node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,785
3
Motorola_68008:motorola 68008 motorola 68008 8/16/32-bit microprocessor made motorola version motorola 68000 8-bit external data bus well smaller address bus original 68000 introduced 1979 24-bit address bus 16-bit data bus relatively large buses made hard design low-cost system based 68000 difficult lay circuit board needed lot supporting circuitry 16-bit data bus also required twice many memory chips 8-bit one 68008 introduced 1982 designed work low-cost 8-bit memory systems smaller data bus half fast 68000 clock speed however still faster competing 8-bit microprocessors 68008 internally based 32-bit data registers 16-bit data bus except smaller data address buses 68008 behaved identically 68000 internal organization microarchitecture 68008 hmos chip came speed grade two distinct versions chip original version came 48-pin dual in-line package 20-bit address bus allowing use 1 megabyte memory later version came 52-pin plastic leaded chip carrier version provided 22-bit address bus could support ram computer systems used 68008 main processor sinclair ql personal computer best known however 68008 popular embedded systems motorola ended production 68008 1996
[ 5097, 7327, 5100, 1075, 4479, 1454, 5652, 3708, 7905, 7990, 6111, 2036, 4702, 1386, 7654, 2133, 234, 2501, 2781, 2602, 5079, 5614, 2257, 7133, 3674, 2353, 5622 ]
Test
2,786
2
Project_Trillian:project trillian project trillian effort industry consortium port linux kernel itanium processor project started may 1999 goal releasing distribution time initial release itanium scheduled early 2000 end 1999 project included caldera systems cern cygnus solutions hewlett-packard ibm intel red hat sgi suse turbolinux va linux systems project released resulting code february 2000 code became part linux baseline kernel year release first itanium processor trillian project able two reasons successful completion project trillian resulting linux kernel used manufacturers itanium systems hp ibm dell sgi fujitsu unisys hitachi groupe bull notable exception hp linux either primary os os manufacturer supports itanium ongoing free open source software support linux itanium subsequently coalesced gelato
[ 7605, 4291, 3764, 3849, 6705, 8173, 7172, 5571, 4421, 578, 402, 839, 7010, 4428, 607, 2431, 3664, 6849, 6586, 265, 1516, 1994 ]
Train
2,787
2
Freeciv:freeciv freeciv single- multiplayer turn-based strategy game workstations personal computers inspired proprietary sid meier civilization series available desktop computer operating systems available online browser based version released gnu general public license freeciv free open source software game default settings closest civilization ii gameplay graphics including units isometric grid players take role tribal leaders 4000 b.c must guide peoples centuries time new technologies discovered allow construction new city buildings deployment new units players wage war one another form diplomatic relationships game ends one civilization eradicated others accomplished goal space colonization given deadline one civilization remains deadline player highest score wins points awarded size civilization wealth cultural scientific advances computer science department aarhus university three students avid players xpilot sid meier civilization stand-alone pc game ms-dos decided find whether two could fused x-based multiplayer civilization-like strategy game students—peter unold claus leth gregersen allan ove kjeldbjerg—started development november 1995 first playable version released january 1996 bugfixing small enhancements april rules game close civilization client/server architecture basically xpilot developers freeciv 1.0 successful proof concept rather boring game went back xpilot players developers took made game available many operating systems including linux solaris ultrix amiga os microsoft windows linux distributions started include freeciv main development goal remained make civilization-like game playable internet participants different continents even connected 14400 bit/s modems freeciv achieved using asynchronous client-server protocol turn human users play concurrently actions sent server processing without awaiting results kept game playable network latency hundreds milliseconds 1998 computer players added could soon beat newcomers game ease using minor forms cheating computer players implemented directly server play concurrently human players separately turns game grew popularity public server installed games could played around clock retained games published post-game analysis webpage per-player statistics animated map replay subsequent 1.x releases improved gui improved gameplay added many small features time winning strategy proved city smallpox sprawling map many small cities fast possible whoever could develop fastest would win game growing developing individual cities n't worthwhile practice around 2002 experienced players would form teams start game fork freeciv included specific features team play version 2.0 released 2005 introduced several important changes became beneficial develop large cities full trade routes advanced technologies re-balancing various costs benefits introduction team playing features advanced diplomacy made coop gaming attractive developing one empire necessitated careful plan city development including phases rapture city populations grow quickly relatively peaceful conditions hence games almost always played teams typically took longer finish compared 1.x games 2006 tcp udp port number 5556 assigned freeciv iana 2017 hosted gna 15 years freeciv moved source repository github freeciv configurable specific rules played freeciv default mode civilization mode civilization ii mode custom mode one several players act game administrators configure game rules typically modified rules order play game freeciv user must start freeciv client connect freeciv server initially server pre-game phase phase clients connect game configuration parameters changed point server may ordered start game response creates game players nations game map assigns every player either freeciv client computer player specified configuration point game run ends terminated server never get back pre-game state user also start game directly client automatically starts freeciv server connects starts game freeciv graphics system configurable originally map display always overhead mode like civ isometric mode like civ ii iii optionally hexagonal tiling like civ v vi added later modes look customized switching alternative set graphics called tileset sounds replaced well freeciv supports human-to-human multiplayer gameplay artificial intelligence ai computer players game turn based human players move simultaneously ai players move separately partly start turn partly end releases 2.0 ai players could engage diplomatic relationships human players current releases ai players engage predictable rules-based diplomacy version 2.2.0 included map editor termed civworld create new scenarios well edit map currently played basic scripting available freeciv available civworld version 2.3 increased limit players 30 126 different clients available sdl gtk+ version3 xaw3d qt client added version 2.5 freeciv interface available 30 different languages addition gaelic covered bbc tv originally developed irix freeciv ported many different operating systems distributed many linux distributions offers installers microsoft windows known run mac os x morphos solaris ultrix qnx os/2 cygwin amigaos aros risc os maemo zeta skyos various bsds smartphones tablets running android version 2.4 mac os x version 2.3 windows versions older windows xp sp3 longer supported freeciv available portableapps format freeciv-web version freeciv playable online modern web browser supports 2d isometric graphics 3d graphics using webgl 3d version referred freeciv webgl 3d game fork freeciv project goal redesigning desktop game version played online freeciv-web introduced several new features play-by-email support freely available anyone online support playing game real-world map location choosing map using mapbox available commercial games genre game default settings closest civilization ii gameplay graphics including units isometric grid proposal create web-version freeciv made 6 april 2007 freeciv mailing lists documented freeciv.org wiki freeciv-web originally created andreas røsdal maintained several freeciv developers github freeciv-web free open source software freeciv c server released gnu general public license freeciv-web client released gnu affero general public license freeciv-web supports human-to-human multiplayer gameplay artificial intelligence ai computer players features similar freeciv c client although user-interface ported c client yet freeciv-web played online number servers two frequented http //www.freecivweb.org/ http //freeciv.xyz/ features required play full game freeciv place including rendering isometric map technology research many dialogs managing cities units players game also supports scenario-games includes maps world north america france italy japan iberian peninsula servers offer multiple varieties game single-player multiplayer free-for-all play-by-email longturn freeciv-web formerly playable play.freeciv.org march 3 2018 play.freeciv.org shut project revived april 8 group volunteers freecivweb.org freeciv longturn specialized large-group-multiplayer-online-strategy lagmos variant freeciv featuring daylong game turns large amounts human opponents per map allowing optimal timing build strategic plans readapt circumstances turn matches last anytime weeks months commonly involve 20 30 players one longturn first game called lt0 started around 2004 polish civilization fanpage civ.org.pl conducted longturn.net decided game bit slow paced new 3x movement ruleset devised – basically units movement points vision radius tripled july 2019 latest game lt47 changes settings rulesets discussed longturn forum greatturn similar concept another server since 2017 freeciv-web offers similar one turn per day variant gacivs mmo-rts variant freeciv ruleset devised support time-based instead turn-based strategy 2000 cnn placed freeciv among top 10 linux games holidays 2005 o'reilly article open source mac gaming freeciv recommended 2008 apcmag.com named freeciv among top 5 best free open source games linux format selected hotpick april 2010 october 2014 freeciv described example art unix programming eric s. raymond studies courses used freeciv platform experimenting design programming intelligent agents 2016 freeciv used challenge chess go commercial ai
[ 2451, 2720, 3172, 4759, 3368, 7637, 5571, 578, 6367, 6380, 7848, 768, 2787, 7310, 261, 1435 ]
Validation
2,788
2
OmniROM:omnirom omnirom open-source operating system smartphones tablet computers based android mobile platform involves number prominent developers projects omnirom founded reaction commercialisation rom project cyanogenmod launch project provided custom firmware based android jelly bean moved android kitkat shortly release kitkat firmware included support galaxy note ii galaxy note galaxy s3 galaxy s4 nexus 4 nexus 5 nexus 7 2012 lg optimus g galaxy s2 htc one 2013 oppo find 5 sony xperia acer iconia a500 htc explorer lenovo a6000 june 2015 project started release nightly builds based android lollipop asus transformer pad asus transformer pad infinity nexus 4 nexus 5 nexus 6 nexus 7 nexus 10 oppo find 7/7a oneplus one sony xperia z sony xperia zl project working new version firmware based android pie
[ 3933, 5372, 6427, 1095, 740, 4340, 42, 3310, 2591, 5771, 5775, 7956, 5473, 474, 6183, 822, 5486, 136, 6209, 6937, 6232, 3751, 4116, 5195, 2003, 195, 6978, 7346, 561, 201, 2017, 5919, 7357, 5571, 2398, 578, 2037, 2756, 5232, 7007, 7749, ...
Test
2,789
4
Internet_security:internet security internet security branch computer security specifically related internet often involving browser security world wide web also network security applies applications operating systems whole objective establish rules measures use attacks internet internet represents insecure channel exchanging information leads high risk intrusion fraud phishing online viruses trojans worms many methods used protect transfer data including encryption from-the-ground-up engineering current focus prevention much real time protection well known new threats internet user tricked forced downloading software malicious intent onto computer software comes many forms viruses trojan horses spyware worms denial-of-service attack dos attack distributed denial-of-service attack ddos attack attempt make computer resource unavailable intended users another way understanding ddos seeing attacks cloud computing environment growing due essential characteristics cloud computing although means carry motives targets dos attack may vary generally consists concerted efforts prevent internet site service functioning efficiently temporarily indefinitely according businesses participated international business security survey 25 respondents experienced dos attack 2007 16.8 experienced one 2010 dos attacks often use bots botnet carry attack phishing attack targets online users extraction sensitive information username password credit card information phishing occurs attacker pretends trustworthy entity either via email web page victims directed fake web pages dressed look legitimate via spoof emails instant messenger/social media avenues often tactics email spoofing used make emails appear legitimate senders long complex subdomains hide real website host insurance group rsa said phishing accounted worldwide losses 10.8 billion 2016 applications used access internet resources may contain security vulnerabilities memory safety bugs flawed authentication checks severe bugs give network attackers full control computer security applications suites incapable adequate defense kinds attacks common widespread web-browser application vulnerability so-called cross-origin resource sharing vulnerability- maximum security privacy make sure adopt adequate countermeasures example patches provided webkit-based browsers tcp/ip protocols may secured cryptographic methods security protocols protocols include secure sockets layer ssl succeeded transport layer security tls web traffic pretty good privacy pgp email ipsec network layer security ipsec designed protect tcp/ip communication secure manner set security extensions developed internet task force ietf provides security authentication ip layer transforming data using encryption two main types transformation form basis ipsec authentication header ah esp two protocols provide data integrity data origin authentication anti-replay service protocols used alone combination provide desired set security services internet protocol ip layer basic components ipsec security architecture described terms following functionalities set security services provided ip layer includes access control data origin integrity protection replays confidentiality algorithm allows sets work independently without affecting parts implementation ipsec implementation operated host security gateway environment giving protection ip traffic multi-factor authentication mfa method computer access control user granted access successfully presenting several separate pieces evidence authentication mechanism – typically least two following categories knowledge something know possession something inherence something internet resources websites email may secured using multi-factor authentication online sites offer customers ability use six-digit code randomly changes every 30–60 seconds security token keys security token built mathematical computations manipulate numbers based current time built device means every thirty seconds certain array numbers possible would correct validate access online account website user logging would made aware device serial number would know computation correct time built device verify number given indeed one handful six-digit numbers works given 30-60 second cycle 30–60 seconds device present new random six-digit number log website email messages composed delivered stored multiple step process starts message composition user finishes composing message sends message transformed standard format rfc 2822 formatted message afterwards message transmitted using network connection mail client referred mail user agent mua connects mail transfer agent mta operating mail server mail client provides sender ’ identity server next using mail server commands client sends recipient list mail server client supplies message mail server receives processes message several events occur recipient server identification connection establishment message transmission using domain name system dns services sender ’ mail server determines mail server recipient server opens connection recipient mail server sends message employing process similar used originating client delivering message recipient pretty good privacy provides confidentiality encrypting messages transmitted data files stored using encryption algorithm triple des cast-128 email messages protected using cryptography various ways following first two methods message signing message body encryption often used together however encrypting transmissions mail servers typically used two organizations want protect emails regularly sent example organizations could establish virtual private network vpn encrypt communications mail servers internet unlike methods encrypt message body vpn encrypt entire messages including email header information senders recipients subjects cases organizations may need protect header information however vpn solution alone provide message signing mechanism provide protection email messages along entire route sender recipient mime transforms non-ascii data sender site network virtual terminal nvt ascii data delivers client simple mail transfer protocol smtp sent internet server smtp receiver side receives nvt ascii data delivers mime transformed back original non-ascii data message authentication code mac cryptography method uses secret key encrypt message method outputs mac value decrypted receiver using secret key used sender message authentication code protects message data integrity well authenticity computer firewall controls access networks generally consists gateways filters vary one firewall another firewalls also screen network traffic able block traffic dangerous firewalls act intermediate server smtp hypertext transfer protocol http connections firewalls impose restrictions incoming outgoing network packets private networks incoming outgoing traffic must pass firewall authorized traffic allowed pass firewalls create checkpoints internal private network public internet also known choke points borrowed identical military term combat limiting geographical feature firewalls create choke points based ip source tcp port number also serve platform ipsec using tunnel mode capability firewall used implement vpns firewalls also limit network exposure hiding internal network system information public internet packet filter first generation firewall processes network traffic packet-by-packet basis main job filter traffic remote ip host router needed connect internal network internet router known screening router screens packets leaving entering network stateful firewall circuit-level gateway proxy server operates network level open systems interconnection osi model statically defines traffic allowed circuit proxies forward network packets formatted unit data containing given port number port permitted algorithm main advantage proxy server ability provide network address translation nat hide user ip address internet effectively protecting internal information internet application-level firewall third generation firewall proxy server operates top osi model ip suite application level network packet forwarded connection established using known protocol application-level gateways notable analyzing entire messages rather individual packets data data sent received web browser statistics tend affect amount web browser exploited example internet explorer 6 used majority web browser market share considered extremely insecure vulnerabilities exploited due former popularity since browser choice evenly distributed internet explorer 28.5 firefox 18.4 google chrome 40.8 vulnerabilities exploited many different browsers antivirus software internet security programs protect programmable device attack detecting eliminating malware antivirus software mainly shareware early years internet several free security applications internet choose platforms password manager software application helps user store organize passwords password managers usually store passwords encrypted requiring user create master password single ideally strong password grants user access entire password database top bottom called security suites first offered sale 2003 mcafee contain suite firewalls anti-virus anti-spyware also offer theft protection portable storage device safety check private internet browsing cloud anti-spam file shredder make security-related decisions answering popup windows several free charge
[ 2173, 3932, 4292, 6413, 7151, 6417, 6419, 2914, 1461, 3281, 4689, 730, 2566, 4325, 3633, 7186, 2577, 5401, 6823, 51, 7925, 5773, 3999, 6483, 2961, 69, 4734, 74, 3338, 4014, 84, 7597, 1513, 7600, 3680, 3681, 4025, 794, 2632, 6515, 2996, ...
Test
2,790
4
Shorewall:shorewall shorewall open source firewall tool linux builds upon netfilter iptables/ipchains system built linux kernel making easier manage complex configuration schemes providing higher level abstraction describing rules using text files daemon since run continuously rather configures rules kernel allow disallow traffic system shorewall configured group plain-text configuration files graphical user interface though webmin module available separately monitoring utility packaged shorewall used watch status system operates assist testing shorewall mainly used network installations opposed personal computer firewall since strength lies ability work zones dmz 'net zone zone would different rules making easy example relaxed rules company intranet yet clamp traffic coming internet plain-text configuration files usually well-commented easy use though shorewall may difficult new users handle firewall systems graphical front-ends recent stable version 5.2.3 18 february 2019 primary developer tom eastep announced retiring project 5.2.3 would final release starting version 4 shorewall began using perl-based compiler frontend previously used shell-based compiler frontend support ipv6 firewalling included since version 4.2.4
[ 1249, 3165, 1809, 5983, 4759, 806, 994, 3185, 4492, 7351, 4138, 385, 7536, 2296, 2746, 5571, 6107, 578, 3637, 8100, 6456, 3551, 1291, 7275, 7744, 3394, 6560, 4977, 7289, 7478, 3223, 3484, 4091, 7683, 6235, 6149, 6951, 7597, 875, 6962 ]
Test
2,791
4
Zero-day_(computing):zero-day computing zero-day also known 0-day vulnerability computer-software vulnerability unknown unaddressed interested mitigating vulnerability including vendor target software vulnerability mitigated hackers exploit adversely affect computer programs data additional computers network exploit directed zero-day called zero-day exploit zero-day attack jargon computer security day zero day interested party presumably vendor targeted system learns vulnerability leading vulnerability called zero-day vendor learns vulnerability vendor usually create patches advise workarounds mitigate fewer days since day zero higher chance fix mitigation developed even fix developed fewer days since day zero higher probability attack afflicted software successful every user software applied fix zero-day exploits unless vulnerability inadvertently fixed e.g unrelated update happens also obviate need fix specific vulnerability probability user applied vendor-supplied patch fixes problem zero exploit would remain available zero-day attacks severe threat malware writers exploit zero-day vulnerabilities several different attack vectors sometimes users visit rogue websites malicious code site exploit vulnerabilities web browsers web browsers particular target criminals widespread distribution usage cybercriminals well international vendors spyware israel ’ nso group also send malicious e-mail attachments via smtp exploit vulnerabilities application opening attachment exploits take advantage common file types numerous frequent evidenced increasing appearances databases like us-cert criminals engineer malware take advantage file type exploits compromise attacked systems steal confidential data time software exploit first becomes active time number vulnerable systems shrinks insignificance known window vulnerability wov time-line software vulnerability defined following main events thus formula length window vulnerability – formulation always true ≤ ≤ t. note day zero example hacker first discover vulnerability vendor might learn much later day zero normal vulnerabilities – 0 implies software vendor aware vulnerability time publish security patch hacker could craft workable exploit zero-day exploits – ≤ 0 exploit became active patch made available disclosing known vulnerabilities software vendor hopes reach reached thus avoiding exploits however vendor guarantees hackers find vulnerabilities furthermore hackers analyze security patches thereby discover underlying vulnerabilities automatically generate working exploits exploits used effectively time t. practice size wov varies systems vendors individual vulnerabilities often measured days one report 2006 estimating average 28 days zero-day protection ability provide protection zero-day exploits since zero-day attacks generally unknown public often difficult defend zero-day attacks often effective secure networks remain undetected even launched thus users so-called secure systems must also exercise common sense practice safe computing habits many techniques exist limit effectiveness zero-day memory corruption vulnerabilities buffer overflows protection mechanisms exist contemporary operating systems macos windows vista beyond see also security safety features new windows vista solaris linux unix unix-like environments windows xp service pack 2 includes limited protection generic memory corruption vulnerabilities previous versions include even less desktop server protection software also exists mitigate zero-day buffer overflow vulnerabilities typically technologies involve heuristic termination analysis—stopping cause harm suggested solution kind may reach algorithmically impossible general case analyze arbitrary code determine malicious analysis reduces halting problem linear bounded automaton unsolvable however unnecessary address general case sort programs categories malicious non-malicious circumstances order eliminate wide range malicious behaviors suffices recognize safety limited set programs e.g. access modify given subset machine resources rejecting safe unsafe programs require integrity safe programs maintained may prove difficult face kernel level exploit zeroday emergency response team zert group software engineers worked release non-vendor patches zero-day exploits march 9 2017 press release vault 7 documents released wikileaks 2 days previously julian assange states much leak remainder included unpatched vulnerabilities working companies microsoft google get vulnerabilities patched would release information would put public risk fixes released manufacturers would release details vulnerabilities zero-day worms take advantage surprise attack still unknown computer security professionals recent history shows increasing rate worm propagation well designed worms spread fast devastating consequences internet systems differing ideologies exist relative collection use zero-day vulnerability information many computer security vendors perform research zero-day vulnerabilities order better understand nature vulnerabilities exploitation individuals computer worms viruses alternatively vendors purchase vulnerabilities augment research capacity example program tippingpoint zero day initiative selling buying vulnerabilities technically illegal parts world lot controversy method disclosure 2006 german decision include article 6 convention cybercrime eu framework decision attacks information systems may make selling even manufacturing vulnerabilities illegal formal programs follow form rain forest puppy disclosure guidelines recent ois guidelines security vulnerability reporting response general rules forbid public disclosure vulnerabilities without notification vendor adequate time produce patch zero-day virus also known zero-day malware next-generation malware previously unknown computer virus malware specific antivirus software signatures yet available traditionally antivirus software relies upon signatures identify malware effective defend malware unless samples already obtained signatures generated updates distributed users signature-based approaches effective zero-day viruses modern antivirus software still uses signatures also carries types analysis code analysis machine code file analysed see anything looks suspicious typically malware characteristic behaviour code analysis attempts detect present code although useful code analysis significant limitations always easy determine section code intended particularly complex deliberately written intention defeating analysis another limitation code analysis time resources available competitive world antivirus software always balance effectiveness analysis time delay involved one approach overcome limitations code analysis antivirus software run suspect sections code safe sandbox observe behavior orders magnitude faster analyzing code must resist detect attempts code detect sandbox generic signatures signatures specific certain behaviour rather specific item malware new malware totally novel variation earlier malware contains code one earlier examples malware thus results previous analysis used new malware generally accepted antivirus industry vendors signature-based protection identically effective signature available item malware every product unless dysfunctional detect however vendors significantly faster others becoming aware new viruses and/or updating customers signature databases detect wide range effectiveness terms zero-day virus protection german computer magazine c't found detection rates zero-day viruses varied 20 68 primarily area zero-day virus performance manufacturers compete mid-april 2017 hackers known shadow brokers tsb —allegedly linked russian government—released files nsa initially regarded alleged nsa later confirmed internal details snowden include series 'zero-day exploits targeting microsoft windows software tool penetrate society worldwide interbank financial telecommunication swift service provider ars technica reported shadow brokers hacking claims mid-january 2017 april shadow brokers posted exploits proof vulnerabilities equities process first revealed publicly 2016 process used u.s. federal government determine case-by-case basis treat zero-day computer security vulnerabilities whether disclose public help improve general computer security keep secret offensive use government adversaries process criticized number deficiencies including restriction non-disclosure agreements lack risk ratings special treatment nsa less whole-hearted commitment disclosure default option virus signature unique pattern code used detect identify specific viruses antivirus scans file signatures compares database known malicious codes match file flagged treated threat major limitation signature-based detection capable flagging already known malware making completely useless zero-day attacks chronological order
[ 3932, 4841, 7963, 4759, 2190, 6520, 4309, 5287, 2644, 998, 3528, 208, 1939, 7050, 578, 6908, 8100, 5401, 501, 7282, 671, 2327, 1037, 8123, 2427, 6575, 429, 1501, 7938, 6579, 1418, 3495, 5700, 1790, 2891, 6323, 5190, 1805, 6962 ]
Validation
2,792
3
DEC_Multia:dec multia multia later re-branded universal desktop box line desktop computers introduced digital equipment corporation 7 november 1994 line notable units offered either alpha axp intel pentium processor cpu hardware backplane cpu interchangeable alpha intel versions intended run windows nt multia compact case left little room expansion cards restricted air flow cause premature hardware failure due overheating properly cared enthusiasts remedy placing multia vertically instead horizontally allowing heated air escape via vents top although still requires preventing multia overheating due factors e.g environmental alpha multias included either alpha 21066 alpha 21066a microprocessor running 166 mhz 233 mhz respectively came 16 24 mb ram standard expandable 128 mb officially practice 256 mb 21066 budget version alpha 21064 processor narrower 64-bit versus 128-bit slower bus thus performance roughly equivalent pentium running 100 mhz integer operations superior floating-point furthermore standard ram capacity severe restriction performance workstations alpha-based multias came tga dec 21030 graphics adapter standard peripherals alpha intel models included scsi host adapter dec 21040 ethernet controller two pcmcia slots two rs-232 ports bi-directional parallel port 2.5 3.5 scsi ata hard disk 340 mb 1.6 gb ps/2 keyboard mouse ports pci slot models 2.5-inch hard disks multia models comprised 1996 digital began offering alpha multia without windows nt renamed line universal desktop box nicknamed udb prices quite low first time many enthusiasts hobbyists could afford alpha axp-based computer multia udb run windows nt alpha windows nt 4.0 service pack 6 although windows 2000 never officially released alpha platform windows 2000 beta released fact runs multia linux netbsd available multia additionally digital unix openvms configured run multia certain limitations although initially operating systems disabled running budget multia line alpha-based multia came configured arc firmware console running windows nt although srm also available intel-based multia used bios
[ 6256, 6170, 1727, 5911, 4859, 578, 5055, 2226, 5849, 1670, 8117, 7131, 1237, 4099, 352, 6784 ]
Test
2,793
0
Synchronous_context-free_grammar:synchronous context-free grammar synchronous context-free grammars syncfg scfg confused stochastic cfgs type formal grammar designed use transfer-based machine translation rules grammars apply two languages time capturing grammatical structures translations theory syncfgs borrows syntax-directed transduction syntax-based machine translation modeling reordering clauses occurs translating sentence correspondences phrase-structure rules source target languages performance scfg-based mt systems found comparable even better state-of-the-art phrase-based machine translation systems several algorithms exist perform translation using syncfgs rules syncfg superficially similar cfg rules except specify structure two phrases time one source language language translated one target language numeric indices indicate correspondences non-terminals constituent trees chiang gives chinese/english example rule indicates phrase formed chinese structure yu variables standing subphrases corresponding structure english independently translated english
[ 1032 ]
Test
2,794
2
IOS_4:ios 4 ios 4 fourth major release ios mobile operating system developed apple inc. successor iphone os 3 announced company worldwide developers conference june 7 2010 released june 21 2010. ios 4 first ios version issued ios rebranding dropping iphone os naming convention previous versions succeeded ios 5 october 12 2011. ios 4 introduced folders home screen significantly increasing number apps displayed support custom wallpapers also added although limited newer devices due animation performance requirements operating system also added multitasking feature letting apps dealing internet calling location audio playback function background whereas similar restricted fast app switching technology enabled app left inactive background users switch apps ios 4 also added system-wide spell checking feature enabled ibooks iphone unified mail inbox combine content different email providers introduced game center social gaming facetime video calling ios 4 update introduced performance battery problems iphone 3g devices apple investigating matter promising then-upcoming updates however company became subject lawsuit unsatisfied customer issues around time release iphone 4 subsequent antenna problems made apple focus unsuccessfully attempting patch issues software updates ios 4 introduced apple worldwide developers conference keynote address june 7 2010 notably first ios release named simply ios ditched iphone os naming pattern previous versions ios 4 officially released june 21 2010. ios 4.0.1 released july 15 2010 first update ios 4 update changed method calculating carrier signal strength improved accuracy ios 4.0.2 released august 11 2010 fix exploit taking advantage pdf file format vulnerabilities ios 4.1 released september 8 2010 update included high dynamic range hdr technology improved quality photos captured iphone 4 added game center social gaming network ability upload high definition videos captured iphone 4 youtube mobileme also featured bug fixes performance improvements ios 4.2.1 released november 22 2010 first version bring major ios 4 features introduced iphone ipad although ios 4.2 released developers testing purposes bugs discovered replaced 4.2.1 consumer release also last version ios run iphone 3g ipod touch 2nd generation due hardware limitations performance issues ios 4.2.5 announced january 11 2011 adding exclusive wi-fi hotspot support cdma version iphone 4. ios 4.3 released march 4 2011 adding support personal wi-fi hotspots itunes home sharing improvements airplay minor improvements ipad 1 run ios 4.3 due hardware restrictions ios 4.3.1 released march 25 2011 fix ipod touch screen glitches along stability improvements cellular connectivity iphone models ios 4.3.2 released april 14 2011 fixes frozen calls facetime connectivity issues cellular models ipad ios 4.3.3 released may 4 2011 fix location bugs ios 4.3.4 released july 15 2011 fixing security vulnerabilities ios 4.3.5 released july 25 2011 security update fix certificate validation ios 4 raised maximum number home screen apps 180 2,160 due addition folders folders would automatically named based containing apps respective app store category ability add custom wallpapers home screen also added though feature notably absent iphone 3g second-generation ipod touch due poor performance icon animations ios 4 introduced multitasking feature allowed users switch apps instantly double-clicking home button implemented way cause excessive battery drain multitasking limited apps dealing internet calling location audio playback similar fast app switching technology meant users could leave app enter another original app remaining background user returns feature notably absent iphone 3g second-generation ipod touch due performance issues ios 4 introduced spell checking feature underlined misspelled words red tapping word would provide pop-up recommended replacement camera app could take pictures 5 times digital zoom ios 4 introduced iphone ipod touch support ibooks already included ipad though default app available app store mail app featured unified inbox ios 4 allowing users see messages email accounts displayed together single inbox also gained support mobileme e-mail aliases multiple exchange accounts business users ios 4.1 added new app called game center online multiplayer social gaming network allows users invite friends play games compare scores leaderboard available iphone 3g ios 4 introduced facetime videotelephony app uses device camera allow user make video calls facetime users feature absent iphone 3gs third-generation ipod touch lower due lack required features front-facing camera safari mobile web browser ios 4 added bing search option addition google yahoo ios 4.2 specific words phrases page searched iphone 3g users reported performance battery issues upgrading ios 4 apple started investigation matter july 2010 november apple sued issues unsatisfied customer alleging violating consumer legal remedies act unfair business practices false deceptive advertising allegations apple knew software would cause problems older models apple n't responded allegations wrote reply another unsatisfied customer august updates coming soon versions ios 4 alarm clock clock app problem dst would go hour early late upon release iphone 4 users reported technical problems phone antennas apple attempted fix issue ios 4.0.1 failed first-generation iphone first-generation ipod touch run ios 4 due hardware limitations marked first time apple dropped support older devices
[ 6788, 3940, 4670, 7890, 4320, 2926, 4690, 734, 5752, 6113, 405, 6119, 6125, 2954, 1123, 6479, 5775, 6847, 6142, 2609, 1895, 4376, 5091, 4749, 5450, 7601, 7609, 3001, 2284, 7259, 2294, 120, 1940, 2300, 1191, 3025, 2665, 2679, 1582, 5509, ...
Validation
2,795
2
BlackBerry_Enterprise_Server:blackberry enterprise server blackberry enterprise server designates middleware software package part blackberry wireless platform supplied blackberry limited software service connects messaging collaboration software mdaemon messaging server microsoft exchange lotus domino novell groupwise enterprise networks redirects emails synchronizes contacts calendaring information servers desktop workstations mobile devices third-party connectors exist including scalix zarafa zimbra google apps bes connector although supported blackberry limited june 2018 blackberry enterprise server renamed blackberry unified endpoint manager uem prior version 4.0 bes largely two separate codebases 2.2 version domino 3.6 version exchange version 4.0 beyond much code integrated separate distributions still remain supported mail platform beginning version 4.1.2 company introduced new option blackberry enterprise server applications provides secure wireless gateway blackberry devices without requiring device owner possess email account latest major revision version 5.0 released 2009 exchange domino support groupwise added 2010 support growing number multiple devices ownership models operating environments blackberry reinvented enterprise mobility management emm bringing together mobile device management security unified communications applications launching blackberry enterprise service 10 bes 10 represents unification simplification products deliver integrated end-to-end solution mobile device management enables enterprises manage entire device fleet ever types devices brands ownership operating system blackberry 10 ios android type usage security enables enterprises secured end-to-end mobility unified communication enables enterprises integrate voice messaging pim apps social experiences applications enables enterprises manage business productivity personal apps bes 5 consists set windows services carry basic operations system windows services include additional services may installed depending configuration bes also produces set log files operation called bes event log log files include bes v4.0 4.1 system connecting microsoft exchange bes typically deployed managed within enterprise messaging administrators example individuals already responsible managing microsoft exchange lotus domino novell groupwise sometimes dedicated person usually called blackberry bes administrator 2010 rim offering blackberry enterprise server express edition user limitations free minor feature limitations requires data plan bes plan enables near-instant seamless mail calendar integration existing exchange server incoming emails often appear blackberry handset appear outlook owa clients advantage existing outlook web access model blackberry internet service offers.the free download requires license code may delayed due demand january 2007 rim offering free version bes called blackberry professional software free download blackberry website includes 1 user license bpse provides ... wireless communications collaboration solution designed specifically small medium-sized businesses comes one cal client access license meaning one blackberry handheld activated server add 29 additional cals total 30 upgrade blackberry enterprise server time.it available notes exchange environments bps based 4.1 code simplified management tool limited amount patches released bps stuck v 4.1.4 full bes 4.1.6 plus maintenance releases bps missing functions full bes get sp6 onwards rich content email free/busy search remote search blackberry professional software originally called blackberry enterprise server express first appeared version 4 bes full bes express full cost limited maximum number clients 1 cal included free renamed bes express bps still thing later introduced bes express 5 rather different previous bes express bps primarily allows non-bes devices/subscribers full-fat blackberry experience finally cost/feature competitive exchange activesync devices i.e provides full synchronisation read/unread status deletions mail subfolders including sent items contacts calendar without license costs without requirement expensive sometimes extremely difficult acquire bes tariff example orange uk may make difficult supply bes package/provisioning less 10 handsets time operators often extreme difficulty applying bes package handsets/subscribers originally bis supplied groupwise rim offered blackberry enterprise server version 5.0 available blackberry enterprise server resource kit brk collection useful tools resources released expand manageability blackberry enterprise server tools available free download brk release developed certified compatible particular bes service pack version brk includes tools also special support tools available contact support group bes 10 helps enterprises manage different devices unified interface components deliver experience
[ 1544, 5666, 4380, 6550, 2048, 2157, 6336, 2233, 5486, 511, 291, 1709 ]
Test
2,796
1
Toad_Data_Modeler:toad data modeler toad data modeler database design tool allowing users visually create maintain document new existing database systems deploy changes data structures across different platforms used construct logical physical data models compare synchronize models generate complex sql/ddl create modify scripts reverse forward engineer databases data warehouse systems toad data modelling software used database design maintenance documentation toad data modeler previously called case studio 2 acquired charonware quest software 2006 quest software acquired dell september 28 2012 october 31 2016 dell finalized sale dell software francisco partners elliott management relaunched november 1 2016 quest software toad products typically 2 releases per year
[ 5252, 7213, 6144, 1081, 5571, 2054, 3268, 3463, 972, 6386, 5956, 4747 ]
Test
2,797
8
RSDL:rsdl restful service description language rsdl machine- human-readable xml description http-based web applications typically rest web services language defined michael pasternak work ovirt restful api allows documenting model resource provided service relationships operations parameters must supplied operations specifies parameters mandated describes possible overloads parameters sets rsdl intended simplify reuse web services based http architecture web platform- language-independent aims promote reuse applications beyond basic use web browser humans machines unlike wadl concentrates describing uris stand-alone entry points application invoked different ways require traversing uri components figure uri structure supports uri/headers/body parameters overloads makes human-readable easily consumed humans machines rsdl represents different uris stand-alone entry points application following resource uris one figure methods available given resources resources consumed uri rsdl contains necessary information generate http request easily consumed accessing uri internals uri rsdl contains rel description attributes describing meaning given operation uri humans easily fetch available operations given collection/resource simply locating different descriptors within uri
[ 7299, 5299, 7109 ]
Test
2,798
2
BIOS_parameter_block:bios parameter block computing bios parameter block often shortened bpb data structure volume boot record vbr describing physical layout data storage volume partitioned devices hard disks bpb describes volume partition whereas unpartitioned devices floppy disks describes entire medium basic bpb appear used partition including floppy disks presence often necessary however certain filesystems also make use describing basic filesystem structures filesystems making use bios parameter block include fat12 except dos 1.x fat16 fat32 hpfs ntfs due different types fields amount data contain length bpb different fat16 fat32 ntfs boot sectors detailed discussion various fat bpb versions entries found fat article combined 11-byte data structure start volume boot records immediately preceding bpb ebpb also called fdc descriptor extended fdc descriptor ecma-107 iso/iec 9293 describes fat flexible/floppy optical disk cartridges format standard dos 2.0 bpb fat12 13 bytes format standard dos 3.0 bpb fat12 fat16 19 bytes already supported versions ms-dos 2.11 format standard dos 3.2 bpb fat12 fat16 21 bytes format standard dos 3.31 bpb fat12 fat16 fat16b 25 bytes format pc dos 3.4 os/2 1.0-1.1 extended bpb fat12 fat16 fat16b 32 bytes format dos 4.0 os/2 1.2 extended bpb fat12 fat16 fat16b hpfs 51 bytes format short dos 7.1 extended bios parameter block 60 bytes fat32 format full dos 7.1 extended bios parameter block 79 bytes fat32 format extended bpb ntfs 73 bytes
[ 1442, 1254, 4547, 5784, 6380, 1534, 6907, 1992 ]
Validation
2,799
9
Java_API_for_XML_Processing:java api xml processing computing java api xml processing jaxp one java xml application programming interfaces api provides capability validating parsing xml documents three basic parsing interfaces addition parsing interfaces api provides xslt interface provide data structural transformations xml document jaxp developed java community process jsr 5 jaxp 1.0 jsr 63 jaxp 1.1 1.2 jsr 206 jaxp 1.3 jaxp version 1.4.4 released september 3 2010 jaxp 1.3 declared end-of-life february 12 2008 dom interface parses entire xml document constructs complete in-memory representation document using classes modeling concepts found document object model dom level 2 core specification dom parser called codice_1 builds in-memory codice_2 representation javax.xml.parsers.documentbuilder created javax.xml.parsers.documentbuilderfactory codice_1 creates instance tree structure containing nodes xml document tree node structure implements interface among many different types tree nodes representing type data found xml document important include javax.xml.parsers.saxparserfactory creates sax parser called saxparser unlike dom parser sax parser create in-memory representation xml document runs faster uses less memory instead sax parser informs clients xml document structure invoking callbacks invoking methods org.xml.sax.helpers.defaulthandler instance provided parser way accessing document called streaming xml codice_4 class implements contenthandler errorhandler dtdhandler entityresolver interfaces clients interested methods defined codice_5 interface called sax parser encounters corresponding elements xml document important methods interface clients provide subclass codice_4 overrides methods processes data may involve storing data database writing stream parsing parser may need access external documents possible store local cache frequently used documents using xml catalog introduced java 1.3 may 2000 stax designed median dom sax interface metaphor programmatic entry point cursor represents point within document application moves cursor forward 'pulling information parser needs different event based api sax 'pushes data application requiring application maintain state events necessary keep track location within document xml stylesheet language transformations xslt allows conversion xml document forms data jaxp provides interfaces package javax.xml.transform allowing applications invoke xslt transformation interface originally called trax transformation api xml developed informal collaboration developers number java xslt processors main features interface two abstract interfaces source result defined represent input output transformation somewhat unconventional use java interfaces since expectation processor accept class implements interface processor choose kinds source result prepared handle practice jaxp processors support three standard kinds source codice_12 codice_13 codice_14 three standard kinds result codice_15 codice_16 codice_17 possibly implementations primitive complete example xslt transformation launching may look like applies following hardcoded xslt transformation following hardcoded xml document result execution
[ 2371, 7347, 4422, 1479, 2126, 2322, 3488, 2517, 773, 2519 ]
Test
2,800
4
Goatse_Security:goatse security goatse security goatsec loose-knit nine-person grey hat hacker group specializes uncovering security flaws division anti-blogging internet trolling organization known gay nigger association america gnaa group derives name goatse.cx shock site chose gaping holes exposed slogan june 2010 goatse security obtained email addresses approximately 114,000 apple ipad users led fbi investigation filing criminal charges two group members gnaa several security researchers within membership according goatse security spokesperson leon kaiser gnaa could fully utilize talents since group believed would anyone would take security data published gnaa seriously order create medium gnaa members publish security findings gnaa created goatse security december 2009 order protect web browser inter-protocol exploitation mozilla blocked several ports html forms would normally access january 2010 gnaa discovered mozilla blocks cover port 6667 left mozilla browsers vulnerable cross-protocol scripts gnaa crafted javascript-based exploit order flood irc channels although efnet oftc able block attacks freenode struggled counteract attacks goatse security exposed vulnerability one members andrew auernheimer aka weev posted information exploit encyclopedia dramatica march 2010 goatse security discovered integer overflow vulnerability within apple web browser safari posted exploit encyclopedia dramatica found person could access blocked port adding 65,536 port number vulnerability also found arora icab omniweb stainless although apple fixed glitch desktop versions safari march company left glitch unfixed mobile versions browser goatse security claimed hacker could exploit mobile safari flaw order gain access cause harm apple ipad june 2010 goatse security uncovered vulnerability within website provider 3g service apple ipad united states time signing 3g service ipad retrieves icc-id ipad sim card associates email address provided sign-up order ease log-in process ipad website receives sim card icc-id pre-populates email address field address provided sign-up goatse security realized sending http request valid icc-id embedded inside website website would reveal email address associated icc-id june 5 2010 daniel spitler aka jacksonbrown began discussing vulnerability possible ways exploit including phishing irc channel goatse security constructed php-based brute force script would send http requests random icc-ids website legitimate icc-id entered would return email address corresponding icc-id script dubbed ipad 3g account slurper goatse security attempted find appropriate news source confide leaked information weev attempted contact news corporation thomson reuters executives including arthur siskind security problems june 6 2010 weev sent emails icc-ids recovered order verify claims chat logs period also reveal attention publicity may incentives group contrary first claimed group initially revealed security flaw gawker media notifying also exposed data 114,000 ipad users including celebrities government military tactics re-provoked significant debate proper disclosure security flaws weev maintained goatse security used common industry standard practices said tried good guys jennifer granick electronic frontier foundation also defended tactics used goatse security june 14 2010 michael arrington techcrunch awarded group crunchie award public service first time crunchie awarded outside annual crunchies award ceremony fbi opened investigation incident leading criminal complaint january 2011 raid andrew weev auernheimer house search related investigation auernheimer subsequently detained released bail state drug charges later dropped release bail broke gag order protest dispute legality search house denial access public defender also asked donations via paypal defray legal costs 2011 department justice announced charged one count conspiracy access computer without authorization one count fraud co-defendant daniel spitler released bail november 20 2012 auernheimer found guilty one count identity fraud one count conspiracy access computer without authorization tweeted would appeal ruling alex pilosov friend also present ruling tweeted auernheimer would remain free bail sentencing least 90 days november 29 2012 auernheimer authored article wired magazine entitled forget disclosure hackers keep security holes advocating disclosure zero-day exploit individuals use interests social justice april 11 2014 third circuit issued opinion vacating auernheimer conviction basis venue new jersey improper judges address substantive question legality site access released prison late april 11 may 2011 dos vulnerability affecting several linux distributions disclosed goatse security group discovered lengthy advanced packaging tool url would cause compiz crash september 2012 goatse security credited microsoft helping secure online services
[ 704, 3932, 2912, 376, 3277, 2923, 5397, 404, 2587, 3323, 5779, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6541, 6194, 5847, 2678, 3038, 3043, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 7328, 208, 2021, 5922, 6628, 578, 924, 4531, 600...
Test
2,801
3
Flash_Gordon_(video_game):flash gordon video game flash gordon video game based comic book character name game published 1986 mastertronic amstrad cpc commodore 64 zx spectrum msx personal computers zzap 64 praised commodore 64 version game reviewers appreciated gameplay variety offered three different sections game quality graphics sound rated 89 overall also 1982 game tie 1980 film released atari 2600 oct. 7 2015 mobile game also based film released infinite runner type game developed boluga limited featured three songs queen flash ’ theme vultan ’ theme football fight flash gordon also 1990 defenders earth video game enigma variations
[]
Test
2,802
2
WHQL_Testing:whql testing windows hardware quality labs testing whql testing microsoft testing process involves running series tests third-party hardware software submitting log files tests microsoft review procedure may also include microsoft running tests wide range equipment different hardware different microsoft windows editions products pass whql tests get use certified windows logotype certifies hardware software share testing microsoft ensure compatibility actual logo used depends version microsoft windows device drivers passing whql tests microsoft creates digitally signed certification file included driver installation package allows installation 64-bit versions windows prevents 32-bit versions versions displaying warning message driver certified microsoft see screenshot right new since june 2007 requirement audio fidelity test equipment audio precision sys-2722-a-m system submissions company choose sign drivers rather go whql testing process drivers would qualify certified windows logos would install 64-bit versions windows install without warning message 32-bit versions however install without warning message device drivers passed whql tests also made available download using windows update microsoft update catalog detects new device built-in drivers show found new hardware wizard see screenshot right one way avoid found new hardware wizard popping pre-installing whql certified driver device plugged microsoft longer requires whql testing fee used usd 250 per operating system family fee covers 32-bit x86 64-bit x64 versions submitted simultaneously non-refundable fee include expenses windows server 2008 x64 license necessary running whql tests verisign certificate necessary submitting test results sometimes ambiguity responsible providing drivers supported case industry standard devices used much broadly pc platform microsoft supply drivers example whql bluetooth stereo headsets
[ 425, 5694, 8103, 4759 ]
Test
2,803
9
Fortran:fortran fortran formerly fortran derived formula translation general-purpose compiled imperative programming language especially suited numeric computation scientific computing originally developed ibm 1950s scientific engineering applications fortran came dominate area programming early continuous use six decades computationally intensive areas numerical weather prediction finite element analysis computational fluid dynamics computational physics crystallography computational chemistry popular language high-performance computing used programs benchmark rank world fastest supercomputers fortran encompasses lineage versions evolved add extensions language usually retaining compatibility prior versions successive versions added support structured programming processing character-based data fortran 77 array programming modular programming generic programming fortran 90 high performance fortran fortran 95 object-oriented programming fortran 2003 concurrent programming fortran 2008 fortran design basis many programming languages among better known basic based fortran ii number syntax cleanups notably better logical structures changes work easily interactive environment names earlier versions language fortran 77 conventionally spelled all-capitals fortran 77 last version use lowercase letters keywords strictly non-standard capitalization dropped referring newer versions beginning fortran 90 official language standards refer language fortran rather all-caps fortran late 1953 john w. backus submitted proposal superiors ibm develop practical alternative assembly language programming ibm 704 mainframe computer backus historic fortran team consisted programmers richard goldberg sheldon f. best harlan herrick peter sheridan roy nutt robert nelson irving ziller harold stern lois haibt david sayre concepts included easier entry equations computer idea developed j. halcombe laning demonstrated laning zierler system 1952 programmers chess players chosen work ibm thought logical minds draft specification ibm mathematical formula translating system completed november 1954 first manual fortran appeared october 1956 first fortran compiler delivered april 1957 first optimizing compiler customers reluctant use high-level programming language unless compiler could generate code performance comparable hand-coded assembly language community skeptical new method could possibly outperform hand-coding reduced number programming statements necessary operate machine factor 20 quickly gained acceptance john backus said 1979 interview think ibm employee magazine much work come lazy n't like writing programs working ibm 701 writing programs computing missile trajectories started work programming system make easier write programs language widely adopted scientists writing numerically intensive programs encouraged compiler writers produce compilers could generate faster efficient code inclusion complex number data type language made fortran especially suited technical applications electrical engineering 1960 versions fortran available ibm 709 650 1620 7090 computers significantly increasing popularity fortran spurred competing computer manufacturers provide fortran compilers machines 1963 40 fortran compilers existed reasons fortran considered first widely used cross-platform programming language development fortran paralleled early evolution compiler technology many advances theory design compilers specifically motivated need generate efficient code fortran programs initial release fortran ibm 704 contained 32 statements including arithmetic statement reminiscent readily implementable three-way comparison instruction cas compare accumulator storage available 704 statement provided way compare numbers testing difference attendant risk overflow deficiency later overcome logical facilities introduced fortran iv statement used originally optionally give branch probabilities three branch cases arithmetic statement first fortran compiler used weighting perform compile time monte carlo simulation generated code results used optimize placement basic blocks memory sophisticated optimization time monte carlo technique documented backus et al paper original implementation fortran automatic coding system fundamental unit program basic block basic block stretch program one entry point one exit point purpose section 4 prepare section 5 table predecessors pred table enumerates basic blocks lists every basic block basic blocks immediate predecessor flow together absolute frequency basic block link table obtained running program monte-carlo fashion outcome conditional transfers arising if-type statements computed go determined random number generator suitably weighted according whatever frequency statements provided many years later statement effect code treated comment statement since compilers longer kind compile-time simulation similar fate befallen compiler hints several programming languages example c keyword first fortran compiler reported diagnostic information halting program error found outputting error code console code could looked programmer error messages table operator manual providing brief description problem later error handling subroutine handle users error division zero developed nasa incorporated giving users feedback line code error appeared development disk files text editors terminals programs often entered keypunch keyboard onto 80-column punched cards one line card resulting deck cards would fed card reader compiled punched card codes included lower-case letters many special characters special versions ibm 026 keypunch offered would correctly print re-purposed special characters used fortran reflecting punched card input practice fortran programs originally written fixed-column format first 72 columns read twelve 36-bit words letter c column 1 caused entire card treated comment ignored compiler otherwise columns card divided four fields columns 73 80 could therefore used identification information punching sequence number text could used re-order cards stack cards dropped though practice reserved stable production programs ibm 519 could used copy program deck add sequence numbers early compilers e.g. ibm 650 additional restrictions due limitations card readers keypunches could programmed tab column 7 skip column 72 later compilers relaxed fixed-format restrictions requirement eliminated fortran 90 standard within statement field whitespace characters blanks ignored outside text literal allowed omitting spaces tokens brevity including spaces within identifiers clarity example valid identifier equivalent 101010do101i=1,101 valid statement equivalent 10101 101 1 101 zero column 6 treated space 101010do101i=1.101 instead 10101 do101i 1.101 assignment 1.101 variable called do101i note slight visual difference comma period hollerith strings originally allowed format data statements prefixed character count letter h e.g. allowing blanks retained within character string miscounts problem ibm fortran ii appeared 1958 main enhancement support procedural programming allowing user-written subroutines functions returned values parameters passed reference common statement provided way subroutines access common global variables six new statements introduced next years fortran ii would also add support data types early fortran compilers supported recursion subroutines early computer architectures supported concept stack directly support subroutine calls return location often stored one fixed location adjacent subroutine code e.g ibm 1130 specific machine register ibm 360 et seq allows recursion stack maintained software return address stored stack call made restored call returns although specified fortran 77 many f77 compilers supported recursion option burroughs mainframes designed recursion built-in default became standard fortran 90 via new keyword recursive program heron formula reads data tape reel containing three 5-digit integers b c input type declarations available variables whose name starts j k l n fixed-point i.e integers otherwise floating-point since integers processed example names variables start letter name variable must start letter continue letters digits limit six characters fortran ii b c represent sides triangle plane geometry program execution end error code stop 1 otherwise output line printed showing input values b c followed computed area triangle floating-point number occupying ten spaces along line output showing 2 digits decimal point .2 f10.2 format statement label 601 c area triangle standard square root function c input tape reader unit 5 integer input c output line printer unit 6 real output c input error display error output code 1 job control listing c ia ib ic may negative zero c furthermore sum two sides triangle c must greater third side check c using heron formula calculate c area triangle ibm also developed fortran iii 1958 allowed inline assembly code among features however version never released product like 704 fortran fortran ii fortran iii included machine-dependent features made code written unportable machine machine early versions fortran provided vendors suffered disadvantage fortran provided ibm 1401 computer innovative 63-phase compiler ran entirely core memory 8000 six-bit characters compiler could run tape 2200-card deck used tape disk storage kept program memory loaded overlays gradually transformed place executable form described haines article reprinted edited editions anatomy compiler ibm manual fortran specifications operating procedures ibm 1401 executable form entirely machine language rather floating-point arithmetic sub-scripting input/output function references interpreted preceding ucsd pascal p-code two decades ibm later provided fortran iv compiler 1400 series computers starting 1961 result customer demands ibm began development fortran iv removed machine-dependent features fortran ii adding new features data type logical boolean expressions logical statement alternative arithmetic statement fortran iv eventually released 1962 first ibm 7030 stretch computer followed versions ibm 7090 ibm 7094 later ibm 1401 1966 1965 fortran iv supposed compliant standard developed american standards association x3.4.3 fortran working group 1966 1968 ibm offered several fortran iv compilers system/360 named letters indicated minimum amount memory complier needed run letters f g h matched codes used system/360 model numbers indicate memory size letter increment factor two larger time fortran iv started become important educational tool implementations university waterloo watfor watfiv created simplify complex compile link processes earlier compilers perhaps significant development early history fortran decision american standards association american national standards institute ansi form committee sponsored bema business equipment manufacturers association develop american standard fortran resulting two standards approved march 1966 defined two languages fortran based fortran iv served de facto standard basic fortran based fortran ii stripped machine-dependent features fortran defined first standard officially denoted x3.9-1966 became known fortran 66 although many continued term fortran iv language standard largely based fortran 66 effectively became first industry-standard version fortran fortran 66 included release fortran 66 standard compiler vendors introduced several extensions standard fortran prompting ansi committee x3j3 1969 begin work revising 1966 standard sponsorship cbema computer business equipment manufacturers association formerly bema final drafts revised standard circulated 1977 leading formal approval new fortran standard april 1978 new standard called fortran 77 officially denoted x3.9-1978 added number significant features address many shortcomings fortran 66 revision standard number features removed altered manner might invalidate formerly standard-conforming programs removal allowable alternative x3j3 time since concept deprecation yet available ansi standards 24 items conflict list see appendix a2 x3.9-1978 addressed loopholes pathological cases permitted prior standard rarely used small number specific capabilities deliberately removed dimension 10,5 control data corporation computers another version fortran 77 called minnesota fortran mnf designed especially student use variations output constructs special uses commons data statements optimizations code levels compiling detailed error listings extensive warning messages debugs development revised standard succeed fortran 77 would repeatedly delayed standardization process struggled keep rapid changes computing programming practice meantime standard fortran nearly fifteen years fortran 77 would become historically important dialect important practical extension fortran 77 release mil-std-1753 1978 specification developed u.s. department defense standardized number features implemented fortran 77 compilers included ansi fortran 77 standard features would eventually incorporated fortran 90 standard ieee 1003.9 posix standard released 1991 provided simple means fortran 77 programmers issue posix system calls 100 calls defined document allowing access posix-compatible process control signal handling file system control device control procedure pointing stream i/o portable manner much-delayed successor fortran 77 informally known fortran 90 prior fortran 8x finally released iso/iec standard 1539:1991 1991 ansi standard 1992 addition changing official spelling fortran fortran major revision added many new features reflect significant changes programming practice evolved since 1978 standard unlike prior revision fortran 90 removed features appendix b.1 says list deleted features standard empty standard-conforming fortran 77 program also standard-conforming fortran 90 either standard usable define behavior small set features identified obsolescent expected removed future standard functionalities early version features performed new fortran 95 features kept simplify porting old programs may eventually deleted fortran 95 published officially iso/iec 1539-1:1997 minor revision mostly resolve outstanding issues fortran 90 standard nevertheless fortran 95 also added number extensions notably high performance fortran specification number intrinsic functions extended example argument added intrinsic several features noted fortran 90 obsolescent removed fortran 95 important supplement fortran 95 iso technical report tr-15581 enhanced data type facilities informally known allocatable tr specification defined enhanced use arrays prior availability fully fortran 2003-compliant fortran compilers uses include arrays derived type components procedure dummy argument lists function return values arrays preferable -based arrays arrays guaranteed fortran 95 deallocated automatically go scope eliminating possibility memory leakage addition elements allocatable arrays contiguous aliasing issue optimization array references allowing compilers generate faster code case pointers another important supplement fortran 95 iso technical report tr-15580 floating-point exception handling informally known ieee tr specification defined support ieee floating-point arithmetic floating point exception handling addition mandatory base language defined iso/iec 1539-1 1997 fortran 95 language also includes two optional modules together compose multi-part international standard iso/iec 1539 according standards developers optional parts describe self-contained features requested substantial body users and/or implementors deemed sufficient generality required standard-conforming fortran compilers nevertheless standard-conforming fortran provide options must provided accordance description facilities appropriate part standard fortran 2003 officially published iso/iec 1539-1:2004 major revision introducing many new features comprehensive summary new features fortran 2003 available fortran working group iso/iec jtc1/sc22/wg5 official web site article major enhancements revision include important supplement fortran 2003 iso technical report tr-19767 enhanced module facilities fortran report provided sub-modules make fortran modules similar modula-2 modules similar ada private child sub-units allows specification implementation module expressed separate program units improves packaging large libraries allows preservation trade secrets publishing definitive interfaces prevents compilation cascades iso/iec 1539-1:2010 informally known fortran 2008 approved september 2010 fortran 95 minor upgrade incorporating clarifications corrections fortran 2003 well introducing select new capabilities new capabilities include final draft international standard fdis available document n1830 important supplement fortran 2008 iso technical specification ts 29113 interoperability fortran c submitted iso may 2012 approval specification adds support accessing array descriptor c allows ignoring type rank arguments latest revision language fortran 2018 earlier referred fortran 2015 significant revision released november 28 2018 fortran 2018 incorporates two previously published technical specifications additional changes new features include support iso/iec/ieee 60559:2011 latest version ieee floating point standard 2019 hexadecimal input/output implicit none enhancements changes although 1968 journal article authors basic already described fortran old-fashioned fortran use several decades vast body fortran software daily use throughout scientific engineering communities jay pasachoff wrote 1984 physics astronomy students simply learn fortran much exists fortran seems unlikely scientists change pascal modula-2 whatever 1993 cecil e. leith called fortran mother tongue scientific computing adding replacement possible language may remain forlorn hope primary language intensive super-computing tasks astronomy climate modeling computational chemistry computational economics computational fluid dynamics computational physics data analysis hydrological modeling numerical linear algebra numerical libraries lapack imsl nag optimization satellite simulation structural engineering weather prediction many floating-point benchmarks gauge performance new computer processors cfp2006 floating-point component spec cpu2006 benchmarks written fortran apart modern codes computational science generally use large program libraries metis graph partitioning petsc trilinos linear algebra capabilities dune fenics mesh finite element support generic libraries since early 2000s many widely used support libraries also implemented c recently c++ hand high-level languages matlab python r become popular particular areas computational science consequently growing fraction scientific programs also written higher-level languages reason facilities inter-operation c added fortran 2003 enhanced iso/iec technical specification 29113 incorporated fortran 2018 shift popularity programming languages also evident selection applications spec cpu 2000 spec cpu 2006 floating point benchmarks software nasa probes voyager 1 voyager 2 originally written fortran 5 later ported fortran 77. software still written fortran ported c. precise characteristics syntax fortran 95 discussed fortran 95 language features portability problem early days agreed upon standard even ibm reference manual computer companies vied differentiate offerings others providing incompatible features standards improved portability 1966 standard provided reference syntax semantics vendors continued provide incompatible extensions although careful programmers coming realize use incompatible extensions caused expensive portability problems therefore using programs pfort verifier 1977 standard national bureau standards nist published fips pub 69 processors purchased u.s. government required diagnose extensions standard rather offer two processors essentially every compiler eventually least option diagnose extensions incompatible extensions portability problem numerical calculations important take account characteristics arithmetic addressed fox et al context 1966 standard port library ideas therein became widely used eventually incorporated 1990 standard way intrinsic inquiry functions widespread almost universal adoption ieee 754 standard binary floating-point arithmetic essentially removed problem access computing environment e.g. program command line environment variables textual explanation error conditions remained problem addressed 2003 standard large collections library software could described loosely related engineering scientific calculations graphics libraries written c therefore access presented portability problem addressed incorporation c interoperability 2003 standard possible relatively easy write entirely portable program fortran even without recourse preprocessor fortran 5 marketed data general corp late 1970s early 1980s nova eclipse mv line computers optimizing compiler quite good minicomputers time language closely resembles fortran 66 name pun earlier fortran iv fortran v distributed control data corporation 1968 cdc 6600 series language based upon fortran iv univac also offered compiler 1100 series known fortran v. spinoff univac fortran v athena fortran fortran 6 visual fortran 2001 licensed compaq microsoft licensed compaq visual fortran provided visual studio 5 environment interface compaq v6 v6.1 vendors high-performance scientific computers e.g. burroughs control data corporation cdc cray honeywell ibm texas instruments univac added extensions fortran take advantage special hardware features instruction cache cpu pipelines vector arrays example one ibm fortran compilers h extended iup level optimization reordered machine code instructions keep multiple internal arithmetic units busy simultaneously another example cfd special variant fortran designed specifically illiac iv supercomputer running nasa ames research center ibm research labs also developed extended fortran-based language called vectran processing vectors matrices object-oriented fortran object-oriented extension fortran data items grouped objects instantiated executed parallel available sun iris ipsc ncube longer supported machine-specific extensions either disappeared time elements incorporated main standards major remaining extension openmp cross-platform extension shared memory programming one new extension coarray fortran intended support parallel programming transit name reduced version ibm 704 fortran language implemented ibm 650 using translator program developed carnegie late 1950s following comment appears ibm reference manual transit automatic coding system c28-4038 copyright 1957 1959 ibm fortran system designed complex machine 650 consequently 32 statements found fortran programmer reference manual acceptable transit system addition certain restrictions fortran language added however none restrictions make source program written transit incompatible fortran system 704 permissible statements ten subroutines could used one program transit statements limited columns 7 56 punched cards used input output ibm 650 three passes required translate source code language compile statements soap assembly language finally produce object program could loaded machine run program using punched cards data input outputting results onto punched cards two versions existed 650s 2000 word memory drum transit transit ii latter machines equipped indexing registers automatic floating point decimal bi-quinary arithmetic appendix manual included wiring diagrams ibm 533 card reader/punch control panel prior fortran 77 number preprocessors commonly used provide friendlier language advantage preprocessed code could compiled machine standard fortran compiler preprocessors would typically support structured programming variable names longer six characters additional data types conditional compilation even macro capabilities popular preprocessors included flecs iftran mortran sftran s-fortran ratfor ratfiv ratfor ratfiv example implemented c-like language outputting preprocessed code standard fortran 66 despite advances fortran language preprocessors continue used conditional compilation macro substitution one earliest versions fortran introduced '60s popularly used colleges universities developed supported distributed university waterloo watfor based largely fortran iv student using watfor could submit batch fortran job syntax errors program would move straight execution simplification allowed students concentrate program syntax semantics execution logic flow rather dealing submission job control language jcl compile/link-edit/execution successive process es complexities mainframe/minicomputer environment side simplified environment watfor good choice programmers needing expanded abilities host processor e.g. watfor typically limited access i/o devices watfor succeeded watfiv later versions lrltran developed lawrence radiation laboratory provide support vector arithmetic dynamic storage among extensions support systems programming distribution included ltss operating system fortran-95 standard includes optional part 3 defines optional conditional compilation capability capability often referred coco many fortran compilers integrated subsets c preprocessor systems simscript application specific fortran preprocessor modeling simulating large discrete systems f programming language designed clean subset fortran 95 attempted remove redundant unstructured deprecated features fortran statement f retains array features added fortran 90 removes control statements made obsolete structured programming constructs added fortran 77 fortran 90 f described creators compiled structured array programming language especially well suited education scientific computing lahey fujitsu teamed create fortran microsoft .net framework silverfrost ftn95 also capable creating .net code following program illustrates dynamic memory allocation array-based operations two features introduced fortran 90 particularly noteworthy absence loops statements manipulating array mathematical operations applied array whole also apparent use descriptive variable names general code formatting conform contemporary programming style example computes average data entered interactively program average end program average fortran standards committee meeting name fortran 77 chosen satirical technical proposal incorporated official distribution bearing title letter considered harmful proposal purported address confusion sometimes arises letter numeral zero eliminating letter allowable variable names however method proposed eliminate letter character set entirely thereby retaining 48 number lexical characters colon increased 49 considered beneficial would promote structured programming making impossible use notorious statement troublesome statements would also eliminated noted might invalidate existing programs probably non-conforming anyway assumed-length arrays added dispute appropriate character separate upper lower bounds comment examining arguments dr. walt brainerd penned article entitled astronomy vs. gastroenterology proponents suggested using star asterisk others favored colon fortran 77 earlier versions variable names beginning letters i–n default type integer variables starting letters defaulted real although programmers could override defaults explicit declaration led joke fortran god real unless declared integer
[ 5363, 5012, 7512, 4299, 4302, 3944, 3268, 6428, 2200, 7533, 383, 27, 4694, 3633, 3968, 1102, 2576, 1854, 4705, 2582, 2223, 7557, 1112, 3981, 6120, 1116, 1867, 6838, 6130, 764, 1879, 4361, 7213, 7218, 775, 1506, 6497, 2619, 5091, 790, 65...
Validation
2,804
5
Veronica_(search_engine):veronica search engine veronica search engine system gopher protocol released november 1992 steven foster fred barrie university nevada reno existence veronica constantly updated database names almost every menu item thousands gopher servers veronica database could searched major gopher menus although original veronica database longer accessible various local veronica installations least one complete rewrite veronica-2 still exist search engine named character veronica lodge archie comics intentional analogy naming archie search engine search engine ftp servers backronym veronica easy rodent-oriented net-wide index computer archives
[ 4655, 5542, 6802, 7628, 2205, 7537, 6905, 3291, 3548, 7094, 7015, 7016, 3043, 4352, 348, 1057, 2261, 5887, 445 ]
Test
2,805
4
Stonesoft_Corporation:stonesoft corporation stonesoft corporation public company developed sold network security solutions based helsinki finland publicly owned 2013 acquired intel subsidiary mcafee stonesoft business globally regional headquarters atlanta georgia united states sales offices throughout europe middle east china july 2013 mcafee part intel security completed tender offer acquire stonesoft products technologies stonesoft became part mcafee network security business unit stonesoft firewall products renamed mcafee next generation firewall mcafee sold stonesoft forcepoint january 2016 stonesoft started systems integrator nordic regions europe 1994 introduced stonebeat technology creating high availability pair firewalls active-passive configuration 1999 company extended stonebeat patented load balancing clustering technology launching stonebeat fullcluster one first technologies certified check point opsec program 2001 stonesoft expanded product set firewall/vpn space becoming direct competitor check point stonegate firewall/vpn launched march 19 2001 january 2003 company introduced first virtual firewall/vpn solution ibm mainframes 2010 company released information via cert-fi advanced evasion technique aets met skepticism community aets released 2011 eventually verified independent labs researchers 2012 “ stonesoft ” replaced “ stonegate ” product name stonesoft used company product name stonesoft corporation product sales q3 2012 circa 5.6 million euros product sales grew approximately 18 q3 net sales approximately 9.2–9.3 million euros equals growth by14-16 growth lower expected product portfolio includes firewall/vpn devices ips intrusion detection prevention systems ssl vpn systems available hardware appliances software vmware-certified virtual appliances components well third-party devices managed stonesoft management center product portfolio differentiates unique clustering load balancing technologies based company older stonebeat technology originally developed check point firewall-1 stonesoft current product portfolio divided five major categories stonesoft firewall/vpn placed gartner magic quadrant enterprise network firewalls several years currently placed niche quadrant gartner notes stonesoft serves set placements well – usually high availability key leaders otherwise welcome stonesoft firewall/vpn regarded robust performance feature set relative company resources loyal customer base stonesoft ips also placed gartner magic quadrant network intrusion prevention currently “ visionaries ” quadrant also certified icsa labs network intrusion prevention detection category one four vendors consortium achieve certification stonesoft also received favorable reviews nss labs next generation firewall capability 2012 intrusion detection prevention system 2008 helsinki court appeal issued decision case brought stonesoft several members management team court held two members company board directors former ceo gross negligence failed give profit warning due time issue hand discrepancies profitability forecasted company year 2000 interim reports actual state company time reports indicated company sound profitable yet profit warning fact issued district court helsinki originally dismissed claims decision november 15 2006 2010 stonesoft informed public new evasion technique bypass security defences stonesoft defines advanced evasion techniques aets ” virtually limitless quantity unrecognizable conventional detection methods work levels tcp/ip stack work across many protocols protocol combinations. ” according max nyman stonesoft corporation senior marketing manager aets deliver malicious code without detection without leaving trace july 23 2012 stonesoft released free tool enables organisations test network security
[ 496, 1931, 4295, 549, 651, 4556, 4014, 7522, 4962, 2240, 3162 ]
Train
2,806
5
MacJournal:macjournal macjournal journaling blogging software originally developed mac os x published dan schimpf software macjournal offers basic text formatting limited page layout features macjournal audience includes diarists bloggers podcasters macjournal supports online blog tools including livejournal blogger movable type wordpress also contains powerful searching capabilities allows keeping multiple nested journals includes password protection aes-256 encryption palm pda syncing macjournal written dan schimpf awarded best mac os x student product 2002 apple design awards initially distributed freeware made shareware 2004 project purchased mariner software schimpf hired continue development 2012 macjournal given editors choice award macworld early 2019 development distribution macjournal reverted mariner software back original developer dan schimpf march 2019 dan schimpf software released version 7.0.0 macjournal freeware may 2019 schimpf continuing active development macjournal releasing occasional beta updates
[ 405, 5571 ]
Test
2,807
8
IBM_WebSphere_Application_Server:ibm websphere application server websphere application server software product performs role web application server specifically software framework middleware hosts java-based web applications flagship product within ibm websphere software suite initially created donald f. ferguson later became cto software dell first version launched 1998 websphere application server built using open standards java ee xml web services supported following platforms windows aix linux solaris ibm z/os beginning version 6.1 version 9.0 open standard specifications aligned common across platforms platform exploitation extent takes place done open standard specification line works number web servers including apache http server netscape enterprise server microsoft internet information services iis ibm http server i5/os ibm http server z/os ibm http server aix/linux/microsoft windows/solaris uses port 9060 connection default administration port port 9080 default website publication port case install websphere instances values changed traditional opposed liberty variant websphere application server platform architected distributed computing platform could installed multiple operating system instances collectively referred websphere cell management instances could done management node called deployment manager within cell deployment applications including ability perform rolling updates could pushed subset cell nodes configuration information entire cell many nodes applications deployed applications configured session management details resources etc tracked xml configuration files distributed throughout cell every node product lifetime implementation configuration details went files database-based around v3.5 back files around v5 given distributed install given also management entire cell required management local effects deployment logging configuration etc overall effect security could often override local security configured properly example earlier versions management console option available specify location log file remote node could used read write arbitrary file remote node reason advisable run application server node agent processes root privileges starting v6 security configuration defaulted box secure state even meant enabling desired functions required manual changing defaults originally nodes cell single domain management well application security however v6.1 support multiple security domains introduced ability separate administrative application security many ibm products ibm infosphere datastage use websphere application server base platform infrastructure ibm shipped several versions editions websphere application server first beta versions websphere called servlet express although versioning scheme x.1 x.5 would usually indicate minor release software industry websphere v6.1 v5.1 major releases like websphere v8.5 v3.5 websphere liberty introduced websphere application server v8.5 originally referred websphere liberty profile version numbering scheme rest 2016 ibm introduced new fix pack numbering scheme liberty reflect move continuous delivery liberty single support stream v8.5.5.9 liberty numbering scheme rebased starting 16.0.0.2 reflect year quarter liberty fixpack release common level websphere liberty distributed part version 8.5 version 9.0 websphere application server liberty continuous delivery model introduced allow new capabilities features delivered frequent basis.. websphere application server v9.0 adds java ee 7 java se 8 default also provides configured run java se 7 brought application server traditional level java ee websphere liberty offered since 2015 first release made simultaneously available on-premises offering websphere service ibm cloud.. websphere liberty increasingly focus new cloud native applications liberty 16.0.0.2 version liberty included version 9.0.0.0 liberty 16.0.0.3 adds support new microprofile programming model simplifies cloud native application development using standard java ee technologies flexible access websphere liberty provided additional distributions docker image cloud foundry buildpack september 2017 ibm moved ongoing development liberty new open source project called open liberty open liberty source liberty runtime websphere application server distributions open liberty supported openliberty.io community ibm provides commercial support liberty websphere application server websphere application server v8.5.5 includes significant enhancements liberty profile including support java se 8 full java ee 7 compliance since v8.5.5.6 websphere intelligent management capabilities websphere liberty support java ee enabled configuration sets features different sets library features available edition liberty core edition includes liberty features required java ee webprofile editions add liberty features full java ee 7 network deployment edition adds liberty features intelligent management beyond z/os edition adds liberty features enable z/os platform capabilities websphere application server v8.5 offers java ee 6 java se 6 default v8.0 also provides configured run java se 7 primary new capabilities v8.5 liberty profile websphere application server intelligent management features liberty profile websphere application server included commercial editions server providing lightweight profile server web mobile osgi applications release functional subset full profile websphere application server development production use install size 50 mb startup time around 3 seconds new xml-based server configuration treated development artifact aid developer productivity server capabilities engaged set features defined server configuration features added removed dynamically internal use osgi services new model provided moving applications pipeline development production packaged server complete archive server server configuration application unzip deploy centralized managed install optionally available job manager component websphere application server network deployment edition intelligent management capability added network deployment z/os editions websphere application server integrates operational features previously available separate websphere virtual enterprise wve offering application editioning server health management dynamic clustering intelligent routing compute grid also included network deployment z/os editions websphere application server previously separately priced websphere xd compute grid feature scheduling managing java batch workloads version released september 9 2008 java ee 5 compliant application server following flagship features introduced websphere application server version 7 flexible management facilitates administration large number websphere application server base edition network deployment topologies might geographically distributed business-level application used managing application artifacts independent packaging programming models property based configuration feature simplifies experience automating administration administrator update websphere application server version 7 configuration using simple property file general availability websphere application server v7 websphere application server v8 2011 number additional capabilities made available v7 form feature packs optionally added v7 install feature pack content quality support main release content purpose feature pack deliver new innovation next major release following feature packs provided websphere application server v7 version released june 30 2006 september 11 2012 ibm extended end service v6.1 full year september 30 2013 announced new version-to-version migration incentives assistance java ee 1.4 compliant application server includes following function support ejb 3.0 technology support webservices standards provided ejb feature pack webservices feature packs respectively function feature packs folded main product version 7 functions webservices feature pack include version 6 functionality previously found websphere business integration server foundation wbisf moved new ibm websphere process server function moved editions express version released january 16 2004 j2ee 1.4 compliant application server version released november 19 2002 j2ee 1.3 certified application server major rewrite v3/v4 codebase first time websphere application server coded common codebase across deployment platforms intel x86 mainframe substantially code database-based configuration repository replaced replication xml file-based configuration repository service called deployment manager master copy cell configuration nodes file needed copied master server whenever changed v5 also included miniature version mq 5.3 called embedded java message service jms server j2ee 1.2 certified application server inherited database-based configuration model v3.x single-server edition already used xml datastore websphere 3.5 first widely used version websphere ibm adds javabean corba linux support comes two editions standard edition se advanced edition ae initial release june 1998 primarily java servlet engine websphere application server security model based services provided operating system java ee security model websphere application server provides implementations user authentication authorization mechanisms providing support various user registries authentication mechanisms supported websphere java ee application servers
[ 5369, 7170, 1834, 26, 7544, 1479, 4701, 417, 6130, 5432, 6856, 2619, 7952, 4759, 5820, 2646, 2291, 4408, 6536, 7988, 6543, 3408, 1602, 6586, 3077, 5206, 900, 7347, 5214, 6270, 6986, 3455, 5571, 578, 7003, 3807, 3813, 3135, 1686, 7411, 6...
Validation
2,808
4
Prefix_WhoIs:prefix whois prefix whois open source project develops operates free whois-compatible framework stockpiling querying various routing registry information prefix whois uses global bgp routing data learned many isp backbone routers information sources also supported imported data every regional internet registry afrinic apnic arin lacnic ripe geocoding information project mentioned number popular network security network engineering books articles many public servers around world operate mirrors prefix whois making information generally available worldwide service may used client using standard whois protocol dns address whois.pwhois.org resolves prefix whois server nearest client based anycast dns several client software packages available prefix whois commercial vendors include free open source utilities whob layer four traceroute prefix whois project distributes c php libraries direct access prefix whois servers http simplequery interface also available software made available custom license
[ 2653, 4351 ]
Test
2,809
4
Small_subgroup_confinement_attack:small subgroup confinement attack cryptography subgroup confinement attack small subgroup confinement attack cryptographic method operates large finite group attacker attempts compromise method forcing key confined unexpectedly small subgroup desired group several methods found vulnerable subgroup confinement attack including forms applications diffie–hellman key exchange dh-eke
[]
Test
2,810
4
Long-term_support:long-term support long-term support lts product lifecycle management policy stable release computer software maintained longer period time standard edition term typically reserved open-source software describes software edition supported months years longer software standard edition short term support sts term distinguishes support policy software standard edition sts software comparatively short life cycle may afforded new features omitted lts edition avoid potentially compromising stability compatibility lts release lts applies tenets reliability engineering software development process software release life cycle long-term support extends period software maintenance also alters type frequency software updates patches reduce risk expense disruption software deployment promoting dependability software necessarily imply technical support beginning long-term support period software developers impose feature freeze make patches correct software bugs vulnerabilities introduce new features may cause regression software maintainer either distributes patches individually packages maintenance releases point releases service packs conclusion support period product either reaches end-of-life receives reduced level support period time e.g. high-priority security patches upgrading software decision-maker might consider risk cost upgrade software developers add new features fix software bugs accidentally introduce new bugs break old functionality flaw occurs software called regression two ways software publisher maintainer reduce risk regression release major updates less frequently allow users test alternate updated version software lts software applies two risk-reduction strategies lts edition software published parallel sts short-term support edition since major updates sts edition published frequently offers lts users preview changes might incorporated lts edition changes judged sufficient quality using older versions software may avoid risks associated upgrading may introduce risk losing support old software long-term support addresses assuring users administrators software maintained specific period time updates selected publication carry significantly reduced risk regression maintainers lts software publish updates either low risk reduce risk security patches patches lts software published understanding installing less risky installing table lists specific lts version addition normal release cycle many projects centos provide long period support every release
[ 3932, 7159, 4304, 1456, 6428, 3955, 5047, 4705, 2585, 3981, 753, 7201, 7581, 6489, 1139, 4012, 7954, 6511, 7975, 2285, 3368, 486, 5848, 6211, 3732, 4441, 7669, 2334, 6940, 4824, 5523, 169, 2354, 204, 5569, 5571, 2026, 8091, 4508, 578, 9...
Test
2,811
3
MS-DOS_Editor:ms-dos editor ms-dos editor commonly called edit edit.com character-based text editor comes ms-dos since version 5 32-bit versions microsoft windows superseded edlin standard editor earlier versions ms-dos 6.22 actually qbasic running editor mode dos 7 windows 95 qbasic removed ms-dos editor became standalone program editor sometimes used substitute notepad windows 9x notepad limited small files editor edit files 65,279 lines approximately 5 mb size ms-dos versions limited approximately depending much conventional memory free editor launched typing run command dialog windows typing codice_1 command-line interface edit still included later versions windows windows xp windows vista 32 bit windows 7 32 bit windows 8 32 bit 16-bit dos application directly run 64-bit windows versions edit version 1.0 appeared ms-dos ibm pc dos 5.00 os/2 windows nt 4.0 early chicago betas included version editors rely qbasic 1.0 version open one file limit dos memory although editor open one file also open quick help file split window edit version 1.1 appeared ms-dos 6.0 new features added editor main difference qbasic 1.1 used show ms-dos 6.0 help version available also versions windows 9x although files unchanged 6.22 renaming help.hlp edit.hlp allows one access dos 6 help system inside editor including cut paste help system open file pc dos 6 include edit command instead dos e editor upgraded support mouse menus version 7.0 edit version 2.0 appeared windows 95 appears windows 2000 later using qbasic still 16-bit dos program included 64-bit version windows directly work one version edit run dos 3.30 higher requires 80286 nec v20/v30 processor higher run 8088 8086 processor cause system stop responding freedos version developed shaun raven licensed gpl ms-dos editor uses text user interface color scheme adjusted multiple document interface version 2.0 included dos 7 windows 9x open 9 files time earlier versions included dos 5 6 limited one file screen split vertically two panes used view two files simultaneously different parts file also open files binary mode fixed number characters displayed per line newlines treated like character mode shows characters hexadecimal characters 0-9 a-f editor converts unix newlines dos newlines mouse support features added 1995 version 2.0 release windows 95
[ 4291, 1812, 4387, 4759, 6256, 2999, 6088, 2834, 204, 5480, 5571, 4955, 6997, 6907, 6634, 1382, 5138, 3797, 5234, 7272, 5942, 1213, 6380, 7494, 4547, 5784, 6773, 1140, 1793, 3417, 5181, 6062, 7868, 4464 ]
Validation
2,812
5
Vivaldi_(web_browser):vivaldi web browser vivaldi freeware cross-platform web browser developed vivaldi technologies company founded opera software co-founder former ceo jon stephenson von tetzchner tatsuki tomita officially launched april 6 2016 although intended general users first foremost targeted towards technically-inclined users well former opera users disgruntled transition presto layout engine chromium-based browser resulted loss many iconic features despite also chromium-based vivaldi aims revive features presto-based opera proprietary modifications march 2019 vivaldi 1.2 million active monthly users vivaldi began virtual community website replaced opera shut opera software march 2014 jon stephenson von tetzchner angered decision believed community helped make opera web browser tetzchner launched vivaldi community—a virtual community focused providing registered users discussion forum blogging service numerous practical web services—to make opera closure later january 27 2015 vivaldi technologies launched—with community mind—the first technical preview vivaldi web browser name comes italian composer antonio vivaldi according one creators easy name remembered understood worldwide vivaldi minimalistic user interface basic icons fonts color scheme changes based background design web page visited browser also allows users customize appearance ui elements background color overall theme address bar tab positioning start pages according ceo jon von tetzchner vivaldi vast unique customizability huge part browser caters experienced users vivaldi features ability stack tile tabs annotate web pages add notes bookmarks furthermore users place digital bookmarks speed dial page quick access harness quick commands search bookmarks browsing history open tabs settings vivaldi built around based web technologies html5 node.js react.js numerous npm modules technical preview 4 vivaldi also supports numerous mouse gestures actions like tab switching keyboard activation vivaldi also set chromeless ui gives users screen real-estate ability focus single page without distractions accommodate users prefer use large number tabs time vivaldi supports hibernation individual tabs tab stacks freeing resources user actively use tabs chromium-based browser vivaldi use many browser extensions developed google chrome users install directly chrome web store work properly vivaldi exception user interface customizations vivaldi interface quite different chrome company hopes integrate email client m3 future version vivaldi developers planning release extension platform vivaldi statcounter estimates vivaldi 0.05 market share desktop browsers december 2018 ars technica reviewer scott gilbertson wrote version 1.0 april 2016 praised innovative features tab handling noting likely remain niche browser see widespread uptake october 2018 gilbertson gave version 2.0 positive review stated vivaldi usual browser would hard put go back browser without unique features
[ 4655, 6802, 5378, 2204, 7537, 6808, 6809, 393, 3291, 2574, 2577, 6452, 3655, 4352, 4725, 4357, 1136, 6858, 84, 445, 1152, 1525, 7975, 7628, 5821, 5127, 6540, 3383, 8006, 8009, 3043, 1970, 6221, 520, 3057, 3060, 3412, 6582, 7692, 5887, 6...
Test
2,813
4
Physical_information_security:physical information security physical information security intersection common ground physical security information security primarily concerns protection tangible information-related assets computer systems storage media physical real-world threats unauthorized physical access theft fire flood typically involves physical controls protective barriers locks uninterruptible power supplies shredders information security controls physical domain complement logical domain encryption procedural administrative controls information security awareness compliance policies laws asset inherently valuable yet vulnerable wide variety threats malicious e.g theft arson accidental/natural e.g lost property bush fire threats materialize exploit vulnerabilities causing incidents likely adverse impacts organizations individuals legitimately utilize assets varying trivial devastating effect security controls intended reduce probability frequency occurrence and/or severity impacts arising incidents thus protecting value assets physical security involves use controls smoke detectors fire alarms extinguishers along related laws regulations policies procedures concerning use barriers fences walls doors obvious physical security controls designed deter prevent unauthorized physical access controlled area home office moats battlements mediaeval castles classic examples physical access controls bank vaults safes information security controls protect value information assets particularly information i.e intangible information content data intellectual property knowledge etc also computer telecommunications equipment storage media including papers digital media cables tangible information-related assets computer power supplies corporate mantra people greatest assets literally true sense so-called knowledge workers qualify extremely valuable perhaps irreplaceable information assets health safety measures even medical practice could therefore also classed physical information security controls since protect humans injuries diseases death perspective exemplifies ubiquity value information modern human society heavily reliant information information importance value deeper fundamental level principle subcellular biochemical mechanisms maintain accuracy dna replication could even classed vital information security controls given genes 'the information life malicious actors may benefit physical access information assets include computer crackers corporate spies fraudsters value information assets self-evident case say stolen laptops servers sold-on cash information content often far valuable example encryption keys passwords used gain access systems information trade secrets intellectual property inherently valuable valuable commercial advantages confer credit card numbers used commit identity fraud theft furthermore loss theft damage computer systems plus power interruptions mechanical/electronic failures physical incidents prevent used typically causing disruption consequential costs losses unauthorized disclosure confidential information even coercive threat disclosure damaging saw sony pictures entertainment hack end 2014 numerous privacy breach incidents even absence evidence disclosed personal information actually exploited fact longer secured control rightful owners potentially harmful privacy impact substantial fines adverse publicity/reputational damage noncompliance penalties impacts flow serious privacy breaches best avoided regardless cause several ways obtain information physical attacks exploitations examples described dumpster diving practice searching trash hope obtaining something valuable information carelessly discarded paper computer disks hardware sometimes attackers simply go building take information need frequently using strategy attacker masquerade someone belongs situation may pose copy room employee remove document someone desk copy document replace original leave copied document individuals pretending building maintenance may gain access otherwise restricted spaces might walk right building trash bag containing sensitive documents carrying portable devices storage media left desks perhaps memorized password sticky note stuck someone computer screen called colleague across open office literally shredding paper documents prior disposal commonplace physical information security control intended prevent information content media falling wrong hands digital data also shredded figurative sense either strongly encrypted repeatedly overwritten realistic probability information ever retrieved even using sophisticated forensic analysis constitutes physical information security control since purged computer storage media freely discarded sold without compromising original information content two techniques may combined high-security situations digital shredding data content followed physical shredding incineration destroy storage media many organizations restrict physical access controlled areas offices requiring people present valid identification cards proximity passes physical keys provided access tokens devices strictly controlled secure making hard unauthorized people obtain fabricate use associated electronic mechanical locks doors walls barriers etc sufficiently strong complete unauthorized physical entry controlled areas prevented protecting information assets within likewise office workers generally encouraged required obey clear desk policies protecting documents storage media including portable devices tidying away sight perhaps locked drawers filing cabinets safes vaults according risks requiring workers memorize passwords rather writing place might observed onlooker maybe colleague visitor intruder example risk avoidance computers plainly need electrical power hence vulnerable issues power cuts accidental disconnection flat batteries brown-outs surges spikes electrical interference electronic failures physical information security controls address associated risks include fuses no-break battery-backed power supplies electrical generators redundant power sources cabling remove warning signs plugs surge protectors power quality monitoring spare batteries professional design installation power circuits plus regular inspections/tests preventive maintenance ironic so-called uninterruptible power supplies often lead power interruptions inadequately specified designed manufactured used managed maintained illustration failure critical physical control
[ 4536, 1020, 6272, 5150, 8191, 4957, 6327, 7110, 5309, 1805 ]
Test
2,814
3
Westmere_(microarchitecture):westmere microarchitecture westmere formerly nehalem-c code name given 32 nm die shrink nehalem sharing cpu sockets westmere included intel hd uhd iris graphics nehalem first westmere -based processors launched january 7 2010 intel corporation westmere architecture available intel brands core i3 core i5 core i7 pentium celeron xeon westmere feature improvements nehalem reported successor nehalem westmere sandy bridge
[ 2449, 5802, 6332, 6698, 4123, 4845, 6793, 3942, 3849, 4765, 6170, 3443, 6344, 7974, 4108, 1465, 7449, 7453, 3020, 7364, 3717, 5669, 5670, 3803, 6647, 1867, 3565, 418, 4077, 4985, 766, 691, 5343, 866, 3333, 4098, 6057, 6675, 352, 6152, 2...
Test
2,815
2
Printer_driver:printer driver computers printer driver print processor piece software computer converts data printed format printer understand purpose printer drivers allow applications printing without aware technical details printer model printer drivers confused print spoolers queue print jobs send successively printer unix unix-like systems linux os x use cups short common unix printing system modular printing system unix-like computer operating systems allows computer act print server computer running cups host accept print jobs client computers process send appropriate printer printer drivers typically implemented filters usually named front end printing system printer spoolers constitute back end backends also used determine available devices startup backend asked list devices supports information available dos supports predefined character devices codice_1 codice_1 codice_1 codice_1 associated parallel printers supported system similarly serial printers used codice_1 codice_1 codice_1 codice_1 codice_1 users use commands like example codice_10 print content file printer contents transferred printer without interpretation therefore method printing either files already stored corresponding printer language generic text files without simple line-oriented formatting dos also provides dynamically loadable print spooler named print well optional support support screen captures also graphics mode graphics optional character device driver printer.sys loaded dos provides code page switching support also associated printers—different types dot matrix ink jet printers supported default beyond system-wide printer-specific drivers use application level ms-dos/pc dos dr-dos however script command loaded run background order intercept convert printer output applications postscript support ps-capable printers also applications supporting directly order support complex printing different models printers application e.g word processor may shipped printer drivers essentially descriptions printer escape sequences printers supplied drivers popular applications addition possible applications include tools editing printer description case ready driver days dos widely used many printers emulation modes epson fx-80 ibm proprinter commands many recent laser printers also emulation modes hp pcl hp laserjet postscript printers work dos appears also compatible windows 3.x microsoft windows systems printer drivers make use gdi unidrv pscript-based xps xpsdrv programs use standard apis draw text pictures screen paper printers use gdi natively commonly referred winprinters considered incompatible operating systems although software printfil make printers work dos prompt within windows win32 apis also allow applications send data directly spooler bypassing printer driver however applications actually use option printer driver usually located c \windows\system32\driverstore\filerepository folder windows machine original amigaos 1.3 supported printers standard series drivers stored required path devs printers printer drivers stored directory covered standard printers 1985-1989 circa included epson fx standard driver xerox 4020 hp etcetera amiga printer driver communicate though standard amiga printer.device default standard hardware device amiga dealing printers standard parallel.device controlled parallel port driver would control printer amiga printer drivers innovation time spared users individually configuring applications ability print 4096 colors use printer preferences program printers could connected serial port well amiga also support virtual device prt refer printer.device example command copy file prt caused file printed directly bypassing parallel.device default printer driver amiga used ansi escape codes special ones defined various printer manufacturers way every application amiga could use standard set control sequences would n't need know printer actually connected printer driver translated standard sequences special sequences certain printer understands amiga internal function pwrite printer.device writes 'length bytes directly printer function generally called printer drivers send buffer printer number buffers decided persons created driver amiga lacked standard printer spooler since amigaos 2.0 standard printer.device changed control various printers time printer preferences divided three main panels prefs printer selects main printer basic elements print spacing paper size printergfx controlled features like dithering scaling printerps controlled postscript printers printer drivers surprisingly remained almost workbench 1.3 4096 limits fact led amiga users prefer third party printer systems drivers like turboprint printstudio introduced recent drivers also featured functioning printer spooler amiga featured 16 millions colors printing morphos uses special version turboprint pilot recent printers many amiga programs like dtp programs pagestream featured past printer drivers usb printers automatically recognized poseidon usb stack stack capable detecting usb device class printers still require driver controlled addition install-able computer drivers could also present embedded firmware printers made available networking protocol e.g ipp embedded firmware printer could thus eliminate need install driver computer accepting print data general purpose format e.g pdf via networking protocol despite efforts standardize various stages printing pipeline printer interfaces largely still proprietary manufacturer-specific hence nature functions performed drivers vary nonetheless based function performed drivers classified follows drivers convert print data one general purpose format e.g pdf dvi etc another general purpose format e.g ps examples include ghostscript etc drivers convert print data one format e.g ps final device-specific format printer hardware process create print drivers act last stage delivering print job printer drivers likely embedded printer firmware examples manufacturer specific formats include install-able drivers packaged various formats ppd popular packaging format drivers accept postscript data pdf data input due dominance select operating systems operating system–driver interface standardized driver–printer interfaces hence standardization packaging formats drivers actual functions performed drivers
[ 6161, 7606, 3764, 5275, 4759, 5370, 6436, 4780, 6016, 578, 6822, 405, 2769, 7663, 1303, 3407, 7223 ]
Test
2,816
6
NTFS-3G:ntfs-3g ntfs-3g open-source cross-platform implementation microsoft windows ntfs file system read-write support ntfs-3g often uses fuse file system interface run unmodified many different operating systems runnable linux freebsd netbsd opensolaris illumos beos qnx wince nucleus vxworks haiku morphos minix macos openbsd licensed either gnu general public license proprietary license partial fork ntfsprogs active maintenance development ntfs-3g introduced one senior linux ntfs developers szabolcs szakacsits july 2006 first stable version released 2007-02-21 version 1.0 developers ntfs-3g later formed company tuxera inc. develop code ntfs-3g free community edition tuxera ntfs proprietary version ntfs-3g supports operations writing files files size created modified renamed moved deleted ntfs partitions transparent compression supported well system-level encryption support modify access control lists permissions available ntfs partitions mounted using filesystem userspace fuse interface according man page ntfs-3g supports hard links symbolic links ntfs-3g supports partial ntfs journaling unexpected computer failure leaves file system inconsistent state volume repaired 2009 volume unclean journal file recovered mounted default ‘ norecover ’ mount option used disable behavior benchmarks show driver performance via fuse comparable filesystems drivers in-kernel provided cpu powerful enough embedded old systems high processor usage severely limit performance
[ 4759, 1534, 6175, 5571, 8092, 1281, 578, 1382, 224, 7581, 1047, 3915, 6500, 1435 ]
Test
2,817
2
System_V_printing_system:system v printing system printing subsystem unix system v one several standardized systems printing unix typical commercial system v-based unix versions solaris sco openserver system running print architecture could traditionally identified use user command primary interface print system opposed bsd command though systems provide alias typical user commands available system v printing system unix programming model device files special files act access points peripheral devices printers example first line printer unix system might represented file device directory i.e using file metaphor document could printed copying file onto device worked well enough case one printer per user model scale well multiple users share one printer solution create queue spool documents printed use daemon system process manage queue send documents printer order arrived system command send documents queue first introduced 1973 version 4 unix release system v release 4 suite utilities grown include commands canceling print jobs moving jobs among queues enabling disabling queues enabling disabling job scheduler daemon status reports print system command handled queue documents printed 20 different options controlled appearance document place queue even handled email notification user document finished printing command returned job id could used cancel lpstat commands remove job queue check progress respectively system considered quite complex set administer uses expected use three commands distribution influential unix system v interface implementation became standard users control printers command included requirement posix.2 standard command name appeared subsequent lpr lprng cups printing systems svr4 derivates like sco unix command simply alias command used bsd-based system late 1996 running linux stated linux printing software consists unix standard lp lpr software 1999 support lp waning third edition simply stated lpr command prints document linux 2003 survey debian mandrake red hat slackware suse distributions showed running combination lpr lprng cups original system v printing system remains proprietary however solaris print system heavily modified original released open source software part opensolaris project common unix printing system emulates system v berkeley print architectures interface level though internal architecture different introduction simplified configuration system lp author peter gray university wollongong described several weaknesses version shipping then-current solaris operating system version 2 result gray observed many administrators choose simply run old lpr/lpd system svr4 boxes
[ 361, 6789, 3685, 366, 4387, 4662, 8165, 3085, 1537, 2834, 2835, 4283, 7075, 1837, 5480, 5826, 3106, 2118, 578, 923, 5933, 5138, 6367, 1389, 667, 1572, 5942, 6648, 3984, 2589, 1213, 5946, 2680, 7667, 4447, 6050, 7494, 6242, 6586, 7868, 3...
Test
2,818
2
Usage_share_of_operating_systems:usage share operating systems usage share operating systems percentage computing devices run operating system particular time figures necessarily estimates data operating system share difficult obtain reliable primary sources agreed methodologies collection personal computing platform area smartphones watches google android dominates 2.5 billion users mobile phone operating systems include apple ios kaios series 30+ area desktop laptop computers microsoft windows generally 70 markets 78 globally apple macos around 14 google chromeos 3 north america linux around 2 figures vary somewhat different markets depending gathered android battling windows used rank often popular past global scale ios never managed close half popularity windows however mobile operating systems android plus ios majority use non-mobile windows e.g macos close two years mostly android continues popular windows still countries continents mobile devices never anywhere near popular continents countries become mobile-majority still including ireland ios alone popular windows later android alone europe populous countries populous continent asia whole e.g china india excluding e.g russia still mobile-majority 56.37 public internet servers linux generally counted dominant powering twice number hosts windows server trailed many smaller players including traditional mainframe oses supercomputer field completely dominated linux 100 top500 running os according gartner following worldwide device shipments referring wholesale operating system includes smartphones tablets laptops pcs together shipments stores mean sales consumers necessarily year shipment therefore suggesting numbers indicate popularity and/or usage could misleading smartphones sell higher numbers traditional pcs also whole lot dollar value gap projected widen well double 2015 earlier gartner reports year worldwide pc shipments declined fourth consecutive year started 2012 launch tablets 8 decline pc sales 2015 including cumulative decline sales previous years gartner includes macs running macos pc sales numbers e.g ipads androids individually slight increase sales 2015 28 may 2015 google announced 1.4 billion android users 1 billion google play users active month changed 2 billion monthly active users may 2017 27 january 2016 paul thurrott summarized operating system market day apple announced one billion devices microsoft backed away goal one billion windows 10 devices three years middle 2018 reported 26 september 2016 windows 10 running 400 million devices march 2019 800 million late 2016 android e.g samsung smartphones explained killing apple ios market share i.e declining sales smartphones relatively also number units whole market increasing 9 may 2019 biggest smartphone companies market share samsung huawei apple respectively gartner press release said apple continued downward trend decline 7.7 percent second quarter 2016 decline based absolute number units underestimates relative decline market increasing along misleading 1.7 percent point decline point decline means 11.6 relative decline 14.6 12.9 although units sold apple declining almost vendor making profit smartphone sector hardware sales alone q3 2016 example captured 103.6 market profits mobile phone owners toothbrush owners mobile phones fastest growing technology history billion active mobile phones world people many 10 billion sold far less half still use explained fact people one extra work phones operating system fraction smartphones os capable running modern applications currently 3.1 billion smartphones tablets use across world tablets small fraction total generally running operating systems android ios latter popular tablets 2019 announced variant ios called ipados specifically ipad tablets development 2015 emarketer estimated beginning year tablet installed base would hit one billion first time china use 328 million google play n't serve track usa use second 156 million end year cheap tablets counted analysts goal met even excluding cumulative sales previous years conflicts statistics idc say tablet market contracted 10 2015 huawei ranked fifth big gains doubling share fourth quarter 2015 five biggest vendors except amazon fire tablets ranked third worldwide new list enabled quite tripling market share 7.9 fire os android-derivative recent data various sources published last twelve months summarized table sources monitor substantial number web sites statistics related one web site excluded android currently ranks highest windows incl xbox console systems every day week ios competes windows sweden depending day ios used ios windows 10 competing 13 windows mobile systems i.e windows phone accounts 0.51 web usage weekends ios alone topped windows us ios n't popular independent country guam unincorporated territory united states three consecutive quarters ios also highest ranked falkland islands british overseas territory one quarter plus one month overtaken android following quarter unknown strangely high countries madagascar 32.44 may due fact statcounter uses browser detection get os statistics common browsers often used version breakdown browsers madagascar shows 34.9 opera mini 4.4 popular known browser 22.1 plus e.g 3.34 opera 7.6 however browser statistics without version-breakdown opera 48.11 category small china android highest ranked operating system since january 2016 windows occasionally topped since asian continent whole android ranked highest since february 2016 android alone majority share large majority populous countries continent 84 bangladesh since august 2015 android ranked first 48.36 may 2016 african continent took big jump ahead windows 7 thereby africa joined asia mobile-majority continent china longer desktop-majority country joining india mobile-majority 71 confirming asia significant mobile-majority online usage linux kernel derivatives google systems gnu/linux exceeds windows true since time january april 2016 according w3counter statcounter however even figure unix-like oses including apple higher windows windows still dominant desktop os dominance varies region gradually lost market share desktop operating systems mobile slide noticeable us macos usage tripled 2009 2017 windows 72.76 chrome os 3.33 plus traditional linux 1.46 little openly published information device shipments desktop laptop computers gartner publishes estimates way estimates calculated openly published another source market share various operating systems statcounter basing estimate web use although may accurate also sales may overstate usage computers sold pre-installed operating system users replacing os different one due personal preference installing another os alongside using conversely sales underestimate usage counting unauthorized copies example 2009 approximately 80 software sold china comprised illegitimate copies 2007 statistics automated update ie7 registered windows computers differed observed web browser share leading one writer estimate 25–35 windows xp installations unlicensed usage share microsoft latest client operating system windows 10 slowly increasing since july/august 2016 windows 7 slight decrease time reaching around 27.15 december 2016 web analysis shows significant variation different parts world example north america usage windows xp dropped 2.06 africa still 11.02 asia 6.63 even higher china 18.21 tied windows 10 second going overtaken windows 10 conversely macos north america claims 16.82 17.52 us whereas asia 4.4 2019 stack overflow developer survey provides detail particular versions windows desktop operating system share among identifying professional developers june 2016 microsoft claimed windows 10 half market share windows installations usa uk quoted betanews digital video game distribution platform steam publishes monthly hardware software survey statistics q1 2018 mobile operating systems smartphones included google dominant android variants apple ios combined almost 100 market share smartphone penetration vs. desktop use differs substantially country countries like russia still smartphone use low 19 western countries smartphone use close 50 smartphone usage share developing countries much higher bangladesh example android smartphones 84 share mali smartphones 90 95 share year section information regional trends move smartphones clear correlation gdp per capita country country respective smartphone os market share richest countries much likely choose apple iphone google android predominant elsewhere tablet computers simply tablets became significant os market share category starting apple ipad q1 2018 ios 65.03 market share android 34.58 market share windows tablets may get classified analysts thus barely register e.g 2-in-1 pcs may get classified desktops tablets since 2016 south america cuba north america android tablets gained majority asia 2017 android slightly popular ipad 49.05 usage share october 2015 africa android tablets much popular elsewhere ipad safe margin android made steady gains becoming popular tablet operating system trend many countries already gained majority large countries india 63.25 indonesia 62.22 african continent android 62.22 first gain android majority late 2014 steady gains 20.98 august 2012 egypt 62.37 zimbabwe 62.04 south america 51.09 july 2015 peru 52.96 asia 46 nepal android gained majority lead november 2014 lost 41.35 ios 56.51 taiwan october 2016 android gained confident majority losing streak china major exception android gaining market share asia android phablets much popular android tablets similar devices get classified smartphones ipad/ios 82.84 march 2015 according statcounter web use statistics proxy use smartphones popular desktop computers globally android particular popular windows although desktop computers still popular many countries overall 44.9 first quarter 2017 smartphones popular even many developed countries countries continents desktop-minority android popular windows many e.g poland europe half countries south america many north america e.g guatemala honduras haiti countries asia africa smartphone-majority android poland turkey europe highest 57.68 62.33 respectively ireland smartphone use 45.55 outnumbers desktop use mobile whole gains majority including tablet share 9.12 spain also slightly desktop-minority july 2019 sweden desktop-minority eight weeks row range measured mobile web use varies lot country statcounter press release recognizes india amongst world leaders use mobile surf internet big countries share around 80 desktop 19.56 russia trailing 17.8 mobile use desktop rest smartphones discounting tablets first gained majority december 2016 desktop-majority lost month n't christmas-time fluke close majority smartphone majority happened march 2017 week 7–13 november 2016 smartphones alone without tablets overtook desktop first time albeit short period examples mobile-majority countries include paraguay south america poland europe turkey asia africa world still desktop-majority example united states 54.89 days however territories united states puerto rico desktop significantly majority windows 30 overtaken android 22 october 2016 subsequent weekends mobile showed majority since 27 october desktop n't majority including weekdays smartphones alone showed majority since 23 december end year share topping 58.22 christmas day mobile -majority share smartphones tablets could added giving 63.22 majority unusually high top similar high also occurred monday 17 april 2017 smartphone share slightly lower tablet share slightly higher combining 62.88 formerly according statcounter press release world turned desktop-minority 49 desktop use month mobile n't ranked higher tablet share added exceed desktop share christmas season i.e temporarily desktop-minority remains smartphone-majority weekends last two weeks december 2016 australia oceania general desktop-minority first time extended period i.e every day 23 december south america smartphones alone took majority desktops christmas day full-week-average desktop still least 58 uk desktop-minority dropped 44.02 christmas day eight days end year ireland joined european countries smartphone-majority three days christmas topping day 55.39 us desktop-minority happened three days around christmas longer four-day stretch happened november happens frequently weekends according statcounter web use statistics proxy use week 7–13 november 2016 mobile meaning smartphones alone without tablets overtook desktop first time highest ranked 52.13 27 november 2016 49.02 full week mobile-majority applies countries paraguay south america poland europe turkey continents asia africa large regions rest world still desktop-majority days united states north america whole n't us desktop-minority four days row five-day average examples desktop-minority days include uk ireland australia oceania whole fact least one country every continent turned desktop-minority least month 22 october 2016 subsequent weekends mobile shown majority previously according statcounter press release world turned desktop-minority 49 desktop use month desktop-minority stretching 18-weeks/4-months period 28 june 31 october 2016 whole july august september 2016 showed desktop-majority many long sub-periods long stretch showed desktop-minority similarly fridays saturdays sundays desktop-minority biggest continents asia africa shown vast mobile-majority long time day week well several individual countries elsewhere also turned mobile-majority poland albania turkey europe paraguay bolivia south america according statcounter web use statistics saturday 28 may 2016 day smartphones mobile statcounter counts tablets separately became used platform ranking first 47.27 desktops next day desktops slightly outnumbered mobile unless counting tablets analysts count tablets smartphones separately others desktops even tablets ipad android windows devices since sunday 27 march 2016 first day world dipped desktop-minority happened almost every week week 11–17 july 2016 world desktop-minority followed next week thereon also three-week period trend still stronger weekends e.g 17 july 2016 showed desktop 44.67 mobile 49.5 plus tablets 5.7 recent weekly data shows downward trend desktops according statcounter web use statistics proxy overall use weekends desktops worldwide lose 5 percent points e.g 51.46 15 august 2015 loss relative web use going mobile also minuscule increase tablets mostly windows 7 ranked 1st workdays declines web use shifting android lesser degree ios two continents already crossed mobile-majority android based statcounters web use statistics june 2015 asia became first continent mobile overtook desktop followed africa august nigeria mobile majority october 2011 symbian later 51 share series 40 dominating followed android dominating operating system far back october 2014 reported trend large scale press release mobile usage already overtaken desktop several countries including india south africa saudi arabia india desktop went majority july 2012 32 bangladesh desktop went majority may 2013 17 android alone accounting majority web use african countries still desktop-majority many large mobile majority including ethiopia kenya mobile usage 72 popularity mobile use worldwide driven huge popularity increase android asian countries android highest ranked operating system statistically virtually every south-east asian country also ranks popular almost every african country poland desktop-minority since april 2015 android vastly popular european countries albania turkey also crossed south america continent somewhat far losing desktop-majority paraguay lost android mobile browsing general also become hugely popular continents desktop large desktop base trend mobile clear fraction total web use analysts count tablets desktops run windows others count mobile phones vast majority tablets run so-called mobile operating system android operating system |android ios ipad ipad clear lead globally clearly lost majority android south america number eastern european countries poland lost virtually african countries lost majority twice asia gained majority back many individual countries e.g india middle east clear android majority tablets android tablets thus second popular ipad march 2015 first time us number mobile-only adult internet users exceeded number desktop-only internet users 11.6 digital population using mobile compared 10.6 using desktop also means majority 78 use desktop mobile access internet smaller countries north america haiti android gone mobile majority mobile went 72.35 64.43 february 2016 region largest android usage also largest mobile revenue file rack001.jpg|thumb| server computing |servers colocation centre |upright|right server computing |internet based servers market share measured statistical surveys publicly accessible servers web server mail server dns server internet operating systems powering servers found inspecting raw response messages method gives insight market share operating systems publicly accessible internet differences result depending sample done observations weighted usually surveys based random sample ip numbers domain names hosts organisations servers found method additionally many domains ip numbers may served one host domains may served several hosts one host several ip numbers file ibm system z10.jpg|thumb|upright|right|ibm ibm system z10|system z10 common operating system mainframes ibm z/os operating systems ibm system z generation hardware include ibm proprietary z/os linux z systems transaction processing facility|z/tpf vse operating system |z/vse z/vm gartner reported 23 december 2008 linux system z used approximately 28 customer z base expected increase 50 following five years linux system z red hat micro focus compete sell red hat enterprise linux|rhel suse linux enterprise server|sles respectively file operating systems used top 500 supercomputers.svg|thumb|upright=1.8|supercomputer os family 1993–2019 systems share according top500 field supercomputers always dominated unix unix-like operating systems linux predominating since 2017 top 500 fastest supercomputers run linux top500 project lists ranks 500 fastest supercomputer benchmark results submitted june 2017 two aix computers held rank 493 494 last non-linux systems dropped list last non-linux fastest supercomputer asci white also running aix held title november 2000 november 2001 decommissioned 2006 historically kinds unix operating systems dominated end ultimately linux remains category operating systems|*usage share operating systems category usage share|operating systems
[ 1807, 4297, 4670, 5021, 13, 3271, 3276, 3626, 6808, 2564, 5041, 7546, 5396, 7550, 740, 7189, 405, 1855, 4347, 65, 4733, 5783, 6853, 5088, 6500, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 4397, 6892, 5116, 2300, 126, 6907, 4786,...
Test
2,819
8
Search/Retrieve_via_URL:search/retrieve via url search/retrieve via url sru standard search protocol internet search queries utilizing contextual query language cql standard query syntax representing queries sample code complete answer sru query-url url query version=1.1 operation=searchretrieve query=dc.title=darwinism cql query dc.title=darwinism
[ 7198, 98, 5612, 80, 2261, 84, 5885, 945, 6024 ]
Train
2,820
9
GAUSS_(software):gauss software gauss matrix programming language mathematics statistics developed marketed aptech systems primary purpose solution numerical problems statistics econometrics time-series optimization 2d- 3d-visualization first published 1984 ms-dos currently also available linux macos windows range toolboxes available gauss additional cost see https //www.aptech.com/products/gauss-applications/ complete listing products
[ 5098, 3606, 1626, 4759, 5548, 1731, 3619, 5288, 5117, 3623, 6356, 5571, 4872, 578, 4705, 1569, 4067, 3981, 3388, 4070, 3807, 6380, 1398, 6934, 1879, 7579, 7860, 3410, 256, 3915, 4999 ]
Test
2,821
4
Transient-key_cryptography:transient-key cryptography transient-key cryptography form public-key cryptography wherein keypairs generated assigned brief intervals time instead individuals organizations blocks cryptographic data chained time transient-key system private keys used briefly destroyed sometimes nicknamed “ disposable crypto. ” data encrypted private key associated specific time interval irrefutably linked interval making transient-key cryptography particularly useful digital trusted timestamping public-key transient-key systems used generate digital signatures assert given piece data changed since signed similarities end traditional public key system public/private keypair typically assigned individual server organization data signed private key asserts signature came indicated source keypairs persist years time private component must carefully guarded disclosure public-key system anyone access private key counterfeit person digital signature transient-key systems however keypair assigned brief interval time particular person entity data signed specific private key becomes associated specific time date keypair active minutes private key permanently destroyed therefore unlike public-key systems transient-key systems depend upon long-term security private keys transient-key system source time must consistent standard understood senders receivers since local system clock may changed user never used source time instead data digitally signed time value derived universal coordinated time utc accurate within millisecond accordance ansi asc x9.95 standard trusted timestamping whenever time interval transient-key system expires new public/private keypair generated private key previous interval used digitally certify new public key old private key destroyed key-chaining system immediate ancestor blockchain technology vogue today new interval time values obtained trusted third-party source specific moments time interpolated received times using time-biasing method based internal system timer trusted time source obtained running within specified tolerances transient private keys issued case time interval chain terminated fresh one begun old new chains connected network archives enable servers continue verify data integrity time protected data regardless often chain must restarted start times chain interval coupled together form unbroken sequence public keys used following extra security measure requests signatures made interval stored log concatenated appended public key start next interval mechanism makes impossible insert new “ signed events ” interval chain fact independently operating servers cross-certification provide third-party proof validity time interval chain irrefutable evidence consensus current time transient-key cryptographic systems display high byzantine fault tolerance web interconnected cross-certifying servers distributed environment creates widely witnessed chain trust strong strongest link contrast entire hierarchies traditional public key systems compromised single private key exposed individual transient key interval chain cross-certified transient key chains server instances cross-certification server signs server b interval chain signed data interval definition effect private keys server b used sign public keys server diagram server instance cross-certified two server instances blue orange cross-certification requires timestamp interval agree timestamp cross-certifying server within acceptable tolerances user-defined typically hundred milliseconds duration along intervals cross-certifications stored network archive within transient-key network archive logical database stored replicated system enable verification data timestamped signed transient keys map set accessible archives stored within every digital signature created system whenever cross-certifications completed beginning interval archive map updated published servers network interval transient private key used sign data concatenated trusted timestamps authenticity certificates verify data later time receiver accesses persistent public key appropriate time interval public key applied digital signature passed published cryptographic routines unpack hash original data compared fresh hash stored data verify data integrity signature successfully decrypts using particular interval published public key receiver assured signature originated time period decrypted fresh hashes match receiver assured data tampered since transient private key created timestamp signed data transient-key cryptography invented 1997 dr. michael d. doyle eolas technologies inc. later acquired productized proofspace inc protected us patents 6,381,696 7,017,046 7,047,415 7,210,035 included ansi asc x9.95 standard trusted timestamping transient-key cryptography predecessor forward secrecy despite appearance bitcoin blockchain technology derived transient-key cryptography dr. doyle publicly denied satoshi nakamoto
[ 6430, 6049, 7567, 2054, 1353, 354, 744 ]
Test
2,822
5
Streaming_Text_Oriented_Messaging_Protocol:streaming text oriented messaging protocol simple streaming text oriented message protocol stomp formerly known ttmp simple text-based protocol designed working message-oriented middleware mom provides interoperable wire format allows stomp clients talk message broker supporting protocol protocol broadly similar http works tcp using following commands communication client server frame consisting number lines first line contains command followed headers form key value one per line followed blank line body content ending null character communication server client message receipt error frame similar format headers body content mom products support stomp list implementations also maintained stomp web site
[ 7637, 99, 6521, 6447, 2102, 2621 ]
Train
2,823
4
Rainbow_table:rainbow table rainbow table precomputed table reversing cryptographic hash functions usually cracking password hashes tables usually used recovering password credit card numbers etc certain length consisting limited set characters practical example space–time tradeoff using less computer processing time storage brute-force attack calculates hash every attempt processing time less storage simple lookup table one entry per hash use key derivation function employs salt makes attack infeasible rainbow tables invented philippe oechslin application earlier simpler algorithm martin hellman computer system requires password authentication must contain database passwords either hashed plaintext various methods password storage exist tables vulnerable theft storing plaintext password dangerous databases therefore store cryptographic hash user password database system one – including authentication system – determine user password merely looking value stored database instead user enters password authentication system computes hash value provided password hash value compared stored hash user authentication successful two hashes match gathering password hash using said hash password would fail since authentication system would hash second time learn user password password produces hashed value must found usually brute-force dictionary attack rainbow tables one type tool developed derive password looking hashed value rainbow tables always needed straightforward methods hash reversal available brute-force attacks dictionary attacks straightforward methods available however adequate systems use long passwords difficulty storing options available searching extensive database perform reverse lookup hash address issue scale reverse lookup tables generated stored smaller selection hashes reversed could make long chains passwords although reverse lookup hash chained table takes computational time lookup table much smaller hashes longer passwords stored rainbow tables refinement chaining technique provide solution problem called chain collisions source suppose password hash function h finite set passwords p. goal precompute data structure given output h hash function either locate element p p h p h determine p p. simplest way compute h p p p storing table requires θ |p| n bits space n size output h prohibitive large |p| hash chains technique decreasing space requirement idea define reduction function r maps hash values back values p. note however reduction function actually inverse hash function rather different function swapped domain codomain hash function alternating hash function reduction function chains alternating passwords hash values formed example p set lowercase alphabetic 6-character passwords hash values 32 bits long chain might look like requirement reduction function able return plain text value specific size generate table choose random set initial passwords p compute chains fixed length k one store first last password chain first password called starting point last one called endpoint example chain aaaaaa would starting point kiebgt would endpoint none passwords hash values would stored given hash value h want invert find corresponding password compute chain starting h applying r h r point observe value matching one endpoints table get corresponding starting point use recreate chain good chance chain contain value h immediately preceding value chain password p seek example 're given hash would compute chain first applying r since one endpoints table take corresponding starting password follow chain 920ecf10 reached thus password different password hash value note however chain always contain hash value h may happen chain starting h merges chain different starting point example may given hash value fb107e70 follow chain get kiebgt chain starting aaaaaa called false alarm case ignore match continue extend chain h looking another match chain h gets extended length k good matches password never produced chains table content depend hash value inverted created repeatedly used lookups unmodified increasing length chain decreases size table also increases time required perform lookups time-memory trade-off rainbow table simple case one-item chains lookup fast table big chains get longer lookup slows table size goes simple hash chains several flaws serious point two chains collide produce value merge consequently table cover many passwords despite paid computational cost generate previous chains stored entirety impossible detect efficiently example third value chain 3 matches second value chain 7 two chains cover almost sequence values final values hash function h unlikely produce collisions usually considered important security feature reduction function r need correctly cover likely plaintexts collision resistant difficulties result importance choosing correct function r. picking r identity little better brute force approach attacker good idea likely plaintexts choose function r makes sure time space used likely plaintexts entire space possible passwords effect r shepherds results prior hash calculations back likely plaintexts benefit comes drawback r likely wo n't produce every possible plaintext class attacker wishes check denying certainty attacker passwords came chosen class also difficult design function r match expected distribution plaintexts rainbow tables effectively solve problem collisions ordinary hash chains replacing single reduction function r sequence related reduction functions r r. way two chains collide merge must hit value iteration consequently final values chain identical final postprocessing pass sort chains table remove duplicate chains final value chains new chains generated fill table chains collision-free may overlap briefly merge drastically reducing overall number collisions using sequences reduction functions changes lookup done hash value interest may found location chain necessary generate k different chains first chain assumes hash value last hash position applies r next chain assumes hash value second-to-last hash position applies r h r last chain applies reduction functions alternating h. creates new way producing false alarm guess position hash value wrong may needlessly evaluate chain although rainbow tables follow chains make fewer tables simple hash chain tables grow beyond certain size without rapidly becoming inefficient due merging chains deal maintain multiple tables lookup must search table rainbow tables achieve similar performance tables k times larger allowing perform factor k fewer lookups rainbow tables use refined algorithm different reduction function link chain hash collision two chains chains merge long collision n't occur position chain increases probability correct crack given table size cost squaring number steps required per lookup lookup routine also needs iterate index first reduction function used chain rainbow tables specific hash function created e.g. md5 tables crack md5 hashes theory technique invented philippe oechslin fast form time/memory tradeoff implemented windows password cracker ophcrack powerful rainbowcrack program later developed generate use rainbow tables variety character sets hashing algorithms including lm hash md5 sha-1 simple case reduction function hash function collision given complete rainbow table one makes sure find corresponding password given hash size password set p time needed compute table length table l average time needed find password matching given hash directly related thus 8-character lowercase alphanumeric passwords case p ≃ 3×10 would easily tractable personal computer 16-character lowercase alphanumeric passwords case p ≃ 10 would completely intractable rainbow table ineffective one-way hashes include large salts example consider password hash generated using following function || concatenation operator codice_1 codice_2 salt value secret may generated random stored password hash large salt value prevents precomputation attacks including rainbow tables ensuring user password hashed uniquely means two users password different password hashes assuming different salts used order succeed attacker needs precompute tables possible salt value salt must large enough otherwise attacker make table salt value older unix passwords used 12-bit salt would require 4096 tables significant increase cost attacker impractical terabyte hard drives sha2-crypt bcrypt methods—used linux bsd unixes solaris—have salts 128 bits larger salt values make precomputation attacks systems infeasible almost length password even attacker could generate million tables per second would still need billions years generate tables possible salts another technique helps prevent precomputation attacks key stretching stretching used salt password intermediate hash values run underlying hash function multiple times increase computation time required hash password instance md5-crypt uses 1000 iteration loop repeatedly feeds salt password current intermediate hash value back underlying md5 hash function user password hash concatenation salt value secret final hash extra time noticeable users wait fraction second time log hand stretching reduces effectiveness brute-force attacks proportion number iterations reduces number attempts attacker perform given time frame principle applied md5-crypt bcrypt also greatly increases time needed build precomputed table absence salt needs done alternative approach called key strengthening extends key random salt unlike key stretching securely deletes salt forces attacker legitimate users perform brute-force search salt value although paper introduced key stretching referred earlier technique intentionally chose different name term key strengthening often arguably incorrectly used refer key stretching rainbow tables precomputation attacks work passwords contain symbols outside range presupposed longer precomputed attacker however tables generated take account common ways users attempt choose secure passwords adding number special character sizable investment computing processing rainbow tables beyond fourteen places length yet common choosing password longer fourteen characters may force attacker resort brute-force methods specific intensive efforts focused lm hash older hash algorithm used microsoft publicly available lm hash particularly vulnerable passwords longer 7 characters broken two sections hashed separately choosing password fifteen characters longer guarantees lm hash generated nearly distributions variations unix linux bsd use hashes salts though many applications use hash typically md5 salt microsoft windows nt/2000 family uses lan manager nt lan manager hashing method based md4 also unsalted makes one popularly generated tables
[ 5194, 5272, 7793, 4759, 1353, 1926, 907, 3100, 4867, 578, 3794, 1382, 762, 7209, 6046, 6049, 6393, 8147, 1245, 1708 ]
Validation
2,824
9
Zend_Technologies:zend technologies zend technologies ltd. world wide web infrastructure software company headquarters cupertino california u.s. technology center ramat gan tel aviv israel offices france italy germany company operations currently centered development products relating development deployment management php-based web applications including zend studio zend technologies founded andi gutmans zeev suraski along israeli graduates technion developed php initial creation rasmus lerdorf name zend combination suraski gutmans forenames zeev andi 1997 gutmans suraski rewrote parser php-fi originally written lerdorf resulting php 3 1998 redesigned parser completely named zend engine php 4 based first version zend engine 1999 company zend technologies formally established received initial funding israeli venture capital funds platinum neurone ventures walden israel doron gerstel experienced business executive recruited head company ceo 2000 jim jagielski hired cto us operations july 2004 zend technologies raised 8m series c funding established headquarters usa january 2005 intel capital sapphire ventures formerly sap ventures joined existing investors zend technologies june 2006 zend technologies received best startup software company award israeli venture association annual hi tech conference tel aviv award presented israeli prime minister ehud olmert august 2006 zend raised 20 million series funding february 2009 zend co-founder andi gutmans appointed chief executive officer previously serving company vp research development zend also recruited mark burton previously served evp worldwide sales mysql executive chairman october 2015 rogue wave software acquired zend shortly acquired co-founder andi gutmans left company february 2016 zend server web application server running managing php applications zend server comes built-in application monitoring application problem diagnostics caching optimization capabilities web-based administrator console zend server ’ installers native os rpm/deb/msi include tested php distribution zend framework out-of-the-box connectivity common databases java connectivity scalable php-integrated download server linux community edition zend server free complete php stack advertised company suited developing php applications running non-critical applications production zend server community edition supported linux windows iseries i5/os mac os x periodically updated zend starting zend server 7.0 free edition discontinued available paid upgrade zend platform product runs web server monitoring php applications reporting performance possible problems also offers php accelerator often confused free zend optimizer content caching solution including api partial page caching session clustering numerous management tools zend platform used conjunction zend studio remote debugging profiling php applications native server environment zend studio commercial proprietary integrated development environment ide php 2013 along zend server deployed 40,000 companies zend guard product prevent peeping php scripts zend also provides php certification test certifies people succeeding exam zend certified php engineers zce confused zend framework certification intended prove person fully qualified develop php web applications 10,000 zend certified engineers world either php 4 php 5 php 5.3 certifications help zend certified engineers gain employment zend lists persons passed zend php certification exam directory yellow pages php professionals also allow zces place zce logo personal web site/resume php mainly used web development language zce tests candidate variety skills necessary developing web applications php 5 certification exam covers although study guide contents topics consider order prepared exam use new extension php data object pdo layer access databases standard php library spl new set classes specially created manipulate objects sets arrays files zend considers required score pass test confidential well questions inform failing candidates topics made fail known candidates must pass every topic pass test whole believed required score per topic might 75–85 passing zend certification test every candidate gets listing zend certified directory lifetime free enables recruiters hire qualified certified php engineers zend engine heart php originally written andi gutmans zeev suraski first version zend engine shipped php4 zend sponsors developers actively contribute engine main development zend engine today comes contributors php project zend framework open-source object-oriented web application framework written php5 licensed new bsd license simple cloud api open-source php api accessing services multiple cloud vendors configuration changes alone project first project zend launched facilitate php development cloud apigility api builder designed simplify creation maintenance apis zend technologies visits events worldwide spread oss message 2005 zeev suraski delivered speech oss technical seminar organized open standard support organization sunwah pearl linux hong kong trade development council
[ 1737, 623, 3508, 6029, 6986 ]
Test
2,825
0
Russell_Gray:russell gray russell david gray evolutionary biologist psychologist working applying quantitative methods study cultural evolution human prehistory worked professor university auckland located new zealand although originally trained biology psychology gray become well known studies evolution austronesian language family using computational phylogenetic methods gray also performs research animal cognition one main research-projects studies tool-use among new caledonian crows summer 2014 max planck society announced max planck institute economics jena germany would receive new different mandate along johannes krause gray appointed director new max planck institute science human history commencing february 1 2014
[]
Test
2,826
7
ClearSlide:clearslide clearslide saas-based sales engagement platform lets users share content sales materials via email links viewer ’ link ‘ live pitch ’ clearslide designed sales marketing teams accessible primarily via annual subscription model users also sign limited time free trial software full access features regular subscription company ’ headquarters san francisco ’ financial district clearslide found october 2009 funded founders initial subscribers company fundraise year following launch august 2012 clearslide raised 28 million series b round financing announcing fuel rapid growth expansion plans march 5 2013 company bought sliderocket vmware second acquisition announced july 2 2013 clearslide bought crunched rival cloud-based sales engagement platform february 2014 clearslide raised 50 million series c funding partnership social+capital partnership led additional contributions greylock partners bessemer venture partners felicis ventures
[ 4295 ]
Test
2,827
9
Thread-local_storage:thread-local storage thread-local storage tls computer programming method uses static global memory local thread use global variables generally discouraged modern programming legacy operating systems unix designed uniprocessor hardware require additional mechanism retain semantics pre-reentrant apis example situations functions use global variable set error condition example global variable codice_1 used many functions c library codice_1 global variable call system function one thread may overwrite value previously set call system function different thread possibly following code different thread could check error condition solution codice_1 variable looks like global fact exists per thread—i.e. lives thread-local storage second use case would multiple threads accumulating information global variable avoid race condition every access global variable would protected mutex alternatively thread might accumulate thread-local variable definition read written threads implying race conditions threads synchronise final accumulation thread-local variable single truly global variable many systems impose restrictions size thread-local memory block fact often rather tight limits hand system provide least memory address pointer sized variable thread-local allows use arbitrarily sized memory blocks thread-local manner allocating memory block dynamically storing memory address block thread-local variable application programming interface api function codice_4 used obtain unused tls slot index tls slot index considered ‘ used ’ codice_5 codice_6 functions used read write memory address thread-local variable identified tls slot index codice_6 affects variable current thread codice_8 function called release tls slot index win32 thread information block thread one entries block thread-local storage table thread tlsalloc returns index table unique per address space call thread copy thread-local storage table hence thread independently use tlssetvalue index obtain specified value via tlsgetvalue index set look entry thread table apart tlsxxx function family windows executables define section mapped different page thread executing process unlike tlsxxx values pages contain arbitrary valid addresses addresses however different executing thread therefore passed asynchronous functions may execute different thread otherwise passed code assume virtual address unique within whole process tls sections managed using memory paging size quantized page size 4kb x86 machines sections may defined inside main executable program dlls contain sections correctly initialized loading loadlibrary pthreads api memory local thread designated term thread-specific data functions codice_9 codice_10 used respectively create delete key thread-specific data type key explicitly left opaque referred codice_11 key seen threads thread key associated thread-specific data via codice_12 data later retrieved using codice_13 addition codice_9 optionally accept destructor function automatically called thread exit thread-specific data null destructor receives value associated key parameter perform cleanup actions close connections free memory etc. even destructor specified program must still call codice_10 free thread-specific data process level destructor frees data local thread apart relying programmers call appropriate api functions also possible extend programming language support thread local storage tls c11 keyword codice_16 used define thread-local variables header codice_17 supported defines codice_18 synonym keyword example usage c++11 introduces codice_18 keyword used following cases aside various compiler implementations provide specific ways declare thread-local variables windows versions vista server 2008 codice_23 works dlls dlls bound executable work loaded loadlibrary protection fault data corruption may occur common lisp provides feature called dynamically scoped variables dynamic variables binding private invocation function children called function abstraction naturally maps thread-specific storage lisp implementations provide threads common lisp numerous standard dynamic variables threads sensibly added implementation language without variables thread-local semantics dynamic binding instance standard variable codice_24 determines default radix integers printed variable overridden enclosing code print integers alternate radix functions execute concurrently different threads binding properly thread-local otherwise thread fight controls global printing radix version 2 static global variables thread-local default declared syntax similar normal global static variables languages global variables must explicitly requested using shared keyword shared keyword works storage class type qualifier – shared variables subject restrictions statically enforce data integrity declare classic global variable without restrictions unsafe __gshared keyword must used java thread-local variables implemented class object threadlocal holds variable type accessible via get/set methods example threadlocal variable holding integer value looks like least oracle/openjdk use native thread-local storage spite os threads used aspects java threading instead thread object stores non-thread-safe map threadlocal objects values opposed threadlocal map thread objects values incurring performance overhead .net framework languages c static fields marked threadstatic attribute .net 4.0 system.threading.threadlocal class available allocating lazily loading thread-local variables also api available dynamically allocating thread-local variables object pascal delphi free pascal threadvar reserved keyword used instead 'var declare variables using thread-local storage cocoa gnustep openstep nsthread object thread-local dictionary accessed thread threaddictionary method perl threads added late evolution language large body extant code already present comprehensive perl archive network cpan thus threads perl default take local storage variables minimise impact threads extant non-thread-aware code perl thread-shared variable created using attribute python programming language |python version 2.4 later local class threading module used create thread-local storage ruby programming language |ruby create/access thread-local variables using =/ methods category threads computing category variable computer science category software design patterns
[ 790, 5983, 5014, 1254, 3686, 4031, 5101, 1445, 6415, 7333, 2638, 1730, 6428, 3955, 5650, 4318, 1554, 6025, 5760, 231, 7924, 235, 3396, 5413, 4810, 6561, 7391, 1407, 517, 6224, 2961, 1598, 5965, 5786, 3238, 5787, 2530, 4017, 1803, 1435 ]
Test
2,828
3
Socket_604:socket 604 socket 604 604-pin microprocessor socket designed interface intel xeon processor rest computer provides electrical interface well physical support socket designed support heatsink socket 604 designed intel zero insertion force socket intended workstations server platforms socket contains 604 pins 603 electrical contacts last dummy pin contact 1.27mm pitch regular pin array mate 604-pin processor package socket 604 processors utilize bus speed either 400 533 667 800 1066 mhz manufactured either 130 90 65 45 nm process socket 604 processors inserted socket 603 designed motherboards due one additional pin present socket 603 processors inserted socket 604 designed motherboards since extra pin slot anything 603 cpu socket 604 processors range 1.60 ghz 3.80 ghz higher clock rates found among older slower netburst-based xeons following intel xeon chipsets used socket 604 late socket 604 revivals
[ 2541, 4123, 3849, 2997, 1729, 6173, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 4968, 3385, 4972, 5853, 2685, 6935, 8021, 7302, 5963, 5343, 866, 3333, 7134, 262, 6683, 5886 ]
Test
2,829
4
Center_for_Internet_Security:center internet security nowiki /nowiki center internet security cis 501 c 3 nonprofit organization formed october 2000 mission identify develop validate promote sustain best practice solutions cyber defense build lead communities enable environment trust cyberspace organization headquartered east greenbush new york members including large corporations government agencies academic institutions cis employs closed crowdsourcing model identify refine effective security measures individuals developing recommendations shared community evaluation consensus decision-making process national international level cis plays important role forming security policies decisions maintaining cis controls cis benchmarks hosting multi-state information sharing analysis center ms-isac cis several program areas including ms-isac cis controls cis benchmarks cis communities cis cybermarket program areas cis works wide range entities including academia government private sector general public increase online security providing products services improve security efficiency effectiveness multi-state information sharing analysis center ms-isac round-the-clock cyber threat monitoring mitigation center state local governments operated cis partnership office cybersecurity communications united states department homeland security dhs ms-isac established late 2002 officially launched january 2003 william f. pelgrin chief security officer state new york beginning small group participating states northeast ms-isac came include 50 u.s. states district columbia well u.s. territorial tribal local governments order facilitate expanding scope late 2010 ms-isac transitioned not-for-profit status auspices center internet security transition facilitated cis established reputation providing cybersecurity resources public private sectors ms-isac helps government agencies combat cyberthreats works closely federal law enforcement designated dhs key cyber security resource nation state local territorial tribal sltt governments ms-isac 24x7 cyber security operations center performs network monitoring issues early cyber threat warnings advisories performs vulnerability identification mitigation well incident response main objectives ms-isac described follows elections infrastructure information sharing analysis center ei-isac established election infrastructure subsector government coordinating council gcc critical resource cyber threat prevention protection response recovery nation ’ state local territorial tribal sltt election offices ei-isac operated center internet security inc mission ei-isac improve overall cybersecurity posture sltt election offices collaboration information sharing among members u.s. department homeland security dhs federal partners private sector partners keys success ei-isac provides central resource gathering information cyber threats election infrastructure two-way sharing information among public private sectors order identify protect detect respond recover attacks public private election infrastructure ei-isac comprises representatives sltt election offices contractors supporting sltt election infrastructure cis controls cis benchmarks provide global standards internet security recognized global standard best practices securing systems data attacks cis maintains cis controls popular set 20 security controls map many compliance standards applicable internet things independent consensus process cis benchmarks provide frameworks help organizations bolster security cis offers variety free resources include secure configuration benchmarks automated configuration assessment tools content security metrics security software product certifications cis controls advocate defense-in-depth model help prevent detect malware may 2017 study showed average organizations fail 55 compliance checks established center internet security half violations high severity issues march 2015 cis launched cis hardened images amazon web services response growing concern surrounding data safety information housed virtual servers cloud resources made available amazon machine images six cis benchmarks-hardened systems including microsoft windows linux ubuntu additional images cloud providers added later cis released companion guides cis controls recommendations actions counter cybersecurity attacks new guides released october december 2015 april 2018 cis launched information security risk assessment method implement cis controls called cis ram based upon risk assessment standard docra council cis benchmarks collaboration consensus community cis securesuite members class cis members access additional sets tools resources consensus community made experts field security use knowledge experience help global internet community cis securesuite members made several different types companies ranging size including government agencies colleges universities nonprofits auditors consultants security software vendors organizations cis benchmarks tools cis provides cost allow workers create reports compares system security universal consensus standard fosters new structure internet security everyone accountable shared top executives technology professionals internet users throughout globe cis provides internet security tools scoring feature rates configuration security system hand example cis provides securesuite members access cis-cat pro cross-platform java app scans target systems produces report comparing settings published benchmarks intended encourage motivate users improve scores given software bolsters security internet systems universal consensus standard cis employs draws upon uses accumulated knowledge skillful technology professionals since internet security professionals volunteer contributing consensus reduces costs cis makes cost effective cis cybermarket collaborative purchasing program serves u.s. state local tribal territorial sltt government organizations nonprofit entities public health education institutions improve cybersecurity cost-effective group procurement intent cis cybermarket combine purchasing power governmental nonprofit sectors help participants improve cybersecurity condition lower cost would able attain program assists time intensive costly complex daunting task maintaining cybersecurity working public private sectors bring partners cost-effective tools services combined purchasing opportunities reviewed domain experts three main objectives cis cybermarket cis cybermarket like ms-isac serves government entities non-profits achieving greater cyber security resources page multiple newsletters documents available free charge including cybersecurity handbook cities counties cis communities volunteer global community professionals continuously refine verify cis best practices cybersecurity tools develop structure benchmarks cis uses strategy members organization first form teams teams collect suggestions advice official work recommendations participating organizations teams analyze data information determine vital configuration settings would improve internet system security many work settings possible member team constantly works teammates critically analyzes critiques rough draft consensus forms among team benchmark released general public available download testing among community reviewing feedback testing making necessary adjustments changes final benchmark relevant security tools made available public download cis website process extensive carefully executed thousands security professionals across globe participate according isaca development cis benchmark sun microsystems solaris 2,500 users downloaded benchmark monitoring tools organizations participated founding cis october 2000 include isaca american institute certified public accountants aicpa institute internal auditors iia international information systems security certification consortium isc2 sans institute system administration networking security cis since grown hundreds members varying degrees membership cooperates works variety organizations members national international levels organizations include public private sectors government isacs law enforcement
[ 1461, 1858, 1642, 3474, 6004, 4759, 5064, 2027, 578, 6301, 7486 ]
Test
2,830
3
Socket_603:socket 603 socket 603 motherboard socket intel xeon processor socket 603 designed intel zero insertion force socket intended workstations server platforms contains 603 contacts arrayed grid center socket contact 1.27mm pitch regular pin array mate 603-pin processor package intel design notes distinguish socket 603 socket 604 low cost low risk robust high volume manufacturable multi-sourceable socket 603 processors bus speed 400 mhz manufactured either 180 nm process 130 nm process socket 603 processors inserted socket 604 designed motherboards socket 604 processors inserted socket 603 designed motherboards due one additional pin present socket 603 processors range 1.4 ghz 3.2 ghz old link http //www.intel.com/assets/pdf/designguide/249672.pdf 11/19/2016 http //www.intel.com/content/dam/www/public/us/en/documents/design-guides/603-pin-socket-guidelines.pdf
[ 2541, 4123, 3849, 2997, 1729, 2828, 6173, 7974, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 4968, 3385, 4972, 5853, 2685, 6935, 8021, 7302, 5963, 5343, 866, 3333, 7134, 262, 6683, 5886 ]
Test
2,831
8
WCF_Data_Services:wcf data services wcf data services formerly ado.net data services codename astoria platform microsoft calls data services actually combination runtime web service services exposed also includes data services toolkit lets astoria data services created within asp.net astoria project announced mix 2007 first developer preview made available april 30 2007 first ctp made available part asp.net 3.5 extensions preview final version released part service pack 1 .net framework 3.5 august 11 2008 name change ado.net data services wcf data services announced 2009 pdc wcf data services exposes data represented entity data model edm objects via web services accessed http data addressed using rest-like uri data service accessed via http get method uri return data web service configured return data either plain xml json rdf+xml initial release formats like rss atom supported though may future addition using http methods like put post delete data updated well post used create new entities put updating entity delete deleting entity windows communication foundation wcf comes rescue find able achieve want achieve using web services i.e. protocols support even duplex communication wcf define service configure way used via http tcp ipc even message queues consume web services using server side scripts asp.net javascript object notations json even rest representational state transfer understanding basics say wcf service used communicate using different protocols different kinds applications need understand achieve want use wcf service application three major questions 1.where wcf service located client perspective 2.how client access service i.e. protocols message formats 3.what functionality service providing clients answer three questions creating consuming wcf service lot easier us wcf service concept endpoints wcf service provides endpoints client applications use communicate wcf service answer questions known abc wcf services fact main components wcf service let tackle question one one address like webservice wcf service also provides uri used clients get wcf service uri called address wcf service solve first problem locate wcf service us binding able locate wcf service one think communicate service protocol wise binding defines wcf service handles communication could also define communication parameters like message encoding etc solve second problem communicate wcf service us contract question one left functionalities wcf service provides contract defines public data interfaces wcf service provides clients uris representing data contain physical location service well service name also need specify edm entity-set specific entity instance respectively former list entities collection set whereas latter list entity indexed someartist uris also specify traversal relationship entity data model example traverses relationship genre sql parlance joins genre table retrieves instances genre associated entity somesong simple predicates also specified uri like fetch items indexed someartist release 2006 filtering partition information also encoded url although presence skip top keywords indicates paging support data services version 1 method determining number records available thus impossible determine many pages may odata 2.0 spec adds support count path segment return count entities inlinecount retrieve page worth entities total count without separate round-trip ...
[ 930, 6986, 2986, 8085, 1840, 2702, 2530, 2283, 6787 ]
Train
2,832
0
Language_model:language model statistical language model probability distribution sequences words given sequence say length assigns probability formula_1 whole sequence language model provides context distinguish words phrases sound similar example american english phrases recognize speech wreck nice beach sound similar mean different things data sparsity major problem building language models possible word sequences observed training one solution make assumption probability word depends previous n words known n -gram model unigram model n 1 unigram model also known bag words model estimating relative likelihood different phrases useful many natural language processing applications especially generate text output language modeling used speech recognition machine translation part-of-speech tagging parsing optical character recognition handwriting recognition information retrieval applications speech recognition sounds matched word sequences ambiguities easier resolve evidence language model integrated pronunciation model acoustic model language models used information retrieval query likelihood model separate language model associated document collection documents ranked based probability query q document language model formula_2 commonly unigram language model used purpose unigram model treated combination several one-state finite automata splits probabilities different terms context e.g formula_3 formula_4 model probability word depends word probability document one-state finite automata units automaton probability distribution entire vocabulary model summing 1 following illustration unigram model document probability generated specific query calculated different documents unigram models different hit probabilities words probability distributions different documents used generate hit probabilities query documents ranked query according probabilities example unigram models two documents information retrieval contexts unigram language models often smoothed avoid instances p term 0 common approach generate maximum-likelihood model entire collection linearly interpolate collection model maximum-likelihood model document smooth model n -gram model probability formula_1 observing sentence formula_8 approximated assumed probability observing word w context history preceding − 1 words approximated probability observing shortened context history preceding n − 1 words n order markov property conditional probability calculated n -gram model frequency counts terms bigram trigram language models denote n -gram models n 2 n 3 respectively typically n -gram model probabilities derived directly frequency counts models derived way severe problems confronted n -grams explicitly seen instead form smoothing necessary assigning total probability mass unseen words n -grams various methods used simple add-one smoothing assign count 1 unseen n -grams uninformative prior sophisticated models good-turing discounting back-off models bidirectional representations condition pre- post- context e.g. words layers bigram n 2 language model probability sentence saw red house approximated whereas trigram n 3 language model approximation note context first n – 1 n -grams filled start-of-sentence markers typically denoted nowiki /nowiki additionally without end-of-sentence marker probability ungrammatical sequence *i saw would always higher longer sentence saw red house maximum entropy language models encode relationship word n-gram history using feature functions equation formula_13 formula_14 partition function formula_15 parameter vector formula_16 feature function simplest case feature function indicator presence certain n-gram helpful use prior formula_15 form regularization log-bilinear model another example exponential language model neural language models continuous space language models use continuous representations embeddings words make predictions models make use neural networks continuous space embeddings help alleviate curse dimensionality language modeling language models trained larger larger texts number unique words vocabulary increases number possible sequences words increases exponentially size vocabulary causing data sparsity problem exponentially many sequences thus statistics needed properly estimate probabilities neural networks avoid problem representing words distributed way non-linear combinations weights neural net alternate description neural net approximates language function neural net architecture might feed-forward recurrent former simpler latter common typically neural net language models constructed trained probabilistic classifiers learn predict probability distribution i.e. network trained predict probability distribution vocabulary given linguistic context done using standard neural net training algorithms stochastic gradient descent backpropagation context might fixed-size window previous words network predicts feature vector representing previous words another option use future words well past words features estimated probability third option allows faster training invert previous problem make neural network learn context given word one maximizes log-probability called skip-gram language model basis word2vec program instead using neural net language models produce actual probabilities common instead use distributed representation encoded networks hidden layers representations words word mapped onto -dimensional real vector called word embedding size layer output layer representations skip-gram models distinct characteristic model semantic relations words linear combinations capturing form compositionality example models function maps word -d vector representation ≈ made precise stipulating right-hand side must nearest neighbor value left-hand side positional language model assesses probability given words occurring close one another text necessarily immediately adjacent similarly bag-of-concepts models leverage semantics associated multi-word expressions buy_christmas_present even used information-rich sentences like today bought lot nice christmas presents various data sets developed use evaluate language processing systems include
[ 4426, 3931, 5429, 6829, 1839, 2022, 715, 3158, 4442, 5008, 7372, 2579 ]
Train
2,833
8
Jello_framework:jello framework jello end-to-end java application framework optimized google app engine including comprehensive data authorization model powerful restful engine out-of-the-box ui views jello rest offers clean simple follow json format protocol schema follows odata specification following components part jello framework
[ 7763, 6594 ]
Test
2,834
2
Ssh-keygen:ssh-keygen ssh-keygen standard component secure shell ssh protocol suite found unix unix-like microsoft windows computer systems used establish secure shell sessions remote computers insecure networks use various cryptographic techniques ssh-keygen utility used generate manage convert authentication keys ssh-keygen able generate key using one three different digital signature algorithms help ssh-keygen tool user create passphrase keys key types provide unattended operation passphrase left empty increased risk keys differ keys used related tool gnu privacy guard openssh-based client server programs included windows 10 since version 1803 ssh client key agent enabled available default ssh server optional feature-on-demand originally ssh protocol version 1 deprecated rsa algorithm supported 2016 rsa still considered strong recommended key length increased time ssh protocol version 2 additionally introduced support dsa algorithm dsa algorithm ties american national security agency nsa aspects security called question edward snowden global surveillance disclosures particularly light bullrun decryption program subsequently openssh added support third digital signature algorithm ecdsa key format longer uses previous pem file format private keys depend upon openssl library provide cryptographic implementation fourth format supported using ed25519 originally developed independent cryptography researcher daniel j. bernstein syntax ssh-keygen command follows important options ssh-keygen command follows ssh-keygen utility uses various files storing public private keys files used ssh-keygen utility follows
[ 361, 2811, 6789, 1812, 2817, 4387, 4759, 1537, 2999, 6088, 5480, 3106, 5571, 4955, 6997, 923, 1382, 5138, 3797, 5234, 7272, 667, 5942, 5946, 2589, 1213, 5509, 7848, 7214, 7494, 6489, 4547, 6773, 1140, 1793, 3417, 5181, 6062, 6404, 7868, ...
Test
2,835
2
Berkeley_printing_system:berkeley printing system berkeley printing system one several standard architectures printing unix platform originated 2.10bsd used bsd derivatives freebsd netbsd openbsd dragonfly bsd system running print architecture could traditionally identified use user command lpr primary interface print system opposed system v printing system lp command typical user commands available berkeley print system lpd program daemon programs communicate programs support line printer daemon protocol machines network submit jobs print queue machine running berkeley printing system berkeley printing system user commands submit jobs machines support protocol
[ 2817, 5826, 2769, 7223 ]
Validation
2,836
2
Marionnet:marionnet marionnet virtual network laboratory allows users define configure run complex computer networks without need physical setup single possibly even non-networked gnu/linux host machine required simulate whole ethernet network complete computers routers hubs switches cables support also provided integrating virtual network physical host network marionnet born april 2005 simple textual interface netkit written ocaml jean-vincent loddo paris 13 university networking course code since completely rewritten redesigned september 2005 order remove dependency netkit ease construction graphical interface partly built dot architecture extended system made general luca saiu joined project 2007 contributing particular dynamic reconfiguration aspects system active use several universities metropolitan france countries marionnet reached fairly stable state successfully used teaching networks several universities around world current development centered around making system easier use average end user particular emphasis documentation internationalization way mostly marionnet_i18n branch gnu gettext far marionnet presented two international computer science conferences many french events fosdem top gnu/linux host emulation guest machines achieved user mode linux technology allows run many linux kernels user space regular processes vde virtual distributed ethernet project responsible linking together uml machines virtual network purpose emulate cable hub switch devices allowing also introduce perturbations communication top raw emulated network marionnet acts coherent manager gui marionnet example complex concurrent application written functional language using relatively advanced programming techniques marionnet showed good performance complex networks ~15 machines even relatively old machines remaining responsive main concern disk usage largely depends distribution choice pinocchio custom distro developed meet average needs main goal marionnet teaching computers networks university laboratories although could valuable tool also high schools despite teaching-oriented marionnet may used emulate networks test development purposes quite easy set fast even complicated configurations possibility reverting filesystem changes virtual machines makes quite flexible
[ 3599, 5571 ]
Validation
2,837
4
Network_mapping:network mapping network mapping study physical connectivity networks e.g internet network mapping discovers devices network connectivity confused network discovery network enumerating discovers devices network characteristics operating system open ports listening network services etc. field automated network mapping taken greater importance networks become dynamic complex nature images first attempts large scale map internet produced internet mapping project appeared wired magazine maps produced project based layer 3 ip level connectivity internet see osi model different aspects internet structure also mapped recent efforts map internet improved sophisticated methods allowing make faster sensible maps example effort opte project attempting develop system capable mapping internet single day map internet project maps 4 billion internet locations cubes 3d cyberspace users add urls cubes re-arrange objects map early 2011 canadian based isp peer 1 hosting created map internet depicts graph 19,869 autonomous system nodes connected 44,344 connections sizing layout autonomous systems calculated based eigenvector centrality measure central network autonomous system graph theory used better understand maps internet help choose many ways visualize internet maps projects attempted incorporate geographical data internet maps example draw locations routers nodes map world others concerned representing abstract structures internet allocation structure purpose ip space many organizations create network maps network system maps made manually using simple tools microsoft visio mapping process simplified using tools integrate auto network discovery network mapping one example ip fabric platform many vendors notable network mappers list enable customize maps include labels add un-discoverable items background images sophisticated mapping used help visualize network understand relationships end devices transport layers provide service items bottlenecks root cause analysis easier spot using tools three main techniques used network mapping snmp based approaches active probing route analytics snmp based approach retrieves data router switch mibs order build network map active probing approach relies series traceroute-like probe packets order build network map route analytics approach relies information routing protocols build network map three approaches advantages disadvantages methods use two prominent techniques used today create internet maps first works data plane internet called active probing used infer internet topology based router adjacencies second works control plane infers autonomous system connectivity based bgp data bgp speaker sends 19-byte keep-alive messages every 60 seconds maintain connection technique relies traceroute-like probing ip address space probes report back ip forwarding paths destination address combining paths one infer router level topology given pop active probing advantageous paths returned probes constitute actual forwarding path data takes networks also likely find peering links isp however active probing requires massive amounts probes map entire internet likely infer false topologies due load balancing routers routers multiple ip address aliases decreased global support enhanced probing mechanisms source-route probing icmp echo broadcasting ip address resolution techniques leaves type probing realm network diagnosis technique relies various bgp collectors collect routing updates tables provide information publicly bgp entry contains path vector attribute called path path represents autonomous system forwarding path given origin given set prefixes paths used infer as-level connectivity turn used build topology graphs however paths necessarily reflect data actually forwarded adjacencies nodes represent policy relationship single link reality several router links also much harder infer peerings two nodes peering relationships propagated isp customer networks nevertheless support type mapping increasing isp offer peer public route collectors route-views ripe new toolsets emerging cyclops netviews take advantage new experimental bgp collector bgpmon netviews build topology maps seconds visualize topology changes moments occurring actual router hence routing dynamics visualized real time comparison tools using bgpmon another tool nettransformer able discover generate bgp peering maps either snmp polling converting mrt dumps graphml file format nettransformer allows us also perform network diffs two dumps thus reason bgp peering evolved years whatsup gold monitoring tool tracks networks servers applications storage devices virtual devices incorporates infrastructure management application performance management
[ 3821, 1462, 2837, 4311, 5571, 7868, 1942, 3775, 3819, 2219, 6962 ]
Validation
2,838
9
KeY:key key tool used formal verification java programs accepts specifications written java modeling language java source files transformed theorems dynamic logic compared program semantics likewise defined terms dynamic logic key significantly powerful supports interactive i.e hand fully automated correctness proofs failed proof attempts used efficient debugging verification-based testing several extensions key order apply verification c programs hybrid systems key jointly developed karlsruhe institute technology germany technische universität darmstadt germany chalmers university technology gothenburg sweden licensed gpl usual user input key consists java source file annotations jml translated key internal representation dynamic logic given specifications several proof obligations arise discharged i.e proof found ends program symbolically executed resulting changes program variables stored so-called updates program processed completely remains first-order logic proof obligation heart key system lies first-order theorem prover based sequent calculus used close proof interference rules captured called taclets consist simple language describe changes sequent theoretical foundation key formal logic called java card dl dl stands dynamic logic version first-order dynamic logic tailored java card programs example allows statements formulas like formula_1 intuitively says post-condition formula_2 must hold program states reachable executing java card program formula_3 state satisfies pre-condition formula_4 equivalent formula_5 hoare calculus formula_4 formula_2 purely first order dynamic logic however extends hoare logic formulas may contain nested program modalities formula_8 quantification formulas contain modalities possible also dual modality formula_9 includes termination dynamic logic seen special multi-modal logic infinite number modalities java block formula_3 modalities formula_8 formula_9 heart key system lies first-order theorem prover based sequent calculus sequent form formula_13 formula_14 assumptions formula_15 propositions sets formulas intuitive meaning formula_16 holds true means deduction initial sequent representing proof obligation shown constructible fundamental first-order axioms equality formula_17 program modalities eliminated symbolic execution instance formula formula_18 logically equivalent formula_19 example shows symbolic execution dynamic logic similar calculating weakest preconditions formula_20 formula_21 essentially denote thing – two exceptions firstly formula_22 function meta-calculus formula_20 really formula given calculus secondly symbolic execution runs program forward actual execution would save intermediate results assignments key introduces concept called updates similar substitutions applied program modality fully eliminated syntactically updates consist parallel side-effect free assignments written curly braces front modality example symbolic execution updates formula_24 transformed formula_25 first step formula_26 second step modality empty backwards application update postcondition yields precondition formula_27 could take value suppose one wants prove following method calculates product non-negative integers formula_27 formula_29 one thus starts proof premise formula_30 to-be-shown conclusion formula_31 note tableaux sequent calculi usually written upside-down i.e. starting sequent appears bottom deduction steps go upwards proof seen figure right symbolic execution debugger visualizes control flow program symbolic execution tree contains feasible execution paths program certain point provided plugin eclipse development platform key usable model-based testing tool generate unit tests java programs model test data test case derived consists formal specification provided jml symbolic execution tree implementation test computed key system key free software written java licensed gpl downloaded project website source currently pre-compiled binaries available another possibility key executed directly via java web start without need compilation installation key-hoare built top key features hoare calculus state updates state updates means describing state transitions kripke structure calculus seen subset one used main branch key due simplicity hoare calculus implementation essentially meant exemplify formal methods undergraduate classes keymaera previously called hykey deductive verification tool hybrid systems based calculus differential dynamic logic dl extends key tool computer algebra systems like mathematica corresponding algorithms proof strategies used practical verification hybrid systems keymaera developed university oldenburg carnegie mellon university name tool chosen homophone chimera hybrid animal ancient greek mythology keymaerax developed carnegie mellon university successor keymaera completely rewritten key c adaption key system misra c subset c programming language variant longer supported also adaptation use key symbolic execution abstract state machines developed eth zürich variant longer supported information found weblink
[ 1435, 2838, 5571 ]
Validation
2,839
4
POP_before_SMTP:pop smtp pop smtp smtp pop method authentication used mail server software helps allow users option send e-mail location long demonstrably also fetch mail place pop smtp approach superseded smtp authentication due smtp authentication widely used recent years purposes technically users allowed use smtp ip address long previously made successful login pop service mail hosting provider address within predefined timeout period main advantage process generally transparent average user connecting email client almost always make connection fetch new mail sending new mail disadvantages include potentially complex setup mail hosting provider requiring sort communication channel pop service smtp service uncertainty much time users take connect via smtp send mail connecting pop users handled method need resort authorization methods also cases users come externally controlled dynamically assigned addresses smtp server must careful giving much leeway allowing unauthorized connections possibility race conditions leaving open mail relay unintentionally exposed
[ 770, 4318, 7088, 6908, 578, 3794, 3795 ]
Test
2,840
2
Web_Platform_Installer:web platform installer web platform installer web pi freeware closed-source package management system installs non-commercial development tools dependencies part microsoft web platform including ability install third-party software added version 2.0 released september 24 2009. web pi install 82 titles web pi 2.0 options populated dynamically runtime microsoft servers allowing installation options updated without need download newer versions web pi july 7 2010 microsoft announced web pi 3 includes webmatrix new set integrated tools web development web pi 3 installs additional tools web development including iis developer express sql server compact dotnetnuke web pi features offline mode products downloaded local cache machine internet access available use cached files different machine later however web pi still usable environments internet connectivity local administrator privileges mutually exclusive i.e given process either authenticate transparent proxy high system integrity level
[ 7619, 7621, 7715, 2283, 4936, 7971, 8183, 8085, 7080, 5571, 8094, 4697, 5747, 7650, 5234, 3303, 930, 6029, 933, 3559, 7564, 53, 941, 3135, 422, 425, 1684, 5694, 5252, 2341, 2885, 2702, 7687, 2530, 4017, 2085 ]
Test
2,841
6
High_Throughput_File_System:high throughput file system high throughput file system htfs journaling file system used current versions sco openserver successor eafs
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1254, 1624, 59...
Train
2,842
4
Genieo:genieo genieo innovation israeli company specializing unwanted software includes advertising user tracking software commonly referred potentially unwanted program adware privacy-invasive software grayware malware best known genieo application type also operate installmac distributes additional 'optional search modifying software applications 2014 genieo innovation acquired 34 million somoto another company bundles legitimate applications offers additional third party applications may unwanted user sector israeli software industry frequently referred download valley genieo innovation founded april 2008 sol tzvi jacob tenenboem first version genieo released september 2009 beta version launched demo2010 conference march 2010 genieo website suspected changed name inkeepr software installs onto computers makes almost impossible users remove hijacks user browser tracks browser usage intention mining information users complain acts like virus need run special programs remove genieo listed malware apple inc. xprotect anti-malware service built macintosh computers running mac os x snow leopard later may 2013 malicious installer distributed genieo partner softonic found security software company intego installer masquerades necessary update adobe flash player attempts install genieo.app without user interaction dynamic libraries added safari browser intercept searches intended bing google versions genieo mac also offered 'codecs required video playback testing carried genieo mac june 2013 found left active software behind using supplied uninstaller required detailed manual removal november 2013 another fake application installer reported include genieo adware january 2014 sophos added genieo mac threat list category viruses spyware trojan horse computing adware november 2014 genieo mac flagged intego mentioned according analysis virustotal 25 55 surveyed anti-malware solutions including ad-aware avast bitdefender comodo dr web eset fortinet f-secure kaspersky trend micro housecall sophos symantec july 2014 genieo acquired 34 million somoto another company bundles legitimate applications offers additional third party applications may unwanted user august 2015 malware researchers discovered genieo installer acquired access mac keychain automated click allow permission dialog keychain displayed code safari browser extension added genieo also contained immediately used earlier versions installer april 2019 osx.genieo locked user macbook air computer passwords stored secure note found missing mail account settings tampered genieo case became impetus rapid emergence similar adware search macshop ads macvx etc
[ 1152, 91, 3172, 7063, 7975, 6006, 1276, 393, 5571, 7087, 6644, 7015, 1395, 3561, 3043, 3655, 4352, 4357, 518, 6305, 5699, 6582, 7692, 3249, 88 ]
Validation
2,843
7
HPCx:hpcx hpcx supercomputer actually cluster ibm eserver p5 575 high-performance servers located daresbury laboratory cheshire england supercomputer maintained hpcx consortium uoe hpcx ltd led university edinburgh epcc science technology facilities council ibm project funded epsrc hpcx service ended january 2010
[ 1023 ]
Test
2,844
4
Medical_device_hijack:medical device hijack medical device hijack also called medjack type cyber attack weakness target medical devices hospital covered extensively press 2015 2016 medjack received additional attention 2017 function increase identified attacks globally research released early year hijacks may endanger patients remote control critical devices theft sensitive data medjack.3 seems additional sophistication designed reveal searches older vulnerable operating systems found embedded within medical devices ability hide sandboxes defense tools safe non vm environment considerable discussion debate topic rsa 2017 event special session medjack.3 debate ensued various medical device suppliers hospital executives audience vendors ownership financial responsibility remediate massive installed base vulnerable medical device equipment notwithstanding discussion fda guidance well intended may go far enough remediate problem mandatory legislation part new national cyber security policy may required address threat medjack sophisticated attacker tools used hospitals new variants ransomware seem targeted hospitals cyberattack attacker places malware within networks variety methods malware laden website targeted email infected usb stick socially engineered access etc malware propagates within network time existing cyber defenses clear attacker tools standard serves workstations endpoints cyber defense software access embedded processors within medical devices embedded operating systems within medical devices running microsoft windows 7 windows xp security operating systems longer supported relatively easy targets establish attacker tools inside medical devices cyber attacker finds safe harbor establish backdoor command control noted since medical devices fda certified hospital cyber security team personnel access internal software without perhsp incurring legal liability impacting operation device violating certification given open access medical devices penetrated attacker free move laterally discover targeted resources ss patient data quietly identified exfiltrated organized crime targets healthcare networks order access steal patient records virtually medical device impacted attack one earliest documented examples testing identified malware tools blood gas analyzer magnetic resonance imaging mri system computerized tomogram ct scan xray machines 2016 case studies became available showed attacker presence also centralized pacs imaging systems vital important hospital operations attack primarily centers largest 6,000 hospitals global basis healthcare data highest value stolen identity data given weakness security infrastructure within hospitals creates accessible highly valuable target cyber thieves besides hospitals impact large physician practices accountable care organizations acos independent physician associations ipas skilled nursing facilities snfs acute care long term surgical centers diagnostic laboratories many reports hospitals hospital organizations getting hacked including ransomware attacks windows xp exploits viruses data breaches sensitive data stored hospital servers various informal assessments estimated medjack currently impacts majority hospitals worldwide remains undetected bulk technologies necessary detect medjack lateral movement attackers command control within targeted medical devices installed great majority hospitals time 3.2.2017 statistic would note hospital 500 beds roughly 15 medical devices usually internet things iot connected per bed addition centralized administration systems hospital diagnostic labs utilized medical devices emr/ehr systems ct/mri/x-ray centers within hospital attacks hard detect even harder remediate deception technology evolution automation honeypot honeygrid networks trap lure attackers move laterally within networks medical devices typically must software reloaded manufacturer hospital security staff equipped able access internals fda approved devices become reinfected quickly takes one medical device potentially re-infect rest hospital 28 december 2016 us food drug administration released recommendations legally enforceable medical device manufacturers maintain security internet-connected devices
[ 860, 1376, 1631, 5511, 1805 ]
Test
2,845
3
POWER7:power7 power7 family superscalar symmetric multiprocessors based power isa 2.06 instruction set architecture released 2010 succeeded power6 power7 developed ibm several sites including ibm rochester mn austin tx essex junction vt t. j. watson research center ny bromont qc ibm deutschland research development gmbh böblingen germany laboratories ibm announced servers based power7 8 february 2010 ibm 244 million darpa contract november 2006 develop petascale supercomputer architecture end 2010 hpcs project contract also states architecture shall available commercially ibm proposal percs productive easy-to-use reliable computer system contract based power7 processor aix operating system general parallel file system one feature ibm darpa collaborated modifying addressing page table hardware support global shared memory space power7 clusters enables research scientists program cluster single system without using message passing productivity standpoint essential since scientists conversant mpi parallel programming techniques used clusters power7 superscalar symmetric multiprocessor architecture substantial evolution power6 design focusing power efficiency multiple cores simultaneous multithreading smt power6 architecture built ground maximize processor frequency cost power efficiency achieved remarkable 5 ghz power6 features dual-core processor capable two-way simultaneous multithreading smt ibm power 7 processor eight cores four threads per core total capacity 32 simultaneous threads ibm stated isca 29 peak performance achieved high frequency designs 10–20 fo4 delays per pipeline stage cost power efficiency however power6 binary floating-point unit achieves 6-cycle 13-fo4 pipeline therefore pipeline power7 cpu changed power5 power6 designs respects rework similar intel turn 2005 left p4 7th-generation x86 microarchitecture power7 superscalar symmetric multiprocessor available 4 6 8 physical cores per microchip 1 32-way design 1024 smts slightly different microarchitecture interfaces supporting extended/sub-specifications reference power isa and/or different system architectures example supercomputing hpc system power 775 packaged 32-way quad-chip-module qcm 256 physical cores 1024 smts also special turbocore mode turn half cores eight-core processor 4 cores access memory controllers l3 cache increased clock speeds makes core performance higher important workloads require fastest sequential performance cost reduced parallel performance turbocore mode reduce software costs half applications licensed per core increasing per core performance software new ibm power 780 scalable high-end servers featuring new turbocore workload optimizing mode delivering double performance per core power6 based systems core capable four-way simultaneous multithreading smt power7 approximately 1.2 billion transistors 567 mm large fabricated 45 nm process notable difference power6 power7 executes instructions out-of-order instead in-order despite decrease maximum frequency compared power6 4.25 ghz vs 5.0 ghz core higher performance power6 processor 4 times number cores power7 specifications power7 processor core implements aggressive out-of-order ooo instruction execution drive high efficiency use available execution paths power7 processor instruction sequence unit capable dispatching six instructions per cycle set queues eight instructions per cycle issued instruction execution units power7 processor set twelve execution units described gives following theoretical single precision sp performance figures based 4.14 ghz 8 core implementation 4 64-bit simd units per core 128-bit simd vmx unit per core 12 multiply-adds per cycle giving 24 sp fp ops per cycle 4.14 ghz gives 4.14 billion 24 99.36 sp gflops 8 cores 794.88 sp gflops peak double precision dp performance roughly half peak sp performance comparison latest microarchitecture intel haswell came 3 years later power7 16 dp flops 32 sp flops per cycle 8/16 dp/sp fused multiply-add spread across 2× 256 bit avx2 fp vector units 3.4 ghz i7-4770 translates 108.8 sp gflops per core 435.2 sp gflops peak performance across 4-core chip giving roughly similar levels performance per core without taking account effects benefits intel turbo boost technology theoretical peak performance comparison holds practice power7 i7-4770 obtaining similar scores spec cpu2006 floating point benchmarks single-threaded 71.5 power7 versus 74.0 i7-4770 notice power7 chip significantly outperformed 2×–5× i7 benchmarks bwaves cactusadm lbm also significantly slower 2x-3x others indicative major architectural differences two chips mainboards memory systems etc designed different workloads mind however overall broad sense one say floating-point performance power7 similar haswell i7 ibm introduced power7+ processor hot chips 24 conference august 2012 updated version higher speeds cache integrated accelerators manufactured 32 nm fabrication process first boxes ship power7+ processors ibm power 770 780 servers chips 80 mb l3 cache 10 mb/core improved clock speeds 4.4 ghz 20 lpars per core range power7 systems includes express models 710 720 730 740 750 enterprise models 770 780 795 high performance computing models 755 775 enterprise models differ capacity demand capabilities maximum specifications shown table ibm also offers 5 power7 based bladecenters specifications shown table following supercomputer projects use power7 processor
[ 7327, 2719, 3348, 4661, 3936, 1075, 1346, 2458, 3440, 4672, 1083, 4408, 5652, 912, 7361, 3708, 5042, 7453, 5665, 4702, 1199, 1386, 1388, 7099, 1023, 5947, 4347, 234, 2501, 239, 6474, 1678, 763, 8125, 4815, 1131, 6226, 608, 3747, 7499, 1...
Validation
2,846
1
Australian_Research_Data_Commons:australian research data commons australian research data commons ardc limited company formed 1 july 2018 combining australian national data service ands nectar national eresearch collaboration tools resources research data services rds purpose enable australian researchers industry access nationally significant einfrastructure skills platforms data collections ands established 2008 order help address challenges storing managing making accessible australia research data joint collaboration monash university australian national university csiro manages research data australia web portal enables access data 100 australian research organisations cultural institutions government agencies nectar established 2009 australian government project directorate establish infrastructure university melbourne created 2011 research data services project provides service development prioritised areas research continuing operational support infrastructure accesses data national collections project led monash university collaboration australian national university anu csiro created basis full ands implementation aim allow researchers identify locate access analyse available research data transforming large number scattered disparate collections around australia cohesive accessible body resources importance eresearch infrastructure australian future research competitiveness emphasised prime reason funding provided australian government national collaborative research infrastructure strategy ncris part funding agreement department innovation industry science research diisr monash university september 2008 mid-2009 ands funded education investment fund eif establishment australian research data commons australian government ’ super science initiative research data australia formerly ands collections registry ands significant service web portal enables access data 100 australian research organisations cultural institutions government agencies online research collections australia orca registry software utility drove ands collections registry precursor research data australia used names online discovery service run ands allows researchers publicise existence research data enables prospective users data find research data australia made use iso 2146-based rif-cs metadata standard research data services project continuation research data storage infrastructure rdsi national collaboration tools resources project nectar established 2009 australian government budget part super science initiative financed education investment fund eif since received government funding well similar investment australian universities research institutions project got ground 2011 university melbourne partners research communities develop manage 12 virtual laboratories 16 e-research tools national research cloud known nectar cloud 10,000 users three organisations created aligned set investments business plans 2017/8 order integrate work line 2016 national research infrastructure ncris roadmap created department education training monash university remains lead agent ands university queensland lead agent rds university melbourne lead agent nectar
[]
Test
2,847
9
Gekko_(optimization_software):gekko optimization software gekko python package solves large-scale mixed-integer differential algebraic equations nonlinear programming solvers ipopt apopt bpopt snopt minos modes operation include machine learning data reconciliation real-time optimization dynamic simulation nonlinear model predictive control addition package solves linear programming lp quadratic programming qp quadratically constrained quadratic program qcqp nonlinear programming nlp mixed integer programming mip mixed integer linear programming milp gekko available python installed pip pypi python software foundation gekko works platforms python 2.7 3+ default problem sent public server solution computed returned python windows macos linux arm raspberry pi processor options solve without internet connection gekko extension apmonitor optimization suite integrated modeling solution visualization directly within python mathematical model expressed terms variables equations hock schittkowski benchmark problem 71 used test performance nonlinear programming solvers particular optimization problem objective function formula_1 subject inequality constraint formula_2 equality constraint formula_3 four variables must lower bound 1 upper bound 5 initial guess values formula_4 optimization problem solved gekko shown applications include cogeneration power heat drilling automation severe slugging control solar thermal energy production solid oxide fuel cells flow assurance enhanced oil recovery essential oil extraction unmanned aerial vehicles uavs many references apmonitor gekko sample types applications solved gekko developed national science foundation nsf research grant 1547110 detailed special issue collection combined scheduling control notable mentions gekko listing decision tree optimization software added support apopt bpopt solvers projects reports online dynamic optimization course international participants gekko topic online forums users solving optimization optimal control problems gekko used advanced control temperature control lab tclab process control education 20 universities one application machine learning perform regression training data build correlation example deep learning generates model training data generated function formula_5 artificial neural network three layers used example first layer linear second layer hyperbolic tangent activation function third layer linear program produces parameter weights minimize sum squared errors measured data points neural network predictions points gekko uses gradient-based optimizers determine optimal weight values instead standard methods backpropagation gradients determined automatic differentiation similar popular packages problem solved constrained optimization problem converged solver satisfies karush–kuhn–tucker conditions using gradient-based optimizer allows additional constraints may imposed domain knowledge data system neural network model tested across range training data well extrapolation demonstrate poor predictions outside training data predictions outside training data set improved hybrid machine learning uses fundamental principles available impose structure valid wider range conditions example hyperbolic tangent activation function hidden layer 2 could replaced sine cosine function improve extrapolation final part script displays neural network model original function sampled data points used fitting optimal control use mathematical optimization obtain policy constrained differential formula_6 equality formula_7 inequality formula_8 equations minimizes objective/reward function formula_9 basic optimal control solved gekko integrating objective transcribing differential equation algebraic form orthogonal collocation finite elements
[ 4067, 5965, 5571, 5659, 6912, 4705 ]
Test
2,848
7
Techila_Grid:techila grid techila distributed computing engine earlier known techila grid commercial grid computing software product speeds simulation analysis computational applications enabling scalability across resources user on-premises data center user cloud account techila distributed computing engine developed licensed techila technologies ltd privately held company headquartered tampere finland product also available on-demand solution google cloud launcher online marketplace created operated google according idc solution enables organizations create hpc infrastructure without major capital investments operating expenses required new hpc hardware techila distributed computing engine distributed computing middleware management solution used access manage on-premises cloud resources various high-performance computing hpc computing uses including high-throughput computing htc scenarios creates scalable computing service execution environment also support applications deployed within production environments technology techila distributed computing engine built autonomic computing architecture patented techila technologies enabled features automated system management fault tolerance simplify deployment use administration large-scale distributed computing systems techila distributed computing engine includes techila distributed computing engine set limitations physical location distance computing resources used system product description techila distributed computing engine lists three supported system designs techila technologies offers also tools enable automated provisioning integration cloud-based resources grid techila server java-based software product optimizes performance techila distributed computing engine environment jobs optimization done techila server supports large jobs also makes system suitable running small computational jobs performance techila distributed computing engine different scenarios evaluated thesis tampere university technology originally techila server delivered embedded appliance embedded appliance product discontinued 2012 currently techila server delivered either virtual appliance using cloud-specific deployment tools techila worker software agent must installed computer participate techila distributed computing engine environment computers physical virtualized computers running hypervisor cloud virtual machine techila distributed computing engine supports following public cloud services microsoft azure amazon ec2 amazon elastic compute cloud google compute engine techila worker software installed computer authenticate computer techila server using certificate system use self-management automatically configure computer run jobs received techila server techila worker java-based client middleware component run microsoft windows linux client computers participating techila distributed computing engine system different hardware software platforms techila worker software runs lowest possible priority computer techila worker also interoperable batch-queuing systems like slurm torque oracle grid engine previously known sun grid engine sge interoperability allows existing hpc users use existing infrastructures part techila distributed computing engine system without techila worker interfering system techila sdk earlier known techila grid management kit techila gmk library software components connect applications techila distributed computing engine environment sdk includes plug-ins many commonly used research development tools languages matlab r python perl java c .net c/ c++ fortran command-line interface script applications developed using application programming interfaces techila sdk also deployed within production environments run service soa environment techila sdk supports windows linux operating systems web-based administrator user interface provides administrators simplified easy-to-use interface techila server administrator user interface allows monitoring system activity view control job execution execution policy monitor control techila workers techila worker groups control security settings manage users techila technologies says development techila distributed computing engine technology started initially vision grid computing enablement fast simulation analysis without complexity traditional high-performance computing security techila distributed computing engine evaluated nixu ltd 2008 nixu finland largest specialist company information security consulting many global corporates customers techila distributed computing engine accepted security-sensitive industry sectors finance insurance engineering pharmaceutical techila distributed computing engine demonstrated research team university helsinki 2011 capable providing autonomic management computing environments large numbers windows azure cloud instances university helsinki also demonstrated techila distributed computing engine ability enhance usability utilization large-scale cluster resources projects implemented using matlab r python java c/ c++/ c techila distributed computing engine system computational resources arranged device groups organizational security compliance administrative control despite performance large-scale systems csc center science also suitable smaller environments tutgrid utilizes idle capacity desktop pcs computers tampere university technology tut scientific computing
[ 4159, 5983, 4070, 5965, 652, 4759, 5571, 2530, 1923, 578, 5666, 1435, 5117 ]
Test
2,849
6
United_States_v._Fricosu:united states v. fricosu united states v. fricosu 841 f.supp.2d 1232 d. col 2012 federal criminal case colorado addressed whether person compelled reveal encryption passphrase password despite u.s. constitution fifth amendment protection self-incrimination january 23 2012 judge robert e. blackburn held writs act fricosu required produce unencrypted hard drive fricosu attorney claimed possible remember password month later fricosu ex-husband handed police list potential passwords one passwords worked rendering self-incrimination issue moot electronic frontier foundation filed amicus brief support fricosu fricosu subsequently entered plea agreement 2013 meaning question defendant right resist mandatory decryption addressed higher court time future case addressing issue arises
[ 4921, 2566, 2849 ]
Validation
2,850
4
Code_Shikara:code shikara code shikara hassan arshad computer worm related dorkbot family attacks social engineering 2011 code first identified danish cyber security company csis av-company sophos reported november 2011 threat mainly spreads malicious links social network facebook 2013 bitdefender labs caught blocked worm capable spying users browsing activities meanwhile stealing personal online/offline information and/or credentials commonly known cybercrime infection originally flagged online backup service mediafire detected worm distributed camouflaged image file despite misleading extension mediafire successfully identified malicious image .exe-file malicious shikara code poses .jpeg image indeed executable file irc bot malware simply integrated attackers control command server besides stealing usernames passwords bot herder may also order additional malware downloads mediafire taken steps address incorrect misleading file extensions update identifies displays short description identifying specific file types help users specific threat file sharing service also blocks files double extensions .jpg.exe .png.exe .bmp.exe like usual malware backdoor.ircbot.dorkbot update installed victim computer related devices biggest risk someone facebook contacts may account already compromised due sloppy password security granting access rogue application account user allured clicking link seemingly posted one friends although links pretend point image truth malicious screensaver hidden behind icon two blonde women code launched attempts download malicious software hosted specific compromised israeli domain malware currently present israeli website remains message seemingly intruders says likely using additional websites continuing spreading cyber attack popular baits tricking users click malicious links include rihanna taylor swift sex tapes
[ 2173, 2810, 5452, 7151, 4, 6515, 6419, 3426, 2733, 1456, 3698, 4594, 651, 1376, 7087, 2577, 5401, 6823, 1766, 3480, 330, 6305, 3071, 2789, 74, 2891, 2354, 3680, 880 ]
Test
2,851
3
GoWarrior:gowarrior gowarrior open-source community-supported computing platform gowarrior designed world makers hackers educators hobbyists newbies build electronics projects offers complete package hardware software cloud service tiger board single-board computer performs hardware gowarrior platform contains arm cortex a9 based m3733-afaaa soc arm mali-400 mp2 well integrated 1gb ddr3 ram gowarrior specifications godroid android kitkat 4.4.4. based optimized operating system gowarrior platform addition original android functionalities godroid pre-integrates useful middleware components libraries well self-developed function blocks makes also software development kit android applications godroid supports booting nand flash microsd card contains boot code image files replacing android native media engine stagefright gstreamer utilizing hardware acceleration facilities godroid supports various audio/video/container hardware decoding multiple network protocols including microsoft smooth streaming http live streaming kodi 14.2 variety supported video/audio plug-ins besides screen mirroring function android miracast godroid also implements dlna system service sharing digital media among multimedia devices dmr dms dmp supported addition c/c++/java godroid also integrates qpython2engine python2 programming android tiger board provides 2 sets 40-pin expansion headers one compatible raspberry pi connector raspberry pi python applications ported run godroid godroid supports android studio application ide api level 19 configuration match godroid provides availability original android api also proprietary extended api gpio/ic2/spi/pwm godroid supports standard adb debugging via ethernet wi-fi usb gobian linux-embedded operating system running tiger board gowarrior platform gobian developed based raspbian debian 7 wheezy armhf differs raspbian extra features example gobian encapsulates rpi.gpio i/o libraries facilitate transplanting projects use related libraries raspberry pi tiger board furthermore gobian provides support multimedia integrating gof kodi middle-ware modules applications out-of-the-box gobian enables internet connection ethernet wi-fi ethernet port wi-fi module tiger board thus supports various methods access projects transfer data ftp ssh gobian automatically synchronizes system time internet time servers using ntp protocol gobian integrates built-in file system data management c c++ python perl shell script gobian lets call gpio/i2c/uart/spi interfaces directly projects built-in rpi.gpio libraries gobian makes easy secondary development multimedia applications customized gof middle-ware tiger board on-board m3733-afaaa processor makes gobian multitasking system good performance software programs available debian basically compatible gobian gobian supports ultra-power-saving sleep mode pmu standby entire board power consumption low 0.35w gobian integrates dlna fully support multimedia sharing multi-screen interaction gowarrior community already launched support projects gobian cloudq comprehensive back-end community support help users easily build projects
[ 5983, 7246, 8174, 7442, 5666, 5405, 8115, 8024, 2961, 7214, 5965, 6232, 1237, 1992, 1435 ]
Test
2,852
9
Alain_Colmerauer:alain colmerauer alain colmerauer 24 january 1941 – 12 may 2017 french computer scientist professor aix-marseille university creator logic programming language prolog alain colmerauer born 24 january 1941 carcassonne graduated grenoble institute technology earned ph.d. ensimag grenoble colmerauer spent 1967–1970 assistant professor university montreal created q-systems one earliest linguistic formalisms used development taum-meteo machine translation prototype developing prolog iii 1984 one main founders field constraint logic programming colmerauer became associate professor aix-marseille university luminy 1970 promoted full professor 1979 1993 1995 head laboratoire d'informatique de marseille lim joint laboratory centre national de la recherche scientifique university de provence university de la mediterranee despite retiring emeritus professor 2006 remained member artificial intelligence taskforce luminy colmerauer award regional council provence-alpes-côte d'azur 1985 michel monpetit award french academy sciences 1986 made knight legion honour french government became fellow american association artificial intelligence 1991 received acp research excellence award principles practice constraint programming 2008 also correspondent french academy sciences area mathematics colmerauer died 12 may 2017
[ 3645, 1157, 2321, 6441, 5621, 5008 ]
Test
2,853
7
Cluster-aware_application:cluster-aware application cluster-aware application software application designed call cluster apis order determine running state case manual failover triggered cluster nodes planned technical maintenance automatic failover required computing cluster node encounters hardware software failure maintain business continuity cluster-aware application may capable failing lan wan
[ 2442, 3951 ]
Train
2,854
4
February_2010_Australian_cyberattacks:february 2010 australian cyberattacks february 2010 australian cyberattacks series denial-of-service attacks conducted anonymous online community australian government response proposed web censorship regulations operation titstorm name given cyber attacks perpetrators resulted lapses access government websites 10 11 february 2010 accompanied emails faxes phone calls harassing government offices actual size attack number perpetrators involved unknown estimated number systems involved ranged hundreds thousands amount traffic caused disruption multiple government websites australian telecommunications minister stephen conroy proposed regulations would mainly filter sites pornographic content various groups advocating uncensored access internet along companies like google yahoo object proposed filter spokesperson conroy said actions legitimate form protest called irresponsible attacks also drew criticism filter protest groups initial stage followed small in-person protests 20 february called project freeweb attack began protest responding plan australian telecommunications minister stephen conroy would require internet service providers block australian users accessing illegal government deemed unwanted content websites blocked feature pornography showing rape bestiality child sex abuse small-breasted women may appear legal age female ejaculation drawn depictions acts included proposal proposed filter also includes gambling sites along others showing drug use leaked version proposed blacklist also referred refused classification rc list also showed sites include adult content name operation titstorm reference material would censored google questioned proposal saying prohibitions would broad strongly opposed free speech groups poll conducted mcnair ingenuity research hungry beast television program found 80 1,000 respondents favour concept plan survey also found 91 concerned government intent keep list filtered websites secret department defence cyber security operations centre discovered attack coming 5 february statement released anonymous press two days attack said government right refuse citizens access information solely perceive 'unwanted went read australian government learn one mess porn one messes access perfectly legal illegal content reason anonymous previously garnered media attention protests church scientology project chanology iranian government september 2009 prime minister kevin rudd website hacked similar protest proposed web censorship reforms flyers distributed recruit participants said attack begin 8 pm aest 10 february day government websites targeted denial-of-service attacks communications department said hackers infiltrated government security instead swamped government computer servers sites left unavailable sporadic periods throughout attack one point australian parliament website offline two days due high volume requests rudd government site also inaccessible time primary target communications department also received large amount traffic government offices also flooded e-mail spam junk faxes prank phone calls prime minister homepage vandalized pornographic images flyer released attack called faxes focus cartoon pornography female ejaculation small-breasted pornography reports actual size attack varied one cyber security expert described attacks equivalent parking truck across driveway shopping centre firm marketing security technology said peak attack relatively low 16.84 megabits per second one writer described 7.5 million requests per second initially brought parliament website massive site usually receives hundred per second appears botnets made compromised computers used estimates number attacking systems involved ranged hundreds thousands spokeswoman conroy said attacks legitimate political protest according totally irresponsible potentially deny services australian public systems administrators guild australia said condemned ddos attacks wrong way express disagreement proposed law anti-censorship groups criticised attacks saying hurt cause purported spokesperson attackers recommended wider australian public protest filter signing petition electronic frontiers australia anonymous coordinated second phase small protests outside parliament house canberra major cities throughout australia 20 february additional demonstrations held country embassies overseas organizers called follow-up protests project freeweb differentiate criticised cyber attacks several supporters attack later said messageboard taking websites enough convince government back web filtering policy called violence others disagreed actions proposed launching additional attack popular government site spokesman electronic frontiers australia said believed real intention capacity follow violent threats attack also resulted criticism australia terrorism laws university new south wales law journal one writer wrote provisions leave place legitimate acts online protest least sets penalty far high relatively minor cyber-vandalism australian teenager charged four counts inciting hackers impair electronic communications two unauthorised access restricted data role attack ordered pay bond instead convicted pleading guilty showing good behaviour july 2010 conroy delayed implementing plan pending 12-month review refused classification content rated proposal expected go forward due opposition coalition greens internet service providers telstra optus agreed voluntarily block content
[ 704, 3932, 2912, 376, 6092, 3277, 2923, 2587, 3323, 5779, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6541, 6194, 2678, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 7328, 208, 2021, 5922, 6628, 924, 4531, 600, 1307, 1691, 2800, 63...
Test
2,855
3
Explicit_data_graph_execution:explicit data graph execution explicit data graph execution edge type instruction set architecture isa intends improve computing performance compared common processors like intel x86 line edge combines many individual instructions larger group known hyperblock hyperblocks designed able easily run parallel parallelism modern cpu designs generally starts plateau eight internal units one four cores edge designs intend support hundreds internal units offer processing speeds hundreds times greater existing designs major development edge concept led university texas austin darpa polymorphous computing architectures program stated goal producing single-chip cpu design 1 tflops performance 2012 yet realized 2018 almost computer programs consist series instructions convert data one form another instructions require several internal steps complete operation time relative performance cost different steps changed dramatically resulting several major shifts isa design 1960s memory relatively expensive cpu designers produced instruction sets densely encoded instructions data order better utilize resource instance codice_1 instruction would provided many different forms would gather b different places main memory indexes registers providing different instructions allowed programmer select instruction took least possible room memory reducing program needs leaving room data instruction set tried provide every possible access mode every possible instruction like dec vax known orthogonal considered paragon design style memory access wide variety modes led instruction sets hundreds different instructions style known today cisc complex instruction set computing late 1970s memory become cheap cost lower performance cpu designs ran many times faster memory talked new regime orthogonality became undesirable versions instructions took room cpu little nothing improve performance communicated slow memory time memory savings unnecessary period risc reduced instruction set computing design philosophy flourished basic aim reduce access memory much possible using internal high-performance registers instructions side-effect wide variety different modes instructions disappeared might one codice_2 instruction instead many removing instructions reduced complexity instruction decoder freed considerable space cpu space used greatly increase number registers 1990s chip design fabrication process grew point possible build commodity processor every potential feature built improve performance cpu designs started adding internal parallelism becoming superscalar program instructions work unrelated data adding functional units instructions run time new portion cpu scheduler looks independent instructions feeds units taking outputs re-ordering externally appears ran succession amount parallelism extracted superscalar designs limited number instructions scheduler examine interdependencies examining greater number instructions improve chance finding instruction run parallel cost increasing complexity scheduler despite massive efforts cpu designs using classic risc cisc isa plateaued three four functional units additional performance wrung systems examining instructions find ones operate different types data adding units dedicated sort data led introduction floating point units recently single instruction multiple data simd units drawback approach makes cpu less generic feeding cpu program uses almost floating point instructions instance bog fpus units sit idle recent problem modern cpu designs delay talking registers general terms size cpu die remained largely time size units within cpu grown much smaller units added means relative distance one function unit global register file grown time introduced order avoid delays talking main memory global register file become delay worth avoiding delays talking memory price fell suggested radical change isa instruction set architecture cisc risc designers considering whether problems scaling parallelism increasing delays talking registers demands another switch basic isa among ways introduce new isa long instruction word vliw architectures typified itanium vliw moves scheduler logic cpu compiler much memory longer timelines examine instruction stream static placement static issue execution model works well delays known presence cache latencies filling instruction words proven difficult challenge compiler instruction might take five cycles data cache could take hundreds compiler way know whether data cache runtime determined overall system load factors nothing program compiled key performance bottleneck traditional designs data instructions operate theoretically scattered memory memory performance dominates overall performance classic dynamic placement dynamic issue designs seem reached limit performance capabilities vliw uses static placement static issue model proven difficult master runtime behavior programs difficult predict properly schedule advance edge architectures new class isa based static placement dynamic issue design edge systems compile source code form consisting statically-allocated hyperblocks containing many individual instructions hundreds thousands hyperblocks scheduled dynamically cpu edge thus combines advantages vliw concept looking independent data compile time superscalar risc concept executing instructions data becomes available vast majority real-world programs linkage data instructions obvious explicit programs divided small blocks referred subroutines procedures methods depending era programming language used generally well-defined entrance exit points data passed information lost high level language converted processor much simpler isa information useful modern compilers generalized concept basic block attempting identify within programs optimize memory access registers block instructions control statements predicated instructions dataflow graph encoded using blocks specifying flow data one block instructions another storage area basic idea edge directly support operate blocks isa level since basic blocks access memory well-defined ways processor load related blocks schedule output one block feeds directly one consume data eliminates need global register file simplifies compiler task scheduling access registers program whole instead basic block given local registers compiler optimizes access within block much simpler task edge systems bear strong resemblance dataflow languages 1960s–1970s 1990s dataflow computers execute programs according dataflow firing rule stipulates instruction may execute time operands available due isolation data similar edge dataflow languages inherently parallel interest followed general interest massive parallelism solution general computing problems studies based existing cpu technology time demonstrated would difficult dataflow machine keep enough data near cpu widely parallel precisely bottleneck modern fabrication techniques solve placing hundreds cpu memory single die another reason dataflow systems never became popular compilers era found difficult work common imperative languages like c++ instead dataflow systems used dedicated languages like prograph limited commercial interest decade compiler research eliminated many problems key difference dataflow edge approaches edge designs intend work commonly used languages edge-based cpu would consist one small block engines local registers realistic designs might hundreds units units interconnected using dedicated inter-block communication links due information encoded block compiler scheduler examine entire block see inputs available send engine execution need examine individual instructions within small increase complexity scheduler examine multiple blocks see outputs one fed inputs another place blocks units reduce inter-unit communications delays modern cpu examines thousand instructions potential parallelism complexity edge allows examine thousand hyperblocks one consisting hundreds instructions gives scheduler considerably better scope additional cost pattern operation gives concept name graph string blocks connected data flowing another advantage edge concept massively scalable low-end design could consist single block engine stub scheduler simply sends blocks called program edge processor intended desktop use would instead include hundreds block engines critically changes designs physical layout chip private information known scheduler program written single-unit machine would run without changes desktop version albeit thousands times faster power scaling likewise dramatically improved simplified block engines turned required linear effect power consumption perhaps greatest advantage edge concept suitable running sort data load unlike modern cpu designs different portions cpu dedicated different sorts data edge cpu would normally consist single type alu-like unit desktop user running several different programs time would get much parallelism scientific user feeding single program using floating point cases scheduler would simply load every block could units low level performance individual block engines would match dedicated fpu instance would attempt overwhelm advantage massive parallelism university texas austin developing edge isa known trips order simplify microarchitecture cpu designed run trips isa imposes several well-defined constraints trips hyperblock trips compiler statically bundles instructions hyperblocks also statically compiles blocks run particular alus means trips programs dependency precise implementation compiled 2003 produced sample trips prototype sixteen block engines 4 4 grid along megabyte local cache transfer memory single chip version trips fabbed ibm canada using 130 nm process contains two grid engines along shared level-2 cache various support systems four chips gigabyte ram placed together daughter-card experimentation trips team set ultimate goal producing single-chip implementation capable running sustained performance 1 tflops 50 times performance high-end commodity cpus available 2008 dual-core xeon 5160 provides 17 gflops cmu cash compiler produces intermediate code called pegasus cash trips similar concept cash targeted produce output specific architecture therefore hard limits block layout university washington wavescalar architecture substantially similar edge statically place instructions within waves instead special instructions phi rho mark boundaries waves allow scheduling
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 6497, 441, 2266, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4847, 4479, ...
Test
2,856
8
StormCrawler:stormcrawler stormcrawler open-source collection resources building low-latency scalable web crawlers apache storm provided apache license written mostly java programming language stormcrawler modular consists core module provides basic building blocks web crawler fetching parsing url filtering apart core components project also provide external resources like instance spout bolts elasticsearch apache solr parserbolt uses apache tika parse various document formats project used production various companies linux.com published q october 2016 author stormcrawler infoq ran one december 2016 comparative benchmark apache nutch published january 2017 dzone.com several research papers mentioned use stormcrawler 2018 particular project wiki contains list videos slides available online stormcrawler used notably common_crawl generating large publicly available dataset news
[ 6081, 80, 5863, 1333, 4511 ]
Test
2,857
4
USBKill:usbkill usbkill anti-forensic software distributed via github written python bsd linux os x operating systems designed serve kill switch computer installed fall control individuals entities owner operator wish free software available gnu general public license program developer goes online name hephaest0s created response circumstances arrest silk road founder ross ulbricht u.s. federal agents able get access incriminating evidence laptop without needing cooperation copying data flash drive distracting maintains whitelist devices allowed connect computer usb ports device whitelist connects take actions ranging merely returning lock screen encrypting hard drive even deleting data however also used part computer security regimen prevent surreptitious installment malware spyware clandestine duplication files according creator law enforcement agencies began making computer crime arrests 1990s would often ask judges knock search warrants order deny targets time delete incriminating evidence computers storage media extreme circumstances likely targets could get advance notice arriving police judges would grant power-off warrants allowing utilities turn electricity location raid shortly beforehand forestalling efforts destroy evidence could seized methods effective criminals produced distributed pirated software movies primary large-scale computer crime era 2010s circumstances computer crime changed along legitimate computer use criminals likely use internet facilitate crimes needed remain online time still keep activities discreet used computer security features like lock screens password protection reasons law enforcement attempts apprehend suspected cybercriminals computers use accounts computer online open logged thus easily searchable succeed seizing computer condition methods available bypass password protection may take time police available may legally possible compel suspect relinquish password—in united states many computer-crime investigations take place courts distinguished forcing suspect use material means protecting data thumbprint retinal scan key opposed password passcode purely product suspect mental processes thus protected compelled disclosure fifth amendment usual technique authorities either public entities law enforcement private organizations like companies seizing computer usually laptop believe used improperly first physically separate suspect user computer enough touch prevent closing lid unplugging typing command done often install device usb port spoofs minor actions mouse touchpad keyboard preventing computer going sleep mode would usually return lock screen would require password one program commonly used purpose mouse jiggler agents u.s. federal bureau investigation fbi investigating ross ulbricht founder online black market silk road learned often ran site laptop using wireless networks available branches san francisco public library enough evidence arrest planned catch act running silk road computer logged needed make sure able trigger encryption delete evidence october 2013 male female agent pretended lovers quarrel near working glen park branch according business insider ulbricht distracted got see problem whereupon female agent grabbed laptop male agent restrained ulbricht female agent able insert flash drive one laptop usb ports software copied key files according joshuah bearman wired third agent grabbed laptop ulbricht distracted apparent lovers fight handed agent tom kiernan response circumstances ulbricht arrest programmer known hephaest0s developed usbkill code python uploaded github 2014 available free software gnu general public license currently runs linux os x program installed prompts user create whitelist devices allowed connect computer via usb ports checks default sample rate rate adjusted user may also choose actions computer take detects usb device whitelist default shuts erases data ram swap file users need logged root hephaest0s cautions users must using least partial disk encryption along usbkill fully prevent attackers gaining access gizmodo suggests using virtual machine present computer reboots also used reverse whitelisted flash drive usb port attached user wrist via lanyard serving key instance flash drive forcibly removed program initiate desired routines designed one thing wrote aaron grothe short article usbkill pretty well precaution suggests users rename something innocuous loaded computers case someone might looking seized computer order disable addition designed purpose hephaest0s suggests uses possibly connected user desire frustrate police prosecutors part general security regimen could used prevent surreptitious installation malware spyware copying files protected computer also recommended general use part robust security practice even threats feared 2600 article grothe shared patch also included feature devised allowing program shut network non-whitelisted usb inserted terminal nate brune another programmer created silk guardian version usbkill takes form loadable kernel module since felt could implemented better already issue 2600 following grothe article another writer going name jack d. ripper explained ninja os operating system designed live flash drives handles issue uses bash script resident memory cycles loop boot device i.e. flash drive three times second see still mounted reboots computer
[ 3511, 2566, 5571, 578, 2944, 5150, 1670, 7110, 7848, 6305, 5965, 5440, 1805 ]
Test
2,858
4
Octopussy_(software):octopussy software octopussy also known 8pussy free open-source computer-software monitors systems constantly analyzing syslog data generate transmit central octopussy server thus often called siem solution therefore software like octopussy plays important role maintaining within iso/iec 27001-compliant environments octopussy ability monitor device supports syslog protocol servers routers switches firewalls load balancers important applications services main purpose software alert administrators users different kinds events like system outages attacks systems errors applications however unlike nagios icinga octopussy state-checker therefore problems resolved within application software also makes prescription whatsoever messages must be/must analyzed octopussy seen less powerful popular commercial software category event monitoring log analysis octopussy compatible lot linux system distributions like debian ubuntu opensuse centos rhel even meta-distributions gentoo arch linux although octopussy originally designed run linux could ported unix variants like freebsd minimal effort octopussy extensive report generating features also various interfaces software like e.g nsca nagios jabber/xmpp zabbix help software like snare even windows eventlogs processed octopussy licensed terms gnu general public license although octopussy free open-source software variety characteristics also found professional enterprise applications like splunk sawmill kiwi syslog time writing octopussy comes following set features meta- services supported by/known octopussy apache 2 bind bsd kernel bsd pam bsd system cisco routers asr cisco switches clamav denyall reverse proxy drbd f5 bigip fortinet fw hp-tools ironport mailserver juniper netscreen fw juniper netscreen nsm ldap linux apparmor linux auditd linux iptables linux kernel linux pam linux system monit mysql nagios neoteris/juniper fw netapp netcache postfix postgresql samba samhain snmpd squid sshd syslog-ng tacacs vmware esx windows snare agent windows system xen ... events receivable services thus processible octopussy include software requires rsyslog installed syslog-server expects systems monitored run one numerous available syslog services like e.g syslogd/klogd rsyslog syslog-ng software depends apache 2 http server installed apache :asp mod_perl mod_ssl octopussy also requires mysql dbms actual database installed/copied octopussy setup well recent perl interpreter installed operating system variety perl modules cpan e.g crypt :passwdmd5 dbd :mysql json unix :syslog xml :simple comprehensive list modules found within software packages/archives readme.txt file addition nscd rrdtool requirement rrdtool aids creation graphs displayed octopussy dashboard shown per-device/per-service level octopussy receives syslog messages via syslog protocol therefore behaves passively running type network agent remote machines monitoring/surveillance octopussy completely conforms rfc 3164 rfc 3195 ietf describing syslog logging mechanism unix-like/bsd operating systems especially includes internal representation facility severity-principle applicable software driven semi-stateful event correlation engine means engine records thus knows internal state uses extent link together logically related elements device order draw conclusion i.e generate alert octopussy semi-stateful correlation engine called sliding window shifting window logical boundary number events certain period time capable comparing known past events present ones based limited number comparative values octo-dispatcher component used octopussy software receive syslog lines rsyslog dispatch device directories every device registered activated within octopussy gets syslog messages assigned depending device name noteworthy also adjacent octo-replay component program used octopussy software replay log messages device service receives processes recognized logs puts back incoming directory octo-parser octo-uparser two octopussy important core components octo-parser program used octopussy software parse logs syslog format device registered within octopussy basically uses regex-engine commences pattern matching incoming syslog messages octo-uparser restarted every time device services changed check previously received unknown log messages associated service cases octo-pusher also called advance process non-syslog messages incoming devices regard device setting asynchronous helpful process log messages sent octopussy server using e.g ftp rsync ssh/scp octopussy interface gui default user-interface provides configuration management device service management well alert definition therefore extends octopussy core components devices displayed tabular form devices page following descriptors minimum hostname ip address log type device model/type fqdn os hence interface octo-web mainly provides access octopussy core components like octo-commander octo-message-finder octo-reporter octo-statistic-reporter octopussy front-end/gui written perl 5 employing apache :asp structure display content addition octopussy core services also accessed operating system shell represents convenient way administrators start/stop services make fundamental configuration changes octopussy rrd graph generator core component software installed default since generation graphs resource intensive administrators may opt disable octopussy syslog server less powerful cpu low amount ram generated rrd graphs displays activity active services monitored devices highly depending specific service restart octopussy software operation octo-dispatcher octo-parser always process syslog messages buffer queue first rrd graph generation delayed octo-rrd depends octo-scheduler execute octopussy :report function order generate syslog activity rrd graphs scheduled previously finally octo-sender capability send report data arbitrary recipients plug-in/module system octopussy mainly geared towards modification octopussy reports plug-in consists description file defines plug-in name functions code file perl code process actual data also extensions software related octopussy like e.g nagios plug-in checks octopussy core services i.e octo-dispatcher octo-scheduler etc well octopussy parser states log partitions creation new services service patterns presents important way extend octopussy without making changes source code however since patterns outlined simplified regular expressions administrators least basic knowledge regex general strongly recommended build already existing services also understand meaning message objects basic fields message id pattern log level taxonomy table rank usually logs wizard used search system unrecognized syslog messages per device generate new service patterns process creation patterns way enables octopussy distinguish messages based severity taxonomy
[ 4382, 7148, 5983, 6419, 5116, 5560, 3273, 7984, 1554, 5571, 578, 664, 4529, 7848, 1598, 2705 ]
Train
2,859
4
Ambient_authority:ambient authority ambient authority term used study access control systems subject computer program said using ambient authority needs specify names involved object operation performed order permitted action succeed definition authority ambient sense exists broadly visible environment often necessarily global environment subject request name example suppose c program opens file read access executing call desired file designated name filesystem include authorising information program exercising ambient authority ambient authority requested permissions granted denied based one global properties executing program identity role cases management access control handled separately explicit communication executing program process means access control lists associated objects role-based access control mechanisms executing program means reify permissions granted specific purpose first-class values program able access object acting behalf acting behalf one clients behalf one client another way express intention inevitably leads programs subject confused deputy problem term ambient authority used primarily contrast capability-based security including object-capability models executing programs receive permissions might receive data communicated first-class object references allows determine permissions came thus avoid confused deputy problem however since additional requirements system considered capability system besides avoiding ambient authority non-ambient authority system synonym capability system ambient authority dominant form access control computer systems today user model access control used unix windows systems ambient authority model programs execute authorities user started means executing programs inevitably given permissions need task unable determine source number types permission program executing ambient authority access control model little option designate permissions try exercise hoping best property requires excess permissions granted users roles order programs execute without error
[ 180, 7072, 7554, 2090, 5504, 8111, 7570, 2615, 7414, 1825, 4771 ]
Validation
2,860
9
State_logic:state logic state logic control system programming method created plcs state logic control system uses state transition diagram model reality thus using fundamentals finite-state machine theory basis programming language state logic enables users model application trying control using hierarchy consists tasks subdivided states described statements 'tasks description sequential activity model machines applications processes modelled state logic usually contain one 'task representing several different possibly parallel activities activities contain given number 'states finite-state machine theory one 'state active time certain inputs outputs cause transition different states given plcs usually control systems easily represented state transition diagram use high-level programming language state logic greatly helps plc programmer making intuitive control programs
[]
Test
2,861
4
Custom_hardware_attack:custom hardware attack cryptography custom hardware attack uses specifically designed application-specific integrated circuits asic decipher encrypted messages mounting cryptographic brute force attack requires large number similar computations typically trying one key checking resulting decryption gives meaningful answer trying next key computers perform calculations rate millions per second thousands computers harnessed together distributed computing network number computations required average grows exponentially size key many problems standard computers fast enough hand many cryptographic algorithms lend fast implementation hardware i.e networks logic circuits also known gates integrated circuits ics constructed gates often execute cryptographic algorithms hundreds times faster general purpose computer ic contain large numbers gates hundreds millions 2005 thus decryption circuit cell replicated thousands times one ic communications requirements ics simple must initially loaded starting point key space situations comparison test value see known plaintext attack output consists signal ic found answer successful key since ics lend mass production thousands even millions ics applied single problem ics mounted printed circuit boards standard board design used different problems since communication requirements chips wafer-scale integration another possibility primary limitations method cost chip design ic fabrication floor space electric power thermal dissipation alternative approach use fpgas field-programmable gate arrays slower expensive per gate reprogrammed different problems copacobana cost-optimized parallel code breaker one machine consisting 120 fpgas type xilinx spartan3-1000 run parallel earliest custom hardware attack may bombe used recover enigma machine keys world war ii 1998 custom hardware attack mounted data encryption standard cipher electronic frontier foundation deep crack machine cost u.s. 250,000 build decrypted des challenge ii-2 test message 56 hours work confirmed des cracker copacobana machine cost-optimized parallel code breaker built 2006 unlike deep crack copacobana consist commercially available reconfigurable integrated circuits copacobana costs 10,000 build recover des key 6.4 days average cost decrease roughly factor 25 eff machine impressive example continuous improvement digital hardware adjusting inflation 8 years yields even higher improvement 30x since 2007 sciengines gmbh spin-off company two project partners copacobana enhanced developed successors copacobana 2008 copacobana rivyera reduced time break des current record less one day using 128 spartan-3 5000 generally believed large government code breaking organizations u.s. national security agency make extensive use custom hardware attacks examples declassified
[ 3578, 5939, 6372, 7442, 8024, 1232, 3391, 2566, 6922, 1725, 5371, 3242 ]
Test
2,862
4
Richard_Thomas_(solicitor):richard thomas solicitor richard james thomas best known tenure information commissioner united kingdom post held december 2002 june 2009 time office raised concerns increased use closed-circuit television cctv introduction id cards uk thomas currently deputy chairman co-opted council member consumers association trustee director whitehall industry group chairman administrative justice tribunals council 1 september 2009 abolition august 2013 also visiting professor law northumbria university born june 1949 son magistrate thomas attended public school studied law southampton university late 1960s later awarded honorary doctor laws university early career worked articled clerk solicitor freshfields bruckhaus deringer 1971 citizens advice bureau notting hill 1974 went work legal public affairs positions national consumer council 1979 office fair trading national consumer council also involved campaign freedom information secondary involvement publishing book essays entitled consuming secrets appointment information commissioner first director public policy clifford chance married julia clarke since 1974 three adult children wife live reigate surrey thomas appointed commander order british empire cbe 2009 birthday honours public service document submitted leveson inquiry witness alec owens indicates richard thomas refused prosecute perpetrators phone hacking despite receiving recommendation parties identified involved jointly prosecuted 'conspiracy breach data protection act 1998
[ 3974, 3609 ]
Test
2,863
0
Julia_Hirschberg:julia hirschberg julia hirschberg american computer scientist noted research computational linguistics natural language processing currently percy k. vida l. w. hudson professor computer science columbia university hirschberg received first ph.d degree history 16th-century mexico university michigan 1976 served history faculty smith college 1974 1982 subsequently shifted computer science studies receiving m.s computer information science university pennsylvania 1982 ph.d computer information science university pennsylvania 1985 upon graduation university pennsylvania 1985 hirschberg joined bell labs member technical staff linguistics research department worked improving prosody assignment text-to-speech synthesis tts bell labs tts system promoted department head 1994 created new human computer interface research lab department remained bell labs 1996 moved labs research part corporate reorganization 2002 joined columbia university faculty professor department computer science served chair computer science department 2012-2018 hirschberg research included prosody discourse structure spoken dialogue systems speech search recently analysis deceptive speech hirschberg among first combine natural language processing nlp approaches discourse dialogue speech research pioneered techniques text analysis prosody assignment text-to-speech synthesis bell laboratories 1980s 1990s developing corpus-based statistical models based upon syntactic discourse information general use today tts systems janet pierrehumbert developed theoretical model intonational meaning leader development tobi conventions intonational description extended numerous languages today widely used standard intonational annotation hirschberg pioneer together gregory ward much experimental work intonational sources language meaning interact pragmatic phenomena particularly meaning accent intonational prominent items meaning intonational contours also innovated numerous areas involving prosody meaning including role grammatical function surface position pitch accent location use prosody disambiguating cue phrases discourse markers diane litman role prosody disambiguation english italian spanish cinzia avesani pilar prieto automatic identification speech recognition errors using prosodic information labs worked fernando pereira steve whittaker others speech search developing new interfaces speech navigation columbia students continued extended research spoken dialogue systems automatically detecting speech recognition errors inappropriate system queries modeling turn-taking behavior dialogue entrainment modeling generating clarification dialogues automatic classification trust charisma deception emotion speech speech summarization prosody translation hedging behavior text speech text-to-speech synthesis speech search low resource languages also holds several patents tts speech search corpora collaborators collected include boston directions corpus columbia sri colorado deception corpus columbia games corpus served numerous technical boards editorial committees computing research association cra board directors serves co-chair cra-w. also noted leadership broadening participation computing served member cra committee status women computing research cra-w since 2010 hirschberg notable awards include
[ 5429, 1314, 5388 ]
Test
2,864
3
Astra_Linux:astra linux astra linux russian linux-based computer operating system developed meet needs russian army armed forces intelligence agencies provides data protection level top secret russian classified information grade officially certified russian defense ministry federal service technical export control federal security service creator os scientific/manufacturing enterprise rusbitech applying solutions according russian government decree №2299-р 17/10/2010 orders federal authorities budget institutions implement free software usage os releases named hero cities russia cis one release general purpose code named oryol aimed achieving small mid-business goals releases marked special purpose — smolensk x86-64 pcs tula networking hardware novorossiysk arm mobile devices murmansk ibm system z mainframes rusbitech also manufactures soft/hardware trusted boot control module maksim-m1 м643м1 pci bus prevents unauthorized access offers raised digital security features module besides astra linux also supports oses linux kernel 2.6.x 5.x.x well several microsoft windows oses declared astra linux licenses correspond russian international laws n't contradict spirit demands gpl license system uses .deb packages astra linux considered recognized debian derivative rusbitech partnership relations linux foundation document foundation special edition version paid used many russian state-related organizations particularly used russian national center defence control talks deploy mass usage astra linux numerous state institutions republic crimea — legitimate usage popular oses questionable international sanctions ukrainian crisis also plans cooperation rusbitech huawei january 2018 announced astra linux going deployed russian army computers microsoft windows dropped february 2018 rusbitech announced ported astra linux russian-made elbrus microprocessors february 2019 astra linux announced implemented tianwan nuclear power plant china september 2019 commercial sales smartphones tablets astra linux expected start
[ 2179, 6076, 2187, 2909, 3265, 5724, 6086, 7528, 7894, 2935, 5048, 6453, 7189, 2585, 2228, 1487, 58, 3996, 6480, 7587, 4008, 1893, 7954, 1909, 4759, 5462, 6884, 7969, 3690, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, ...
Test
2,865
4
Cellebrite:cellebrite cellebrite mobile synchronization israeli company manufactures data extraction transfer analysis devices cellular phones mobile devices company subsidiary japan sun corporation cellebrite headquartered petah tikva israel two subsidiary companies cellebrite usa corp. cellebrite gmbh respectively based parsippany new jersey us munich germany cellebrite fully owned subsidiary sun corporation publicly traded company listed jasdaq 6736/jq based nagoya japan 2017 cellebrite mobile lifecycle division rebranded mobilogy mobilogy produces hardware software phone-to-phone data transfer backup mobile applications electronic software distribution data analysis tools mobilogy products used various mobile operators deployed wireless retail points sale mobilogy works handset manufacturers ensure compatibility devices released public cellebrite mobile forensics division established 2007 produces software hardware mobile forensics purposes used federal state local law enforcement intelligence agencies military branches corporate security investigations law firms private digital forensic examiners cellebrite established israel 1999 avi yablonka yaron baratz yuval aflalo ron serber joined cellebrite dec 2000 vp r yossi carmil aug.2004 ceo later ron yossi share ceo title co-ceo cellebrite first manufactured hardware software offered compressive phone-to-phone data transfer devices offered contact synchronization content transfer tools mobile phones intended use wireless carrier sales support staff retail stores initially cellebrite commercial products used tool migration is-95 cdma enabled mobile phones gsm standard later cellebrite wireless carriers retailers universal memory exchanger ume gained additional data extraction transfer capabilities well additional mobile phone diagnostics backup application management delivery 2007 cellebrite established independent division targeted mobile forensics industry cellebrite mobile forensics introduced mobile forensics products 2007 family brand name 'universal forensic extraction device ufed ability extract physical logical data mobile devices cellular phones hand-held mobile devices including ability recover deleted data decipher encrypted password protected information also 2007 cellebrite acquired futuredial incorporated one major shareholders sun corporation japan today fully owned subsidiary sun corporation april 2011 michigan chapter american civil liberties union questioned whether michigan state police msp troopers using cellebrite ufeds conduct unlawful searches citizens cell phones following refusal grant mclu 2008 freedom information act request unless organization paid 544,000 retrieve reports msp issued statement claiming honored fourth amendment searching mobile devices march 2016 reported cellebrite offered unlock iphone involved fbi–apple encryption dispute later fbi announced successfully accessed iphone thanks third party press report claimed cellebrite assisted unlocking device fbi source denied 2017 data dump suggests cellebrite sold data extraction products turkey united arab emirates russia mobile retail industry cellebrite provides gadgets phone-to-phone content management transfer used primarily stand-alone device point sale electronic software distribution content backup management used primarily over-the-air programming cellebrite universal memory exchanger ume standalone phone-to-phone memory transfer backup machine transfers content including pictures videos ringtones sms phone book contact data cellebrite ume touch predecessor ume-36 intermediate information range mobile phones smartphones pdas support mobile operating systems including symbian windows mobile palm blackberry ios android cellebrite ume standalone device acts universal data channel two mobile devices extracts reads parses data source mobile device transfers on-the-fly target device without storing data ume device ume automatically determine types phones connected re-structure data fly according source target phone storage formats data fields addition apploader device analytics tools may 2012 cellebrite introduced several new retail products services including pos diagnostics tool cell phone buy-back program integration ume touch self-service point 2007 cellebrite announced line products called 'universal forensic extraction device ufed aimed digital forensics investigation industry ufed system hand-held device optional desktop software data cables adapters peripherals ufed additionally integrated subscriber identity module sim reader unlike commercial counterpart ume ufed system sold approved government corporate organizations also unlike ume ufed extracts mobile device data directly onto sd card usb flash drive another major difference ume ufed ability break codes decipher encrypted information acquire hidden deleted data ufed named phone forensic hardware tool year four years running forensic 4cast awards cellebrite claims ufed ability extract data nearly 8,200 devices june 2012 include smartphones pda devices cell phones gps devices tablet computers ufed extract decrypt parse analyze phonebook contacts types multimedia content sms mms messages call logs electronic serial numbers esn international mobile equipment identity imei sim location information non-volatile memory volatile storage alike ufed supports cellular protocols including cdma gsm iden tdma also interface different operating systems file systems ios android os blackberry symbian windows mobile palm well legacy feature cell phones operating systems ufed enables retrieval subject data via logical see get file system e.g. directories files physical extractions i.e hex dump bit-for-bit copy mobile device entire storage physical extraction enables recover deleted information decipher encrypted data acquire information password-protected mobile applications facebook skype whatsapp browser-saved passwords ufed physical extraction functionality also overcome devices password locks well sim pin numbers cellebrite claims first mobile forensics industry achieved number smartphone forensic breakthroughs include physical extraction decoding blackberry flash memory going beyond mass storage ipd backups android user/pattern lock bypass physical extraction decoding physical extraction phones chinese chipsets including mediatek spreadtrum tomtom gps trip-log decryption decoding ios device unlocking research development cellebrite claims maintain integrity digital evidence 12 january 2017 reported unknown hacker acquired 900 gb worth confidential data cellebrite external servers data dump includes alleged usernames passwords logging cellebrite databases connected company my.cellebrite domain also contains appear evidence files seized mobile phones logs cellebrite devices data suggests cellebrite sold data extraction products countries turkey united arab emirates russia
[ 1544, 3823, 5740, 1992 ]
Test
2,866
9
Fourth-generation_programming_language:fourth-generation programming language fourth-generation programming language 4gl computer programming language belongs class languages envisioned advancement upon third-generation programming languages 3gl programming language generations aims provide higher level abstraction internal computer hardware details making language programmer-friendly powerful versatile definition 4gl changed time typified operating large collections information rather focusing bits bytes languages claimed 4gl may include support database management report generation mathematical optimization gui development web development researchers state 4gls subset domain-specific languages concept 4gl developed 1970s 1990s overlapping development 3gl 3gls like c c++ c java javascript remain popular wide variety uses 4gls originally defined found narrower uses advanced 3gls like python ruby perl combine 4gl abilities within general-purpose 3gl environment also libraries 4gl-like features developed add-ons popular 3gls blurred distinction 4gl 3gl 1980s 1990s efforts develop fifth-generation programming languages 5gl though used earlier papers discussions term 4gl first used formally james martin 1981 book applications development without programmers refer non-procedural high-level specification languages primitive way early 4gls included informatics mark-iv 1967 product sperry mapper 1969 internal use 1979 release motivations '4gl inception continued interest several term apply large set software products also apply approach looks greater semantic properties implementation power 3gl offered greater power programmer 4gl open development environment wider population early input scheme 4gl supported entry data within 72-character limit punched card 8 bytes used sequencing card tag would identify type function judicious use cards 4gl deck could offer wide variety processing reporting capability whereas equivalent functionality coded 3gl could subsume perhaps whole box cards 72-character metaphor continued hardware progressed larger memory terminal interfaces even limitations approach supported highly sophisticated applications interfaces improved allowed longer statement lengths grammar-driven input handling greater power ensued example described nomad page development 4gl influenced several factors hardware operating system constraints large weight 4gl first introduced disparate mix hardware operating systems mandated custom application development support specific system order ensure sales one example mapper system developed sperry though roots back beginning system proven successful many applications ported modern platforms latest variant embedded bis offering unisys mark-iv known vision builder offered computer associates santa fe railroad used mapper develop system project early example 4gl rapid prototyping programming users idea easier teach railroad experts use mapper teach programmers intricacies railroad operations one early portable languages 4gl properties ramis developed gerald c. cohen mathematica mathematical software company cohen left mathematica founded information builders create similar reporting-oriented 4gl called focus later 4gl types tied database system far different earlier types use techniques resources resulted general improvement computing time interesting twist 4gl scene realization graphical interfaces related reasoning done user form 'language poorly understood number different types 4gls exist 4gls integrated tools allow easy specification required information twenty-first century 4gl systems emerged low code environments platforms problem rapid application development short periods time vendors often provide sample systems crm contract management bug tracking development occur little programming extract data files database create reports wide range formats done report generator tools
[ 4290, 3255, 3944, 6428, 3966, 1102, 7557, 3981, 1879, 6497, 6498, 5443, 6507, 1908, 2286, 5117, 7992, 6912, 838, 4067, 842, 4078, 5866, 5171, 1989, 5536, 5190, 4469, 1626, 8082, 3784, 214, 219, 3115, 1662, 3807, 2054, 1681, 5965, 5967, ...
Test
2,867
7
Google_Cloud_Dataflow:google cloud dataflow google cloud dataflow fully managed service executing apache beam pipelines within google cloud platform ecosystem google cloud dataflow announced june 2014 released general public open beta april 2015 january 2016 google donated underlying sdk implementation local runner set ios data connectors access google cloud platform data services apache software foundation donated code formed original basis beam project
[ 3507, 4116, 5455, 3850, 5372, 7431, 6176, 993, 7346, 2107, 2475, 831, 5141, 136, 2317, 2673, 8107, 3309, 7924, 2591, 2683, 855, 4636, 168, 6776, 6950, 6153, 2712 ]
Test
2,868
3
Philips_68070:philips 68070 scc68070 philips semiconductors-branded motorola 68000-based 16/32-bit processor produced license marketed externally high-performance microcontroller almost exclusively used combined philips scc66470 vsc video- systems controller philips cd-i interactive entertainment product line additions motorola 68000 core include differences motorola 68000 core include scc68070 mostly binary compatible motorola 68000 equivalent chip motorola 680x0 series particular scc68070 follow-on motorola 68060 even though scc68070 32-bit processor internally 24-bit address bus giving theoretical 16mb maximum ram however possible on-board peripherals mapped internally
[ 3741, 5079, 7990, 1670, 6217, 1012, 1454 ]
Train
2,869
1
Roller_Coaster_DataBase:roller coaster database roller coaster database rcdb roller coaster amusement park database begun 1996 duane marden grown feature statistics photos 5000 roller coasters around world publications mentioned rcdb include new york times los angeles times toledo blade orlando sentinel time forbes mail guardian chicago sun-times rcdb started 1996 duane marden computer programmer brookfield wisconsin website run web servers marden basement location st. louis 2019 marden still operates site roller coaster entry includes following information ride current amusement park location type status existing standing operating sbno defunct opening date make/model cost capacity length height drop number inversions speed duration maximum vertical angle trains special notes entries may also feature reader-contributed photos and/or press releases site also categorizes rides special orders including list tallest coasters list fastest coaster list inversions coaster list parks inversions etc. sortable steel wooden roller coaster entry links back page lists park roller coasters past present includes brief history links fan web pages saluting park site available ten languages english german french spanish dutch portuguese italian swedish japanese simplified chinese
[ 2054, 518 ]
Test
2,870
9
Wakanda_(software):wakanda software wakanda javascript platform develop run web mobile apps based open standards technologies including angularjs ionic node.js typescript supported linux deployment microsoft windows macos studio development wakanda consists stack tools technologies starting 2008 server wakanda first presented ajax experience 2009 year jsconf.eu private developer preview made accessible 2010 first version wakanda studio including model designer gui designer wakanda came public attention june 2011 new developer preview second public developer preview announced wakanday js.everywhere boston october 2011 conference first beta december 15th wakanda available live release version since march 15 2012 june 28 2012 first version wakanda officially launched october 26 2012 demonstrated js.everywhere conference us france first involved commonjs working group since 2009 team created client server javascript apis w3c community group april 2012 joining w3c october 2012 company wakanda sas created december 2014 december 7 2015 wakanda digital app factory officially launched 2016 wakanda named cool vendor gartner wakanda server supports commonjs modules web workers web storage xmlhttprequest html5 file api blobs timers implements firebug crossfire debugger protocol well webkit remote debugging protocol wakandadb nosql engine accessed via http inspired odata rest api integrates connectors interact tiers databases mysql microsoft sql server odbc wakanda supports node.js modules including eventemitter socket tls wakanda includes open source projects part default packages wakanda server built javascriptcore icu openssl zlib
[ 4296, 1445, 1819, 6428, 4315, 6095, 417, 54, 422, 3663, 2619, 784, 4755, 4759, 103, 6172, 1177, 3368, 2658, 831, 486, 6191, 838, 3719, 3398, 6221, 5172, 7687, 183, 6604, 7715, 3092, 7347, 562, 2740, 5571, 5575, 7734, 578, 2040, 933, 2...
Test
2,871
9
Comparison_of_programming_languages_(string_functions):comparison programming languages string functions string functions used computer programming languages manipulate string query information string programming languages string datatype string functions although may low-level ways within language handle strings directly object-oriented languages string functions often implemented properties methods string objects functional list-based languages string represented list character codes therefore list-manipulation procedures could considered string functions however languages may implement subset explicit string-specific functions well function manipulate strings modern object-oriented languages like c java immutable strings return copy newly allocated dynamic memory others like c manipulate original string unless programmer copies data new string see example concatenation basic example string function codice_1 function function returns length string literal languages may string functions similar exactly syntax parameters outcomes example many languages length function usually represented len string list common functions aims help limit confusion string functions common many languages listed including different names used list common functions aims help programmers find equivalent function language note string concatenation regular expressions handled separate pages statements guillemets « … » optional var begin // example c ya hello world 2 // l' substr hello world 1 1 e' hello world .substr 1 1 e' hello world 2 l' hello world -3 r' example visual basic mid hello world ,2,1 example visual basic .net hello world .chars 2 l c example smalltalk 'hello world 2 e //example rust hello world .chars .nth 2 // l' hello cmp world returns -1 hello cmp world returns less world cmp hello returns hello cmp hello returns cmp hello world returns -1 /** example rexx */ compare hello world /* returns index mismatch 1 */ use-modules srfi srfi-13 string-compare hello world values values values example erlang hello world returns false art gt painting returns false art lt painting returns true hello -gt world returns false string art painting returns nil string art painting returns non nil 'abc 'def // returns abcdef // example c abc def // returns abcdef example visual basic abc def returns abcdef abc def returns abcdef abc null returns abc abc null returns null // example abc def // returns abcdef concatenate 'string abc def ghi returns abc def ghi abc def returns abcdef perl 5 returns perl 5 abc def returns abcdef perl 6 returns perl 6 ¢ example algol 68 ¢ // example c hello mate .contains e // returns true word .contains z // returns false good morning .contains z returns false ¡buenos días .contains í returns true e hello mate returns true z word returns false example smalltalk 'hello mate includessubstring e returns true 'word includessubstring z returns false tests two strings equal see also compare compare note equality checks via generic compare integer result confusing programmer often significantly expensive operation especially true using c-strings // example c hello == world // returns false example visual basic hello world returns false 'hello eq 'world returns 0 'hello eq 'hello returns 1 'hello eq 'world returns false 'hello eq 'hello returns true hello -eq world returns false ⍝ example apl 'hello ≡ 'world ⍝ returns 0 search e hello mate returns 1 search z word returns nil // examples c hello mate .indexof e // returns 1 hello mate .indexof e 4 // returns 9 word .indexof z // returns -1 hello .index e returns 1 hello .index z returns nil use-modules srfi srfi-13 string-contains hello mate e returns 1 string-contains word z returns f examples visual basic instr hello mate e returns 2 instr 5 hello mate e returns 10 instr word z returns 0 examples smalltalk 'hello mate indexofsubcollection 'ate returns 8 'hello mate indexofsubcollection 'late returns 0 i'hello mate 'hello mate // examples c hello mate .indexof e // returns 1 word .indexof z // returns -1 position \e hello mate returns 1 position \z word returns nil // example c string.format 0 costs 1 c2 pen 19.99 // returns pen costs 19.99 // example object pascal delphi format 'my costs 2f 'pen 19.99 // returns pen costs 19.99 // example java string.format costs 2f pen 19.99 // returns pen costs 19.99 sprintf costs .2f pen 19.99 returns pen costs 19.99 1.fmt 04d returns 0001 costs .2f pen 19.99 returns pen costs 19.99 0 costs 1 .2f .format pen 19.99 returns pen costs 19.99 format ~a costs ~1,2f pen 19.99 returns pen costs 19.99 tests two strings equal see also equality // example c hello world // returns true example visual basic hello world returns true not= hello world ⇒ true 'hello ne 'world returns 1 'hello ne 'world returns true hello -ne world returns true see find see find see find see rfind languages languages without built-in trim function usually simple create custom function accomplishes task awk one use regular expressions trim standard trim function c c++ available string libraries c contain code implements trimming functions significantly ease efficient implementation function also often called eatwhitespace non-standard c libraries c programmers often combine ltrim rtrim implement trim void rtrim char *str void ltrim char *str void trim char *str open source c++ library boost several trim variants including standard one trimmed boost :algorithm :trim_copy string note boost function named simply codice_3 input sequence modified in-place return result another open source c++ library qt several trim variants including standard one trimmed s.trimmed linux kernel also includes strip function codice_4 since 2.6.18-rc1 trims string place since 2.6.33-rc1 kernel uses codice_5 instead codice_4 avoid false warnings trim algorithm haskell may interpreted follows f drops preceding whitespace reverses string f applied output note type signature second line optional trim algorithm j functional description filter codice_7 non-space characters codice_8 leading codice_9 codice_10 trailing codice_11 spaces built-in trim function javascript 1.8.1 firefox 3.5 later ecmascript 5 standard earlier versions added string object prototype follows string.prototype.trim function perl 5 built-in trim function however functionality commonly achieved using regular expressions example string =~ s/^\s+// remove leading whitespace string =~ s/\s+ // remove trailing whitespace string =~ s/^\s+|\s+ //g remove leading trailing whitespace examples modify value original variable codice_12 also available perl stripltspace codice_13 cpan however two functions commonly used strip whitespace end strings codice_14 codice_15 perl 6 upcoming major revision language strings codice_3 method example string string.trim remove leading trailing whitespace string .= trim thing tcl codice_19 command three relevant subcommands codice_3 codice_21 codice_22 commands additional argument may specified string represents set characters remove—the default whitespace space tab newline carriage return example trimming vowels set string onomatopoeia set trimmed string trim string aeiou result nomatop set r_trimmed string trimright string aeiou result onomatop set l_trimmed string trimleft string aeiou result nomatopoeia xslt includes function codice_23 strips leading trailing whitespace addition replacing whitespace sequence including line breaks single space example xsl variable name='trimmed /xsl variable xslt 2.0 includes regular expressions providing another mechanism perform string trimming another xslt technique trimming utilize xpath 2.0 codice_24 function
[ 361, 2451, 5983, 6789, 1345, 1445, 4302, 7333, 993, 109, 6428, 8082, 2740, 3368, 304, 4053, 6277, 486, 2661, 5395, 3543, 5311, 5932, 7005, 7460, 4705, 5234, 4747, 666, 6029, 7784, 4164, 1114, 5948, 5855, 5091, 5506, 7383, 7844, 2803, 38...
Test
2,872
1
Simple_Features:simple features simple features officially simple feature access open geospatial consortium ogc international organization standardization iso standard iso 19125 specifies common storage access model mostly two-dimensional geometries point line polygon multi-point multi-line etc used geographic information systems iso 19125 standard comes two parts part one iso 19125-1 sfa-ca common architecture defines model two-dimensional simple features linear interpolation vertices data model defined sfa-ca hierarchy classes part also defines representation using well-known text binary part 2 standard iso 19125-2 sfa-sql defines implementation using sql opengis standard cover implementations corba ole/com well although lagged behind sql one standardized iso iso/iec 13249-3 sql/mm spatial extends simple features data model mainly circular interpolations e.g circular arcs adds features like coordinate transformations methods validating geometries well geography markup language support geometries also associated spatial reference systems standard also specifies attributes methods assertions geometries general 2d geometry simple contains self-intersection specification defines de-9im spatial predicates several spatial operators used generate new geometries existing geometries part 2 simple feature access implemented varying degrees gdal library implements simple features data model ogr component java-based deegree framework implements sfa part 1 various ogc standards geosparql ogc standard intended allow geospatially-linked data representation querying based rdf sparql defining ontology geospatial reasoning supporting small simple features well de-9im rcc8 rdfs/owl vocabulary gml wkt literals 2012 various nosql databases limited support anything complex bounding box proximity search
[ 8155, 7334, 6172, 7715, 7721, 3620, 1543, 6428, 3863, 7732, 2214, 737, 7144, 1803, 4884, 4798, 2761, 6208, 4070, 1114, 5948, 2057, 5956, 2877, 4635, 3916, 698, 1435, 2445 ]
Test
2,873
3
PlayStation_3_models:playstation 3 models playstation 3 video game console produced various models life cycle launch playstation 3 available either 20 40 60 80 gb hard disk drive us japan priced us 499 us 599 either 40 60 80 gb hard disk drive europe priced £299 £425 since sony released two redesigned models slim super slim models total number consoles sold estimated 77 million several original playstation 3 hardware models commonly referred size included hard disk drive 20 40 60 80 160 gb although referred hdd size capabilities consoles vary region release date difference appearance first five models color trim number usb ports presence absence door covers flash card readers equipped models minor changes air vents retail packages include one two sixaxis controllers dualshock 3 controller beginning june 12 2008 one type-a mini-b usb cable connecting controller playstation portable system one composite video/stereo audio output cable one ethernet cable 20 60 cechexx 80 gb one power cable models support software emulation original playstation support playstation 2 backward compatibility diminished later compatible models last model integrated backward compatibility ntsc 80 gb ceche metal gear solid 4 bundle compatibility issues games systems detailed public database hosted manufacturer models excluding 20 gb model include 802.11 b/g wi-fi addition features 20 gb model 60 gb model internal ieee 802.11 b/g wi-fi multiple flash card readers sd/multimedia card compactflash type i/type ii microdrive memory stick/pro/duo chrome colored trim terms hardware 80 gb model ceche released south korea identical 60 gb model cechc released pal regions except difference hard drive size european 60gb model cechc south korean north american ceche 80gb model excludes playstation 2 emotion engine cpu chip replaced emulated version via cell broadband engine however retains graphics synthesizer gpu resulting hybrid hardware software emulation due elimination emotion engine replacement software-emulated version level playstation 2 compatibility slightly reduced 40 gb 80 gb cechl cechm cechk 160 gb models two usb ports instead four usb ports models include multiple flash card readers sacd support backward compatibility playstation 2 games due removal graphics synthesizer gpu stripped units playstation 2 based hardware official wi-fi flash memory card readers ever released sony 20 gb system although sony plans september 2009 sony placed emphasis proposed add-ons nevertheless model features four usb 2.0 ports wireless networking flash memory card support already obtained use widely available external usb adapters third-party ps3-specific media hubs rumored cell processors third-generation ps3s 40 gb 2008 80 gb cechl cechm cechk 160 gb would move 90 nm process newer 65 nm process scei ceo kaz hirai later confirmed later 45 nm change lowers power consumption console makes less expensive produce redesigned version playstation 3 commonly referred ps3 slim officially branded ps3 features upgradeable 120 gb 160 gb 250 gb 320 gb hard drive 33 smaller 36 lighter consumes 34 cech-20xx 45 cech-21xx less power previous model one third original ps3 model cell microprocessor moved 45 nm manufacturing process lets run cooler quieter previous models cooling system redesigned rsx moved 40 nm process latest revision ps3 slim also includes support cec commonly referred manufacturer brandings braviasync viera link easylink etc allows control console hdmi using tv remote control ps3 slim longer main power switch like previous ps3 models similar redesigned slimline playstation 2 support emulation play ps2 titles present slim version however shortly release ps3 slim sony announced new series ps2 remasters called classics hd ps2 psp titles remastered hd ps3 trophies sometimes playstation move compatibility added october 2011 ps2 classics available purchase playstation store ps3 slim officially released september 1 2009 north america europe september 3 2009 japan australia new zealand however retailers amazon.com best buy gamestop started sell ps3 slim august 25 2009 ps3 slim sold excess million units first 3 weeks sale 250 gb final fantasy xiii -themed ps3 slim white color pink designs officially announced september 24 2009 tokyo game show part bundle japan final fantasy xiii initially revealed u.s. federal communications commission fcc filings ps3 cech-2000b sony computer entertainment australia also announced later day would bringing 250 gb ps3 slim australia would bundled games feature final fantasy xiii theme although north american bundles announced 250 gb ps3 slim sold stand-alone console north america july 2010 sony announced two new sizes slim ps3 160 gb 320 gb 120 gb model discontinued japan launched july 29 2010 japan 160 gb version available classic white well standard charcoal black black 160 gb version also made available bundle japan-only dvr accessory torne later announced new sizes launched regions 160 gb model available august 2010 north america october 2010 europe 320 gb model available north america part bundle playstation move playstation eye copy sports champions europe playstation move playstation eye demo disc bundles released september 19 2010 september 15 2010 respectively coincide launch playstation move september 2012 sony announced new slimmer ps3 redesign cech-4000 due released late 2012 would available either 250 gb 500 gb hard drive pal regions 250 gb model available model 12 gb flash memory cech-4000a available place standalone 250 gb hard drive cech-zhd1 available upgrade model uk 500 gb model released september 28 2012 12 gb model made available october 12 2012 cech-4000b consoles hard drives weigh approximately cech-4000a weighs approximately roughly 25 smaller 20 lighter original ps3 slim version sliding disc cover rather slot-loading drive found previous playstation 3 consoles similar sony bravia kdl22px300 includes built playstation 2 cech-4200 model nearly identical hardware cech-4000 model introduced 2013 follow aacs rule inhibiting analog component composite output blu-ray disc content effective since 2014 previous 3000 4000 models output limit already set 480i meet jan 1st 2011 deadline agreement also aforementioned aacs vertical stand cech-zst1j also available models launched day consoles respective regions
[ 6597, 2903, 450, 6330, 2177, 7962, 7514, 4761, 6621, 4408, 481, 578, 4242, 1388, 746, 7014, 4839, 2139, 4718, 602, 424, 253, 3234, 4011, 4200, 4911, 1244, 5446, 4748 ]
Validation
2,874
5
EchoLink:echolink echolink computer-based amateur radio system distributed free charge allows radio amateurs communicate amateur radio operators using voice ip voip technology internet least part path designed jonathan taylor radio amateur call sign k1rfd system allows reliable worldwide connections made radio amateurs greatly enhancing amateur radio communications capabilities essence voip applications skype unique addition ability link amateur radio station transceiver thus low-power handheld amateur radio transceiver contact local echolink node node active echolink station transceiver attached use internet connection station send transmission via voip active echolink node worldwide special hardware software required relay transmission via echolink node using system necessary prospective user callsign validated echolink system requires new user provide positive proof license identity callsign added list validated users cost service ensures system used licensed amateur radio operators software written run 32-bit 64-bit versions microsoft windows another edition software runs apple mobile devices iphone ipod touch ipad available apple app store android version available google play several android app repositories radio amateurs using echolink software operate one two modes radio amateurs without echolink software computer connected internet take advantage echolink network within radio range sysop mode echolink station also possible link sysop mode echolink station local repeater enhancing communication possibilities editions echolink also available two major smartphone platforms february 2010 edition echolink released apple iphone ipad ipod touch app store august 2010 edition echolink released android platform available google play store ios android editions created jonathan taylor k1rfd author original windows edition open source software packages largely compatible echolink available macintosh echomac echoham linux echolinux svxlink/qtel sysop mode required svxlink server linux good alternative features go beyond original software openness makes quite easy extend new functionality echoirlp software add irlp enables irlp node operate sysop mode echolink station echolink software designed run microsoft windows also known work several linux builds well loaded wine
[ 1128, 6788, 4575, 4759, 578, 740 ]
Train
2,875
4
Common_Vulnerability_Scoring_System:common vulnerability scoring system common vulnerability scoring system cvss free open industry standard assessing severity computer system security vulnerabilities cvss attempts assign severity scores vulnerabilities allowing responders prioritize responses resources according threat scores calculated based formula depends several metrics approximate ease exploit impact exploit scores range 0 10 10 severe many utilize cvss base score determining severity temporal environmental scores also exist factor availability mitigations widespread vulnerable systems within organization respectively current version cvss cvssv3.0 released june 2015 research national infrastructure advisory council niac 2003/2004 led launch cvss version 1 cvssv1 february 2005 goal designed provide open universally standard severity ratings software vulnerabilities initial draft subject peer review review organizations april 2005 niac selected forum incident response security teams first become custodian cvss future development feedback vendors utilizing cvssv1 production suggested significant issues initial draft cvss work cvss version 2 cvssv2 began april 2005 final specification launched june 2007 feedback resulted work beginning cvss version 3 2012 ending cvssv3.0 released june 2015 cvss assessment measures three areas concern numerical score generated metric groups vector string simply vector cvssv2 represents values metrics block text complete documentation cvssv2 available first summary provided access vector av shows vulnerability may exploited attack complexity ac metric describes easy difficult exploit discovered vulnerability authentication au metric describes number times attacker must authenticate target exploit include example authentication network order gain access locally exploitable vulnerabilities value set single multiple authentication required initial access confidentiality c metric describes impact confidentiality data processed system integrity metric describes impact integrity exploited system availability metric describes impact availability target system attacks consume network bandwidth processor cycles memory resources affect availability system six metrics used calculate exploitability impact sub-scores vulnerability sub-scores used calculate overall base score formula_1 formula_2 formula_3 formula_4 metrics concatenated produce cvss vector vulnerability buffer overflow vulnerability affects web server software allows remote user gain partial control system including ability cause shut would give exploitability sub-score 10 impact sub-score 8.5 giving overall base score 9.0 vector base score case would av n/ac l/au n/c p/i p/a c. score vector normally presented together allow recipient fully understand nature vulnerability calculate environmental score necessary value temporal metrics change lifetime vulnerability exploits developed disclosed automated mitigations fixes made available exploitability e metric describes current state exploitation techniques automated exploitation code remediation level rl vulnerability allows temporal score vulnerability decrease mitigations official fixes made available report confidence rc vulnerability measures level confidence existence vulnerability also credibility technical details vulnerability three metrics used conjunction base score already calculated produce temporal score vulnerability associated vector formula used calculate temporal score temporalscore round_to_1_decimal basescore*exploitability*remediationlevel*reportconfidence continue example vendor first informed vulnerability posting proof-of-concept code mailing list initial temporal score would calculated using values shown would give temporal score 7.3 temporal vector e p/rl u/rc uc full vector av n/ac l/au n/c p/i p/a c/e p/rl u/rc uc vendor confirms vulnerability score rises 8.1 temporal vector e p/rl u/rc c temporary fix vendor would reduce score back 7.3 e p/rl t/rc c official fix would reduce 7.0 e p/rl o/rc c possible confident every affected system fixed patched temporal score reduce certain level based vendor actions may increase automated exploit vulnerability developed environmental metrics use base current temporal score assess severity vulnerability context way vulnerable product software deployed measure calculated subjectively typically affected parties collateral damage potential cdp metric measures potential loss impact either physical assets equipment lives financial impact upon affected organisation vulnerability exploited target distribution td metric measures proportion vulnerable systems environment three metrics assess specific security requirements confidentiality cr integrity ir availability ar allowing environmental score fine-tuned according users environment five environmental metrics used conjunction previously assessed base temporal metrics calculate environmental score produce associated environmental vector adjustedimpact min 10,10.41* 1- 1-confimpact*confreq 1-integimpact*integreq 1-availimpact*availreq adjustedtemporal temporalscore recomputed basescores impact sub-equation replaced adjustedimpact equation environmentalscore round_to_1_decimal adjustedtemporal+ 10-adjustedtemporal *collateraldamagepotential *targetdistribution aforementioned vulnerable web server used bank provide online banking services temporary fix available vendor environmental score could assessed would give environmental score 8.2 environmental vector cdp mh/td h/cr h/ir h/ar l. score within range 7.0-10.0 therefore constitutes critical vulnerability context affected bank business several vendors organizations expressed dissatisfaction cvssv2 risk based security manages open sourced vulnerability database open security foundation jointly published public letter first regarding shortcomings failures cvssv2 authors cited lack granularity several metrics results cvss vectors scores properly distinguish vulnerabilities different type risk profiles cvss scoring system also noted requiring much knowledge exact impact vulnerability oracle introduced new metric value partial+ confidentiality integrity availability fill perceived gaps description partial complete official cvss specifications address criticisms development cvss version 3 started 2012 final specification named cvss v3.0 released june 2015 addition specification document user guide examples document also released several metrics changed added removed numerical formulas updated incorporate new metrics retaining existing scoring range 0-10 textual severity ratings none 0 low 0.1-3.9 medium 4.0-6.9 high 7.0-8.9 critical 9.0-10.0 defined similar categories nvd defined cvss v2 part standard base vector new metrics user interaction ui privileges required pr added help distinguish vulnerabilities required user interaction user administrator privileges exploited previously concepts part access vector metric cvssv2 base vector also saw introduction new scope metric designed make clear vulnerabilities may exploited used attack parts system network new metrics allow base vector clearly express type vulnerability evaluated confidentiality integrity availability c metrics updated scores consisting none low high rather none partial complete cvssv2 allows flexibility determining impact vulnerability cia metrics access complexity renamed attack complexity ac make clear access privileges moved separate metric metric describes repeatable exploit vulnerability may ac high attacker requires perfect timing circumstances user interaction also separate metric may easily duplicated future attempts attack vector av saw inclusion new metric value physical p describe vulnerabilities require physical access device system perform temporal metrics essentially unchanged cvssv2 environmental metrics cvssv2 completely removed replaced essentially second base score known modified vector modified base intended reflect differences within organization company compared world whole new metrics capture importance confidentiality integrity availability specific environment added blog post september 2015 cert coordination center discussed limitations cvssv2 cvssv3.0 use scoring vulnerabilities emerging technology systems internet things minor update cvss released june 17 2019 goal cvss version 3.1 clarify improve upon existing cvss version 3.0 standard without introducing new metrics metric values allowing frictionless adoption new standard scoring providers scoring consumers alike usability prime consideration making improvements cvss standard several changes made cvss v3.1 improve clarity concepts introduced cvss v3.0 thereby improve overall ease use standard first used input industry subject-matter experts continue enhance refine cvss applicable vulnerabilities products platforms developed past 15 years beyond primary goal cvss provide deterministic repeatable way score severity vulnerability across many different constituencies allowing consumers cvss use score input larger decision matrix risk remediation mitigation specific particular environment risk tolerance updates cvss version 3.1 specification include clarification definitions explanation existing base metrics attack vector privileges required scope security requirements new standard method extending cvss called cvss extensions framework also defined allowing scoring provider include additional metrics metric groups retaining official base temporal environmental metrics additional metrics allow industry sectors privacy safety automotive healthcare etc. score factors outside core cvss standard finally cvss glossary terms expanded refined cover terms used throughout cvss version 3.1 documentation cvssv2 base score adopted primary method quantifying severity vulnerabilities wide range organisations companies including nvd plans begin scoring vulnerabilities using cvssv3.0 addition cvssv2 sometime fall 2015
[ 3932, 5125, 7845, 1722, 8091, 5616, 4486, 943, 1613, 1805, 404 ]
Test
2,876
4
Moxie_Marlinspike:moxie marlinspike matthew rosenfeld known moxie marlinspike american entrepreneur cryptographer computer security researcher marlinspike creator signal co-founder signal foundation currently serves ceo signal messenger also co-author signal protocol encryption used signal whatsapp facebook messenger skype allo responsible largest deployment consumer end-to-end encryption marlinspike former head security team twitter author proposed ssl authentication system replacement called convergence previously maintained cloud-based wpa cracking service targeted anonymity service called googlesharing originally state georgia marlinspike moved san francisco late 1990s worked several technology companies including enterprise infrastructure software maker bea systems inc 2004 marlinspike bought derelict sailboat along three friends refurbished sailed around bahamas making documentary journey called hold fast 2010 marlinspike chief technology officer co-founder whisper systems enterprise mobile security startup company may 2010 whisper systems launched textsecure redphone applications provided end-to-end encrypted sms messaging voice calling respectively company acquired social-media firm twitter undisclosed amount late 2011 acquisition done primarily mr. marlinspike could help then-startup improve security time head cybersecurity twitter firm made whisper systems apps open source marlinspike left twitter early 2013 founded open whisper systems collaborative open source project continued development textsecure redphone time marlinspike trevor perrin started developing signal protocol early version first introduced textsecure app february 2014 november 2015 open whisper systems unified textsecure redphone applications signal 2014 2016 marlinspike worked whatsapp facebook google integrate signal protocol messaging services february 21 2018 marlinspike whatsapp co-founder brian acton announced formation signal foundation 2009 paper marlinspike introduced concept ssl stripping man-in-the-middle attack network attacker could prevent web browser upgrading ssl connection subtle way would likely go unnoticed user also announced release tool codice_1 would automatically perform types man-in-the-middle attacks http strict transport security hsts specification subsequently developed combat attacks marlinspike discovered number different vulnerabilities popular ssl implementations notably marlinspike published 2002 paper exploiting ssl/tls implementations correctly verify x.509 v3 basicconstraints extension public key certificate chains allowed anyone valid ca-signed certificate domain name create appeared valid ca-signed certificates domain vulnerable ssl/tls implementations included microsoft cryptoapi making internet explorer windows software relied ssl/tls connections vulnerable man-in-the-middle attack 2011 vulnerability discovered remained present ssl/tls implementation apple inc. ios also notably marlinspike presented 2009 paper introduced concept null-prefix attack ssl certificates revealed major ssl implementations failed properly verify common name value certificate could tricked accepting forged certificates embedding null characters cn field 2011 marlinspike presented talk titled ssl future authenticity black hat security conference las vegas outlined many current problems certificate authorities announced release software project called convergence replace certificate authorities 2012 marlinspike trevor perrin submitted internet draft tack designed provide ssl certificate pinning help solve ca problem ietf 2012 marlinspike david hulton presented research makes possible reduce security ms-chapv2 handshakes single des encryption hulton built hardware capable cracking remaining des encryption less 24 hours two made hardware available anyone use internet service marlinspike says flying within united states unable print boarding pass required airline ticketing agents make phone call order issue one subjected secondary screening tsa security checkpoints entering united states via flight dominican republic 2010 marlinspike detained federal agents nearly five hours electronic devices confiscated first agents claimed would get back provided passwords could decrypt data marlinspike refused devices eventually returned though noted could longer trust saying could modified hardware installed new keyboard firmware
[ 3932, 3350, 2724, 6795, 5386, 1651, 2618, 7925, 6758, 7209, 2691, 3575, 1500, 1594, 862, 5611, 1899, 2621, 1805, 3426 ]
Test
2,877
9
Document_Style_Semantics_and_Specification_Language:document style semantics specification language document style semantics specification language dsssl international standard developed provide stylesheets sgml documents dsssl consists two parts tree transformation process used manipulate tree structure documents prior presentation formatting process associates elements source document specific nodes target representation—the flow object tree dsssl specifications device-independent pieces information interchanged different platforms dsssl standardize back-end formatters generate language output formatters may render output on-screen display write computer file specific format postscript rich text format based subset scheme programming language specified standard iso/iec 10179:1996 developed iso/iec jtc1/sc34 iso/iec joint technical committee 1 subcommittee 34 document description processing languages sgml contains information machine-readable human-readable format stylesheet used present information stored sgml pleasing accessible way dsssl convert wide range formats including rtf html latex dsssl compatible sgml-based document type used often docbook 1997 software engineer geir ove grønmo published syntax highlighting language definition kedit appearance xml alternative sgml xml associated stylesheet language xsl also widely rapidly adopted around 1999 although dsssl continued use within shrinking sgml field xsl soon use extensively coders dsssl ever achieved emphasised previous sgml strongholds docbook converted sgml xml also converted favoured stylesheet language dsssl xsl sometime 1994 opera software began drafting dsssl lite specification consideration world wide web consortium since dsssl thought complex world wide web
[ 1710, 6507, 6172, 7721, 3620, 1543, 6428, 7732, 6015, 6016, 2214, 737, 38, 4884, 1662, 6208, 1114, 5948, 1774, 84, 2057, 2872, 6221, 7032, 1421, 3916, 698, 3498, 87, 1435, 7144 ]
Test
2,878
1
Tuple_relational_calculus:tuple relational calculus tuple calculus calculus created introduced edgar f. codd part relational model order provide declarative database-query language data manipulation data model formed inspiration database-query languages quel sql latter although far less faithful original relational model calculus de facto standard database-query language dialect used nearly every relational-database-management system michel lacroix alain pirotte proposed domain calculus closer first-order logic together codd showed calculi well relational algebra equivalent expressive power subsequently query languages relational model called relationally complete could express least queries since calculus query language relational databases first define relational database basic relational building block domain somewhat similar equal data type tuple finite sequence attributes ordered pairs domains values relation set ordered pairs domains names relation serves header relation relation set compatible tuples although relational concepts mathematically defined definitions map loosely traditional database concepts table accepted visual representation relation tuple similar concept row first assume existence set c column names examples name author address etcetera define headers finite subsets c relational database schema defined tuple r h domain atomic values see relational model notions domain atomic value r finite set relation names function associates header relation name r note simplification full relational model one domain header set column names also maps column names domain given domain define tuple partial function maps column names atomic value example would name harry age 25 set tuples denoted subset c tuple defined called domain confused domain schema denoted dom finally define relational database given schema r h function maps relation names r finite subsets every relation name r r tuple db r holds latter requirement simply says tuples relation contain column names namely defined schema construction formulas assume infinite set v tuple variables formulas defined given database schema r h partial function type v ⇸ 2 called type assignment assigns headers tuple variables define set atomic formulas type following rules examples atoms formal semantics atoms defined given database db tuple variable binding val v → maps tuple variables tuples domain atoms combined formulas usual first-order logic logical operators ∧ ∨ ¬ use existential quantifier ∃ universal quantifier ∀ bind variables define set formulas f type inductively following rules examples formulas note last formula states books written c. j date subject relational model usual omit brackets causes ambiguity semantics formula assume quantifiers quantify universe tuples domain schema leads following formal semantics formulas given database db tuple variable binding val v finally define query expression looks like given schema r h v tuple variable h header f v formula f type type v h v free variable result query given database db set tuples dom h f true db val v examples query expressions semantics quantifiers quantify tuples domain schema query may return different result certain database another schema presumed example consider two schemas r h r h domains 1 1 2 relation names r r headers h r schemas common instance consider following query expression result db either 1 1 2 also clear take domain infinite set result query also infinite solve problems restrict attention queries domain independent i.e. queries return result database schemas interesting property queries assume tuple variables range tuples so-called active domain database subset domain occurs least one tuple database query expression semantics query expressions change fact many definitions tuple calculus semantics quantifiers defined makes queries definition domain independent order limit query expressions express domain-independent queries syntactical notion safe query usually introduced determine whether query expression safe derive two types information query first whether variable-column pair bound column relation constant second whether two variable-column pairs directly indirectly equated denoted v == w deriving boundedness introduce following reasoning rules deriving equatedness introduce following reasoning rules next usual reasoning rules equivalence relations reflexivity symmetry transitivity say query expression v h f v safe restriction safe query expressions limit expressiveness since domain-independent queries could expressed also expressed safe query expression proven showing schema r h given set k constants query expression tuple variable v header h construct safe formula every pair v h states value active domain example assume k 1,2 r r h r b corresponding safe formula v .b formula used rewrite unsafe query expression equivalent safe query expression adding formula every variable v column name type used expression effectively means let variables range active domain already explained change semantics expressed query domain independent
[ 7071, 6462, 3011, 2054, 6543, 2103, 5290, 7915 ]
Test
2,879
4
Trusted_Computer_System_Evaluation_Criteria:trusted computer system evaluation criteria trusted computer system evaluation criteria tcsec united states government department defense dod standard sets basic requirements assessing effectiveness computer security controls built computer system tcsec used evaluate classify select computer systems considered processing storage retrieval sensitive classified information tcsec frequently referred orange book centerpiece dod rainbow series publications initially issued 1983 national computer security center ncsc arm national security agency updated 1985 tcsec eventually replaced common criteria international standard originally published 2005 24 october 2002 orange book aka dodd 5200.28-std canceled dodd 8500.1 later reissued dodi 8500.02 14 march 2014 security policy must explicit well-defined enforced computer system three basic security policies specified individual accountability regardless policy must enforced secure means must exist ensure access authorized competent agent evaluate accountability information within reasonable amount time without undue difficulty accountability objective includes three requirements computer system must contain hardware/software mechanisms independently evaluated provide sufficient assurance system enforces requirements extension assurance must include guarantee trusted portion system works intended accomplish objectives two types assurance needed respective elements within class additional set documentation addresses development deployment management system rather capabilities documentation includes tcsec defines four divisions c b division highest security division represents significant difference trust individual organization place evaluated system additionally divisions c b broken series hierarchical subdivisions called classes c1 c2 b1 b2 b3 a1 division class expands modifies indicated requirements immediately prior division class publication entitled army regulation 380-19 example guide determining system class used given situation
[ 4751, 7239, 3611, 7885, 4670, 900, 2557, 2294, 1743, 6725, 5571, 1010, 2118, 7090, 6022, 6208, 843, 3037, 7570, 2774, 6842, 2779, 7301, 8031, 2251, 5785, 2705, 6862, 444, 1805, 447 ]
Test
2,880
2
FaceTime:facetime facetime proprietary videotelephony product developed apple inc. facetime available supported ios mobile devices macintosh computers run later facetime supports ios device forward-facing camera macintosh computer equipped facetime camera facetime audio audio-only version available ios device supports ios 7 newer macintosh forward-facing camera running later facetime included free ios macos 10.7 onwards apple bought facetime name facetime communications changed name actiance inc. june 7 2010 apple announced facetime conjunction iphone 4 apple bought facetime name facetime communications changed name actiance january 2011 june 7 2010 apple announced facetime conjunction iphone 4 support fourth generation ipod touch first model ipod touch equipped cameras announced conjunction device release september 8 2010 facetime announced october 20 2010 march 2 2011 facetime support announced newly introduced ipad 2 forward- rear-facing cameras february 24 2011 facetime left beta listed mac app store us 0.99 apple claims intended provide application free charge however provision sarbanes–oxley act 2002 bars companies providing unadvertised new feature already-sold product without enduring onerous accounting measures us 0.99 beta still available download apple facetime included free macos 10.7 onwards ios allowed customers use facetime long tiered blocked application working customers unlimited data plans brought federal communications commission fcc net neutrality violations may 2011 found facetime would work seamlessly 3g iphone ipad ipod touch models supported even though facetime worked 3g time supports 4g lte calls networks world availability limited operators gsm plans june 2018 apple announced facetime would support group video audio calls 32 people ios 12 macos mojave facetime works establishing connection two supported devices apple devices iphones ipads macs introduced 2011 support facetime facetime currently incompatible non-apple devices video calling services mac models introduced 2011 high-definition video facetime devices use automatically ends facetime hd camera unlike mac os x ichat facetime currently support group conferencing support announced ios 12 application one-on-one video chat—only two people talk second user calls user answers video chat previous user ends new video session begins second caller iphone phone call pending user attempts answer video call ends phone call begins next user incoming notifications ios devices shown facetime call opened video temporarily paused user back facetime app iphone user activate facetime phone call pressing facetime button initiated facetime call history contacts application ios 7 newer also provide separate facetime app always apple non-telephony devices ipad ipod touch mac release ios 6 facetime required wifi connection work ios 6 onwards facetime iphone ipad supported facetime calls cellular networks 3g lte provided carrier enabled mid-2013 virtually carriers worldwide allowed facetime audio uses three megabytes data every five minutes conversation facetime video using significantly cellular talk time/minutes used switching voice call facetime call facetime calls placed supported devices phone number email address registered facetime service single email address registered multiple devices call placed address rings devices simultaneously facetime protocol based numerous open industry standards although interoperable videotelephony systems upon launch iphone 4 jobs stated apple would immediately start working standards bodies make facetime protocol open industry standard protocols open standards apple facetime service requires client-side certificate facetime calls protected end-to-end encryption sender receiver access apple decrypt data compared sip implementations facetime adds techniques enhance performance cost breaking interoperability port multiplexing sdp minimization sdp compression new audio-only version facetime named facetime audio announced annual apple worldwide developers conference wwdc keynote speech june 10 2013 released ios 7 september 18 2013 audio-only version facetime effectively makes protocol voice internet protocol voip competes mainstream providers field including skype microsoft based aac-ld audio protocol service provides high-quality audio ios 7 betas limited facetime audio calls placed wi-fi network original limitation video version facetime final release removed restriction allow work 3g lte data connections case carriers plans regard facetime video like video version facetime audio currently available apple devices feature available run ipod touch 4th generation device support ios 7 later facetime streaming cellular data unavailable iphone 4 ipad 2. facetime enabled devices bought united arab emirates possibly due regulations country restrict ip-based communications addition devices bought china facetime audio disabled facetime video available devices bought outside countries support video audio versions facetime although egypt jordan qatar kuwait originally disabled facetime iphone 4 later re-enabled feature carrier update existing phone owners made pre-enabled newly purchased iphone march 2018 facetime available iphones saudi arabia upon updating ios 11.3 august 2019 facetime available iphones pakistan upon updating ios 12.4 april 16 2014 facetime ceased working earlier versions ios previously supported ios 4 5 6 client-side certificate used authenticate genuine apple device facetime servers amongst uses expired date apple chose release update certificate devices newer major ios version new valid certificate available apple release minor update certificate os x versions could run facetime also earlier versions ios small number devices could run facetime could run newer major version ios 4th generation ipod touch result policy almost ios users update ios version devices wished continue using facetime limitation applied even users jailbroken devices since even legally jailbroken device would difficult also illegal extract install apple new certificate without apple permission order work around issue due proprietary nature facetime currently unavailable platforms including android windows january 28 2019 bug discovered facetime app allowed users eavesdrop users without knowledge exploit later discovered video feed could enabled without users acceptance apple said statement would release fix exploit shortly disabling group facetime time bug named facepalm security researchers affects ios devices running facetime ios 12.1 later macintosh computers running macos 10.14.1 mojave later although bug gained international attention january 28 2019 bug found 14-year old high school student arizona mother tried week warn apple problem facebook twitter discovering bug january 20th however pair found impossible reach anyone company short smoke signals trying every method someone could use get hold someone apple said ms. thompson january 25 2019 posted video youtube demonstrating bug news bug finally gained media coverage ms thompson wrote letters emails tweets msgs sent apple 10+ days reporting group facetime bug lets someone listen teenager discovered never heard back ”
[ 7148, 6788, 1443, 3940, 713, 7890, 2555, 7170, 2201, 4320, 2926, 4690, 5387, 5039, 734, 740, 5752, 405, 4337, 6832, 6125, 3989, 2954, 2597, 1123, 3322, 6847, 1502, 4003, 6142, 2609, 5786, 1895, 4740, 1897, 84, 4376, 5091, 4749, 5450, 65...
Test
2,881
9
Comparison_of_programming_languages_by_type_system:comparison programming languages type system onlyinclude comparison programming languages type system compares features type systems type checking multiple programming languages brief definitions /onlyinclude
[ 1445, 4302, 6428, 4705, 1114, 1892, 4743, 2619, 5091, 109, 5117, 3368, 4053, 486, 2661, 5855, 5506, 5510, 6585, 3069, 7333, 8082, 2740, 6277, 7005, 7382, 4164, 5948, 7394, 8122, 7032, 5965, 6319, 2803, 2451, 5983, 1345, 5639, 993, 4589, ...
Validation
2,882
0
Dependency_grammar:dependency grammar dependency grammar dg class modern grammatical theories based dependency relation opposed relation phrase structure traced back primarily work lucien tesnière dependency notion linguistic units e.g words connected directed links finite verb taken structural center clause structure syntactic units words either directly indirectly connected verb terms directed links called dependencies dgs distinct phrase structure grammars since dgs lack phrasal nodes although acknowledge phrases structure determined relation word head dependents dependency structures flatter phrase structures part lack finite verb phrase constituent thus well suited analysis languages free word order czech slovak warlpiri notion dependencies grammatical units existed since earliest recorded grammars e.g pāṇini dependency concept therefore arguably predates phrase structure many centuries ibn maḍāʾ 12th-century linguist córdoba andalusia may first grammarian use term dependency grammatical sense use today early modern times dependency concept seems coexisted side side phrase structure latter entered latin french english grammars widespread study term logic antiquity dependency also concretely present works sámuel brassai 1800–1897 hungarian linguist 1830-1894 german philologist heimann hariton tiktin 1850–1936 romanian linguist modern dependency grammars however begin primarily work lucien tesnière tesnière frenchman polyglot professor linguistics universities strasbourg montpellier major work éléments de syntaxe structurale published posthumously 1959 – died 1954 basic approach syntax developed seems seized upon independently others 1960s number dependency-based grammars gained prominence since early works dg generated lot interest germany theoretical syntax language pedagogy recent years great development surrounding dependency-based theories come computational linguistics due part influential work david hays machine translation rand corporation 1950s 1960s dependency-based systems increasingly used parse natural language generate tree banks interest dependency grammar growing present international conferences dependency linguistics relatively recent development depling 2011 depling 2013 depling 2015 depling 2017 depling 2019 dependency one-to-one correspondence every element e.g word morph sentence exactly one node structure sentence corresponds element result one-to-one correspondence dependency grammars word morph grammars exist elements dependencies connect elements structure situation compared phrase structure phrase structure one-to-one-or-more correspondence means every element sentence one nodes structure correspond element result difference dependency structures minimal compared phrase structure counterparts since tend contain many fewer nodes trees illustrate two possible ways render dependency phrase structure relations see dependency tree ordered tree i.e reflects actual word order many dependency trees abstract away linear order focus hierarchical order means show actual word order constituency phrase structure tree follows conventions bare phrase structure bps whereby words employed node labels distinction dependency phrase structure grammars derives large part initial division clause phrase structure relation derives initial binary division whereby clause split subject noun phrase np predicate verb phrase vp division certainly present basic analysis clause find works instance leonard bloomfield noam chomsky tesnière however argued vehemently binary division preferring instead position verb root clause structure tesnière stance subject-predicate division stems term logic place linguistics importance distinction one acknowledges initial subject-predicate division syntax real one likely go path phrase structure grammar one rejects division one must consider verb root structure go path dependency grammar following frameworks dependency-based link grammar similar dependency grammar link grammar include directionality linked words thus describe head-dependent relationships hybrid dependency/phrase structure grammar uses dependencies words also includes dependencies phrasal nodes – see example quranic arabic dependency treebank derivation trees tree-adjoining grammar dependency structures although full trees tag rendered terms phrase structure regard clear whether tag viewed dependency phrase structure grammar major differences grammars listed regard dependency relation compatible major tenets theories grammar thus like phrase structure grammars dependency grammars mono- multistratal representational derivational construction- rule-based various conventions dgs employ represent dependencies following schemata addition tree trees illustrate conventions representations a–d trees whereby specific conventions employed tree vary solid lines dependency edges lightly dotted lines projection lines difference tree tree b tree employs category class label nodes whereas tree b employs words node labels tree c reduced tree insofar string words projection lines deemed unnecessary hence omitted tree abstracts away linear order reflects hierarchical order arrow arcs e alternative convention used show dependencies favored word grammar brackets f seldom used nevertheless quite capable reflecting dependency hierarchy dependents appear enclosed brackets heads finally indentations like g another convention sometimes employed indicate hierarchy words dependents placed underneath heads indented like tree indentations g abstract away linear order point conventions namely conventions influence basic commitment dependency relation grouping syntactic units dependency representations show syntactic dependencies indeed work dependency grammar focuses syntactic dependencies syntactic dependencies however one three four types dependencies meaning–text theory instance emphasizes role semantic morphological dependencies addition syntactic dependencies fourth type prosodic dependencies also acknowledged distinguishing types dependencies important part one fails likelihood semantic morphological and/or prosodic dependencies mistaken syntactic dependencies great following four subsections briefly sketch dependency types discussion existence syntactic dependencies taken granted used orientation point establishing nature three dependency types semantic dependencies understood terms predicates arguments arguments predicate semantically dependent predicate often semantic dependencies overlap point direction syntactic dependencies times however semantic dependencies point opposite direction syntactic dependencies entirely independent syntactic dependencies hierarchy words following examples show standard syntactic dependencies whereas arrows indicate semantic dependencies two arguments sam sally tree dependent predicate likes whereby arguments also syntactically dependent likes means semantic syntactic dependencies overlap point direction tree attributive adjectives however predicates take head noun argument hence big predicate tree b takes bones one argument semantic dependency points tree therefore runs counter syntactic dependency similar situation obtains c preposition predicate takes two arguments picture wall one semantic dependencies points syntactic hierarchy whereas points finally predicate help takes one argument jim directly connected jim syntactic hierarchy means semantic dependency entirely independent syntactic dependencies morphological dependencies obtain words parts words given word part word influences form another word latter morphologically dependent former agreement concord therefore manifestations morphological dependencies like semantic dependencies morphological dependencies overlap point direction syntactic dependencies overlap point opposite direction syntactic dependencies entirely independent syntactic dependencies arrows used indicate morphological dependencies plural houses demands plural demonstrative determiner hence appears means morphological dependency points hierarchy houses situation reversed b singular subject sam demands appearance agreement suffix -s finite verb works means morphological dependency pointing hierarchy sam works type determiner german examples c influences inflectional suffix appears adjective alt indefinite article ein used strong masculine ending -er appears adjective definite article der used contrast weak ending -e appears adjective thus since choice determiner impacts morphological form adjective morphological dependency pointing determiner adjective whereby morphological dependency entirely independent syntactic dependencies consider following french sentences masculine subject le chien demands masculine form predicative adjective blanc whereas feminine subject la maison demands feminine form adjective morphological dependency entirely independent syntactic dependencies therefore points across syntactic hierarchy morphological dependencies play important role typological studies languages classified mostly head-marking sam work-s mostly dependent-marking houses whereby languages contain least minor measure head dependent marking prosodic dependencies acknowledged order accommodate behavior clitics clitic syntactically autonomous element prosodically dependent host clitic therefore integrated prosody host meaning forms single word host prosodic dependencies exist entirely linear dimension horizontal dimension whereas standard syntactic dependencies exist hierarchical dimension vertical dimension classic examples clitics english reduced auxiliaries e.g -ll -s -ve possessive marker -s prosodic dependencies following examples indicated hyphen lack vertical projection line hyphens lack projection lines indicate prosodic dependencies hyphen appears left clitic indicates clitic prosodically dependent word immediately left 'll whereas hyphen appears right side clitic shown indicates clitic prosodically dependent word appears immediately right given clitic often prosodically dependent syntactic dependent 'll head would 've times depend prosodically word neither head immediate dependent florida syntactic dependencies focus work dg stated presence direction syntactic dependencies determined course often open debate regard must acknowledged validity syntactic dependencies trees throughout article taken granted however hierarchies many dgs largely support although certainly points disagreement basic question syntactic dependencies discerned proven difficult answer definitively one acknowledge area however basic task identifying discerning presence direction syntactic dependencies dgs easier harder determining constituent groupings phrase structure grammars variety heuristics employed end basic tests constituents useful tools syntactic dependencies assumed trees article grouping words together manner closely matches results standard permutation substitution ellipsis tests constituents etymological considerations also provide helpful clues direction dependencies promising principle upon base existence syntactic dependencies distribution one striving identify root given phrase word responsible determining distribution phrase whole root traditionally dgs different approach linear order word order phrase structure grammars dependency structures minimal compared phrase structure counterparts minimal structures allow one focus intently two ordering dimensions separating vertical dimension hierarchical order horizontal dimension linear order easily accomplished aspect dependency structures allowed dgs starting tesnière 1959 focus hierarchical order manner hardly possible phrase structure grammars tesnière linear order secondary hierarchical order insofar hierarchical order preceded linear order mind speaker stemmas trees tesnière produced reflected view abstracted away linear order focus almost entirely hierarchical order many dgs followed tesnière adopted practice produced tree structures reflect hierarchical order alone e.g traditional focus hierarchical order generated impression dgs little say linear order contributed view dgs particularly well-suited examine languages free word order negative result focus hierarchical order however dearth dg explorations particular word order phenomena standard discontinuities comprehensive dependency grammar accounts topicalization wh -fronting scrambling extraposition mostly absent many established dg frameworks situation contrasted phrase structure grammars devoted tremendous effort exploring phenomena nature dependency relation however prevent one focusing linear order dependency structures capable exploring word order phenomena phrase structures following trees illustrate point represent one way exploring discontinuities using dependency structures trees suggest manner common discontinuities addressed example german used illustrate scrambling discontinuity a-trees left show projectivity violations crossing lines b-trees right demonstrate one means addressing violations displaced constituent takes word head governor words red mark catena =chain words extends root displaced constituent governor constituent discontinuities explored terms catenae limitations topicalization wh -fronting scrambling extraposition explored identified examining nature catenae involved traditionally dgs treated syntactic functions grammatical functions grammatical relations primitive posit inventory functions e.g subject object oblique determiner attribute predicative etc. functions appear labels dependencies tree structures e.g syntactic functions tree shown green attr attribute comp-p complement preposition comp-to complement det determiner p-attr prepositional attribute pred predicative subj subject to-comp complement functions chosen abbreviations used tree merely representative general stance dgs toward syntactic functions actual inventory functions designations employed vary dg dg primitive theory status functions much different phrase structure grammars traditionally phrase structure grammars derive syntactic functions constellation instance object identified np appearing inside finite vp subject np appearing outside finite vp since dgs reject existence finite vp constituent never presented option view syntactic functions manner issue question comes first traditionally dgs take syntactic functions primitive derive constellation functions whereas phrase structure grammars traditionally take constellation primitive derive syntactic functions constellation question comes first functions constellation inflexible matter stances grammar types dependency phrase structure narrowly limited traditional views dependency phrase structure fully compatible approaches syntactic functions indeed monostratal systems based dependency phrase structure likely reject notion functions derived constellation constellation derived functions take primitive means neither derived
[ 1314, 2178, 3628, 5782, 7610, 7389, 7410, 715 ]
Test
2,883
2
OpenBSD_security_features:openbsd security features openbsd operating system focuses security development security features according author michael w. lucas openbsd widely regarded secure operating system available anywhere licensing terms bugs security flaws often caused programmer error common source error misuse codice_1 codice_2 string functions c programming language two common alternatives codice_3 codice_4 difficult understand easy misuse openbsd developers todd c. miller theo de raadt designed codice_5 codice_6 functions functions intended make harder programmers accidentally leave buffers unterminated allow overflowed adopted netbsd freebsd projects gnu c library openbsd linker changed issue warning unsafe string manipulation functions codice_1 codice_2 codice_9 found occurrences functions openbsd source tree replaced addition static bounds checker included openbsd attempt find common programming mistakes compile time security-related apis developed openbsd project include codice_10 codice_11 june 2017 email theo de raadt stated problem stable systems could running months time although considerable randomization within kernel key addresses remains project progress modifies linker every boot kernel relinked well randomizations differs kernel aslr email states result every new kernel unique relative offsets functions data unique ... current change scaffolding ensure boot newly-linked kernel upon every reboot ... new random kernel linked together ... fast machine takes less second ... reboot runs new kernel yet another kernel built next boot internal deltas functions inside kernel attacker expects 'll need better info leaks openbsd integrates several technologies help protect operating system attacks buffer overflows integer overflows developed hiroaki etoh propolice gcc extension designed protect applications stack-smashing attacks number operations local stack variables reordered place buffers pointers protecting corruption case buffer overflow pointers function arguments also placed local buffers canary value placed local buffers function exits sometimes used detect buffer overflows propolice chooses whether protect buffer based automatic heuristics judge vulnerable reducing performance overhead protection integrated openbsd version gcc december 2002 first made available openbsd 3.3 applied kernel release 3.4 extension works cpu architectures supported openbsd enabled default c code compiled protected without user intervention may 2004 openbsd sparc platform received stack protection form stackghost makes use features sparc architecture help prevent exploitation buffer overflows support sparc64 added march 2005 openbsd 3.4 introduced w^x memory management scheme ensure memory either writable executable never provides another layer protection buffer overflows relatively easy implement platform like x86-64 hardware support nx bit openbsd one oses support generic i386 platform lacks built per-page execute controls development cycle 3.8 release changes made codice_12 memory management functions traditional unix operating systems codice_12 allocates memory extending unix data segment practice made difficult implement strong protection security problems codice_12 implementation openbsd makes use codice_15 system call modified returns random memory addresses ensures different areas mapped next addition allocation small blocks shared areas randomized codice_16 function changed return memory kernel immediately rather leaving mapped process number additional optional checks also added aid development features make program bugs easier detect harder exploit instead memory corrupted invalid access ignored often result segmentation fault abortion process brought light several issues software running openbsd 3.8 particularly programs reading beyond start end buffer type bug would previously detected directly cause error abilities took three years implement without considerable performance loss one goals openbsd project integration facilities software strong cryptography core operating system end number low-level features provided including source strong pseudo random numbers built-in cryptographic hash functions transforms support cryptographic hardware openbsd cryptographic framework abilities used throughout openbsd including bcrypt password-hashing algorithm derived bruce schneier blowfish block cipher takes advantage cpu-intensive blowfish key schedule making brute-force attacks less practical protect sensitive information passwords leaking disk persist many years openbsd supports encryption swap partition swap space split many small regions assigned encryption key soon data region longer required openbsd securely deletes discarding encryption key feature enabled default openbsd 3.9 later network stack also makes heavy use randomization increase security reduce predictability various values may use attacker including tcp initial sequence numbers timestamps ephemeral source ports number features increase network resilience availability including countermeasures problems icmp software redundancy carp pfsync also included project first disable plain-text telnet daemon favor encrypted ssh daemon 1999 features integrated cryptographic software ipsec telnet daemon completely removed openbsd 2005 release openbsd version 3.8 parts x11 openbsd running user except x server split privilege-stripped x process run root x process run _x11 user x11 openbsd neither x server x clients normally escalated direct memory hardware privileges driving x intel 4 radeon 4 drivers normally interact underlying hardware via direct rendering management 4 kernel interface lowlevel memory/hardware access handled solely kernel drivers wsfb follow similar pattern reason x11 openbsd open lowlevel memory hardware access user/root programs done systems done past needed user escalate machdep.allowaperture setting default zero setting unsecure setting openbsd version x window system named xenocara security modifications server default applications patched make use privilege separation openbsd provides aperture driver limit x access memory however work x security flaws loïc duflot theo de raadt commented aperture driver merely best x violates security models hear university class went castigate x developers taking time solving 10-year-old problem november 29 2006 vesa kernel driver developed permitted x run albeit slowly without use aperture driver february 15 2014 x modified allow run without root privileges discovery security vulnerability x openbsd n't support running x root user supports running x via display manager dedicated codice_17 user privilege separation privilege revocation chrooting randomized loading libraries also play role increasing security system many applied openbsd versions common programs tcpdump apache bsd authentication system openbsd history providing users full disclosure relation various bugs security breaches detected openbsd team exemplified project slogan two remote holes default install heck long time openbsd 5.3 support full disk encryption introduced openbsd 5.8 introduced codice_18 system call restricting process capabilities minimal subset required correct operation process compromised attempts perform unintended behavior terminated kernel since introduction applications ports changed support codice_18 including chromium web browser
[ 6414, 4662, 2001, 2453, 191, 2549, 2912, 5373, 6085, 5814, 3775, 2644, 907, 7637, 123, 5571, 6630, 5397, 1019, 1572, 1394, 7752, 3220, 5067, 3572, 6046, 4729, 4990, 1133, 7765, 5440, 971, 1245, 6242, 1805 ]
Validation
2,884
8
Web_mining:web mining web mining application data mining techniques discover patterns world wide web name proposes information gathered mining web makes utilization automated apparatuses reveal extricate data servers web2 reports permits organizations get organized unstructured information browser activities server logs website link structure page content different sources goal web structure mining generate structural summary web site web page technically web content mining mainly focuses structure inner-document web structure mining tries discover link structure hyperlinks inter-document level based topology hyperlinks web structure mining categorize web pages generate information similarity relationship different web sites web structure mining also another direction -- discovering structure web document type structure mining used reveal structure schema web pages would good navigation purpose make possible compare/integrate web page schemes type structure mining facilitate introducing database techniques accessing information web pages providing reference schema web mining divided three different types – web usage mining web content mining web structure mining web usage mining application data mining techniques discover interesting usage patterns web data order understand better serve needs web-based applications usage data captures identity origin web users along browsing behavior web site web usage mining classified depending kind usage data considered studies related work concerned two areas constraint-based data mining algorithms applied web usage mining developed software tools systems costa seco demonstrated web log mining used extract semantic information hyponymy relationships particular user given community web usage mining essentially many advantages makes technology attractive corporations including government agencies technology enabled e-commerce personalized marketing eventually results higher trade volumes government agencies using technology classify threats fight terrorism predicting capability mining applications benefit society identifying criminal activities companies establish better customer relationship understanding needs customer better reacting customer needs faster companies find attract retain customers save production costs utilizing acquired insight customer requirements increase profitability target pricing based profiles created even find customers might default competitor company try retain customer providing promotional offers specific customer thus reducing risk losing customer customers benefits web usage mining particularly area personalization outlined specific frameworks probabilistic latent semantic analysis model offer additional features user behavior access pattern process provides user relevant content collaborative recommendation models also demonstrate capability web usage mining technology address problems associated traditional techniques biases questions regarding validity since data patterns obtained subjective degrade time also elements unique web usage mining show technology benefits include way semantic knowledge applied interpreting analyzing reasoning usage patterns mining phase web usage mining create issues technology used data personal nature might cause concerns criticized ethical issue involving web usage mining invasion privacy privacy considered lost information concerning individual obtained used disseminated especially occurs without knowledge consent obtained data analyzed clustered form profiles data made anonymous clustering personal profiles thus applications de-individualize users judging mouse clicks de-individualization defined tendency judging treating people basis group characteristics instead individual characteristics merits another important concern companies collecting data specific purpose might use data totally different purposes essentially violates user ’ interests growing trend selling personal data commodity encourages website owners trade personal data obtained site trend increased amount data captured traded increasing likeliness one ’ privacy invaded companies buy data obliged make anonymous companies considered authors specific release mining patterns legally responsible contents release inaccuracies release result serious lawsuits law preventing trading data mining algorithms might use controversial attributes like sex race religion sexual orientation categorize individuals practices might anti-discrimination legislation applications make hard identify use controversial attributes strong rule usage algorithms attributes process could result denial service privilege individual based race religion sexual orientation right situation avoided high ethical standards maintained data mining company collected data made anonymous obtained data obtained patterns traced back individual might look poses threat one ’ privacy however additional information inferred application combining two separate unscrupulous data user web structure mining uses graph theory analyze node connection structure web site according type web structural data web structure mining divided two kinds web structure mining terminology techniques web structure mining web content mining mining extraction integration useful data information knowledge web page content heterogeneity lack structure permits much ever-expanding information sources world wide web hypertext documents makes automated discovery organization search indexing tools internet world wide web lycos alta vista webcrawler aliweb metacrawler others provide comfort users generally provide structural information categorize filter interpret documents factors prompted researchers develop intelligent tools information retrieval intelligent web agents well extend database data mining techniques provide higher level organization semi-structured data available web agent-based approach web mining involves development sophisticated ai systems act autonomously semi-autonomously behalf particular user discover organize web-based information web content mining differentiated two different points view information retrieval view database view summarized research works done unstructured data semi-structured data information retrieval view shows researches use bag words based statistics single words isolation represent unstructured text take single word found training corpus features semi-structured data works utilize html structures inside documents utilized hyperlink structure documents document representation database view order better information management querying web mining always tries infer structure web site transform web site become database several ways represent documents vector space model typically used documents constitute whole vector space representation realize importance words document resolve tf-idf term frequency times inverse document frequency introduced multi-scanning document implement feature selection condition category result rarely affected extraction feature subset needed general algorithm construct evaluating function evaluate features feature set information gain cross entropy mutual information odds ratio usually used classifier pattern analysis methods text data mining similar traditional data mining techniques usual evaluative merits classification accuracy precision recall information score web mining important component content pipeline web portals used data confirmation validity verification data integrity building taxonomies content management content generation opinion mining language code chinese words complicated compared english gb big5 hz code common chinese word codes web documents text mining one needs identify code standard html documents transform inner code use data mining techniques find useful knowledge useful patterns
[ 5429, 1718, 2434, 4600, 7389, 2727, 715, 84, 5885 ]
Test