node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,685
3
Slot_1:slot 1 slot 1 refers physical electrical specification connector used intel microprocessors including pentium pro celeron pentium ii pentium iii single dual processor configurations implemented intel switched back traditional socket interface socket 370 1999 introduction pentium ii cpu need greater access testing made transition socket slot necessary previously pentium pro intel combined processor cache dies socket 8 package connected full-speed bus resulting significant performance benefits unfortunately method required two components bonded together early production process testing possible result single tiny flaw either die made necessary discard entire assembly causing low production yield high cost intel subsequently designed circuit board cpu cache remained closely integrated mounted printed circuit board called single-edged contact cartridge secc cpu cache could tested separately final assembly package reducing cost making cpu attractive markets high-end servers cards could also easily plugged slot 1 thereby eliminating chance pins typical cpu bent broken installing socket form factor used slot 1 5-inch-long 242-contact edge connector named sc242 prevent cartridge inserted wrong way slot keyed allow installation one direction sc242 later used amd slot well two slots identical mechanically electrically incompatible discourage slot users trying install slot 1 cpu connector rotated 180 degrees slot motherboards new slot 1 intel added support symmetric multiprocessing smp maximum two pentium ii pentium iii cpus used dual slot motherboard celeron official smp support also converter cards known slotkets hold socket 8 pentium pro cpu used slot 1 motherboards specific converters however rare another kind slotket allows using socket 370 cpu slot 1 many latter devices equipped voltage regulator modules order supply new cpu lower core voltage motherboard would otherwise allow single edge contact cartridge secc used beginning slot 1-era pentium ii cpus inside cartridge cpu enclosed hybrid plastic metal case back housing plastic several markings name pentium ii intel logo hologram model number front consists black anodized aluminum plate used hold cpu cooler secc form solid cpu resting safely inside case compared socket-based cpus pins bent cpu less likely damaged improper installation cooler following secc sepp-form single edge processor package appeared market designed lower-priced celeron cpus form lacks case entirely consisting solely printed-circuit board holding components form factor called secc2 used late pentium ii pentium iii cpus slot 1 created accommodate switch flip chip packaging front plate carried coolers mounted straight pcb exposed cpu die incompatible secc cartridges historically three platforms intel p6-cpus socket 8 slot 1 socket 370 slot 1 successor socket 8 socket 8 cpus pentium pro directly l2-cache embedded cpu located outside core circuit board shared core exception later slot 1 cpus coppermine core l2-cache embedded die beginning 2000 pentium-iii-cpus fc-pga-housing appeared slot 1 slowly succeeded socket 370 intel already offered socket 370 slot 1 time since beginning 1999 socket 370 initially made low-cost celeron processors slot 1 thought platform expensive pentium ii early pentium iii models cache core embedded die slot 1 also obsoleted old socket 7 least regarding intel standard platform home-user superseding intel p5 pentium mmx cpu intel completely left socket 7 market
[ 2541, 4123, 3849, 6170, 1729, 2828, 6173, 7974, 2830, 3002, 4314, 5377, 5379, 3193, 1841, 1645, 3203, 5404, 4968, 3385, 4972, 2494, 5853, 6935, 8021, 7302, 5963, 5886, 866, 694, 3333, 7134, 262, 2351, 6683, 2263 ]
Test
2,686
2
Calf_Studio_Gear:calf studio gear calf studio gear often referred calf plugins set open source lv2 plugins linux platform suite intends complete set plugins audio mixing virtual instruments mastering version 0.90.0 47 plugins suite calf studio gear development started late 2007 lv2 plugin standard infancy calf studio gear one first projects bring graphical audio plugins linux first versions 0.0.19 included support ladspa dssi well dropped december 2011 project initiated krzysztof foltman 2009 markus schmidt became interested development plugin suite due frustration proprietary software driving force behind plugins ever since responsible overall design calf studio gear well brains behind dsp many plugins calf studio gear complete suite plugins linux included plugins past calf plugins known cause crashes within ardour digital audio workstation primarily due use fftw library recently thread safe since october 2014 calf studio gear moved away using fftw library released version 0.0.60 may 2015
[ 5571, 578 ]
Test
2,687
4
CloudBerry_Backup:cloudberry backup cloudberry backup online backup software developed cloudberry lab software integrated 3rd-party cloud storage providers supports data backup restore windows desktop servers macos linux additionally offers support microsoft sql server microsoft exchange vmware hyper-v office 365 g suite google apps cloudberry backup available several licensed editions well free offering cloudberry backup desktop free licensed versions cloudberry managed backup saas solution designed help manage backup recovery across multiple computers servers cloudberry backup designed automate backup recovery files folders system images storage-agnostic meaning storage decoupled backup license customers work directly cloud storage providers pricing features need cloudberry backup supports 20 cloud storage providers including amazon s3 amazon glacier microsoft azure google cloud platform backblaze b2 wasabi openstack s3 compatible others cloudberry backup supports multiple data storage tiers including lower cost options like microsoft azure cool blob storage archive blob storage amazon s3 infrequent access glacier google cloud storage nearline coldline 2011 cloudberry backup released support amazon s3 subsequently updated support microsoft azure google cloud platform number cloud vendors late 2011 cloudberry lab released windows server edition followed support microsoft sql server microsoft exchange bare metal restore cloudberry backup added additional operating system support linux macos 2015 freeware version cloudberry backup also appeared year cloudberry backup written primarily c c++ programming languages windows versions also rely .net cloudberry managed backup built using c asp.net angular node.js cloudberry backup provides backup recovery functionality cloud local storage network shares backup recovery plans configured using graphical user interface command-line interface also available editions cloudberry backup supported operating systems windows macos linux cloudberry lab developed proprietary block-level algorithm speeds data uploads backups cloud addition company uses proprietary image-based algorithm back complete systems image files retaining ability recover specific files within images desired cloudberry backup supports recovery images directly cloud-based virtual server services amazon ec2 azure virtual machines google compute engine well bare-metal devices product restore system images computers operating system installed using bootable usb iso disk images cloudberry backup software supports synthetic full backup functionality amazon s3 wasabi hot storage performing typical incremental backup sequence advised perform full backups time time time resource consuming reduce bandwidth amount data uploaded synthetic full backup feature software scans data previously backed storage uploads new modified blocks instead full set files according cloudberry lab tests synthetic full backups 80 percent faster typical full image-based backup cloudberry backup perform backups microsoft sql server microsoft exchange databases recover active running state linux cloudberry backup allows users back files folders cloud storage product supports variety linux distributions including ubuntu debian suse red hat fedora centos oracle linux amazon linux cloudberry backup configured perform complete backup file directory disk image also supports incremental backup functionality block level meaning users able back new updated portions files initial backup completed backups executed manually via custom schedules cloudberry backup supports file compression 256-bit aes encryption server-side encryption encryption-at-rest cloud storage support filename encryption also available cloudberry backup provides flexible data recovery options backups restored physical virtual cloud virtual machines product restore files backup recover selected individual files product includes recovery wizard guides users data restoration process cloudberry lab features also include cloudberry backup available several editions designed address different use cases windows desktop edition intended file image-based backups whereas windows server microsoft exchange microsoft sql server ultimate editions designed meet needs businesses running windows server macos linux editions address backup needs platforms pricing cloudberry lab products based one-time purchase fee purchasers pay one-time fee computer server devices want operate cloudberry lab pricing per device per user license purchased device limit number users accounts operate product device long use product free versions cloudberry backup available personal use well cloudberry managed backup saas solution designed managed service providers msps businesses need way centrally manage backup customers within environments hosted saas solution provides means manage monitor large environments single dashboard cloudberry managed backup uses subscription-based licensing model supports white-labeling rebranded managed service providers sell backup service brand cloudberry managed backup integrated autotask connectwise optitune office 365 google g suite ninjarmm cloudberry backup received several awards including latest silver stevie award 2018 product constantly ranked one market leaders g2 crowd updates rankings every three months cloudberry lab developer cloudberry backup gold winner smb product year category best biz awards 2018 international addition awards cloudberry lab holds partnerships certifications microsoft vmware google cloud connectwise oracle openstack amazon web services
[ 3837, 5516, 7838, 4594, 2390, 7821, 3915, 2566, 5571, 2530, 7715, 578 ]
Train
2,688
7
Kerrighed:kerrighed kerrighed open source single-system image ssi cluster software project project started october 1998 paris research group french national institute research computer science control 2006 2011 project mainly developed kerlabs january 2012 linux clustering mission kerlabs adopted new company cluster inc. headquartered pacific grove california january 18 2012 kerrighed 3.0 ported ubuntu 12.04 linux kernel v3.2 kerrighed implemented extension linux operating system helps scientific applications numerical simulations use power applications may using openmp message passing interface and/or posix multithreaded programming model kerrighed implements set global resource management services aim making resource distribution transparent applications managing resource sharing applications taking benefit whole cluster resources demanding applications kerrighed provides development framework allowing easily implement dynamic scheduling policies without kernel modification kerrighed provides several features distributed shared memory sequential consistency model processes migration one cluster node another limited extent checkpointing kerrighed introduces container concept entity abstraction files memory kerrighed node starts 'root container local resources available access resources globally one must start kerrighed container one node add nodes kerrighed container
[ 6268, 5453, 83, 578, 1586, 5890 ]
Test
2,689
2
Daniel_Robbins_(computer_programmer):daniel robbins computer programmer daniel robbins computer programmer consultant best known founder former chief architect gentoo linux project 2008 launched funtoo project free linux distribution based gentoo became project lead hacker organizer also currently works time albuquerque new mexico 'open source/community strategy lead zenoss president funtoo technologies time system administrator university new mexico albuquerque robbins formed distribution enoch linux later renamed gentoo 2002 however like many free software projects gentoo struggled create business model would support key developers robbins resigned chief architect 26 april 2004 citing considerable personal debt desire spend time family formed gentoo foundation transferred gentoo intellectual property gentoo run full community-based model rejoin project short time august 2006 becoming developer february 2007 joining amd64 team resigned early march 2007 several high-profile criticisms way gentoo run since robbins left ... since resignation gentoo founder benevolent dictator project 2004 newly established gentoo foundation battling lack clear directions frequent developer conflicts ... mid-july 2007 emerged robbins still technically legal president gentoo foundation ... would like see fun gentoo lot less politics apparent role president gentoo foundation may opportunity change things better need look ... 2008 robbins began work funtoo project created allow work extending technologies originally created gentoo robbins move microsoft may 2005 attracted attention within linux community historically combative relationship microsoft described role working bill hilf ... helping microsoft understand open source community-based projects ... however robbins resigned less year later 16 january 2006 due frustrations unable fully utilize technical skills position later 2006 joined fsmlabs socorro new mexico work rtlinux daniel robbins also president funtoo technologies consulting firm founded 2006 located albuquerque new mexico
[ 361, 5453, 5540, 5803, 3938, 3174, 3084, 462, 7429, 1351, 1535, 1260, 1822, 7528, 1176, 4401, 5292, 2559, 3780, 5829, 6725, 576, 1192, 578, 6736, 7740, 7463, 7555, 7559, 5759, 589, 3559, 412, 4435, 3133, 3404, 1227, 7855, 5518, 966, 968...
Test
2,690
2
Leaf_driver:leaf driver leaf driver refers device driver accesses logically physically existent devices i/o bus implements functions defined device transferring data device accessing device registers leaf devices requiring leaf drivers typical peripheral devices disks tapes network adapters framebuffer forth drivers devices export traditional character block driver interfaces use user processes read write data storage communication devices see also nexus driver
[ 2718, 5571 ]
Test
2,691
4
Convergence_(SSL):convergence ssl convergence proposed strategy replacing ssl certificate authorities first put forth moxie marlinspike august 2011 giving talk titled ssl future authenticity black hat security conference demonstrated firefox addon server-side notary daemon talk marlinspike proposed current problems certificate authority ca system could reduced single missing property called trust agility convergence aimed provide strategy claimed agile secure distributed 2013 marlinspike focused ietf proposal called tack designed uncontroversial first step advocates dynamic certificate pinning instead full ca replacement reduces number times third party needs trusted development convergence continued convergence extra fork 2014 convergence based previous work perspectives project carnegie mellon university like perspectives convergence authenticated connections contacting external notaries unlike perspectives convergence notaries could use number different strategies beyond network perspective order reach verdict purpose certificate authority conventional ssl system vouch identity site checking ssl certificate without vouchsafing one open man-in-the-middle attack single site vouched single certificate authority ca ca trusted user web browsers typically include list default trusted certificate authorities display warning untrusted connection site vouchsafed trusted ca problem system user browser vendor loses trust ca removing ca browser list trusted authorities means losing trust sites used ca happened major browsers lost trust diginotar ca sites registered ca get new certificate authorities see certificate authority ca compromise examples trust breaches convergence however level redundancy single point failure several notaries could vouch single site user could choose trust several notaries would vouch sites notaries disagreed whether site identity correct user could choose go majority vote err side caution demand notaries agree content single notary voting method controlled setting browser addon user chose distrust certain notary non-malicious site could still trusted long remaining trusted notaries trusted thus longer single point failure september 2011 qualys announced would run two notary servers june 2016 servers appeared list notaries maintained convergence wiki
[ 363, 794, 887, 6795, 1168, 1173, 2644, 1460, 5824, 8189, 5571, 8093, 6540, 5399, 6458, 6553, 6461, 2587, 4071, 7567, 7925, 3899, 5773, 2876, 6049, 1594, 4990, 7214, 1328, 3588, 353, 1059, 354, 1513, 2620, 359, 3426 ]
Test
2,692
3
Milk_Race_(video_game):milk race video game milk race computer game released 1987 zx spectrum commodore 64 atari 8-bit family msx amstrad cpc developed phil berry stuart ruecroft composer david whittaker icon design based around internationally acclaimed event world cycle race milk race known tour britain simulator designed coincide 1987 event starting newcastle upon tyne north england midlands london finishing line basic premise game control bike using acceleration braking choosing correct gear conserve energy
[]
Test
2,693
4
Mirai_(malware):mirai malware mirai malware turns networked devices running linux remotely controlled bots used part botnet large-scale network attacks primarily targets online consumer devices ip cameras home routers mirai botnet first found august 2016 malwaremustdie whitehat malware research group used largest disruptive distributed denial service ddos attacks including attack 20 september 2016 computer security journalist brian krebs web site attack french web host ovh october 2016 dyn cyberattack according chat log anna-senpai robert coelho mirai named 2011 tv anime series mirai nikki source code mirai published hack forums open-source since source code published techniques adapted malware projects devices infected mirai continuously scan internet ip address internet things iot devices mirai includes table ip address ranges infect including private networks addresses allocated united states postal service department defense mirai identifies vulnerable iot devices using table 60 common factory default usernames passwords logs infect mirai malware infected devices continue function normally except occasional sluggishness increased use bandwidth device remains infected rebooted may involve simply turning device short wait turning back reboot unless login password changed immediately device reinfected within minutes upon infection mirai identify competing malware remove memory block remote administration ports victim iot devices identified “ first entering rapid scanning phase ① asynchronously “ statelessly ” sent tcp syn probes pseudo-random ipv4 addresses excluding hard-coded ip blacklist telnet tcp ports 23 2323 ” iot device responds probe attack enters brute-force login phase phase attacker tries establish telnet connection using predetermined username password pairs list credentials logins default usernames passwords iot vendor iot device allows telnet access victim ip along successfully used credential sent collection server hundreds thousands iot devices use default settings making vulnerable infection infected device monitor command control server indicates target attack reason use large number iot devices bypass anti-dos software monitors ip address incoming requests filters sets block identifies abnormal traffic pattern example many requests come particular ip address reasons include able marshall bandwidth perpetrator assemble alone avoid traced mirai internet things iot devices threat stopped arrest actors since actors utilizing mirai malware source code openly shared github use evolve mirai new variants expand botnet node networking previously untouched iot devices detail recent progress variants listed following paragraphs 12 december 2017 researchers identified variant mirai exploiting zero-day flaw huawei hg532 routers accelerate mirai botnets infection implementing two known soap related exploits routers web interface cve-2014–8361 cve-2017–17215 mirai version called satori 14 january 2018 new variant mirai dubbed “ okiru ” already targeting popular embedded processor like arm mips x86 powerpc others found targeting arc processors based linux devices first time argonaut risc core processor shorted arc processors second-most-popular embedded 32 bit processor shipped 1.5 billion products per year including desktop computers servers radio cameras mobile utility meters televisions flash drives automotive networking devices smart hubs tv modems routers wifi internet things noted however relatively small number arc-based devices run linux therefore exposed mirai 18 january 2018 successor mirai reported designed hijack cryptocurrency mining operations 26 january 2018 two similar mirai variant botnets reported modified version weaponizes edb 38722 d-link router exploit enlist vulnerable iot devices vulnerability router home network administration protocol hnap utilized craft malicious query exploited routers bypass authentication cause arbitrary remote code execution less modified version mirai called masuta japanese transliteration master modified version called puremasuta march 2018 new variant mirai dubbed omg emerged surface added configurations target vulnerable iot devices turning proxy servers new firewall rules allow traffic travel generated http socks ports added configurations mirai code ports open traffic omg sets 3proxy – open-source software available russian website may june 2018 another variant mirai dubbed wicked emerged added configurations target least three additional exploits including affecting netgear routers cctv-dvrs wicked scans ports 8080 8443 80 81 attempts locate vulnerable unpatched iot devices running ports researchers suspect author created wicked sora owari omni botnets early july 2018 reported least thirteen versions mirai malware detected actively infecting linux internet things iot internet three designed target specific vulnerabilities using exploit proof concept without launching brute-forcing attack default credential authentication month published report infection campaign mirai malware android devices android debug bridge tcp/5555 actually optional feature android operating system discovered feature appears enabled android phones end 2018 mirai variant dubbed miori started spread remote code execution vulnerability thinkphp framework affecting versions 5.0.23 5.1.31 vulnerability continuously abused evolved mirai variants dubbed hakai yowai january 2019 variant speakup february 2019 mirai used alongside bashlite ddos attack 20 september 2016 krebs security site reached 620 gbit/s ars technica also reported 1 tbit/s attack french web host ovh 21 october 2016 multiple major ddos attacks dns services dns service provider dyn occurred using mirai malware installed large number iot devices many still using default usernames passwords attacks resulted inaccessibility several high-profile websites including github twitter reddit netflix airbnb many others attribution dyn attack mirai botnet originally reported level 3 communications mirai later revealed used ddos attacks rutgers university 2014 2016 left faculty students campus unable access outside internet several days time additionally failure university central authentication service caused course registration services unavailable critical times academic semester university reportedly spent 300,000 consultation increased cyber-security budget university 1 million response attacks university cited attacks among reasons increase tuition fees 2015-2016 school year person alias exfocus claimed responsibility attacks stating reddit ama /r/rutgers subreddit user student school ddos attacks motivated frustrations university bus system user later claimed interview new jersey-based blogger lied affiliated university attacks funded anonymous client security researcher brian krebs later alleged user indeed student rutgers university latter interview given attempt distract investigators staff deep learning security observed steady growth mirai botnets 21 october attack mirai also used attack liberia internet infrastructure november 2016 according computer security expert kevin beaumont attack appears originated actor also attacked dyn security affairs website taken offline hour twenty minutes published article mirai okiru 14 january 2018 end november 2016 approximately 900,000 routers deutsche telekom produced arcadyan crashed due failed tr-064 exploitation attempts variant mirai resulted internet connectivity problems users devices talktalk later patched routers new variant mirai discovered talktalk routers british man suspected behind attack arrested luton airport according bbc january 17 2017 computer security journalist brian krebs posted article blog krebs security disclosed name person believed written malware krebs stated likely real-life identity anna-senpai named anna nishikinomiya character shimoneta author mirai actually paras jha owner ddos mitigation service company protraf solutions student rutgers university update original article paras jha responded krebs denied written mirai fbi reported questioned jha involvement october 2016 dyn cyberattack december 13 2017 paras jha josiah white dalton norman entered guilty plea crimes related mirai botnet daniel kaye 29 also known alias bestbuy popopret spiderman accused using infected network computers known mirai botnet attack blackmail lloyds banking group barclays banks according nca extradited germany uk according report kaye also pleaded guilty court hijacking 900,000 routers network deutsche telekom researchers pointing handle name nexus zeta responsible author new variants mirai dubbed okiru satori masuta puremasuta august 21 2018 grand jury indicted kenneth currin schuchman 20 aka nexus zeta knowingly causing transmission program information code commands result conduct intentionally caused damage without authorization protected computers according indictment filed u.s. district court anchorage followed arrest trial suspect american electronic musician composer james ferraro 2018 album four pieces mirai references mirai ongoing narrative
[ 704, 2173, 3932, 2912, 376, 3277, 2923, 3281, 7186, 744, 2587, 51, 3323, 5779, 7600, 6868, 4025, 1528, 2632, 2991, 1173, 6526, 6904, 6541, 6194, 7657, 2678, 3038, 7294, 3047, 6569, 862, 7307, 6589, 5187, 4110, 1996, 7328, 2376, 1632, 27...
Validation
2,694
9
Variadic:variadic computer science operator function variadic take varying number arguments arity fixed specific articles see
[ 486, 2638 ]
Test
2,695
0
Arabic_Ontology:arabic ontology arabic ontology linguistic ontology arabic language used arabic wordnet ontologically-clean content people use also tree i.e classification concepts/meanings arabic terms formal representation concepts arabic terms convey content ontologically well-founded benchmarked scientific advances rigorous knowledge sources rather speakers ’ naïve beliefs wordnets typically ontology tree explored online ontology structure i.e. data model similar wordnet structure concept ontology given unique concept identifier uri informally described gloss lexicalized one synonymous lemma terms term-concept pair called sense given senseid set senses called synset concepts senses described attributes era area specify used lexicalization type example sentence example instances ontological analysis others semantic relations e.g. subtypeof partof others defined concepts important individuals included ontology individual countries seas individuals given separate individualids linked concepts instanceof relation concepts arabic ontology mapped synsets wordnet well bfo dolce terms used arabic ontology mapped lemmas ldc sama database arabic ontology seen next generation wordnet ontologically-clean arabic wordnet follows structure i.e. data model wordnet fully mapped wordnet however critical foundational differences arabic ontology used many application domains urls arabic ontology designed according w3c best practices publishing linked data described following url schemes allows one also explore whole database like exploring graph
[ 2087, 1696, 7290, 5008 ]
Validation
2,696
5
Micro_Transport_Protocol:micro transport protocol micro transport protocol µtp sometimes also utp open udp-based variant bittorrent peer-to-peer file sharing protocol intended mitigate poor latency congestion control problems found conventional bittorrent tcp providing reliable ordered delivery devised automatically slow rate packets data transmitted users peer-to-peer file sharing torrents interferes applications example protocol automatically allow sharing adsl line bittorrent application web browser µtp emerged research internet2 qos high-performance bulk transport adapted use background transport protocol plicto founded stanislav shalunov later acquired bittorrent inc. 2006 developed within new owner first introduced µtorrent 1.8.x beta branches publicized alpha builds µtorrent 1.9 implementation µtp used µtorrent later separated libutp library published mit license first free software client implement µtp ktorrent 4.0. libtorrent implements µtp since version 0.16.0 used qbittorrent since 2.8.0 tixati implements µtp since version 1.72 vuze formerly azureus implements µtp since version 4.6.0.0 transmission implements µtp since version 2.30 congestion control algorithm used µtp known low extra delay background transport ledbat aims decrease latency caused applications using protocol maximizing bandwidth latency excessive additionally information µtp congestion controller used choose transfer rate tcp connections ledbat described rfc 6817 2009 details µtp implementation different then-current internet draft µtp also adds support nat traversal using udp hole punching two port-restricted peers third unrestricted peer acts stun server
[ 1068, 2984, 3172, 7714, 2379, 7343, 1456, 3855, 2390, 7637, 5039, 8090, 6908, 2664, 3383, 6025, 7744, 499, 2043, 4434, 2681, 4891, 5414, 3573, 3821, 426, 2430, 5531, 1329, 3338, 4014, 84, 6499, 2901 ]
Test
2,697
8
Doppelganger_domain:doppelganger domain doppelganger domain domain spelled identical legitimate fully qualified domain name fqdn missing dot host/subdomain domain used malicious purposes typosquatting traditional attack vector web distribute malware harvest credentials vectors email remote access services ssh rdp vpn also leveraged whitepaper godai group doppelganger domains demonstrated numerous emails harvested without anyone noticing someone email address someone finance.somecompany.example doppelganger domain would financesomecompany.example hence someone trying send email user forget dot finance someone financesomecompany.example would go doppelganger domain instead legitimate user
[ 7047, 2043 ]
Validation
2,698
2
Jonas_Öberg:jonas öberg jonas öberg born 22 november 1977 norrköping sweden free open-source software activist describing instigator world free worked free software foundation europe gnu project fscons creative commons shuttleworth foundation started develop software 1991 installed first gnu/linux operating system 1993 eventually joined webmaster gnu project late 1990s spent time mit ai labs met richard stallman others free software foundation joining bazaar conference new york since 2002 award committee free software foundation free software awards 2001 founding member free software foundation europe took role vice president 22 november 2001 former vice president loïc dachary took step back focus gnu savannah worked creative commons several years including running course fundraising peer peer university became first regional coordinator europe 2011 work organisation eventually led position fellow shuttleworth foundation work focus creating tools prototypes embedding metadata licensing attribution requirements digital works company commons machinery featured one 12 winners tech stars 2014 competition european commission neelie kroes digital agenda 19th-century wooden house north sweden continuously renovating lives outside stockholm gnesta sweden married julia velkova media researcher member internet society bulgaria marriage took place ice hotel sweden 8 march 2013
[ 1523, 8158, 8161, 3174, 1351, 2559, 3868, 6365, 7463, 7559, 3981, 4070, 2599, 1406, 6674, 5787, 966 ]
Test
2,699
3
Acer_PICA:acer pica m6100 pica system logic chipset designed acer laboratories introduced 1993 pica stands performance-enhanced input-output cpu architecture based jazz architecture developed microsoft supported mips technologies r4000 r4400 microprocessors chipset designed computers run windows nt therefore used arc firmware boot windows nt chipset consisted six chips cpu secondary cache controller buffer i/o cache bus controller memory controller two data buffers pica used acer formula 4000 personal workstation nec sold oem name riscstation image
[ 4799, 4370, 6256, 1727, 4859, 4816 ]
Validation
2,700
7
Rackspace:rackspace rackspace inc. american managed cloud computing company based windcrest texas suburb san antonio company also offices australia united kingdom switzerland netherlands germany singapore mexico hong kong rackspace data centers operating texas chicago kansas city virginia united kingdom germany australia hong kong company rackspace email division operates blacksburg va offices located austin texas 2016 rackspace closed san francisco office rackspace became public 2008 2016 purchased taken private apollo global management llc 1996 richard yoo started small internet service provider called cymitar network systems garage apartment san antonio texas company began application development work addition offering basic internet access web hosting 1997 yoo brought dirk elmendorf company began develop internet applications primary business company re-formed cymitar technology group cymitar technology group grew patrick condon recruited california joined team 1998 coincidentally three company founders students one time trinity university san antonio although founders began application developers end users found companies either know want host applications founders wanted focus application development–not hosting–but unable find opportunity outsource hosting work eventually founders realized would better create product serve hosting need launch company rackspace launched october 1998 richard yoo ceo although hosting companies focused technology end hosting rackspace created fanatical support offering focus service support march 28 2000 rackspace received funding lead investor norwest venture partners sequoia capital george j still jr. managing partner norwest subsequently joined board directors 2008 rackspace moved headquarters building occupied datapoint corporation then-unoccupied windsor park mall windcrest texas rackspace chairman graham weston owned montgomery ward building mall 2006 sold developer city windcrest purchased south mall create residential retail complex facility located next roosevelt high school many roosevelt students intern rackspace fortune top 100 best companies work 2008 placed rackspace first year rackspace applied consideration company praised transparency regular open book meetings held top level leaders share in-depth financial information employees 2011 2013 company named one top 100 places work fortune august 8 2008 rackspace opened trading new york stock exchange ticker symbol rax initial public offering ipo raised 187.5 million initial public offering included 15,000,000 shares common stock price 12.50 per share ipo well public market lost 20 initial price almost immediately around 3:45pm cst december 18 2009 rackspace experienced outage customers using dallas–fort worth data center – including rackspace cloud september 8 2010 rackspace received national attention decided discontinue providing web hosting service one customers dove world outreach center reaction dove world pastor terry jones plan burn several copies qur'an anniversary september 11th attacks rackspace claims violated company policy move came criticism notably terry jones described indirect attack freedom speech others questioned appropriateness rackspace action stating absolutely reason web hosts editorial policy gives jones attention makes look persecuted june 3 2011 rackspace intervened application queensland host rack servers trademark business name australia may 26 2013 author bill schley book 'the unstoppables inspired culture rackspace became new york times bestseller may 15 2014 rackspace hired morgan stanley evaluate strategic options including selling merging technology companies october 2014 rackspace announced would sell support google work apps business customers august 2016 confirmed apollo global management reached agreement buy company 4.3 billion sale completed november 2016 rackspace officially ended trading new york stock exchange november 3 2016 may 2017 ceo taylor rhodes announced leaving company may 16 work smaller private company different city may 2017 rackspace named joe eazor new ceo april 2019 company named kevin jones new ceo october 22 2008 rackspace announced purchasing cloud storage provider jungle disk vps provider slicehost february 16 2012 rackspace acquired sharepoint911 microsoft sharepoint consulting company based cincinnati ohio may 25 2017 rackspace announced agreement acquire tricore solutions september 11 2017 rackspace announced plans acquire datapipe september 17 2018 rackspace announced acquired relationedge acquisitions include cloudkick anso labs mailgun objectrocket exceptional cloud services zerovm rackspace launched serverbeach san antonio january 2003 lower-cost alternative dedicated servers designed technology hobbyists want flexibility reliability richard yoo catalyst startup serverbeach bandwidth colocation provider peer 1 hosting known cogeco peer 1 purchased serverbeach october 2004 7.5 million peer 1 hosting entered uk managed hosting market january 2009 serverbeach brand competes directly uk arm rackspace run dominic monkhouse former managing director rackspace limited october 2006 mosso inc. launched experimented white-labeling hosting services eventually division became foundation rackspace cloud computing offering october 1 2007 rackspace acquired webmail.us private e-mail hosting firm located blacksburg va originally branded mailtrust may 20 2009 became part newly formed cloud office division rackspace october 22 2008 rackspace acquired slicehost provider virtual servers jungle disk provider online backup software services rackspace announced march 8 2017 plans expansion portfolio include managed service google cloud platform program began beta testing july 18 2017 planned full offering late 2017 rackspace partnered google customer reliability engineering group google site reliability engineers ensure cloud applications run speed reliability google widely-used products 2010 rackspace contributed source code cloud files product openstack project apache license become openstack object storage component april 2012 rackspace announced would implement openstack compute underlying technology cloud servers product change introduced new control panel well add-on cloud services offering databases server monitoring block storage virtual networking 2015 two rackspace executives elected board openstack foundation february 2016 interview cto john engates stated rackspace use openstack power public private cloud
[ 370, 7165, 3954, 3958, 6806, 22, 2212, 3973, 3978, 5408, 3309, 754, 5064, 2961, 5780, 1514, 2988, 7613, 1183, 1550, 3706, 124, 6906, 5135, 3028, 2317, 6219, 1982, 6954, 5889, 5894, 189, 5903, 1634, 3091, 6262, 7722, 5927, 1280, 7741, 59...
Validation
2,701
2
Remote_direct_memory_access:remote direct memory access computing remote direct memory access rdma direct memory access memory one computer another without involving either one operating system permits high-throughput low-latency networking especially useful massively parallel computer clusters rdma supports zero-copy networking enabling network adapter transfer data wire directly application memory application memory directly wire eliminating need copy data application memory data buffers operating system transfers require work done cpus caches context switches transfers continue parallel system operations reduces latency message transfer however strategy presents several problems related fact target node notified completion request single-sided communications 2018 rdma achieved broader acceptance result implementation enhancements enable good performance ordinary networking infrastructure example roce rdma converged ethernet able run either lossy lossless infrastructure addition iwarp enables ethernet rdma implementation physical layer using tcp/ip transport combining performance latency advantages rdma low-cost standards-based solution rdma consortium dat collaborative played key roles development rdma protocols apis consideration standards groups internet engineering task force interconnect software consortium hardware vendors started working higher-capacity rdma-based network adapters rates 100 gbit/s reported software vendors red hat oracle corporation support apis latest products engineers started developing network adapters implement rdma ethernet red hat enterprise linux red hat enterprise mrg support rdma microsoft supports rdma windows server 2012 via smb direct vmware esxi product also supports rdma 2015 common rdma implementations include virtual interface architecture rdma converged ethernet roce infiniband omni-path iwarp
[ 3821, 1933, 500, 5873, 5239, 7637, 7499, 5571, 1237, 6586, 3180 ]
Validation
2,702
1
Entity_Framework:entity framework entity framework ef open source object-relational mapping orm framework ado.net part .net framework since entity framework version 6 separated .net framework entity framework set technologies ado.net support development data-oriented software applications architects developers data-oriented applications typically struggled need achieve two different objectives must model entities relationships logic business problems solving must also work data engines used store retrieve data data may span multiple storage systems protocols even applications work single storage system must balance requirements storage system requirements writing efficient maintainable application code entity framework enables developers work data form domain-specific objects properties customers customer addresses without concern underlying database tables columns data stored entity framework developers work higher level abstraction deal data create maintain data-oriented applications less code traditional applications first version entity framework efv1 included .net framework 3.5 service pack 1 visual studio 2008 service pack 1 released 11 august 2008 version widely criticized even attracting 'vote confidence signed approximately one thousand developers second version entity framework named entity framework 4.0 efv4 released part .net 4.0 12 april 2010 addressed many criticisms made version 1 third version entity framework version 4.1 released april 12 2011 code first support refresh version 4.1 named entity framework 4.1 update 1 released july 25 2011 includes bug fixes new supported types version 4.3.1 released february 29 2012 updates like support migration version 5.0.0 released august 11 2012 targeted .net framework 4.5 also version available .net framework 4 without runtime advantages version 4 version 6.0 released october 17 2013 open source project licensed apache license v2 like asp.net mvc source code hosted github using git version number improvements code-first support microsoft decided modernize componentize bring .net cross-platform linux osx elsewhere meaning next version entity framework would complete rewrite 27 june 2016 released entity framework core 1.0 alongside asp.net core 1.0 .net core 1.0 originally named entity framework 7 renamed highlight complete rewrite rather incremental upgrade n't replace ef6 ef core 1.0 licensed apache license v2 built entirely open github ef core 1.0 shares conceptual similarities prior versions entity framework completely new codebase designed efficient powerful flexible extensible run windows linux osx support new range relational nosql data stores ef core 2.0 released 14 august 2017 along visual studio 2017 15.3 asp.net core 2.0 architecture ado.net entity framework bottom consists following entity data model edm specifies conceptual model csdl data using modelling technique called entity data model extended version entity-relationship model data model primarily describes entities associations participate edm schema expressed schema definition language sdl application xml extended markup language addition mapping msl elements conceptual schema csdl storage schema ssdl must also specified mapping specification also expressed xml visual studio also provides entity designer visual creation edm mapping specification output tool xml file *.edmx specifying schema mapping edmx file contains ef metadata artifacts csdl/msl/ssdl content three files csdl msl ssdl also created edited hand entity data model wizard visual studio initially generates one-to-one 1:1 mapping database schema conceptual schema cases relational schema elements composed tables primary foreign keys gluing related tables together contrast entity types define conceptual schema data entity types aggregation multiple typed fields – field maps certain column database – contain information multiple physical tables entity types related independent relationships physical schema related entities also exposed similarly – via field whose name denotes relation participating accessing instead retrieving value column database traverses relationship returns entity collection entities related entity types form class objects entities conform entities instances entity types entities represent individual objects form part problem solved application indexed key example converting physical schema described two entity types logical schema mapping physical schema represented entity data model edm specified xml file ado.net entity framework uses edm actually perform mapping letting application work entities internally abstracting use ado.net constructs like dataset recordset ado.net entity framework performs joins necessary entity reference information multiple tables relationship traversed entity updated traces back table information came issues sql update statements update tables data updated ado.net entity framework uses esql derivative sql perform queries set-theoretic operations updates entities relationships queries esql required translated native sql flavor underlying database entity types entity sets form logical edm schema exposed anything ado.net entity framework includes object service presents entities objects elements relationships exposed properties thus entity objects front-end instances edm entity types lets object oriented languages access use similarly front-ends created expose entities via web services e.g. wcf data services xml used entities serialized persistence storage over-the-wire transfer entities** instances entitytype represent individual instances objects customer orders information pertains identity entity defined entity type instance sense entity type defines class entity belongs also defines properties entity properties describe aspect entity giving name type properties entity type ado.net entity framework fully typed fully compatible type system used dbms system well common type system .net framework property simpletype complextype multi-valued well entitytype belong namespace entitykey property uniquely identifies instance entity type different property types distinguished follows entity instances housed entitycontainers per-project containers entities project one named entitycontainers reference entities across multiple namespaces entity types multiple instances one entity type stored collections called entitysets one entity type multiple entitysets edm primitive types simple types two entity types related either association relation containment relation example shipment billed customer association whereas order contains order details containment relation containment relation also used model inheritance entities relation two entity types specified relationship type instances called relationships relate entity instances future releases kinds relationship types composition identification may introduced relationship types characterized degree arity count entity types relate multiplicity however initial release ado.net entity framework relationships limited binary degree two bi-directional relationship multiplicity defines many entity instances related together based multiplicity relationships either one-to-one one-to-many many-to-many relationships entities named name called role defines purpose relationship relationship type also operation action associated allows action performed entity event action performed related entity relationship specified take action operation done related entity example deleting entity forms part relation ondelete operation actions taken association relationships different semantics either ends different actions specified either end ado.net entity framework uses xml based data definition language called schema definition language sdl define edm schema sdl defines simpletypes similar cts primitive types including string int32 double decimal guid datetime among others enumeration defines map primitive values names also considered simple type enumerations supported framework version 5.0 onwards complextypes created aggregation types collection properties types define entity type definition written ebnf grammar facets used describe metadata property whether nullable default value also cardinality property i.e. whether property single valued multi valued multiplicity “ 1 ” denotes single valued property “ ” means multi-valued property example entity denoted sdl relationship type defined specifying end points multiplicities example one-to-many relationship customer orders defined ado.net entity framework uses variant structured query language named entity sql aimed writing declarative queries updates entities entity relationships – conceptual level differs sql explicit constructs joins edm designed abstract partitioning data across tables querying conceptual model facilitated entityclient classes accepts entity sql query query pipeline parses entity sql query command tree segregating query across multiple tables handed entityclient provider like ado.net data providers entityclient provider also initialized using connection object addition usual parameters data store authentication info requires sdl schema mapping information entityclient provider turn turns entity sql command tree sql query native flavor database execution query returns entity sql resultset limited tabular structure unlike ado.net resultsets entity sql enhances sql adding intrinsic support canonical functions supported entity framework compliant data providers used entity sql query also extension methods linq entities translated canonical functions independent specific database ado.net data provider receives function translates desired sql statement dbmss equivalent functionality set standard embedded functions also differences accuracy calculations therefore canonical functions supported databases canonical functions return results linq entities provider allows linq used query various rdbms data sources several database server specific providers entity framework support available entity framework v4 new methods executestorequery executestorecommand added class objectcontext visual studio feature called visualizer linq query written visual studio viewed native sql using visualizer debug session visualizer linq entities object query targeting rdbms available via visualstudiogallery
[ 7149, 2180, 6420, 714, 720, 1460, 1840, 2928, 7907, 4697, 5747, 2953, 53, 6840, 422, 425, 442, 4017, 784, 6504, 4022, 4026, 7607, 1526, 2986, 3687, 7619, 7621, 7971, 2283, 5479, 3367, 7263, 2660, 5850, 150, 6933, 519, 3052, 4448, 3407, ...
Train
2,703
7
Citrix_Virtual_Apps:citrix virtual apps citrix virtual apps formerly winframe metaframe presentation server xenapp application virtualization software produced citrix systems allows windows applications accessed via individual devices shared server cloud system citrix virtual apps application virtualization software delivers centrally-hosted windows applications local devices without necessity installing flagship product citrix formerly known names winframe metaframe presentation server citrix virtual apps software uses flexcast management architecture fma proprietary architecture citrix virtualization products delivers individual applications opposed entire desktops devices also used citrix workspace deliver apps part complete virtual desktop environment citrix virtual apps windows applications used devices typically could run including macintosh computers mobile devices google chromebooks conversely enables otherwise incompatible apps run windows desktops citrix virtual apps accessed devices via citrix receiver software delivered on-premises data centers public private hybrid clouds precursor virtual apps called winframe multi-user operating system based windows nt 3.51 released 1995 winframe one first products distributed citrix stage product development citrix systems licensed windows nt 3.51 base operating system microsoft core development citrix delivered multiwin engine allowed multiple users logon execute applications winframe server citrix later license multiwin technology microsoft forming basis microsoft terminal services repackaged versions windows 95 citrix winframe client included also available citrix metaframe superseded winframe 1998 product renamed several times became metaframe xp 2002 metaframe xp presentation server 2003 rebranded presentation server 2005 products focused remote access applications server-based computing 2008 product renamed xenapp xen taken company acquisition xensource 2007 2010 2012 citrix issued two updates xenapp xenapp 6 launched 2010 included new central management console called appcenter 2012 xenapp 6.5 released update included new feature called instant app access aimed reduce application launch time 2013 version 7.0 released update combined xendesktop xenapp one application called xendesktop flex management architecture fma prior versions xenapp used company independent management architecture ima 2014 version 7.5 released xenapp separate xendesktop also built fma 2018 xenapp rebranded citrix virtual apps
[ 448, 2961, 3172, 4759, 5571, 5904, 6950, 3042, 3756, 1682 ]
Test
2,704
6
Andrew_File_System:andrew file system andrew file system afs distributed file system uses set trusted servers present homogeneous location-transparent file name space client workstations developed carnegie mellon university part andrew project originally named vice afs named andrew carnegie andrew mellon primary use distributed computing afs several benefits traditional networked file systems particularly areas security scalability one enterprise afs deployment morgan stanley exceeds 25,000 clients afs uses kerberos authentication implements access control lists directories users groups client caches files local filesystem increased speed subsequent requests file also allows limited filesystem access event server crash network outage afs uses weak consistency model read write operations open file directed locally cached copy modified file closed changed portions copied back file server cache consistency maintained callback mechanism file cached server makes note promises inform client file updated someone else callbacks discarded must re-established client server network failure including timeout re-establishing callback involves status check require re-reading file consequence file locking strategy afs support large shared databases record updating within files shared client systems deliberate design decision based perceived needs university computing environment example original email system andrew project andrew message system single file per message used like maildir rather single file per mailbox like mbox see afs buffered i/o problems handling shared databases significant feature afs volume tree files sub-directories afs mountpoints links afs volumes volumes created administrators linked specific named path afs cell created users filesystem may create directories files usual without concern physical location volume volume may quota assigned order limit amount space consumed needed afs administrators move volume another server disk location without need notify users operation even occur files volume used afs volumes replicated read-only cloned copies accessing files read-only volume client system retrieve data particular read-only copy point copy becomes unavailable clients look remaining copies users data unaware location read-only copy administrators create relocate copies needed afs command suite guarantees read-only volumes contain exact copies original read-write volume time read-only copy created file name space andrew workstation partitioned shared local name space shared name space usually mounted /afs unix filesystem identical workstations local name space unique workstation contains temporary files needed workstation initialization symbolic links files shared name space andrew file system heavily influenced version 4 sun microsystems popular network file system nfs additionally variant afs distributed file system dfs adopted open software foundation 1989 part distributed computing environment finally afs version two predecessor coda file system three major implementations transarc ibm openafs arla transarc software deprecated losing support fourth implementation exists linux kernel source code since least version 2.6.10 committed red hat fairly simple implementation still early stages development therefore incomplete january 2013 following access control list acl permissions granted permissions affect files subdirectories include additionally afs includes application acls h effect access files
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 7581, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 4087, 5518, 8029, 6231, 869, 6586, 1605, 174, 27...
Test
2,705
4
Snare_(software):snare software snare sometimes also written snare acronym system intrusion analysis reporting environment collection software tools collect audit log data variety operating systems applications facilitate centralised log analysis enterprise agents available linux osx windows solaris microsoft sql server variety browsers snare enterprise epilog windows facilitates central collection processing windows text-based log files isa/iis snare enterprise epilog unix provides method collect text based log files linux solaris operating systems opensource agents available irix aix snare currently used hundreds thousands individuals organisations worldwide meet local federal information security guidelines associated auditing eventlog collection snare series agents began life 2001 team intersect alliance created linux kernel module implement trusted computer system evaluation criteria auditing c2 level agents windows solaris soon followed additional operating systems applications added mix time snare server software originally designed meet needs australian-based intelligence agency clients distribution restricted australia need server solution complement increasingly popular snare agents pushed intersect alliance team find overseas partners allow distribution internationally snare described 'de facto standard windows event retrieval deep roots open source movement coupled available commercial support options used small non-profit organisations right huge multinational fortune-500 companies organisations produce audit server software competes snare server software cisco sensage loglogic use recommend snare agents customers agents supported commercial open-source version available snare agents designed collect audit log data host system push data quickly possible central server servers archive analysis reporting central server either syslog server snare server appliance custom application snare agents also able push logs unidirectional network order facilitate log transfer networks low classification networks higher classification snare server appliance software-only solution provides variety analysis tools facilitate collection analysis reporting archival audit log data
[ 2858, 2879, 4759, 7715, 578, 1706, 3135 ]
Validation
2,706
9
Okular:okular okular multiplatform document viewer developed kde community based qt kde frameworks libraries distributed part kde applications bundle originally based kpdf replaced kpdf kghostview kfax kfaxview kdvi kde 4 functionality easily embedded applications okular started google summer code 2005 piotr szymański accepted student okular identified success story 2007 season usability season okular toolbar mockup created based analysis popular document viewers usage survey ported qt 5 december 2016 version numbering jumped 0.26 1.0 okular annotation features include commenting pdf documents highlighting drawing lines geometric shapes adding textboxes stamps annotations stored separately unmodified pdf file since version 0.15 poppler 0.20 saved document standard pdf annotations text extracted text file possible select parts document copy text image clipboard features include reading text aloud using qt speech module part qt since qt 5 previously using jovie trimming white page borders setting bookmarks supports following file formats official version obeys drm restrictions pdf files default may prevent copying printing converting pdf files turned options obey drm limitations however
[ 4474, 4575, 5017, 893, 1267, 4685, 6011, 5571, 6015, 6016, 578, 740, 6550, 136, 6557, 2415, 4891, 1769, 1581, 5162, 6219, 4097, 4461, 3420 ]
Validation
2,707
9
ExtendScript:extendscript extendscript scripting language associated toolkit developed adobe systems intended use creative suite technical communication suite products dialect ecmascript 3 standard therefore similar javascript actionscript toolkit comes bundled creative suite technical communication suite editions access tools within applications like photoshop framemaker indesign effects batch-processing projects
[ 2451, 8137, 4759, 5571 ]
Test
2,708
9
EusLisp_Robot_Programming_Language:euslisp robot programming language euslisp lisp-based programming system built basis object orientation designed specifically developing robotics software first version ran 1986 unix-system5/ustation-e20
[ 4543 ]
Test
2,709
9
Domain-specific_modeling:domain-specific modeling domain-specific modeling dsm software engineering methodology designing developing systems computer software involves systematic use domain-specific language represent various facets system domain-specific modeling languages tend support higher-level abstractions general-purpose modeling languages require less effort fewer low-level details specify given system domain-specific modeling often also includes idea code generation automating creation executable source code directly domain-specific language models free manual creation maintenance source code means domain-specific language significantly improve developer productivity reliability automatic generation compared manual coding also reduce number defects resulting programs thus improving quality domain-specific language differs earlier code generation attempts case tools 1980s uml tools 1990s code generators modeling languages built tool vendors possible tool vendor create domain-specific language generators normal domain-specific language occur within one organization one expert developers creates modeling language generators rest developers use modeling language generator built organization use allows tight fit exact domain response changes domain domain-specific languages usually cover range abstraction levels particular domain example domain-specific modeling language mobile phones could allow users specify high-level abstractions user interface well lower-level abstractions storing data phone numbers settings likewise domain-specific modeling language financial services could permit users specify high-level abstractions clients well lower-level abstractions implementing stock bond trading algorithms domain-specific modeling also helpful reason low-level software artifacts define language one needs language write definition language model often called metamodel hence language defining modeling language meta-metamodel meta-metamodels divided two groups derived customizations existing languages developed specifically meta-metamodels derived meta-metamodels include entity relationship diagrams formal languages extended backus-naur form ebnf ontology languages xml schema meta-object facility mof strengths languages tend familiarity standardization original language ethos domain-specific modeling favors creation new language specific task unsurprisingly new languages designed meta-metamodels widely used family languages oprr goprr gopprr focus supporting things found modeling languages minimum effort many general-purpose modeling languages already tool support available form case tools domain-specific language languages tend small market size support construction bespoke case tool scratch instead tool support domain-specific language languages built based existing domain-specific language frameworks domain-specific language environments domain-specific language environment may thought metamodeling tool i.e. modeling tool used define modeling tool case tool resulting tool may either work within domain-specific language environment less commonly produced separate stand-alone program common case domain-specific language environment supports additional layer abstraction compared traditional case tool using domain-specific language environment significantly lower cost obtaining tool support domain-specific language since well-designed domain-specific language environment automate creation program parts costly build scratch domain-specific editors browsers components domain expert needs specify domain specific constructs rules domain-specific language environment provides modeling tool tailored target domain existing domain-specific language takes place domain-specific language environments either commercial metaedit+ actifsource open source gems academic gme increasing popularity domain-specific language led domain-specific language frameworks added existing ides e.g eclipse modeling project emp emf gmf microsoft dsl tools software factories unified modeling language uml general-purpose modeling language software-intensive systems designed support mostly object oriented programming consequently contrast domain-specific language languages uml used wide variety purposes across broad range domains primitives offered uml object oriented programming domain-specific languages offer primitives whose semantics familiar practitioners domain example domain automotive engineering software models represent properties anti-lock braking system steering wheel etc uml includes profile mechanism allows constrained customized specific domains platforms uml profiles use stereotypes stereotype attributes known tagged values uml 2.0 constraints restrict extend scope uml particular domain perhaps best known example customizing uml specific domain sysml domain specific language systems engineering
[ 1908 ]
Test
2,710
6
ExFAT:exfat exfat extended file allocation table file system introduced microsoft 2006 optimized flash memory usb flash drives sd cards exfat proprietary microsoft owns patents several elements design exfat used ntfs feasible solution due data-structure overhead greater file-size limit standard fat32 file system i.e 4 gib required exfat adopted sd card association default file system sdxc cards larger 32 gib 2013 samsung published gpl linux driver exfat exfat first introduced late 2006 part windows ce 6.0 embedded windows operating system vendors signing licenses exfat either embedded systems device manufacturers produce media preformatted exfat entire file allocation table fat family exfat included used embedded systems lightweight better suited solutions low memory low power requirements easily implemented firmware specifications features requirements exfat file system include exfat format allows individual files larger 4 gb facilitating long continuous recording hd video exceed 4 gb limit less hour current digital cameras using fat32 break video files multiple segments approximately 2 4 gb increase capacity increase data transferred write operation needs made efficient sdxc cards running uhs-i minimum guaranteed write speed 10 mbps exfat plays factor achieving throughput reduction file system overhead cluster allocation achieved introduction cluster bitmap elimination reduction writes fat single bit directory record indicates file contiguous telling exfat driver ignore fat optimization analogous extent file systems except applies whole files opposed contiguous parts files exfat supported windows xp windows server 2003 update kb955704 windows embedded ce 6.0 windows vista service pack 1 windows server 2008 windows 7 windows 8 windows server 2008 r2 except windows server 2008 server core windows 10 mac os x starting 10.6.5 companies integrate exfat specific group consumer devices including cameras camcorders digital photo frames flat fee mobile phones pcs networks different volume pricing model exfat supported number media devices modern flat-panel tvs media centers portable media players vendors flash media including usb pen drives compact flash cf solid-state drives ssd ship high-capacity media pre-formatted exfat file system example sandisk ships 256 gb cf cards exfat microsoft entered licensing agreements blackberry panasonic sanyo sony canon aspen avionics audiovox continental harman lg automotive bmw mac os x snow leopard 10.6.5 later create read write verify repair exfat file systems fuse-based implementation named fuse-exfat exfat-fuse read/write support available freebsd multiple linux distributions older versions mac os x kernel implementation also released written samsung initially released github unintentionally later released officially samsung compliance gpl none solutions become official part linux due patent encumbered status exfat file system implementation called exfatfilesystem based fuse-exfat available amigaos 4.1 proprietary read/write solutions licensed derived microsoft exfat implementation available android linux operating systems paragon software group tuxera xcfiles datalight proprietary full-featured implementation intended portable 32-bit systems rtfs ebs embedded software full-featured implementation embedded devices two experimental unofficial solutions available dos loadable usbexfat driver requires panasonic usb stack dos works usb storage devices open-source exfat executable exfat file system reader requires hx dos extender work native exfat real-mode dos drivers would allow usage booting exfat volumes exfat employs filename hash-based lookup phase speed certain cases described us patent 8321439 quick file name lookup using name hash document perhaps contains additional details helpful understanding file system appendix like ntfs exfat pre-allocate disk space file marking arbitrary space disk 'allocated file exfat uses two separate 64-bit length fields directory valid data length vdl indicates real size file physical data length provide improvement allocation cluster storage new file microsoft incorporated method pre-allocate contiguous clusters bypass use updating fat table december 10 2013 us patent office granted patent us8606830 one feature exfat used exfat implementation within embedded systems provides atomic transactions multiple steps updating file system metadata feature called transaction safe fat texfat granted patent us patent office us7613738 november 3 2009. exfat rest fat family file systems use indexes file names unlike ntfs uses b-trees file searching file accessed directory must sequentially searched match found file names shorter 16 characters length one file name record required entire file represented three 32-byte directory records called directory file set 256 mib sub-directory hold 2,796,202 file sets files longer names number decrease maximum based minimum three-record file set help improve sequential searching directories including root hash value file name derived file stored directory record searching file file name first converted upper case using upcase table file names case insensitive hashed using proprietary patented algorithm 16-bit 2 byte hash value record directory searched comparing hash value match found file names compared ensure proper file located case hash collisions improves performance 2 bytes compared file significantly reduces cpu cycles file names 2 characters bytes size virtually every comparison performed 2 bytes time intended file located exfat introduces metadata integrity use checksums three checksums currently use volume boot record vbr 12 sector region contains boot records bios parameter block bpb oem parameters checksum sector two vbr type regions main vbr backup vbr checksum sector checksum previous 11 sectors exception three bytes boot sector flags percent used provides integrity vbr determining vbr modified common cause could boot sector virus would also catch corruption vbr second checksum used upcase table static table never change corruption table could prevent files located table used convert filenames upper case searching locate file third checksum directory file sets multiple directory records used define single file called file set file set metadata including file name time stamps attributes address first cluster location data file lengths file name checksum taken entire file set mismatch would occur directory file set accidentally maliciously changed file system mounted integrity check conducted hashes verified mounting also includes comparison version exfat file system driver make sure driver compatible file system trying mount make sure none required directory records missing example directory record upcase table allocation bitmap required file system ca n't run missing checks fail file system mounted although certain cases may mount read-only file system provides extensibility template-based metadata definitions using generic layouts generic patterns exfat proprietary file system microsoft released specification lack documentation hampered development free open-source drivers exfat accordingly exfat support effectively limited microsoft products microsoft licensees turn inhibited exfat adoption universal exchange format interoperability requires certain results achieved particular predefined way algorithm exfat potentially requires every implementation perform certain procedures exactly way microsoft implementation procedures used microsoft implementation patented patents owned microsoft license use algorithms purchased microsoft companies including apple google samsung done however open-source ecosystem financial incentive open-source vendors purchase license algorithms regardless whether open-source including samsung leaked kernel driver source initially fraudulently rebadged gpl-licensed microsoft stated license required order implement exfat use product device unlicensed distribution exfat driver would make distributor liable financial damages driver found violated microsoft patents patents may enforceable determined legal process expensive time consuming may also possible achieve intended results without infringing microsoft patents october 2018 microsoft released 60,000 patents open invention network members linux systems exfat patents included however discussion within microsoft whether microsoft allow exfat linux devices
[ 3599, 7879, 3937, 2547, 3263, 7161, 4672, 378, 2198, 6431, 6096, 3626, 1475, 5049, 7553, 6117, 7195, 5410, 7564, 2953, 759, 422, 6844, 2245, 7581, 6854, 5437, 435, 5442, 4375, 4377, 5090, 3340, 2621, 6500, 6505, 7602, 5805, 6164, 5457, ...
Test
2,711
3
ARM_Cortex-A72:arm cortex-a72 arm cortex-a72 microarchitecture implementing armv8-a 64-bit instruction set designed arm holdings austin design centre cortex-a72 3-wide decode out-of-order superscalar pipeline available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc cortex-a72 announced 2015 serve successor cortex-a57 designed use 20 less power offer 90 greater performance
[ 6421, 7890, 722, 2926, 5740, 1473, 5750, 5752, 5405, 5406, 1864, 67, 6148, 446, 451, 6165, 463, 5472, 469, 4041, 3008, 3365, 6910, 5845, 7654, 3397, 1977, 2339, 1995, 550, 4847, 3786, 2024, 3108, 5576, 1284, 4879, 7376, 5585, 4166, 4537...
Validation
2,712
8
Google_Search_Console:google search console google search console previously google webmaster tools web service google provided free charge webmasters allows check indexing status optimize visibility websites may 20 2015 google rebranded google webmaster tools google search console january 2018 google introduced new version search console refreshed user interface improvements tools let webmasters list inbound links google webmaster tools generally much larger list inbound links discovered using link example.com search query google google tight lipped discrepancy list google webmaster tools includes nofollow links convey search engine optimization authority linked site hand list links generated link example.com type query deemed google important links controversial way google webmaster tools well google index seems routinely ignore link spam manual penalty removed google webmaster tools still display penalty another 1–3 days google search console rebrand information produced demonstrating google search console creates data points reconcile google analytics ranking data particularly within local search market webmaster services hawaii
[ 2902, 3507, 4116, 5455, 6697, 4762, 3848, 3850, 5372, 7431, 7967, 6978, 6176, 993, 6427, 561, 7346, 201, 5476, 2107, 2475, 5302, 2569, 831, 2037, 7007, 5141, 6024, 136, 2317, 2673, 8107, 3309, 2867, 7285, 6297, 2591, 2417, 2683, 7924, 8...
Test
2,713
8
Perlbal:perlbal perlbal perl-based reverse proxy load balancer web server perlbal maintained group connected danga interactive program common use large web sites distribute load number servers like perl perlbal distributed gnu general public license artistic license thus free software perlbal also features so-called re-proxy mechanism allows backend webapp send back small response perlbal acts internal redirect causes get response data elsewhere often used expensive application server processes defer much simpler faster http servers serve static files freeing application server computing work commonly used conjunction mogilefs additionally plugins written support various operations may traditionally performed application layer example filter plugin developed dynamically alter palette png gif image passes proxy allowing image tinted used livejournal provide predefined page templates whose colors including baked images customized user relatively simple filtering task load balancer layer avoids overhead passing request back full application servers
[ 3683, 8029, 3031, 5983, 1598, 6233, 3106, 5416, 5248 ]
Test
2,714
4
Simultaneous_Authentication_of_Equals:simultaneous authentication equals cryptography simultaneous authentication equals sae secure password-based authentication password-authenticated key agreement method sae variant dragonfly key exchange defined based diffie–hellman key exchange using finite cyclic groups primary cyclic group elliptic curve problem using diffie–hellman key exchange authentication mechanism resulting key influenced pre-shared key mac addresses peers solve authentication problem sae originally implemented use peers ieee 802.11s peers discover security enabled take part sae exchange sae completes successfully peer knows party possesses mesh password by-product sae exchange two peers establish cryptographically strong key key used authenticated mesh peering exchange ampe establish secure peering derive session key protect mesh traffic including routing traffic january 2018 wi-fi alliance announced wpa3 replacement wpa2 new standard uses 128-bit encryption wpa3-personal mode 192-bit wpa3-enterprise forward secrecy wpa3 standard also replaces pre-shared key exchange simultaneous authentication equals defined ieee 802.11-2016 resulting secure initial key exchange personal mode wi-fi alliance also claims wpa3 mitigate security issues posed weak passwords simplify process setting devices display interface
[ 4926, 4321, 3105, 2659, 309, 3799, 6025, 2672, 7209, 3230, 4093, 5181, 7777, 4836, 4746 ]
Test
2,715
8
JSON-WSP:json-wsp json-wsp javascript object notation web-service protocol web-service protocol uses json service description requests responses inspired json-rpc lack service description specification documentation json-rpc sparked design json-wsp description format purpose json-wsp wsdl soap idl corba describe types methods used given service also describes inter-type relations i.e nested types defines types expected method arguments types user expect receive method return values finally description opens possibility add documentation service method parameter return levels communication clients json-wsp server carried using http post requests responses json objects data content-type application/json json-wsp consists four json object specifications note json-wsp specification 1.0 still final please refer real-world example article get idea specification going structured current state actual specification kept launchpad.net rfc proposal currently created hopefully accepted within couple months service-locator service endpoint url accepts json-wsp post request objects service-name service name case sensitive identifies specific service exposed specific server doc_lines doc-string contained doc_lines list reflects single line documentation relates parent object doc_lines.. request object contains information method invoke arguments invoke method also stores information type version optional mirror value used send information client reflected server returned unchanged response object reflection value feature allows clients send multiple requests method send request identification values intercepted client response handler often necessary javascript one request processed simultaneously server response order unknown client reflection value unchanged server reflection request object mirror value marked optional client controls via request whether fault-code meanings possible fault-codes attachment type new json-wsp used anywhere description primitive type requests responses involve attachments message format must multipart/related attachments transported mimeparts media type application/octet-stream content-transfer-encoding raw binary mimeparts must unique content-id entity headers attachment values json-wsp request/response objects must match regular expression ^cid .+ capture group maps one mimepart content-id following example shows simple json-wsp description attachments could look like request method upload described could look like
[ 7299, 562, 6986, 5500, 4276, 7315 ]
Test
2,716
2
Microsoft_Layer_for_Unicode:microsoft layer unicode microsoft layer unicode mslu software library windows software developers simplify creating unicode-aware applications windows 95 windows 98 windows also known unicows unicode windows 95/98/me systems unicows.dll even cows microsoft describes providing layer win32 api windows 95/98/me write single unicode version application run properly platforms previously software developers either provide two separate versions application perform complex string translations api decisions runtime mslu announced march 2001 first available july 2001 edition microsoft platform sdk arguably long peak popularity windows 95/98/me codename godot reference play waiting godot centered around failure man named godot appear endless wait felt long overdue normally windows api provides ansi w wide-character versions functions windows 95/98/me versions implemented attempting call w version fail error code indicates function unimplemented windows nt/2000/xp/2003 w versions implemented however operating system generally internally implements w version natively version usually translation thunk w version adding unicows.lib link command-line kernel32.lib advapi32.lib supported win32 system link library linker resolve referenced symbols one provided unicows.lib instead wide-character function called first time runtime function stub unicows.lib first receives control decides running windows 95/98/me system technique application linked mslu windows 95/98/me systems need unicows.dll runtime operating systems slight performance penalty first function call common problem encountered occurs updaters uninstallers rename delete file oledlg.dll preventing operating system loading unicows.dll results applications openoffice.org reporting application start one required libraries found occurs even unicows.dll installed system
[ 4017 ]
Test
2,717
6
Disk_formatting:disk formatting disk formatting process preparing data storage device hard disk drive solid-state drive floppy disk usb flash drive initial use cases formatting operation may also create one new file systems first part formatting process performs basic medium preparation often referred low-level formatting partitioning common term second part process making data storage device visible operating system third part process usually termed high-level formatting often refers process generating new file system operating systems parts three processes combined repeated different levels term format understood mean operation new disk medium fully prepared store files general rule formatting disk leaves existing data disk medium might recoverable special tools special tools remove user data single overwrite files free space block contiguous number bytes minimum unit storage read written disk disk driver earliest disk drives fixed block sizes e.g ibm 350 disk storage unit late 1950s block size 100 6 bit characters starting 1301 ibm marketed subsystems featured variable block sizes particular track could blocks different sizes disk subsystems ibm system/360 expanded concept form count key data ckd later extended count key data eckd however use variable block size hdds fell use 1990s one last hdds support variable block size ibm 3390 model 9 announced may 1993 modern hard disk drives serial attached scsi sas serial ata sata drives appear interfaces contiguous set fixed-size blocks many years 512 bytes long beginning 2009 accelerating 2011 major hard disk drive manufacturers began releasing hard disk drive platforms using advanced format 4096 byte logical blocks floppy disks generally used fixed block sizes sizes function host os interaction controller particular type media e.g. 5¼-inch dsdd would different block sizes depending upon host os controller optical discs generally use fixed block sizes formatting disk use operating system applications typically involves three different processes low-level format floppy disks early hard disks performed disk drive controller standard 1.44 mb floppy disk low-level formatting normally writes 18 sectors 512 bytes 160 tracks 80 side floppy disk providing 1,474,560 bytes storage disk physical sectors actually larger 512 bytes addition 512 byte data field include sector identifier field crc bytes cases error correction bytes gaps fields additional bytes normally included quoted figure overall storage capacity disk different low-level formats used media example large records used cut inter-record gap size several freeware shareware free software programs e.g gparted fdformat nformat 2m allowed considerably control formatting allowing formatting high-density 3.5 disks capacity 2 mb techniques used include linux supports variety sector sizes dos windows support large-record-size dmf-formatted floppy format hard disk drives prior 1990s typically separate disk controller defined data encoded media media drive and/or controller possibly procured separate vendors users often able perform low-level formatting separate procurement also potential incompatibility separate components subsystem would reliably store data user instigated low-level formatting llf hard disk drives common minicomputer personal computer systems 1990s ibm mainframe system vendors typically supplied hard disk drives media case removable media hdds low-level format typically involved subdividing track disk one blocks would contain user data associated control information different computers used different block sizes ibm notably used variable block sizes popularity ibm pc caused industry adopt standard 512 user data bytes per block middle 1980s depending upon system low-level formatting generally done operating system utility ibm compatible pcs used bios invoked using ms-dos debug program transfer control routine hidden different addresses different bioses starting late 1980s driven volume ibm compatible pcs hdds became routinely available pre-formatted compatible low-level format time industry moved historical dumb bit serial interfaces modern intelligent bit serial interfaces word serial interfaces wherein low level format performed factory today end-user cases never perform low-level formatting ide ata hard drive fact often possible modern hard drives formatting done servowriter disk assembled drive factory generally impossible perform complete llf modern hard drives since mid-1990s outside factory term low-level format still used could called reinitialization hard drive factory configuration even terms may misunderstood present ambiguity term low-level format seems due inconsistent documentation web sites belief many users process high-level file system format must called low-level format since much low level formatting process today performed factory various drive manufacturers describe reinitialization software llf utilities web sites since users generally way determine difference complete llf reinitialization simply observe running software results hard disk must high-level formatted misinformed user mixed signals various drive manufacturers perpetuated error note whatever possible misuse terms may exist search hard drive manufacturers web sites terms many sites make reinitialization utilities available possibly bootable floppy diskette cd image files overwrite every byte check damaged sectors hard disk reinitialization include identifying sparing possible sectors written read back drive correctly term however used refer portion process every sector drive written usually writing specific value every addressable location disk traditionally physical sectors initialized fill value codice_1 per int 1eh disk parameter table dpt format ibm compatible machines value also used atari portfolio 8-inch cp/m floppies typically came pre-formatted value codice_2 way digital research value also used atari st amstrad formatted floppies amstrad otherwise used codice_3 fill value modern formatters wipe hard disks value codice_4 instead sometimes also called zero-filling whereas value codice_5 used flash disks reduce wear latter value typically also default value used rom disks reformatted advanced formatting tools allow configuring fill value one popular method performing zero-fill operation hard disk writing zero-value bytes drive using unix dd utility /dev/zero stream input file drive specific partition output file command may take many hours complete erase files file systems another method scsi disks may use sg_format command issue low-level scsi format unit command zero-filling drive necessarily secure method erasing sensitive data preparing drive use encrypted filesystem zero-filling voids plausible deniability process partitioning process writing information blocks storage device medium allows access operating system operating systems allow device medium appear multiple devices i.e partitioned multiple devices ms-dos microsoft windows unix-based operating systems bsd linux mac os x normally done partition editor fdisk gnu parted disk utility operating systems support multiple partitions current ibm mainframe oss derived os/360 dos/360 z/os z/vse done init command ickdsf utility oss support single partition per device called volume ickdsf functions include creating volume label writing record 0 every track floppy disks partitioned however depending upon os may require volume information order accessed os partition editors ickdsf today handle low level functions hdds optical disc drives writing timing marks reinitialize modern disk degaussed otherwise lost factory formatting high-level formatting process setting empty file system disk partition logical volume pcs installing boot sector fast operation sometimes referred quick formatting entire logical drive partition may optionally scanned defects may take considerable time case floppy disks high- low-level formatting customarily performed one pass disk formatting software 8-inch floppies typically came low-level formatted filled format filler value codice_2 since 1990s 5.25-inch 3.5-inch floppies shipped pre-formatted factory dos fat12 floppies current ibm mainframe operating systems derived os/360 dos/360 may done part allocating file utility specific file system older access methods fly new data written host protected area sometimes referred hidden protected area area hard drive high level formatted area normally visible operating system os reformatting high-level formatting performed functioning disk drive free medium contents reformatting unique operating system actually done existing data varies os important aspect process frees disk space use data actually erase everything requires overwriting block data medium something done many high-level formatting utilities reformatting often carries implication operating system software reinstalled format complete rather fixing installation suffering malfunction security compromise may necessary simply reformat everything start scratch various colloquialisms exist process wipe reload nuke pave reimage etc format command ms-dos pc dos os/2 microsoft windows disk formatting performed codice_7 command codice_7 program usually asks confirmation beforehand prevent accidental removal data versions dos undocumented codice_9 option used usual confirmation skipped format begins right away wm/formatc macro virus uses command format drive c soon document opened unconditional format also codice_10 parameter performs unconditional format circumstances overwrites entire partition preventing recovery data software note however codice_10 switch works reliably floppy diskettes see image right technically unless codice_12 used floppies always low level formatted addition high-level formatted certain circumstances hard drive partitions however codice_10 switch merely prevents creation codice_14 information partition formatted otherwise leaving partition contents entirely intact still disk marked deleted cases user data remain ripe recovery specialist tools encase disk editors reliance upon codice_10 secure overwriting hard drive partitions therefore inadvisable purpose-built tools dban considered instead overwriting windows vista upwards non-quick format overwrite goes case windows xp os/2 os/2 use codice_16 parameter specifies long format format overwrite entire partition logical drive enhances ability chkdsk recover files high-level formatting disks systems traditionally done using codice_17 command linux potentially systems well codice_17 typically wrapper around filesystem-specific commands name codice_19 fsname name filesystem format disk filesystems supported certain implementations codice_17 manipulation tools example ntfsprogs provides format utility ntfs filesystem unix unix-like operating systems higher-level formatting tools usually purpose making disk formatting easier and/or allowing user partition disk tool examples include gnu parted various gui frontends gparted kde partition manager disk utility application mac os x file deletion operating system data disk fully erased every high-level format instead area disk containing data merely marked available retains old data overwritten disk formatted different file system one previously existed partition data may overwritten would n't file system used however file systems e.g. ntfs fat file indexes mfts ntfs inodes ext2/3 etc may written exact locations partition size increased even fat file systems overwrite data beginning new partition perspective preventing recovery sensitive data recovery tools data must either completely overwritten every sector random data format format program must perform overwriting dos codice_21 command floppy diskettes filling every data sector format filler byte value typically codice_1 however applications tools especially used forensic information technology recover data conventionally erased order avoid recovery sensitive data governmental organization big companies use information destruction methods like gutmann method average users also special applications perform complete data destruction overwriting previous information although applications perform multiple writes assure data erasure single write old data generally needed modern hard disk drives ata secure erase performed disk utilities quickly thoroughly wipe drives degaussing another option however may render drive unusable
[ 1710, 7331, 4759, 1534, 2728, 6505, 998, 5918, 5128, 5571, 7825, 6907, 578, 493, 1020, 7378, 7384, 6380, 8113, 850, 3221, 3137, 4536, 6241, 1793, 5615, 2350, 5789, 4375 ]
Test
2,718
2
Nexus_driver:nexus driver term nexus driver refers bus device driver interfaces leaf drivers specific i/o bus provides low-level integration i/o bus
[ 2690 ]
Test
2,719
3
POWER4:power4 power4 microprocessor developed international business machines ibm implemented 64-bit powerpc powerpc instruction set architectures released 2001 power4 succeeded power3 rs64 microprocessors used rs/6000 as/400 computers ending separate development powerpc microprocessors as/400 power4 multicore microprocessor two cores single die first non-embedded microprocessor power4 chip first commercially available multiprocessor chip original power4 clock speed 1.1 1.3 ghz enhanced version power4+ reached clock speed 1.9 ghz powerpc 970 derivative power4 power4 unified l2 cache divided three equal parts independent l2 controller feed 32 bytes data per cycle core interface unit ciu connects l2 controller either data cache instruction cache either two processors non-cacheable nc unit responsible handling instruction serializing functions performing noncacheable operations storage topology l3 cache controller actual memory off-chip gx bus controller controls i/o device communications two 4-byte wide gx buses one incoming outgoing fabric controller master controller network buses controlling communications l1/l2 controllers communications power4 chips 4-way 8-way 16-way 32-way power4 mcm trace-and-debug used first failure data capture provided also built self test function bist performance monitoring unit pmu power-on reset por supported power4 implements superscalar microarchitecture high-frequency speculative out-of-order execution using eight independent execution units two floating-point units fp1-2 two load-store units ld1-2 two fixed-point units fx1-2 branch unit br conditional-register unit cr execution units complete eight operations per clock including br cr units pipeline stages power4 also came configuration using multi-chip module mcm containing four power4 dies single package 128 mb shared l3 ecc cache per mcm power4+ released 2003 improved version power4 ran 1.9 ghz contained 184 million transistors measured 267 mm fabricated 0.13 µm soi cmos process eight layers copper interconnect
[ 7327, 3348, 4661, 3936, 1075, 1346, 4847, 2458, 3440, 1083, 4408, 5652, 912, 7361, 2845, 3708, 7453, 4242, 5665, 4702, 1199, 1386, 1388, 7099, 234, 2501, 239, 6474, 2508, 8125, 4815, 1131, 6226, 608, 3747, 6148, 1237, 2257, 7499, 3674, ...
Validation
2,720
7
Asynchrony_(computer_programming):asynchrony computer programming asynchrony computer programming refers occurrence events independent main program flow ways deal events may outside events arrival signals actions instigated program take place concurrently program execution without program blocking wait results asynchronous input/output example latter cause asynchrony lets programs issue commands storage network devices service requests processor continues executing program provides degree parallelism common way dealing asynchrony programming interface provide subroutines methods functions return caller object sometimes called future promise represents ongoing events object typically come synchronizing operation blocks operation completed programming languages cilk special syntax expressing asynchronous procedure call examples asynchrony include following
[ 2787, 2451, 3686, 7037, 6105, 1237 ]
Train
2,721
7
European_Middleware_Initiative:european middleware initiative european middleware initiative emi computer software platform high performance distributed computing developed distributed directly emi project base grid middleware distributions used scientific research communities distributed computing infrastructures world especially europe south america asia emi supports broad scientific experiments initiatives worldwide lhc computing grid large hadron collider emi middleware cooperation among three general purpose grid platforms advanced resource connector glite unicore dcache storage software purpose emi distribution consolidate harmonize support original software platforms evolve extend redundant duplicate services resulting merging deprecated favour new services added satisfy user requirements specific consolidation needs standardizing developing common interfaces include adoption common structure accounting resource information exchange authentication authorization input development activities taken users infrastructures projects standardization initiatives changing technological innovations software products adapted necessary comply standard open-source guidelines facilitate integration mainstream operating system distributions cooperation futuregrid us distributed testbed clouds grids high-performance computing announced december 2011 january 2012 emi project formalized partnership imarine project create open data e-infrastructure fisheries management marine conservation 2008 emi software distribution provided middleware components support execution completion millions computational jobs handled 350 centers european grid infrastructure tens petabytes data transfers occurring storage systems centers emi middleware used wlcg infrastructure supports example search higgs boson god particle new types matter searches physicists lhc together research astronomy biology computational chemistry sciences common emi license though licenses used emi open-source product long history behind license apache bsd dcache products released dcache software license adopted affero general public license 1 january 2012 emi products components release grouped four categories areas computing data security infrastructure first release software composed 56 products packaged scientific linux 5 32 64bit second release also made 56 products available scientific linux 5 64bit scientific linux 6 64bit subset services also available debian 6 64bit planned updates third final release contains 61 products scientific linux 5 64bit 480 packages scientific linux 6 64bit 474 packages debian 6 233 packages linux distributions components supported scientific linux platforms debian emi releases two types major releases include components component releases related single product collection components may released update major release major releases delivered per year three planned major releases named european mountains full support updates released address issues code new features provided lasts 12 months standard updates updates released address issues code new features provided lasts 6 months security updates support updates targeting security vulnerabilities provided 6 months older versions emi products superseded newer versions end-of-life announcement made coincides end security updates support period may 2013 24 updates released emi 1 kebnekaise 13 emi 2 matterhorn 3 emi 3 monte bianco minor releases contain interface functional changes backwards-compatible current major release issued times per year revision releases available every week two weeks contain bug fixes emergency releases contain specific bug fixes typically security-related available need using emergency release procedures
[ 2961, 2362, 4159, 3783, 138, 8160, 5571, 6298 ]
Test
2,722
1
UK_Educational_Evidence_Portal:uk educational evidence portal uk educational evidence portal eep online resource providing easy access published research evidence-based guidance across areas education related aspects children ’ services developed collaboration organisations make research evidence widely available range audiences including educational professionals practitioners policy makers research community portal went live september 2007 funded number organisations including cfbt education trust dcsf bis tda becta national college hosted eppi-centre institute education university london managed development group meets approximately bi-monthly subset group meets editorial group manages content portal cfbt education trust provides overall leadership portal cited useful information resource various academic government sources uk elsewhere eep searched following ways eep currently developing next release portal improve search results new experienced users subject list browsing database authors names british education thesaurus terms clickable related documents database linked new text mining tool provide automatic subject tags fly database website search
[]
Test
2,723
4
IF-MAP:if-map interface metadata access points if-map open specification client/server protocol developed trusted computing group tcg one core protocols trusted network connect tnc open architecture if-map provides common interface metadata access point map database server acting clearinghouse information security events objects elements tnc architecture if-map protocol defines publish/subscribe/search mechanism set identifiers data types if-map protocol first published tcg april 28 2008 originally if-map specification developed support data sharing across various vendor ’ devices applications network security specification also adopted additional use cases data-sharing including physical security 2.0 version if-map spec separated base protocol metadata definitions define different types information represented goal separating base protocol metadata definitions within specification allow specification adopted across technologies cloud computing industrial control systems smart grid leverage existing data models within map framework version 2.1 if-map spec published may 7 2012 primary new feature if-map 2.1 if-map identifier space became extensible reference implementation available gplv3 license google code repository if-map supported variety vendors
[ 4591, 2961, 6415, 4388, 651, 1698, 4482 ]
Test
2,724
4
Code_Red_(computer_worm):code red computer worm code red computer worm observed internet july 15 2001 attacked computers running microsoft iis web server code red worm first discovered researched eeye digital security employees marc maiffret ryan permeh exploited vulnerability discovered riley hassell named code red code red mountain dew drinking time although worm released july 13 largest group infected computers seen july 19 2001 day number infected hosts reached 359,000 worm showed vulnerability growing software distributed iis described microsoft security bulletin ms01-033 patch available month earlier worm spread using common type vulnerability known buffer overflow using long string repeated letter n overflow buffer allowing worm execute arbitrary code infect machine worm kenneth d. eichman first discover block invited white house discovery payload worm included scanning vulnerable machines worm test see server running remote machine running vulnerable version iis even see running iis apache access logs time frequently entries worm payload string following last n due buffer overflow vulnerable host interprets string computer instructions propagating worm august 4 2001 code red ii appeared although used injection vector completely different payload pseudo-randomly chose targets different subnets infected machines according fixed probability distribution favoring targets subnet often additionally used pattern repeating x characters instead n characters overflow buffer eeye believed worm originated makati city philippines origin vbs/loveletter aka iloveyou worm
[ 2173, 3932, 6873, 2733, 6715, 476, 5828, 7597, 7186, 5401, 2406, 1019, 3135, 3575, 2876, 1500, 954, 862, 5611, 3154, 2618, 7050 ]
Test
2,725
1
Castor_(framework):castor framework castor data binding framework java features like java java-to-xml binding java-to-sql persistence paths java objects xml documents relational tables etc castor one oldest data binding projects basic process flows include class generation marshalling unmarshalling etc marshalling framework includes set classdescriptors fielddescription describe objects class generation similar jaxb zeus castor supports xml schema instead dtds dtds supported castor unmarshalling marshalling dealt marshall unmarshall methods respectively marshalling conversion process java xml carried unmarshalling conversion process xml java carried mapping files equivalent binding schema allows transforms names xml java vice versa castor offers additional features present jaxb additional features include code marshalling may look like follows code unmarshalling may look like follows sample mapping file may look like follows
[ 2180, 3915, 5571, 3813, 7848 ]
Test
2,726
3
The_Black_Bass_(1986_video_game):black bass 1986 video game objective player catch many black bass possible sunrise sunset player may select beginner game ranking game ranking game requires password player may select location lake start begin fishing simply tossing lure desired power start process fish lured moving lure around bites player try reeling much constant reeling leads line breaking loss fish lure casting rounds player make certain selections among selections available option change type color lure used
[]
Validation
2,727
4
Personal_data:personal data personal data also known personal information personally identifying information pii sensitive personal information spi information relating identifying person abbreviation pii widely accepted united states phrase abbreviates four common variants based personal personally identifiable identifying equivalent legal purposes effective definitions vary depending jurisdiction purposes term used european data protection regimes centre primarily around general data protection regulation term personal data significantly broader determines scope regulatory regime national institute standards technology special publication 800-122 defines personally identifying information information individual maintained agency including 1 information used distinguish trace individual identity name social security number date place birth mother maiden name biometric records 2 information linked linkable individual medical educational financial employment information example user ip address classed pii classified linked pii however european union ip address internet subscriber may classed personal data concept pii become prevalent information technology internet made easier collect pii leading profitable market collecting reselling pii pii also exploited criminals stalk steal identity person aid planning criminal acts response threats many website privacy policies specifically address gathering pii lawmakers european parliament enacted series legislation general data protection regulation gdpr limit distribution accessibility pii personally identifying information legal concept technical concept utilised jurisdictions versatility power modern re-identification algorithms absence pii data mean remaining data identify individuals attributes may uniquely identifying attribute potentially identifying combination others attributes referred quasi-identifiers pseudo-identifiers data may constitute pii united states highly likely remain personal data european data protection law u.s. government used term personally identifiable 2007 memorandum executive office president office management budget omb usage appears us standards nist guide protecting confidentiality personally identifiable information sp 800-122 omb memorandum defines pii follows term similar pii personal data defined eu directive 95/46/ec purposes directive however eu rules clearer notion data subject potentially identified additional processing attributes—quasi- pseudo-identifiers gdpr personal data defined information relating identified identifiable natural person 'data subject identifiable natural person one identified directly indirectly particular reference identifier name identification number location data online identifier one factors specific physical physiological genetic mental economic cultural social identity natural person another term similar pii personal information defined section california data breach notification law sb1386 concept information combination given sb1386 definition key correctly distinguishing pii defined omb personal information defined sb1386 information name lacks context said sb1386 personal information must said pii defined omb example name john smith meaning current context therefore sb1386 personal information pii social security number ssn without name associated identity context information sb1386 personal information pii example ssn 078-05-1120 pii sb1386 personal information however combination valid name correct ssn sb1386 personal information combination name context may also considered pii example person name list patients hiv clinic however necessary name combined context order pii reason distinction bits information names although may sufficient make identification may later combined information identify persons expose harm according omb always case pii sensitive context may taken account deciding whether certain pii sensitive australia privacy act 1988 deals protection individual privacy using oecd privacy principles 1980s set broad principles-based regulatory model unlike us coverage generally based broad principles specific technologies business practices data items section 6 relevant definition critical detail definition 'personal information also applies individual indirectly identified raises question reasonableness assume theoretically possible identify person information include name address contain clues could pursued find relates much extra effort take make unreasonable information could identified instance information involves ip address relevant isp stores logs could easily inspected sufficient legal justification re-link ip address account holder identity reasonably ascertained linking used expensive slow difficult becomes easier change answer point appears definition significantly broader californian example given thus australian privacy law respects weakly enforced may cover broader category data information us law particular online behavioral advertising businesses based us surreptitiously collecting information people countries form cookies bugs trackers like may find preference avoid implications wanting build psychographic profile particular person using rubric 'we n't collect personal information may find make sense broader definition like australian privacy act european data protection law utilize concept personally identifiable information scope instead determined non-synonymous wider concept personal data examples found eu privacy website twelve information privacy principles privacy act 1993 apply federal act data protection 19 june 1992 force since 1993 set strict protection privacy prohibiting virtually processing personal data expressly authorized data subjects protection subject authority federal data protection information commissioner additionally person may ask writing company managing data files correction deletion personal data company must respond within thirty days privacy act 1974 pub.l 93–579 88 stat 1896 enacted december 31 1974 5 u.s.c § 552a united states federal law establishes code fair information practice governs collection maintenance use dissemination personally identifiable information individuals maintained systems records federal agencies one primary focuses health insurance portability accountability act hipaa protect patient protected health information phi similar pii u.s. senate proposed privacy act 2005 attempted strictly limit display purchase sale pii without person consent similarly proposed anti-phishing act 2005 attempted prevent acquiring pii phishing u.s. lawmakers paid special attention social security number easily used commit identity theft proposed social security number protection act 2005 proposed identity theft prevention act 2005 sought limit distribution individual social security number national institute standards technology physical sciences laboratory non-regulatory agency united states department commerce mission promote innovation industrial competitiveness following data often used express purpose distinguishing individual identity clearly classify personally identifiable information definition used national institute standards technology described detail following less often used distinguish individual identity traits shared many people however potentially pii may combined personal information identify individual person wishes remain anonymous descriptions often employ several 34-year-old white male works target note information still private sense person may wish become publicly known without personally identifiable moreover sometimes multiple pieces information none sufficient uniquely identify individual may uniquely identify person combined one reason multiple pieces evidence usually presented criminal trials shown 1990 87 population united states could uniquely identified gender zip code full date birth hacker internet slang practice finding releasing information called doxing sometimes used deter collaboration law enforcement occasion doxing trigger arrest particularly law enforcement agencies suspect doxed individual may panic disappear forensics particularly identification prosecution criminals personally identifiable information critical establishing evidence criminal procedure criminals may go great trouble avoid leaving pii personal data key component online identity exploited individuals instance data altered used create fake documents hijack mail boxes phone calls harass people like data breach ee limited company another key case referred financial identity theft usually bank account credit card information stolen used sold personal data also used create fake online identity including fake accounts profiles referred identity cloning identity fraud celebrities gather data users easily even individuals concerned especially personal purpose widely known sockpuppet critical information password date birth id documents social insurance number used log different websites see password reuse account verification gather information access content also several agencies ask discretion subject related work safety employees reason united states department defense dod strict policies controlling release personally identifiable information dod personnel many intelligence agencies similar policies sometimes point employees disclose friends work agency similar identity protection concerns exist witness protection programs women shelters victims domestic violence threats second half 20th century digital revolution introduced privacy economics trade personal data value data change time different contexts disclosing data reverse information asymmetry though costs unclear relation companies consumers often imperfect information regarding data collected purposes consequences writing 2015 alessandro acquisti curtis taylor liad wagman identified three waves trade personal data
[ 1998, 2987, 1344, 3609, 2548, 803, 6974, 5908, 6438, 5131, 7836, 5318, 6654, 3486, 5251, 2884, 4639, 3338 ]
Test
2,728
2
GParted:gparted gparted acronym gnome partition editor gtk front-end gnu parted official gnome partition-editing application alongside disks gparted used creating deleting resizing moving checking copying disk partitions file systems useful creating space new operating systems reorganizing disk usage copying data residing hard disks mirroring one partition another disk imaging gparted uses libparted detect manipulate devices partition tables several optional file system tools provide support file systems included libparted optional packages detected runtime require rebuild gparted gparted written c++ uses gtkmm interface gtk general approach keep gui simple possible conformity gnome human interface guidelines gparted project provides live operating system including gparted written live cd live usb media operating system based debian gnu/linux gparted also available gnu/linux live cds including recent versions puppy knoppix systemrescuecd parted magic gparted preinstalled booting try ubuntu mode ubuntu installation media alternative software disks gnome disks gparted supports following operations file systems provided features enabled compile-time required tools present system 'copy field indicates whether gparted capable cloning mentioned filesystem gparted capable cloning using mouse gesture copy paste gparted capable cloning entire disk one partition time file system cloned mounted gparted clones partitions filesystem-level result capable cloning different target-size partitions source long size source filesystem exceed size target partition
[ 2717, 7959, 5197, 2091, 4480, 1534, 6883, 8066, 6175, 3181, 3271, 1267, 4941, 5116, 4685, 2297, 5571, 6011, 5660, 578, 2581, 499, 6117, 2131, 6558, 3134, 761, 6761, 2426, 3738, 3152, 2260, 174, 1798, 2710, 1435, 788, 6505 ]
Test
2,729
2
Advanced_SCSI_Programming_Interface:advanced scsi programming interface computing aspi advanced scsi programming interface adaptec-developed programming interface standardizes communication computer bus scsi driver module one hand scsi atapi peripherals aspi manager software provides interface aspi modules device drivers applications direct scsi support scsi host adapter scsi devices connected host adapter aspi manager specific host adapter operating system primary role abstract host adapter specifics provide generic software interface scsi devices windows 9x windows nt aspi manager generic relies services scsi miniport drivers systems aspi interface designed applications require scsi pass-through functionality cd-rom burning software primary operations supported aspi discovery host adapters attached devices submitting scsi commands devices via srbs scsi request blocks aspi supports concurrent execution scsi commands originally inspired driver architecture developed douglas w. goodall ampro computers 1983 aspi developed adaptec around 1990 initially designed support dos os/2 windows 3.x novell netware originally written support scsi devices support atapi devices added later scsi host adapter vendors example buslogic dpt ami future domain dtc shipped aspi managers hardware adaptec also developed generic scsi disk cd-rom drivers dos aspicd.sys aspidisk.sys microsoft licensed interface use windows 9x series time microsoft developed scsi pass interface spti in-house substitute worked nt platform microsoft include aspi windows 2000/xp favor spti users may still download aspi adaptec number cd/dvd applications also continue offer implementations aspi layer support usb drives dos panasonic developed universal aspi driver usbaspi.sys bypasses lack native usb support dos aspi provided following drivers
[ 4360, 7078 ]
Test
2,730
4
InfoSec_Institute:infosec institute infosec institute technology training company provides certification-based training courses security professionals enterprise-grade security awareness phishing training businesses agencies technology professionals company training library provides multi-course tracks job function certification-specific training short-form continuing education training course library includes 95 courses covering topics like ethical hacking network security mobile forensics infosec institute securityiq integrates security awareness training phishing simulations personalized learning scales employees ’ security aptitudes roles learning styles infosec institute founded 1998 team information security instructors
[]
Validation
2,731
2
Filter_driver:filter driver filter driver microsoft windows driver extends modifies function peripheral devices supports specialized device personal computer driver program module inserted existing driver stack perform specific function filter driver affect normal working existing driver stack major way written either microsoft vendor hardware number filter drivers added windows upper level filter drivers sit primary driver device function driver lower level filter drivers sit function driver bus driver filters may work certain brand device mouse keyboard may perform operation class devices mouse keyboard windows dev center hardware pages explain upper lower filter drivers detail example generic usb camera uvc driver usbvideo.sys function driver bus driver handles usb data host controller devices lower level filter modifies behavior camera hardware e.g watching interrupt packets camera switch fits function bus drivers upper level filter typically provide added-value features camera additional processing video stream e.g colour changes identification objects applying overlays fit function driver user application connected camera another type filter driver bus e.g usb pci pcie filter driver may added top bus driver example acpi bus filter added support power management device
[ 4759, 5694 ]
Test
2,732
2
PrivatOS:privatos privatos operating system used blackphone june 1 2014 june 30 2016 targeted users sought improved privacy security provided encryption phone calls emails texts internet browsing privatos modified version android forked android 4.4.2 came bundle security-minded tools however contrast android privatos open source company shipped privatos sgp technologies joint venture makers geeksphone silent circle concept encrypted phone long interest silent circle founder pgp creator phil zimmerman video blackphone website zimmerman said company stated operating system able “ close backdoors ” usually found major mobile operating systems major features privatos anonymous search privacy-enabled bundled apps smart disabling wi-fi except trusted hotspots control app permissions private communication calling texting video chat browsing file sharing conference calls geeksphone also claimed phone would receive frequent secure updates blackphone directly ars technica praised blackphone security center privatos gave control app permissions liked privatos came bundled silent phone silent text disconnect vpn disconnect search services ars like phone ’ performance mediocre using custom os meant google play benefits google ecosystem spotty support sideloaded apps reliance amazon third-party app stores month using device joshua drake accuvant concluded blackphone security claims overstated criticizing closed-source nature os lack os kernel hardening features praising fast patching added features
[ 5773, 3559, 6232, 6725, 5571, 5232, 3751, 740, 1435 ]
Test
2,733
4
Timeline_of_computer_viruses_and_worms:timeline computer viruses worms timeline computer viruses worms presents chronological timeline noteworthy computer viruses computer worms trojan horses similar malware related research events
[ 2173, 7151, 6417, 6419, 376, 5041, 1435, 7186, 2577, 5401, 6113, 6823, 1482, 74, 5784, 2618, 7600, 3680, 6868, 4025, 6515, 2996, 6526, 3698, 4404, 476, 5482, 5848, 5156, 7287, 3047, 2693, 7307, 6589, 3071, 2354, 3426, 880, 2724, 6256, 7...
Test
2,734
9
Hy:hy hy alternately hylang programming language dialect language lisp designed interact language python translating expressions python abstract syntax tree ast hy introduced python conference pycon 2013 paul tagliamonte similar kawa clojure mapping s-expressions onto java virtual machine jvm hy meant operate transparent lisp front end python abstract syntax lisp allows operating code data metaprogramming thus hy used write domain-specific languages hy also allows python libraries including standard library imported accessed alongside hy code compiling step converting data structure python ast language documentation
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 6507, 795, 6876, 6888, 1557, 4789, 5494, 5501, 6210, 144, 4074, 4085, 7298, 5515, 8025, 3749, 5883, 1989, 6949, 6955, ...
Train
2,735
4
Dropsuite:dropsuite dropsuite limited formerly branded dropmysite global cloud software platform founded 2011 provides cloud backup archiving recovery solutions based singapore public company listed australian securities exchange asx dse originally dropsuite provided website backup services expanded services include cloud backup office 365 cloud backup g suite gmail email archiving additional solutions include gdpr responder ediscovery insights bi ransomware protection dropsuite began development name dropmysite september 2011 john fearon ’ business website needed backup solution ’ find service met needs fearon raised 300,000 first round funding singaporean television show called angel ’ gate 2012 created email backup service called dropmyemail october 31 2013 charif elansari took ceo 2014 smartphone backup service called dropmymobile launched dropmysite local offices us singapore japan india entered partnership xpress hosting web-hosting company mexico getting access 100,000 customers 500,000 domains dropmysite also announced partnerships gmo cloud paperboy japan october 3 2015 godaddy launched cloud backup service websites powered dropmysite 2016 company rebranded name dropsuite dec 29 2016 company went public australia securities exchange via backdoor listing 2017 dropsuite entered distribution agreement ingram micro october 22 2018 dropsuite entered cloud distribution partnership pax8 2019 dsd europe announced partnership dropsuite adding dropsuite ’ microsoft office 365 cloud backup email backup cloud backup services management team consists people different continents including asia africa north america australia dropsuite limited dse asx publicly listed company australian securities exchange originally dropmysite privately held technology startup received seed funding crystal horse investments stanley street labs angel investors backend dropmysite originally based amazon aws infrastructure dropsuite provides data backup support many country-locations americas europe asia africa utilizes amazon web services data center support ensure data remains within country borders needed user data stored online user agents download install dropsuite ’ cloud services protect user ’ information military grade 256-bit advanced encryption allow legal grade email archiving compatible microsoft office 365 g suite gmail hosted exchange open-xchange imap/pop email servers
[ 5064, 8020 ]
Test
2,736
2
Manual_memory_management:manual memory management computer science manual memory management refers usage manual instructions programmer identify deallocate unused objects garbage mid-1990s majority programming languages used industry supported manual memory management though garbage collection existed since 1959 introduced lisp today however languages garbage collection java increasingly popular languages objective-c swift provide similar functionality automatic reference counting main manually managed languages still widespread use today c c++ – see c dynamic memory allocation programming languages use manual techniques determine allocate new object free store c uses codice_1 function c++ java use codice_2 operator many languages python allocate objects free store determination object ought created object creation generally trivial unproblematic though techniques object pools mean object may created immediate use fundamental issue object destruction – determination object longer needed i.e garbage arranging underlying storage returned free store re-use manual memory allocation also specified manually programmer via functions codice_3 c codice_4 operator c++ – contrasts automatic destruction objects held automatic variables notably non-static local variables functions destroyed end scope c c++ manual memory management known enable several major classes bugs program used incorrectly notably violations memory safety memory leaks significant source security bugs languages exclusively use garbage collection known avoid last two classes defects memory leaks still occur bounded leaks frequently occur generational conservative garbage collection generally less severe memory leaks manual systems manual memory management one correctness advantage allows automatic resource management via resource acquisition initialization raii paradigm arises objects scarce system resources like graphics resources file handles database connections must relinquished object destroyed – lifetime resource ownership tied lifetime object languages manual management arrange acquiring resource object initialization constructor releasing object destruction destructor occurs precise time known resource acquisition initialization also used deterministic reference counting c++ ability put use automate memory deallocation within otherwise-manual framework use codice_5 template language standard library perform memory management common paradigm codice_5 suitable object usage patterns however approach usable garbage collected languages – notably tracing garbage collectors advanced reference counting – due finalization non-deterministic sometimes occurring difficult define determine finalizer method might called commonly known finalizer problem java gc 'd languages frequently use manual management scarce system resources besides memory via dispose pattern object manages resources expected implement codice_7 method releases resources marks object inactive programmers expected invoke codice_7 manually appropriate prevent leaking scarce graphics resources depending codice_9 method java implements finalizers release graphics resources widely viewed poor programming practice among java programmers similarly analogous codice_10 method python relied releasing resources stack resources resources acquired released within single block code automated various language constructs python codice_11 c codice_12 java codice_13-with-resources many advocates manual memory management argue affords superior performance compared automatic techniques garbage collection traditionally latency biggest advantage longer case manual allocation frequently superior locality reference manual allocation also known appropriate systems memory scarce resource due faster reclamation memory systems frequently thrash size program working set approaches size available memory unused objects garbage-collected system remain unreclaimed state longer manually managed systems immediately reclaimed increasing effective working set size manual management number documented performance disadvantages latency debated point changed time early garbage collectors simple implementations performing poorly compared manual memory management sophisticated modern garbage collectors often performing well better manual memory management manual allocation suffer long pause times occur simple stop-the-world garbage collection although modern garbage collectors collection cycles often noticeable manual memory management garbage collection suffer potentially unbounded deallocation times – manual memory management deallocating single object may require deallocating members recursively members members etc. garbage collection may long collection cycles especially issue real time systems unbounded collection cycles generally unacceptable real-time garbage collection possible pausing garbage collector real-time manual memory management requires avoiding large deallocations manually pausing deallocation
[ 1616, 3351, 3515, 8066, 379, 1363, 572, 5571, 1191, 4958, 1855, 1019, 6118, 1208, 505, 3726, 4347, 3566, 4810, 6472, 56, 6659, 6567, 858, 4543, 5962, 5091, 1435, 4920 ]
Test
2,737
4
Christmas_tree_packet:christmas tree packet information technology christmas tree packet packet every single option set whatever protocol use term derives fanciful image little option bit header represented different-colored light bulb turned packet lit like christmas tree also known kamikaze packet nastygram lamp test segment christmas tree packets used method tcp/ip stack fingerprinting exposing underlying nature tcp/ip stack sending packets awaiting analyzing responses used part scanning system tcp header christmas tree packet flags fin urg psh set many operating systems implement compliance internet protocol standard rfc 791 varying incomplete ways observing host responds odd packet christmas tree packet inferences made regarding host operating system versions microsoft windows bsd/os hp-ux cisco ios mvs irix display behaviors differ rfc standard queried said packets large number christmas tree packets also used conduct dos attack exploiting fact christmas tree packets require much processing routers end-hosts usual packets christmas tree packets easily detected intrusion-detection systems advanced firewalls network security point view christmas tree packets always suspicious indicate high probability network reconnaissance activities
[ 3821, 3838, 4178, 1691, 651, 4576, 4759, 7637, 900, 6363, 3855, 3680 ]
Test
2,738
0
Chinese_speech_synthesis:chinese speech synthesis chinese speech synthesis application speech synthesis chinese language usually standard chinese poses additional difficulties due chinese characters frequently different pronunciations different contexts complex prosody essential convey meaning words sometimes difficulty obtaining agreement among native speakers concerning correct pronunciation certain phonemes recordings concatenated desired combination joins sound forced usual simple concatenation-based speech synthesis severely affect prosody synthesizers also inflexible terms speed expression however synthesizers rely corpus noticeable degradation performance given unusual awkward phrases ekho open source tts simply concatenates sampled syllables currently supports cantonese mandarin experimentally korean mandarin syllables pitched-normalised praat modified version used gradint synthesis partials cjkware.com used ship product called keytip putonghua reader worked similarly contained 120 megabytes sound recordings gsm-compressed 40 megabytes evaluation version comprising 10,000 multi-syllable dictionary words plus single-syllable recordings 6 different prosodies 4 tones neutral tone extra third-tone recording use end phrase lightweight open-source speech project espeak approach synthesis experimented mandarin cantonese espeak used google translate may 2010 december 2010 commercial product yuet also lightweight intended suitable resource-constrained environments like embedded systems written scratch ansi c starting 2013 yuet claims built-in nlp model require separate dictionary speech synthesised engine claims clear word boundaries emphasis appropriate words communication author required obtain copy espeak yuet synthesis speech cantonese mandarin input text output corresponding romanisation cantonese yuet uses yale espeak uses jyutping use pinyin mandarin espeak concern word boundaries n't change question syllable spoken corpus-based approach sound natural cases err dealing unusual phrases ca n't matched corpus synthesiser engine typically large hundreds even thousands megabytes due size corpus anhui ustc iflytek co. ltd iflytek published w3c paper adapted speech synthesis markup language produce mark-up language called chinese speech synthesis markup language cssml include additional markup clarify pronunciation characters add prosody information amount data involved disclosed iflytek seen commercial products iflytek licensed technology example bider speechplus 1.3 gigabyte download 1.2 gigabytes used highly compressed data single chinese voice iflytek synthesiser also synthesise mixed chinese english text voice e.g chinese sentences containing english words claim english synthesis average iflytek corpus appears heavily dependent chinese characters possible synthesize pinyin alone sometimes possible means cssml add pinyin characters disambiguate multiple possible pronunciations always work online interactive demonstration neospeech speech synthesis accepts chinese characters also pinyin enclosed proprietary vtml markup mac os chinese speech synthesizers available version 9 removed 10.0 reinstated 10.7 lion corpus-based approach taken tsinghua university sinosonic harbin dialect voice data taking 800 megabytes planned offered download link never activated nowadays references found internet archive bell labs approach demonstrated online 1997 subsequently removed described monograph multilingual text-to-speech synthesis bell labs approach springer october 31 1997 former employee responsible project chilin shih subsequently worked university illinois put notes methods website
[ 5429, 4787, 6819 ]
Validation
2,739
8
Msnbot:msnbot msnbot web-crawling robot type internet bot deployed microsoft collect documents web build searchable index msn search engine went beta 2004 full public release 2005 month october 2010 saw official retirement msnbot active web crawling duties replacement bingbot september 2015 msnbot still active microsoft bing webmaster help howto documentation still indicated msnbot active would retire soon verification tool bingbot previously recognise msnbot ip addresses test executed 2016-02-22 resulted yes verdict ip address 157.55.39.150 yes ip address verified bingbot ip address name msnbot-157-55-39-150.search.msn.com
[ 3076, 8054, 4759, 7619, 7886, 1333, 1732, 8076, 5563, 654, 6110, 3028, 6114, 6294, 503, 7660, 7848, 8118, 855, 432, 6054, 80, 84, 3161 ]
Test
2,740
9
Haskell_(programming_language):haskell programming language haskell statically typed purely functional programming language type inference lazy evaluation type classes enable type-safe operator overloading originated haskell main implementation glasgow haskell compiler named logician haskell curry haskell based semantics syntax miranda programming language served focus efforts initial haskell working group haskell used widely academia industry latest standard haskell haskell 2010. haskell committee working next standard haskell 2020 following release miranda research software ltd. 1985 interest lazy functional languages grew 1987 dozen non-strict purely functional programming languages existed miranda widely used proprietary software conference functional programming languages computer architecture fpca '87 portland oregon strong consensus committee formed define open standard languages committee purpose consolidate existing functional languages common one serve basis future research functional-language design first version haskell haskell 1.0 defined 1990 committee efforts resulted series language definitions 1.0 1.1 1.2 1.3 1.4 late 1997 series culminated haskell 98 intended specify stable minimal portable version language accompanying standard library teaching base future extensions committee expressly welcomed creating extensions variants haskell 98 via adding incorporating experimental features february 1999 haskell 98 language standard originally published haskell 98 report january 2003 revised version published haskell 98 language libraries revised report language continues evolve rapidly glasgow haskell compiler ghc implementation representing current de facto standard early 2006 process defining successor haskell 98 standard informally named haskell prime began intended ongoing incremental process revise language definition producing new revision per year first revision named haskell 2010 announced november 2009 published july 2010 haskell 2010 incremental update language mostly incorporating several well-used uncontroversial features previously enabled via compiler-specific flags haskell features lazy evaluation lambda expressions pattern matching list comprehension type classes type polymorphism purely functional language means functions generally side effects distinct construct exists represent side effects orthogonal type functions pure function return side effect subsequently executed modeling impure functions languages haskell strong static type system based hindley–milner type inference principal innovation area type classes originally conceived principled way add overloading language since finding many uses construct represents side effects example monad monads general framework model different kinds computation including error handling nondeterminism parsing software transactional memory monads defined ordinary datatypes haskell provides syntactic sugar use haskell open published specification multiple implementations exist main implementation glasgow haskell compiler ghc interpreter native-code compiler runs platforms ghc noted rich type system incorporating recent innovations generalized algebraic data types type families computer language benchmarks game also highlights high-performance implementation concurrency parallelism active growing community exists around language 5,400 third-party open-source libraries tools available online package repository hackage hello world program haskell last line strictly necessary factorial function haskell defined different ways integer type arbitrary-precision code compute values codice_10 456,574-digit number loss precision implementation algorithm similar quick sort lists first element taken pivot haskell logo top page generated haskell code listed implementations distributed open source licenses implementations fully nearly comply haskell 98 standard include implementations longer actively maintained include implementations fully haskell 98 compliant using variant haskell language include several web frameworks written haskell including jan-willem maessen 2002 simon peyton jones 2003 discussed problems associated lazy evaluation also acknowledging theoretical motives addition purely practical considerations improved performance note addition adding performance overhead lazy evaluation makes difficult programmers reason performance code particularly space use bastiaan heeren daan leijen arjan van ijzendoorn 2003 also observed stumbling blocks haskell learners subtle syntax sophisticated type system haskell double edged sword – highly appreciated experienced programmers also source frustration among beginners since generality haskell often leads cryptic error messages address researchers utrecht university developed advanced interpreter called helium improved user-friendliness error messages limiting generality haskell features particular removing support type classes ben lippmeier designed disciple strict-by-default lazy explicit annotation dialect haskell type-and-effect system address haskell difficulties reasoning lazy evaluation using traditional data structures mutable arrays argues p. 20 destructive update furnishes programmer two important powerful tools ... set efficient array-like data structures managing collections objects ... ability broadcast new value parts program minimal burden programmer robert harper one authors standard ml given reasons using haskell teach introductory programming among difficulty reasoning resource use non-strict evaluation lazy evaluation complicates definition data types inductive reasoning inferiority haskell old class system compared ml module system haskell build tool cabal historically criticised poorly handling multiple versions library problem know cabal hell stackage server stack build tool made response criticisms.. clean close slightly older relative haskell biggest deviation haskell use uniqueness types instead monads i/o side-effects series languages inspired haskell different type systems developed including java virtual machine jvm based related languages include haskell served testbed many new ideas language design many haskell variants produced exploring new language ideas including haskell community meets regularly research development activities main events since 2006 series organized hackathons occurred hac series aimed improving programming language tools libraries
[ 3931, 5, 7, 1819, 4302, 3944, 1450, 5021, 1825, 5731, 6428, 6095, 1840, 3630, 1435, 3966, 3968, 1477, 7554, 4705, 6116, 7557, 6120, 7201, 2592, 417, 54, 7573, 5073, 7581, 2966, 5082, 775, 5786, 5787, 6148, 1901, 2619, 4017, 5091, 6507, ...
Test
2,741
7
Apache_Oozie:apache oozie apache oozie server-based workflow scheduling system manage hadoop jobs workflows oozie defined collection control flow action nodes directed acyclic graph control flow nodes define beginning end workflow start end failure nodes well mechanism control workflow execution path decision fork join nodes action nodes mechanism workflow triggers execution computation/processing task oozie provides support different types actions including hadoop mapreduce hadoop distributed file system operations pig ssh email oozie also extended support additional types actions oozie workflows parameterised using variables codice_1 within workflow definition submitting workflow job values parameters must provided properly parameterized using different output directories several identical workflow jobs run concurrently oozie implemented java web application runs java servlet container distributed apache license 2.0
[ 2451, 7238, 894, 4303, 5728, 7805, 7444, 7896, 917, 5571, 3463, 3542, 3204, 1286, 6821, 5054, 840, 1392, 3031, 5408, 3558, 5677, 7924, 3479, 5863, 6387, 5075, 6137, 7488, 7857, 7214, 5874, 3915, 1511, 4742, 5007, 1333, 702 ]
Train
2,742
7
Remote_component_environment:remote component environment remote component environment rce integration environment scientists engineers analyze design simulate complex systems e.g. aircraft satellites space vehicle focusses collaboration multidisciplinary teams treating complex systems requires many experts several analysis design simulation tools rce tools integrated coupled workflows rce executes workflows fetches results involved tool servers rce extensible supports different scientific applications slightly different requirements rce built upon eclipse rich client platform rcp open source published eclipse public license epl development rce platform took place sesis project previously platform known reconfigurable computing environment since open sourced name changed remote component environment
[ 3915, 5571 ]
Train
2,743
3
CPU_power_dissipation:cpu power dissipation central processing unit power dissipation cpu power dissipation process central processing units cpus consume electrical energy dissipate energy form heat due resistance electronic circuits designing cpus perform tasks efficiently without overheating major consideration nearly cpu manufacturers date cpu implementations use little power example cpus mobile phones often use watts electricity microcontrollers used embedded systems may consume milliwatts even little microwatts comparison cpus general-purpose personal computers desktops laptops dissipate significantly power higher complexity speed microelectronic cpus may consume power order watts hundreds watts historically early cpus implemented vacuum tubes consumed power order many kilowatts cpus desktop computers typically use significant portion power consumed computer major uses include fast video cards contain graphics processing units power supplies laptops lcd backlight also uses significant portion overall power energy-saving features instituted personal computers idle overall consumption today high-performance cpus considerable strong contrast much lower energy consumption cpus designed low-power devices one cpu intel xscale run 600 mhz consuming 1 w power whereas intel x86 pc processors performance bracket consume times energy engineering reasons pattern processor manufacturers usually release two power consumption numbers cpu example pentium 4 2.8 ghz 68.4 w typical thermal power 85 w maximum thermal power cpu idle draw far less typical thermal power datasheets normally contain thermal design power tdp maximum amount heat generated cpu cooling system computer required dissipate intel advanced micro devices amd defined tdp maximum heat generation thermally significant periods running worst-case non-synthetic workloads thus tdp reflecting actual maximum power processor ensures computer able handle essentially applications without exceeding thermal envelope requiring cooling system maximum theoretical power would cost favor extra headroom processing power many applications cpu components idle much time idle power contributes significantly overall system power usage cpu uses power management features reduce energy use components motherboard chipset take larger proportion computer energy applications computer often heavily loaded scientific computing performance per watt much computing cpu per unit energy becomes significant several factors contributing cpu power consumption include dynamic power consumption short-circuit power consumption power loss due transistor leakage currents formula_1 dynamic power consumption originates activity logic gates inside cpu logic gates toggle energy flowing capacitors inside charged discharged dynamic power consumed cpu approximately proportional cpu frequency square cpu voltage capacitance frequency voltage logic gates toggle transistors inside may change states takes finite amount time may happen brief amount time transistors conducting simultaneously direct path source ground results short-circuit power loss magnitude power dependent logic gate rather complex model macro level power consumption due leakage power emanates micro-level transistors small amounts currents always flowing differently doped parts transistor magnitude currents depend state transistor dimensions physical properties sometimes temperature total amount leakage currents tends inflate increasing temperature decreasing transistor sizes dynamic short-circuit power consumption dependent clock frequency leakage current dependent cpu supply voltage shown energy consumption program shows convex energy behavior meaning exists optimal cpu frequency energy consumption minimal power consumption reduced several ways including following historically processor manufacturers consistently delivered increases clock rates instruction-level parallelism single-threaded code executed faster newer processors modification recently order manage cpu power dissipation processor makers favor multi-core chip designs thus software needs written multi-threaded multi-process manner take full advantage hardware many multi-threaded development paradigms introduce overhead see linear increase speed compared number processors particularly true accessing shared dependent resources due lock contention effect becomes noticeable number processors increases recently ibm exploring ways distribute computing power efficiently mimicking distributional properties human brain
[ 1458, 7442, 7446, 3015, 3020, 5307, 4154, 1023, 7666, 1592, 161, 7403, 2522, 3063, 1237, 352, 3242, 1331 ]
Test
2,744
3
VIA_Technologies:via technologies via technologies inc. taiwanese manufacturer integrated circuits mainly motherboard chipsets cpus memory world largest independent manufacturer motherboard chipsets fabless semiconductor company via conducts research development chipsets in-house subcontracts actual silicon manufacturing third-party merchant foundries tsmc company founded 1987 fremont california usa cher wang 1992 decided move headquarters taipei taiwan order establish closer partnerships substantial growing manufacturing base taiwan neighbouring china 1999 via acquired cyrix division national semiconductor year via acquired centaur technology integrated device technology marking entry x86 microprocessor market via maker via c3 via c7 via nano processors epia platform cyrix mediagx platform remained national semiconductor 2001 via established s3 graphics joint venture january 2005 via began via pc-1 initiative develop information communication technology systems benefit access computers internet february 2005 via celebrated production 100 millionth via amd chipset 29 august 2008 via announced would release official 2d accelerated linux drivers chipsets would also release 3d accelerated drivers 2013 via entered agreement shanghai municipal government create fabless semiconductor company called zhaoxin joint venture producing x86 compatible cpus chinese market via business focuses integrated chipsets pc market among pc users via best known motherboard core-logic chipsets however via products include audio controllers network/connectivity controllers low-power cpus even cd/dvd-writer chipsets pc peripheral vendors asus buy chipsets inclusion product brands late 1990s via began diversifying core-logic business company since made business acquisitions form cpu division graphics division sound division advances silicon manufacturing continue increase level integration functionality chipsets via need divisions remain competitive core-logic market via produced multiple x86 compatible cpus acquisitions cyrix centaur technology via still produces cpus zhaoxin joint venture via x86 processors also contain undocumented alternate instruction set via established important supplier pc components chipsets socket 7 platform apollo vp3 chipset via pioneered agp support socket 7 processors via present market position derives success pentium iii chipsets intel discontinued development sdram chipsets stated policy rdram memory would supported going forward since rdram expensive offered obvious performance advantages manufacturers found could ship performance-equivalent pcs lower cost using via chipsets response increasing market competition via decided buy ailing s3 graphics business savage chipset fast enough survive discrete solution low manufacturing cost made ideal integrated solution part via northbridge via s3 brand generally held onto 10 share pc graphics market behind intel amd nvidia via also includes via envy soundcard motherboards offers 24-bit sound pentium 4 chipset designs struggled win market share face legal threats intel k8t800 chipset athlon 64 popular via also continued development via c3 via c7 processors targeting small light low power applications market space via successful january 2008 via unveiled via nano 11 mm × 11 mm footprint vm-enabled x86-64 processor debuted may 2008 ultra-mobile pcs basis idt centaur acquisition via appears come possession least three patents cover key aspects processor technology used intel basis negotiating leverage patents offered 2003 via arrived agreement intel allowed ten-year patent cross license enabling via continue design manufacture x86 compatible cpus via also granted three-year grace period could continue use intel socket infrastructure
[ 2449, 2541, 2983, 6874, 4845, 1162, 4667, 5104, 289, 6865, 3002, 1465, 5740, 3015, 5750, 6647, 2765, 4974, 1764, 7666, 6478, 7484, 7669, 6665, 4900, 7212, 1977, 6226, 7302, 7403, 866, 1237, 7041, 352, 3248, 1335 ]
Validation
2,745
4
Usenet_Death_Penalty:usenet death penalty usenet usenet death penalty udp final penalty may issued internet service providers single users produce much spam fail adhere usenet standards messages fall jurisdiction usenet death penalty cancelled cancelled messages deleted usenet servers allowed propagate causes users affected isp unable post usenet puts pressure isp change policies notable cases include actions taken uunet compuserve excite home three types usenet death penalty effective udp must supported large number servers majority major transit servers otherwise articles propagate throughout smaller slower peerings udps casual acts announced beforehand owner offending server contacted given several chances correct perceived problem since effects users server udp significant users want post impact udp induce operators offending server address problems quickly udps issued america online bbn planet compuserve erols internet netcom tiac uunet first udp software written karl kleinpaste 1990 though disagreement term coined net abuse faq claims 1993 message posted 18 august year claims coined years earlier eliot lear udp implemented uunet 1 august 1997 became host many spammers unresponsive abuse complaints forced provider implement antispam policies tools close open relays executives called udp digital terrorism threatened legal action asserted planning move spammers anyway volume spam uunet decreased organizers called penalty august 6 though announcement stifled cancel messages udp opponents active udp implemented compuserve 18 november 1997 lifted following day company implemented anti-spamming measures instituted new acceptable use policy addressing spamming udp scheduled begin excite home 19 january 2000 lifted day scheduled begin isp began scanning misconfigured proxy servers home users computers blamed spam originating network
[ 3060, 2379 ]
Test
2,746
4
Comparison_of_firewalls:comparison firewalls following comparison notable firewalls starting simple home firewalls sophisticated enterprise-level firewalls firewall solutions provided software solutions run general purpose operating systems following table lists different firewall software installed configured different general purpose operating systems general computer appliance computing device specific function limited configuration ability software appliance set computer programs might combined enough operating system jeos run optimally industry standard computer hardware virtual machine firewall appliance combination firewall software operating system purposely built run firewall system dedicated hardware virtual machine include following table lists different firewall appliances features strictly firewall features sometimes bundled firewall software exist platform note features marked yes even implemented separate module comes platform firewall sits ids real-time firewall logs/sniffs/blocks suspicious connections part rule-set vpn virtual private network types pptp l2tp mpls ipsec ssl/ssh profile selection user switch sets firewall settings e.g use work home public connections
[ 1809, 7522, 385, 7536, 4689, 6107, 3637, 6456, 6835, 6126, 6842, 6489, 6149, 4014, 7597, 3680, 4759, 806, 1931, 2296, 496, 7275, 6918, 3394, 6560, 7289, 2337, 4091, 3411, 7683, 6235, 6951, 875, 6962, 1249, 2001, 5546, 5905, 1261, 4492, ...
Train
2,747
4
Security_testing:security testing security testing process intended reveal flaws security mechanisms information system protect data maintain functionality intended due logical limitations security testing passing security testing indication flaws exist system adequately satisfies security requirements typical security requirements may include specific elements confidentiality integrity authentication availability authorization non-repudiation actual security requirements tested depend security requirements implemented system security testing term number different meanings completed number different ways security taxonomy helps us understand different approaches meanings providing base level work integrity information refers protecting information modified unauthorized parties might involve confirming identity person tracing origins artifact ensuring product packaging labeling claims assuring computer program trusted one common terms used delivery security testing
[ 3932, 6515, 3680, 3448, 2105, 651, 2566, 6725, 5485, 1376, 5577, 3794, 5401, 5051, 2310, 6823, 2491, 1805, 5149, 6376, 2684, 1584, 7023, 6756, 7487, 2789, 74, 7865, 5613, 3681 ]
Test
2,748
1
Database_Directive:database directive directive 96/9/ec european parliament council 11 march 1996 legal protection databases directive european union field copyright law made internal market provisions treaty rome harmonises treatment databases copyright law sui generis right creators databases qualify copyright article 1 2 defines database collection independent works data materials arranged systematic methodical way individually accessible electronic means non-electronic databases also covered para 14 preamble computer program used create database included para 23 preamble copyright protection software governed directive 91/250/eec article 3 databases reason selection arrangement contents constitute author intellectual creation protected copyright collections criterion may used member states may relaxation criterion protection collections berne convention protection literary artistic works covers collections literary artistic works requires creativity selection arrangement contents practice difference likely slight copyright database separate without prejudice copyright entries acts restricted copyright similar types work art 5 shall prevent lawful use database lawful user art 6 1 member states may provide following limitations art 6 2 well applying traditional limitations copyright copyright protection usually lasts seventy years death last publicly identified author anonymous pseudonymous works gain protection later 70 years work lawfully made available public 70 years creation national legislation makes particular provision collective works legal person i.e body corporate rights holder term protection calculated way anonymous pseudonymous works exception natural persons created work given credit versions made available public term protection calculated according lives authors art 1 directive 93/98/eec copyright protection available databases aim complete entries selected objective criteria covered sui generis database rights copyright protects creativity author database rights specifically protect qualitatively and/or quantitatively substantial investment either obtaining verification presentation contents substantial investment need financial database protected art 7 1 database rights held first instance person corporation made substantial investment long article 11 3 provides negotiation treaties ensure reciprocal treatment outside eu 2006 treaty exists holder database rights may prohibit extraction and/or re-utilization whole substantial part contents substantial part evaluated qualitatively and/or quantitatively reutilisation subject exhaustion rights public lending act extraction re-utilization lawful user database available public may freely extract and/or re-use insubstantial parts database art 8 holder database rights may place restrictions purpose insubstantial parts used however users may perform acts conflict normal exploitation database unreasonably prejudice legitimate interests maker database prejudice copyright entries limitations may provided database rights copyright databases art 9 database rights last fifteen years end year database made available public end year completion private databases art 10 substantial change could considered substantial new investment lead new term database rights could principle perpetual database rights independent copyright database two could principle held different people especially jurisdictions prohibit corporate ownership copyright database rights compared rights phonogram film producers
[ 5885, 273, 2054 ]
Validation
2,749
2
Sparse_image:sparse image sparse image type disk image file used macos grows size user adds data image taking much disk space stored encrypted sparse image files used secure user home directory filevault feature mac os x snow leopard earlier sparse images created using disk utility unlike full image file .dmg takes much actual space real disk represents regardless amount unused space sparse image file .sparseimage takes much actual disk space data contained within maximum capacity assigned creation two limitations therefore worth noting regarding use image file format mac os x leopard introduced concept sparse bundle instead single big file sparse bundle bundle directory containing number files called bands order 8 mb size means even though end user sparse bundle appears single file composed smaller files mac os x 10.8 bands 8 mib content image changes one band files changed created deleted allows backup software time machine operate efficiently sparse bundle advantages time machine
[ 7584, 3827, 7517, 7848, 5191 ]
Test
2,750
0
Manning's_Law:manning law manning law describes combination principles need balanced design growth universal linguistic dependencies dependencies used describe model syntactic relations languages supports natural language processing major topic event thousands linguistics ai researchers working widely-adopted law put forward christopher manning manning law described consisting six directives may necessarily apply simultaneously often conflict degree
[ 5429 ]
Test
2,751
3
Socket_A:socket socket also known socket 462 cpu socket used amd processors ranging athlon thunderbird athlon xp/mp 3200+ amd budget processors including duron sempron socket also supports amd geode nx embedded processors derived mobile athlon xp socket zero insertion force pin grid array type 462 pins nine pins blocked socket prevent accidental insertion socket 370 cpus hence number 462 front side bus frequencies supported amd athlon xp sempron 133 mhz 166 mhz 200 mhz socket supports 32-bit cpus socket replaced socket 754 socket 939 2003 2004 respectively except use geode nx processors initially launched 100 mhz fsb support earliest chipsets evolved stepwise faster 200 mhz fsb maintaining pin compatibility throughout lifetime however clock timing bios voltage differences restrict compatibility older chipsets later processors socket dimensions 5.59 cm 5.24 cm without lever x 6.55 cm 2.2 2.06 without lever x 2.58 amd recommends mass socket cpu cooler exceed 300 grams 10.6 ounces heavier coolers may result damage die system properly handled socket processors athlon sempron duron geode nx following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits may crack processor die make unusable load limits quite small compared load limits socket 478 processors indeed small many users ended cracked processors trying remove attach heatsinks fragile processor core made installing non-standard non-certified heatsink solutions risky business
[ 2539, 6599, 2541, 5895, 4931, 7163, 2997, 3362, 1735, 5377, 6351, 913, 7826, 6545, 5404, 4968, 6373, 5063, 6655, 6562, 3145, 4090, 7302, 866, 694, 5436, 1237, 1143 ]
Validation
2,752
9
ContentBox_Modular_CMS:contentbox modular cms contentbox modular cms open-source content management system cfml created ortus solutions corp. contentbox designed modular hmvc software based hibernate orm coldbox platform contentbox modular cms dual-licensed apache v2 commercial license contentbox modular cms cfml-powered web application runs modern cfml engine including adobe coldfusion 9 lucee 4.5 railo 2 contentbox modular cms also delivered war file standard java servlet container apache tomcat
[ 3186, 6095, 2456, 5571, 6704, 103, 5490, 6362, 3543 ]
Test
2,753
4
John_Threat:john threat john lee a.k.a john threat used name corrupt member masters deception mod new york based hacker group early '90s result participation great hacker war mod rival hacker group legion doom indicted federal wiretapping charges 1992 pled guilty sentenced one year federal detention center participation great hacker war landed cover wired magazine 1994 lee born july 6 1973 brooklyn new york grew brownsville member decepticons brooklyn-based street gang formed early '80s named villains saturday morning cartoon transformers lee attended stuyvesant high school went new york university freshman year nyu lee sentenced prison role great hacker war lee also editing producing directing credits film television 2004 founded mediathreat llc film production company 2005 directed original documentary dead prez bigger hip hop 2011 co-directed music video make single ca n't friends everyone diane martel lee also gained notoriety 2001 revealed anonymous editor urbanexpose.com controversial entertainment gossip website
[]
Test
2,754
4
Cyber_Resilience_Review:cyber resilience review cyber resilience review crr assessment method developed united states department homeland security dhs voluntary examination operational resilience cyber security practices offered cost dhs operators critical infrastructure state local tribal territorial governments crr service-oriented approach meaning one foundational principles crr organization deploys assets people information technology facilities support specific operational missions services crr offered facilitated workshop format self-assessment package workshop version crr led dhs facilitator critical infrastructure facility workshop typically takes 6–8 hours complete draws cross section personnel critical infrastructure organization information collected facilitated crr protected disclosure protected critical infrastructure information act 2002 information disclosed freedom information act request used civil litigation used regulatory purposes crr self-assessment package allows organization conduct assessment without need direct dhs assistance available download dhs critical infrastructure cyber community voluntary program website package includes automated data answer capture report generation tool facilitation guide comprehensive explanation question crosswalk crr practices criteria national institute standards technology nist cybersecurity framework questions asked crr resulting report versions assessment dhs partnered cert division software engineering institute carnegie mellon university design deploy crr goals practices found assessment derived cert resilience management model cert-rmm version 1.0 crr introduced 2009 received significant revision 2014 crr comprises 42 goals 141 specific practices extracted cert-rmm organized 10 domains domain composed purpose statement set specific goals associated practice questions unique domain standard set maturity indicator level mil questions mil questions examine institutionalization practices within organization.the performance organization scored mil scale scale depicts capability divided five levels mil1-incomplete mil2-performed mil3-managed mil4-measured mil5-defined institutionalization means cybersecurity practices become deeper lasting part organization managed supported meaningful ways cybersecurity practices become institutionalized—or “ embedded ” —managers confidence practices ’ predictability reliability practices also become likely sustained times disruption stress organization maturity also lead tighter alignment cybersecurity activities organization ’ business drivers example mature organizations managers provide oversight particular domain evaluate effectiveness security activities domain comprises number goals practice questions varies domain set mil questions concepts encompass domains crr questions three possible responses “ yes ” “ ” “ incomplete crr measures performance organization practice goal domain mil levels scores calculated individual model elements aggregated totals scoring rubric establishes following conditions met organization said achieving domain performed state practices define domain observable determination made degree practices conditions tested applying common set 13 mil questions domain mil1 achieved consistent architecture mil scale mils cumulative achieve mil specific domain organization must perform practices level preceding mils example organization must perform domain practices mil1 mil2 achieve mil2 domain crr participants receive comprehensive report containing results question domains report also provides graphical summaries organization ’ performance goal domain levels depicted heat-map matrix detailed representation allows organizations target improvement fine-grained level organizations participating facilitated crrs receives additional set graphs depicting performance organization compared prior participants crr report includes potential path toward improving performance practice options consideration primarily sourced cert-rmm nist special publications organizations also use crr results measure perform relation criteria nist cybersecurity framework correlation feature introduced february 2014
[ 3474 ]
Test
2,755
6
DCE_Distributed_File_System:dce distributed file system dce distributed file system dce/dfs remote file access protocol used distributed computing environment variant andrew file system afs based afs version 3.0 protocol developed commercially transarc corporation afs version 3.0 turn based afs version 2.0 protocol also used coda disconnected file system originally developed carnegie mellon university dce/dfs consisted multiple cooperative components provided network file system strong file system semantics attempting mimic behavior posix local file systems taking advantage performance optimizations possible dce/dfs client system utilized locally managed cache would contain copies regions original file client system would coordinate server system original copy file stored ensure multiple clients accessing file would re-fetch cached copy file data original file changed advantage approach provided good performance even slow network connections file access actually done local cached regions file server failed client could continue making changes file locally storing back server became available dce/dfs also divorced concept logical units management filesets underlying volume fileset stored allowed administrative control location fileset manner transparent end user support advanced dce/dfs features local journaling file system dce/lfs also known episode developed provide full range support options ibm maintained since 2005 http //www-306.ibm.com/software/stormgmt/dfs/ ibm working replacement dce/dfs called adfs advanced distributed file system one major goal project decouple dfs complexities dce cell directory services cds security services secd another key feature would elimination enctype limitations associated dce/rpc public mention effort made since 2005 leading many believe project killed dce distributed file system dfs adopted open software foundation 1989 part distributed computing environment
[ 6395, 2134, 1624, 3891, 5437, 2704 ]
Validation
2,756
2
OxygenOS:oxygenos oxygenos customized version android mobile operating system developed chinese smartphone manufacturer oneplus exclusively smartphones oxygenos developed overseas market also another version os designed specifically chinese home market called hydrogenos interview published 3 september 2016 xda developers revealed oneplus actively merging platforms oxygenos hydrogenos single cohesive operating system notable features version 2.0 2.1.1 include app permissions waves maxxaudio swiftkey keyboard off-screen gestures custom icons dark mode manual camera mode raw support 3rd party apps like camera fv-5 2.75 14 june 2016 oneplus released oxygenos 3.0 version android modifications internal tuning like gestures shelf dark mode oneplus 31 december 2016 oneplus released oxygenos 4.0.0 based android nougat includes features several modifications public via ota download 31 january 2018 oneplus released oxygenos 5.0.3 based android oreo public via ota download may 2018 oneplus launched oneplus 6 oxygenos based android oreo 8.1 29 october 2018 oneplus launched oneplus 6t oxygenos 9.0 based android pie 25 december 2018 oneplus released oxygenos 9.0.0 based android pie oneplus 5/5t public via ota download 10 october 2017 security researcher discovered oxygenos system service named devicemanagerservice collects sensitive data sends back oneplus servers service collects many data points including device serial number phone number imei network connections timestamped records user activity within every app users uninstall system service via adb later oneplus released statement data collection analytics claiming data used system improvement optimization shared third parties disabled users system settings oneplus also says revising data analysis mechanism longer collect certain data 2014 oneplus promised close stock bloat-free highly customizable experience soon held name rom contest search name 30 january 2015 oneplus officially announced names oxygenos hydrogenos winner contest midifire belgium flown headquarters shenzhen got meet team along ceo pete lau
[ 3933, 5372, 6427, 1095, 740, 4340, 42, 3310, 2591, 5771, 5775, 7956, 5473, 474, 6183, 822, 136, 6209, 1582, 6937, 6232, 4116, 5195, 2003, 195, 6978, 7346, 561, 201, 2017, 5919, 7357, 5571, 2398, 2037, 7007, 7749, 2417, 2054, 2788, 3507,...
Test
2,757
9
Apple_Media_Tool:apple media tool apple media tool multimedia authoring tool associated programming environment sold apple late 1990s primarily aimed producing multimedia presentations distribution cd-rom aimed graphic designers programming experience featured advanced user interface object-oriented user model made production rich complex presentations easy amt system developed patrick soquet developer belgium working arborescence french company later acquired havas 1993 onwards marketed apple development done independent team led soquet 1996 development tool taken apple 2.1 version program developed house team engineers california led dan crow 1997 apple decided concentrate multimedia offerings quicktime hypercard rights amt returned havas patrick soquet acquired rights co-founded tribeworks developed new tool based aml called ishell major features apple media tool graphical authoring tool amt associated programming environment apple media tool programming environment amtpe compiler debugger underlying apple media language aml also known key language amt notable one first authoring systems support embedding apple pioneering qtvr movie format aml object-oriented programming language based eiffel specialized multimedia programming although amt require programming experience use produced complete aml programs compiled byte code interpreted runtime interpreter ampte could used enhance aml code create complex programs example accessing database retrieve media aml conceptually similar java write run anywhere approach cross-platform development runtime interpreters classic mac os windows platforms
[ 405, 3412, 4759 ]
Test
2,758
2
Linpus_Linux:linpus linux linpus linux fedora-based operating system created taiwanese firm linpus technologies inc. linpus designed specifically fully support asian market full unicode support chinese japanese languages special version linpus lite written run devices lower-cost hardware netbooks icon tab-based simple mode designed new users conventional style pc mode wanting microsoft windows-like interface targeted handheld devices smaller screens supports resolutions low vga 640×480 acer aspire one norhtec gecko netbooks come linpus lite linux pre-installed also version acer revo 3610 3700 linpus linux pre-installed version normal desktop computers servers also available well multimedia version called linpus media center media center version offers upgrade pack purchase patent licenses mpeg-la dvd mp3 wmv codecs linpus system contains free open source operating system also acer-specific shareware users classify nagware asks register acer website purchase full version fact acer distribution contains software prevents system considered fully free/open operating system
[ 2179, 2187, 2909, 5724, 6086, 7894, 2935, 6453, 2585, 2228, 1487, 58, 2240, 3996, 7587, 4008, 1893, 7954, 1909, 4759, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, 3023, 6549, 1960, 6209, 2680, 4435, 5163, ...
Validation
2,759
8
PostRank:postrank postrank social media analytics service used proprietary ranking algorithm measure social engagement published content based blog comments links internet bookmarks clicks page views activities social network services twitter digg facebook myspace june 2011 postrank acquired google company formerly called aiderss inc october 2008 aiderss re-launched website postrank.com focus company work core postrank technology july 2009 company officially changed name postrank inc company developed offered multiple services acquisition postrank functionality integrated google analytics
[ 4600, 3850 ]
Test
2,760
1
Elasticity_(data_store):elasticity data store elasticity data store relates flexibility data model clustering capabilities greater number data model changes tolerated easily clustering managed elastic data store considered clustering elasticity ease adding removing nodes distributed data store usually difficult delicate task done expert relational database system nosql data stores like apache cassandra easy solution node added/removed changes properties adding specifying least one seed relational databases often inelastic predefined data model adapted redesign nosql data stores however fixed schema row different number even different type columns concerning data store modifications schema problem makes kind data stores elastic concerning data model drawback programmer take account data model may change time
[ 6462, 3542 ]
Test
2,761
8
Sensor_Observation_Service:sensor observation service sensor observation service sos web service query real-time sensor data sensor data time series part sensor web offered sensor data comprises descriptions sensors encoded sensor model language sensorml measured values observations measurements encoding format web service well file formats open standards specifications name defined open geospatial consortium ogc sos supports transactional profile sos-t new sensors registered service interface measuring values inserted sos implementation used data in-situ well remote sensing sensors furthermore sensors either mobile stationary since 2007 sos official ogc standard advantage sos sensor data kind available standardized format using standardized operations thus web-based access sensor data simplified also allows easy integration existing spatial data infrastructures geographic information systems 2016 ogc approved sensorthings api standard specification new restful json-based standard provide functions similar sos sensorthings api sos based ogc/iso 19156:2011 two specifications demonstrated ogc iot pilot interoperate sos three so-called core operations must provided implementation getcapabilities operation allows query service description service interface available sensor data using sos getobservation function probably important utilized retrieve data specific sensors describesensor function returns detailed information sensor sensor system producing processes ogc sos well-defined terminology better understanding important terms sos standard ogc ultimately defines service interface implementation currently several open source implementations service also proprietary implementations exist
[ 5983, 5965, 2872, 1435 ]
Test
2,762
4
POPFile:popfile popfile free open-source cross-platform mail filter originally written perl john graham-cumming maintained team volunteers uses naive bayes classifier filter mail allows filter learn classify mail according user preferences typically used filter spam mail also used sort mail user defined buckets categories example user may define bucket work email sorted program works several different modes popular mode sets proxy email client pop3 server mail downloaded via pop3 filter identifies classifies mail makes user defined modification subject line appending name appropriate bucket user sets rules mail client sort mail based subject line modification html based interface used instruct popfile allowing users correct errors classifications thus train system sensitive user specific requirements alternative subject-line modification supplement system also configured use custom mail headers instead another possible mode popfile work imap client monitors imap server incoming mail also messages moved user incoming emails categorized immediately moved folder corresponding categorization train popfile mode user needs move message correct folder i.e folder popfile moved message
[ 5983, 5571, 3017, 3338 ]
Test
2,763
6
Comparison_of_distributed_file_systems:comparison distributed file systems computing distributed file system dfs network file system file system allows access files multiple hosts sharing via computer network makes possible multiple users multiple machines share files storage resources distributed file systems differ performance mutability content handling concurrent writes handling permanent temporary loss nodes storage policy storing content researchers made functional experimental analysis several distributed file systems including hdfs ceph gluster lustre old 1.6.x version moosefs although document 4 years old lot information may outdated e.g moosefs time writing stable 2.0 beta 3.0 version ha metadata server since 2.0 mentioned document cloud based remote distributed storage major vendors different apis different consistency models
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6454, 6117, 759, 765, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 4393, 7976, 4406, 821, 7258, 5130, 1561, 836, 3383, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 2700, 869, 2704, 16...
Test
2,764
9
Lucid_(programming_language):lucid programming language lucid dataflow programming language designed experiment non-von neumann programming models designed bill wadge ed ashcroft described 1985 book lucid dataflow programming language plucid first interpreter lucid lucid uses demand-driven model data computation statement understood equation defining network processors communication lines data flows variable infinite stream values every function filter transformer iteration simulated 'current values 'fby read 'followed operator allowing composition streams lucid based algebra histories history infinite sequence data items operationally history thought record changing values variable history operations first next understood ways suggested names lucid originally conceived kind disciplined mathematically pure single-assignment language verification would much simplified however dataflow interpretation important influence direction lucid evolved lucid dataflow languages expression contains variable yet bound waits variable bound proceeding expression like codice_1 wait x bound returning output expression important consequence explicit logic updating related values avoided results substantial code reduction compared mainstream languages variable lucid stream values expression codice_2 defines stream using operator 'fby mnemonic followed fby defines comes previous expression instance stream produces 1,2,3 ... values stream addressed operators assuming x variable used codice_3 fetches first value stream x codice_4 current value stream codice_5 fetches next value stream codice_6 operator thing 'as soon condition given becomes true codice_7 upon operator repeats old value stream x updates new values stream p makes codice_8 value available serves slow stream x i.e codice_9 stream x new values appearing upon truth p. computation carried defining filters transformation functions act time-varying streams data fac fib total running_avg prime qsort eof first else follow qsort b0 qsort b1 fi -- -- -- -- whenever -- -- qsort -- -- -- -- sqroot avg square h
[ 3120, 1270, 6507, 4864, 8137, 920, 5420 ]
Test
2,765
3
List_of_Linux-supported_computer_architectures:list linux-supported computer architectures basic components linux family operating systems based linux kernel gnu c library busybox forks thereof like μclinux uclibc programmed certain level abstraction mind also distinct code paths assembly language c source code support certain hardware therefore source code successfully compiled onor cross-compiled fora great number computer architectures furthermore required free open-source software also developed interface linux hardware linux executed example compilers available e.g gnu compiler collection gcc llvm/clang cross-compilation number complete toolchains available like gnu toolchain openwrt buildroot openembedded yocto project targeted embedded use cases portability section linux kernel article contains information references technical details note components like display server programs like blender present absent fundamentally software ported i.e specifically adapted kind hardware supposed executed level abstraction kept mind programming software first place dictates necessary effort relevant term porting target computer architecture comprises instruction set microarchitecture processor least cpu target also comprises system design entire system supercomputer desktop computer soc e.g case unique bus used former times memory controller part chipset motherboard cpu-die although support specific instruction set task compiler software must written certain level abstraction mind make portability possible code written assembly language specific instruction set support specific microarchitecture includes optimizations cpu cache hierarchy tlb etc additional processors particularly freescale 68000 coldfire supported mmu-less μclinux variant
[ 1066, 362, 3256, 2182, 3613, 2197, 7528, 7532, 2559, 5740, 5744, 6443, 3294, 2942, 5055, 7555, 6117, 4341, 2226, 1864, 5762, 412, 415, 418, 3666, 7588, 2970, 6865, 7956, 5453, 3346, 5803, 3348, 5459, 5460, 5104, 7242, 1167, 1535, 1924, ...
Validation
2,766
8
Usage_data:usage data usage data effective way evaluating true relevancy value website example users arrive web site go back immediately high bounce rate chances ’ relevant query first place however user repeatedly visits web site spends long time site high likelihood extremely relevant comes search engines relevant valuable sites get promoted irrelevant sites get demoted search engines want results highly relevant web users make sure web users keep returning search engine future searches best way establish relevance users know use web sites cookies used search engines maintain history user ’ search activity
[ 4925 ]
Test
2,767
4
Time-of-check_to_time-of-use:time-of-check time-of-use software development time-of-check time-of-use toctou tocttou toc/tou class software bugs caused race condition involving checking state part system security credential use results check simple example follows consider web application allows user edit pages also allows administrators lock pages prevent editing user requests edit page getting form used alter content user submits form administrator locks page prevent editing however since editing already begun user submits form edits already made accepted user began editing appropriate authorization checked user indeed allowed edit however authorization used later time edits longer allowed toctou race conditions common unix operations file system occur contexts including local sockets improper use database transactions early 1990s mail utility bsd 4.3 unix exploitable race condition temporary files used codice_1 function early versions openssh exploitable race condition unix domain sockets remain problem modern systems 2019 toctou race condition docker allows root access filesystem host platform unix following c code used codice_2 program toctou bug access intended check whether real user executed codice_2 program would normally allowed write file i.e. codice_4 checks real userid rather effective userid race condition vulnerable attack example attacker exploit race condition codice_5 codice_6 trick codice_2 victim overwriting entry system password database toctou races used privilege escalation get administrative access machine although sequence events requires precise timing possible attacker arrange conditions without much difficulty implication applications assume state managed operating system case file system namespace change system calls exploiting toctou race condition requires precise timing ensure attacker operations interleave properly victim example attacker must execute codice_8 system call precisely codice_5 codice_6 general attack attacker must scheduled execution operation victim also known single-stepping victim case bsd 4.3 mail utility mktemp attacker simply keep launching mail utility one process keep guessing temporary file names keep making symlinks another process attack usually succeed less one minute techniques single-stepping victim program include file system mazes algorithmic complexity attacks cases attacker manipulates os state control scheduling victim file system mazes force victim read directory entry os cache os puts victim sleep reading directory disk algorithmic complexity attacks force victim spend entire scheduling quantum inside single system call traversing kernel hash table cached file names attacker creates large number files names hash value file victim look despite conceptual simplicity toctou race conditions difficult avoid eliminate one general technique use exception handling instead checking philosophy eafp – easier ask forgiveness permission rather lbyl – look leap – case check failure assumptions hold detected use time exception context file system toctou race conditions fundamental challenge ensuring file system changed two system calls 2004 impossibility result published showing portable deterministic technique avoiding toctou race conditions since impossibility result libraries tracking file descriptors ensuring correctness proposed researchers alternative solution proposed research community unix systems adopt transactions file system os kernel transactions provide concurrency control abstraction os used prevent toctou races production unix kernel yet adopted transactions proof-of-concept research prototypes developed linux including valor file system txos kernel microsoft windows added transactions ntfs file system microsoft discourages use indicated may removed future version windows file locking common technique preventing race conditions single file extend file system namespace metadata locking work well networked filesystems prevent toctou race conditions setuid binaries possible solution use codice_11 system call change effective user perform codice_12 differences codice_13 operating systems problematic
[ 4771, 4318, 4759, 1534, 1630, 5209, 3951, 1435, 6046 ]
Validation
2,768
3
Game_Over_II:game ii game ii known phantis spain action game developed published dinamic software 1987 amstrad cpc atari st commodore 64 ms-dos msx zx spectrum game ii mix scrolling shoot 'em game similar r-type platform game similar turrican four phases six levels versions game split two parts due size restrictions story begins arkon hero rebellion managed defeat evil empress gremla free galaxy oppressive rule original spanish version phantis player controls major locke tries rescue boyfriend arkon captured forces loyal vengeful unnamed heir gremla featured cover art imprisoned planet phantis english-language version titled game ii arkon job rescue commander serena game versions although originally conceived independent game title phantis became sequel game atari st version never published spain exists game ii title game promotion included appearance model dressed queen gremla trade convention pc show '88 game given generally mediocre reviews received scores 69 amstrad action 55 commodore user 60-63 games machine 62 sinclair user amstrad computer user gave 17/20
[ 480, 6380 ]
Train
2,769
2
Spooling:spooling computing spooling specialized form multi-programming purpose copying data different devices contemporary systems usually used mediating computer application slow peripheral printer spooling allows programs hand work done peripheral proceed tasks begin input transcribed dedicated program spooler maintains orderly sequence jobs peripheral feeds data rate conversely slow input peripherals card reader spooler maintain sequence computational jobs waiting data starting job relevant input available see batch processing spool refers sequence jobs storage area held many cases spooler able drive devices full rated speed minimal impact processing spooling combination buffering queueing nowadays common use spooling printing documents formatted printing stored queue speed computer retrieved printed speed printer multiple processes write documents spool without waiting perform tasks spooler process operates printer example large organization prepares payroll cheques computation takes minutes even seconds printing process might take hours payroll program printed cheques directly would unable proceed computations cheques printed similarly spooling added pc operating systems word processors unable anything else including interact user printing spooler print management software often includes variety related features allowing priorities assigned print jobs notifying users documents printed distributing print jobs among several printers selecting appropriate paper document etc print server applies spooling techniques allow many computers share printer group printers print spoolers configured add banner page also called burst page job sheet printer separator front document separate documents identify document e.g title often also state printed e.g username job name banner pages valuable office environments many people share small number printers depending configuration banner pages might generated client computer centralized print server printer printers using fanfold continuous forms leading banner page would often printed twice one copy would always face-up jobs separated page might include lines printed fold would visible along edge stack printed output allowing operator easily separate jobs systems would also print banner page end job assuring users collected printout spooling also used mediate access punched card readers punches magnetic tape drives slow sequential i/o devices allows application run speed cpu operating peripheral devices full rates speed batch processing system uses spooling maintain queue ready-to-run tasks started soon system resources process store forward messaging systems uucp used spool refer inbound outbound message queues terminology still found documentation email usenet software even though messages often delivered immediately nowadays peripheral devices always much slower core processing units especially severe problem early mainframes example job read punched cards generated printed output directly forced run speed slow mechanical devices first spooling programs ibm spool system 7070-io-076 copied data punched cards magnetic tape tape back punched cards printers hard disks even faster support random access started replace use magnetic tape middle 1960s 1970s eliminated use tape unit record equipment ibm mainframes early 1960s slow common use small offline machine 1401 instead spooling term spool probably originates simultaneous peripheral operations on-line spool software derivation uncertain simultaneous peripheral operations on-line may backronym another explanation refers spools reels magnetic tape
[ 6965, 2815, 6511, 1161, 7800, 2379, 4585, 2835, 5826, 1097, 5571, 3201, 2933, 6017, 7003, 839, 6841, 607, 7858, 958, 7496, 5784, 1994 ]
Test
2,770
3
Samantha_Fox_Strip_Poker:samantha fox strip poker samantha fox strip poker 1986 erotic video game developed software communications published martech games published commodore 64 amstrad cpc bbc micro msx zx spectrum game one first erotic video games include real human part theme erotic games players complete difficult tasks rewarded nudity video game programmed wolfgang smith graphics edited malcolm smith author music rob hubbard credited name john york music includes cover entertainer scott joplin stripper david rose players plays 5-card 7-card stud poker british model singer samantha fox beating results taking clothes topless zzap felt music well-suited style game commodore format magazine thought idea anybody using game way experience titillating content depressing due require effort player uvejuegos thought game prime example strange 1980s spiegel placed game within sub-genre early pixelated digi-ladies dubious beauty along artworx strip poker 1984
[]
Test
2,771
2
Setuptools:setuptools setuptools package development process library designed facilitate packaging python projects enhancing python standard library distutils distribution utilities includes 2013 distribute fork setuptools merged back setuptools 0.7 python wheels replaced eggs python eggs way bundling additional information python project allows project dependencies checked satisfied runtime well allowing projects provide plugins projects python pip replaced easyinstall easyinstall package manager python provides standard format distributing python programs libraries based python eggs format easyinstall module bundled setuptools analogous rubygems ruby easyinstall fully fledged package manager list local packages update pip python package manager pypm python applications designed fulfill similar role easyinstall distribute fork created specifically due lack progress easyinstall development default easyinstall looks python package index pypi desired packages uses metadata download install package dependencies
[ 5629, 8055, 2451, 5983, 2091, 5200, 4759, 5545, 6609, 1260, 5726, 4675, 7619, 7251, 5912, 6428, 3366, 5386, 4778, 5571, 578, 2034, 4603, 4059, 7092, 6367, 7555, 6029, 6743, 3889, 3559, 2771, 326, 3036, 3562, 1582, 2594, 7848, 4441, 1406, ...
Test
2,772
2
Windows_Desktop_Gadgets:windows desktop gadgets windows desktop gadgets called windows sidebar windows vista discontinued widget engine microsoft gadgets introduced windows vista features sidebar anchored side desktop widgets perform various tasks displaying time date windows vista widgets restricted sidebar windows 7 freely moved anywhere desktop windows desktop gadgets discontinued windows 8 windows 8 live tiles perform similar function visible start menu visible run restrictive environment making less risky also less useful purposes like system monitoring windows sidebar originated microsoft research project called sideshow confused windows sideshow developed summer 2000 used internally microsoft included clock traffic reports im integration windows sidebar appeared build 3683 windows vista circa september 2002 originally intended replace notification area quick launch toolbar windows plans scrapped development reset mid-2004 windows sidebar rebuilt began appear windows vista builds second half 2005 reviewers macintosh enthusiasts pointed sidebar similarities form function konfabulator yahoo widget engine appeared several years previously dashboard widget engine first included apple inc. mac os x v10.4 released months earlier windows 7 windows sidebar renamed windows desktop gadgets sidebar included windows 7 windows desktop gadgets included beta releases windows 8 make final release instead 10 july 2012 intervening time last beta windows 8 final release microsoft issued security advisory disable sidebar desktop gadgets windows vista 7 security vulnerability could allow remote code execution windows desktop gadgets feature windows vista windows 7 excluding windows server family operating system hosts mini-applications gadgets combination scripts html code use cases include displaying system time downloading displaying rss feeds controlling software windows media player windows vista gadgets run docked sidebar windows 7 float anywhere desktop also possible run multiple instances gadget simultaneously windows vista 7 sidebar also works windows xp windows vista ships eleven gadgets calendar clock contacts cpu meter currency conversion feed headlines notes picture puzzle slide show stocks weather several gadgets available vista beta app launcher feed viewer number puzzle recycle bin egg timer never made final release windows vista windows 7 adds media center gadget removes contacts notes stocks gadgets originally microsoft provided link web site called windows live gallery additional sidebar gadgets created third-party developers could downloaded site officially retired october 1 2011
[ 7879, 3937, 3263, 378, 2198, 6096, 3967, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 6136, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, ...
Test
2,773
3
Forward_compatibility:forward compatibility forward compatibility upward compatibility design characteristic allows system accept input intended later version concept applied entire systems electrical interfaces telecommunication signals data communication protocols file formats computer programming languages standard supports forward compatibility product complies earlier versions gracefully process input designed later versions standard ignoring new parts understand objective forward compatible technology old devices recognise data generated new devices forward compatibility older system usually means backward compatibility new system i.e ability process data old system new system usually full compatibility older one able process generate data format older system forward compatibility extensibility forward compatible design process least data future version extensible design makes upgrading easy example design ideas found web browsers point time current browser forward compatible gracefully accepts newer version html whereas easily browser code upgraded process newer html determines extensible introduction fm stereo transmission color television allowed forward compatibility since monophonic fm radio receivers black-and-white tv sets still could receive signal new transmitter also allowed backward compatibility since new receivers could receive monophonic black-and-white signals generated old transmitters html designed treat tags way inert unstyled inline elements unless appearance behavior overridden either browser default settings scripts styles included page makes new features degrade gracefully older browsers one case work intended script style blocks whose content meant interpreted browser instead part page cases dealt enclosing content within comment blocks products designed forward compatible referred nuc upwardly compatible cases might intentional designers form vendor lock-in software regression example cubicle producer considers changing cubicle design one designer promotes changing footprint 4 foot square 1.2 meter square immediately sales manager calls nuc problem understood footprint changes existing customers considering buying producer fit different sized unit office designed 4 foot square cubicle planned obsolescence type upward compatibility rather adopting policy backwards compatibility companies adopt commercial policy backwards incompatibility newer apps require newer devices
[ 4212, 97, 1534, 7631, 5034, 5656, 4705, 6748, 3809, 3904, 519, 5694, 5079, 174, 2079, 4748 ]
Validation
2,774
4
Covert_channel:covert channel computer security covert channel type attack creates capability transfer information objects processes supposed allowed communicate computer security policy term originated 1973 lampson defined channels intended information transfer service program effect system load distinguish legitimate channels subjected access controls compusec covert channel called hidden access control mechanisms secure operating systems since use legitimate data transfer mechanisms computer system typically read write therefore detected controlled security mechanisms underlie secure operating systems covert channels exceedingly hard install real systems often detected monitoring system performance addition suffer low signal-to-noise ratio low data rates typically order bits per second also removed manually high degree assurance secure systems well established covert channel analysis strategies covert channels distinct often confused legitimate channel exploitations attack low-assurance pseudo-secure systems using schemes steganography even less sophisticated schemes disguise prohibited objects inside legitimate information objects legitimate channel misuse steganography specifically form covert channel covert channels tunnel secure operating systems require special measures control covert channel analysis proven way control covert channels contrast secure operating systems easily prevent misuse legitimate channels distinguishing important analysis legitimate channels hidden objects often misrepresented successful countermeasure legitimate channel misuse amounts analysis large amounts software shown early 1972 impractical without informed misled believe analysis manage risk legitimate channels trusted computer security evaluation criteria tcsec set criteria deprecated established national computer security center agency managed united states national security agency lampson definition covert channel paraphrased tcsec specifically refer ways transferring information higher classification compartment lower classification shared processing environment difficult completely insulate one process effects another process operating environment covert channel created sender process modulates condition free space availability service wait time execute detected receiving process tcsec defines two kinds covert channels tcsec also known orange book requires analysis covert storage channels classified b2 system analysis covert timing channels requirement class b3 use delays packets transmitted computer networks first explored girling covert communication work motivated many works establish detect covert communication analyze fundamental limitations scenarios ordinary things existence file time used computation medium covert channel communicates covert channels easy find media numerous frequently used two relatively old techniques remain standards locating potential covert channels one works analyzing resources system works source-code level possibility covert channels completely eliminated although significantly reduced careful design analysis detection covert channel made difficult using characteristics communications medium legitimate channel never controlled examined legitimate users example file opened closed program specific timed pattern detected another program pattern interpreted string bits forming covert channel since unlikely legitimate users check patterns file opening closing operations type covert channel remain undetected long periods similar case port knocking usual communications timing requests irrelevant unwatched port knocking makes significant handel sandford presented research study covert channels within general design network communication protocols employ osi model basis development characterize system elements potential used data hiding adopted approach advantages standards opposed specific network environments architectures considered study aim present foolproof steganographic schemes rather establish basic principles data hiding seven osi layers besides suggesting use reserved fields protocols headers easily detectable higher network layers also propose possibility timing channels involving csma/cd manipulation physical layer work identifies covert channel merit covert channel analysis consider issues interoperability data hiding techniques network nodes covert channel capacity estimation effect data hiding network terms complexity compatibility moreover generality techniques fully justified practice since osi model exist per se functional systems girling first analyzes covert channels network environment work focuses local area networks lans three obvious covert channels two storage channel one timing channel identified demonstrates real examples bandwidth possibilities simple covert channels lans specific lan environment author introduced notion wiretapper monitors activities specific transmitter lan covertly communicating parties transmitter wiretapper covert information according girling communicated following obvious ways scenario transmits covert information when-is-sent ” strategy therefore termed timing covert channel time transmit block data calculated function software processing time network speed network block sizes protocol overhead assuming block various sizes transmitted lan software overhead computed average novel time evaluation used estimate bandwidth capacity covert channels also presented work paves way future research focusing ip tcp headers tcp/ip protocol suite article published craig rowland devises proper encoding decoding techniques utilizing ip identification field tcp initial sequence number acknowledge sequence number fields techniques implemented simple utility written linux systems running version 2.0 kernels rowland provides proof concept well practical encoding decoding techniques exploitation covert channels using tcp/ip protocol suite techniques analyzed considering security mechanisms like firewall network address translation however non-detectability covert communication techniques questionable instance case sequence number field tcp header manipulated encoding scheme adopted every time alphabet covertly communicated encoded sequence number moreover usages sequence number field well acknowledgment field made specific ascii coding english language alphabet proposed since fields take account receipt data bytes pertaining specific network packet rowland several authors academia published work covert channels tcp/ip protocol suite including plethora countermeasures ranging statistical approaches machine learning research network covert channels overlaps domain network steganography emerged later
[ 7090, 2879, 3552, 3100, 4814, 3775, 3037, 6419, 4304, 1706, 4652, 1805 ]
Test
2,775
9
ALF_(proof_assistant):alf proof assistant alf another logical framework structure editor monomorphic martin-löf type theory developed chalmers university predecessor alfa agda cayenne coq proof assistants dependently typed programming languages first language support inductive families dependent pattern matching
[ 4405, 703 ]
Validation
2,776
3
High-availability_cluster:high-availability cluster high-availability clusters also known ha clusters fail-over clusters groups computers support server applications reliably utilized minimum amount down-time operate using high availability software harness redundant computers groups clusters provide continued service system components fail without clustering server running particular application crashes application unavailable crashed server fixed ha clustering remedies situation detecting hardware/software faults immediately restarting application another system without requiring administrative intervention process known failover part process clustering software may configure node starting application example appropriate file systems may need imported mounted network hardware may configured supporting applications may need running well ha clusters often used critical databases file sharing network business applications customer services electronic commerce websites ha cluster implementations attempt build redundancy cluster eliminate single points failure including multiple network connections data storage redundantly connected via storage area networks ha clusters usually use heartbeat private network connection used monitor health status node cluster one subtle serious condition clustering software must able handle split-brain occurs private links go simultaneously cluster nodes still running happens node cluster may mistakenly decide every node gone attempt start services nodes still running duplicate instances services may cause data corruption shared storage ha clusters often also use quorum witness storage local cloud avoid scenario witness device shared two halves split cluster event cluster members communicate e.g. failed heartbeat member access witness become active every application run high-availability cluster environment necessary design decisions need made early software design phase order run high-availability cluster environment application must satisfy least following technical requirements last two critical reliable function cluster difficult satisfy fully common size ha cluster two-node cluster since minimum required provide redundancy many clusters consist many sometimes dozens nodes attached diagram good overview classic ha cluster caveat make mention quorum/witness functionality see configurations sometimes categorized one following models terms logical host cluster logical host used describe network address used access services provided cluster logical host identity tied single cluster node actually network address/hostname linked service provided cluster cluster node running database goes database restarted another cluster node ha clusters usually use available techniques make individual systems shared infrastructure reliable possible include features help minimize chances clustering failover systems required failover service provided unavailable least little measures avoid failover preferred systems handle failures distributed computing different strategies cure failure instance apache cassandra api hector defines three ways configure failover several free commercial solutions available
[ 625, 3256, 3180, 6426, 2291, 5738, 3542, 3797, 1391, 5408, 2674, 3396, 4530, 4624, 5337, 8130, 6771, 2254, 5706, 2442 ]
Train
2,777
3
Wizzy_Active_Lifestyle_Telephone:wizzy active lifestyle telephone wizzy active lifestyle telephone w.a.l.t prototype phone companion created apple computer collaboration bellsouth w.a.l.t featured touchscreen fax functionality on-display caller id built-in address book customizable ringtones online banking access system based powerbook 100 included touchscreen stylus handwriting recognition operating system based system 6 hypercard gui announced 1993 system mass-produced prototype machine sold ebay 2012 2019 video demonstration prototype machine uploaded internet
[ 6788, 7890, 5732, 722, 1094, 2926, 5037, 5752, 6125, 2954, 7572, 6482, 6847, 6142, 4373, 7226, 2978, 7601, 4749, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 1940, 3025, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 1234, 3412, 7311, ...
Train
2,778
9
Logic_of_Computable_Functions:logic computable functions logic computable functions lcf deductive system computable functions proposed dana scott 1969 memorandum unpublished 1993 inspired
[ 7009, 4405, 7707, 6995, 7717 ]
Validation
2,779
4
Guard_(information_security):guard information security information security guard device system allowing computers otherwise separate networks communicate subject configured constraints many respects guard like firewall guards may similar functionality gateway whereas firewall designed limit traffic certain services guard aims control information exchange network communication supporting business level unlike firewall guard provides assurance effective providing control even attack failure conditions guard typically sit protected network external network ensure protected network safe threats posed external network leaks sensitive information external network guard usually dual-homed though guards connect two networks acts full application layer proxy engaging separate communications interface guard pass business information carried protocols one network another information passes configured checks provide required protection development guards began late 1970s creation several secure communications processors guard applications secure communications processors high assurance operating systems security kernels developed support controlled plain-text bypasses packet network encryption devices guard applications designed sanitise data exported classified system remove sensitive information honeywell secure communications processor scomp early guard platform evaluated dod computer security center orange book evaluation criteria level a1 rsre secure user environment sue ran pdp-11/34 simple separation kernel designed constructed t4 division royal signals radar establishment rsre malvern england advanced command control architectural testbed accat guard developed export email classified system human review stage later developments guards addressed problem automatic downgrading information exported classified system secure network server sns mail guard smg enforced source/destination address whitelists security label checks attachment type filtering digital signatures ensure sensitive information released firewalls later development arriving around 1987 time functionality firewalls increased provide similar capabilities guards main difference remaining guards built way provide assurance effective protecting network swipsy firewall toolkit developed defence evaluation research agency act general guard platform swipsy layered top trusted solaris 8 guards initially designed control release information classified systems protecting confidentiality sensitive information handled protected system since scope extended cover controls import data order protect integrity information availability services protected network guards generally provide following functionality guards functionally equivalent bastion host acting application proxy placed within dmz network proxy imposes necessary controls data exchanged provide protection external threats internal leaks distinguished way constructed dmz network relies outer packet filtering firewalls route traffic bastion host firewalls function incorrectly may pass traffic dmz without passing bastion host checks imposed proxies bypassed also networking stack bastion host behaves incorrectly may route traffic dmz without passing proxies guard constructed software needs function correctly minimised work needed demonstrate third party also minimised guards engineered provide assurance apply appropriate checks guards use trusted operating system separate security critical checker components less critical protocol handling components way failure protocol handling components cause data bypass checker example security-enhanced linux used nexor guards solaris 10 trusted extensions used radiant mercury isse guard deep-secure type enforcement controls developed lock operating system used sidewinder guards also use physically separate computers ensure critical components bypassed government-off-the-shelf products commercial-off-the-shelf products
[ 7122, 2879, 3386, 7725, 7709, 3112, 3338, 1706, 3226, 3449 ]
Test
2,780
6
RozoFS:rozofs rozofs free software distributed file system comes free software licensed gnu gpl v2 rozofs uses erasure coding redundancy rozo provides open source posix filesystem built top distributed file system architecture similar google file system lustre ceph rozo specificity lies way data stored data stored translated several chunks using mojette transform distributed across storage devices way retrieved even several pieces unavailable hand chunks meaningless alone redundancy schemes based coding techniques like one used rozofs allow achieve significant storage savings compared simple replication file system comprises three components rozo systems invited snia data storage innovation conference june 2016
[ 1624, 5965, 5571, 2683, 578, 2442, 1435, 2536 ]
Test
2,781
3
Motorola_68012:motorola 68012 motorola mc68012 processor 16/32-bit microprocessor early 1980s 84-pin pga version motorola mc68010 memory space extended 2 gb read-modify-write cycle rmc pin indicating indivisible read-modify-write cycle progress added order help design multiprocessor systems virtual memory processors hold memory accesses cycle complete features mc68010 preserved expansion memory space caused issue programs used high byte address store data programming trick successful processors 24-bit address bus 68000 68010 similar problem affected 68020
[ 5097, 7327, 5100, 1075, 4479, 1454, 5652, 3708, 7905, 7990, 6111, 4702, 1386, 7654, 2133, 234, 2501, 2785, 5079, 5614, 2257, 7133, 3674, 2353, 5622 ]
Test
2,782
4
Cybergeddon:cybergeddon cybergeddon tech cyber- lit computer hebrew megiddo extracted har megiddo mountain final battle refers cataclysm resulting large-scale sabotage computerized networks systems activities combines cyberterrorism cyberwarfare cybercrime hacktivism scenarios wide-scale internet disruption economic collapse economic industrial infrastructure could targeted banks industrial control systems since 2012 amount internet-based attacks complexity increased cybergeddon possibility fireeye ceo ashar aziz explained interview bloomberg attacks critical infrastructures power grid financial institutions could wreak havoc united states economy fact world economy
[ 6756, 3480, 3875 ]
Test
2,783
1
Skyline_operator:skyline operator skyline operator subject optimization problem used query filter results database keep objects worse operator extension sql proposed börzsönyi et al classic example application skyline operator involves selecting hotel holiday user wants hotel cheap close beach however hotels close beach may also expensive case skyline operator would present hotels worse hotel price distance beach give example sql börzsönyi et al proposed following syntax skyline operator ... denote dimensions skyline min max diff specify whether value dimension minimised maximised simply different skyline operator implemented directly sql using current sql constructs however shown slow algorithms proposed make use divide conquer indices mapreduce general-purpose computing graphics cards skyline queries data streams i.e continuous skyline queries studied context parallel query processing multicores owing wide diffusion real-time decision making problems data streaming analytics
[ 5939, 7924 ]
Test
2,784
4
Microsoft_Forefront:microsoft forefront microsoft forefront discontinued family line-of-business security software microsoft corporation microsoft forefront products designed help protect computer networks network servers microsoft exchange server microsoft sharepoint server individual devices 2015 actively developed forefront product forefront identity manager forefront includes following products predecessor forefront server protection products antigen line antivirus products created sybari software sybari acquired microsoft 2005 first microsoft-branded version product called microsoft forefront security sharepoint fssp version 10 fssp version 10 supports microsoft office sharepoint server 2007 microsoft windows sharepoint services version 3 whereas fpsp last version product supports microsoft office sharepoint server 2010 microsoft sharepoint foundation 2010 microsoft office sharepoint server 2007 sp1 windows sharepoint services version 3 sp1
[ 5452, 1620, 3172, 1721, 3962, 2566, 5227, 3551, 7564, 330, 6762, 7867 ]
Train