enter eea switzerland eea swiss citizen unable demonstrate his/her nationality satisfactorily must nonetheless given 'every reasonable opportunity obtain necessary documents delivered within reasonable period time states schengen area strengthened border controls non-schengen countries participating countries required apply strict checks travellers entering exiting schengen area checks co-ordinated european union frontex agency subject common rules details border controls surveillance conditions permission enter schengen area may granted exhaustively detailed schengen borders code. ref name= reg2016/399 regulation eu 2016/399 european parliament council 9 march 2016 union code rules governing movement persons across borders schengen borders code oj l 77 23 march 2016 p. 1 /ref part schengen area reciprocity required comes visa free access since 2001 european union issued two lists regarding visas schengen area white list countries whose nationals require visas annex ii black list countries whose nationals require visas annex per regulation 539/2001 amended regulation 1289/2013 reciprocity required annex ii countries territories means countries must offer visa-free access 90 days citizens 26 schengen member states passport rankings number countries territories holders could visit without visa obtaining visa arrival 2018 follows sourced henley partners passport index 2018 norway allows citizens one passport circumvent certain travel restrictions useful wanting travel passport remains consulate visa application processed wanting apply visas already foreign country also needed circumvent fact visitors whose passports show evidence visit israel allowed enter iran iraq lebanon libya saudi arabia sudan syria yemen however possible get israeli entry exit stamp separate piece paper since efta member state make citizenship laws dual citizenship always possible efta countries iceland allows dual multiple citizenship without restrictions switzerland regulate/restrict conditions naturalization immigrants vary regionally norway allow exceptional cases liechtenstein citizens descent foreigners wanting naturalize citizen efta member state live work efta- eu member states necessarily vote work sensitive fields government police military citizenship often required non-citizens may rights welfare unemployment benefits citizens | [
5763,
7461,
2523
] | Test |
2,524 | 9 | Wolfram_SystemModeler:wolfram systemmodeler wolfram systemmodeler developed wolfram mathcore platform engineering well life-science modeling simulation based modelica language provides interactive graphical modeling simulation environment customizable set component libraries features wolfram systemmodeler include wolfram systemmodeler primary interface model center interactive graphical environment including customizable set component libraries models developed model center simulated simulation center software also provides tight integration mathematica environment users develop simulate document analyze wolfram systemmodeler models within mathematica notebooks software used engineering field well life sciences originally developed mathcore engineering mathmodelica acquired wolfram research march 30 2011 re-released wolfram systemmodeler may 23 2012 improved integration wolfram mathematica wolfram systemmodeler uses free object-oriented modeling language modelica language designed modeling physical systems designed support library development model exchange modern language built acausal modeling mathematical equations object-oriented constructs facilitate reuse modeling knowledge since version 11.3 wolfram language supports direct access modelica libraries system simulation analysis notebook interface | [
6527,
8082,
3148,
3723,
4067,
4474,
7516,
4759,
4940,
5571,
5659,
4504,
578,
1336
] | Test |
2,525 | 7 | Beqom:beqom beqom global provider compensation management software delivered using cloud computing platform beqom global headquarters nyon switzerland offices throughout north america emea components software include functionality manage sales incentives bonuses equity merit pay long term incentives channel partner incentives beqom founded excentive international 2009 software executives coming hyperion outlooksoft sap company gained notability 2009 one hr software vendors offering comprehensive compensation application year company began worldwide expansion opening north american headquarters september 1 2013 company changed name beqom july 2014 swisscom ventures investing arm swisscom ag renaissance pme swiss pension investing fund managed swiss technology investor vinci capital announced completed financing round beqom help fund international expansion efforts | [
2961
] | Test |
2,526 | 9 | CS-Script:cs-script cs-script free open-source scripting platform enables creating scripts ecma-compliant c syntax scripts access .net framework mono apis cs-script offers standalone script execution well hosting script engine clr apps newer edition product called cs-script.core works .net core existing .net development tools e.g visual studio sharp develop used allowing editing debugging scripts within traditional .net-aware development environments additionally cs-script support added notepad++ visual studio code via plugins flashdevelop uses cs-script internal scripting engine bring script engine file 100 kb size system .net runtime installed script run scripts run system clr installed including mono cs-script truly object-oriented language supports vb.net c++/cli j .net functionality available including fcl com interop remoting wpf wcf easily available debugger rich ide visual studio third-party ides execution model within script .net application static void main interpretation statement script done even statement frequently used throughout code strong typing luxury available scripting languages software development tasks done language gui development script application becomes easy scripting system extended using new assemblies written .net languages com components script easily converted application vice versa functionality clr application extended scripting run within wsh mixed one wsf file external links | [
4156,
2530
] | Test |
2,527 | 1 | Dynaset:dynaset 1 dynaset short dynamic set set data dynamically linked back database instead query result stored temporary table data updated directly user dynaset allows user view update data contained dynaset thus university lecturer queried students received distinction assignment found error student record would need update data dynaset would automatically update student database record without need send specific update query storing query results temporary table concept initially put forth dr. e.f. codd inventor relational database management system rdbms concept 2 dynaset temporary set data taken one tables underlying file dynaset may query defined access database single table subset table result joining multiple tables dynaset updated file locked opened readonly data dynaset live i.e. changes made data project visual basic executing appear corresponding recordset note dynasets created joining tables typically non-updateable word dynaset coined david risher design meeting microsoft access 1.0 | [
2054
] | Validation |
2,528 | 6 | Path_(computing):path computing path general form name file directory specifies unique location file system path points file system location following directory tree hierarchy expressed string characters path components separated delimiting character represent directory delimiting character commonly slash backslash character colon though operating systems may use different delimiter paths used extensively computer science represent directory/file relationships common modern operating systems essential construction uniform resource locators urls resources represented either absolute relative paths multics first introduced hierarchical file system directories separated mid-1960s around 1970 unix introduced slash character directory separator 1981 first version microsoft dos released ms-dos 1.0 support file directories also major portion utility commands packaged ms-dos 1.0 came ibm command line syntax used slash character 'switch prefix example codice_1 runs codice_2 command wide list format option use slash still found command interface microsoft windows contrast unix uses dash character command line switch prefix directory support added ms-dos version 2.0 kept switch prefix character backwards compatibility microsoft chose backslash character directory separator looks similar slash character absolute full path points location file system regardless current working directory must include root directory contrast relative path starts given working directory avoiding need provide full absolute path filename considered relative path based current working directory working directory file parent directory file found error result file addressed name japanese korean versions windows may often display '¥ character '₩ character instead directory separator cases code backslash drawn characters early versions ms-dos replaced backslash glyphs display make possible display programs understood 7-bit ascii characters square brackets replaced well see iso 646 windows codepage 932 japanese shift jis codepage 949 korean although even first version windows supported 8-bit iso-8859-1 character set yen sign u+00a5 modern versions windows supports unicode sign u+20a9 much software continue display backslashes found ascii files way preserve backwards compatibility mac os x derivative unix uses unix paths internally however preserve compatibility software familiarity users many portions gui switch typed user internally switch back displaying filenames entered user also changed inverse translation happen programming languages also use paths e.g file opened programming languages use path representation underlying operating system direct access operating system paths hinder portability programs support portable programs java uses file.separator distinguish separated paths seed7 different approach path representation seed7 paths use unix path convention independent operating system windows mapping takes place e.g path /c/users mapped c \users microsoft windows unc short universal naming convention uniform naming convention specifies common syntax describe location network resource shared file directory printer unc syntax windows systems generic form microsoft often refers network path microsoft windows interfaces also allow require unc syntax webdav share access rather url unc syntax extended optional components denote use ssl tcp/ip port number webdav url codice_5 becomes viewed remotely sharedfolder may name different program server sees opening \sharedfolder instead sharedfolder name consists arbitrary name assigned folder defining sharing microsoft windows interfaces also accept long unc microsoft windows uses following types paths versions windows prior windows xp apis accept long device paths could accept 260 characters shell windows xp windows vista explorer.exe allows path names 248 characters long since uncs start two backslashes backslash also used string escaping regular expressions result extreme cases leaning toothpick syndrome escaped string regular expression matching unc begins 8 backslashes – codice_11 – string regular expression require escaping simplified using raw strings c codice_12 python codice_13 regular expression literals perl codice_14 unix-like systems use similar syntax posix allows treating path beginning two slashes implementation-defined manner though cases systems must treat multiple slashes single slashes many applications unix-like systems example scp rcp rsync use resource definitions like urls service name 'smb following worked example discusses behavior unix-style file system would appear terminal terminal application command-line window attached current working directory cwd one wants change current working directory moment relative path desired directory represented short absolute path directory given bobapples relative path directory wanted following may typed command prompt change current working directory bobapples two dots point upwards hierarchy indicate parent directory one dot represents current directory components complex relative path e.g. alone first component relative path represents working directory using refer file current working directory sometimes usefully distinguish resource found default directory means example view specific version manual page instead one installed system contrary popular belief windows system api accepts slash thus unix examples work many applications windows interpret slash purposes treat invalid character thus require enter backslash — notably cmd.exe shell often called terminal typically runs terminal window note many shells available windows tcsh windows powershell allow slash addition indicate single root instead root current disk indicating file disk current one requires prefixing drive letter colon ambiguity ensues colon valid character ms-dos filename thus one file called current directory unc names path starting support slashes following examples show ms-dos/windows-style paths backslashes used match common syntax path points file name located directory turn located root directory drive path refers file called located parent directory current directory drive path denotes file called located directory turn located directory located current directory current drive since example gives drive-specification rather simple path points file named codice_15 located current directory since path lacks directory-specification current drive since drive specification present path refers first serial port com1 example uses path containing slashes directory separator command redirects content file codice_16 command path containing forward slashes often needs surrounded double quotes disambiguate command line switches cd drive letter /program files work root drive letter directory appears treat forward slashes .\ example works also root folder would treated relative path directory name specified forward slashes get following error setting environment variables sometimes necessary provide path contain spaces instance defined c \program files\java ... cause scripts halt encounter space path name get eight-character name windows assigns directory substitution environment variables use directory listing command /x option one level target directory instance following get eight character name directories directly root correct way represent path directory trailing slash period posix windows might think paths end trailing slash directories actuality path ending trailing slash represents files within directory simply path file may may directory path directory even may eventually resolve directory | [
1710,
2086,
2361,
3763,
3843,
4759,
190,
1534,
5637,
6264,
4771,
5116,
3626,
5480,
5566,
7142,
5571,
312,
1281,
3463,
6640,
6113,
405,
7011,
3033,
6380,
4978,
7021,
149,
4438,
4174,
4897,
7396,
1411,
1047,
8133,
1598,
3827,
4275,
6857,
... | Test |
2,529 | 6 | Disk_encryption_software:disk encryption software disk encryption software computer security software protects confidentiality data stored computer media e.g. hard disk floppy disk usb device using disk encryption compared access controls commonly enforced operating system os encryption passively protects data confidentiality even os active example data read directly hardware different os addition crypto-shredding suppresses need erase data end disk lifecycle disk encryption generally refers wholesale encryption operates entire volume mostly transparently user system applications generally distinguished file-level encryption operates user invocation single file group files requires user decide specific files encrypted disk encryption usually includes aspects disk including directories adversary determine content name size file well suited portable devices laptop computers thumb drives particularly susceptible lost stolen used properly someone finding lost device penetrate actual data even know files might present disk data protected using symmetric cryptography key randomly generated disk encryption first established key encrypted way using password pass-phrase known ideally user thereafter order access disk data user must supply password make key available software must done sometime operating system start-up encrypted data used done software disk encryption typically operates level applications system programs low-level device drivers transparently user point view encrypting data produced program physically written disk conversely decrypts data immediately read presented program properly done programs unaware cryptographic operations disk encryption software e.g. truecrypt bestcrypt provide features generally accomplished disk hardware encryption ability mount container files encrypted logical disks file system encrypted logical inner volumes secretly hidden within free space obvious outer volumes strategies provide plausible deniability well-known examples disk encryption software include bitlocker windows filevault apple os/x truecrypt non-commercial freeware application windows os/x linux disk encryption systems veracrypt ciphershed active open source forks discontinued truecrypt project bestcrypt proprietary trialware offers levels plausible deniability might useful user compelled reveal password encrypted volume hidden volumes steganographic feature allows second hidden volume reside within apparent free space visible container volume sometimes known outer volume hidden volume separate file system password encryption key distinct container volume content hidden volume encrypted resides free space file system outer volume—space would otherwise filled random values hidden volume exist outer container brought online thorough disk encryption software whether inner outer volume mounted depends password provided normal password/key outer volume proves valid outer volume mounted password/key hidden volume proves valid existence hidden volume even detected mounted otherwise password/key successfully decrypt either inner outer volume descriptors neither mounted hidden volume created inside visible container volume user store important-looking information user actually mind revealing outer volume whereas sensitive information stored within hidden volume user forced reveal password user reveal password outer volume without disclosing existence hidden volume hidden volume compromised user takes certain precautions overwriting free areas host disk volumes stored file device/partition may intentionally contain discernible signatures unencrypted headers cipher algorithms designed indistinguishable pseudorandom permutation without knowing key presence data encrypted volume also undetectable unless known weaknesses cipher means impossible prove file partition encrypted volume rather random data without password mount characteristic also makes impossible determine volume contains another hidden volume file hosted volume opposed partitions may look place cases since entirely random data placed file intentionally however partition device hosted volume look different partition device wiped common disk wiping tool darik boot nuke one plausibly claim device partition wiped clear personal data portable traveller mode means encryption software run without installation system hard drive mode software typically installs temporary driver portable media since installing driver albeit temporarily administrative privileges still required disk encryption software allows encrypted volumes resized many systems implement fully resort using sparse files achieve encrypted volumes contain header cdb data may backed overwriting data destroy volume ability back useful restoring backup copy data may reset volume password backup taken | [
4921,
6247,
454,
1254,
3769,
1259,
902,
7258,
5571,
1008,
3866,
8092,
2399,
1382,
4616,
2426,
4536,
5440,
2979,
1805
] | Validation |
2,530 | 2 | .NET_Framework:.net framework .net framework pronounced dot net software framework developed microsoft runs primarily microsoft windows includes large class library named framework class library fcl provides language interoperability language use code written languages across several programming languages programs written .net framework execute software environment contrast hardware environment named common language runtime clr clr application virtual machine provides services security memory management exception handling computer code written using .net framework called managed code fcl clr together constitute .net framework fcl provides user interface data access database connectivity cryptography web application development numeric algorithms network communications programmers produce software combining source code .net framework libraries framework intended used new applications created windows platform microsoft also produces integrated development environment largely .net software called visual studio .net framework began proprietary software although firm worked standardize software stack almost immediately even first release despite standardization efforts developers mainly free open-source software communities expressed unease selected terms prospects free open-source implementation especially regarding software patents since microsoft changed .net development closely follow contemporary model community-developed software project including issuing update patent promising address concerns .net framework led family .net platforms targeting mobile computing embedded devices alternative operating systems web browser plug-ins reduced version framework .net compact framework available windows ce platforms including windows mobile devices smartphones .net micro framework targeted resource-constrained embedded devices silverlight available web browser plugin mono available many operating systems customized popular smartphone operating systems android ios game engines .net core targets universal windows platform uwp cross-platform cloud computing workloads microsoft began developing .net framework late 1990s originally name next generation windows services ngws part .net strategy late 2000 first beta versions .net 1.0 released august 2000 microsoft intel worked standardize common language infrastructure cli c december 2001 ratified ecma international ecma standards international organisation standardisation iso followed april 2003 current version iso standards iso/iec 23271:2012 iso/iec 23270:2006 microsoft partners hold patents cli c ecma iso require patents essential implementation made available reasonable non-discriminatory terms firms agreed meet terms make patents available royalty-free however apply part .net framework covered ecma-iso standards included windows forms ado.net asp.net patents microsoft holds areas may deterred non-microsoft implementations full framework october 3 2007 microsoft announced source code .net framework 3.5 libraries become available microsoft reference source license ms-rsl source code repository became available online january 16 2008 included bcl asp.net ado.net windows forms wpf xml scott guthrie microsoft promised linq wcf wf libraries added november 12 2014 microsoft announced .net core effort include cross-platform support .net source release microsoft coreclr implementation source entire … library stack .net core adoption conventional bazaar -like open-source development model consolation stewardship .net foundation miguel de icaza describes .net core redesigned version .net based simplified version class libraries microsoft immo landwerth explained .net core would foundation future .net platforms time announcement initial release .net core project seeded subset libraries source code coincided relicensing microsoft existing .net reference source away restrictions ms-rsl landwerth acknowledged disadvantages formerly selected shared license explaining made codename rotor non-starter community-developed open source project meet criteria open source initiative osi approved license november 2014 microsoft also produced update patent grants extends scope beyond prior pledges prior projects like mono existed legal grey area microsoft earlier grants applied technology covered specifications including strictly 4th editions ecma-334 ecma-335 new patent promise however places ceiling specification version even extends .net runtime technologies documented msdn formally specified ecma group project chooses implement allows mono projects maintain feature parity modern .net features introduced since 4th edition published without risk patent litigation implementation features new grant maintain restriction implementation must maintain minimum compliance mandatory parts cli specification march 31 2016 microsoft announced microsoft build completely relicense mono mit license even scenarios formerly commercial license needed microsoft also supplemented prior patent promise mono stating assert applicable patents parties using selling offering sale importing distributing mono announced mono project contributed .net foundation developments followed acquisition xamarin began february 2016 finished march 18 2016 microsoft press release highlights cross-platform commitment allows fully open-source modern server-side .net stack microsoft released source code wpf windows forms winui december 4 2018 may 8th 2019 microsoft announced .net 5.0 released november 2020 based .net core common language infrastructure cli provides language-neutral platform application development execution implementing core aspects .net framework within scope cli functions tied one language available across many languages supported framework .net framework includes common language runtime clr serves execution engine .net framework offers many services memory management type safety exception handling garbage collection security thread management programs written .net framework executed clr programs written .net framework compiled common intermediate language code cil opposed directly compiled machine code execution architecture-specific just-in-time compiler jit turns cil code machine code microsoft move .net core cli virtual execution system ves implementation known coreclr instead clr compiled cil code stored cli assemblies mandated specification assemblies stored portable executable pe file format common windows platform dynamic-link library dll executable exe files assembly consists one files one must contain manifest bearing metadata assembly complete name assembly confused file name disk contains simple text name version number culture public key token assemblies considered equivalent share complete name private key also used creator assembly strong naming public key token identifies private key assembly signed creator key pair typically person signing assembly sign assemblies strong name prior version assembly since creator possesses private key strong naming required add assemblies global assembly cache starting visual studio 2015 .net native compilation technology allows compilation .net code universal windows platform apps directly machine code rather cil code app must written either c visual basic.net .net framework includes implementation cli foundational standard libraries .net framework class library fcl organized hierarchy namespaces built-in application programming interfaces apis part either codice_1 codice_2 namespaces class libraries implement many common functions file reading writing graphic rendering database interaction xml document manipulation class libraries available cli compliant languages fcl implements cli base class library bcl class libraries—some specified cli microsoft specific bcl includes small subset entire class library core set classes serve basic api clr .net framework classes considered part bcl reside codice_3 codice_4 codice_5 bcl classes available .net framework well alternative implementations including .net compact framework microsoft silverlight .net core mono fcl refers entire class library ships .net framework includes expanded set libraries including bcl windows forms asp.net windows presentation foundation wpf also extensions base class libraries ado.net language integrated query linq windows communication foundation wcf workflow foundation wf fcl much larger scope standard libraries languages like c++ comparable scope standard libraries java introduction alternative implementations e.g. silverlight microsoft introduced concept portable class libraries pcl allowing consuming library run one platform proliferation .net platforms pcl approach failed scale pcls defined intersections api surface two platforms next evolutionary step pcl .net standard library created retroactively based codice_6 based apis found uwp silverlight new .net platforms encouraged implement version standard library allowing re-use extant third-party libraries run without new versions .net standard library allows independent evolution library app model layers within .net architecture nuget package manager .net platforms used retrieve third-party libraries .net project global library feed nuget.org private feeds maintained separately e.g. build server file system directory microsoft move .net core cli foundational class libraries implementation known corefx instead fcl atop class libraries multiple app models used create apps .net framework supports console windows forms windows presentation foundation asp.net asp.net core apps default app models offered alternative implementations .net framework console uwp asp.net core available .net core mono used power xamarin app models android ios macos retroactive architectural definition app models showed early 2015 also applied prior technologies like windows forms wpf microsoft introduced c++/cli visual studio 2005 language means compiling visual c++ programs run within .net framework parts c++ program still run within unmanaged visual c++ runtime specially modified parts translated cil code run .net framework clr assemblies compiled using c++/cli compiler termed mixed-mode assemblies since contain native managed code dll assemblies complex reverse engineer since .net decompilers .net reflector reveal managed code computer systems commonly require interaction newer older applications .net framework provides means access functions implemented newer older programs execute outside .net environment access component object model com components provided codice_7 codice_8 namespaces framework access functions via platform invocation services p/invoke access .net functions native applications via reverse p/invoke function .net framework introduces common type system cts defines possible data types programming constructs supported clr may may interact conforming cli specification feature .net framework supports exchange types object instances libraries applications written using conforming .net language cts clr used .net framework also enforce type safety prevents ill-defined casts wrong method invocations memory size issues accessing object also makes cli languages statically typed without type inference however starting .net framework 4.0 dynamic language runtime extended clr allowing dynamically typed languages implemented atop cli microsoft never implemented full framework system except microsoft windows engineered framework cross-platform implementations available operating systems see silverlight § alternative implementations microsoft submitted specifications cli includes core class libraries cts cil c c++/cli ecma international ecma international organization standardization iso making available official standards makes possible third parties create compatible implementations framework languages platforms .net framework security mechanism two general features code access security cas validation verification cas based evidence associated specific assembly typically evidence source assembly whether installed local machine downloaded internet cas uses evidence determine permissions granted code code demand calling code granted specified permission demand causes clr perform call stack walk every assembly method call stack checked required permission assembly granted permission security exception thrown managed cil bytecode easier reverse-engineer native code unless obfuscated decompiler programs enable developers reverse-engineering skills view source code behind unobfuscated .net assemblies contrast apps compiled native machine code much harder reverse-engineer source code almost never produced successfully mainly compiler optimizations lack reflection creates concerns business community possible loss trade secrets bypassing license control mechanisms mitigate microsoft included dotfuscator community edition visual studio .net since 2002 third-party obfuscation tools also available vendors vmware v.i labs turbo red gate software method-level encryption tools .net code available vendors safenet clr frees developer burden managing memory allocating freeing done handles memory management detecting memory safely freed instantiations .net types objects allocated managed heap pool memory managed clr long reference object exists may either direct via graph objects object considered use reference object exists reached used becomes garbage eligible collection .net framework includes garbage collector gc runs periodically separate thread application thread enumerates unusable objects reclaims memory allocated non-deterministic compacting mark-and-sweep garbage collector gc runs set amount memory used enough pressure memory system since guaranteed conditions reclaim memory reached gc runs non-deterministic .net application set roots pointers objects managed heap managed objects include references static objects objects defined local variables method parameters currently scope objects referred cpu registers gc runs pauses application object referred root recursively enumerates objects reachable root objects marks reachable uses cli metadata reflection discover objects encapsulated object recursively walk enumerates objects heap initially allocated contiguously using reflection objects marked reachable garbage mark phase since memory held garbage consequence considered free space however leaves chunks free space objects initially contiguous objects compacted together make free space managed heap contiguous reference object invalidated moving object updated gc reflect new location application resumed garbage collection ends latest version .net framework uses concurrent garbage collection along user code making pauses unnoticeable done background garbage collector used .net framework also generational objects assigned generation newly created objects tagged generation 0 objects survive one garbage collection tagged generation 1 generation 1 objects survive another collection generation 2 framework uses generation 2 objects higher generation objects garbage collected less often lower generation objects raises efficiency garbage collection older objects tend longer lifetimes newer objects ignoring older objects collection runs fewer checks compaction operations needed total application first launched .net framework compiles cil code executable code using just-in-time compiler caches executable program .net native image cache due caching application launches faster subsequent launches although first launch usually slower speed first launch developers may use native image generator utility manually ahead-of-time compile cache .net application garbage collector integrated environment introduce unanticipated delays execution developer little direct control large applications number objects garbage collector needs work become large means take long time visit rearrange .net framework provides support calling streaming simd extensions sse via managed code april 2014 visual studio 2013 update 2 however mono provided support simd extensions version 2.2 within namespace 2009 mono lead developer miguel de icaza expressed hope simd support adopted clr ecma standard streaming simd extensions available x86 cpus since introduction pentium iii architectures arm mips also simd extensions case cpu lacks support extensions instructions simulated software .net framework predominant implementation .net technologies implementations parts framework exist although runtime engine described ecma-iso specification implementations may encumbered patent issues iso standards may include disclaimer attention drawn possibility elements document may subject patent rights iso shall held responsible identifying patent rights harder develop alternatives fcl described open standard may subject copyright restrictions also parts fcl windows-specific functions behavior implementation non-windows platforms problematic alternative implementations parts framework listed microsoft managed code frameworks components licensed follows | [
7149,
4295,
5726,
1460,
26,
2928,
1475,
5747,
7195,
2953,
53,
2961,
7213,
5781,
4377,
5794,
1524,
1526,
2986,
1534,
7247,
2999,
111,
3005,
1550,
7263,
1557,
7272,
4425,
1571,
5850,
140,
145,
150,
4441,
3048,
4445,
3052,
4448,
3057,
163,... | Test |
2,531 | 7 | Visma_Solutions:visma solutions visma solutions finnish joint stock company offers saas business software companies company provides professional services automation software visma severa valueframe e-accounting software visma netvisor budgeting forecasting software visma navita e-invoicing service maventa online signature service visma sign visma solutions part visma group visma solutions founded end year 2012 former joint stock company called netvisor named visma solutions netvisor founded markku nylund studied lappeenranta university technology 2000 netvisor merged bittivisio first version software launched 2002 since netvisor operating joint owned company responsible marketing r activities software 2011 netvisor part visma group end 2012 company ’ name changed visma solutions visma severa founded 2004 ari-pekka salovaara jari kärkkäinen studying lappeenranta university technology time 2010 company acquired visma 2013 part visma solutions company granted various accolades visma severa psa software optimized organizations pr advertising design engineering law architecture accounting firms visma severa used 700 professional companies worldwide main markets finland sweden norway visma netvisor e-accounting software used 20 000 companies software developed 10 years one pioneers field e-accounting saas software netvisor rewarded multiple times example 2005 netvisor ’ eaccounting service nominated world ’ best online service banks 2010 netvisor among ten fastest growing technology companies finland visma navita cloud-based service budgeting forecasting reporting business management data used navita based real-time figures updated directly accounting management systems maventa popular e-invoicing service nordics 150 000 users maventa connected existing erp-system used separate internet based software valueframe psa software suited architects advertising communication agencies consultants visma sign legally binding online signature service visma sign integrated online forms immediate signing used send signing invitations via email text messages | [
1037
] | Test |
2,532 | 3 | ARM_Cortex-A73:arm cortex-a73 arm cortex-a73 microarchitecture implementing armv8-a 64-bit instruction set designed arm holdings sophia design centre cortex-a73 2-wide decode out-of-order superscalar pipeline cortex-a73 serves successor cortex-a72 designed offer 30 greater performance 30 increased power efficiency design cortex-a73 based 32-bit armv7-a cortex-a17 emphasizing power efficiency sustained peak performance cortex-a73 primarily targeted mobile computing reviews cortex-a73 showed improved integer instructions per clock ipc though lower floating point ipc relative cortex-a72 cortex-a73 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc cortex-a73 also first arm core modified arm semi-custom 'built arm license kryo 280 first released semi-custom product though modifications made relative stock cortex-a73 announced hisilicon kirin 960 released 2016 utilizes 4 cortex-a73 cores clocked 2.36 ghz 'big cores big.little arrangement 4 'little arm cortex-a53 cores mediatek helio x30 utilizes 2 cortex-a73 cores 2.56 ghz 'big cores deca-core big.little arrangement 4 cortex-a53 4 cortex-a35 'little cores kryo 280 released march 2017 qualcomm snapdragon 835 uses modified cortex-a73 core soc utilizes 8 kryo 280 cores big.little arrangement two 4-core blocks clocked 2.456 ghz 1.906 ghz modifications made qualcomm relative stock cortex-a73 core unknown resulting kryo 280 core demonstrated increased integer ipc kryo 260 also used cortex-a73 cores though lower clock speeds kryo 280 combination cortex-a53 cores | [
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
67,
441,
446,
451,
6874,
6165,
463,
5472,
469,
4041,
3008,
3365,
6910,
5845,
7654,
3397,
1977,
2339,
1237,
2711,
1995,
550,
4847,
3786,
568,
2024,
5576,
4879,
7376,
5585,
... | Test |
2,533 | 2 | MSSTYLES:msstyles msstyles microsoft file format contains bitmaps metadata windows xp skinning engine first introduced windows whistler build 2250 engine unmodified state fully applies .msstyles files digitally signed microsoft luna zune theme default windows xp style known luna additional custom-made styles available internethowever digitally signed four signed styles include royale media center edition energy blue royale noir windows embedded standard ctp refresh zune style custom-made styles used using different methods means manual replacement automation executable files many popular freely distributed theme-patching executable files found online windows vista windows 7 also use .msstyles files skinning like aero.msstyles file however format files completely different .msstyles files transferable windows vista windows xp version .msstyles file contains png images metadata manual way replace three dll files uxtheme.dll shsvcs.dll themeui.dll use unsigned custom visual styles windows vista | [
4880,
4759
] | Test |
2,534 | 5 | UNIStim:unistim unistim unified networks ip stimulus deprecated telecommunications protocol developed nortel acquired avaya ip phone terminals soft phones ip pbx communications manufacturers ip pbx equipment aastra alcatel avaya ... followed path developing proprietary protocols protocols gradually replaced complemented standardized protocols including h.323 especially sip protocols works master slave mode operations simply reflect basic actions user perform terminal press button commands sent display network terminal turn light display message stimulus implement easily new facility telephone without modify software embedded terminals simplifies procedures maintenance upgrade installed base sense stimulus protocols differ functional protocols sip h.323 impose one hand service defined standard terminal loads specific logic corresponding service question approach allows manufacturers quickly deliver wide range services without wait services standardized nortel active standardization effort protocols within ietf drawing work pre-standard unistim already developed work nortel ip pbx systems ip centrex platforms 1996 contributions common nortel cisco systems example culminated publication ietf rfc 3054 media gateway ip phone application profile outlining options protocol megaco/h.248 ip command posts unistim protocol implemented avaya ip pbx systems licensed third-party suppliers → history see example release company spectralink details implementation protocol unistim available document telephony data network services telephone filed united states patent 7068641 may 7 1999 secure unistim protocol implemented as5300 cs2100 enables encryption unistim protocol use smc 2450 | [
7148,
6691,
883,
456,
6879,
2281,
6521,
6976,
899,
7888,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
4783,
2119,
6908,
7091,
3383,
2219,
3640,
3797,
7095,
2043,
3887,
3312,
6927,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880
] | Test |
2,535 | 4 | BASHLITE:bashlite bashlite also known gafgyt lizkebab qbot torlus lizardstresser malware infects linux systems order launch distributed denial-of-service attacks ddos originally also known name bashdoor term refers exploit method used malware used launch attacks 400 gbps original version 2014 exploited flaw bash shell shellshock software bug exploit devices running busybox months later variant detected could also infect vulnerable devices local network 2015 source code leaked causing proliferation different variants 2016 reported one million devices infected identifiable devices participating botnets august 2016 almost 96 percent iot devices 95 percent cameras dvrs roughly 4 percent home routers less 1 percent compromised linux servers bashlite written c designed easily cross-compile various computer architectures exact capabilities differ variants common features generate several different types ddos attacks hold open tcp connections send random string junk characters tcp udp port repeatedly send tcp packets specified flags may also mechanism run arbitrary shell commands infected machine facilities reflected amplification attacks bashlite uses client–server model command control protocol used communication essentially lightweight version internet relay chat irc even though supports multiple command control servers variants single command control ip-address hardcoded propagates via brute forcing using built-in dictionary common usernames passwords malware connects random ip addresses attempts login successful logins reported back command control server | [
2173,
362,
2632,
2376,
1632,
6328,
557,
2733,
6715,
7441,
3281,
3192,
7637,
1554,
5571,
578,
7186,
6643,
6740,
1954,
5847,
5675,
6370,
7657,
1766,
6922,
51,
7294,
2693,
1691,
7307,
3154,
7600,
1435,
4110,
88
] | Test |
2,536 | 6 | Ceph_(software):ceph software computing ceph pronounced free-software storage platform implements object storage single distributed computer cluster provides interfaces object- block- file-level storage ceph aims primarily completely distributed operation without single point failure scalable exabyte level freely available ceph replicates data makes fault-tolerant using commodity hardware requiring specific hardware support result design system self-healing self-managing aiming minimize administration time costs ceph employs five distinct kinds daemons fully distributed may run set servers clients different use cases directly interact different subsets ceph striping individual files across multiple nodes achieve higher throughput similar raid0 stripes partitions across multiple hard drives adaptive load balancing supported whereby frequently accessed objects replicated nodes bluestore default recommended storage type production environments ceph storage implementation providing better latency configurability filestore backend avoiding shortcomings filesystem based storage involving additional processing caching layers filestore backend still considered useful stable xfs recommended underlying filesystem type production environments btrfs recommended non-production environments ext4 filesystems recommended resulting limitations maximum rados objects length ceph implements distributed object storage ceph software libraries provide client applications direct access reliable autonomic distributed object store rados object-based storage system also provide foundation ceph features including rados block device rbd rados gateway ceph file system librados software libraries provide access c c++ java php python rados gateway also exposes object store restful interface present native amazon s3 openstack swift apis ceph object storage system allows users mount ceph thin-provisioned block device application writes data ceph using block device ceph automatically stripes replicates data across cluster ceph rados block device rbd also integrates kernel-based virtual machines kvms ceph rbd interfaces ceph object storage system provides librados interface cephfs file system stores block device images objects since rbd built librados rbd inherits librados abilities including read-only snapshots revert snapshot striping images across cluster ceph improves read access performance large block device images block device virtualized providing block storage virtual machines virtualization platforms apache cloudstack openstack opennebula ganeti proxmox virtual environment ceph file system cephfs runs top object storage system provides object storage block device interfaces ceph metadata server cluster provides service maps directories file names file system objects stored within rados clusters metadata server cluster expand contract rebalance file system dynamically distribute data evenly among cluster hosts ensures high performance prevents heavy loads specific hosts within cluster clients mount posix-compatible file system using linux kernel client older fuse-based client also available servers run regular unix daemons ceph initially created sage weil doctoral dissertation advised professor scott a. brandt jack baskin school engineering university california santa cruz ucsc sponsored advanced simulation computing program asc including los alamos national laboratory lanl sandia national laboratories snl lawrence livermore national laboratory llnl first line code ended part ceph written sage weil 2004 summer internship llnl working scalable filesystem metadata management known today ceph mds 2005 part summer project initiated scott a. brandt led carlos maltzahn sage weil created fully functional file system prototype adopted name ceph ceph made debut sage weil giving two presentations november 2006 one usenix osdi 2006 another sc'06 graduation fall 2007 weil continued work ceph full-time core development team expanded include yehuda sadeh weinraub gregory farnum march 19 2010 linus torvalds merged ceph client linux kernel version 2.6.34 released may 16 2010 2012 weil created inktank storage professional services support ceph april 2014 red hat purchased inktank bringing majority ceph development in-house october 2015 ceph community advisory board formed assist community driving direction open source software-defined storage technology charter advisory board includes ceph community members global organizations committed ceph project including individuals canonical cern cisco fujitsu intel red hat sandisk suse name ceph abbreviation cephalopod class molluscs includes octopus name emphasized logo suggests highly parallel behavior octopus chosen associate file system sammy banana slug mascot ucsc cephalopods banana slugs molluscs | [
3599,
2547,
7161,
4672,
7171,
6431,
3626,
5049,
6117,
6461,
759,
1494,
3998,
5783,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
4393,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
4435,
2683,
5859,
5865,
3403,
4444,
5518,
... | Train |
2,537 | 7 | Connection_broker:connection broker software engineering connection broker resource manager manages pool connections connection-based resources databases remote desktops enabling rapid reuse connections short-lived processes without overhead setting new connection time connection brokers often used systems using n-tier architectures remote desktop connection brokers perform variety tasks including | [
2054
] | Validation |
2,538 | 3 | Nvidia_Jetson:nvidia jetson nvidia jetson series embedded computing boards nvidia jetson tk1 tx1 tx2 models carry tegra processor soc nvidia integrates arm architecture central processing unit cpu jetson low-power system designed accelerating machine learning applications jetson family includes following boards published performance modes nvidia jetson tx2 published operation modes nvidia jetson nano various operating systems software might able run jetson board series jetpack software development kit sdk nvidia jetson board series official nvidia download page bears entry jetpack 3.2 uploaded 2018-03-08 states even qnx widely announced jetson platform still success reports installing running specific qnx packages certain nvidia jetson board variants namely package qnx-v3q-23.16.01 seemingly parts based nvidia vibrante linux distribution reported run jetson tk1 pro board | [
1066,
2270,
4846,
6610,
1167,
289,
469,
3524,
4317,
5740,
4954,
6443,
1284,
5750,
6910,
1202,
7654,
5055,
5236,
5939,
7919,
1864,
4627,
3734,
1779,
2957,
1973,
950,
1977,
1595,
2338,
1237,
8141,
352,
1702,
4833,
2080,
7049
] | Test |
2,539 | 3 | AMD_Accelerated_Processing_Unit:amd accelerated processing unit amd accelerated processing unit apu formerly known fusion marketing term series 64-bit microprocessors advanced micro devices amd designed act central processing unit cpu graphics processing unit gpu single die amd announced first generation apus llano high-performance brazos low-power devices january 2011 second generation trinity high-performance brazos-2 low-power devices announced june 2012 third generation kaveri high performance devices launched january 2014 kabini temash low-power devices announced summer 2013 sony playstation 4 microsoft xbox one eighth generation video game consoles use semi-custom third generation low-power apus intel cpus integrated hd graphics also cpu gpu single die offer hsa features see amd fusion project started 2006 aim developing system chip combined cpu gpu single die amd took key step toward realising vision acquired graphics chipset manufacturer ati 2006 project reportedly required three internal iterations fusion concept create product deemed worthy release reasons contributing delay project include technical difficulties combining cpu gpu die 45 nm process conflicting views role cpu gpu within project first generation desktop laptop apu codenamed llano announced january 4 2011 2011 ces show las vegas released shortly thereafter featured k10 cpu cores radeon hd 6000-series gpu die fm1 socket apu low-power devices announced brazos platform based bobcat microarchitecture radeon hd 6000-series gpu die conference january 2012 corporate fellow phil rogers announced amd would re-brand fusion platform heterogeneous system architecture hsa stating fitting name evolving architecture platform representative entire technical community leading way important area technology programming development however later revealed amd subject trademark infringement lawsuit swiss company arctic used name fusion line power supply products second generation desktop laptop apu codenamed trinity announced amd 2010 financial analyst day released october 2012 featured piledriver cpu cores radeon hd 7000 series gpu cores fm2 socket amd released new apu based piledriver microarchitecture march 12 2013 laptops/mobile june 4 2013 desktops codename richland second generation apu low-power devices brazos 2.0 used exactly apu chip ran higher clock speed rebranded gpu radeon hd7000 series used new io controller chip semi-custom chips introduced microsoft xbox one sony playstation 4 video game consoles third generation technology released 14 january 2014 featuring greater integration cpu gpu desktop laptop variant codenamed kaveri based steamroller architecture low-power variants codenamed kabini temash based jaguar architecture november 2017 hp released envy x360 featuring ryzen 5 2500u apu first 4th generation apu based zen cpu architecture vega graphics architecture amd founding member heterogeneous system architecture hsa foundation consequently actively working developing hsa cooperation members following hardware software implementations available amd apu-branded products amd apus unique architecture amd cpu modules cache discrete-class graphics processor die using bus architecture allows use graphics accelerators opencl integrated graphics processor goal create fully integrated apu according amd eventually feature 'heterogeneous cores capable processing cpu gpu work automatically depending workload requirement first generation apu released june 2011 used desktops laptops based k10 architecture built 32 nm process featuring two four cpu cores thermal design power tdp 65-100 w integrated graphics based radeon hd6000 series support directx 11 opengl 4.2 opencl 1.2 performance comparisons similarly priced intel core i3-2105 llano apu criticised poor cpu performance praised better gpu performance amd later criticised abandoning socket fm1 one generation amd brazos platform introduced january 4 2011 targeting subnotebook netbook low power small form factor markets features 9-watt amd c-series apu codename ontario netbooks low power devices well 18-watt amd e-series apu codename zacate mainstream value notebooks all-in-ones small form factor desktops apus feature one two bobcat x86 cores radeon evergreen series gpu full directx11 directcompute opencl support including uvd3 video acceleration hd video including 1080p amd expanded brazos platform june 5 2011 announcement 5.9-watt amd z-series apu codename desna designed tablet market desna apu based 9-watt ontario apu energy savings achieved lowering cpu gpu northbridge voltages reducing idle clocks cpu gpu well introducing hardware thermal control mode bidirectional turbo core mode also introduced amd announced brazos-t platform october 9 2012 comprised 4.5-watt amd z-series apu codenamed hondo a55t fusion controller hub fch designed tablet computer market hondo apu redesign desna apu amd lowered energy use optimizing apu fch tablet computers deccan platform including krishna wichita apus cancelled 2011 amd originally planned release second half 2012 first iteration second generation platform released october 2012 brought improvements cpu gpu performance desktops laptops platform features 2 4 piledriver cpu cores built 32 nm process tdp 65 w 100 w gpu based radeon hd7000 series support directx 11 opengl 4.2 opencl 1.2 trinity apu praised improvements cpu performance compared llano apu release second iteration generation 12 march 2013 mobile parts 5 june 2013 desktop parts january 2013 jaguar-based kabini temash apus unveiled successors bobcat-based ontario zacate hondo apus kabini apu aimed low-power subnotebook netbook ultra-thin small form factor markets temash apu aimed tablet ultra-low power small form factor markets two four jaguar cores kabini temash apus feature numerous architectural improvements regarding power requirement performance support newer x86-instructions higher ipc count cc6 power state mode clock gating kabini temash amd first also first ever quad-core x86 based socs integrated fusion controller hubs fch kabini temash codenamed yangtze salton respectively yangtze fch features support two usb 3.0 ports two sata 6 gbit/s ports well xhci 1.0 sd/sdio 3.0 protocols sd-card support chips feature directx 11.1-compliant gcn-based graphics well numerous hsa improvements fabricated 28 nm process ft3 ball grid array package taiwan semiconductor manufacturing company tsmc released may 23 2013 playstation 4 xbox one revealed powered 8-core semi-custom jaguar-derived apus third generation platform codenamed kaveri partly released january 14 2014 kaveri contains four steamroller cpu cores clocked 3.9 ghz turbo mode 4.1 ghz 512-core graphics core next gpu two decode units per module instead one allows core decode four instructions per cycle instead two amd trueaudio mantle api on-chip arm cortex-a5 mpcore release new socket fm2+ ian cutress rahul garg anandtech asserted kaveri represented unified system-on-a-chip realisation amd acquisition ati performance 45 w a8-7600 kaveri apu found similar 100 w richland part leading claim amd made significant improvements on-die graphics performance per watt however cpu performance found lag behind similarly-specified intel processors lag unlikely resolved bulldozer family apus a8-7600 component delayed q1 launch h1 launch steamroller architecture components allegedly scale well higher clock speeds amd announced release kaveri apu mobile market june 4 2014 computex 2014 shortly accidental announcement amd website may 26 2014 announcement included components targeted standard voltage low-voltage ultra-low voltage segments market early-access performance testing kaveri prototype laptop anandtech found 35 w fx-7600p competitive similarly-priced 17 w intel i7-4500u synthetic cpu-focused benchmarks significantly better previous integrated gpu systems gpu-focused benchmarks tom hardware reported performance kaveri fx-7600p 35 w intel i7-4702mq finding i7-4702mq significantly better fx-7600p synthetic cpu-focused benchmarks whereas fx-7600p significantly better i7-4702mq intel hd 4600 igpu four games could tested time available team | [
2541,
7163,
5377,
6435,
4694,
5042,
5055,
5063,
5436,
780,
1143,
2266,
446,
5799,
5804,
3362,
3020,
6545,
1961,
6562,
8022,
4090,
866,
3063,
1237,
6599,
5895,
5559,
6616,
2016,
7726,
913,
2751,
6655,
6307,
3145,
4197,
2078,
7782,
4931,
... | Test |
2,540 | 3 | Language-based_system:language-based system language-based system type operating system uses language features provide security instead addition hardware mechanisms systems code referred trusted base responsible approving programs execution assuring perform operations detrimental system stability without first detected dealt common strategy guaranteeing operations impossible base system around high-level language java whose design precludes dangerous constructs many entirely written language minimum amount low-level code used since language-based systems assure ahead time things damage system corrupting memory dereferencing dangling pointers possible avoid expensive address space switches needed traditional oses microkernels popular traditional systems extreme form high-level language computer architecture trusted base pushed hardware entire system written high-level language | [
1363,
4885,
6921,
5571,
3990,
3751,
5021,
6497,
6498
] | Validation |
2,541 | 3 | Super_Socket_7:super socket 7 super socket 7 also referred super 7 hardware-level extension socket 7 zif socket specification x86 processors compatible motherboards chipsets utilize standard socket 7 connection cpu adding certain features including maximum 100 mhz front-side bus support agp graphics cards super socket 7 used amd k6-2 k6-iii processors final cyrix m-ii processors final idt winchip 2 processors rise mp6 processors backward compatible socket 7 cpu meaning socket 7 cpu used super socket 7 motherboard super socket 7 cpu operate full speed socket 7 motherboard socket 5 cpus pin-compatible super socket 7 motherboards designed super socket 7 supported voltages needed socket 5 cpus amd previously always used intel sockets processors socket 7 last one amd retained legal rights intel hoped discontinuing socket 7 development moving slot 1 amd would left outdated platform making processors non-competitive extending fsb 66 100 mhz super socket 7 gave amd stopgap solution needed developing independent motherboard infrastructure slot architecture cheap served intended purpose many third party chipsets provided via sis others low quality especially regard agp implementations reputation amd gained buggy incompatible motherboards lingered though internal program via raise standards chipsets begun show results k6-iii pentium iii era amd put place quality assurance program athlon processor | [
2539,
6599,
5895,
1162,
4123,
4931,
7163,
2997,
1729,
2828,
6173,
7974,
2830,
3002,
1735,
3362,
4314,
5377,
5379,
6351,
913,
2744,
1841,
3193,
1645,
7826,
2751,
6545,
4968,
3385,
4972,
6373,
5853,
5063,
6655,
6562,
2685,
6935,
8021,
3145,... | Test |
2,542 | 1 | Clinical_Practice_Research_Datalink:clinical practice research datalink clinical practice research datalink cprd observational interventional research service operates part uk department health jointly funded national institute health research nihr medicines healthcare products regulatory agency mhra cprd working closely extensive primary care topic specific comprehensive nihr research networks nhs digital programme would develop current organisation initially developed essex general practitioner dr alan dean facilitate day-to-day management general practice collaboration staff bata shoe factory east tilbury near practice early programmers included czech programmer jan boda 1987 venture capital company set named value added information medical products ltd vamp recruit practices form information base early development team three marcella devenish formerly midwife philip lee-warren formerly senior medical laboratory scientific officer leadership kieran o'mally developed computerised system using bos microcobol development environment period number uk practices using software product igp integrated general practice expanded hundred two half thousand return anonymous healthcare data vamp ltd offered gps cash equivalent gbp 500 month order build vamp research databank research purposes 1988 vamp research databank comprised 57 practices 543,100 patients figure doubled 1.2 million 1990 one year later 970 practices allowed vamp access data 1000 practices straightforward maintenance agreement vamp november 1993 parent company acquired reuters health information donated database department health 1994 time became general practice research database gprd contained data 650 practices 4.4 million active patients time two licensees data dr alan dean professor hershel jick database operated office national statistics 1999 point medicines control agency mca took agency became medicines healthcare products regulatory agency mhra 1 april 2003 following merger medical devices agency mda since use database expanded within uk overseas gprd run sub-division mhra direction dr john parkinson research utility gprd dramatically enhanced linkage datasets individual patient level external datasets included hospital episode statistics death certificates national cancer registry minap cardiovascular disease registry additionally dataset became choice fda major pharma companies following announcement chancellor plan growth commissioned study entitled research capability programme initiated aim assessing available research capabilities uk future potential growth areas sector opportunity identified collaboration department health mhra creating joint research service based upon consolidating expanding existing independent services new service known cprd developed meet expectations criteria outlined plan growth 29 march 2012 medicines healthcare products regulatory agency department health national institute health research nihr launched clinical practice research datalink cprd launch cprd sir kent woods chief executive mhra said clinical practice research datalink provide new data research services improve health patients also make uk world leader life sciences research david willetts minister universities science said uk world leader life sciences research base industry tell us could make better use data order drive medical breakthroughs clinical practice research datalink provide researchers access safeguarded data respects patient confidentiality give valuable insights serious health conditions ultimately help reduce time takes develop new treatments gprd became part data services provision cprd launch april 2012 cprd established new england-wide nhs observational interventional research service built research developments gprd also health research support service hrss previously managed nihr research capability program cprd remains housed within medicines healthcare products regulatory agency one three 'centres within agency cprd builds predecessors capabilities aims provide range services products areas medical research public health care fundamental work cprd collection linkage anonymised data sets provision research services cprd utilises maximum benefit linked data sets uk ’ health system provide researchers access high quality anonymous primary secondary health care data data collected allows researchers access wealth information including nhs provides free point delivery healthcare population 52 million england access data sets nhs england wales scotland northern ireland cprd provide population potentially 64 million patients uk access partnerships established include data sets european countries linking anonomysed primary care data large data registries related data sets means cprd offer huge array data information inclusion medical research studies include areas prescription drugs uses effect long term patient treatment strategy long term health benefit studies epidemic pandemic studies demographic health welfare studies example analysis 100 million gp consultations using cprd data 2016 provided first substantial evidence increase gp clinical workload england cprd range research experience expertise including cprd provides consulting services range research activities provided experienced internal team research service offers advice research methodology research governance well host services drawing expertise predecessors experience cprd research team built reputation conducting high-end research projects protocol development gaining approvals research data analysis report publication writing research capacity cprd resource expertise undertake research projects behalf customers independently variety undertakings commercial regulatory charitable academic sectors huge range studies cprd predecessors published list published papers found cprd research cprd offers range interventional research services facilitate running clinical trials primary health care data collected cprd taken participating gp surgeries united kingdom personal identifiers collected protecting privacy individuals data comes data collected includes | [
437
] | Test |
2,543 | 4 | Nitrokey:nitrokey nitrokey open source usb key enable secure encryption signing data secret keys always stored inside nitrokey protects malware computer viruses attackers user-chosen pin tamper-proof smart card protect nitrokey case loss theft hardware software nitrokey available open source free software open hardware enables independent parties verify security device nitrokey supported microsoft windows linux macos 2008 jan suhr rudolf böddeker another friend travelling found looking use encrypted emails internet cafés meant secret keys remain secure computer viruses proprietary usb dongles existed time lacked certain ways consequentially established open source project crypto stick august 2008 grew become nitrokey spare-time project founders develop hardware solution enable secure usage email encryption first version crypto stick released 27 december 2009 late 2014 founders decided professionalize project renamed nitrokey nitrokey firmware audited german cybersecurity firm cure53 may 2015 hardware audited company august 2015 first four nitrokey models became available 18 september 2015 several nitrokey models exist nitrokey pro flagship model contains following features upcoming nitrokey storage provides features nitrokey pro additionally contains encrypted mass storage nitrokey developers believes proprietary systems ca n't provide strong security security systems need open source instance cases nsa intercepts security devices shipped implanted backdoors 2011 rsa hacked secret keys securid tokens stolen allowed hackers circumvent authentication revealed 2010 many fips 140-2 level 2 certified usb storage devices various manufacturers could easily cracked using default password nitrokey open source transparency wants provide high secure system avoid security issues proprietary rivals facing nitrokey mission provide best open source security key protect digital lives users | [
7725,
7818,
1505,
7843,
2346,
4759,
1559,
578,
7975
] | Test |
2,544 | 7 | WeVideo:wevideo wevideo u.s.-headquartered software service company provides collaborative web-based video editing platform works browser company formed 2011 based menlo park california wevideo inc. founded april 2011 initially creaza inc. creaza inc. owns related company norway called creaza education provides suite digital tools k-12 market including comic tools audio editing mind-mapping video editing applications wevideo publicly launched services september 2011 changing name creaza inc. allay confusion creaza education reflect social collaborative nature platform shortly 2011 launch wevideo invited youtube become youtube create partner embedded wevideo editor one number solutions offered youtube help users create better video compositions april 2012 wevideo announced launch partner google drive google ’ cloud-based collaboration storage service michael j. miller ziff brothers investments cited wevideo one favorites 2011 demo fall conference stating presents strong cloud-based consumer video editing solution network world also named wevideo one highlights conference labeling something keep eyes seattle times praised wevideo ability allow multiple editors work video noted videos five editors would require paid membership tech evangelist robert scoble noted wevideo ’ unique collaboration features stated “ wevideo yet another demonstration everything changing due cloud even video editing ” since inception wevideo received number awards including following | [
330
] | Validation |
2,545 | 4 | SpyHunter_(software):spyhunter software spyhunter anti-spyware computer program microsoft windows windows xp later operating system designed remove malware trojan horses computer worms rootkits malicious software spyhunter currently version 4 receives daily definition updates spyhunter free version allows user scan computer purchase required remove found malware paid version user able receive support built-in helpdesk february 2016 enigma software filed lawsuit bleeping computer computer support website alleged latter engaged smear campaign purpose driving potential customers away spyhunter affiliate competing products turn bleeping computer filed lawsuit enigma software also alleged smear campaign march 2017 enigma software announced press release settlement reached lawsuit bleeping computer cases would dismissed october 2016 enigma software filed lawsuit popular security software vendor malwarebytes lawsuit arose malwarebytes software began targeting spyhunter potentially unwanted program november 7 2017 enigma case dismissed us district court | [
4759,
5571,
3089,
6823
] | Validation |
2,546 | 3 | Whitechapel_Computer_Works:whitechapel computer works whitechapel computer works ltd. wcw computer workstation company formed east end london united kingdom april 1983 investment greater london enterprise board department trade industry first workstation model mg-1 named milliard gargantubrain hitchhiker guide galaxy mg-1 based national semiconductor ns32016 microprocessor 1024 × 800 pixel monochrome display 40 mb rodime st-506 hard disk optional ethernet interface initially natsemi genix operating system port 4.1bsd unix provided later replaced port 4.2bsd called 42nix mg-1 also partially kernel-based graphical user interface called oriel mg-1 first shipped customers 1984 base price around although oriel released following year distributor united states mg-1 sold north america cybertool systems ltd. 1984 1986 colour version cg-1 also announced 1986 followed mg-200 ns32332 processor 1987 wcw went receivership 1986 soon revived whitechapel workstations ltd. go liquidation april 1988 new company launched hitech-10 hitech-20 workstations r2000 r3000 mips architecture processors respectively ran umips variant unix either x11 news-based guis aimed computer animation applications ex-whitechapel engineers went form algorithmics ltd. specialising mips-based embedded systems algorithmics later acquired mips technologies 2002 rights hitech workstations acquired mistral computer systems ltd. june 1988 | [
5055,
4368,
551,
5571,
5705,
2379
] | Train |
2,547 | 6 | Macintosh_File_System:macintosh file system macintosh file system mfs volume format disk file system created apple computer storing files 400k floppy disks mfs introduced original apple macintosh computer january 1984 mfs notable introducing resource forks allow storage structured data storing metadata needed support graphical user interface mac os mfs allows file names 255 characters length although finder allow users create names longer 63 characters 31 characters later versions mfs called flat file system support hierarchy directories folders exist concept original mfs-based macintosh work completely differently way modern systems visible finder windows open save dialog boxes always one empty folder volume altered way adding renaming files new empty folder appears thus providing way create new folders mfs stores file directory listing information single file finder creates illusion folders storing files pairs directory handles file handles display contents particular folder mfs scans directory files handle need find separate file containing directory listing macintosh file system support volumes 20 mb size 1,400 files small today standards time seemed expansive compared macintosh 400 kb floppy drive apple introduced hierarchical file system replacement mfs september 1985 mac os 7.6.1 apple removed support writing mfs volumes mac os 8.0 support mfs volumes removed altogether although macos built-in support mfs example vfs plug-in apple called mfslives provides read-only access mfs volumes | [
3599,
1069,
7161,
4672,
6431,
3626,
1103,
5049,
405,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
502,
6558,
2683,
149,
5859,
5865,
4444,
5518,
4453,
6231,
3412,
869,
2704... | Test |
2,548 | 4 | Data_Protection_Act,_2012:data protection act 2012 data protection act 2012 act legislation enacted parliament republic ghana protect privacy personal data individuals regulates process personal information acquired kept used disclosed data controllers data processors requiring compliance certain data protection principles non compliance provisions act may attract either civil liability criminal sanctions depending nature infraction act also establishes data protection commission mandated ensure compliance provisions well maintain data protection register act first introduced ghana parliament 2010 subsequently withdrawn minister communications haruna iddrisu revised parliament passed bill 2012 received presidential assent may 10 2012 notice act gazetted 18 may 2012 accordance section 99 act came effect 16 october 2012 act made 99 sections arranged various headings follows key terms act defined interpretation section section 96 unless context otherwise requires section 96 provides following definitions notable terms “ data controller ” means person either alone jointly persons common persons statutory duty determines purposes manner personal data processed processed “ data processor ” relation personal data means person employee data controller processes data behalf data controller “ data subject ” means individual subject personal data “ foreign data subject ” means data subject information regulated laws foreign jurisdiction sent ghana foreign jurisdiction wholly processing “ personal data ” means data individual identified data b data information possession likely come possession data controller “ processing ” means operation activity set operations automatic means concerns data personal data collection organisation adaptation alteration information data b retrieval consultation use information data c disclosure information data transmission dissemination means available alignment combination blocking erasure destruction information data “ recipient ” means person data disclosed including employee agent data controller data processor data disclosed course processing data data controller include person disclosure made respect particular inquiry pursuant enactment “ special purposes ” means one following purpose journalism b purpose public interest c artistic purposes literary purposes act applicable data originates externally merely transits ghana however protected act section 45 4 act applies ghanaian government purpose government department treated data controller section 91 act provides 8 principles data processors take account processing data order protect privacy individuals principles similar oecd guidelines data protection directive european union data protection principles enumerated section 17 follows accountability principle data protection seen generally fundamental principle compliance requires data controller accountable compliance measures give effect data protection principles act requires person processes personal data ensure data processed without infringing rights data subject processed lawful reasonable manner section 18 1 data processed involves foreign data subject data controller processor must ensure personal data processed according data protection laws originating jurisdiction section 18 2 data processing lawful conditions justify processing present act minimality provision requires personal data processed purpose processed necessary relevant excessive section 19 prior consent data subject also required personal data processed section 20 requirement however subject exceptions instance purpose personal data processed necessary purpose contract data subject party authorised required law protect legitimate interest data subject necessary proper performance statutory duty necessary pursue legitimate interest data controller third party data supplied section 20 1 consent also required processing special personal data section 37 2 b data subject also object processing personal data section 20 2 data processor required stop processing data upon objection section 20 3 terms retention records act prohibits retention personal data period longer necessary achieve purpose collection unless retention required law reasonably necessary lawful purpose related function activity required contractual purposes data subject consented retention section 24 1 retention requirement however applicable personal data kept historical statistical research purposes section 24 2 except records must adequately protected access used unauthorized purposes section 24 3 person uses record personal data make decision data subject data must retained period required law code conduct law code conduct exists period afford data subject opportunity request access record upon expiration retention period personal data must however deleted destroyed manner prevents reconstruction intelligible form record personal data must de-identified sections 24 4 5 6 data subject may also request record personal data data subject held data controller destroyed deleted data controller longer authorisation retain data section 33 1 b act requires data controller collects personal data specific purpose explicitly defined lawful related functions activity person section 22 data controller collects data also required take necessary steps ensure data subject aware purpose data collected section 23 act requires data controller holds personal data collected connection specific purpose processing data must compatible purpose personal data initially obtained section 25 1 circumstances processing meets compatibility requirement include data subjects consents processing information data public domain processing necessary purposes fighting crime legislation concerns protection tax revenue collection conduct court proceedings protection national security public health life health data subject another person section 25 3 section 26 act data controller processes personal data must ensure data complete accurate date misleading regard purpose data collected processed openness principle ensures individuals know participate enforcing rights data protection regime section 27 1 makes mandatory data controller intends process personal data register data protection commission data controller intends collect data must also ensure data subject aware nature data collected persons responsible collection purpose collection well whether supply data mandatory discretionary among things section 27 2 data collected third party act requires data subject informed data collected soon practicable afterwards section 27 3 act provides circumstances notification requirement exempt include necessary avoid compromising law enforcement protect national security relates preparation conduct legal proceedings.section 27 4 also although mandatory data controller appoint data protection supervisor would responsible monitoring compliance act section 58 1 2 data protection supervisor may employee section 58 1 must meet qualification criteria set data protection commission section 58 7 act data controller duty prevent loss damage unauthorized destruction personal data well unlawful access unauthorized processing personal data data controller must therefore adopt appropriate reasonable technical organizational means take necessary steps ensure security personal data possession control section 28 1 data controller also required take reasonable measures identify forestall reasonably foreseeable risks ensure safeguards put place effectively implemented updated continually section 28 2 data controller must also observe generally accepted industry specific best practices securing data section 28 3 well ensure data processors comply security measures section 30 data processor domiciled ghana data controller must ensure data processor complies relevant laws country section 30 4 act also requires data controller soon reasonably practicable notify data protection commission data subject security breaches system take steps ensure integrity system restored section 31 data subject subject proving data subject ’ identity request data controller confirm data controller holds data subject ’ personal data describe nature personal data held identity third party previously access data section 32 1 request must however made reasonable manner within reasonable time paying prescribed fees form generally understandable section 32 2 data subject also request data controller correct delete personal data data subject held data controller inaccurate irrelevant excessive date incomplete misleading section 33 1 upon receipt request data controller must either comply request provide data subject credible evidence support data section 33 2 section 96 special personal data means personal data consists information relates race colour ethnic tribal origin data subject b political opinion data subject c religious beliefs beliefs similar nature data subject physical medical mental health mental condition dna data subject e sexual orientation data subject f commission alleged commission offence individual g proceedings offence committed alleged committed individual disposal proceedings sentence court proceedings act prohibits processing data relates children parental control religious philosophical beliefs ethnic origin race trade union membership political opinions health sexual life criminal behaviour individual section 37 1 special personal data may however processed necessary data subject given consent processing section 37 2 processing personal data necessary exercise right fulfil obligation conferred imposed law employer section 37 3 special personal data relating data subjects may also processed necessary protection vital interest data subject impossible data subject give consent data controller reasonably expected obtain consent consent data subject unreasonably withheld section 37 4 processing special personal data presumed necessary required purpose legal proceedings legal advice medical purposes undertaken health professional subject duty confidentiality patient health professional section 37 6 prohibition processing special personal data relating religious philosophical beliefs apply processing carried religious organisation data subject member institution founded upon religious philosophical principles respect persons associated institution necessary achieve aims institution section 38 1 act data subject right personal data corrected section 33 access personal data section 35 prevent processing personal data causes likely cause unwarranted damage distress section 39 prevent processing personal data purposes direct marketing section 40 require data controller take decision would significantly affect solely processing automatic means section 41 exempt manual data section 42 compensated data controller ’ failure comply provisions act upon proof damages section 43 inaccurate data rectified section 44 act establishes data protection commission two main objects functions dpc section 3 dpc governed 11-member board appointed president ghana act provides certain specific institutional representation section 4 board members allowed hold office period exceeding three years appointed two terms section 5 1 allowances board members approved minister responsible communications consultation minister responsible finance section 9 board officially sworn 1 november 2012 currently chaired prof. justice samuel kofi date-bah retired justice supreme court ghana dpc officially launched 18 november 2014 act also mandates president appoint executive director section 11 shall responsible day-to-day administration dpc well implementation decisions board section 12 mrs. teki akuetteh falconer current executive-director act sources dpc funds include money approved parliament donations grants money accrues dpc performance functions money minister responsible finance approves section 14 dpc also granted power serve enforcement notices data controllers requiring refrain contravening data protection principles section 75 enforcement notice may cancelled varied either dpc motion upon application recipient notice section 76 act provides establishment data protection register maintained dpc data controllers must compulsorily register section 46 applications registration data controller made writing act provides certain particulars business name address applicant description personal data collected description purpose processing personal data section 47 1 knowingly supplying false information amounts offence punishable fine imprisonment section 47 2 also separate entry register must made separate purpose data controller wishes process data section 47 3 dpc right refuse grant application particulars provided inclusion entry register insufficient data controller able provide appropriate safeguards protection privacy data subject opinion dpc applicant merit grant registration section 47 1 upon refusing registration application dpc required inform applicant reasons refusal event applicant may apply high court judicial review decision section 47 2 registration data controller subject renewal every two years section 50 dpc also power cancel registration good cause section 52 offence process personal data without registering section 56 act also provides access public register upon payment prescribed fee section 54 act provides several exemptions different purposes follows processing personal data exempt provisions act relates national security section 60 relation crime taxation section 61 disclosure personal data relating health education social work section 61 prohibited unless required law provisions act also applicable protection members public specified loss malpractice provisions section 63 processing personal data prohibited unless processing undertaken purpose literary artistic material data controller reasonably believes publication would public interest compliance provision incompatible special purposes section 64 provisions non-disclosure apply disclosure required law court section 66 act apply data processed purpose managing individual ’ domestic affairs section 67 data protection principles apply personal data consists references given confidence purposes education appointment office provision service data subject section 68 subject information provisions act apply personal data likely prejudice combat effectiveness armed forces section 69 processed assess suitability person judicial appointment confer national honour section 70 consists information respect claim professional privilege confidentiality section 74 personal data exempt provisions act relates examinations marks processed data controller relation individual ’ results section 72 consists information recorded candidate academic purposes section 73 act prohibits purchase personal data knowing reckless disclosure personal data contravention provision amounts offence section 88 act also makes sale offering sell advertising sale personal data offence section 89 minister responsible communications may consultation dpc make regulations effective implementation act | [
1998,
1344,
6438,
3609,
803,
2727,
6974
] | Test |
2,549 | 2 | W^X:w^x w^x write xor execute spoken w xor x security feature operating systems virtual machines memory protection policy whereby every page process kernel address space may either writable executable without protection program write data cpu instructions area memory intended data arrange run executable instructions dangerous writer memory malicious w^x relatively simple processors support fine-grained page permissions sun sparc sparc64 amd amd64 hewlett-packard pa-risc hp originally digital equipment corporation alpha arm early intel 64 processors lacked nx bit required w^x appeared later chips processors limited features intel i386 w^x requires using cs code segment limit line sand point address space execution permitted data located allowed executable pages placed linker changes generally required separate code trampolines code needed linker library runtime functions data w^x first implemented openbsd 3.3 released may 2003 2004 microsoft introduced similar feature called dep data execution prevention windows xp similar features available operating systems including pax exec shield patches linux netbsd implementation pax although w^x dep protected userland programs existence 2012 microsoft extended windows kernel x86 arm architectures late 2014 early 2015 w^x added openbsd kernel amd64 architecture early 2016 w^x fully implemented netbsd amd64 kernel partially i386 kernel since 2016 firefox 46 virtual machine javascript also implements w^x policy | [
5627,
2451,
3764,
4662,
4759,
6085,
5373,
1265,
6002,
4779,
5571,
578,
1019,
2226,
755,
3220,
2420,
3905,
7581,
2883,
5962,
1237,
6236,
3751,
1989,
971,
4920
] | Test |
2,550 | 2 | Surface_2:surface 2 surface 2 surface-series windows rt hybrid tablet computer created microsoft unveiled september 23 2013 released october 22 2013 successor original surface january 2015 microsoft longer manufactures surface 2 provide security updates device 2023 pre-orders surface 2 opened september 24 2013 device released october 22 2013 value-added services surface 2 includes 200 gb additional onedrive storage 2 years 1 year free skype calls landlines access skype wifi hotspots january 2015 stock sold microsoft store online microsoft confirmed discontinued production surface 2 surface 2 nokia lumia 2520 remaining windows rt device market discontinued well week later made magnesium alloy toughened glass outer shell surface 2 maintains similar design predecessor bare metal silver color scheme black bezel surface 2 also slightly thinner lighter previous model surface 2 uses 1.7 ghz quad-core nvidia tegra 4 chipset 2 gb ram microsoft claimed new chipset improvements internal hardware made surface 2 three four times faster original surface 10 hours battery life playing videos unlike original surface used 1366 x 768 display surface 2 uses 1080p display surface pro 2 display claimed almost 50 better color previous version well lowest reflectivity among competing tablets device also includes full-size usb 3.0 port 32 64 gb internal storage microsd slot surface 2 ships windows rt 8.1 4g lte model surface 2 launched march 18 2014 comes 64 gb model microsoft cellular partner surface 2 4g lte comes access app pre-installed device actually ships unlocked 4g models also come gps assisted gps glonass surface 2 includes microsoft calls silver-magnesium color scratch resistant compared original surface surface 2 ships windows rt 8.1 office 2013 rt unlike original surface launched office 2013 rt beta later received final release version bundled apps include mail calendar people contacts bing apps including food drink health fitness weather travel stocks sports apps later renamed msn apps like predecessor desktop apps already bundled os forbidden run surface 2 device unlike successor surface 3 classified 2-in-1 pc notable change surface surface 2 hiding desktop tile start screen updated versions surface cover accessories available surface 2 touch cover 2 type cover 2 slightly thinner previous versions include dynamic backlight system touch cover 2 1,092 sensors compared 80 original touch cover keyswitch length type cover 2 reduced 2.5 mm 1.5 mm new power cover accessory also available add 30 wh additional battery capacity device accompanying touch cover 2 type cover 2 wireless adapter allows connected 30 feet away via bluetooth updated kickstand tilted 55-degree angle alongside original 22-degree angle unveiling microsoft also showcased music cover variation touch cover serves dj mixer playback controls 16-button sampler three sliders mainstream public release announced distributed musicians surface remix project campaign initial reviews surface 2 mixed reviewers generally positive device hardware improvements compared original surface however surface 2 often criticized lack support traditional windows desktop programs low number high quality apps available windows store financial report microsoft second quarter 2014 revenue doubled 400 million first quarter 893 million however microsoft still lost 39 million since development costs equaled around 932 million skeptics acknowledged growth despite still losing money surface brand surface 2 reported overheating issues microsoft delivered update try fix issue | [
3076,
8054,
3764,
4759,
7619,
6615,
8076,
5563,
5571,
6110,
7189,
3028,
6294,
1864,
7660,
3395,
7848,
8118,
2342,
432,
6054,
1237,
972
] | Test |
2,551 | 3 | Palm_m500_series:palm m500 series palm m500 series handheld personal digital assistants consisted three devices palm m500 palm m505 palm m515 series follow-up popular palm v series similar though slightly shorter footprint form factor like palm v series metal cases although m500 plastic back plate 160x160 resolution screen distinguishing features common series sd/mmc expansion slot faster processor new faster usb sync interface new software functionality new vibrating alarms new indicator light mechanical fastener vs. hot-glue case construction later models introduced improved version color display memory palm m500 series palm pilot pdas released march 6 2001 based poll conducted palm computing formerly division 3com determined palm v definitive look ideal pda palm m500 models based palm v form factor slim case slight curvature left right edges power button lit green docking cradle important message available input included four programmable buttons two scrolling buttons touch-sensitive 2-1/4 x 3 screen including 2-1/4 x 3/4 input area palm devices data input stylus pen using graffiti method m500 series models featured secure digital sd multi media card mmc expansion slot sd/mmc slot allowed additional memory upgrades devices well expandable platform add-on devices m500 series also first palm devices incorporate new universal connector universal palm t3 abandoned allowed additional add-on devices common hotsync cradles m500 entry-level model m500 series 8 mb on-board memory featured monochrome screen features common m500 series devices released march 6 2001 part original rollout series operating system palm os version 4.0 upgrade 4.1 processor 33 mhz motorola dragonball vz memory 8 mb display 160x160 pixel b w display 4-bit 16 shades gray size 4.49 x 3.02 x .46 11.41 x 7.67 x 1.17 cm weight 4.162 oz 118 g battery internal lithium polymer rechargeable 2hr recharge time empty ac adapter input 120 v 60 hz 10 w output 5.0 vdc 1.0 irda port expansion slot compatible sd mmc cards m505 time series rollout top-of-the-line model palm devices also 8 mb on-board memory addition standard m500 series features also featured 16-bit color frontlit screen released march 6 2001 part original rollout series operating system palm os version 4.0 upgrade 4.1 processor 33 mhz motorola dragonball vz memory 8 mb 4mb flash 8mb ram display 160x160 pixel color display 65,000+ colors size 4.48 x 3.03 x 0.50 11.38 x 7.70 x 1.27 cm weight 4.8 oz 136g battery internal lithium polymer rechargeable 2hr recharge time empty ac adapter input 120vac 60 hz 11w output 5.0vdc 1.0a irda port expansion slot compatible sd mmc cards march 4 2002 palm released m515 based consumer reviews surveys conducted company m515 developed improved version replacement m505 notable enhancements include 16 mb on-board memory enhanced backlighting system much criticism m505 even backlight dim difficult read environments m515 added additional setting allowing backlight put high considerably brighter predecessor operating system palm os version 4.1 processor 33 mhz motorola dragonball vz memory 16 mb ram 4 mb flash display 160x160 pixel color display 65,000+ colors size 4.48 x 3.03 x 0.50 11.38 x 7.70 x 1.27 cm weight 4.8 oz 139g battery internal lithium polymer rechargeable ac adapter input 120vac 60 hz 11w output 5.0vdc 1.0a irda port expansion slot compatible sd mmc cards | [
7326,
4754,
2551,
4317,
488,
2133,
7919,
1581,
3405,
1702
] | Test |
2,552 | 3 | Advanced_Dungeons_&_Dragons:_Heroes_of_the_Lance:advanced dungeons amp dragons heroes lance advanced dungeons dragons heroes lance video game released january 1988 various home computer systems consoles game based first dragonlance campaign module dungeons dragons fantasy role-playing game dragons despair first dragonlance novel dragons autumn twilight heroes lance focuses journey eight heroes ruined city xak tsaroth must face ancient dragon khisanth retrieve relic disks mishakal heroes lance side-scrolling action game game uses actual dungeons dragons statistics statistics characters exactly rule books eight heroes dragonlance novels series must assembled quest one visible screen time one on-screen hero dies next line appears heroes lance faithful representation books based departure usual role-playing video game style dungeons dragons games gameplay interface consists using one character time horizontally scrolling fighting character different types attacks spells making suited fighting different enemies merely act lives player traditional fighting games removing one main strategies role-playing games game eight heroes make party heroes lance based dragonlance novels margaret weis tracy hickman heroes lance part gold box series nickname titles silver box games nes version developed natsume heroes lance successful ssi 88,808 copies sold computers north america reviewing pre-production copy dos version heroes lance magazine g.m praised graphics excellent audio said would undoubtedly go straight top computer games charts stay several months good computer gaming world gave dos version game similarly positive review electronic gaming monthly columnist seanbaby listed nes version 2nd worst nes game 11th worst video game levi buchanan classic dungeons dragons videogame retrospective ign wrote n't plan well lose lot heroes short period time offered slight strategy angle fans largely preferred pool radiance straight rpg approach pool radiance sales triple heroes lance according gamespy game actually fairly decent side-scroller time frustrating level difficulty along fact could n't save game meant gamers gave game miss storyline game continued two subsequent video games dragons flame shadow sorcerer | [
251,
6380
] | Test |
2,553 | 0 | Data-oriented_parsing:data-oriented parsing data-oriented parsing dop also data-oriented processing probabilistic model computational linguistics dop conceived remko scha 1990 aim developing performance-oriented grammar framework unlike probabilistic models dop takes account subtrees contained treebank rather restricted example 2-level subtrees like pcfgs several variants dop developed initial version developed rens bod based tree-substitution grammar recently dop combined lexical-functional grammar lfg resulting dop-lfg finds application machine translation work learning parameter estimation dop also found way machine translation | [
7410,
1032,
5008,
1314
] | Validation |
2,554 | 4 | ACARM-ng:acarm-ng acarm-ng alert correlation assessment reaction module next generation open source ids/ips system acarm-ng alert correlation software significantly facilitate analyses traffic computer networks responsible collection correlation alerts sent network host sensors also referred nids hids respectively correlation process aims reduce total number messages need viewed system administrator possible merging similar events groups representing logical pieces malicious activity initial version acarm developed frame positif european research project 2004 2007 written java practical proof concept presented article despite poor scalability efficiency issues software proved highly useful end 2009 became obvious current design serious shortcomings poor performance first place result project discontinued later year new project nicknamed acarm-ng launched aiming replace original acarm acarm-ng bring alert correlation new dimension thank scalability plug-in-based architecture actively developed since 2009 wroclaw centre networking supercomputing part pl-grid project acarm-ng main features include acarm-ng consists 3 main elements correlation daemon wui optional database engine acarm-ng daemon designed scratch framework solution provides core system functionalities like logging alerts correlated meta-alerts passing system parts error recovery multi-threading etc.. rest package plug-ins separated following classes built-in software watchdog provides up-to-date information system status wui makes browsing correlated data easy via graphical tabular representation gathered correlated events system administrator easily see going every moment system lifetime wui daemon interoperate database daemon stores gathered data along correlation results runtime configuration wui entitled read display data notice even though data base engine required running daemon strongly recommended save data persistently rejecting use database makes impossible obtain system information via wui leads loss historical data system restarted events longer processed daemon discarded well often required limit amount incoming data example remove alerts raised periodically cron scripts order allow users adapt system input needs special preprocessor component provided allows define chain accept-if-match reject-if-match rules accept reject incoming alerts enter correlation engine acarm-ng daemon allows addition removal new plug-ins without need recompile core package makes system development testing much easier plug-in used configured main configuration file first persistency provides abstraction storage level generic interface used implement data-saving back-end long transaction mechanism provided recent stable release acarm-ng provides following persistency implementations input provides abstraction data gathering mechanism requirement implementation output alerts acarm-ng-compatible form recent stable release acarm-ng provides following input implementations filter provides abstraction correlation data update mechanism restrictions filter meta-alert though common use correlate similar alerts specially tuned api provided special case recent stable release acarm-ng provides following filter implementations trigger provides abstraction reporting reaction mechanism triggers design allowed change content data initiate response alerts typical use real-time reporting suspicious events administrators example via e-mail automatic reaction detected thread example blocking malicious host firewall recent stable release acarm-ng provides following trigger implementations trigger set independently react specific threshold correlated alerts count rule defined way daemon main preprocessor approach gives fully configurable solution allowing define arbitrary complex rules minimize false-positives especially system configured perform autonomous reaction suspicious events | [
3821,
2670,
2043,
5965,
5571,
5819,
578,
3951,
5956,
3680,
2466
] | Validation |
2,555 | 5 | Microsoft_Messenger_service:microsoft messenger service messenger formerly msn messenger service .net messenger service windows live messenger service instant messaging presence system developed microsoft 1999 use msn messenger software used instant messaging clients including windows 8 windows live messenger microsoft messenger mac outlook.com xbox live third-party clients also connected service communicated using microsoft notification protocol proprietary instant messaging protocol service allowed anyone microsoft account sign communicate real time people signed well april 2013 microsoft merged service skype network existing users able sign skype existing accounts access contact list part merger skype instant messaging functionality running backbone former messenger service despite multiple name changes service client software years messenger service often referred colloquially msn due history msn messenger service known msn messenger service 1999 2001 time microsoft changed name .net messenger service began offering clients longer carried msn name windows messenger client included windows xp originally intended streamlined version msn messenger free advertisements integrated windows nevertheless company continued offer upgrades msn messenger end 2005 previous versions msn messenger windows messenger superseded new program windows live messenger part microsoft launch windows live online services several years official name service remained .net messenger service indicated official network status web page though microsoft rarely used name promote service main client used access service became known windows live messenger microsoft started referring entire service windows live messenger service support documentation mid-2000s service integrate windows operating system automatically simultaneously signing network user logs windows account organizations also integrate microsoft office communications server active directory service december 2011 microsoft released xmpp interface messenger service part larger effort rebrand many windows live services microsoft began referring service simply messenger 2012 microsoft offered following instant messaging clients connected messenger service additionally third-party clients others able access messenger service microsoft messenger criticized use microsoft notification protocol provide encryption makes wiretapping personal conversations messenger possible someone intercepts communication easy unencrypted public wi-fi networks | [
7148,
6788,
3762,
3350,
4575,
4759,
7967,
2284,
7170,
1544,
644,
2201,
6624,
1369,
2566,
5571,
6629,
1014,
4337,
1958,
2048,
3050,
2880,
4634,
5535,
786,
5267
] | Test |
2,556 | 4 | SolarWinds:solarwinds solarwinds inc. american company develops software businesses help manage networks systems information technology infrastructure solarwinds headquartered austin texas sales product development offices number locations united states several countries around world company publicly traded may 2009 end 2015 october 2018 also acquired number companies still operates original brand names including pingdom papertrail loggly solarwinds officially founded 1999 tulsa oklahoma 2009 maintained profitability since founding company co-founded donald yonce former executive walmart brother david yonce solarwinds released first products trace route ping sweep earlier march 1998 released first web-based network performance monitoring application november 2001 according michael bennett became chief executive officer 2006 solarwinds name chosen early employee company nothing solar wind power 2006 company moved headquarters austin texas 300 company total 450 employees based 2011 2007 solarwinds raised funding austin ventures bain capital insight venture partners solarwinds completed initial public offering 112.5 million may 2009 closing higher prices initial day trading ipo solarwinds followed another opentable online restaurant-reservation service perceived break dry spell caused great recession companies went public bain capital insight venture partners backed ipo used opportunity sell shares offering analysts company executives forecasted continued expansion post-ipo including several acquisitions 2010 bennett retired position ceo replaced company former chief financial officer kevin thompson may 2013 solarwinds announced plans invest operations hub salt lake city utah named forbes best small company america citing high-functioning products low costs impressive company growth 2013 solarwinds employing 900 people october 2015 company disclosed talks then-unnamed party interested acquiring company making solarwinds privately held company acquisition private equity technology investment firms silver lake partners thoma bravo llc announced late 2015 january 2016 solarwinds taken private ownership 4.5 billion deal sale company employed 1,770 people worldwide 510 based austin reported revenues half billion dollars year november 2017 solarwinds released appoptics integrates much solarwind acquired software portfolio including librato traceview single software-as-a-service package appoptics included compatibility amazon web services microsoft azure september 2018 solarwinds filed ipo three years owned private equity firms solarwinds completed ipo october 19 2018 solarwinds reportedly updated network performance monitor product december 2018 enhancements cisco application centric infrastructure aci according wall street journal solarwinds offers freely downloadable software potential clients markets advanced software offering trial versions following funding 2007 solarwinds acquired several companies including neon software ipmonitor corp. opened european sales office ireland ipo 2009 solarwinds acquired number companies products including acquisition new zealand-based software maker kiwi enterprises announced january 2009 solarwinds acquired several companies 2011 ranked 10 forbes magazine list fastest-growing tech companies january 2011 acquired hyper9 inc austin-based virtualization management company undisclosed terms july solarwinds completed acquisition idaho-based network security company trigeo 35 million trigeo offices post falls added list solarwinds location already included satellite offices dallas salt lake city tulsa well operations australia czech republic india ireland singapore early 2012 month acquiring dameware solarwinds acquired patch management software provider eminentware december solarwinds acquired rhinosoft adding company product ftp voyager solarwinds suite tools services may 2013 solarwinds acquired n-able technologies 2013 cloud-based information technology services provider deal reportedly valued 120 million cash october acquired boulder colorado-based database performance management company confio software 103 million agreement solarwinds gained sales office london confio main product ignite 2014 2015 company acquired swedish web-monitoring company pingdom san francisco-based metrics monitoring company librato 40 million log management service papertrail 41 million 2015 solarwinds announced acquisition librato monitoring company capzure technology msp manager software n-able solarwinds previously acquired june 2016 solarwinds acquired logicnow rival remote monitoring software company new subsidiary solarwinds msp formed merging logicnow n-able technologies company announced subsidiary led logicnow former ceo walter scott new title executive vice president 2017 2019 solarwinds acquired spamexperts email security company loggly log management analytics company trusted metrics provider threat monitoring management software samanage service desk asset management provider | [
651,
1962,
5064,
4783,
330,
760
] | Test |
2,557 | 4 | Computer_security_model:computer security model computer security model scheme specifying enforcing security policies security model may founded upon formal model access rights model computation model distributed computing particular theoretical grounding computer security model implemented computer security policy complete list available articles specific security models see | [
1249,
7090,
2879,
3552,
3231,
3861,
3461,
4304,
2423,
6758,
1805
] | Test |
2,558 | 0 | Semantic_role_labeling:semantic role labeling natural language processing semantic role labeling also called shallow semantic parsing process assigns labels words phrases sentence indicate semantic role sentence agent goal result consists detection semantic arguments associated predicate verb sentence classification specific roles example given sentence like mary sold book john task would recognize verb sell representing predicate mary representing seller agent book representing goods theme john representing recipient important step towards making sense meaning sentence semantic analysis sort lower-level abstraction syntax tree i.e categories thus groups fewer clauses category instance book belongs would need two labels possessed possessor whereas book sold john would need two labels goal theme receiver recipient even though two clauses would similar far subject object functions concerned framenet project produced first major computational lexicon systematically described many predicates corresponding roles daniel gildea university california berkeley international computer science institute daniel jurafsky currently teaching stanford university previously working university colorado uc berkeley developed first automatic semantic role labeling system based framenet propbank corpus added manually created semantic role annotations penn treebank corpus wall street journal texts many automatic semantic role labeling systems used propbank training dataset learn annotate new sentences automatically | [
3959,
5429,
6827,
1209,
1444,
8007,
4037,
2215
] | Test |
2,559 | 2 | GNU/Linux_naming_controversy:gnu/linux naming controversy gnu/linux naming controversy dispute members free software community open-source software community whether refer computer operating systems use combination gnu software linux kernel gnu/linux linux proponents term linux argue far commonly used public media serves generic term systems combine kernel software multiple sources proponents term gnu/linux note gnu alone would good name gnu variants combine gnu operating system software software sources gnu/linux term promoted free software foundation fsf founder richard stallman proponents call correction extended term grounds n't give credit major contributor associated free software philosophy gnu longstanding project begun 1984 develop free operating system argued linux kernel independently created 1991 merely provided substantial missing piece several distributions employ fsf-endorsed name debian trisquel parabola gnu/linux-libre 1983 richard stallman founder free software foundation set forth plans complete unix-like operating system called gnu composed entirely free software september year stallman published manifesto dr. dobb journal detailing new project publicly outlining vision free software software development work began january 1984 1991 gnu mid-level portions operating system almost complete upper level could supplied x window system lower level kernel device drivers system-level utilities daemons still mostly lacking gnu kernel called gnu hurd hurd followed ambitious design proved unexpectedly difficult implement marginally usable independently 1991 linus torvalds released first version linux kernel early linux developers ported gnu code including gnu c compiler run linux free software community adopted use linux kernel missing kernel gnu operating system work filled remaining gaps providing completely free operating system next years several suggestions arose naming operating systems using linux kernel gnu components 1992 yggdrasil linux distribution adopted name linux/gnu/x usenet mailing-list discussions one find usages gnu/linux early 1992 gnu+linux early 1993 debian project one time sponsored free software foundation switched calling product debian gnu/linux early 1994 change followed request richard stallman initially proposed lignux suggested gnu/linux instead hearing complaints awkwardness former term gnu june 1994 bulletin describes linux free unix system 386 machines many utilities libraries gnu january 1995 bulletin switched term gnu/linux instead stallman fsf efforts include gnu name started around 1994 reportedly mostly via private communications above-mentioned request debian 1996 may 1996 stallman released emacs 19.31 autoconf system target linux changed lignux shortly thereafter changed linux-gnu emacs 19.32 included essay linux gnu system suggesting people use terms linux-based gnu system gnu/linux system lignux short later used gnu/linux exclusively essay superseded stallman 1997 essay linux gnu project modern free software open-source software systems composed software many different authors including linux kernel developers gnu project vendors behind x window system desktop- server-based distributions use gnu components gnu c library glibc gnu core utilities coreutils bash 2002 analysis source code red hat linux 7.1 typical linux distribution total size packages gnu project found much larger linux kernel later 2011 analysis ubuntu natty release popular linux distribution main repository found 8 13 consisted gnu components range depending whether gnome considered part gnu 6 taken linux kernel 9 including direct dependencies determining exactly constitutes operating system per se matter continuing debate hand embedded systems handheld devices smartphones like google android residential gateways routers voice ip devices engineered space efficiency mind use linux kernel components gnu system running μclinux likely substitute uclibc glibc busybox coreutils google linux-based android operating system use gnu components libraries replacing glibc google bsd-based bionic c library fsf agrees gnu/linux appropriate name systems also systems use gnu userspace and/or c library top non-linux kernel example debian gnu/hurd gnu userland gnu kernel debian gnu/kfreebsd uses gnu coreutils c library kernel freebsd fsf justifies name gnu/linux primarily grounds gnu project specifically developing complete system argue linux kernel filled one final gaps large number gnu components gnu source code used systems secondary argument addition fsf also argues gnu/linux recognizes role idealism played building community helps public recognize practical importance ideals contrast focus technical advantage rather freedom linux kernel developers case linux kernel notable recurring examples focus technical advantage freedom come long-time inclusion linux kernel many non-free firmware files files non-free license terms ordinary understanding operating system includes kernel—the specific subsystem directly interfaces hardware—and userland software employed user application software control computer moreover name gnu name linux intentionally related name unix unix always conceptually included c library userland tools well kernel 1991 release notes versions 0.01 0.11 linux kernel released gnu general public license version 0.12 torvalds wrote torvalds also wrote 1992 tanenbaum-torvalds debate tanenbaum criticized torvalds developing linux monolithic kernel considered obsolete inferior microkernels mach believed linux would rejected favor gnu hurd microkernel stalled development years use word linux refer kernel operating system entire distributions often leads confusion distinctions among three many gnu packages key part almost every linux distribution particularly gnu toolchain present distros unless android included media sources sometimes make erroneous statements well claiming entire operating system rather simply kernel written torvalds confusion legal threats public relations campaigns apparently directed kernel launched sco group alexis de tocqueville institution adti misinterpreted many commentators assume whole operating system targeted sco adti even accused deliberately exploiting confusion regarding suggestions renaming efforts stem egotism personal pique stallman responded interest giving credit gnu project people think want ego fed course 'm asking call 'stallmanix stallman admitted irritation although believes justified response seeing idealistic project stymied made ineffective people n't usually give credit done concluding 're idealist like ruin whole decade response another common argument see fsf acknowledges many people contributed system short name credit argues justify calling system linux continuing speak subject 2010 stallman stated naming simply matter giving equal mention gnu project system widely referred linux people tend think linux started mr. torvalds 1991 think comes vision life really bad problem linux far widespread name eric s. raymond writes linux entry jargon file linus torvalds asked documentary revolution os whether name gnu/linux justified replied earlier comment torvalds naming controversy name gnu/linux particularly using stallman preferred pronunciation see criticized perceived clumsiness verbosity factor torvalds cited downfall operating systems 386bsd linux journal speculated stallman advocacy combined name stems frustration linus got glory stallman wanted others suggested regardless merits stallman persistence sometimes seems lost cause makes gnu look bad example larry mcvoy author bitkeeper used manage linux kernel development opined claiming credit makes one look foolish greedy many users vendors prefer name linux jim gettys one original developers x window system point inclusion non-gnu non-kernel tools kde libreoffice firefox end-user operating systems based linux kernel although gnu/linux often pronounced without slash stallman recommends explicitly saying word slash plus i.e gnu+linux order avoid mistaken suggestion linux kernel gnu package case gnu linux-libre | [
1807,
362,
707,
3938,
3613,
1822,
6422,
7528,
3271,
7894,
1100,
6443,
740,
5757,
7555,
6117,
7559,
3981,
5762,
761,
2240,
2599,
6489,
7587,
5787,
443,
7954,
4020,
7956,
1522,
1523,
5453,
2985,
5803,
6876,
7242,
462,
1535,
6892,
4400,
11... | Validation |
2,560 | 4 | Responsible_disclosure:responsible disclosure computer security elsewhere responsible disclosure vulnerability disclosure model vulnerability issue disclosed period time allows vulnerability issue patched mended period distinguishes model full disclosure developers hardware software often require time resources repair mistakes hackers computer security scientists opinion social responsibility make public aware vulnerabilities high impact hiding problems could cause feeling false security avoid involved parties join forces agree period time repairing vulnerability preventing future damage depending potential impact vulnerability expected time needed emergency fix workaround developed applied factors period may vary days several months easier patch software using internet distribution channel responsible disclosure fails satisfy security researchers expect financially compensated reporting vulnerabilities vendor expectation compensation might viewed extortion market vulnerabilities developed vulnerability commercialization remains hotly debated topic tied concept vulnerability disclosure today two primary players commercial vulnerability market idefense started vulnerability contributor program vcp 2003 tippingpoint zero-day initiative zdi started 2005 organisations follow responsible disclosure process material bought march 2003 december 2007 average 7.5 vulnerabilities affecting microsoft apple processed either vcp zdi independent firms financially supporting responsible disclosure paying bug bounties include facebook google mozilla barracuda networks vendor-sec responsible disclosure mailing list many cert groups coordinate responsible disclosures google project zero 90-day disclosure deadline starts notifying vendors vulnerability details shared public defensive community 90 days sooner vendor releases fix zdi 120-day disclosure deadline starts receiving response vendor selected security vulnerabilities resolved applying responsible disclosure | [
6412,
3932,
1074,
8066,
2912,
6526,
3277,
501,
4522,
7106,
1584,
3899,
1972,
3486,
6148,
1805
] | Test |
2,561 | 3 | Lunar_Pool:lunar pool lunar pool known japan video game combines pool pocket billiards aspects miniature golf created developed compile nintendo entertainment system msx stage differently shaped pool table object knock ball pocket using cue ball sixty levels choose friction table adjustable thus lunar reference title along moon-related background imagery within game japanese lunar ball appeared famicom clone systems pirated multi-game cartridges power player super joy iii released wii north american virtual console october 22 2007 lunar pool played boards different shapes wherein player shoot cue ball knock colored balls pockets player fails pocket least one colored ball three consecutive turns player lose one life also player pockets cue ball loses life player pockets colored balls level consecutively without failure player get perfect remark bonus points added player score lunar pool either played alone another player computer game played another player computer players take turns shooting cue ball one player fails knock least one colored balls pocket pockets cue ball opponent turn | [] | Test |
2,562 | 3 | Ghostbusters_(1984_video_game):ghostbusters 1984 video game ghostbusters licensed game activision based movie name designed david crane produced brad fregger released several home computer platforms 1984 later video game console systems including atari 2600 master system nes primary target platform commodore 64 programmer initial version game adam bellin versions game released usa except amstrad cpc version released europe msx version released europe south america japan early 1984 ghostbusters movie nearing completion tom lopez vice president activision product development contacted columbia pictures obtain license ghostbusters video game columbia gave activision specific rules requests design content game stipulating finished quickly possible order released movie peak popularity activision forced complete programming work six weeks contrast usual several months development time game activision time rough concept driving/maze game called car wars decided build ghostbusters game effort paid movie game proved huge successes player sets ghost busting franchise city rising psychokinetic pk energy level ability purchase equipment traps upgrade vehicle player negotiates grid representing city need stop roamers reaching temple zuul causes pk energy level jump player moves city block flashing red game mode switches overhead view player vehicle driving location player must move left right vacuum stray ghosts avoid cars player moves screen slimer ghost must guided two proton streams ghost trap ghost successfully captured player income increases aim 10,000 time city pk level reaches 9999 stay-puff marshmallow man appear wreak havoc city thereby ending game versions e.g commodore 64 version first successful game player given account number stores amount money player end game allowed purchasing expensive items use faster cars traps etc. order win games player required earned money initial account balance one earliest uses passwords used 'save game feature home computers versions game feature sampled rendition ghostbusters cry start movie theme song c64 atari 8bit versions produced within game using patented form compression similar adpcm ess electronic speech systems without requiring external hardware produce speech pcjr/tandy port feature antic may 1985 called ghostbusters first adaptation capture feel theme movie based ... enjoyable play edge 2007 called ghostbusters dauntingly good noting despite action sequences expected licensed title game polished intelligently-paced strategic business simulation ernie hudson said kids really hated commodore 64 game thought sucked 1985 print shop reportedly two widely pirated commodore 64 programs ii computing listed ghostbusters eighth magazine list top apple ii games late 1985 based sales market-share data activision best-selling commodore game late 1987 amstrad cpc zx spectrum versions game included 1986 compilation sold million 3 along fighter pilot rambo kung-fu master game also released story far volume iv december 1989 hollywood collection december 1990 knocked daley thompson decathlon top uk spectrum sales chart ghostbusters ported ibm pcjr tandy 1000 1985 due timing-sensitive raster effects game uses incompatible tandy machines 1000/1000a 1000hx 1000ex use 4.77mhz 8088 cpu nes version created association works later changed name bits laboratory version panned critics gamers fans alike monotonous gameplay sloppy controls lack connection original film game also released nintendo entertainment system 1988 1986 japan master system 1987 versions featured added gameplay ghostbusters sneak marshmallow man played like conventional vertical scrolling platform game actually climb stairs get roof however nes version ghostbusters could fire weapons trap ghosts instead sneak floors contrast master system version ghostbusters able shoot ghosts proton streams temporarily make go away nes version considered difficult reason end nes version final screen states conglaturation completed great game prooved justice culture go rest heroes version extremely negatively received critics monotonous gameplay poor graphics sound well unfair difficulty particularly stairway | [
1508
] | Test |
2,563 | 8 | GoAgent:goagent goagent gnu gpl open-source cross-platform network access software mainly written python supports windows os x linux linux-based os like android openwrt uses google app engine servers provide users free proxy service gain access blocked information normally used web browsers goagent eventually shut request chinese law enforcement project called xx-net claims reborn goagent first release january 2015 | [
96,
1175,
6348,
5571,
578,
6025,
7848,
1886,
7214,
6398,
5965,
3915,
3338,
4014,
4111
] | Test |
2,564 | 2 | Series_40:series 40 series 40 often shortened s40 software platform application user interface ui software nokia broad range mid-tier feature phones well vertu line luxury phones one world widely used mobile phone platforms found hundreds millions devices nokia announced 25 january 2012 company sold 1.5 billion series 40 devices used smartphones nokia primarily uses windows phone 2012 symbian however 2012 2013 several series 40 phones asha line 308 309 311 advertised smartphones although actually support smartphone features like multitasking fully fledged html browser 2014 microsoft acquired nokia mobile phones business part licensing agreement company microsoft mobile allowed use nokia brand feature phones series 40 range however july 2014 company memo revealed microsoft would end future production series 40 devices replaced series 30+ series 40 underlying operating system called intelligent system architecture isa also called nokia operating system nos series 40 introduced 1999 release nokia 7110 96 × 65 pixel monochrome display first phone come wap browser years s40 ui evolved low-resolution ui high-resolution color ui enhanced graphical look third generation series 40 became available 2005 introduced support devices resolutions high qvga 240×320 possible customize look feel ui via comprehensive themes 2012 nokia asha mobile phones 200/201/210 302/306/305/308/310/311 303 311 released used series 40 final feature phone running series 40 nokia 515 2013 running 6th edition series 40 provides communication applications telephone internet telephony voip messaging email client pop3 imap4 capabilities web browser media applications camera video recorder music/video player fm radio phonebook personal information management pim applications calendar tasks basic file management like series 60 provided applications gallery folders subfolders gallery also default location files transferred bluetooth placed user-installed applications series 40 generally mobile java applications flash lite applications also supported mostly used screensavers integrated web browser access web content service provider xhtml/html gateway latest version series 40 called series 40 6th edition introduced new browser based webkit open source components webcore javascriptcore new browser delivers support html 4.01 css2 javascript 1.5 ajax also like higher-end series 60 series 40 run uc browser web browser enhance user web browsing experience latest feature phones asha lineup come nokia xpress browser uses proxy servers compress optimize web pages similar fashion opera mini support syncml synchronization address book calendar notes external services present however many s40 phones synchronization settings must sent via ota text message series 40 embedded software platform open software development via standard de facto content application development technologies supports java midlets i.e java midp cldc technology provide location communication messaging media graphics capabilities s40 also supports flash lite applications | [
1066,
7511,
6788,
3933,
2,
372,
2187,
7521,
3615,
1453,
3952,
2922,
23,
2564,
6440,
5391,
7545,
5044,
740,
1108,
6465,
5062,
3653,
5068,
2240,
3657,
4726,
424,
1129,
76,
5794,
6158,
7956,
2271,
6510,
6515,
6517,
1172,
3694,
472,
4400,
... | Test |
2,565 | 6 | DataPlow_SAN_File_System:dataplow san file system san file system sfs high-performance clustered file system created company dataplow sfs enables fast access shared files located shared storage area network san -attached storage devices sfs utilizes high-speed scalable data transfers inherent storage area networks general-purpose file system wide variety environments including scientific computing finance healthcare entertainment defense broadcast aerospace supported linux solaris os x windows supports san-based block-level storage protocols including fibre channel iscsi interoperability security specifications limits | [
1624,
578
] | Test |
2,566 | 4 | Encryption:encryption cryptography encryption process encoding message information way authorized parties access authorized encryption prevent interference denies intelligible content would-be interceptor encryption scheme intended information message referred plaintext encrypted using encryption algorithm – cipher – generating ciphertext read decrypted technical reasons encryption scheme usually uses pseudo-random encryption key generated algorithm principle possible decrypt message without possessing key well-designed encryption scheme considerable computational resources skills required authorized recipient easily decrypt message key provided originator recipients unauthorized users symmetric-key schemes encryption decryption keys communicating parties must key order achieve secure communication example symmetric key german military enigma machine key settings day allies figured machine worked able decipher information encoded within messages soon could discover encryption key given day transmissions public-key encryption schemes encryption key published anyone use encrypt messages however receiving party access decryption key enables messages read public-key encryption first described secret document 1973 encryption schemes symmetric-key also called private-key although published subsequently work diffie hellman published journal large readership value methodology explicitly described method became known diffie hellman key exchange publicly available public key encryption application called pretty good privacy pgp written 1991 phil zimmermann distributed free charge source code purchased symantec 2010 regularly updated encryption long used militaries governments facilitate secret communication commonly used protecting information within many kinds civilian systems example computer security institute reported 2007 71 companies surveyed utilized encryption data transit 53 utilized encryption data storage encryption used protect data rest information stored computers storage devices e.g usb flash drives recent years numerous reports confidential data customers personal records exposed loss theft laptops backup drives encrypting files rest helps protect physical security measures fail digital rights management systems prevent unauthorized use reproduction copyrighted material protect software reverse engineering see also copy protection another somewhat different example using encryption data rest encryption also used protect data transit example data transferred via networks e.g internet e-commerce mobile telephones wireless microphones wireless intercom systems bluetooth devices bank automatic teller machines numerous reports data transit intercepted recent years data also encrypted transmitted across networks order protect eavesdropping network traffic unauthorized users conventional methods deleting data permanently storage device involve overwriting whole content zeros ones patterns – process take significant amount time depending capacity type medium cryptography offers way making erasure almost instantaneous method called crypto-shredding example implementation method found ios devices cryptographic key kept dedicated 'effaceable storage key stored device setup offer full confidentiality protection case unauthorized person gains physical access device encryption important tool sufficient alone ensure security privacy sensitive information throughout lifetime applications encryption protect information rest transit leaving sensitive data cleartext potentially vulnerable improper disclosure processing cloud service example homomorphic encryption secure multi-party computation emerging techniques compute encrypted data techniques general turing complete incur high computational and/or communication costs response encryption data rest cyber-adversaries developed new types attacks recent threats encryption data rest include cryptographic attacks stolen ciphertext attacks attacks encryption keys insider attacks data corruption integrity attacks data destruction attacks ransomware attacks data fragmentation active defense data protection technologies attempt counter attacks distributing moving mutating ciphertext difficult identify steal corrupt destroy encryption protect confidentiality messages techniques still needed protect integrity authenticity message example verification message authentication code mac digital signature authenticated encryption algorithms designed provide encryption integrity protection together standards cryptographic software hardware perform encryption widely available successfully using encryption ensure security may challenging problem single error system design execution allow successful attacks sometimes adversary obtain unencrypted information without directly undoing encryption see example traffic analysis tempest trojan horse integrity protection mechanisms macs digital signatures must applied ciphertext first created typically device used compose message protect message end-to-end along full transmission path otherwise node sender encryption agent could potentially tamper encrypting time creation secure encryption device correct keys tampered endpoint device configured trust root certificate attacker controls example attacker inspect tamper encrypted data performing man-in-the-middle attack anywhere along message path common practice tls interception network operators represents controlled institutionally sanctioned form attack countries also attempted employ attacks form control censorship even encryption correctly hides message content tampered rest transit message length form metadata still leak sensitive information message well-known crime breach attacks https side-channel attacks relied information leakage via length encrypted content example traffic analysis broad class techniques often employs message lengths infer sensitive implementation traffic flows many messages aggregate padding message payload encrypting help obscure cleartext true length cost increasing ciphertext size introducing bandwidth overhead messages may padded randomly deterministically approach different tradeoffs encrypting padding messages form padded uniform random blobs purbs practice guaranteeing cipher text leaks metadata cleartext content leaks asymptotically minimal formula_1 information via length | [
7148,
3932,
6788,
359,
6415,
4301,
376,
2914,
2555,
3271,
7173,
1461,
5382,
5389,
1471,
4697,
5401,
2219,
5753,
6823,
7567,
3314,
7928,
57,
1123,
3997,
5773,
6135,
5776,
2960,
2961,
3661,
7581,
5430,
3328,
6488,
7214,
74,
435,
5440,
401... | Test |
2,567 | 3 | Status_register:status register status register flag register condition code register ccr collection status flag bits processor examples registers include flags register x86 architecture flags program status word psw register ibm system/360 architecture z/architecture application program status register apsr arm cortex-a architecture status register hardware register contains information state processor individual bits implicitly explicitly read and/or written machine code instructions executing processor status register lets instruction take action contingent outcome previous instruction typically flags status register modified effects arithmetic bit manipulation operations example z bit may set result operation zero cleared nonzero classes instructions may also modify flags indicate status example string instruction may indicate whether instruction terminated found match/mismatch found end string flags read subsequent conditional instruction specified action depending processor jump call return occurs flags indicate specified result earlier instruction cpu architectures mips alpha use dedicated flag register others implicitly set and/or read flags machines either pass implicit status information instructions pass explicitly selected general purpose register status register may often fields well specialized flags interrupt enable bits similar types information interrupt status thread currently executing preserved later recalled storing current value status register along program counter active registers machine stack reserved area memory list common cpu status register flags implemented almost modern processors processors status register also contains flags status flags enable instruction act based result previous instruction pipelined processors superscalar speculative processors create hazards slow processing require extra hardware work around long instruction word processors dispense status flags single instruction performs test indicates outcome test take action compare b jump c equal result test saved subsequent instructions another alternative status register processor instructions deposit status information general-purpose register program requests mips amd 29000 dec alpha risc-v examples architectures provide comparison instructions store comparison result general-purpose register single bit numeric value 0 1 conditional branches act based value general-purpose register usually comparison instructions test equality signed/unsigned magnitude test conditions program uses equivalence formula example mips carry bit program performing multiple-word addition test whether single-word addition registers overflowed testing whether sum lower operand codice_1 instruction sets codice_2 1 0 based specified comparison two operands general-purpose register codice_2 used status register govern conditional jump rather possible value 1 indicating carry low-order addition added high-order word scheme becomes less convenient adding three words two additions computing codice_4 either may generate carry must detected two codice_1 instructions fortunately two carries may added without risk overflow situation stabilizes five instructions per word added | [
5012,
1818,
5371,
3948,
7529,
5737,
5042,
1481,
5055,
2226,
1867,
2237,
421,
5079,
2248,
6148,
441,
7960,
809,
467,
4041,
4047,
5483,
1556,
5487,
7990,
6198,
4061,
1568,
1570,
7666,
515,
5521,
3063,
3747,
1237,
6236,
534,
7314,
5190,
12... | Train |
2,568 | 2 | BeOS_API:beos api beos api often called api inc. application programming interface required write graphical native applications beos hence derivatives haiku zeta api divided number kits collect related classes together bear relation library contains supporting code almost entirely c++ third-party bindings classes python tiny subset classes mostly storage kit related perl application kit contains basic classes required launch beos application well support global clipboard inter-application internal messaging timers rosters functions seen required support graphical application application kit classes supported libbe.so storage kit provides methods manipulating files creating managing symlinks way file open/save panels graphical applications well dealing file system attributes storage kit classes mostly libtracker.so tracker native file manager os interface kit provides large collection widgets building graphical applications main window class dialogue boxes including font handling rendering control majority libbe.so comprises kit kernel kit provides threading semaphores ability access system information also libbe.so support kit provides advanced functions readily fall another kit assisted memory allocation list support network kit provides either rudimentary beos r5 lower almost complete beos dano higher implementation berkeley sockets bind well native functions based nettle c++ networking library libnet.so provides berkeley sockets r5 later replaced common libsocket/libbind.so nomenclature libnetapi r5 later replaced libbnetapi provides modified version nettle mail kit provides native email format well way use system fetch receive email using standard protocols pop3 smtp mail kit supported libmail.so translation kit provides method whereby images plain text formats handled addons allowing applications support one format native intermediate one save/load addon-supported format api also allows video audio translation library although superseded beos r4 immediately disabled translation kit supported libtranslation.so media kit provides audio video input/output abstraction layer based pluggable addons well handling sound mixing audio video format translation media related functions media kit functions supported libmedia.so midi kit provides midi hardware input output abstraction well software synthesiser provided headspace beos r5 libmidi.so provides old beos r3 era midi api libmidi2.so provides r4+ api game kit provides number sound formats suited computer game audio output well ability run full-screen applications use video overlays opengl kit provides implementation opengl well supporting classes allow use native applications beos r5 supported opengl version 1.1 software accelerated although kit hardware-neutral fact outperformed many hardware implementations running competing platforms could deliver similar latency/bandwidth performance due underlying inefficiencies design implementation device kit provides platform-abstracted direct hardware access serial parallel ports well beboxs infamous geekport locale kit provides classes localize applications different languages timezones number formatting conventions etc kit found haiku implementation beos api services kit provides lightweight direct connection web services kit found haiku implementation beos api web kit provides means rendering web pages fork apple webkit kit found haiku implementation beos api package kit provides means package management kit found haiku implementation beos api majority api reimplemented haiku open-source beos replacement although effort catch intervening years since beos r5 additional functionality added ranging large changes mail kit support imap encrypted connections multiple accounts move opengl 1.5 support via mesa 3d alternative systems attempted draw inspiration syllable beos api making attempts provide base port applications private port much api microsoft windows later linux using gtk+ done gobe software enable port gobe productive office suite platforms beos originally developed entire api stage beos revision 3 documented two paper books developer guide advanced topics released o'reilly media inc imprint 1997/8 addition digital representation provided updated beos 2007 access co ltd owners inc intellectual property released text creative commons licence | [
1154,
5983,
7438,
6352,
6009,
1840,
5571,
7827,
6908,
578,
930,
6116,
3212,
5321,
3398,
7573,
947,
5965,
6674,
261,
5786,
1989,
5787,
4017
] | Test |
2,569 | 7 | Google_Cloud_Connect:google cloud connect google cloud connect free cloud computing plug-in windows microsoft office 2003 2007 2010 automatically store synchronize microsoft word document powerpoint presentation excel spreadsheet google docs google docs microsoft office formats google doc copy automatically updated time microsoft office document saved microsoft office documents edited offline synchronized later online google cloud sync maintains previous microsoft office document versions allows multiple users collaborate working document time google cloud connect discontinued april 30 2013 according google cloud connect features available google drive google cloud connect could automatically manually synchronize changes made microsoft office 2003 2007 2010 document google docs documents secured private access one user shared specific people collaboration made public anyone previous document versions retrieved | [
3507,
4116,
5455,
4759,
3850,
5372,
7431,
6176,
993,
7346,
2107,
2475,
5571,
831,
5141,
136,
2317,
2673,
8107,
3309,
7924,
2591,
2683,
855,
2961,
4636,
168,
6776,
6950,
6153,
2712
] | Test |
2,570 | 7 | Comm100_Live_Chat:comm100 live chat comm100 live chat free basic live support software product offered via saas software service model enables businesses organizations communicate website visitors real time improve conversions sales customer satisfaction first version comm100 live chat released august 5 2009 october 2011 comm100 live chat featured apps month techrepublic scott lowe company hit 200,000 registered business users mark october 2012 january 2013 comm100 live chat released version 7.0 features salesforce integration re-designed operator console month comm100 live chat ranked top 3 2013 best enterprise chat software category toptenreviews zero downtime upgrade comm100 live chat made possible march 2013 comm100 live chat consists 3 parts web chat window operator console control panel totally web-based version works major web browsers chrome ie firefox safari opera etc major operating systems windows mac linux operator console also cross-platform compatible desktop app apps mobile devices iphone ipad android blackberry key features comm100 live chat include comm100 live chat offers plugins integrations following | [
1544,
6788,
5984,
933,
7037,
4575,
3915,
5571,
4600,
330,
3850,
578,
5954
] | Train |
2,571 | 1 | Epictetus_Database_Client:epictetus database client epictetus free cross-platform multi-database administration tool used jvm run epictetus distributed freeware antilogic software discontinued since 2009 | [
7213,
1096,
3915,
6538,
5571,
7715,
6386,
5956
] | Test |
2,572 | 4 | Endace:endace endace ltd privately owned network monitoring company based new zealand founded 2001 provides network visibility network recording products large organizations company listed london stock exchange 2005 delisted 2013 acquired emulex 2016 endace spun emulex currently private company october 2016 intercept revealed endace clients intelligence agencies including british gchq known conducting massive surveillance network communications moroccan dgst likewise known mass surveillance citizens endace founded dag project school computing mathematical sciences university waikato new zealand first cards designed university intended measure latency atm networks 2006 endace transitioned component manufacturer appliance manufacturer managed infrastructure provider company sells network visibility fabrics based range network recorders large corporations government agencies endace first new zealand company list london alternative investment market floated mid-june 2005 move without controversy poor share price performance early years seeming failure attract broad enough shareholder base lent weight criticism endace focused initially developing local profile via nzx rather pushing overseas investment via london aim endace headquartered auckland new zealand r centre hamilton new zealand offices australia united states great britain dag project grew academic research waikato university found software measurements atm cells packets unsatisfactory reasons accuracy lack certainty packet loss research group set developing hardware generate better quality recordings hardware subsequent iterations introduced two fundamental innovations hardware timestamping hardware accounting packet loss conventionally packet cell given timestamp host machine kernel i.e software kernel driver notified new packet arrived approach results poor quality timestamps several reasons among considerable latency jitter packet arriving network interface receipt kernel driver uncertainty caused interrupt coalescing wherein one host interrupt signifies arrival several packets poor quality limits research usefully done network performance related fields solve dag generates timestamps hardware close network interface possible obviate latency jitter problems caused interrupt coalescing hardware capable much greater accuracy precision software-generated timestamps precision comes freedom custom hardware assign many bits timestamp required accuracy assured reference external time source gps accurate ± 40 nanoseconds contrast accuracy ntp kernel clocks corrected internet order milliseconds 100,000 times less accurate depending conditions involved dag produces 64 bit timestamps fixed-point format 32 fractional bits giving potential precision formula_1 seconds 233 picoseconds actual precision offered varies particular model dag oldest giving 24 fractional bits 60 nanoseconds better precisions offered dags higher bandwidth networks timestamp derived free-running clock provided crystal oscillator accuracy crystals drift temperature age dag solution use direct digital synthesis using 1 hz pulse-per-second output many gps receivers provide reference clock mechanism described §5.5.3 stephen donnelly phd thesis also describes detail pre-commercial era models dag crucially academically significant contribution dag ability use external reference globally synchronised gps makes possible one-way time-of-flight measurements immense interest academic researchers packets flowing two points internet neither guaranteed follow path direction guaranteed timing characteristics direction outside academic world timestamp accuracy commercial applications enforcement compliance law eu markets financial instruments directive 2004 almost important timestamp accuracy guaranteeing 100 cell packet capture loss unavoidable knowing packets lost important analysing packet trace important able compensate lost packets calculating inter-arrival times commercial nics keep count dropped packets ca n't indicate packets lost dag prepends header amongst things indicates many packets dropped packet previously accepted packet dag also engineered deliver recorded packets host greatest possible efficiency together interstitial loss counter makes dag appealing surveillance applications interstitial loss counter also finds application forensics prosecutor needs able prove record complete october 2016 intercept published article showing endace customers include intelligence agencies including gchq canadian australian intelligence agencies dgst morocco ’ domestic surveillance agency edward snowden documents shown gchq installed massive surveillance network communications uk using over-sea cable europe north america | [
6574,
7217,
2276,
7359,
5484,
803,
3751
] | Validation |
2,573 | 7 | Recruitee:recruitee recruitee software service saas functions talent acquisition platform formerly known applicant tracking system ats includes careers site editor employer branding plugin sourcing personnel job board integration email calendar synchronization within 4 months public launch august 2015 recruitee attracted 1000 small medium-sized enterprises smes recruiting agencies worldwide 2011 perry oostdam met pawel smoczyk founder2be social network helps aspiring entrepreneurs find co-founder working remotely netherlands poland put together first product mobile activation game called georun 2014 oostdam smoczyk pivoted business built recruitee frustration hassles hiring believe hiring team effort founders hr alone launch recruitee quickly became popular got undisclosed amount seed funding september 1 2015 board members include dutch entrepreneurs robert pijselman luc brandts november 2015 recruitee announced partnership rockstart accelerator amsterdam recruitee set talent pool let applicants apply job openings startups affiliated rockstart recruitee current clients include vice magazine usabilla vlisco users customize hiring pipeline job opening users drag drop candidates profiles different stages move along hiring process users post job openings free paid job boards recruitee users bulk upload résumés synchronize emails calendars recruitee users send bulk emails candidates users import potential candidates websites using recruitee sourcing extension google chrome firefox users make careers sites showcase employer branding like company team culture | [
330
] | Test |
2,574 | 5 | MediaBrowser:mediabrowser mediabrowser mediabrowser.com inc. internet browser branding company started 2000 mark c. brown made specially branded versions internet explorer various company brands themes branded web browsers made mediabrowser require internet explorer 5 higher supported windows operating systems december 5 2001 mediabrowser.com inc. went bankrupt shut site branded web browsers windows 95 windows xp internet explorer 5.0 higher windows media player 6.4 higher macromedia flash 4.0 higher also 486 mhz higher processor 32 mb ram 5 mb free hard drive space active internet connection due compatibility issues mediabrowser compatible windows vista windows 7 however run windows xp compatibility mode upon new installation mediabrowser branded browser user required register web browser using mediabrowser online registration form asked name address etc 12 years old mediabrowser shut registration process broken registration form hosted defunct web site therefore users would able use unless modified value windows registry branding consisted various brand images background navigation buttons splash screen links specific web pages related brand company mediabrower also space ads display bottom web browser mediabrowser microtron also included every mediabrowser branding display brand-related video content user late 2000 video game company nintendo partnered mediabrowser make branded browsers new upcoming video games first two browsers released upcoming pokémon gold silver video games mario tennis retailers gave cd-rom copies branded pokémon gs browser anyone pre-ordered copy pokémon gold silver special promotion later 2001 browsers released branded nintendo games paper mario nintendo power branded browser released well mediabrowser.com inc. went bankrupt december 5 2001 chapter 7 filing due company debts 2.49 million various unpaid loans web site containing branded web browsers pulled nintendo posted notice downloads page stating nintendo custom browsers currently unavailable date return keep checking nintendo.com downloads page updates thanks | [
4655,
6802,
5378,
7537,
6809,
393,
3291,
2577,
6452,
4352,
4725,
1136,
6858,
84,
445,
1152,
1525,
7628,
5821,
5127,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
3060,
3412,
5887,
6966,
5542,
2379,
1276,
7015,
7749,
2049,
7765,
4... | Test |
2,575 | 1 | Panorama_(database_engine):panorama database engine panorama database engine development environment macintosh microsoft windows one first applications available mac os 1984 panorama database software apple inc. macintosh microsoft windows product provue development according owner jim rea provue oldest third-party software company apart microsoft developing software macintosh personal computer panorama claim fame databases creates ram-based making extremely fast said disk speeds os application memory caching improved speed benefit becomes less less evident years go panorama popular filemaker main competitor though outlasted many similar products lacks conforming standard application conventions makes potential customisation incorporating powerful scripting language current version mac 6.0 snow leopard compatible intel cpu native windows 5.5 six years development time successor panorama x released november 2017 | [
405,
4759,
3244
] | Test |
2,576 | 9 | Equals_sign:equals sign etymology word equal latin word æqualis meaning uniform identical equal aequus level even symbol universally accepted mathematics equality first recorded welsh mathematician robert recorde whetstone witte 1557 original form symbol much wider present form book recorde explains design gemowe lines meaning twin lines latin gemellus auoide tediouſe repetition theſe woordes equalle ſette doe often woorke vſe paire paralleles gemowe lines one lengthe thus bicauſe noe .2. thynges moare equalle avoid tedious repetition words equal set often work use pair parallels gemowe lines one length thus 2 things equal according scotland university st andrews history mathematics website symbol '= immediately popular symbol || used æ œ latin word aequalis meaning equal widely used 1700s mathematics equals sign used simple statement fact specific case x 2 create definitions let x 2 conditional statements x 2 … express universal equivalence codice_1 first important computer programming language use equals sign original version fortran fortran designed 1954 implemented 1957 fortran serves assignment operator codice_2 sets value codice_3 2 somewhat resembles use mathematical definition different semantics expression following evaluated first may refer previous value codice_3 example assignment codice_5 increases value codice_3 2 rival programming-language usage pioneered original version algol designed 1958 implemented 1960 algol included relational operator tested equality allowing constructions like codice_7 essentially meaning conditional usage mathematics equals sign reserved usage usages remained common different programming languages early 21st century well fortran used assignment languages c perl python awk descendants used equality assignment pascal family ada eiffel apl languages languages basic pl/i used equals sign mean assignment equality distinguished context however languages one meanings different character often sequence characters used meaning following algol languages use equality use assignment although apl special character set uses left-pointing arrow fortran equality operator possible compare expression zero using arithmetic statement fortran iv released 1962 since used four characters .eq test equality language b introduced use == meaning copied descendant c later languages means assignment equals sign also used defining attribute–value pairs attribute assigned value php triple equals sign codice_8 denotes value type equality meaning two expressions evaluate equal values also data type instance expression codice_9 true codice_10 number 0 integer value whereas false boolean value javascript semantics codice_8 referred equality without type coercion however javascript behavior codice_12 described simple consistent rules expression codice_9 true codice_14 false even though sides codice_12 act boolean context reason sometimes recommended avoid codice_12 operator javascript favor codice_8 ruby equality codice_12 requires operands identical type e.g codice_9 false codice_8 operator flexible may defined arbitrarily given type example value type codice_21 range integers codice_22 codice_23 false since types different range vs. integer however codice_24 true since codice_8 codice_21 values means inclusion range note semantics codice_8 non-symmetric e.g codice_28 false since interpreted mean codice_29 rather codice_30 equals sign also used grammatical tone letter orthographies budu congo-kinshasa krumen mwan dan ivory coast unicode character used tone letter u+a78a different mathematical symbol u+003d possibly unique case equals sign european usage person name specifically double-barreled name pioneer aviator alberto santos-dumont also known often used double hyphen resembling equals sign two surnames place hyphen also seems personally preferred practice display equal respect father french ethnicity brazilian ethnicity mother instead double hyphen equals sign sometimes used japanese separator names ojibwe readily-available equal sign keyboard used substitute double hyphen linguistic interlinear glosses equals sign conventionally used mark clitic boundaries equals sign placed clitic word clitic attached chemical formulas two parallel lines denoting double bond commonly rendered using equals sign recent years equals sign used symbolize lgbt rights symbol used since 1995 human rights campaign lobbies marriage equality subsequently united nations free equal promotes lgbt rights united nations symbols used denote items approximately equal include following symbol used denote inequation items equal slashed equals sign ≠ u+2260 2260 alt+x microsoft windows latex done \neq command programming languages limiting 7-bit ascii character set typeable characters use codice_31 codice_32 codice_33 codice_34 codice_35 codice_36 represent boolean inequality operator triple bar symbol ≡ u+2261 latex \equiv often used indicate identity definition also represented u+225d ≝ u+2254 ≔ congruence relation modular arithmetic symbol ≅ often used indicate isomorphic algebraic structures congruent geometric figures equality truth values i.e bi-implication logical equivalence may denoted various symbols including ⇔ additional symbols unicode related equals sign include equals sign sometimes used incorrectly within mathematical argument connect math steps non-standard way rather show equality especially early mathematics students example one finding sum step step numbers 1 2 3 4 5 one might incorrectly write structurally shorthand notation incorrect part equality different value interpreted strictly says implies correct version argument would difficulty results subtly different uses sign education early arithmetic-focused grades equals sign may operational like equals button electronic calculator demands result calculation starting algebra courses sign takes relational meaning equality two calculations confusion two uses sign sometimes persists university level related | [
2451,
5983,
4759,
4302,
7071,
304,
5932,
2662,
744,
6029,
5948,
7390,
1774,
5965,
2156,
2438,
2803,
5091,
1435
] | Test |
2,577 | 4 | Browser_security:browser security browser security application internet security web browsers order protect networked data computer systems breaches privacy malware security exploits browsers often use javascript — sometimes cross-site scripting xss — sometimes secondary payload using adobe flash security exploits also take advantage vulnerabilities security holes commonly exploited browsers including mozilla firefox google chrome opera microsoft internet explorer safari web browsers breached one following ways browser may aware breaches may show user safe connection made whenever browser communicates website website part communication collects information browser order process formatting page delivered nothing else malicious code inserted website content worst-case scenario website specifically designed host malicious code vulnerabilities specific particular browser allow malicious code run processes within browser application unintended ways remember one bits information website collects browser communication browser identity- allowing specific vulnerabilities exploited attacker able run processes visitor machine exploiting known security vulnerabilities allow attacker gain privileged access browser n't already running privileged access infected system order perform even greater variety malicious processes activities machine even victim whole network breaches web browser security usually purpose bypassing protections display pop-up advertising collecting personally identifiable information pii either internet marketing identity theft website tracking web analytics user using tools web bugs clickjacking likejacking facebook like button targeted http cookies zombie cookies flash cookies local shared objects lsos installing adware viruses spyware trojan horses gain access users personal computers via cracking malware including online banking theft using man-in-the-browser attacks vulnerabilities web browser software minimized keeping browser software updated sufficient underlying operating system compromised example rootkit subcomponents browsers scripting add-ons cookies particularly vulnerable confused deputy problem also need addressed following principle defence depth fully patched correctly configured browser may sufficient ensure browser-related security issues occur example rootkit capture keystrokes someone logs banking website carry man-in-the-middle attack modifying network traffic web browser dns hijacking dns spoofing may used return false positives mistyped website names subvert search results popular search engines malware rsplug simply modifies system configuration point rogue dns servers browsers use secure methods network communication help prevent attacks perimeter defenses typically firewalls use filtering proxy servers block malicious websites perform antivirus scans file downloads commonly implemented best practice large organizations block malicious network traffic reaches browser topic browser security grown point spawning creation entire organizations browser exploitation framework project creating platforms collect tools breach browser security ostensibly order test browsers network systems vulnerabilities although part browser per se browser plugins extensions extend attack surface exposing vulnerabilities adobe flash player adobe acrobat reader java plugin activex commonly exploited malware may also implemented browser extension browser helper object case internet explorer browsers like google chrome mozilla firefox block—or warn users of—insecure plugins august 2009 study social science research network found 50 websites using flash also employing flash cookies yet privacy policies rarely disclosed user controls privacy preferences lacking browsers cache history delete functions affect flash player writing local shared objects cache user community much less aware existence function flash cookies http cookies thus users deleted http cookies purged browser history files caches may believe purged tracking data computers fact flash browsing history remains well manual removal betterprivacy addon firefox remove flash cookies adblock plus used filter specific threats flashblock used give option allowing content otherwise trusted sites charlie miller recommended install flash computer security conference cansecwest several security experts also recommend either install adobe flash player block contents web page arbitrary controlled entity owning domain named displayed address bar https used encryption used secure attackers access network changing page contents en route presented password field web page user supposed look address bar determine whether domain name address bar correct place send password example google single sign-on system used e.g youtube.com user always check address bar says nowiki https //accounts.google.com /nowiki inputting password un-compromised browser guarantees address bar correct guarantee one reason browsers generally display warning entering fullscreen mode top address bar would normally fullscreen website make fake browser user interface fake address bar attempts market hardware-based browsers running non-writable read-only file systems data stored device media overwritten presenting clean executable time loads first device zeusgard secure hardware browser released late 2013 zeusgard website functional since mid-2016 another device icloak® stik icloak website provides complete live os completely replaces computer entire operating system offers two web browsers read-only system icloak provide tor browser anonymous browsing well regular firefox browser non-anonymous browsing non-secured web traffic using https example could still subject man-in-the-middle alteration network traffic-based manipulations livecds run operating system non-writable source typically come web browsers part default image original livecd image free malware software used including web browser load free malware every time livecd image booted one effective ways browse web safely use browser patches avoid cross-origin resource sharing vulnerability example patches provided webkit-based browsers browsing world wide web least-privilege user account i.e without administrator privileges limits ability security exploit web browser compromising whole operating system internet explorer 4 later allows blacklisting whitelisting activex controls add-ons browser extensions various ways internet explorer 7 added protected mode technology hardens browser application security sandboxing feature windows vista called mandatory integrity control google chrome provides sandbox limit web page access operating system suspected malware sites reported google confirmed google flagged hosting malware certain browsers third-party extensions plugins available harden even latest browsers older browsers operating systems whitelist-based software noscript block javascript adobe flash used attacks privacy allowing users choose sites know safe adblock plus also uses whitelist ad filtering rules subscriptions though software filtering list maintainers come controversy by-default allowing sites pass pre-set filters us-cert recommends block flash using noscript modern web browsers undergo extensive fuzzing uncover vulnerabilities chromium code google chrome continuously fuzzed chrome security team 15,000 cores microsoft edge internet explorer microsoft performed fuzzed testing 670 machine-years product development generating 400 billion dom manipulations 1 billion html files | [
2173,
4655,
3932,
7151,
6417,
6795,
6419,
2914,
3271,
1461,
3281,
6809,
4689,
393,
1847,
3291,
2574,
7910,
7186,
5401,
6823,
7564,
51,
7570,
4352,
4725,
1136,
74,
2615,
3338,
7600,
3680,
1152,
4025,
96,
2632,
6515,
2996,
7628,
5821,
369... | Test |
2,578 | 4 | Callback_verification:callback verification callback verification also known callout verification sender address verification technique used smtp software order validate e-mail addresses common target verification sender address message envelope address specified smtp dialogue mail mostly used anti-spam measure since large percentage e-mail spam generated forged sender mfrom addresses spam detected checking whether forging resulted invalid address using method related technique call forwards secondary firewall mail exchanger verify recipients primary mail exchanger domain order decide whether address deliverable receiving mail server verifies sender address verifying parts sender address domain name part character local part part character first step establish successful smtp connection mail exchanger sender address mail exchanger found looking mx records domain dns zone second step query exchanger make sure accepts address valid one done way sending email address however process stopped mail exchanger accepts rejects recipient address steps receiving mail server would take bounce mail back sender however case mail sent smtp commands sent equivalently mail rcpt commands replaced vrfy command however vrfy command required supported usually disabled modern mtas techniques technically compliant relevant smtp rfcs rfc 5321 however rfc 2505 best current practice recommends default disabling vrfy command prevent directory harvest attacks one widespread interpretation implies mail from/rcpt pair commands also respond way stated rfcs documentation postfix exim caution use technique mention many limitations smtp callbacks particular many situations either ineffective causes problems systems receive callbacks problems caused originating systems violating stretching limits rfcs verification problems reflecting problems back senders like unintentionally used invalid addresses rejection null sender greylisting example delay caused verifying recipient closely related delay caused originator many cases turn helps originator system detect problems fix like unintentionally able receive valid bounces several problems reduced caching verification results particular systems give useful information rejecting rcpt time catch-all e-email etc remembered future call backs systems need made also results positive negative specific e-mail addresses remembered mtas like exim caching built | [
5733,
1640,
4734,
6908,
7624,
2510,
1781
] | Test |
2,579 | 0 | Cache_language_model:cache language model cache language model type statistical language model occur natural language processing subfield computer science assign probabilities given sequences words means probability distribution statistical language models key components speech recognition systems many machine translation systems tell systems possible output word sequences probable improbable particular characteristic cache language model contains cache component assigns relatively high probabilities words word sequences occur elsewhere given text primary means sole use cache language models speech recognition systems understand good idea statistical language model contain cache component one might consider someone dictating letter elephants speech recognition system standard non-cache n-gram language models assign low probability word elephant rare word english speech recognition system contain cache component person dictating letter may annoyed time word elephant spoken another sequence words higher probability according n-gram language model may recognized e.g. tell plan erroneous sequences deleted manually replaced text elephant time elephant spoken system cache language model elephant still probably misrecognized first time spoken entered text manually however point system aware elephant likely occur – estimated probability occurrence elephant increased making likely spoken recognized correctly elephant occurred several times system likely recognize correctly every time spoken letter completely dictated increase probability assigned occurrence elephant example consequence machine learning specifically pattern recognition exist variants cache language model single words also multi-word sequences occurred previously assigned higher probabilities e.g. san francisco occurred near beginning text subsequent instances would assigned higher probability cache language model first proposed paper published 1990 ibm speech-recognition group experimented concept group found implementation form cache language model yielded 24 drop word-error rates first hundred words document dictated detailed survey language modeling techniques concluded cache language model one new language modeling techniques yielded improvements standard n-gram approach caching results show caching far useful technique perplexity reduction small medium training data sizes development cache language model generated considerable interest among concerned computational linguistics general statistical natural language processing particular recently interest applying cache language model field statistical machine translation success cache language model improving word prediction rests human tendency use words bursty fashion one discussing certain topic certain context frequency one uses certain words quite different frequencies one discussing topics contexts traditional n-gram language models rely entirely information small number four three two words preceding word probability assigned adequately model burstiness recently cache language model concept originally conceived n-gram statistical language model paradigm adapted use neural paradigm instance recent work continuous cache language models recurrent neural network rnn setting applied cache concept much larger contexts yielding significant reductions perplexity another recent line research involves incorporating cache component feed-forward neural language model fn-lm achieve rapid domain adaptation | [
1314,
1640,
5429,
4760,
715,
5008,
7372,
2832
] | Test |
2,580 | 7 | Iamus_(computer):iamus computer iamus computer cluster half-cabinet encased custom shell located universidad de málaga powered melomics technology composing module iamus takes 8 minutes create full composition different musical formats although native representation obtained whole system less second average iamus composes full pieces contemporary classical music iamus opus one created october 15 2010 first fragment professional contemporary classical music ever composed computer style rather attempting emulate style existing composers previously done david cope iamus first full composition hello world premiered exactly one year creation opus one october 15 2011 four iamus works premiered july 2 2012 broadcast live school computer science universidad de málaga part events included alan turing year compositions performed event later recorded london symphony orchestra creating album iamus new scientist reported first complete album composed solely computer recorded human musicians commenting authenticity music stephen smoliar critic classical music san francisco examiner commented primary act making music engaged performers listener responds performers ... interesting documents generated iamus capacity challenge creative talents performing musicians | [
5976,
5571,
578
] | Test |
2,581 | 2 | Synaptic_(software):synaptic software synaptic gtk-based graphical user interface apt package manager used debian linux distribution derivatives synaptic usually used systems based deb packages also used systems based rpm packages used install remove upgrade software packages add repositories also following features package manager enables user install upgrade remove software packages install remove package user must search navigate package mark installation removal changes applied instantly user must first mark changes apply synaptic development funded conectiva asked alfredo kojima employee write graphical front-end apt continuing work initiated creation apt rpm back-end apt-rpm | [
7959,
8055,
1621,
2091,
5200,
5017,
5545,
1723,
5724,
2728,
7159,
1260,
4854,
3444,
4675,
5912,
1267,
3366,
4685,
5480,
4778,
5571,
6011,
578,
2034,
4603,
7092,
7555,
499,
2131,
6743,
3559,
3996,
1406,
6663,
3738,
2338,
4991,
1050,
5523,
... | Test |
2,582 | 2 | TSS-8:tss-8 tss-8 discontinued time-sharing operating system co-written witcraft john everett digital equipment corporation 1967 dec also referred timeshared-8 edusystem 50 operating system ran 12-bit pdp-8 computer released 1968 timesharing system like ibm call/os implemented language variants also supported dec focal developed specifically pdp 8/e provided algebraic language also desk calculator mode | [
4566,
190,
4670,
5911,
6804,
4946,
5571,
4786,
1765,
7396,
861,
6849,
3751,
2803
] | Test |
2,583 | 2 | William_Jolitz:william jolitz william frederick jolitz born february 22 1957 commonly known bill jolitz american software programmer best known developing 386bsd operating system 1989 1994 along wife lynne jolitz jolitz received ba computer science uc berkeley wife reside los gatos california children rebecca benjamin sarah | [
5268,
3838,
1341,
7514,
6794,
6085,
3856,
908,
481,
3457,
1279,
5571,
1193,
738,
6367,
6369,
6918,
594,
4441,
6477,
2512,
424,
6489,
6583,
443
] | Test |
2,584 | 4 | Scientific_Working_Group_on_Digital_Evidence:scientific working group digital evidence scientific working group digital evidence swgde brings together organizations actively engaged field digital multimedia evidence foster communication cooperation well ensure quality consistency within forensic community formed 1998 scientific working group digital evidence brings together law enforcement academic commercial organizations actively engaged field digital forensics develop cross-disciplinary guidelines standards recovery preservation examination digital evidence originally named technical working group twg digital evidence became swgde twgs renamed scientific working groups swgs 1999 order distinguish federal bureau investigation-supported long-term working groups national institute justice-supported short-term twgs swgs ongoing groups meet least per year federal state local members goal groups open lines communication law enforcement agencies forensic laboratories around world providing guidance use new innovative technologies techniques initial members swgde made federal forensic laboratories well representatives several agencies performed digital forensics outside traditional forensic laboratory soon representatives state local agencies invited participate today members federal state local law enforcement agencies academic organizations commercial entities first meeting swgde held july 1998 group defined digital evidence information probative value stored transmitted binary form includes digitized text numerals sound images video binary later changed digital swgde ’ earliest work explored principles digital forensics developed baseline definitions 1999 request group eight g8 international organization computer evidence ioce longer functioning organization swgde contributions authored set principles definitions group felt close universal possible principles published forensic science communications journal submitted g8 principles adopted g8 2001 2003 swgde published guidelines training best practices result efforts american society crime laboratory directors ascld approved digital evidence part accreditation process crime laboratories 2003 today discipline referred digital multimedia evidence comprises sub-disciplines computer forensics audio video imaging swgde membership presently consists approximately seventy maximum 100 forensic examiners scientists managers two dozen federal state local law enforcement agencies well representatives academic private research communities membership elects officers within swgde composed executive board eight standing committees ad-hoc committees appointed as-needed basis standing committees audio forensics computer forensics imaging photography quality standards video membership outreach imaging photography video committees added june 2015 scientific working group imaging technology swgit terminated operations swgde provides guidance digital forensic community publication standards guidelines best practices website swgde also encourages number published documents used standard developing organizations e.g astm international creation national international standards digital multimedia evidence one document become astm standard standard practice computer forensics astm e2763 additionally swgde may answer direct inquiries using letters position statements also typically posted website due rapidly evolving field digital forensics great deal debate regarding accreditation certification proficiency testing legislation digital forensic labs personnel tools swgde accredit certify approve qualify laboratories individuals swgde promotes establishment maintenance robust quality system publication relevant guidance documents position papers guidelines validation testing minimum requirements quality assurance swgde documents seek provide framework agencies insert criteria describe included protocol requiring particular format content swgde documents freely available community-at-large goal agencies wishing create improve digital evidence programs thoughtfully examine consider guidance documents first published draft version comment public provides public opportunity provide feedback changes objections portion document becomes final feedback reviewed accepted incorporated document published final version swgde invites interested parties review comment published draft final documents available website swgde published 40 guidance documents including joint documents swgit since inception addition releasing documents swgde members disseminate best practices law enforcement professionals digital multimedia evidence concerned carried attending lecturing meetings conferences various forensic organizations include | [
6488
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.