node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,885
3
Windows_Server_2003:windows server 2003 windows server 2003 server operating system produced microsoft released april 24 2003 successor windows 2000 server predecessor windows server 2008 updated version windows server 2003 r2 released manufacturing december 6 2005 windows server 2003 kernel later adopted development windows vista windows server 2003 follow-up windows 2000 server incorporating compatibility features windows xp unlike windows 2000 server windows server 2003 default installation none server components enabled reduce attack surface new machines windows server 2003 includes compatibility modes allow older applications run greater stability made compatible windows nt 4.0 domain-based networking windows server 2003 brought enhanced active directory compatibility better deployment support ease transition windows nt 4.0 windows server 2003 windows xp professional product went several name changes course development first announced 2000 known codename whistler server named windows 2002 server brief time mid-2001 followed windows .net server windows .net server 2003 microsoft chose focus .net branding .net framework os finally released windows server 2003 windows server 2003 first microsoft windows version thoroughly subjected semi-automated testing bugs software system called prefast developed computer scientist amitabh srivastava microsoft research automated bug checking system first tested windows 2000 thoroughly amitabh srivastava prefast found 12 windows server 2003 bugs remaining 88 found human computer programmers microsoft employs 4,700 programmers work windows 60 software testers whose job find bugs windows source code microsoft co-founder bill gates stated windows server 2003 microsoft rigorously tested software date microsoft later used windows server 2003 kernel development windows vista following features new windows server 2003 ability create rescue disk removed favor automated system recovery asr windows server 2003 comes number editions targeted towards particular size type business general variants windows server 2003 ability share files printers act application server host message queues provide email services authenticate users act x.509 certificate server provide ldap directory services serve streaming media perform server-oriented functions windows server 2003 web meant building hosting web applications web pages xml web services designed used primarily iis web server provides platform developing deploying xml web services applications use asp.net technology domain controller terminal services functionality included web edition however remote desktop administration available 10 concurrent file-sharing connections allowed moment possible install microsoft sql server microsoft exchange software edition without installing service pack 1 despite supporting xml web services asp.net uddi deployed windows server 2003 web .net framework version 2.0 included windows server 2003 web installed separate update windows update windows server 2003 web supports maximum 2 physical processors maximum 2 gb ram edition windows server 2003 require client access license cal used internet facing server front-end internet information services windows server update services using storage back-end another remote server front-end cals may still required microsoft windows server 2003 standard aimed towards small medium-sized businesses standard edition supports file printer sharing offers secure internet connectivity allows centralized desktop application deployment specialized version x64 architecture released april 2005 ia-32 version supports four physical processors 4 gb ram x64 version capable addressing 32 gb ram also supports non-uniform memory access windows server 2003 enterprise aimed towards medium large businesses full-function server operating system supports 8 physical processors provides enterprise-class features eight-node clustering using microsoft cluster server mscs software support 64 gb ram pae enterprise edition also comes specialized versions x64 itanium architectures service pack 2 installed x64 itanium versions capable addressing 1 tb 2 tb ram respectively edition also supports non-uniform memory access numa also provides ability hot-add supported hardware windows server 2003 enterprise also required edition issue custom certificate templates windows server 2003 datacenter designed infrastructures demanding high security reliability windows server 2003 available ia-32 itanium x64 processors supports maximum 32 physical processors ia-32 platform 64 physical processors x64 ia-64 hardware ia-32 versions edition support 64 gb ram service pack 2 installed x64 versions support 1 tb ia-64 versions support 2 tb ram windows server 2003 datacenter also allows limiting processor memory usage per-application basis edition better support storage area networks sans features service uses windows sockets emulate tcp/ip communication native san service providers thereby allowing san accessed tcp/ip channel application communicate tcp/ip use san without modification application datacenter edition like enterprise edition supports 8-node clustering clustering increases availability fault tolerance server installations distributing replicating service among many servers edition supports clustering cluster dedicated storage cluster nodes connected common san windows compute cluster server 2003 ccs released june 2006 designed high-end applications require high performance computing clusters designed deployed numerous computers clustered together achieve supercomputing speeds compute cluster server network comprises least one controlling head node subordinate processing nodes carry work compute cluster server uses microsoft messaging passing interface v2 ms-mpi communicate processing nodes cluster network ties nodes together powerful inter-process communication mechanism complex communications hundreds even thousands processors working parallel application programming interface consists 160 functions job launcher enables users execute jobs executed computing cluster ms mpi designed compatible reference open source mpi2 specification widely used high-performance computing hpc exceptions security considerations ms mpi covers complete set mpi2 functionality implemented mpich2 except planned future features dynamic process spawn publishing windows storage server 2003 part windows server 2003 series specialized server operating system network-attached storage nas launched 2003 storage decisions chicago optimized use file print sharing also storage area network san scenarios available original equipment manufacturers oems unlike windows server 2003 editions provide file printer sharing functionality windows storage server 2003 require cal windows storage server 2003 nas equipment headless means without monitors keyboards mice administered remotely devices plugged existing ip network storage capacity available users windows storage server 2003 use raid arrays provide data redundancy fault-tolerance high performance multiple nas servers clustered appear single device allows responsibility serving clients shared way one server fails servers take often termed failover also improves fault-tolerance windows storage server 2003 also used create storage area network data transferred terms chunks rather files thus providing granularity data transferred provides higher performance database transaction processing applications windows storage server 2003 also allows nas devices connected san windows storage server 2003 r2 follow-up windows storage server 2003 adds file-server performance optimization single instance storage sis index-based search single instance storage sis scans storage volumes duplicate files moves duplicate files common sis store file volume replaced link file substitution reduces amount storage space required much 70 windows storage server 2003 r2 provides index-based full-text search based indexing engine already built windows server updated search engine speeds indexed searches network shares edition also provides filters searching many standard file formats .zip autocad xml mp3 .pdf microsoft office file formats windows storage server 2003 r2 includes built support windows sharepoint services microsoft sharepoint portal server adds storage management snap-in microsoft management console used manage storage volumes centrally including dfs shares servers running windows storage server r2 windows storage server 2003 r2 used iscsi target standard enterprise editions windows storage server 2003 r2 incorporating wintarget iscsi technology microsoft acquired 2006 stringbean software add-on feature available purchase oem partners iscsi feature pack included versions wss configured oems windows storage server 2003 promoted function domain controller however edition licensed run directory services joined existing domain member server windows storage server 2003 r2 available following editions windows unified data storage server version windows storage server 2003 r2 iscsi target support standard available standard enterprise editions windows small business server sbs software suite includes windows server additional technologies aimed providing small business complete technology solution standard edition sbs includes microsoft remote web workplace windows sharepoint services microsoft exchange server fax server active directory basic firewall dhcp server network address translation capabilities premium edition sbs adds microsoft sql server 2000 microsoft isa server 2004 sbs type cal different costs slightly cals editions windows server 2003 however sbs cal encompasses user cals windows server exchange server sql server isa server hence less expensive buying cals individually sbs following design limitations mainly affecting active directory remove limitations instance sbs upgrade regular windows server exchange server sql isa server windows small business server 2003 r2 transition pack windows home server operating system microsoft based windows small business server 2003 sp2 seen directory listings installation dvd windows home server announced january 7 2007 consumer electronics show bill gates intended solution homes multiple connected pcs offer file sharing automated backups remote access windows home server began shipment oems september 15 2007 windows server 2003 embedded systems replaced windows 2000 server embedded systems intended use building firewall vpn caching servers similar appliances versions available server appliance software microsoft internet security acceleration server availability original version ended may 28 2003 availability r2 ended march 5 2006 end support scheduled july 14 2015 r2 original end licence scheduled may 28 2018 r2 original end support date indicates supported service pack dated july 14 2005 end licence date last date oem may distribute systems using version versions continue receive critical security updates end support microsoft announced extended support dates windows server 2003 embedded systems release 2 embedded systems available 32 64 bit versions standard 1-4 cpu enterprise 1-8 cpu march 30 2005 microsoft released service pack 1 windows server 2003 among improvements many updates provided windows xp users service pack 2 features added service pack 1 include full list updates available microsoft knowledge base service pack 2 windows server 2003 released march 13 2007 release date originally scheduled first half 2006 june 13 2006 microsoft made initial test version service pack 2 available microsoft connect users build number 2721 followed build 2805 known beta 2 refresh final build 3790 microsoft described service pack 2 standard service pack release containing previously released security updates hotfixes reliability performance improvements addition service pack 2 contains microsoft management console 3.0 windows deployment services replaces remote installation services support wpa2 improvements ipsec msconfig service pack 2 also adds windows server 2003 scalable networking pack snp allows hardware acceleration processing network packets thereby enabling faster throughput snp previously available out-of-band update windows server 2003 service pack 1 windows server 2003 r2 title complementary offering microsoft consists copy windows server 2003 sp1 one cd host optionally installed new features reminiscent microsoft plus another released manufacturing december 6 2005 ia-32 x64 platforms ia-64 succeeded windows server 2008 new features windows server 2003 r2 include july 13 2010 windows server 2003 mainstream support expired extended support phase began extended support phase microsoft continued provide security updates however free technical support warranty claims design changes longer offered extended support lasted july 14 2015 although windows server 2003 unsupported microsoft released emergency security patch may 2017 os well unsupported versions windows including windows xp windows 8 rtm address vulnerability leveraged wannacry ransomware attack
[ 1438, 7149, 4293, 7161, 4670, 3945, 6802, 5378, 4684, 1091, 2204, 3962, 4687, 1097, 3635, 418, 6840, 6844, 7209, 6136, 425, 1882, 5781, 7217, 5442, 4377, 5794, 444, 447, 448, 1522, 458, 2631, 4759, 2991, 1534, 7616, 1536, 7626, 2644, 65...
Test
2,886
2
Process_isolation:process isolation process isolation set different hardware software technologies designed protect process processes operating system preventing process writing process b process isolation implemented virtual address space process address space different process b address space – preventing writing onto b security easier enforce disallowing inter-process memory access contrast less secure architectures dos process write memory process system process isolation limited controlled interaction processes may still allowed inter-process communication ipc channels shared memory local sockets internet sockets scheme process memory isolated processes except process allowing input collaborating processes system policies may disallow ipc circumstances example mandatory access control systems subjects different sensitivity levels may allowed communicate notable operating systems support process isolation internet explorer 4 used process isolation order allow separate windowed instances browser processes however height browser wars dropped subsequent versions compete netscape navigator sought concentrate upon one process entire internet suite idea process-per-instance would revisited decade afterwards tabbed browsing became commonplace google chrome multi-process architecture internet explorer 8 loosely coupled ie lcie tabs containing webpages contained within semi-separate os-level processes isolated core process browser prevent crash one tab/page crashing entire browser method known popularly multiprocess process-per-tab meant manage memory processing allowing offending tabs crash separately browser tabs manage security
[ 5378, 4254, 3495, 4759, 5571, 5415, 8066, 578, 447 ]
Test
2,887
2
DEMOS:demos demos dialogovaya edinaya mobilnaya operatsionnaya sistema unix-like operating system developed soviet union derived bsd development initiated kurchatov institute atomic energy moscow 1982 development continued cooperation institutes commercialized demos co-operative employed key contributors demos earlier alternative mnos clone unix version 6 mnos demos version 1.x gradually merged 1986 1990 leaving joint os demos version 2.x support different cyrillic charsets koi-8 u-code used demos 1 mnos respectively initially developed sm-4 pdp-11/40 clone sm-1600 later ported elektronika-1082 besm es evm clones vax-11 sm-1700 number platforms including pc/xt elektronika-85 clone dec professional number motorola 68020-based microcomputers development demos effectively ceased 1991 second project demos team relcom took priority originally suggested name унас unas volapukish word play unix у них u nih russian means also у нас u nas means also serious management dismissed idea favor traditional alphabet soup
[ 4751, 6076, 7794, 4478, 5462, 3690, 900, 2467, 2294, 7079, 5571, 2300, 2118, 6360, 578, 5048, 1288, 6367, 2864, 4447, 6583, 443 ]
Validation
2,888
3
Slot_(computer_architecture):slot computer architecture slot comprises operation issue data paths machinery surrounding collection one functional units fus share resources term slot common purpose vliw world relationship operation instruction pipeline execute explicit dynamically scheduled machines concept commonly called execute pipeline modern conventional cpus several compute pipelines say two alu one fpu one sse/mmx one branch issue one instruction per basic cycle several flight correspond slots pipelines may several fus adder multiplier say one fu pipeline issued particular cycle fu population pipeline/slot design option cpu
[ 5947, 7541, 4643, 1237, 3156, 5669, 5670 ]
Test
2,889
3
ASCI_Blue_Mountain:asci blue mountain asci blue mountain supercomputer installed los alamos national laboratory los alamos new mexico designed run simulations united states national nuclear security administration advanced simulation computing program computer collaboration silicon graphics corporation los alamos national laboratory installed 1998 cluster ccnuma sgi origin 2000 systems contains 6,144 mips r10000 microprocessors theoretical top performance 3.072 teraflops built stage accelerated strategic computing initiative asci started u.s. department energy national nuclear security administration build simulator replace live nuclear weapons testing following moratorium testing started president george h. w. bush 1992 extended bill clinton 1993 unveiled commissioned 1998 june 1999 world second fastest computer remained among world ten fastest computers november 2001 according los alamos national laboratory website supercomputer set world record may 2000 equivalent 17.8 years normal computer processing within 72 hours including 15,000 engineering simulations requiring 10 hours first commissioned november 1998 blue mountain decommissioned monday november 8 2004 8 replaced asci q lightning qsc supercomputers
[ 1023, 5055, 7010, 4365 ]
Validation
2,890
4
Wirelurker:wirelurker wirelurker family malware targeting macos ios systems malware designed target users china use apple mobile desktop devices malware suspected infecting thousands chinese mobile devices security firm palo alto networks credited uncovering malware wirelurker monitors ios device connected via usb infected macos computer installs downloaded third-party applications automatically generated malicious applications onto device wirelurker infect device regardless whether jailbroken wirelurker complex form malware utilizes techniques file hiding code obfuscation encryption wirelurker capable stealing variety information mobile devices infects regularly requests updates attackers command control server three individuals china arrested suspicion creating distributing wirelurker malware suspects identified surnames wang lee chen taken custody thursday november 13 2014 chinese authorities believe suspects created malware financial gains several steps taken order protect wirelurker malware
[ 8100 ]
Test
2,891
4
United_States_Computer_Emergency_Readiness_Team:united states computer emergency readiness team united states computer emergency readiness team us-cert organization within department homeland security ’ dhs national protection programs directorate nppd specifically us-cert branch office cybersecurity communications cs c national cybersecurity communications integration center nccic us-cert responsible analyzing reducing cyber threats vulnerabilities disseminating cyber threat warning information coordinating incident response activities division brings advanced network digital media analysis expertise bear malicious activity targeting networks within united states abroad dhs cyber security division created us-cert september 2003 protect internet infrastructure united states coordinating defense responding cyber-attacks 24-hour operational arm nccic accepts triages collaboratively responds incidents provides technical assistance information system operators disseminates timely notifications regarding current potential security threats exploits vulnerabilities public via national cyber awareness system ncas us-cert operates side-by-side industrial control systems computer emergency response team ics-cert deals security related industrial control systems entities operate together within nccic provide single source support critical infrastructure stakeholders five operational aspects enable us-cert meet objectives improving nation ’ cybersecurity posture coordinate cyber information sharing proactively manage cyber risks protecting constitutional rights americans feature involved reviewing researching vetting documenting computer network defense cnd attributes available us-cert classified unclassified helps promote improved mitigation resources federal departments agencies across einstein network requesting deployment countermeasures response credible cyber threats feature conducts technical analysis data provided partners constituents monitoring systems understand nature attacks threats vulnerabilities well develop tips indicators warnings actionable information us-cert ’ cnd mission feature conducts digital forensic examinations malware artifact analysis reverse engineering determine attack vectors mitigation techniques identifies possible threats based analysis malicious code digital media provides indicators mitigate prevent future intrusions feature informs cnd community potential threats allows hardening cyber defenses well develops near real-time/rapid response community products e.g. reports white papers critical event occurs detected operations create tailored product describing event recommended course action mitigation techniques applicable ensure constituents made aware protect organization appropriately feature supports nccic information sharing development web presence responsible establishing maintaining assured communications developing disseminating information products supporting development maintenance collaboration tools feature partners foreign governments entities enhance global cybersecurity defense posture supports bilateral engagements cert-to-cert information sharing/trust building activities improvements related global collaboration agreements data sharing standards january 2015 report senator tom coburn ranking member committee homeland security governmental affairs expressed concern us-cert always provide information nearly quickly alternative private sector threat analysis companies
[ 3932, 4, 7799, 4585, 4486, 3957, 5125, 5223, 2478, 7641, 2027, 2850, 2577, 4256, 7106, 7287, 429, 4820, 2791, 1691, 73, 3338, 537, 1613, 1805 ]
Validation
2,892
3
1942_(video_game):1942 video game 1942 vertically scrolling shooter made capcom released arcade 1984 first game 19xx series followed 1942 set pacific theater world war ii despite game created japanese developers goal reach tokyo destroy entire japanese air fleet player pilots lockheed p-38 lightning dubbed super ace player shoot enemy planes avoid enemy fire player perform roll vertical loop game player may collect series power-ups one allowing plane escorted two smaller fighters tip tow formation enemies kawasaki ki-61s mitsubishi a6m zeros kawasaki ki-48s boss plane nakajima g8n game ported famicom 1985 japan north america 1986 developed micronics msx nec pc-8801 game boy color ported european games publisher elite systems amstrad cpc zx spectrum commodore 64 music commodore 64 version based main verse ron goodwin 633 squadron movie score arrangement mark cooksey 1942 capcom breakaway hit eclipsing popularity company preceding three titles vulgus sonson pirate ship higemaru 1987 number-one euromax uk arcade chart followed wonder boy number-two 1942 first capcom title spawn successful series sequels five titles 19xx line released 1987 2000 many capcom vertical shooters featured similar gameplay re-released playstation saturn consoles featured capcom classics collection playstation 2 xbox well playstation portable arcade version added wii virtual console japan december 21 2010 pal north american regions january 2011 also re-released windows mobile professional. released xbox live arcade playstation network 2008 1942 first strike released ios 2010 game series sold total 1.4 million units worldwide december 31 2018 stands capcom 18th best-selling franchise
[ 7859, 1237, 5928, 3313, 4784 ]
Test
2,893
4
European_Cybercrime_Centre:european cybercrime centre european cybercrime centre ec3 ec³ body police office europol european union eu headquartered hague coordinates cross-border law enforcement activities computer crime acts centre technical expertise matter officially launched 11 january 2013 european cybercrime centre expected fully operational 2015 began staff 30 plans expand 40 end 2013 began operations budget 3.6 million euros head ec3 reports directly head europol first person head department former head danish domestic intelligence left interpol january 2015 become barclays chief intelligence security officer.. ec3 tasked assisting member states efforts dismantle disrupt cybercrime networks developing tools providing training ec3 works european union intelligence situation centre intcen united nations office drugs crime undcp world customs organization wco european border coast guard agency ebcg also known frontex european anti-fraud office olaf press releases 2015 also revealed ec3 works american security services federal bureau investigation fbi overlap responsibilities european union agency network information security enisa press conference 10 february 2014 asked massive identity theft uncovered german federal office information security head ec3 troels oerting said unit responsible combatting politically motivated hacking and/or espionage eu institutions february 2014 troels oerting reported successes unit 2013 included catching internet extortioners 13 arrests also involved fighting malware attacks banks using botnets – cooperation microsoft experts german federal criminal police office – taking zeroaccess botnet 2014 details revealed operation onymous took number darknet sites including pandora cloud 9 hydra blue sky topix flugsvamp cannabis road black market silk road 2.0 2015 american media reported coordinated fbi operation assistance ec3 take dark0de largest english -language communication trading platform cybercriminals well eu member states cooperation number states including australia canada republic macedonia norway switzerland monaco bosnia herzegovina colombia moldova russia turkey republic serbia montenegro ukraine united states
[ 5251, 7402, 7600, 3573 ]
Test
2,894
4
Ettercap_(software):ettercap software ettercap free open source network security tool man-in-the-middle attacks lan used computer network protocol analysis security auditing runs various unix-like operating systems including linux mac os x bsd solaris microsoft windows capable intercepting traffic network segment capturing passwords conducting active eavesdropping number common protocols original developers later founded hacking team ettercap works putting network interface promiscuous mode arp poisoning target machines thereby act 'man middle unleash various attacks victims ettercap plugin support features extended adding new plugins ettercap supports active passive dissection many protocols including ciphered ones provides many features network host analysis ettercap offers four modes operation addition software also offers following features ettercap also ability actively passively find poisoners lan
[ 2450, 3172, 4759, 2281, 4396, 3777, 3528, 7534, 1462, 726, 651, 7637, 4208, 5571, 4783, 578, 5933, 6363, 3383, 2219, 3797, 6022, 2043, 6574, 7214, 4187, 3915, 5181, 3338, 1435, 1805, 3426 ]
Test
2,895
4
TURBINE_(US_government_project):turbine us government project turbine codename automated system essence enables automated management control large network implants form remotely transmitted malware selected individual computer devices bulk tens thousands devices nsa built infrastructure enables covertly hack computers mass scale using automated systems reduce level human oversight process quoted intercept turbine designed allow current implant network scale large size millions implants creating system automated control implants groups instead individually nsa shared many files use implants counterparts so-called five eyes surveillance alliance – united kingdom canada new zealand australia among things due turbine control implants nsa capable turbine implants linked relies upon large network clandestine surveillance sensors nsa installed locations across world including agency headquarters maryland fort george g. meade eavesdropping bases used agency misawa japan misawa air base menwith hill england raf menwith hill codenamed turmoil sensors operate sort high-tech surveillance dragnet monitoring packets data sent across internet turbine implants exfiltrate data infected computer systems turmoil sensors automatically identify data return nsa analysis targets communicating turmoil system used send alerts tips turbine enabling initiation malware attack identify surveillance targets nsa uses series data selectors flow across internet cables selectors include email addresses ip addresses unique cookies containing username identifying information sent user computer websites google facebook hotmail yahoo twitter unique google advertising cookies track browsing habits unique encryption key fingerprints traced specific user computer ids sent across internet windows computer crashes updates
[ 7747, 4759, 5509 ]
Test
2,896
4
Arxan_Technologies:arxan technologies arxan technologies american technology company specializing application attack prevention self-protection solution iot mobile applications company reports applications secured running 500 million devices arxan solutions used protect applications across range industries including mobile payments banking automotive iot healthcare iot gaming high-tech arxan security products used protect confidentiality applications breached reverse-engineering code analysis means integrity applications compromised code modification malware insertion types attacks arxan privately held private equity-backed fall 2013 ta associates private equity firm completed majority investment arxan technologies previously company received series b funding 2003 followed 13 million series c funding 2007 series funding 4 million 2009 early investors included trident capital edf ventures legend ventures paladin capital dunrath capital tdf fund solstice capital arxan founded 2001 eric davis purdue university researchers mikhail atallah tim korb john rice hoi chang first funding came richard early dunrath capital rich early subsequently became arxan first ceo company early intellectual property licensed purdue university company initial focus defense anti-tamper applications following sale defense technology unit arxan defense systems microsemi 2010 arxan focused commercial applications arxan offers number anti-tamper software products application cryptographic key protection include may 2012 company announced comprehensive support android application protection hardening tampering piracy june 2014 arxan announced mobile application protection offerings sold ibm part ibm portfolio security products arxan products based patented security techniques code hardening tamper-proofing key security node locking core technology consists multi-layered interconnected network guards perform specific security function embedded application binaries make programs tamper-aware tamper-resistant self-healing company claims three-layer protection paradigm defend detect react differentiating approach detecting attack attempted responding detected attacks alerts repairs protection helps secure software hacking attacks threats
[ 7633, 2566, 7093 ]
Test
2,897
6
XZ_Utils:xz utils xz utils previously lzma utils set free command-line lossless data compressors including lzma xz unix-like operating systems version 5.0 onwards microsoft windows xz utils consists two major components various command shortcuts exist lzma xz -- format=lzma unxz xz -- decompress analogous gunzip xzcat unxz -- stdout analogous zcat xz utils compress decompress xz lzma file formats since lzma format legacy xz utils compresses default xz behavior software well properties file format designed work similarly popular unix compressing tools gzip bzip2 consists unix port igor pavlov lzma-sdk adapted fit seamlessly unix environments usual structure behavior like gzip bzip xz lzma compress single files data streams input bundle multiple files single archive – archiving program used first tar compressing archive decompressing archive version 1.22 greater gnu implementation tar transparent support tarballs compressed lzma xz using switches codice_1 codice_2 xz compression codice_3 lzma compression creating archive compressing decompressing archive extracting contents development xz utils took place within tukaani project led mike kezner small group developers maintained linux distribution based slackware source code xz utils released public domain rest subject different free software licenses specifically core parts public domain software parts bulk system gnu lgpl v2.1 parts build system gnu gpl v2 gnu gpl v3 resulting software binary therefore gpl binaries available freebsd linux systems microsoft windows freedos number linux distributions including fedora slackware ubuntu debian arch linux use xz compressing software packages gnu ftp archive also uses xz
[ 4213, 7058, 985, 4759, 1352, 204, 7075, 6992, 5571, 658, 578, 4700, 1955, 7746, 3032, 7201, 7387, 3219, 510, 8126, 1127, 2334, 6940, 4732, 5256, 3152, 3915, 169, 1139, 7498, 5349, 1989, 4461, 1435, 619 ]
Test
2,898
4
Fly-by-wire:fly-by-wire fly-by-wire fbw system replaces conventional manual flight controls aircraft electronic interface movements flight controls converted electronic signals transmitted wires hence fly-by-wire term flight control computers determine move actuators control surface provide ordered response use mechanical flight control backup systems boeing 777 use fully fly-by-wire controls improved fully fly-by-wire systems interpret pilot control inputs desired outcome calculate control surface positions required achieve outcome results various combinations rudder elevator aileron flaps engine controls different situations using closed feedback loop pilot may fully aware control outputs acting effect outcome aircraft reacting expected fly-by-wire computers act stabilise aircraft adjust flying characteristics without pilot involvement prevent pilot operating outside aircraft safe performance envelope mechanical hydro-mechanical flight control systems relatively heavy require careful routing flight control cables aircraft systems pulleys cranks tension cables hydraulic pipes systems often require redundant backup deal failures increases weight limited ability compensate changing aerodynamic conditions dangerous characteristics stalling spinning pilot-induced oscillation pio depend mainly stability structure aircraft concerned rather control system depending pilot action term fly-by-wire implies purely electrically signaled control system used general sense computer-configured controls computer system interposed operator final control actuators surfaces modifies manual inputs pilot accordance control parameters side-sticks centre sticks conventional flight control yokes used fly fbw aircraft fbw aircraft lighter similar design conventional controls partly due lower overall weight system components partly natural stability aircraft relaxed slightly transport aircraft maneuverable fighter means stability surfaces part aircraft structure therefore made smaller include vertical horizontal stabilizers fin tailplane normally rear fuselage structures reduced size airframe weight reduced advantages fbw controls first exploited military commercial airline market airbus series airliners used full-authority fbw controls beginning a320 series see a320 flight control though limited fbw functions existed a310 boeing followed 777 later designs pilot commands flight control computer make aircraft perform certain action pitch aircraft roll one side moving control column sidestick flight control computer calculates control surface movements cause plane perform action issues commands electronic controllers surface controllers surface receive commands move actuators attached control surface moved flight control computer commanded controllers measure position flight control surface sensors lvdts fly-by-wire control systems allow aircraft computers perform tasks without pilot input automatic stability systems operate way gyroscopes fitted sensors mounted aircraft sense rotation pitch roll yaw axes movement straight level flight example results signals computer automatically move control actuators stabilize aircraft traditional mechanical hydraulic control systems usually fail gradually loss flight control computers immediately renders aircraft uncontrollable reason fly-by-wire systems incorporate either redundant computers triplex quadruplex etc kind mechanical hydraulic backup combination mixed control system mechanical backup feedbacks rudder elevation directly pilot therefore makes closed loop feedback systems senseless aircraft systems may quadruplexed four independent channels prevent loss signals case failure one even two channels high performance aircraft fly-by-wire controls also called ccvs control-configured vehicles may deliberately designed low even negative stability flight regimes rapid-reacting ccv controls electronically stabilize lack natural stability pre-flight safety checks fly-by-wire system often performed using built-in test equipment bite number control movement steps automatically performed reducing workload pilot groundcrew speeding flight-checks aircraft panavia tornado example retain basic hydro-mechanical backup system limited flight control capability losing electrical power case tornado allows rudimentary control stabilators pitch roll axis movements servo-electrically operated control surfaces first tested 1930s soviet tupolev ant-20 long runs mechanical hydraulic connections replaced wires electric servos first pure electronic fly-by-wire aircraft mechanical hydraulic backup apollo lunar landing training vehicle lltv first flown 1968 first non-experimental aircraft designed flown 1958 fly-by-wire flight control system avro canada cf-105 arrow feat repeated production aircraft concorde 1969 system also included solid-state components system redundancy designed integrated computerised navigation automatic search track radar flyable ground control data uplink downlink provided artificial feel feedback pilot uk two seater avro 707b flown fairey system mechanical backup early mid-60s program curtailed air-frame ran flight time 1972 first digital fly-by-wire fixed-wing aircraft without mechanical backup take air f-8 crusader modified electronically nasa united states test aircraft f-8 used apollo 11 guidance navigation control hardware preceded 1964 llrv pioneered fly-by-wire flight mechanical backup control digital computer three analog redundant channels ussr sukhoi t-4 also flew time united kingdom trainer variant british hawker hunter fighter modified british royal aircraft establishment fly-by-wire flight controls right-seat pilot fly-by-wire flight control systems eliminate complexity fragility weight mechanical circuit hydromechanical electromechanical flight control systems—each replaced electronic circuits control mechanisms cockpit operate signal transducers turn generate appropriate electronic commands next processed electronic controller—either analog one modernly digital one aircraft spacecraft autopilots part electronic controller hydraulic circuits similar except mechanical servo valves replaced electrically controlled servo valves operated electronic controller simplest earliest configuration analog fly-by-wire flight control system configuration flight control systems must simulate feel electronic controller controls electrical feel devices provide appropriate feel forces manual controls used concorde first production fly-by-wire airliner sophisticated versions analog computers replaced electronic controller canceled 1950s canadian supersonic interceptor avro canada cf-105 arrow employed type system analog computers also allowed customization flight control characteristics including relaxed stability exploited early versions f-16 giving impressive maneuverability digital fly-by-wire flight control system extended analog counterpart digital signal processing receive interpret input multiple sensors simultaneously altimeters pitot tubes adjust controls real time computers sense position force inputs pilot controls aircraft sensors solve differential equations related aircraft equations motion determine appropriate command signals flight controls execute intentions pilot programming digital computers enable flight envelope protection protections tailored aircraft handling characteristics stay within aerodynamic structural limitations aircraft example computer flight envelope protection mode try prevent aircraft handled dangerously preventing pilots exceeding preset limits aircraft flight-control envelope prevent stalls spins limit airspeeds g forces airplane software also included stabilize flight-control inputs avoid pilot-induced oscillations since flight-control computers continuously feedback environment pilot workloads reduced also military naval applications possible fly military aircraft relaxed stability primary benefit aircraft maneuverability combat training flights so-called carefree handling stalling spinning undesirable performances prevented automatically computers digital flight control systems enable inherently unstable combat aircraft lockheed f-117 nighthawk northrop grumman b-2 spirit flying wing fly usable safe manners federal aviation administration faa united states adopted rtca/do-178c titled software considerations airborne systems equipment certification certification standard aviation software safety-critical component digital fly-by-wire system including applications laws aeronautics computer operating systems need certified do-178c level b depending class aircraft applicable preventing potential catastrophic failures nevertheless top concern computerized digital fly-by-wire systems reliability even analog electronic control systems digital computers running software often control path pilot aircraft flight control surfaces computer software crashes reason pilot may unable control aircraft hence virtually fly-by-wire flight control systems either triply quadruply redundant computers electronics three four flight-control computers operating parallel three four separate data buses connecting control surface multiple redundant flight control computers continuously monitor output one computer begins give aberrant results reason potentially including software hardware failures flawed input data combined system designed exclude results computer deciding appropriate actions flight controls depending specific system details may potential reboot aberrant flight control computer reincorporate inputs return agreement complex logic exists deal multiple failures may prompt system revert simpler back-up modes addition early digital fly-by-wire aircraft also analog electrical mechanical hydraulic back-up flight control system space shuttle addition redundant set four digital computers running primary flight-control software fifth back-up computer running separately developed reduced-function software flight-control system – one commanded take event fault ever affects computers four back-up system serves reduce risk total flight-control-system failure ever happening general-purpose flight software fault escaped notice four computers airliners flight-control redundancy improves safety fly-by-wire control systems physically lighter lower maintenance demands conventional controls also improve economy terms cost ownership in-flight economy certain designs limited relaxed stability pitch axis example boeing 777 flight control system may allow aircraft fly aerodynamically efficient angle attack conventionally stable design modern airliners also commonly feature computerized full-authority digital engine control systems fadecs control jet engines air inlets fuel storage distribution system similar fashion way fbw controls flight control surfaces allows engine output continually varied efficient usage possible second generation embraer e-jet family gained 1.5 efficiency improvement first generation fly-by-wire system enabled reduction 280 ft.² 250 ft.² horizontal stabilizer e190/195 variants airbus boeing differ approaches implementing fly-by-wire systems commercial aircraft since airbus a320 airbus flight-envelope control systems always retain ultimate flight control flying normal law permit pilots violate aircraft performance limits unless choose fly alternate law strategy continued subsequent airbus airliners however event multiple failures redundant computers a320 mechanical back-up system pitch trim rudder airbus a340 purely electrical electronic back-up rudder control system beginning a380 flight-control systems back-up systems purely electrical use three-axis backup control module bcm boeing airliners boeing 777 allow pilots completely override computerised flight-control system permitting aircraft flown outside usual flight-control envelope decide necessary advent fadec full authority digital engine control engines permits operation flight control systems autothrottles engines fully integrated modern military aircraft systems autostabilization navigation radar weapons system integrated flight control systems fadec allows maximum performance extracted aircraft without fear engine misoperation aircraft damage high pilot workloads civil field integration increases flight safety economy airbus a320 fly-by-wire brethren protected dangerous situations low-speed stall overstressing flight envelope protection result conditions flight control systems commands engines increase thrust without pilot intervention economy cruise modes flight control systems adjust throttles fuel tank selections precisely skillful pilots fadec reduces rudder drag needed compensate sideways flight unbalanced engine thrust a330/a340 family fuel transferred main wing center fuselage tanks fuel tank horizontal stabilizer optimize aircraft center gravity cruise flight fuel management controls keep aircraft center gravity accurately trimmed fuel weight rather drag-inducing aerodynamic trims elevators fly-by-optics sometimes used instead fly-by-wire offers higher data transfer rate immunity electromagnetic interference lighter weight cases cables changed electrical optical fiber cables sometimes referred fly-by-light due use fiber optics data generated software interpreted controller remain fly-by-light effect decreasing electro-magnetic disturbances sensors comparison common fly-by-wire control systems kawasaki p-1 first production aircraft world equipped flight control system eliminated mechanical transmission circuits fly-by-wire flight control systems next step eliminate bulky heavy hydraulic circuits hydraulic circuit replaced electrical power circuit power circuits power electrical self-contained electrohydraulic actuators controlled digital flight control computers benefits digital fly-by-wire retained biggest benefits weight savings possibility redundant power circuits tighter integration aircraft flight control systems avionics systems absence hydraulics greatly reduces maintenance costs system used lockheed martin f-35 lightning ii airbus a380 backup flight controls boeing 787 airbus a350 also incorporate electrically powered backup flight controls remain operational even event total loss hydraulic power wiring adds considerable amount weight aircraft therefore researchers exploring implementing fly-by-wireless solutions fly-by-wireless systems similar fly-by-wire systems however instead using wired protocol physical layer wireless protocol employed addition reducing weight implementing wireless solution potential reduce costs throughout aircraft life cycle example many key failure points associated wire connectors eliminated thus hours spent troubleshooting wires connectors reduced furthermore engineering costs could potentially decrease less time would spent designing wiring installations late changes aircraft design would easier manage etc newer flight control system called intelligent flight control system ifcs extension modern digital fly-by-wire flight control systems aim intelligently compensate aircraft damage failure flight automatically using engine thrust avionics compensate severe failures loss hydraulics loss rudder loss ailerons loss engine etc several demonstrations made flight simulator cessna-trained small-aircraft pilot successfully landed heavily damaged full-size concept jet without prior experience large-body jet aircraft development spearheaded nasa dryden flight research center reported enhancements mostly software upgrades existing fully computerized digital fly-by-wire flight control systems dassault falcon 7x embraer legacy 500 business jets flight computers partially compensate engine-out scenarios adjusting thrust levels control inputs still require pilots respond appropriately
[ 336, 5571 ]
Validation
2,899
7
Virtual_organization_(grid_computing):virtual organization grid computing grid computing virtual organization vo refers dynamic set individuals institutions defined around set resource-sharing rules conditions virtual organizations share commonality among including common concerns requirements may vary size scope duration sociology structure collaborations involved grid computing early 2000s lead emergence multiple organizations function one unit use shared competencies resources purpose one identified goals virtual organization characteristics formal organization one comprises complex network smaller organizations contribute part production process boundaries organizations fuzzy control generally market forces reinforced certainty long- term contracts xtreemos project promised support virtual organizations
[ 2961, 4159, 2054, 175, 5539 ]
Validation
2,900
0
Language_Technologies_Institute:language technologies institute language technologies institute lti research institute carnegie mellon university pittsburgh pennsylvania united states focuses area language technologies main scholarly research institute machine translation speech recognition speech synthesis information retrieval parsing information extraction 1996 institute existed center machine translation established 1986 subsequently 1996 onwards started awarding degrees name changed language technologies institute current director institute professor jaime carbonell
[ 2365, 5125, 5275, 7457, 3137, 5008, 7372, 4087 ]
Test
2,901
5
QUIC:quic quic pronounced 'quick general-purpose transport layer network protocol initially designed jim roskind google implemented deployed 2012 announced publicly 2013 experimentation broadened described ietf still internet draft quic used half connections chrome web browser google servers web browsers support protocol although name initially proposed acronym quick udp internet connections ietf use word quic acronym simply name protocol among applications quic improves performance connection-oriented web applications currently using tcp establishing number multiplexed connections two endpoints user datagram protocol udp works hand-in-hand http/2 multiplexed connections allowing multiple streams data reach endpoints independently hence independent packet losses involving streams contrast http/2 hosted transmission control protocol tcp suffer head-of-line-blocking delays multiplexed streams tcp packets delayed lost quic secondary goals include reduced connection transport latency bandwidth estimation direction avoid congestion also moves congestion control algorithms user space endpoints rather kernel space claimed allow algorithms improve rapidly additionally protocol extended forward error correction fec improve performance errors expected seen next step protocol evolution june 2015 internet draft specification quic submitted ietf standardization quic working group established 2016 october 2018 ietf http quic working groups jointly decided call http mapping quic http/3 advance making worldwide standard transmission control protocol tcp aims provide interface sending streams data two endpoints data handed tcp system ensures data makes end exactly form connection indicate error condition exists tcp breaks data network packets adds small amounts data packet additional data includes sequence number used detect packets lost transmitted order checksum allows errors within packet data detected either problem occurs tcp uses automatic repeat request arq tell sender re-send lost damaged packet implementations tcp see error connection blocking operation stopping transfers error resolved connection considered failed single connection used send multiple streams data case http/2 protocol streams blocked although one might problem instance single error occurs downloading gif image used favicon entire rest page wait problem resolved tcp system designed look like data pipe stream deliberately contains little understanding data transmits data additional requirements like encryption using tls must set systems running top tcp using tcp communicate similar software end connection sorts setup tasks requires handshake process often requires several round-trips requests responses connection established due inherent latency long-distance communications add significant overhead overall transmission quic aims nearly equivalent tcp connection much-reduced latency primarily two changes rely understanding behaviour http traffic first change greatly reduce overhead connection setup http connections demand tls quic makes exchange setup keys supported protocols part initial handshake process client opens connection response packet includes data needed future packets use encryption eliminates need set tcp connection negotiate security protocol via additional packets protocols serviced way combining together multiple steps single request-response data used following requests initial setup well future requests would otherwise negotiated separate connections quic uses udp basis include loss recovery instead quic stream separately flow controlled lost data retransmitted level quic udp means error occurs one stream like favicon example protocol stack continue servicing streams independently useful improving performance error-prone links cases considerable additional data may received tcp notices packet missing broken data blocked even flushed error corrected quic data free processed single multiplexed stream repaired quic includes number mundane changes also improve overall latency throughput instance packets encrypted individually result encrypted data waiting partial packets generally possible tcp encryption records bytestream protocol stack unaware higher-layer boundaries within stream negotiated layers running top quic aims single handshake process another goal quic system improve performance network-switch events like happens user mobile device moves local wifi hotspot mobile network occurs tcp lengthy process starts every existing connection times one-by-one re-established demand solve problem quic includes connection identifier uniquely identifies connection server regardless source allows connection re-established simply sending packet always contains id original connection id still valid even user ip address changes quic implemented application-space opposed operating system kernel generally invokes additional overhead due context switches data moved applications however case quic protocol stack intended used single application application using quic connections hosted udp ultimately difference could small much overall http/2 stack already applications libraries commonly placing remaining parts libraries essentially error correction little effect http/2 stack size overall complexity organization allows future changes made easily require changes kernel updates one quic longer-term goals add new systems forward error correction fec improved congestion control one concern move tcp udp tcp widely adopted many middle-boxes internet infrastructure tuned tcp rate-limit even block udp google carried number exploratory experiments characterize found small number connections blocked manner led use rapid fallback-to-tcp system chromium network stack opens quic traditional tcp connection time allows fallback zero latency protocol created google taken ietf name quic already 2012 around quic version 20 quite different quic continued evolve refined within ietf original google quic designed general purpose protocol though initially deployed protocol support http chromium current evolution ietf protocol quic general purpose transport protocol chromium developers continued track evolution ietf quic standardization efforts adopt fully comply recent internet standards quic chromium quic code experimentally developed google chrome starting 2012 announced part chromium version 29 released august 20 2013 chrome currently enabled default chromium chrome browser experimental quic support enabled chrome //flags also browser extension indicate pages served quic similarly introduced opera 16 turned opera //flags/ enable-quic opera //flags/ enable-quic-https active sessions seen opera //net-internals/ quic firefox yet support quic 2019-07 cronet library quic protocols available android applications module loadable via google play services 2017 three actively maintained implementations google servers support quic google published prototype server go implementation called quic-go also available powers experimental quic support caddy server july 11 2017 litespeed technologies officially began supporting quic load balancer webadc litespeed web server products july 2019 55.9 quic websites used litespeed 43.7 used nginx although first google servers supported http-over-quic connections facebook also launched technology 2018 cloudflare offering quic support beta basis since 2018 july 2019 3.2 websites use quic addition several stale community projects libquic created extracting chromium implementation quic modifying minimize dependency requirements goquic provides go bindings libquic finally quic-reverse-proxy docker image acts reverse proxy server translating quic requests plain http understood origin server following implementations quic gquic available source form
[ 7148, 1068, 7170, 6432, 1462, 2566, 2219, 3640, 3312, 3999, 426, 7214, 7217, 456, 6879, 2281, 6521, 5115, 2644, 6531, 2291, 2650, 6536, 7637, 4414, 6908, 3383, 1952, 6931, 2696, 5880, 6966, 3086, 6976, 3775, 6984, 4144, 8090, 3797, 2043, ...
Validation
2,902
8
Urchin_(software):urchin software urchin web statistics analysis program developed urchin software corporation urchin analyzed web server log file content displayed traffic information website based upon log data sales urchin products ended march 28 2012 urchin software could run two different data collection modes log file analyzer hybrid log file analyzer urchin processed web server log files variety log file formats custom file formats could also defined hybrid urchin combined page tags log file data eradicate limitations data collection method isolation result accurate web visitor data urchin became one popular solutions website traffic analysis particularly isps web hosting providers largely due scalability performance pricing model urchin software corp. acquired google april 2005 forming google analytics april 2008 google released urchin 6 february 2009 google released urchin 6.5 integrating adwords urchin 7 released september 2010 included 64-bit support new ui event tracking among features
[ 3507, 4116, 5455, 711, 3850, 5372, 7431, 6176, 993, 7346, 2107, 2475, 4600, 831, 5141, 136, 2317, 2673, 8107, 750, 3309, 7924, 2591, 2683, 855, 4636, 168, 6776, 6950, 6153, 84, 2712 ]
Test
2,903
3
Emotion_Engine:emotion engine emotion engine central processing unit developed manufactured sony computer entertainment toshiba use playstation 2 video game console also used early playstation 3 models sold japan north america model numbers cechaxx cechbxx provide playstation 2 game support mass production emotion engine began 1999 ended late 2012 discontinuation playstation 2 emotion engine consists eight separate units performing specific task integrated onto die units cpu core two vector processing units vpu 10-channel dma unit memory controller image processing unit ipu three interfaces input output interface i/o processor graphics interface gif graphics synthesizer memory interface system memory cpu core tightly coupled first vpu vpu together responsible executing game code high-level modeling computations second vpu vpu dedicated geometry-transformations lighting operates independently parallel cpu core controlled microcode vpu utilized also used geometry-transformations display lists generated cpu/vpu0 vpu1 sent gif prioritizes dispatching graphics synthesizer rendering cpu core two-way superscalar in-order risc processor based mips r5900 implements mips-iii instruction set architecture isa much mips-iv addition custom instruction set developed sony operated 128-bit wide groups either 32-bit 16-bit 8-bit integers single instruction multiple data simd fashion i.e four 32-bit integers could added four others using single instruction instructions defined include add subtract multiply divide min/max shift logical leading-zero count 128-bit load/store 256-bit 128-bit funnel shift addition described sony competitive reasons contrary misconceptions simd capabilities amount processor 128-bit neither memory addresses integers 128-bit shared simd/integer registers comparison 128-bit wide registers simd instructions present 32-bit x86 architecture since 1999 introduction sse however internal data paths 128bit wide processors capable operating 4x32bit quantities parallel single registers processor mips-based modified instruction set main vu0 core superscalar in-order 2-issue design 6 stage long integer pipelines 15 stage long floating point pipeline assortment registers consists 32 128 bit vliw simd registers naming/renaming one 64 bit accumulator two 64 bit general data registers 8 16 bit fix function registers 16 8 bit controller registers processor also two 64 bit integer alus 128bit load-store unit lsu branch execution unit bxu 32 bit vu1 fpu coprocessor acted sync controller vpu0/vpu1 containing mips base processor core 32 64-bit fp registers 15 32-bit integer registers alus 64-bit 32-bit fpu n't ieee 754 compliant custom instruction set 107 mmi multimedia extensions implemented grouping two 64-bit integer alus integer floating-point pipelines six stages long feed execution units instructions data 16 kb two-way set associative instruction cache 8 kb two-way set associative non blocking data cache 16 kb scratchpad ram instruction data caches virtually indexed physically tagged scratchpad ram exists separate memory space combined 48 double entry instruction data translation lookaside buffer provided translating virtual addresses branch prediction achieved 64-entry branch target address cache branch history table integrated instruction cache branch mispredict penalty three cycles due short six stage pipeline majority emotion engine floating point performance provided two vector processing units vpu designated vpu0 vpu1 essentially dsps tailored 3d math forerunner hardware vertex shader pipelines vpu features 32 128-bit vector simd registers holding 4d vector data 16 16-bit fixed-point registers four fmac floating point multiply-accumulate units fdiv floating point divide unit local data memory data memory vpu0 4 kb size vpu1 features 16 kb data memory achieve high bandwidth vpu data memory connected directly gif data memories read directly dma unit single vector instruction consists four 32-bit single-precision floating-point values distributed four single-precision 32-bit fmac units processing scheme similar ssex extensions intel fmac units take four cycles execute one instruction units six-stage pipeline throughput one instruction per cycle fdiv unit nine-stage pipeline execute one instruction every seven cycles ipu allowed mpeg-2 compressed image decoding allowing playback dvds game fmv also allowed vector quantization 2d graphics data memory management unit rdram controller dma controller handle memory access within system communications mips core two vpus gif memory controller units handled 128-bit wide internal data bus running half clock frequency emotion engine offer greater bandwidth also 128-bit dedicated path cpu vpu0 128-bit dedicated path vpu1 gif 150 mhz internal data bus provides maximum theoretical bandwidth 2.4 gb/s communication emotion engine ram occurs two channels drdram direct rambus dynamic random access memory memory controller interfaces internal data bus channel 16 bits wide operates 400 mhz ddr double data rate combined two channels drdram maximum theoretical bandwidth 25.6 gbit/s 3.2 gb/s 33 bandwidth internal data bus memory controller buffers data sent drdram channels extra bandwidth utilised cpu emotion engine interfaces directly graphics synthesizer via gif dedicated 64-bit 150 mhz bus maximum theoretical bandwidth 1.2 gb/s provide communications emotion engine input output processor iop input output interface interfaces 32-bit wide 37.5 mhz input output bus maximum theoretical bandwidth 150 mb/s internal data bus interface provides enough bandwidth pcmcia extension connector used network adapter built-in p-ata interface faster data access online functionality advantage high bandwidth could easily used introduce hardware extensions like network adapter built-in ide hdd support extensions extend functionality product lifecycle seen competitive advantage newer variants like slim edition interface would however offer vastly bandwidth required playstation input output devices hdd support removed pcmcia connector design abandoned favor slimmer design emotion engine contained 13.5 million transistors die measuring 240 mm fabricated sony toshiba 0.25 µm 0.18 µm effective l complementary metal–oxide–semiconductor cmos process four levels interconnect emotion engine packaged 540-contact plastic ball grid array pbga primary use emotion engine serve playstation 2 cpu first skus playstation 3 also featured emotion engine motherboard achieve backwards compatibility playstation 2 games however second revision playstation 3 lacked physical emotion engine order lower costs performing functions using software emulation performed cell broadband processor coupled hardware graphics synthesizer still present achieve playstation 2 backwards compatibility subsequent revisions graphics synthesizer removed however playstation 2 software emulator available later system software revisions use sony ps2 classics titles available purchase sony entertainment network
[ 6330, 2177, 5012, 5804, 6074, 4847, 551, 4761, 5208, 6865, 5917, 7442, 3188, 4234, 650, 5740, 5670, 5055, 1023, 5947, 2873, 4365, 4368, 4370, 3747, 7499, 1237, 4372, 352, 536, 2443 ]
Validation
2,904
3
Pentagram_(video_game):pentagram video game pentagram zx spectrum msx video game released ultimate play game 1986 fourth sabreman series following adventures sabre wulf underwurlde knight lore similarly knight lore uses isometric filmation engine game written either tim chris stamper u.s. gold programming team see main article reason confusion typically ultimate release inlay card provides little actual instruction playing game includes cryptic short story introduction ultimate way describing object game recover lost pentagram artifact magical power firstly sabreman must locate one wells located maze screens shoot several times spell take resultant bucket water one broken obelisks dropped water heal stone must done four obelisks make titular pentagram appear one rooms done five magic runestones must found placed pentagram though objective pentagram complex obscure simple find fetch gameplay two previous filmation games knight lore alien 8 gameplay similar two titles main differences final revision filmation engine new ability shoot enemies projectile magic spell ability enemies respawn directional control system previous games also removed spectrum single joystick button needed fire sabreman spell could longer used jump instead joystick used jump basic gameplay sabreman previous outing knight lore without game day/night shapeshifting cycle wanders mazelike system screens filled enemies pieces movable scenery often forming obstacles puzzles exits one walls sometimes high difficult reach pentagram features larger numbers enemies either knight lore alien 8 due sabreman newfound ability kill include new flying creatures ghosts lice n't kill sabreman get way idea reprised sabreman second adventure underwurlde may even jumped onto harmless frequently annoying foes gravitate toward sabreman hover around disrupting movement sometimes even nudging platforms destroyed others witches zombies lethal touch may destroyed head straight sabreman wander straight lines meeting obstruction point change direction behaviour true wood spiders though dangerous killed wulfsheads either static move set pattern also killed enemy destroyed use sabreman new magic fireball spell another drop top screen replace short happening much faster game player progresses maximum two enemies per screen one time excluding indestructible ones already place room entered due limitations hardware previous filmation games slows crawl four moving objects screen previous two filmation games enemies may interact scenery basic way shoving movable objects logs tables along bump sabreman may also push one objects though pentagram may even move distance blast magic terms gameplay features pentagram advanced filmation titles sections gaming press becoming tired concept accused ultimate unoriginality ultimate third filmation title fifth filmation ii games nightshade gunfright counted time publishers also releasing isometric filmation-inspired games confusion also factor sinclair lamenting pentagram nowiki /nowiki instructions shrouded ultimate rather confusing 'poetry sinclair user admitted could work objective something various wishing wells dotted game even crash rated pentagram highly n't quite worked game objective time review review scores ranged 3/5 awarded sinclair user described lazy criticised perceived lack imagination setting design 93 crash smash awarded ever ultimate-friendly crash magazine cited graphics re-spawning enemies atmosphere high points
[ 223, 6434, 6397, 1980, 3022, 4060, 1517 ]
Train
2,905
4
Markovian_discrimination:markovian discrimination markovian discrimination spam filtering method used crm114 spam filters model statistical behaviors spam nonspam accurately simple bayesian methods simple bayesian model written text contains dictionary legal words relative probabilities markovian model adds relative transition probabilities given one word predict next word based theory markov chains andrey markov hence name essence bayesian filter works single words alone markovian filter works phrases entire sentences two types markov models visible markov model hidden markov model hmm difference visible markov model current word considered contain entire state language model hidden markov model hides state presumes current word probabilistically related actual internal state language example visible markov model word predict accuracy following word hidden markov model entire prior text implies actual state predicts following words actually guarantee state prediction since latter case encountered spam filtering hidden markov models almost always used particular storage limitations specific type hidden markov model called markov random field particularly applicable usually clique size four six tokens
[ 6102, 1233 ]
Test
2,906
1
FrontBase:frontbase frontbase relational database management system written ansi c. frontbase uses unicode character encoding frontbase complies sql 92 fully compliant unicode unicode 2.0 tcp/ip uses sockets frontbase available following platforms drivers adaptors include apple webobjects php3 php4 perl odbc jdbc omnis studio realbasic tcl eof fbaccess fbcaccess data types supported include integer decimal timestamp blob varchar
[ 4516, 4759, 5571, 7248, 578, 6386 ]
Test
2,907
3
Chuckie_Egg:chuckie egg chuckie egg home computer video game released f software 1983 initially zx spectrum bbc micro dragon subsequent popularity saw released following years wide variety computers including commodore 64 acorn electron msx tatung einstein amstrad cpc atari 8-bit family later updated released amiga atari st ibm pc game written nigel alderton 16 17 years old month two development nigel took pre-release version spectrum code two-year-old software company f co-founded doug anderson mike fitzgerald f respectively doug took simultaneous development bbc micro version whilst mike webb f employee completed dragon port chuckie egg went sell million copies remained steady earner f company went administration late 1980s versions fall broadly two groups — realistic physics e.g bbc micro amstrad cpc versions without e.g zx spectrum version although substantial difference play two levels remain largely 8-bit versions cited classics hen-house harry player must collect twelve eggs positioned level countdown timer reaches zero addition piles seed may collected increase points stop countdown timer otherwise eaten hens patrol level causing pause player touches hen falls gap bottom level loses life level made solid platforms ladders occasionally lift platforms constantly move upwards upon leaving top screen reappear bottom hitting top screen one lifts however also cause player lose life eight levels defined played initially watch giant caged duck upon completion eight levels played without hens harry pursued freed duck flying around screen homing second completion eight levels yields third play hens duck fourth pass introduces additional hens finally fifth pass duck additional hens moving greater speed player completes forty levels advance 'level 41 fact exactly level 33 player starts five lives extra life awarded every 10,000 points zx spectrum version rated number 13 sinclair official top 100 games time chuckie egg also followed two years first release sequel entitled chuckie egg 2 available much smaller subset platforms release changed genre quite radically involved player harry working factory attempting create easter eggs complete toy jet set willy-style graphic adventure whilst first game level one single screen new version levels covering multiple screens although sequel gained small number admirers never received attention original 2017 remake super chuckie egg released onto mobile devices official apparently f approved chuckie egg upgrade bbc electron machines called chukee published small company called bit twiddlers gave player ability start level also introduced extended jump feature instituted holding key whilst jumping one earliest available 'hacks 8-bit computer 2009 organ grinder monkey produced unofficial upgrade original chuckie egg bbc electron includes full level editor set eight new levels
[ 7903 ]
Test
2,908
3
Oh_Mummy:oh mummy oh mummy computer game amstrad cpc models home computer developed gem software published amsoft 1984 often included free bundles software came computer gameplay similar 1981 arcade game amidar object game unveil treasure within level pyramid game whilst avoiding mummies level consists two-dimensional board contrast pac-man player character walks around footprints left behind surrounding area maze footprints content revealed either scroll mummy key tomb nothing order complete level necessary unveil key tombstone scroll enables player kill/eat one mummy level mummy unveiled follows player next level difficulty speed game increases player progresses levels game primarily one player limited multiplayer mode players alternate taking turn play level whilst even time considered simple terms gameplay graphics sound many people one better addictive early offerings amstrad music played gameplay based children song streets cairo poor little country maid game also released msx zx spectrum amstrad cpc 464 tatung einstein zx spectrum version given away one several introductory software packs computer particular pack also including crazy golf alien destroyer punchy treasure island disco dan
[ 2052, 2148 ]
Train
2,909
2
KateOS:kateos kateos linux distribution originally based slackware designed intermediate users package management system used called tgzex .tgz packages unlike slackware packages support dependency tracking optional internationalized descriptions designed ease update two native tools package management pkg updateos last version released kateos iii 3.6 including live cd 2007 kateos project founded end 2003 damian rakowski kate linux 1.0 rabbit series first version system published 2004-10-09 system based slackware 9.0 unlike slackware used pam authentication mechanism possessed enriched package set due problems main server worked infrequently hardly anyone learned existence kate 1.0 move another server project begun gradually acquire users time kate 1.0.1 fix release including updatepack 1 live version published kate linux 2.0 zyklon series ii version 2.0 published 2005-04-09 longer based slackware long-term edition base development also first edition using linux 2.6 2005-05-06 name project changed kateos 2005-05-22 version 2.0.1 published providing tool managing remote updating tgzex packages tool called updateos written piotr korzuszek 2005-06-23 version 2.1 published updateos could install packages remotely 12 august 2005 first live edition series ii published distinctive graphical design used squashfs technology 2 gb data packed one cd unionfs detected hardware configured x server automatically 2005-10-13 last version series ii published 2.3 updateos gained new possibilities system better hardware autodetection discover tool kateos 3.0 virgen series iii 12 april 2006 first snapshot kateos 3.0 published 2006-07-09 version 3.0 published packaging system completely rewritten resulting pkg updateos2 tools libupdateos libsmarttools libraries functionality tgzex packages widened time include dependency tracking descriptions many languages installation process simplified allow full install 15 minutes system used udev d-bus hal detect hardware mount devices automatically 4 august 2006 first 'live edition series iii published aimed demonstrate possibilities kateos 3.0 used data rescue system cd contained 2gb data including xfce desktop environment many office multimedia applications detected configured hardware automatically 7 october 2006 version 3.1 published contained fixes updated gnome desktop environment first edition gnome adjusted especially kateos system also included update-notifier daemon system trace icon changed blinked new updates discovered let user choose packages updated update based libupdateos library supported kateos packages repositories 21 december 2006 version 3.2 published apart fixes updates included new tool katepkg katepkg graphical package manager written php php-gtk library making kateos first system include library default distribution designed allow users easily install update remove packages system supports number repositories including local ones located user hard drive also libsmarttools library optimized resulting 60 speed boost applications using updateos2 version kateos switched bootloader lilo grub make kernel updates easier 17 september 2007 version 3.6 released eight months development version brought several new updated features kateos software driven suspend mode improved internalization support addition several new programs katelan realm help make configuring system user friendly live cd version 3.6 first kateos provide disc installer called install agent allowing user directly install hard disk trying system live new kateos releases planned supported around two years users encouraged update via updateos command newer versions distribution although major version updates series updates e.g ii -- iii recommended damian rakowski 'project initiator leader 1st developer stated project named friend name kate simple nice everybody knows
[ 5200, 1629, 3444, 7251, 474, 4685, 7075, 1941, 314, 5232, 2758, 6029, 1663, 2864, 6209, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 3751, 7954, 6244, 788 ]
Test
2,910
3
After_the_War_(video_game):war video game war video game published 1989 dinamic software player controls character post-apocalyptic city probably nuclear war released unreleased artworks luis royo alfonso azpiri reveals city post-nuclear version new york city game consisted two separate parts second half game made accessible successfully completing part one whereupon player given password 94656981 first part localized streets city sequence fights minor enemies big bosses target find entry city underground transport opposed part map second part localized railways stations city underground transport enemies bigger first load complex design character movements slightly different parts common movements move left right jump duck first part way fighting using fists legs second part gives character ability use kind futuristic gun loads featured parts two levels 16-bit versions featured digitized voices ports featured tricky graphical effects e.g. amstrad cpc version included mode 0 mode 1 graphics time war featured two classical fx brands dinamic fx double load consisting two separate parts get advantage computer memory fx giant sprites made use big sprites even ¾ total play area height note fx brands simply commercial names dinamic used name features games giant sprites trick sprites composed set small parts allowed reusing parts different characters e.g. lot enemies share trousers leg movements ports problem vertical sync monitor lets player easily see trick sometimes characters got rendered divided two clearly different slices computer magazines published notes coin-op version game never released outside spain although coin-op game could played many years ago parque de atracciones de madrid graphically identical 16-bit computers counterpart cover artwork war created artist luis royo time development began spanish comic book author alfonso azpiri collaborator dinamic creation box art games azpiri whose brother jorge contributed graphics amstrad cpc version war drew initial version intended cover artwork game however due protracted development schedule time game completed azpiri ended collaboration dinamic work software company topo soft war released new cover art commissioned royo 2011 nearly two decades since dissolution dinamic founding members acquired rights distribute windows game collapse spain italy new software company fx interactive game rebranded war marketed belonging fictional universe original 1989 game
[ 6380, 4759 ]
Test
2,911
1
Fuzzy_Logix:fuzzy logix fuzzy logix develops high -performance analytics solutions big data fuzzy logix offers in-database gpu-based analytics solutions built comprehensive growing libraries 600 mathematical statistical simulation data mining time series financial models fuzzy logix formed 2007 partha sen mike upchurch met working bank america shared goal making analytics pervasive 2008 fuzzy logix released db lytix first complete commercially available library in-database analytics fin lytix released 2010 first comprehensive library in-database financial models 2010 aperity oem ’ fuzzy logix models run analytics cpg software saas solutions 2011 quest dell released toad data analyst data point included fuzzy logix ’ models running mysql company started charlotte nc usa headquarters located today fuzzy logix offices richmond va cupertino ca uk india reseller partners mexico sweden japan china fuzzy logix offers four software products db lytix fin lytix comprehensive libraries in-database analytic models libraries leverage user defined function udf capability available database platforms software available multiple database platforms since data movement database minimized database platforms growing increasingly powerful in-database models run 5x 100x faster models use multi-tiered analytics platforms fuzzy logix released first comprehensive library in-database models db lytix 2008 library development since 1998 library includes mathematical statistical data mining simulation classification models fuzzy logix released first comprehensive financial library fin lytix 2010 library contains models equity fixed income foreign exchange interest rate time series models used financial services industry risk management pricing portfolio optimization aster data informix netezza ibm puredata systems mysql paraccel sql server sybase iq teradata fuzzy logix solutions effective optimizing business process performance utilizing mathematical modeling based risk management industries like marketing healthcare insurance digital media services financial services investment retail banking brokerage houses stock exchanges hedge fund management examples techniques superior performance potentially utilized much broadly solving complex problems industries organization government programs educational institutions research need running analytics big data using complex models solutions derived predictive modeling behavior assessing risk modeling optimal system
[ 4798, 7334, 7715, 2265 ]
Validation
2,912
4
Full_disclosure_(computer_security):full disclosure computer security field computer security independent researchers often discover flaws software abused cause unintended behaviour flaws called vulnerabilities process analysis vulnerabilities shared third parties subject much debate referred researcher disclosure policy full disclosure practice publishing analysis software vulnerabilities early possible making data accessible everyone without restriction primary purpose widely disseminating information vulnerabilities potential victims knowledgeable attack essay topic bruce schneier stated full disclosure – practice making details security vulnerabilities public – damned good idea public scrutiny reliable way improve security secrecy makes us less secure leonard rose co-creator electronic mailing list superseded bugtraq become de facto forum disseminating advisories explains n't believe security obscurity far know full disclosure way ensure everyone insiders access information need controversy around public disclosure sensitive information new issue full disclosure first raised context locksmithing 19th-century controversy regarding whether weaknesses lock systems kept secret locksmithing community revealed public today three major disclosure policies others categorized non disclosure coordinated disclosure full disclosure major stakeholders vulnerability research disclosure policies shaped various motivations uncommon observe campaigning marketing lobbying preferred policy adopted chastising dissent many prominent security researchers favor full disclosure whereas vendors prefer coordinated disclosure non disclosure generally favoured commercial exploit vendors blackhat hackers proponents coordinated disclosure believe software vendors right control vulnerability information concerning products primary tenet coordinated disclosure nobody informed vulnerability software vendor gives permission often exceptions variations policy distribution must initially limited vendors given privileged access nonpublic research advocates coordinated disclosure often prefer weighted less-descriptive term “ responsible disclosure ” coined microsoft security manager scott culp essay “ time end information anarchy ” referring full disclosure microsoft later asked term phased favour “ coordinated disclosure ” although reasoning varies many practitioners argue end-users benefit access vulnerability information without guidance patches vendor risks sharing research malicious actors great little benefit microsoft explain coordinated disclosure serves everyone best interests ensuring customers receive comprehensive high-quality updates security vulnerabilities exposed malicious attacks update developed full disclosure policy publishing information vulnerabilities without restriction early possible making information accessible general public without restriction general proponents full disclosure believe benefits freely available vulnerability research outweigh risks whereas opponents prefer limit distribution free availability vulnerability information allows users administrators understand react vulnerabilities systems allows customers pressure vendors fix vulnerabilities vendors may otherwise feel incentive solve fundamental problems coordinated disclosure full disclosure resolve discovery specific flaw vulnerability mutually exclusive event multiple researchers differing motivations discover flaws independently standard way make vulnerability information available public researchers often use mailing lists dedicated topic academic papers industry conferences non disclosure principle vulnerability information shared shared non-disclosure agreement either contractually informally common proponents non-disclosure include commercial exploit vendors researchers intend exploit flaws find proponents security obscurity researchers favour coordinated disclosure believe users make use advanced knowledge vulnerabilities without guidance vendor majority best served limiting distribution vulnerability information advocates argue low-skilled attackers use information perform sophisticated attacks would otherwise beyond ability potential benefit outweigh potential harm caused malevolent actors vendor prepared guidance even unsophisticated users digest information made public argument presupposes vulnerability discovery mutually exclusive event one person discover vulnerability many examples vulnerabilities discovered simultaneously often exploited secrecy discovery researchers may exist users benefit vulnerability information full disclosure advocates believe demonstrates contempt intelligence end users true users benefit vulnerability information 're concerned security networks position hire expert assist would hire mechanic help car non disclosure typically used researcher intends use knowledge vulnerability attack computer systems operated enemies trade knowledge vulnerability third party profit typically use attack enemies researchers practicing non disclosure generally concerned improving security protecting networks however proponents argue simply want assist vendors claim intent harm others full coordinated disclosure advocates declare similar goals motivations simply disagreeing best achieve non disclosure entirely incompatible
[ 704, 6412, 3932, 6085, 376, 2560, 3277, 2923, 1805, 2587, 3323, 5779, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6541, 6194, 7282, 2678, 3038, 3047, 6569, 2693, 860, 862, 6579, 7307, 6589, 1996, 7328, 907, 5922, 6628, 8091, 4521, 4531, 9...
Test
2,913
4
Martin_and_Mitchell_defection:martin mitchell defection martin mitchell defection occurred september 1960 two u.s. national security agency nsa cryptologists william hamilton martin bernon f. mitchell defected soviet union secret 1963 nsa study said beyond doubt event likely future greater impact agency security program martin mitchell met serving u.s. navy japan early 1950s joined nsa day 1957 defected together soviet union 1960 moscow press conference revealed denounced various u.s. policies especially provocative incursions air space nations spying america allies underscoring apprehension nuclear war said would attempt crawl moon thought would lessen threat atomic war within days citing trusted source congressman francis e. walter chairman house un-american activities committee huac said martin mitchell sex deviates prompting sensational press coverage u.s. officials national security council privately shared assumption two part traitorous homosexual network classified nsa investigations hand determined pair greatly inflated opinions concerning intellectual attainments talents defected satisfy social aspirations house un-american activities committee publicly intimated interpretation relationship martin mitchell homosexual reading guided pentagon discussion defection decades william hamilton martin may 27 1931 – january 17 1987 born columbus georgia family soon moved washington state father president ellensburg chamber commerce graduated ellensburg high school two years studies central washington college education central washington university earned degree mathematics university washington seattle 1947 enlisted united states navy served 1951 1954 working cryptologist naval security group japan martin played chess collected japanese sword handles tsuka bernon f. mitchell march 11 1929 – november 12 2001 born raised eureka california enlisted us navy one year college gained experience cryptologist tour duty navy 1951 1954 serving japan naval security group kami seya stayed japan another year working army security agency following navy service earned bachelor degree stanford university martin mitchell became friends navy service naval communications intercept facility kami seya japan kept touch returned school navy service encountered one another recruited national security agency nsa 1957 years nsa uneventful martin gained enough recognition twice awarded scholarships study towards master degree mitchell martin became disturbed learned american incursions foreign airspace realized congress unaware nsa-sponsored flights february 1959 violation nsa rules tried report knew congressman expressed frustration information receiving nsa ohio democrat wayne hays december 1959 pair visited cuba without notifying superiors required nsa procedures june 25 1960 mitchell martin left u.s. mexico traveled havana sailed russian freighter soviet union august 5 pentagon announced returned vacation said likelihood gone behind iron curtain september 6 1960 appeared joint news conference house journalists moscow announced requested asylum soviet citizenship new york times described long-time bachelor friends reported smiled described social advantages anticipated soviet union prepared statement said talents women encouraged utilized much greater extent soviet union united states feel enriches soviet society makes soviet women desirable mates conference defectors made public first time mission activities nsa prepared statement written said without consulting government soviet union said united states government unscrupulous accused soviet government also said particularly attacked views general thomas s. power recently told congressional committee u.s. needed maintain nuclear first-strike capability senator barry goldwater opposition banning nuclear tests negotiating disarmament treaty contrast said would attempt crawl moon thought would lessen threat atomic war u.s. recently admitted sending reconnaissance flights foreign countries recent years martin mitchell said knew navy service flights occurred early 1952–1954 detailed u.s. c-130 flight soviet armenia soviets brought contended designed gain understanding soviet defenses therefore represented american interest attacking soviets rather defending also complained restrictions freedom u.s. government confiscation mail particularly freedom theists whose political convictions unpopular response american government called mitchell martin charges completely false department defense called turncoats tools soviet propaganda one mentally sick obviously confused also characterized positions nsa junior mathematicians issue pair sexuality raised dismissed report representative francis e. walter democrat pennsylvania chairman house un-american activities committee denied made allegation reported news agency one men described homosexual report federal bureau investigation pentagon spokesman told reporters nothing mitchell martin personnel records suggest homosexuality sexual perversion next day congressman walter explicitly stated source trusted told two defectors known acquaintances 'sex deviates charge promptly picked press resulted immediately stories homosexuals recruiting sexual deviates jobs federal government hearst newspapers referred martin mitchell two defecting blackmailed homosexual specialists love team time reported review security checks turned mitchell visit psychiatrist presumably concern homosexual tendencies interview soviet news agency tass december 1960 expressed belief american espionage russia u.s. allies neutral nations would continue unchanged despite inauguration new american president january 1961 according later government report martin—who fluent russian—studied leningrad university saint petersburg state university used name vladimir sokolodsky married soviet citizen divorced 1963 later told russian newspaper defection foolhardy also expressed disappointment russians trust important work occasionally sought help american visitors arranging repatriation including donald duffy vice president kaiser foundation bandleader benny goodman another occasion told american defecting believed vision russia presented propaganda publications like ussr soviet life 1975 source told u.s. government martin totally skids 1979 inquired american consulate repatriation result case examined stripped american citizenship next denied permission immigrate u.s. denied tourist visa martin eventually left soviet union died cancer mexico january 17 1987 tijuana hospital del mar buried u.s. less known mitchell renounced u.s. citizenship remained soviet union rest life married galina vladimirovna yakovleva member piano department faculty leningrad conservatory became alcoholic regretted decision mitchell died november 2001 buried st. petersburg defections another life inside u.s. intelligence community meeting national security council october 1960 officials considered response martin-mitchell affair attorney general william p. rogers believed soviets list homosexuals use recruiting blackmail efforts martin mitchell part organized group several meeting thought polygraph tests would help prevent hiring homosexuals president eisenhower wanted central authority coordinate government lists homosexuals order prevent another occurrence nsa needed understand motivated defectors initial investigation turned little interest notes psychological counseling sessions 1940s described martin brilliant emotionally immature offered diagnosis beginning character neurosis schizoid tendencies mentioned likely sadistic mitchell told nsa questioned long starting work agency experimented sexually teenager dogs chickens immediate nsa response focused sexual issues july 1961 agency announced purged 26 employees identified sexual deviates though added qualification homosexuals yet series nsa investigations gave little credit role sexuality mitchell martin defection 1961 nsa report called close friends somewhat anti-social egotistical arrogant insecure young men whose place society much lower believed deserved greatly inflated opinions concerning intellectual attainments talents 1963 another nsa report found clear motive recruited foreigners termed defection impulsive nsa files obtained journalists seattle weekly 2007 cited definitive testimony part women acquaintances attested heterosexuality perversions recorded martin all-controlling sadomasochism occasionally watched women sex sex multiple female partners 1962 congressman walters house un-american activities committee huac concluded 13-month investigation issued report defections mitchell told psychiatrist affairs men women troubled sexual identity report referred homosexual problems report never identified rationale mitchell martin defections focused inadequacy investigations granted security clearances despite evidence homosexuality sexual abnormality atheism communist sympathies part one men report made series recommendations respect nsa hiring practices security investigations promptly adopted agency later government analyses went beyond characterizations huac account unaware nsa unpublished analysis despite contrary evidence 1991 study pentagon defense security service—still use 2007—called martin mitchell publicly known homosexuals
[ 147, 3241, 5509 ]
Validation
2,914
4
Network_security_policy:network security policy network security policy nsp generic document outlines rules computer network access determines policies enforced lays basic architecture company security/ network security environment document usually several pages long written committee security policy goes far beyond simple idea keep bad guys complex document meant govern data access web-browsing habits use passwords encryption email attachments specifies rules individuals groups individuals throughout company security policy keep malicious users also exert control potential risky users within organization first step creating policy understand information services available users potential damage whether protection already place prevent misuse addition security policy dictate hierarchy access permissions grant users access necessary completion work writing security document major undertaking good start achieved using template national institute standards technology provides security-policy guideline policies could expressed set instructions could understood special purpose network hardware dedicated securing network
[ 2789, 651, 5761, 2566, 6633, 84, 2577, 1805 ]
Test
2,915
9
Macintosh_Common_Lisp:macintosh common lisp macintosh common lisp mcl implementation ide common lisp programming language various versions mcl run classic mac os m68k ppc mac os x versions mcl including 5.1 proprietary version 5.2 open sourced 2009 new different version mcl open sourced rmcl rmcl based mcl 5.1 run rosetta intel-based macs mcl famous integration macintosh toolbox later apple carbon allowed direct access mac os functionality directly lisp achieved low-level interface allowed direct manipulation native mac os data structures lisp together high-level interface convenient use 2001 article dr. dobb journal peter norvig wrote mcl favorite ide macintosh platform language serious rival platforms development mcl began 1984 history mcl known different names running 68k-based apple macintosh computers running powerpc-based apple macintosh computers also spawned least one separately maintained fork
[ 7878, 1445, 713, 6796, 6087, 5734, 1478, 4332, 4704, 405, 5757, 6116, 1116, 6471, 2600, 5077, 2249, 1889, 1890, 6876, 6888, 3370, 1557, 6191, 5494, 5501, 6210, 144, 7298, 5515, 8025, 3749, 5883, 4837, 897, 6981, 2734, 218, 4878, 7750, 9...
Train
2,916
2
DCC_Alliance:dcc alliance dcc alliance dcca industry association designed promote common subset debian gnu/linux operating system multiple companies within consortium could distribute founded ian murdock 2005 wound 2007 main force behind dcc alliance ian murdock original founder debian project dcc alliance formed whilst murdock ceo progeny linux systems remained key spokesperson consortium visible existence founding dcc alliance announced linuxworld san francisco 9 august 2005 following number pre-announcements stated intention assemble standards-based core debian provide predictable release cycle linux standards base compliance dcc alliance shipped first code 6 months original pre-announcements providing linux standards base lsb 3.0 compliant set program packages based available debian alliance primary goals two classes membership dcc alliance membership remained open additional organizations interest debian-based solutions visible absent involvement ubuntu distribution declined join alliance ubuntu founder mark shuttleworth stated 2006 believe dcc alliance future one founding members mepis later left dcca citing creative differences mepis transitioned simplymepis linux distribution debian unstable/dcca-provided core ubuntu-based one 2006 ian murdock left dcc alliance chair linux standard base workgroup later moved employment sun microsystems 2007 progeny original driver behind consortium wound 2006 xandros still claiming xandros leads engineering team dcca originally formed names given media debian core consortium debian common core following trademark notification debian project name withdrawn replaced—without formal announcement—by dcc alliance ian murdock explained longer treated abbreviation debian dcc —becoming recursive acronym dcc common core notably debian trademark denied mr. murdock dcc alliance originates combination -ian part mr. murdock given name concatenated wife name debra murdock decision infringement trademark fell branden robinson debian project leader dpl employee progeny linux systems mr. murdock time decision made mr. robinson stated would represent conflict interest
[ 3780, 277, 7463, 4165, 6060, 4910, 6317, 5912, 6086, 3996, 7873, 2170, 6761 ]
Test
2,917
2
Cambria_(typeface):cambria typeface cambria transitional serif typeface commissioned microsoft distributed windows office designed dutch typeface designer jelle bosma 2004 input steve matteson robin nicholas intended serif font suitable body text readable printed small displayed low-resolution screen even spacing proportions part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts group calibri candara consolas constantia corbel diagonal vertical hairlines serifs relatively strong horizontal serifs small intend emphasize stroke endings rather stand principle noticeable italics lowercase characters subdued style somewhat condensed average font kind profile bosma monotype website commented one defining features typeface contrast heavy vertical serifs hairlines – keep font sturdy ensures design preserved small sizes – relatively thin horizontals ensure typeface remains crisp used larger sizes bosma describes transitional slab-serif hybrid many aspects design somewhat blocky render well screen full stops square rather round designers recommended avoiding using printed text designer matthew butterick described monotonous attractive paper bosna compared optical sizes fonts designed printed small design bit like old metal type font days sizes drawing small sizes wider lower contrast compared large fonts design optical correction sense cambria like small size font except may also used large sizes cleartype fonts lining figures text figures offered lining figures default shown sample image variant designed mathematical scientific texts replacement times new roman cambria math first font implement opentype math extension inspired tex led jelle bosma agfa monotype ross mills tiro typeworks project planned development cambria started cambria math developed three stages cambria distributed windows versions since windows vista microsoft office versions since microsoft office 2007 windows microsoft office 2008 mac microsoft office 2007 viewers converters cambria regular cambria math packaged together truetype collection ttc file microsoft office 2008 mac include cambria math omml supported therefore macintosh version cambria packaged individual truetype font ttf files rather single ttc file font along calibri candara consolas corbel constantia also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware typeface licensed ascender corporation use end users consumer electronics device manufacturers typeface also licensed monotype imaging printer manufacturers part vista 8 font set package 2013 part chrome google released freely-licensed font called caladea metric-compatible cambria i.e replace document without changing layout based cambo font developed argentine type foundry huerta tipográfica despite metric-compatible caladea covers much smaller language range e.g n't support cyrillic greek advanced typographic features like ligatures old style numerals fractions cambria math used presentation office mathml equations microsoft office 2007 later free typesetting systems xetex luatex make direct use cambria math alternative traditional tex mathematical fonts cambria available use google google drive suite web applications
[ 1832, 2920, 6645, 5871, 2927, 1029, 2026, 4759, 2499, 2931, 5837 ]
Test
2,918
4
Differential_fault_analysis:differential fault analysis differential fault analysis dfa type side channel attack field cryptography specifically cryptanalysis principle induce faults —unexpected environmental conditions—into cryptographic implementations reveal internal states example smartcard containing embedded processor might subjected high temperature unsupported supply voltage current excessively high overclocking strong electric magnetic fields even ionizing radiation influence operation processor processor may begin output incorrect results due physical data corruption may help cryptanalyst deduce instructions processor running internal data state des triple des 200 single-flipped bits necessary obtain secret key dfa also applied successfully aes cipher many countermeasures proposed defend kind attacks based error detection schemes
[ 1811, 4930, 464, 807, 1353, 3100, 119, 7548, 6637, 6647, 7200, 4805, 5765, 6657, 1587, 5333, 6763, 6049, 433, 1320, 3063, 613, 1146, 4917 ]
Test
2,919
4
Commwarrior:commwarrior commwarrior symbian bluetooth worm first spread via multimedia messaging service mms bluetooth worm affects nokia series 60 software platform commwarrior particularly effective via mms vector used infect phones appeared though sent source known victim leading even security-conscious users open infected message actually message sent random contact sender address book message opened virus attempts install phone via sis file runs worm executed every time phone switched secondary method infection create malicious .sis file compromised phone per minute thereafter worm attempts send file phone bluetooth enabled according sophos installation program one six chance displaying following text commwarrior v1.0 c 2005 e10d0r
[ 7881, 5062, 6305 ]
Validation
2,920
2
Calibri:calibri calibri sans-serif typeface family designed luc de groot 2002–2004 released general public 2007 microsoft office 2007 windows vista office 2007 replaced times new roman default typeface word replaced arial default powerpoint excel outlook wordpad de groot described subtly rounded design warm soft character calibri part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read liquid-crystal display monitors fonts group cambria candara consolas constantia corbel calibri features subtly rounded stems corners visible larger sizes sloped form true italic handwriting influences common modern sans-serif typefaces typeface includes characters latin latin extended greek cyrillic scripts calibri makes extensive use sophisticated opentype formatting features range ligatures well lining text figures indices numbers enclosed circles 20 alternate f g accessible enabling fourth fifth stylistic sets features calibri remain unsupported office including true small caps all-caps spacing superscript subscript glyphs ability create arbitrary fractions may accessed using programs adobe indesign one potential source confusion calibri visible homoglyph pair easily confused characters lowercase letter l uppercase letter l latin script effectively indistinguishable true many common fonts however design clear similarities de groot famous much extensive commercial family thesans although straight ends rather rounding calibri default typeface microsoft office much microsoft software joe friend program manager word office 2007 release explained decision switch calibri caused desire make default font one optimised towards onscreen display believed documents would never printed would solely consumed digital device achieve modern look long development windows vista calibri development – 2002 2004 – occurred several years release os first presented 2004 beta windows vista codenamed longhorn first became available use beta 2 version office 2007 released may 23 2006 calibri rest cleartype font collection finally released general public january 30 2007 since released microsoft software environments calibri also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems cross-platform web use calibri licensed ascender corporation parent company monotype imaging font calibri light introduced microsoft windows 8 added windows 7 server 2008 part software update microsoft word 2013 onwards calibri calibri light default fonts body text headings respectively calibri light also default font headings powerpoint 2013 due calibri widespread use microsoft office documents google released freely-licensed font called carlito metric-compatible calibri part chromeos carlito font metrics calibri chromeos users correctly display print document designed calibri without disrupting layout carlito based prior open-source typeface lato without de groot involvement calibri tdc2 2005 award type directors club type system category calibri position default font office many cases reported documents shown forged thanks purported creation date calibri available general public 2017 font came public attention evidence pakistani government-related panama papers case also known fontgate document supposedly signed february 2006 found typed calibri. ref name= thenextweb/11july2017 /ref de groot said really zero chance document genuine
[ 1832, 6645, 5871, 1097, 1029, 2026, 2927, 2499, 2931, 4759, 5837, 2917 ]
Validation
2,921
0
Jun'ichi_Tsujii:jun'ichi tsujii tsujii received bachelor engineering master engineering ph.d degrees electrical engineering kyoto university 1971 1973 1978 respectively assistant professor associate professor kyoto university accepting position professor computational linguistics university manchester institute science technology umist 1988 president association computational linguistics acl 2006 permanent member international committee computational linguistics iccl since 1992 since may 2015 tsujii director artificial intelligence research center national institute advanced industrial science technology japan tsujii previously principal researcher microsoft research asia msra joining msra professor university tokyo belonged school inter-faculty initiative informatics graduate school information science technology tsujii also visiting professor scientific advisor national centre text mining nactem university manchester united kingdom 14 may 2010 tsujii awarded medals honor purple ribbon one japan highest awards presented influential contributors fields art academics sports september 2014 tsujii awarded funai achievement award forum information technology fit took place university tsukuba award presented distinguished individuals engaged research related business activities field information technology produced excellent achievements field still active leading positions strong impact young students researchers december 2014 tsujii named acl fellow recognition significant contributions mt parsing unification-based grammar text mining biology
[ 6530, 5429, 5388, 5885 ]
Test
2,922
2
Nokia_5250:nokia 5250 nokia 5250 budget nokia resistive touchscreen smartphone running symbian v9.4 operating system s60 5th edition user interface price tax subsidies €115 announced august 2010 available china eurasia europe india latin america middle east south east asia pacific region small compact comes preloaded guitar hero mobile series 5 cnet asia praised resolution budget price criticized lack 3g capabilities relying gsm edge
[ 1066, 5979, 2271, 6517, 372, 1724, 463, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 4407, 118, 23, 2564, 3703, 7261, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 3039, 3653, 1582, 4894, 5068, 597,...
Validation
2,923
4
Operation_Payback:operation payback operation payback coordinated decentralized group attacks high-profile opponents internet piracy internet activists using anonymous moniker operation payback started retaliation distributed denial service ddos attacks torrent sites piracy proponents decided launch ddos attacks piracy opponents initial reaction snowballed wave attacks major pro-copyright anti-piracy organizations law firms individuals following united states diplomatic cables leak december 2010 organizers commenced ddos attacks websites banks withdrawn banking facilities wikileaks 2010 several bollywood companies hired aiplex software launch ddos attacks websites respond takedown notices piracy activists created operation payback september 2010 retaliation original plan attack aiplex software directly upon finding hours planned ddos another individual taken firm website operation payback moved launching attacks websites copyright stringent organisations motion picture association america mpaa international federation phonographic industry giving two websites combined total downtime 30 hours following two days operation payback attacked multitude sites affiliated mpaa recording industry association america riaa british phonographic industry law firms davenport lyons dunlap grubb weaver us copyright group also attacked september 21 2010 website united kingdom law firm subjected ddos attack part operation payback asked attacks andrew crossley owner acs law said hours far concern fact train turning 10 minutes late queue coffee wasting time sort rubbish site came back online 350mb file backup site visible anyone short period time backup included copies emails sent firm downloaded made available various peer-to-peer networks websites including pirate bay emails contained unencrypted excel spreadsheets listing names addresses people acs law accused illegally sharing media one contained 5,300 sky broadband customers accused illegally sharing pornography another contained details 8,000 sky customers 400 plusnet customers accused infringing copyright music sharing peer-to-peer networks alleged breach data protection act become part ongoing investigation acs law information commissioner office september 30 leesburg virginia office dunlap grubb weaver law firm – also business u.s copyright group – evacuated police emailed bomb threat received believed event could connected anonymous non-related copyright law firms sites websheriff.com also attacked attacks originally organized internet relay chat channel attacks also became popular topic twitter september 27 2010 ddos attack australian federation copyright theft afact unintentionally brought 8,000 small websites hosted server september 2010 attempt ensure portuguese citizens ca n't access thepiratebay.org associação comércio audiovisual de portugal acapor filed complaint pirate bay complaint filed general inspection cultural activities part portuguese ministry culture according movie rental association pirate bay directly responsible 15 million illegal downloads portugal every year installing pirate bay block isps acapor hoped decrease financial damage claims pirate bay causes october 18 2010 acapor website defaced presenting text operation payback redirect pirate bay seconds addition defacing website copy email database acapor uploaded pirate bay leaked e-mails far revealed acapor methods denunciation dissatisfaction portuguese government justice system perception copyright debate war antagonism isps acapor claimed business isps illegal downloading october 4 2010 operation payback launched attack ministry sound website gallant macmillan website october 7 2010 attacked website spanish copyright society sgae.es october 7 2010 total downtime websites attacked operation payback 537.55 hours october 15 2010 copyprotected.com sql injected defaced three days later operation payback launched ddos attack uk intellectual property office production companies satelfilm.at wega-film.at hit drive-by ddoses october 21 2010 response efforts gain court injunction isp refused block movie-streaming website operation payback knocked porn website hustler.com offline following day 2010 mipcom convention gene simmons kiss stated response simmons comments members operation payback switched attentions two websites simmonsrecords.com genesimmons.com taking offline total 38 hours point course ddos genesimmons.com hacked redirected thepiratebay.org response attack simmons wrote led additional attacks subsequently downtime websites later simmons message removed website one year later december 2011 person supposedly known nickname spydr101 arrested relation attack genesimmons.com charged conspiracy unauthorized impairment protected computer october 26 2010 limewire ordered disable searching downloading uploading file trading and/or file distribution functionality losing court battle riaa claims copyright infringement satisfied injunction riaa announced intention continue arista records llc v. lime group llc trial recover damages caused program retaliation members operation payback announced would attack riaa website october 29 despite fact group typically hit target twice october 29 riaa.org indeed taken offline via denial-of-service attack attack riaa.com riaa.org sites inaccessible europe operation payback main site attacked later day subsequently moved website tieve.tk anonops.net damages phase limewire trial riaa attempted switch seeking statutory damages per-work seeking per-infringement quote total damage amount method calculating number infringements judge case rejected proposal holding case law supported statutory damages per-work basis large-scale infringement thus capping potential award 1.5 billion march 15 2011 four days ruling report appeared law.com highlighting judge remark per-infringement award sought record companies might total trillions report estimated 75 trillion attention-grabbing headline usa nominal gdp 2012-2013 16–17 trillion figure repeated pc magazine march 23 operation payback call-to-arms followed citing 75 trillion figure still actively sought riaa ddos attack riaa website commenced march 25 around october 28 2010 group set new website intention coordinating protests around world raise awareness cause date protest activities november 5 intended day gunpowder plot anonymous heavily affiliates use guy fawkes masks protest activity included attack united states copyright office fbi launched investigation later arrested one person accused taking part attack paypal november 9 2010 operation payback temporarily ceased attacking websites hiatus lasted four months ending early march 2011 attack temporarily took website bmi prominent collection society operating behalf music publishers followed aforementioned second attack riaa website december 8 2010 u.s politician sarah palin announced website personal credit card information compromised palin team believed attack executed anonymous though anonymous never commented palin possible target attack interview rt anonymous member said n't really care sarah palin much honest n't really know trying accomplish attention trying gain personally n't care sarah palin palin technical team posted screenshot server log file showing wikileaks.org url visa attacks denial service attacks credit card data compromised unknown whether palin card compromised part broad attack visa specific attack palins palin email previously hacked campaigning 2008 u.s. presidential election december 2010 wikileaks came intense pressure stop publishing secret u.s. diplomatic cables corporations amazon paypal bankamerica swiss bank postfinance mastercard visa either stopped working froze customers donations wikileaks due political pressures response behind operation payback directed activities companies operation payback launched ddos attacks paypal postfinance swedish prosecution authority december 8 2010 coordinated ddos attack operation payback brought mastercard visa websites december 9 2010 prior sustained ddos attack paypal website caused minor slowdown service paypal announced blog would release frozen funds account wau holland foundation raising funds wikileaks would reactivate account regarding attacks wikileaks spokesman kristinn hrafnsson denied relation group said neither condemn applaud attacks believe reflection public opinion actions targets day 16-year-old boy arrested hague netherlands connection distributed denial-of-service attacks mastercard paypal boy irc operator nickname jeroenz0r december 10 2010 daily telegraph reported anonymous threatened disrupt british government websites assange extradited sweden anonymous issued press release attempt clarify issue electronic frontier foundation co-founder john perry barlow described attacks shot heard round world—this lexington following list sites domains known targeted operation payback attempt take amazon.com aborted failed recruit enough users botnet cnn noted massive amazon website almost impossible crash late december fbi began raid suspected participants operation payback beginning 2011 operation payback brought zimbabwean government websites zimbabwean president wife sued newspaper 15 million publishing wikileaks cable linked alleged trade illicit diamonds january 27 2011 five males aged 15 26 arrested early morning raids u.k. suspicion involvement fbi executed 40 search warrants day united kingdom intellectual property office said site attacked responsible depriving citizens access information democratic right access critics claimed attacks restricted gene simmons right free speech spokesman mpaa said troubling groups seem concerned rights steal copy films music books creative resources rights american workers producing products also criticism pirate party uk united states pirate party joint public statement urged group immediately cease distributed denial-of-service ddos attacks instead seek legal method express frustration disquiet copyright industry perversions copyright law personal gain acknowledging ddos attacks credit card banking web sites serve political protests cyber experts said operation payback done long-term damage sites back online attacks penetrated brought entire banking systems used conduct transactions people still continuing use credit cards make payments like noisy political demonstration like mob surrounding bank refusing let anyone said one cyber expert operation payback members used modified version low orbit ion cannon loic execute ddos attacks september 2010 hive mind mode added loic hive mind mode loic connects irc controlled remotely allows computers loic installed behave part botnet utilising tool coordinators operation payback able quickly take websites belonging anti-piracy groups botnets sizes also used members operation payback reportedly used irc channel communicate targets select instructions attacking targets produced posted various imageboards 4chan/7chan/711chan/420chan/808chan media twitter facebook also utilized coordination december 8 2010 operation payback facebook page removed official twitter account suspended additionally federal court order forced encyclopedia dramatica delete operation payback article featured detailed history operation including personal information individuals associated companies attacked october 2013 13 members operation payback indicted federal court alexandria virginia co-conspirators violation 18 u.s.c § 731 18 u.s.c § 1030 2014 members received plea deal reducing felony charges single misdemeanor
[ 704, 3932, 3609, 2912, 376, 3277, 2587, 3323, 5779, 5444, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6541, 6194, 142, 2678, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 7328, 208, 2021, 5922, 6628, 924, 3476, 4531, 600, 1307, 630...
Test
2,924
5
Tabular_Data_Stream:tabular data stream tabular data stream tds application layer protocol used transfer data database server client initially designed developed sybase inc. sybase sql server relational database engine 1984 later microsoft microsoft sql server early development sybase sql server developers sybase perceived lack commonly accepted application-level protocol transfer data database server client order encourage use products sybase promoted use flexible pair libraries called codice_1 codice_2 implement standard sql library included order implement bulk copy called blk codice_1 job ferry data two computers underlying network protocol codice_2 provides api client program communicates server via codice_1 codice_2 sends server structured stream bytes meant tables data hence tabular data stream codice_7 provides like codice_2 api client programs communicates server via codice_1 1990 sybase entered technology-sharing agreement microsoft resulted microsoft marketing sql server — microsoft sql server — based sybase code microsoft kept codice_2 api added odbc microsoft since added additional apis time sybase introduced powerful successor codice_2 called codice_12 called pair open client codice_2 though officially deprecated remains widespread use tds protocol comes several varieties openly documented regarded proprietary technology exception tds 5.0 used exclusively sybase documentation available sybase situation changed microsoft published tds specification 2008 part open specification promise freetds team developed free native-library implementation tds protocol licensed lgpl license wireshark protocol decoder tds oracle corporation provides oracle net software analogous tds
[ 6462, 3172, 1371, 187, 1989, 7341, 7715 ]
Test
2,925
9
Family_BASIC:family basic family basic famicom basic consumer product programming nintendo family computer video game console japan family basic launched june 21 1984 consumers japan nintendo cooperation hudson soft sharp corporation second version titled family basic v3 released february 21 1985 greater memory new features first edition family basic application cartridge bundled computer style keyboard instructional textbook requires cassette tape recorder save user-generated basic programs programs saved using cassette tape drive famicom data recorder family basic designed compatible floppy disk storage famicom disk system disk system ram adapter requires use famicom cartridge slot prevents using slot family basic cartridge family basic includes dialect basic programming language enhanced game development microsoft basic-derived command set extended support sprites animation backgrounds musical sequences gamepads several visual components seen nintendo games backgrounds characters mario donkey kong series games made available family basic development componentry appear premade family basic games family basic normally used nes consoles console lacks famicom 15-pin expansion port circumvented use custom i/o adapter hooks otherwise unused nes expansion port bottom console 1990 manufacturer shenzhen named nedc developed sold clone famicom family basic china first model called fcs-90 combines famicom chipset cartridge slot pair controllers rf output making complete console used program play famicom video games nedc also translated built-in software english fcs-90 revised model fcs-92 instruction manual section programming japanese popular music family basic developed koji kondo second nintendo product tenure kondo previously initiated computer audio interests programming sounds basic home computer satoshi tajiri creator pokémon initially used family basic gateway build understanding internal operation famicom inspired create handmade famicom game development hardware make game freak debut game quinty later released mendel palace 1990
[ 5367, 1255, 12, 2463, 6891, 7531, 8183, 4139, 5651, 7448, 5926, 5129, 7906, 5137, 4794, 5234, 2941, 3303, 1304, 61, 4815, 6394, 4003, 7864, 1789, 5877, 3918, 4012, 4745, 1064 ]
Test
2,926
3
Apple_A5:apple a5 apple a5 32-bit system-on-a-chip designed apple inc. manufactured samsung successor apple a4 a5 commercially debuted release apple ipad 2 tablet also powers iphone 4s ipod touch fifth generation apple tv third generation ipad mini first generation consistent apple debuted a4 chip first original ipad followed iphone 4 ipod touch fourth generation apple claims compared predecessor a4 a5 cpu twice work gpu nine times graphics performance software updates devices using chip ceased 2016 release ios 10 a5 consists dual-core arm cortex-a9 cpu neon simd accelerator dual core powervr sgx543mp2 gpu apple lists a5 clocked 1 ghz ipad 2 technical specifications page though dynamically adjust frequency save battery life unit used iphone 4s clocked approximately 800 mhz apple also included image signal processor unit isp advanced image post-processing face detection white balance automatic image stabilization earsmart unit audience noise canceling a5 first released estimated time cost 75 previous generation difference expected diminish production increased a5 manufactured samsung austin texas factory samsung invested 3.6 billion austin facility produce chips processors nearly facility output dedicated apple components samsung invested 4.2 billion austin facility order transition 28 nm fabrication process second half 2013 a5 part model numbers s5l8940 45 nm version s5l8942 32 nm version s5l8947 32 nm single core version version a5 wider memory subsystem four graphic cores called apple a5x found third generation ipad apple uses first version a5 chip iphone 4s ipad 2 a5 manufacturing process 45 nm 122.2 mm die area manufactured package package pop together 512 mb dual-channel lp-ddr2 dram apple used second version a5 chip third generation apple tv announced march 7 2012 well ipod touch fifth generation ipad mini 32 nm revision ipad 2 chip manufactured 32 nm fabrication process id code s5l8942 one core disabled apple tv new a5 measures nearly 41 smaller first-generation a5 coming 69.6 mm manufactured package package pop together 512 mb lpddr2 dram march 2013 apple released updated version third generation apple tv appletv3,2 containing smaller single cpu core single gpu core version a5 processor unlike a5 variants version a5 package-on-package pop stacked ram chip small 37.8 mm decrease size due decrease feature size still 32 nm fabrication process indicates a5 revision new design markings tell named apl7498 software chip called s5l8947 images illustrations approximately scale
[ 6788, 3940, 6082, 6421, 7890, 1083, 5732, 722, 1799, 1094, 4320, 5037, 4690, 5740, 1473, 734, 5750, 5752, 5405, 5406, 1864, 6125, 2954, 1123, 7572, 6482, 6847, 67, 6142, 2609, 1895, 4373, 7226, 2978, 5091, 446, 4749, 7601, 451, 3346, 61...
Test
2,927
2
Consolas:consolas consolas monospaced typeface designed luc de groot part suite fonts take advantage microsoft cleartype font rendering technology included windows since windows vista microsoft office 2007 microsoft visual studio 2010 available download microsoft standard windows vista font slash zero character consolas supports following opentype layout features stylistic alternates localized forms uppercase-sensitive forms oldstyle figures lining figures arbitrary fractions superscript subscript although consolas designed replacement courier new 713 glyphs initially available compared courier new 2.90 1318 glyphs version 5.22 included windows 7 support greek extended combining diacritical marks symbols number forms arrows box drawing geometric shapes added version 5.32 total number supported glyphs 2735 font along calibri cambria candara corbel constantia also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac consolas also available licensing ascender corporation bare bones software licensed font ascender use text editor bbedit inconsolata open source alternative available google fonts
[ 4759, 993, 2917, 1832, 2107, 2920, 822, 2931, 5837, 7274, 6645, 1029, 2499, 5871, 6067 ]
Test
2,928
2
CAPICOM:capicom capicom discontinued activex control created microsoft help expose select set microsoft cryptographic application programming interface cryptoapi functions microsoft component object model com intended enable every environment supports activex use microsoft cryptographic technologies including web pages opened microsoft internet explorer web browser supports activex capicom used digitally sign data inspect verify display digital signature digital certificate add remove certificates certificate stores finally encrypt decrypt data capicom version 2.1.0.3 latest last version capicom officially supported windows vista however microsoft announced capicom discontinued longer developed microsoft suggests replacing capicom .net framework x509 cryptographic classes number alternatives capicom included windows 7 linked microsoft article goes detail
[ 7149, 6420, 714, 720, 1460, 7907, 5747, 2953, 6840, 422, 4017, 6504, 4022, 4026, 7607, 1526, 3687, 4759, 2283, 5479, 7263, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 8073, 2018, 8085, 6989, 6991, 8094, 4...
Test
2,929
3
Berkeley_RISC:berkeley risc berkeley risc one two seminal research projects risc-based microprocessor design taking place arpa vlsi project risc led david patterson coined term risc university california berkeley 1980 1984 project took place short drive away stanford university mips effort starting 1981 running 1984 berkeley project successful became name similar designs follow even mips would become known risc processor berkeley risc design later commercialized sun microsystems sparc architecture inspired arm architecture risc mips developed realization vast majority programs use vast majority processor instructions one calculation found entire unix system compiled used 30 available instructions motorola 68000 much circuitry cpu dedicated decoding instructions never used risc idea include instructions really used using space used removed circuitry circuits would speed system instead risc concentrated adding many registers small bits memory holding temporary values accessed negligible cost contrasts normal main memory might take several cycles access providing registers making sure compilers actually used programs run much faster additionally speed processor would closely defined clock speed less time would spent waiting memory accesses transistor transistor risc design would outperform conventional cpu hopefully lot downside instructions removed generally performing several sub-instructions instance codice_1 instruction traditional design would generally come several flavours one added numbers two registers placed third another added numbers found main memory put result register etc risc designs hand included single flavour particular instruction codice_1 instance would always use registers operands forced programmer write additional instructions load values memory needed making risc program less dense era expensive memory real concern notably memory also much slower cpu since risc design codice_1 would actually require four instructions two loads add save machine would much memory access read extra instructions potentially slowing considerably offset degree fact new designs used large instruction word 32-bits allowing small constants folded directly instruction instead loaded separately additionally results one operation often used soon another skipping write memory storing result register program end much larger could theory run much faster instance string instructions carrying series mathematical operations might require loads memory majority numbers used would either constants instructions intermediate values registers sense technique registers used shadow memory locations registers used proxies memory locations final values group instructions determined casual observer clear risc concept would improve performance might even make worse way sure actually simulate done results definite test test every simulation showed enormous overall benefit performance design two projects risc mips differed handling registers mips simply added lots left compilers assembly-language programmers make use risc hand added circuitry cpu help compiler risc used concept register windows entire register file broken blocks allowing compiler see one block global variables another local variables idea make one particularly common instruction procedure call extremely easy implement compilers almost computer languages use system known activation record stack frame procedure—a modular unit execution—that contains address procedure called data parameters passed space result values need returned vast majority cases frames small typically three fewer inputs one outputs sometimes input reused output berkeley design register window set several registers enough entire procedure stack frame would likely fit entirely within register window case call return procedure simple extremely fast single instruction called set new block registers—a new register window—and operands passed procedure low end new window program jumps procedure return results placed window end procedure exits register windows set overlap ends results call simply appear window caller data copied thus common procedure call interact main memory greatly accelerating downside approach means procedures large numbers local variables problematic ones fewer lead registers—an expensive resource—being wasted finite number register windows design e.g eight procedures nested many levels deep register windowing mechanism reaches limit last window reached new window set another nested call procedures nested levels deep registers windows deepest call nesting level never accessed completely wasted stanford work compilers led ignore register window concept believing efficient compiler could make better use registers fixed system hardware reasoning would apply smart assembly-language programmer first attempt implement risc concept originally known gold work design started 1980 part vlsi design course then-complicated design crashed almost existing design tools team spend considerable amounts time improving re-writing tools even new tools took hour extract design vax-11/780 final design known risc published acm isca 1981 44,500 transistors implementing 31 instructions register file containing 78 32-bit registers allowed six register windows containing 14 registers additional 18 globals control instruction decode section occupied 6 die whereas typical design era used 50 role register file took space risc also featured two-stage instruction pipeline additional speed without complex instruction re-ordering modern designs makes conditional branches problem compiler fill instruction following conditional branch so-called branch delay slot something selected safe i.e. dependent outcome conditional sometimes suitable instruction case codice_4 notable number later risc-style designs still require consideration branch delay month validation debugging design sent innovative mosis service production june 22 1981 using 2 μm 2,000 nm process variety delays forced abandon masks four separate times wafers working examples arrive back berkeley may 1982 first working risc computer actually checkout board ran june 11 testing chips proved lesser performance expected general instruction would take 2 μs complete original design allotted .4 µs five times fast precise reasons problem never fully explained however throughout testing clear certain instructions run expected speed suggesting problem physical logical design worked full speed performance would excellent simulations using variety small programs compared 4 mhz risc 5 mhz 32-bit vax 11/780 5 mhz 16-bit zilog z8000 showed clearly program size 30 larger vax close z8000 validating argument higher code density cisc designs actually impressive reality terms overall performance risc twice fast vax four times z8000 programs ended performing overall amount memory access large register file dramatically improved odds needed operand already on-chip important put performance context even though risc design run slower vax made difference importance design risc allowed production true 32-bit processor real chip die using already older fab traditional designs simply could much chip surface dedicated decoder logic true 32-bit design like motorola 68020 required newer fabs becoming practical using fabs risc could largely outperformed competition february 12 2015 ieee installed plaque uc berkeley commemorate contribution risc-i plaque reads risc design ran delays work berkeley already turned new blue design work blue progressed slower gold due lack pressing need gold going fab well changeovers classes students staffing effort pace also allowed add several new features would end improving design considerably key difference simpler cache circuitry eliminated one line per bit three two dramatically shrinking register file size change also required much tighter bus timing small price pay order meet needs several parts design sped well savings due new design tremendous whereas gold contained total 78 registers 6 windows blue contained 138 registers broken 8 windows 16 registers another 10 globals expansion register file increases chance given procedure fit local storage registers well increasing nesting depth nevertheless larger register file required fewer transistors final blue design fabbed risc ii implemented risc instruction set 39,000 transistors major change include instruction-format expander invisibly up-converted 16-bit instructions 32-bit format allowed smaller instructions typically things one operands like codice_4 stored memory smaller 16-bit format two instructions packed single machine word instructions would invisibly expanded back 32-bit versions reached alu meaning changes needed core logic simple technique yielded surprising 30 improvement code density making otherwise identical program blue run faster gold due decreased number memory accesses risc ii proved much successful silicon testing outperformed almost minicomputers almost tasks instance performance ranged 85 vax speed 256 variety loads risc ii also benched famous motorola 68000 considered best commercial chip implementation outperformed 140 420 work original risc designs ended risc ii concept lived berkeley basic core re-used soar 1984 basically risc converted run smalltalk way could claimed risc ran c later similar vlsi-bam ran prolog instead smalltalk another effort spur full set chips needed build complete 32-bit workstation risc less famous influential basis commercial sparc processor design sun microsystems sparc first clearly demonstrated power risc concept shipped first sun-4s outperformed anything market led virtually every unix vendor hurrying risc design leading designs like dec alpha pa-risc sgi purchased mips computer systems 1986 large chip vendors followed working efforts like motorola 88000 fairchild clipper amd 29000 powerpc february 13 2015 ieee installed plaque oracle corporation santa clara reads techniques developed alongside idea reduced instruction set also adopted successively powerful implementations extensions traditional complex x86 architecture much modern microprocessor transistor count devoted large caches many pipeline stages superscalar instruction dispatch branch prediction modern techniques applicable regardless instruction architecture amount silicon dedicated instruction decoding modern x86 implementation proportionately quite small distinction complex risc processor implementations become blurred
[ 5893, 895, 6177, 1361, 7533, 4408, 5737, 3014, 1556, 5055, 7010, 4251, 2130, 2226, 8117, 1772, 154, 5079, 5614, 3156, 6236, 534, 1430, 2443, 971 ]
Test
2,930
2
SUSE_Studio_ImageWriter:suse studio imagewriter suse studio imagewriter official tool designed create live usbs suse opensuse part suse kiwi image creation system designed ease creation liveusb system suse studio however used standard opensuse livecd iso files
[ 5571, 2680, 578, 4207, 3271 ]
Test
2,931
2
Corbel_(typeface):corbel typeface corbel humanist sans-serif typeface designed jeremy tankard microsoft released 2005 part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts group calibri cambria candara consolas constantia blurb use corbel described designed give uncluttered clean appearance screen letter forms open soft flowing curves legible clear small sizes larger sizes detailing style shapes apparent italic style true italic influences serif fonts calligraphy many letters gaining tail pointing right many aspects design similar calibri candara also humanist sans-serif designs like slightly condensed average font designer raph levien reviewing typographica described similar frutiger tankard described aims family design “ wanted move away round i-dot sans fonts 've seen lot recently less cuddly assertive wanted italic expressive sloped roman corbel default renders numbers text figures old style lowercase numerals preferred integrating figures running text uncommon choice sans-serif faces especially designed display screen several cleartype fonts also make default option lining figures suggested using opentype stylistic alternates menu text figures also found microsoft serif georgia typeface distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware licensed sold ascender
[ 1832, 2920, 6645, 5871, 2927, 1029, 4759, 2499, 5837, 2917 ]
Test
2,932
2
Z-DOS:z-dos z-dos discontinued oem version microsoft ms-dos specifically adapted run hardware zenith z-100 personal computer z-100 used 8086-family microprocessor intel 8088 otherwise completely different internal architecture ibm pc time microsoft ms-dos n't specifically geared specific hardware platform could tailored run system long used 8086-compatible microprocessor situation completely like popular cp/m systems time typically used 8080-compatible 8080 8085 z80 among others microprocessor order achieve ms-dos like cp/m relied platform-specific dos- bios written target machine hardware-independent dos kernel could run beside ibm oem version ms-dos released pc dos dozens oem versions ms-dos geared specific non-ibm-compatible oem hardware—among zenith z-dos later almost 100 ibm-compatible clones became norm ms-dos became generic version could run generic version ms-dos however could run older non-ibm-compatible machines like z-100
[ 3559, 1052, 5784, 6380, 4277, 352 ]
Test
2,933
2
GEORGE_(operating_system):george operating system george name given series operating systems released international computers tabulators ict 1960s ict 1900 series computers included george 1 george 2 george 3 george 4 initially 1900 series machines like ferranti-packard 6000 based ran simple operating system known executive allowed system operator load run programs teletype model 33 asr based system console december 1964 ict set operating systems branch develop new operating system 1906/7 branch initially staffed people released end work omp operating system ferranti orion initial design new system named george george e. felton head basic programming division based ideas orion spooling system atlas computer public claimed george stood general organisational environment contemporary sources say backronym july 1965 team ict present seminar npl describing ctss operating system developed mit project mac decided ict would need provide multi-access facilities known ict mop multiple online processing november 1965 h. p. goodman head operating systems branch attended fall joint computer conference las vegas plans multics initially described multics features discussed influenced future development george notably tree structured filestore towards end 1965 ict marketing requested simpler operating system made available quickly especially smaller members range decided two smaller systems known george 1 george 2 released rapidly larger operating system renamed george 3 george 1 simple batch processing system job descriptions read cards paper tape controlled loading running programs either loaded cards paper tape magnetic tape job control language allowed definition peripherals files used handling exception conditions job description would checked errors job run george used trusted program facilities provided executive run user programs george 2 added concept line peripheral handling spooling several different modules running parallel allowed overlapping input processing output operations installation large enough multiple copies central module could run allowing multiple jobs processed parallel george 2 job control language allowed use stored macros conditional facilities george 2 provided file system system user programs relied facilities provided executive files disk accessed unique 12 character names security erase bit provided minimop could run simultaneously george 2 machine provide on-line time-sharing facilities somewhat artificial example batch george 2 real application job would probably use stored macro much simpler example written longhand effort show features jcl george 3 main version operating system series larger machines 1900 series initially released 1906/7 eventually made available models 1902t contrast george 1 2 ran user-mode programs executive george 3 full operating system leaving low-level peripheral interrupt handling cut-down version executive george 3 implemented small memory-resident part collection chapters overlays loaded removed memory needed chapters strictly location-independent allowing best use memory internally george used cooperative multitasking context switches could take place chapter change call one chapter another specified places code user-level code run using preemptive multitasking context switches forced i/o operations clock ticks george written special assembler gin george input richer conditional compilation macro facilities standard plan assembler macros heavily used code reduce effort programming large system assembly language later versions macro features gin used add structured programming features code writing system estimated taken 75 programmer-years effort george 3 mixed batch online system jobs could run cards tape manner george 2 interactively mop multiple online processing terminals either simple teletype model 33 asr terminals block mode vdu terminals job control language terminals batch jobs included conditional operations macro operations contrast unix systems job control language part operating system rather user level shell process job could one program loaded memory time one job could start jobs run concurrently system resources site policy would permit system would swap user programs memory waiting input output activities required memory run george 3 provided tree structured file store inspired part multics every user system home directory many sub directories needed users home directory could accessed directly example directory user john could referred john full path example john computer science department home directory might manager.users.compsci.john access control lists used security user could permit deny user group users access files directories file data storage two-level files could either currently disk system low disk space could automatically relegated magnetic tape attempt made access currently line file job would suspended operators requested load appropriate tape tape made available file would brought back disk job resumed starting 1904a paging unit available larger 1900 processors george 4 written take advantage george 4 remained compatible george 3 common alternate george 3 4 machine filestore running george 3 day small interactive workloads george 4 night large memory intensive jobs george 4 introduced concept sparse program program addressing space larger allocated memory read-only pure data code regions new versions consolidator linker compilers provided use facilities source code george 3 4 conditional compilation facilities gin assembler used select version system compiled 1900 paging feature emulated 2900 series machines used later george installations george 4 fell use george 3 simple examples george use job modelled george 2 job like job somewhat artificial real use work would done pre-stored macro command job would read card paper tape reader minor changes removal first jb command could stored file run interactive mop terminal user input shown lower case output george upper case george distributed form allowed site modify large parts system compilation system started interrupted end dumped magnetic tape gin compiler allowed compilation continued point user site possibly modifying code already compiled versions george 3 release 8 provided binary form modifications needed system made binary patches simplify process george chapters included empty mend area end starting release 8 source george distributed binary magnetic tape microfiche system source level patches known mendits used modify system existing chapter could completely replaced new modified chapter george user group set mend exchange scheme share interesting modifications george modifications distributed freely others available fee icl produced new version george would sometimes include modifications produced users last released version 8.67 patches mend exchange scheme included standard george source switched conditional compilation turned part standard process tailoring george site george well documented internally series looseleaf folders distributed initial version plus amendments eventually original pages replaced new copy manuals consisted box empty looseleaf folders pile amendments first amendment list contributors technical reason amendment described keep everyone happy modified version george 3 supplied university manchester regional computer centre umrcc linked george 3 cdc cyber machine george supplied offline i/o job queueing functions online support supplied icl cyber hardware software cyber support team worked office name cybermen door release icl new range 2900 series vme operating system george became obsolete however due legacy investment software george icl released options run 1900 series software including george 2900 series machines initially direct machine environment dme later concurrent machine environment cme allowed simultaneous running 1900 2900 code system new versions george 3 continued released 2900 last version 8.67 released 1983 2005 least one site russia still running george 3 dme november 2014 george 3 run reconditioned icl 2966 national museum computing david holdsworth delwyn holroyd obtained copies george 3 issue tapes last live site uk british steel corporation decommissioned wrote emulator 1900 hardware executive allows running george microsoft windows linux part project computer conservation society emulator includes emulation executive java emulation icl7903 communications processor making possible run mop sessions telnetting case port 2023 tests emulator show george 3 y2k compliant
[ 1522, 4662, 4759, 7161, 4670, 5116, 5571, 4145, 2933, 578, 1284, 5232, 2769, 336, 4002, 3751, 6680, 4915 ]
Validation
2,934
3
Klax_(video_game):klax video game klax 1990 puzzle video game designed dave akers mark stephen pierce object line colored blocks rows similar colors make disappear object columns similar atari games originally released coin-op follow-up tetris tangled legal dispute time released summer 1990 also known last game released atari 2600 console discontinued early 1992 klax features conveyor belt top screen constantly rolls toward playing area delivering steady supply blocks player controls small device sits interface conveyor belt playing area moved left right catch blocks deposit either playing area hold 25 blocks 5x5 arrangement push back conveyor belt device hold five blocks uncaught block considered drop flashing block used wildcard colour playing area blocks eliminated arranging three color continuous line known klax line may horizontal vertical diagonal multiple grouping e.g. one vertical horizontal counts multiple klaxes klaxes four same-colored blocks two klaxes five same-colored blocks three klaxes goal reached bonus points awarded remaining blocks conveyor belt device empty spaces bin also levels certain point total required points excess required amount counted scoring bonus points klax consists 100 levels grouped blocks five beginning game fifth level levels divisible five except levels 95 100 player choose skip five ten levels skipping levels gives bonus points higher drop allowance game ends player either exhausts drop allowance fills playing area finishes level 100 akers programmed klax weeks using amigabasic ported line-by-line c. 1990 interview said wanted produce something playable compact relatively quick develop influences tetris tic-tac-toe chose name sound tiles make rolling across screen atari games released klax february 1990 soon called major arcade hit quickly released several home versions tengen brand akers created nintendo entertainment system genesis editions 16-bit conversions featured improved graphics klax received parents choice foundation seal approval 1990 best mind game 1991 european computer leisure awards dennis lynch chicago tribune named klax best cartridge 1990 midway games gained rights klax upon purchasing atari games 1996 title re-released retro compilations modern consoles 1999 press release called midway tic-tac tile puzzle game mike mika working game boy color version game placed hidden wedding proposal inside took girlfriend three years uncover proposal mike mika also placed hidden snake-like game well mini-adventure game within game easter eggs arcade version klax saw ports contemporary home computers video game systems 1990s including atari lynx amstrad gx4000 even atari 2600 final official atari-licensed release exclusively europe klax first game versions three 1990s leading consoles nintendo entertainment system genesis turbografx-16 klax included arcade party pak playstation game also reissued midway arcade treasures 2003 compilation nintendo gamecube playstation 2 xbox pc also appeared lego dimensions release famicom tsūshin awarded pc engine version game 30 40 game ranked 26th best game time amiga power 1991 2012 author named kieren hawken described klax one coveted video games time capsule review lynx version start clayton walnum commented start playing klax maniac uzi wo n't able tear away graphics clean vivid music darn near good enough dance digitized sound effects speech astonishing small unit julian rignall reviewed atari lynx version cvg magazine january 1991 quoting game simple addictive giving rating 93 100
[ 5079, 7583, 1237, 6939, 3421, 683, 6713, 1435, 63 ]
Validation
2,935
2
PelicanHPC:pelicanhpc pelicanhpc operating system based debian live provides rapid means setting high performance computer cluster pelicanhpc formerly known parallelknoppix
[ 5200, 1629, 3444, 7251, 474, 7075, 5571, 1941, 314, 5232, 2758, 1663, 2864, 6209, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 3751, 7954, 6244 ]
Test
2,936
4
Redo_Backup_and_Recovery:redo backup recovery redo backup recovery free backup disaster recovery software runs bootable linux cd image presently ubuntu 12.04 lts features gui front end partclone command line utility capable bare-metal backup recovery disk partitions use external hard drives network shares addition backup software disk includes additional supporting programs
[ 5516, 4386, 1254, 346, 5571, 4554, 578, 5753, 788 ]
Test
2,937
1
Component-oriented_database:component-oriented database component-oriented database codb way data administration programming dbms using paradigm component-orientation paradigm component-orientation co development object-orientation oo programming data modeling leading toward extreme possibilities reuse model type classes aggregate cells called components execute role similar function structured programming way processing information contemporary relational database model component-orientation mixes set features predecessor models understanding simpler thinking visual component application deployed executable bytecode otherwise turned linked icon inside another application icon one clicks implements certain tasks concepts extended non-visual components database activities component visual aggragate classes sense oo linked ones adapters oo model conception data code programming code mixed cohesive body difficulties conceiving codb co programming separate one although enigma important conceptual epistemological area practical data processing n't importance question usage mapping models large scale used software like mappings called ordbms crdb component-relational database separation data code still well defined programming activity co often taken place large-scale used oo languages like c++ java mapping adaptation designing paradigm supored uml data modeling data administration database administration mapping adaptation alike ordbms paradigm adapted paradigm component-based models known component-relational database crdb main advantage component-oriented thinking seen early chapters optimization reusability work going far away uses oo models co paradigm allows use ready use applications modules new bigger projects necessary regard technical features achieved traditional oo models although idea component came naturally oo thinking basis support notions oo like encapsulation inheritance polymorphism necessarily leads idea reusing applications modules new works co thinking also assures components fully tested real application thus model paroxism reuse well feature understanability end users corollary app- comp way realizing works even using software present oo paradigm many specific consequences world data-oriented activities analogous way whole models composed classes treated part component new comprehensive model
[ 1905, 3928, 6341, 6543, 8097, 6364, 7999, 4252, 6462, 1768, 5419, 5338, 5778, 7303, 4457, 784, 4463, 1803 ]
Test
2,938
3
Hybrid-core_computing:hybrid-core computing hybrid-core computing technique extending commodity instruction set architecture e.g x86 application-specific instructions accelerate application performance form heterogeneous computing wherein asymmetric computational units coexist commodity processor hybrid-core processing differs general heterogeneous computing computational units share common logical address space executable composed single instruction stream—in essence contemporary coprocessor instruction set hybrid-core computing system contains instructions dispatched either host instruction set application-specific hardware typically hybrid-core computing best deployed predominance computational cycles spent identifiable kernels often seen high-performance computing applications acceleration especially pronounced kernel ’ logic maps poorly sequence commodity processor instructions and/or maps well application-specific hardware hybrid-core computing used accelerate applications beyond currently physically possible off-the-shelf processors lower power cooling costs data center reducing computational footprint i.e. circumvent obstacles power/density challenges faced today commodity processors
[ 352, 3747, 4479 ]
Validation
2,939
4
Optenet:optenet optenet global security company provides customers multi-tenant secure web gateway e-mail infrastructure solution primarily carriers managed security service providers mssps large enterprises optenet private company spin-off university navarra engineering faculty san sebastian research centre san sebastian spain provides customers multi-tenant secure web gateway e-mail infrastructure solution primarily carriers managed security service providers mssps large enterprises want create service offerings clients product optenet websecure recently awarded five stars sc magazine ’ web content management group test defining 'solid web security solution optenet named cool vendor gartner innovative multi-tenant technology 2011 gartner report cool vendors communications service provider infrastructure 2011 authored akshay sharma deborah kish
[]
Test
2,940
4
Optiv_(cybersecurity_company):optiv cybersecurity company optiv security inc. optiv privately owned information security company based denver colorado november 5 2014 security firms accuvant fishnet security announced would join forces create new company merger would create roughly 1.5 billion information security giant solutions covering nearly every aspect cyberdefense merger completed february 2 2015 company announced previously announced transaction closed new company owned primarily blackstone group private equity firm acquired majority stake accuvant march 2014 april 21 2015 accuvant fishnet security announced plans launch new combined corporate name brand begin conducting business optiv security summer 2015 black hat usa 2015 conference two companies announced completed merger subsequently conducting business optiv security company also launched new brand conference february 1 2017 optiv announced acquired global investment firm kkr mid-2018 optiv moved headquarters newly constructed 40-story 1144 fifteenth tower downtown denver considered primary tenant building
[ 1594 ]
Test
2,941
9
UBASIC:ubasic ubasic freeware public domain software without source code basic interpreter written yuji kida rikkyo university japan specialized mathematical computing ubasic ready-to-run language need set another advanced language common problem multi-digit math languages runs dos dos box dos shell microsoft windows etc specialized number theory primality testing factoring large integers 2600 digits implementation basic makes easy read programs without extensive study basic language structure syntax close ordinary algebra help files articles lessons beginners ubasic built-in on-line editor several aids debugging show cross references calling lines lines containing variable lists variables/arrays renumber lines change variable names append additional programs trace single step time milliseconds help determine fastest way highly repetitive sections redefine function keys either provide easy one-keypress function prevent standard function accidentally used n't shell dos execute dos command convert single-byte character set double-byte character set much use host computer would likely need aware operating system documents may added modified ubhelp.hlp primality testing aprt-cle 884 digits best run ubasic version 8.8f later 500 digits said take 5 hours pp-200 150 digits takes 16 minutes 486-100 2¼ minutes k6 233 250 digits takes 13½ minutes k6 233 recent machines 10 times faster aprt-cle often algorithm choice testing primality integers within range factoring programs ecmx quite fast find factors number digits low-20s fairly easily mid-20s somewhat less easily upper-20s lower chance success found 30-digit factor finding factors elliptic curve method always chancy larger factors greater number curves tested greater chances success number needed average one sometimes get lucky unlucky increases rapidly size factors always best use fastest machine available ecmx uses accepted standards limits stop working one curve switch next preliminary primality testing finding small factors powers interpreted allows modifying programs restarting using goto middle run even multi-day without losing accumulated data stopping recommended unless program saving data safely somewhere users forgot write way save data quitting perhaps expect find trying prove anything might lose valuable data need something else time freeze current program file later melt long lower memory configuration ubasic line numbers use indentation control structure subroutines user functions passed parameters local variables parameters passed value name user functions subroutines may passed parameters limited labels various options conditional functions users indent much needed much structure wanted spaghetti code mistake consider ubasic modern might inferred reader articles confuse indentation structure n't favor line numbers line numbers allows easy jumping intermediate point routine sometimes save duplicating lines ubasic version 8 high-precision real complex arithmetic 2600 digits prior versions adds exact rational arithmetic arithmetic single-variable polynomials complex rational modulo p coefficients well string handling limited list handling abilities also context-sensitive on-line documentation read ubhelp.doc information file uses ascii printed paper document 2005 help file many errors ten-year project rewrite/correct nearly ready publication probably late summer 2005 new help file new extension '.hlp eventually package name u3d748f* list updates available many changes remain unreported version 8.8 different precision 8.74 still commands documentation new command version 8.8c polyconv converts polynomials modulus=0 modulus=prime formatting specifications warning never test anything important might running suspended somewhere else lockups may expected particularly keyscan see freeze roll melt similar warning ubasic several types arrays logical operators bit operators 4 standard loop structures combined operators call machine language routines increased speed ecmx must know assembly language even understand instructions able write tsr debug enough ubasic used process almost kind data example .wav files process text files convert tabs spaces spaces tabs programs generate tabs actually choke early 2005 internet search turned versions 8.74 32 8.74 16 8.71 4000 16 9.0ze 9.0zc 9.0e 8.8f 32 8.8f 16 8.8f c 8.7e 32 8.7e 16 8.30 32 8.30 16 7.25 32 7.25 16 8.8a 32 8,8a 16 8.8a c 8.8c 32 8.8c 16 8.8c c 8.8e 32 8.8e 16 8.8e c 12 versions 52 known numbers many directly identified 16 32 refer number bits multiplication engine 4000 refers special versions go 4000 digits users may need one generate first 792 bernoulli numbers double index 1584 latest version get 540/1080 c cga machines versions italics recommended users would need 8.8f already using version later 8.74 especially using version later 8.7e strongly advised switch latest version 8.8f programs fancy display example written 8.74 may work 8.8f without considerable rewriting latest versions strip carriage returns/line feeds ascii files programs ubh even one 8.8f need added lines strip program written one version used another version without checking certain programs nfs run experimental version 9.** ppmpx36e version multi-polynomial quadratic sieve needs 8.8f windows versions ubasic came defective ubconst7.dat file check one supplied 8.8f identical switch obtaining latest version ubasic see external links sections many internet math pages language/packages sites following short simple program partition count function although n't many fancier structures real program invented article modern fast athlon calculate partition counts p 0 p 1000 ½ second contrast ½ century first time save result file uncomment line 40 remove leading apostrophe working continued fractions number terms limited available accuracy size term approximate formula 2 decimal fraction digit accuracy term times base ten logarithm term way work safely twice parallel initial input one dithered final several digits least 1 word two calculations give identical terms stop previous term ubasic calculate partition function p 1330521 8.74 p 1361911 4000 digit versions get many essential features consists following
[ 5367, 1255, 4759, 12, 2463, 6891, 2012, 8183, 4139, 5651, 2925, 7448, 5926, 5129, 5571, 7906, 5137, 5234, 3303, 1304, 61, 6394, 4003, 7864, 1789, 5877, 6778, 4012, 4745, 1064 ]
Validation
2,942
2
Swsusp:swsusp swsusp software suspend kernel feature/program part power management framework linux kernel default suspend framework kernel 3.8 swsusp helps drive system low power state called suspend actively used providing ability return state suspend called resume restore 3.8 swsusp provides following options suspend details swsusp refer kernel documentation documentation/power/swsusp.txt enable swsusp following selected kernel configuration /dev/resume_partition needs replaced actual swap partition used suspending otherwise resume=/dev/resume_partition given parameter system bootup actual suspend done may check suspend options available cat /sys/power/state depending kernel config show something similar standby mem disk options available disk viewed cat /sys/power/disk depending kernel config show something similar platform shutdown reboot swsusp lacks compression graphical progress indication provided uswsusp
[ 2182, 3613, 7528, 7532, 2204, 5744, 6443, 4341, 5762, 3666, 2970, 5453, 7242, 1535, 1924, 6892, 1176, 1933, 1208, 6211, 5865, 7669, 1227, 1596, 165, 7312, 1607, 5884, 1991, 8066, 6984, 5571, 578, 4877, 5580, 2765, 4174, 7038, 976, 5627, ...
Validation
2,943
2
Desktop_Cleanup_Wizard:desktop cleanup wizard desktop cleanup wizard component included microsoft windows xp operating system aims reduce clutter user desktop environment moving unused shortcuts separate directory called unused desktop shortcuts run shows list shortcuts user select shortcuts move unused desktop shortcuts directory desktop cleanup wizard works scheduled task runs day wizard run 60 days wizard displayed user desktop cleanup wizard also accessible desktop context menu arrange icons sub-menu desktop cleanup wizard scheduled task enabled disabled desktop items configuration screen available desktop tab display properties dialog box windows xp successor windows vista include desktop cleanup wizard windows 7 function integrated system maintenance wizard troubleshooting control panel
[ 5637, 4759, 5571 ]
Test
2,944
4
Spoofing_attack:spoofing attack context information security especially network security spoofing attack situation person program successfully masquerades another falsifying data gain illegitimate advantage many protocols tcp/ip suite provide mechanisms authenticating source destination message thus vulnerable spoofing attacks extra precautions taken applications verify identity sending receiving host ip spoofing arp spoofing particular may used leverage man-in-the-middle attacks hosts computer network spoofing attacks take advantage tcp/ip suite protocols may mitigated use firewalls capable deep packet inspection taking measures verify identity sender recipient message websites especially pornographic paysites allow access materials certain approved login- pages enforced checking referrer header http request referrer header however changed known referrer spoofing ref-tar spoofing allowing users gain unauthorized access materials spoofing also refer copyright holders placing distorted unlistenable versions works file-sharing networks public telephone networks often provide caller id information includes caller number sometimes caller ’ name call however technologies especially voice ip voip networks allow callers forge caller id information present false names numbers gateways networks allow spoofing public networks forward false information since spoofed calls originate countries laws receiver country may apply caller limits laws effectiveness use spoofed caller id information scam sender information shown e-mails codice_1 field spoofed easily technique commonly used spammers hide origin e-mails leads problems misdirected bounces i.e e-mail spam backscatter e-mail address spoofing done quite way writing forged return address using snail mail long letter fits protocol i.e stamp postal code smtp protocol send message done using mail server telnet geolocation spoofing occurs user applies technologies make appear located somewhere actually located common geolocation spoofing use virtual private network vpn dns proxy order user appear located different country state territory actually located according study globalwebindex 49 global vpn users utilize vpns primarily access territorially restricted entertainment content type geolocation spoofing also referred geo-piracy since user illicitly accessing copyrighted materials via geolocation spoofing technology another example geolocation spoofing occurred online poker player california used geolocation spoofing techniques play online poker new jersey contravention california new jersey state law forensic geolocation evidence proved geolocation spoofing player forfeited 90,000 winnings gps spoofing attack attempts deceive gps receiver broadcasting incorrect gps signals structured resemble set normal gps signals rebroadcasting genuine signals captured elsewhere different time spoofed signals may modified way cause receiver estimate position somewhere actually located different time determined attacker one common form gps spoofing attack commonly termed carry-off attack begins broadcasting signals synchronized genuine signals observed target receiver power counterfeit signals gradually increased drawn away genuine signals suggested capture lockheed rq-170 drone aircraft northeastern iran december 2011 result attack gps spoofing attacks predicted discussed gps community previously known example malicious spoofing attack yet confirmed proof-of-concept attack successfully performed june 2013 luxury yacht white rose drachs misdirected spoofed gps signals group aerospace engineering students cockrell school engineering university texas austin students aboard yacht allowing spoofing equipment gradually overpower signal strengths actual gps constellation satellites altering course yacht june 2017 approximately twenty ships black sea complained gps anomalies showing vessels transpositioned miles actual location professor todd humphreys believed likely spoofing attack gps anomalies around putin palace moscow kremlin led researchers believe russian authorities use gps spoofing wherever vladimir putin located affecting maritime traffic since advent software defined radio gps simulator applications made available general public made gps spoofing much accessible meaning performed limited expense modicum technical knowledge different ways prevent gps spoofing department homeland security collaboration national cybersecurity communications integration center nccic national coordinating center communications ncc released paper lists methods prevent type spoofing important recommended use installation operation strategies development opportunities described herein significantly enhance ability gnss receivers associated equipment defend range interference jamming spoofing attacks
[ 96, 5722, 7239, 3426, 558, 7813, 7536, 651, 4208, 731, 6908, 3794, 38, 4966, 1567, 2857, 4517, 6288, 7194, 1805, 6376, 3480, 3486, 7209, 7300, 341, 429, 3147, 7765, 4734, 1321, 782, 3921, 6240, 3680, 1708 ]
Test
2,945
8
NetDynamics_Application_Server:netdynamics application server netdynamics application server early java-based integrated software platform product developed netdynamics silicon valley start-up company founded 1995 zack rinat ofer ben-shachar unlike early application server competitors netdynamics chose java development language platform java became dominant development language web-based applications netdynamics experienced significant revenue growth 1997 1998 however product soon encountered problems due relative immaturity java rush release new product versions rapidly changing marketplace believing new jdbc api immature netdynamics created proprietary database development api based product rogue wave software netdynamics inc. acquired sun microsystems july 1998 application server software together netscape application server basis sun iplanet application server offering netdynamics initially competed bluestone application server based c programming language kiva application server mid-1998 new competitor weblogic inc. released java application server compliant jdbc another emerging standard javabeans weblogic application server eventually marketplace explosive growth application server business caught attention larger information technology companies 1998 early application server start-up companies acquired hewlett-packard purchased bluestone sun microsystems acquired netdynamics netscape communications corporation bought kiva weblogic acquired bea systems weblogic continues survive product oracle corporation acquired bea 2008 product renamed oracle weblogic
[ 3764, 3915, 5571, 2958, 2980 ]
Test
2,946
8
Conversion_funnel:conversion funnel conversion funnel phrase used e-commerce describe journey consumer takes internet advertising search system navigating e-commerce website finally converting sale metaphor funnel used describe way users guided goal fewer navigation options step using metaphor advertising efforts aimed upper funnel middle funnel lower funnel potential customers typically large number customers search product/service register page view referring page linked e-commerce site banner ad ad network conventional link small proportion seeing advertisement link actually click link metric used describe ratio click-through rate ctr represents top level funnel typical banner advertising click-through rates 0.02 late 2010 decreased past three years click-through rates highly sensitive small changes link text link size link position many others effects interact cumulatively process understanding creative material brings highest click-through rate known ad optimization link clicked visitor referring page enters e-commerce site small proportion visitors typically proceed product pages creating constriction metaphorical funnel step visitor takes reduces number visitors typically 30 –80 per page adding product shopping cart registering filling contact details payment reduce numbers step-by-step cumulatively along funnel steps fewer visitors get becoming paying customers reason sites similar pricing products hugely different conversion rates visitors customers therefore greatly differing profits
[ 6214, 8101, 2673 ]
Test
2,947
4
Cyber_Threat_Intelligence_Integration_Center:cyber threat intelligence integration center cyber threat intelligence integration center ctiic new united states federal government agency fusion center existing agencies private sector real-time use cyber attacks ctiic created due blocked efforts congress stymied liability privacy concerns citizens ctiic formally announced lisa monaco february 10 2015 wilson center agency within office director national intelligence tonya ugoretz br january 7 2016 march 13 2019 erin joe march 13 2019 present
[ 2656 ]
Test
2,948
1
Postcode_Plants_Database:postcode plants database postcode plants database uk resource identifying locally native plants species based postcode hosted natural history museum london used determine plant conservation schemes also information relationships plants associated animals
[]
Test
2,949
6
Archive_bit:archive bit archive bit file attribute used cp/m microsoft operating systems os/2 amigaos used indicate whether file backed archived windows os/2 file created modified archive bit set i.e turned file backed archive bit cleared i.e turned thus meaning archive bit file archived cp/m meaning inverted creating modifying file clears archive bit bit set file backed incremental backup task may use archive bit distinguish files already backed select new modified files backup backup software may provide option full backup clearing archive bits – back files regardless archive bit status clear archive bit files processed backup allows creation initial full backup supplemented incremental backups future operating system never clears archive bit unless explicitly told user even user explicitly tells operating system copy file purpose archiving archive bit still cleared specific command clearing setting bit must executed ms-dos well nearly versions windows archive bit status viewed changed attrib command-line utility viewing properties file windows shell windows explorer archive bit status also viewed changed getfileattributes getfileattributesex setfileattributes windows apis archive bit set cleared attributes property vbscript jscript file clear archive bit moved one place file system another archive bit reverts set typically computer system never backed manner clears archive bits files computer archive bits set applications make use archive bits without user request archive bit file attribute part file contents file remain unchanged status archive bit changes relying archive bit backing files unreliable multiple backup programs setting clearing archive bit volume another possibility use timestamp last change file directory typically technique used unix-like operating systems
[ 6289, 8183, 3626, 2390, 4759, 5784, 6380, 6857, 422 ]
Test
2,950
3
HyperSPARC:hypersparc hypersparc code-named pinnacle microprocessor implements sparc version 8 instruction set architecture isa developed ross technology cypress semiconductor hypersparc introduced 1993 competed sun microsystems supersparc raju vegesna microarchitect hypersparc sun microsystem primary competitor mid-1990s fujitsu acquired ross cypress hypersparc considered important new owner sparc64 developed hal computer systems also fujitsu subsidiary view shared analysts hypersparc two-way superscalar microprocessor four execution units integer unit floating-point unit load/store unit branch unit hypersparc on-die 8 kb instruction cache two instructions fetched per cycle decoded decoder could decode new instructions previously decoded instructions issued execution units integer register file contained 136 registers providing eight register windows feature defined sparc isa two read ports integer unit four-stage pipeline two stages added pipeline would equal non-floating-point pipelines integer multiply divide instructions added v8 version sparc architecture 18- 37-cycle latency respectively stalled pipeline completed microprocessor supported multiprocessing mbus systems hypersparc consists 1.2 million transistors fabricated cypress 0.65 µm two-layer metal complementary metal–oxide–semiconductor cmos process later iterations hypersparc transistors due new features ported newer processes fabricated fujitsu except last iteration fabricated nec hypersparc multi-chip design packaged ceramic multi-chip module mcm pin grid array pga hypersparc used cypress sparcset chipset introduced late july 1992 developed santa clara california start-up nimbus technologies inc. cypress fabricated design sparcset also compatible sparc microprocessors
[ 7982, 5822, 2248, 3747, 1237, 441, 971, 7781, 1263 ]
Test
2,951
3
Compaq_Presario_1700:compaq presario 1700 compaq presario 1700 notebook pc first manufactured compaq 1999 notable intel processors 8 mb 8 mib mobility rage m1 graphics chip relatively large screen coupled thin light casing allowed balance power portability especially given quoted 3 hour battery life made notebook especially popular business users inclusion ati rage m1 graphics chip allowed 1700 compete closely high-end notebooks higher price ranges heightened attraction business market system could comfortably run high-demand applications relative ease lightweight portable form
[ 4736 ]
Validation
2,952
7
Veeva_Systems:veeva systems veeva systems inc. cloud-computing company focused pharmaceutical life sciences industry applications headquartered pleasanton california founded 2007 peter gassner matt wallach works software service global life science industry company went public 2013 march 28 2018 market capitalization usd 10 billion 2015 veeva acquired zinc ahead content management software company
[ 2961, 330 ]
Validation
2,953
2
Windows_Display_Driver_Model:windows display driver model windows display driver model wddm graphic driver architecture video card drivers running microsoft windows versions beginning windows vista replacement previous windows 2000 windows xp display driver model xddm/xpdm aimed enabling better performance graphics new graphics functionality stability display drivers windows vista windows 7 choose either adhere wddm xddm removal xddm windows 8 however wddm became option wddm provides functionality required render desktop applications using desktop window manager compositing window manager running top direct3d also supports new dxgi interfaces required basic device management creation wddm specification requires least direct3d 9-capable video card display driver must implement device driver interfaces direct3d 9ex runtime order run legacy direct3d applications may optionally implement runtime interfaces direct3d 10 higher wddm drivers enable new areas functionality uniformly provided earlier display driver models include context graphics virtualization means individual processes user mode see memory adjacent processes even means insertion forged commands command stream wddm drivers allow video memory virtualized video data paged video memory system ram case video memory available turns insufficient store video data textures currently unused data moved system ram disk swapped data needed fetched back virtualization could supported previous driver models xp driver model extent responsibility driver instead handled runtime level runtime handles scheduling concurrent graphics contexts list commands put queue execution gpu preempted runtime critical task arrives begun execution differs native threads cpu one task interrupted therefore take longer necessary make computer appear less responsive hybrid scheduling algorithm native light threads cooperation threads would achieve seamless parallelism important note scheduling new concept previously responsibility individual driver developers wddm attempts unify experience across different vendors controlling execution gpu tasks direct3d graphics surface memory area contains information textured meshes used rendering 2d 3d scene wddm allows direct3d surfaces shared across processes thus application incorporate mesh created another application scene rendering sharing textures processes wddm difficult would required copying data video memory system memory back video memory new device wddm driver hangs encounters fault graphics stack restart driver graphics hardware fault intercepted necessary driver reset drivers windows xp free deal hardware faults saw fit either reporting user attempting recover silently wddm driver hardware faults cause driver reset user notified popup unifies behavior across vendors previous drivers fully implemented kernel mode whereas wddm implemented partly user mode user mode area fails unrecoverable error cause application quit unexpectedly instead producing blue screen error would previous driver models wddm also allows graphics hardware reset users update drivers without requiring reboot new driver model requires graphics hardware shader model 2.0 support least since fixed function pipeline translated 2.0 shaders however according microsoft 2009 1–2 percent hardware running windows vista used xddm rest already wddm capable also requires hardware features consequently sm 2.0-supporting hardware intel gma 900 fails wddm certification one limitations wddm driver model version 1.0 support multiple drivers multi-adapter multi-monitor setup multi-monitor system one graphics adapter powering monitors adaptors must use wddm driver one driver used windows disable one wddm 1.1 limitation wddm 1.0/1.1 allow modes previously handled driver spanning mode stretching desktop across two monitors although dual view still available one chief scenarios windows display driver model enables desktop window manager since desktop application windows managed dwm direct3d applications number open windows directly affects amount video memory required limit number open windows video memory available may prove insufficient necessitating virtualization window contents dwm composes final desktop generated different processes cross-process surface sharing necessary also directx applications running alongside dwm dwm-managed desktop must able access gpu shared manner necessitating scheduling though true microsoft implementation composited desktop windows vista hand composited desktop need theoretically require new display driver model work expected successful implementations composited desktops done windows vista platforms quartz compiz windowfx approach microsoft attempted try make sure wddm unified experience across different gpus multiple vendors standardizing features performance software features missing driver models could made immaterial extensions less restrictive simply different driver model place windows vista introduced wddm 1.0 new display driver architecture designed better performing reliable support new technologies including hdcp hybrid sleep combines hibernation sleep mode functionality enhanced stability event power failure also requires wddm windows 7 supports major additions wddm known wddm 1.1 details new version unveiled winhec 2008 new features include hardware acceleration gdi direct2d/directwrite operations helps reduce memory footprint windows 7 dwm compositing engine longer needs keep system memory copy surfaces used gdi/gdi+ windows vista dxgi 1.1 direct3d 11 direct2d directwrite made available windows vista platform update however gdi/gdi+ vista continues rely software rendering desktop window manager continues use direct3d 9ex wddm 1.1 drivers backward compatible wddm 1.0 specification 1.0 1.1 drivers used windows vista without platform update windows 8 includes wddm 1.2 dxgi 1.2 new features first previewed build 2011 conference include performance improvements well support stereoscopic 3d rendering video playback major features include preemptive multitasking gpu finer granularity dma buffer primitive triangle pixel instruction-level reduced memory footprint improved resource sharing faster timeout detection recovery 16-bit color surface formats 565 5551 4444 mandatory windows 8 direct3d 11 video supports yuv 4:4:4/4:2:2/4:2:0/4:1:1 video formats 8 10 16-bit precision well 4 8-bit palettized formats wddm 1.2 supports display-only render-only wddm drivers microsoft basic display driver warp-based microsoft basic render driver replaced kernel-mode vga driver wddm 1.0/1.1 allows rudimentary task scheduling using batch queue granularity improvements multitasking well fast context switching support virtual memory initially expected versions tentatively named wddm 2.0 wddm 2.1 announced winhec 2006 windows 8.1 includes wddm 1.3 dxgi 1.3 new additions include ability trim dxgi adapter memory usage multi-plane overlays overlapping swap chains swap chain scaling select backbuffer subregion swap chain lower-latency swap chain presentation driver feature additions include wireless displays miracast yuv format ranges cross-adapter resources gpu engine enumeration capabilities graphics kernel performance improvements windows 10 includes wddm 2.0 designed dramatically reduce workload kernel-mode driver gpus support virtual memory addressing allow multithreading parallelism user-mode driver result lower cpu utilization windows 10 also includes dxgi 1.4 direct3d 12 api announced build 2014 requires wddm 2.0 new api away automatic resource-management pipeline-management tasks allow developers take full low-level control adapter memory rendering states display driver model windows 8.1 windows phone converged unified model windows 10 new memory model implemented gives gpu per-process virtual address space direct addressing video memory still supported wddmv2 graphics hardware requires considered legacy case ihvs expected develop new hardware supports virtual addressing significant changes made ddi enable new memory model windows 10 anniversary update version 1607 includes wddm 2.1 supports shader model 6.0 mandatory feature levels 12_0 12_1 dxgi 1.5 supports hdr10 10-bit high dynamic range wide gamut format defined itu-t rec 2100/rec.2020 variable refresh rates windows 10 creators update version 1703 includes wddm 2.2 tailored virtual augmented mixed reality stereoscopic rendering windows mixed reality platform dxgi 1.6 windows 10 fall creators update version 1709 includes wddm 2.3 following list new features windows display driver development windows 10 version 1709 windows 10 april 2018 update version 1803 includes wddm 2.4 following updates display driver development windows 10 version 1803 since introduction windows 10 april 2018 update due changes wddm became possible use dual graphics laptops example allows run programs games powerful video card display image via built-in graphics directly internal pci-e external bus without connect monitor powerful video card also act solution problem vga video output video card present motherboard windows 10 october 2018 update version 1809 includes wddm 2.5 updates display driver development windows 10 version 1809 include following windows 10 may 2019 update version 1903 includes wddm 2.6 super-wet ink feature revolves around front-buffer rendering ihv drivers support creation “ displayable ” textures formats modes supported hardware allocating texture app requested along “ shadow ” texture format/layout displayed copying two present-time “ shadow ” may necessarily texture normal way think may compression data additionally may required exist may optimization instead runtime evolve understand aspects displayable surfaces whether shadow must exist display particular vidpnsource/plane whether optimal shadow exist transfer contents application surface shadow surface runtime explicit operation opposed implicit within present request setting mode dynamically flipping original shadow surfaces scanout may begin shortly vblank scans vertically top bottom image completes shortly next vblank always case depending timing pixel clock layout data texture especially actually compression available new ddis added separate understand transformations occur prior scanout order possible enable front-buffer rendering variable rate shading coarse pixel shading mechanism enable allocation rendering performance/power varying rates across rendered images previous model order use msaa multi-sample anti-aliasing reduce geometric aliasing amount reduce geometric aliasing needs known up-front target allocated amount reduce geometric aliasing ’ changed target allocated wddm 2.6 new model extends msaa opposite coarse pixel direction adding new concept coarse shading shading performed frequency coarser pixel group pixels shaded single unit result broadcast samples group coarse shading api allows apps specify number pixels belong shaded group coarse pixel size varied render target allocated different portions screen different draw passes different course shading rates multiple-tier implementation available two user-queryable caps tiers 1 2 coarse shading available single-sampled msaa resources msaa resources shading performed per-coarse-pixel per-sample usual however tiers 1 2 msaa resources coarse sampling used shade frequency per-pixel per-sample tier 1 shading rate specified per-draw-basis nothing granular shading rate applies uniformly drawn independently lies within render target tier 2 shading rate specified per-draw-basis tier 1 also specified combination per-draw-basis semantic per-provoking-vertex screenspace image shading rates three sources combined using set combiners screen space image tile size 16x16 smaller shading rate requested app guaranteed delivered exactly precision temporal reconstruction filters sv_shadingrate ps input supported per-provoking vertex rate also referred per-primitive rate valid one viewport used sv_viewportindex written per-provoking vertex rate also referred per-primitive rate used one viewport supportspervertexshadingratewithmultipleviewports cap marked true additionally case used sv_viewportindex written collect diagnostic info allows os collect private data drivers graphics adapters consist rendering display functions new feature requirement wddm 2.6 new ddi allow os collect information time driver loaded currently os uses dxgkddicollectdebuginfo function implemented miniport query driver private data tdr timeout detection recovery related cases new ddi used collect data variety reasons os call ddi diagnostic needed providing type information requested driver collect private information important investigate issue submit os dxgkddicollectdebuginfo eventually deprecated replaced dxgkddicollectdiagnosticinfo background processing allows user mode drivers express desired threading behavior runtime control/monitor user mode drivers would spin background threads assign threads low priority possible rely nt scheduler ensure threads ’ disrupt critical-path threads generally success apis allow apps adjust amount background processing appropriate workloads perform work driver hot update reduces server downtime much possible os component needs updated driver hot patch used apply security patch kernel mode driver case driver asked save adapter memory adapter stopped driver unloaded new driver loaded adapter started
[ 7149, 3937, 3263, 6420, 714, 378, 2198, 720, 1460, 2204, 6096, 2928, 7907, 1475, 5747, 7553, 5410, 7564, 6840, 422, 6844, 2245, 5781, 435, 1897, 5442, 4017, 3340, 5090, 6504, 7602, 4022, 4026, 7607, 1526, 6164, 458, 3687, 4759, 1534, 68...
Validation
2,954
2
IPad_(2017):ipad 2017 ipad officially fifth-generation ipad 9.7-inch tablet computer designed developed marketed apple inc. announcement march 21 2017 conflicting naming conventions spawned number different names including seventh-generation ipad ipad 2017 retains screen size ipad air line tablets powerful ipad air 2 even overall dimensions weight similar original ipad air unlike ipad air 2 generation ipad fully laminated display lacks anti-reflective coating unlike ipad pro smart connector features dual-speaker system ipad received mixed reviews significantly praised performance reviewers asserting model noticeably faster older ipad models also received positive reviews price battery life criticized however lacking laminated anti-reflective screen lack support apple pencil attachable keyboards smart connector introductory price united states lowest ever ipad media noting lower price might effort encourage wider adoption tablet education sector well businesses needing inexpensive tablets undemanding uses march 27 2018 apple announced successor 2018 ipad also marked discontinuation ipad ipad announced apple march 21 2017 press release confusion around naming referred ipad marketing called fifth-generation ipad official statements specifications sheets title previously taken 2013 ipad air sources refer seventh-generation ipad including ipad air ipad air 2 fifth- sixth-generation ipads respectively also referred ipad 2017 matt kapko cio wrote apple introductory pricing 329 united states ipad 70 price reduction versus ipad air 2 appeared designed fend encroachment google chromebook laptops education sector foster wider adoption customer-facing terminals kapko also wrote device designed appeal businesses require inexpensive tablets undemanding use including kiosks checkout terminals hospitality screens time original release ipad shipped ios 10 version apple mobile operating system new units sold come new ios 11 operating system instead included touch id fingerprint sensor allows user unlock device well approve purchases app store itunes store ibooks store touch id apple pay let user purchase items websites within apps ipad 9.7-inch 25cm screen compared ipad air 2 processor updated apple a8x a9 embedded apple m9 motion co-processor ipad 2 gigabytes ram 7.5mm thick thickness ipad air compared 6.1mm ipad air 2 unlike ipad models available ipad display fully laminated anti-reflective coating however ipad brighter screen ipad air 2 25 brighter according apple available 32 128 gigabyte storage options contrasting ipad pro lineup ipad features two speakers opposed four smart connector support flash back offered silver gold space grey colors despite use apple a9 processor accompanying m9 motion co-processor introduced iphone 6s 2015 ipad feature support always-on hey siri voice input feature advertised made possible low-power processing then-new chips use hey siri limited ipad connected power product teardown ifixit showed design ipad nearly identical ipad air except differences addition touch id lack physical mute switch microphone holes smaller single row speaker holes dieter bohn verge wrote thin fast tablet praised screen good despite fancy true tone display ipad pro things made screen ipad air 2 nice lamination anti-reflectivity criticized lack support attachable keyboards apple pencil praising a9 processor significantly faster older ipads though noting n't necessarily significantly faster ipad air 2 fast ipad pro also disliked ipad features two speakers opposed four ipad pro summarizing overall review fundamentally trying tell ipad trust ipads decent tablets basic level quality speed functionality get one need one n't stress 're missing n't sascha segan pc magazine wrote apple ipad affordable ever noted little reason existing ipad owners upgrade new ipad price stabs stake heart many competing android tablets although criticizing non-laminated display little washed predecessor claimed could n't see measurable difference nominal degradation quality n't really matter everyday use segan also praised performance compared prior ipad models also praised improved wi-fi performance writing quite impressive double wi-fi speeds new ipad air 2 jeff benjamin 9to5mac wrote sure lacks gorgeous laminated anti-reflective display ipad air 2 sure ’ svelte either thickness weight ’ denying 2017 ipad a9 dual core processor tow good value described tablet solid buy upgraders new users igor bonifacic mobilesyrup also praised performance well number ipad apps available criticized camera outdated keyboard/pencil incompatibility summarization reading 2017 ipad exciting tablet ’ supposed exciting ... apple ’ latest tablet iterative update designed appeal specific subset consumers bonifacic also called tablet perfect first-time tablet buyers chris velazco engadget praised battery life describing one best ipads 've tested also criticized lack anti-reflection display calling another cost-saving measure wish apple reconsidered
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 5752, 405, 6125, 1123, 7572, 6482, 6847, 6142, 2609, 1895, 4373, 7226, 4376, 2978, 5091, 4749, 5450, 7601, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3001, 2284, 3008, 5477, ...
Test
2,955
3
Xak_II:_Rising_of_the_Redmoon:xak ii rising redmoon xak ii rising redmoon fantasy role-playing video game developed published japanese software developer microcabin direct sequel xak game released japan due msx scene arose europe predominately netherlands region msx versions xak received fan translations enhanced remake later released nec pc-engine together first game series xak ii telenet japan development team riot xak ii direct sequel first game series features high fantasy setting xak gods division world xak world men oceanity world faeries xexis world demons referenced xak depicted game introduction adventure main hero xak series latok kart exploring vast region situated around single central village banuwa xak protagonist latok kart fought defeated demon zemu badu one badu minions escaped black-robed man known necromancer three years later necromancer able contact one allies demon world xexis fearsome demon called zamu gospel following prophecy foretold ancient extremely powerful sorcerer name amadok necromancer three demons referred demonlords attempting complete dark ritual revive zamu gospel world xak player controls latok nineteen years age rumour whereabouts latok father dork surfaced around village banuwa latok faerie companion pixie travel village investigate soon run gospel minions latok playable character game faerie pixie accompanies throughout game comments latok actions controllable player however notable non-player characters latok pixie meet include xak ii follows structure predecessor game proceeds player finding way labyrinthine maps defeating opposing monsters way map puzzles solved keys npcs objects found gain entrance room boss dwells defeating boss player proceed towards next map structure repeats various sub-quests involving npcs present obligatory combat real-time player character walks around game maps well monster characters character attack defense rating player latok swing sword pressing action key monster character near enough sustain damage monsters damage latok touching hitting projectiles combat system requires manual dexterity especially boss fights—bosses generally several times larger latok msx2 xak ii displayed screen 256x212 display resolution game uses scrolling display map scrolls away player character reaches distance screen side 1/3 total display due larger amount memory available 256x212 display compared 512x212 one game scrolling markedly smoother xak game music supports internal psg sound system well optional msx-music style heard microcabin productions msx psg channels used main melody sound effects msx-music channels used supporting instruments prominence psg less marked first game
[ 7354, 4206 ]
Validation
2,956
1
Database_testing:database testing database testing usually consists layered process including user interface ui layer business layer data access layer database ui layer deals interface design database business layer includes databases supporting business strategies databases collection interconnected files server storing information may deal type data i.e databases may heterogeneous result many kinds implementation integration errors may occur large database systems negatively affect system performance reliability consistency security thus important test order obtain database system satisfies acid properties atomicity consistency isolation durability database management system one critical layers data access layer deals databases directly communication process database testing mainly takes place layer involves testing strategies quality control quality assurance product databases testing different layers frequently used maintain consistency database systems commonly seen following examples figure indicates areas testing involved different database testing methods black-box testing white-box testing black-box testing involves testing interfaces integration database includes help techniques functionality database tested thoroughly pros cons black box testing include test case generation black box testing fairly simple generation completely independent software development done early stage development consequence programmer better knowledge design database application uses less time debugging cost development black box test cases lower development white box test cases major drawback black box testing unknown much program tested also certain errors detected white-box testing mainly deals internal structure database specification details hidden user main advantage white box testing database testing coding error detected internal bugs database eliminated limitation white box testing sql statements covered generating test cases database testing semantics sql statement need reflected test cases purpose technique called white box database application technique whodate used shown figure sql statements independently converted gpl statements followed traditional white box testing generate test cases include sql semantics set fixture describes initial state database entering testing setting fixtures database behavior tested defined test cases depending outcome test cases either modified kept tear stage either results terminating testing continuing test cases successful database testing following workflow executed single test commonly executed
[ 4950, 1254, 1695, 2054, 7715, 2663, 2124 ]
Test
2,957
3
Movidius:movidius movidius company based san mateo california designs specialised low-power processor chips computer vision company acquired intel september 2016 movidius co-founded dublin 2005 sean mitchell david moloney 2006 2016 raised nearly 90 million capital funding may 2013 company appointed remi el-ouazzane ceo january 2016 company announced partnership google movidius active google project tango project movidius announced planned acquisition intel september 2016 company myriad 2 chip always-on manycore vision processing unit function power-constrained devices fathom usb stick containing myriad 2 processor allowing vision accelerator added devices using arm processors including pcs drones robots iot devices video surveillance tasks identifying people objects run 80 150 gflops little 1w power intel myriad x vpu vision processing unit third generation advanced vpu movidius intel company intel myriad x vpu first class feature neural compute engine—a dedicated hardware accelerator deep neural network deep-learning inferences neural compute engine conjunction 16 shave cores ultra-high throughput intelligent memory fabric makes myriad x strong option on-device deep neural networks computer vision applications intel myriad x vpu received additional upgrades imaging vision engines including additional programmable shave cores upgraded expanded vision accelerators new native 4k image processor pipeline support 8 hd sensors connecting directly vpu myriad 2 myriad x vpu programmable via myriad development kit mdk includes necessary development tools frameworks apis implement custom vision imaging deep neural network workloads chip intel movidius neural compute stick ncs tiny fanless deep-learning device used learn ai programming edge ncs powered low-power high-performance intel movidius vision processing unit found millions smart security cameras gesture-controlled drones industrial machine vision equipment supported frameworks tensorflow caffe 14 november 2018 company announced latest version ncs marketed neural compute stick 2 ai devcon event beijing google clips camera uses myriad 2 vpu
[ 2538, 4479, 5371 ]
Test
2,958
8
Netscape_Application_Server:netscape application server netscape application server integrated software platform developing running transaction-oriented business applications web developed originally kiva software netscape acquired 1997 netscape sun microsystems formed sun-netscape alliance 1999 netscape application server chosen basis iplanet application server offering netdynamics application server acquired sun 1998
[ 6270, 2945, 4755, 348 ]
Test
2,959
3
Digital_Packet_Video_Link:digital packet video link digital packet video link dpvl video standard released vesa 2004 unlike previous technologies order save bandwidth portions screen modified sent means link dpvl also introduces metadata video attributes support dpvl standard aimed mobile wireless hardware
[ 6306 ]
Validation
2,960
7
Cooperative_storage_cloud:cooperative storage cloud cooperative storage cloud decentralized model networked online storage data stored multiple computers nodes hosted participants cooperating cloud cooperative scheme viable total storage contributed aggregate must least equal amount storage needed end users however nodes may contribute less storage may contribute may reward models compensate nodes contributing unlike traditional storage cloud cooperative directly employ dedicated servers actual storage data thereby eliminating need significant dedicated hardware investment node cooperative runs specialized software communicates centralized control orchestration server thereby allowing node consume contribute storage space cloud centralized control orchestration server requires several orders magnitude less resources storage computing power bandwidth operate relative overall capacity cooperative files hosted cloud fragmented encrypted leaving local machine distributed randomly using load balancing geo-distribution algorithm nodes cooperative users add additional layer security reduce storage space compressing encrypting files copied cloud order maintain data integrity high availability across relatively unreliable set computers wide area network like internet source node add level redundancy data block allows system recreate entire block even nodes temporarily unavailable due loss network connectivity machine powered hardware failure storage bandwidth efficient forms redundancy use erasure coding techniques like reed-solomon simple less cpu intensive expensive form redundancy duplicate copies due bandwidth hardware constraints nodes may able contribute much space consume cloud hand nodes large storage space limited bandwidth constraints may contribute consume thereby cooperative stay balance university california oceanstore project mit chord non-commercial example june 1 2016 minebox gmbh announced forthcoming minebox networked attached storage device nas utilize sia network persist backups users minebox also able rent free disk space via sia partly centralized system operated symform inc. startup company based seattle symform generated kept keys used encrypt decrypt since also decided server host parts file users trust symform share party misuse information symform discontinued service july 31 2016
[ 6025, 2961, 1254, 2566, 1329, 5889 ]
Validation
2,961
7
Cloud_computing:cloud computing cloud computing on-demand availability computer system resources especially data storage computing power without direct active management user term generally used describe data centers available many users internet large clouds predominant today often functions distributed multiple locations central servers connection user relatively close may designated edge server clouds may limited single organization enterprise clouds available many organizations public cloud cloud computing relies sharing resources achieve coherence economies scale advocates public hybrid clouds note cloud computing allows companies avoid minimize up-front infrastructure costs proponents also claim cloud computing allows enterprises get applications running faster improved manageability less maintenance enables teams rapidly adjust resources meet fluctuating unpredictable demand cloud providers typically use pay-as-you-go model lead unexpected operating expenses administrators familiarized cloud-pricing models availability high-capacity networks low-cost computers storage devices well widespread adoption hardware virtualization service-oriented architecture autonomic utility computing led growth cloud computing 2019 linux used type operating systems used including microsoft offerings thus described dominant cloud computing popularized amazon.com releasing elastic compute cloud product 2006 references phrase cloud computing appeared early 1996 first known mention compaq internal document cloud symbol used represent networks computing equipment original arpanet early 1977 csnet 1981—both predecessors internet word cloud used metaphor internet standardized cloud-like shape used denote network telephony schematics simplification implication specifics end points network connected relevant purposes understanding diagram term cloud used refer platforms distributed computing early 1993 apple spin-off general magic used describing paired telescript personalink technologies wired april 1994 feature bill andy excellent adventure ii andy hertzfeld commented telescript general magic distributed programming language 1960s initial concepts time-sharing became popularized via rje remote job entry terminology mostly associated large vendors ibm dec. full-time-sharing solutions available early 1970s platforms multics ge hardware cambridge ctss earliest unix ports dec hardware yet data center model users submitted jobs operators run ibm mainframes overwhelmingly predominant 1990s telecommunications companies previously offered primarily dedicated point-to-point data circuits began offering virtual private network vpn services comparable quality service lower cost switching traffic saw fit balance server use could use overall network bandwidth effectively began use cloud symbol denote demarcation point provider responsible users responsible cloud computing extended boundary cover servers well network infrastructure computers became diffused scientists technologists explored ways make large-scale computing power available users time-sharing experimented algorithms optimize infrastructure platform applications prioritize cpus increase efficiency end users use cloud metaphor virtualized services dates least general magic 1994 used describe universe places mobile agents telescript environment could go described andy hertzfeld use cloud metaphor credited general magic communications employee david hoffman based long-standing use networking telecom addition use general magic also used promoting associated personalink services cloud computing existence since 2000 august 2006 amazon created subsidiary amazon web services introduced elastic compute cloud ec2 april 2008 google released google app engine beta early 2008 nasa opennebula enhanced reservoir european commission-funded project became first open-source software deploying private hybrid clouds federation clouds mid-2008 gartner saw opportunity cloud computing shape relationship among consumers services use services sell observed organizations switching company-owned hardware software assets per-use service-based models projected shift computing ... result dramatic growth products areas significant reductions areas 2008 u.s. national science foundation began cluster exploratory program fund academic research using google-ibm cluster technology analyze massive amounts data february 2010 microsoft released microsoft azure announced october 2008 july 2010 rackspace hosting nasa jointly launched open-source cloud-software initiative known openstack openstack project intended help organizations offering cloud-computing services running standard hardware early code came nasa nebula platform well rackspace cloud files platform open source offering along open-source solutions cloudstack ganeti opennebula attracted attention several key communities several studies aim comparing open sources offerings based set criteria march 1 2011 ibm announced ibm smartcloud framework support smarter planet among various components smarter computing foundation cloud computing critical part june 7 2012 oracle announced oracle cloud cloud offering poised first provide users access integrated set solutions including applications saas platform paas infrastructure iaas layers may 2012 google compute engine released preview rolled general availability december 2013 2019 revealed linux used microsoft azure dominant elsewhere goal cloud computing allow users take benefit technologies without need deep knowledge expertise one cloud aims cut costs helps users focus core business instead impeded obstacles main enabling technology cloud computing virtualization virtualization software separates physical computing device one virtual devices easily used managed perform computing tasks operating system–level virtualization essentially creating scalable system multiple independent computing devices idle computing resources allocated used efficiently virtualization provides agility required speed operations reduces cost increasing infrastructure utilization autonomic computing automates process user provision resources on-demand minimizing user involvement automation speeds process reduces labor costs reduces possibility human errors cloud computing uses concepts utility computing provide metrics services used cloud computing attempts address qos quality service reliability problems grid computing models cloud computing shares characteristics cloud computing exhibits following key characteristics national institute standards technology definition cloud computing identifies five essential characteristics though service-oriented architecture advocates everything service acronyms eaas xaas simply aas cloud-computing providers offer services according different models three standard models per nist infrastructure service iaas platform service paas software service saas models offer increasing abstraction thus often portrayed layers stack infrastructure- platform- software-as-a-service need related example one provide saas implemented physical machines bare metal without using underlying paas iaas layers conversely one run program iaas access directly without wrapping saas infrastructure service iaas refers online services provide high-level apis used dereference various low-level details underlying network infrastructure like physical computing resources location data partitioning scaling security backup etc hypervisor runs virtual machines guests pools hypervisors within cloud operational system support large numbers virtual machines ability scale services according customers varying requirements linux containers run isolated partitions single linux kernel running directly physical hardware linux cgroups namespaces underlying linux kernel technologies used isolate secure manage containers containerisation offers higher performance virtualization hypervisor overhead also container capacity auto-scales dynamically computing load eliminates problem over-provisioning enables usage-based billing iaas clouds often offer additional resources virtual-machine disk-image library raw block storage file object storage firewalls load balancers ip addresses virtual local area networks vlans software bundles nist definition cloud computing describes iaas consumer able deploy run arbitrary software include operating systems applications consumer manage control underlying cloud infrastructure control operating systems storage deployed applications possibly limited control select networking components e.g. host firewalls iaas-cloud providers supply resources on-demand large pools equipment installed data centers wide-area connectivity customers use either internet carrier clouds dedicated virtual private networks deploy applications cloud users install operating-system images application software cloud infrastructure model cloud user patches maintains operating systems application software cloud providers typically bill iaas services utility computing basis cost reflects amount resources allocated consumed nist definition cloud computing defines platform service paas vendors offer development environment application developers provider typically develops toolkit standards development channels distribution payment paas models cloud providers deliver computing platform typically including operating system programming-language execution environment database web server application developers develop run software cloud platform instead directly buying managing underlying hardware software layers paas underlying computer storage resources scale automatically match application demand cloud user allocate resources manually integration data management providers also use specialized applications paas delivery models data examples include ipaas integration platform service dpaas data platform service ipaas enables customers develop execute govern integration flows ipaas integration model customers drive development deployment integrations without installing managing hardware middleware dpaas delivers integration—and data-management—products fully managed service dpaas model paas provider customer manages development execution programs building data applications customer dpaas users access data data-visualization tools platform service paas consumers manage control underlying cloud infrastructure including network servers operating systems storage control deployed applications possibly configuration settings application-hosting environment nist definition cloud computing defines software service software service saas model users gain access application software databases cloud providers manage infrastructure platforms run applications saas sometimes referred on-demand software usually priced pay-per-use basis using subscription fee saas model cloud providers install operate application software cloud cloud users access software cloud clients cloud users manage cloud infrastructure platform application runs eliminates need install run application cloud user computers simplifies maintenance support cloud applications differ applications scalability—which achieved cloning tasks onto multiple virtual machines run-time meet changing work demand load balancers distribute work set virtual machines process transparent cloud user sees single access-point accommodate large number cloud users cloud applications multitenant meaning machine may serve one cloud-user organization pricing model saas applications typically monthly yearly flat fee per user prices become scalable adjustable users added removed point proponents claim saas gives business potential reduce operational costs outsourcing hardware software maintenance support cloud provider enables business reallocate operations costs away hardware/software spending personnel expenses towards meeting goals addition applications hosted centrally updates released without need users install new software one drawback saas comes storing users data cloud provider server result could unauthorized access data mobile backend service model also known backend service baas web app mobile app developers provided way link applications cloud storage cloud computing services application programming interfaces apis exposed applications custom software development kits sdks services include user management push notifications integration social networking services relatively recent model cloud computing baas startups dating 2011 later trends indicate services gaining significant mainstream traction enterprise consumers serverless computing cloud computing code execution model cloud provider fully manages starting stopping virtual machines necessary serve requests requests billed abstract measure resources required satisfy request rather per virtual machine per hour despite name actually involve running code without servers serverless computing named business person owns system purchase rent provision servers virtual machines back-end code run function service faas service-hosted remote procedure call leverages serverless computing enable deployment individual functions cloud run response events faas included broader term serverless computing terms may also used interchangeably private cloud cloud infrastructure operated solely single organization whether managed internally third party hosted either internally externally undertaking private cloud project requires significant engagement virtualize business environment requires organization reevaluate decisions existing resources improve business every step project raises security issues must addressed prevent serious vulnerabilities self-run data centers generally capital intensive significant physical footprint requiring allocations space hardware environmental controls assets refreshed periodically resulting additional capital expenditures attracted criticism users still buy build manage thus benefit less hands-on management essentially lacking economic model makes cloud computing intriguing concept cloud called public cloud services rendered network open public use public cloud services may free technically may little difference public private cloud architecture however security consideration may substantially different services applications storage resources made available service provider public audience communication effected non-trusted network generally public cloud service providers like amazon web services aws ibm oracle microsoft google operate infrastructure data center access generally via internet aws oracle microsoft google also offer direct connect services called aws direct connect oracle fastconnect azure expressroute cloud interconnect respectively connections require customers purchase lease private connection peering point offered cloud provider hybrid cloud composition public cloud private environment private cloud on-premise resources remain distinct entities bound together offering benefits multiple deployment models hybrid cloud also mean ability connect collocation managed and/or dedicated services cloud resources gartner defines hybrid cloud service cloud computing service composed combination private public community cloud services different service providers hybrid cloud service crosses isolation provider boundaries ca n't simply put one category private public community cloud service allows one extend either capacity capability cloud service aggregation integration customization another cloud service varied use cases hybrid cloud composition exist example organization may store sensitive client data house private cloud application interconnect application business intelligence application provided public cloud software service example hybrid cloud extends capabilities enterprise deliver specific business service addition externally available public cloud services hybrid cloud adoption depends number factors data security compliance requirements level control needed data applications organization uses another example hybrid cloud one organizations use public cloud computing resources meet temporary capacity needs met private cloud capability enables hybrid clouds employ cloud bursting scaling across clouds cloud bursting application deployment model application runs private cloud data center bursts public cloud demand computing capacity increases primary advantage cloud bursting hybrid cloud model organization pays extra compute resources needed cloud bursting enables data centers create in-house infrastructure supports average workloads use cloud resources public private clouds spikes processing demands specialized model hybrid cloud built atop heterogeneous hardware called cross-platform hybrid cloud cross-platform hybrid cloud usually powered different cpu architectures example x86-64 arm underneath users transparently deploy scale applications without knowledge cloud hardware diversity kind cloud emerges rise arm-based system-on-chip server-class computing community cloud shares infrastructure several organizations specific community common concerns security compliance jurisdiction etc whether managed internally third-party either hosted internally externally costs spread fewer users public cloud private cloud cost savings potential cloud computing realized cloud computing platform assembled distributed set machines different locations connected single network hub service possible distinguish two types distributed clouds public-resource computing volunteer cloud multicloud use multiple cloud computing services single heterogeneous architecture reduce reliance single vendors increase flexibility choice mitigate disasters etc differs hybrid cloud refers multiple cloud services rather multiple deployment modes public private legacy issues transferring large amounts data cloud well data security data cloud initially hampered adoption cloud big data much data originates cloud advent bare-metal servers cloud become solution use cases including business analytics geospatial analysis hpc cloud refers use cloud computing services infrastructure execute high-performance computing hpc applications applications consume considerable amount computing power memory traditionally executed clusters computers 2016 handful companies including r-hpc amazon web services univa silicon graphics international sabalcore gomput penguin computing offered high performance computing cloud penguin demand pod cloud one first non-virtualized remote hpc services offered pay-as-you-go basis penguin computing launched hpc cloud 2016 alternative amazon ec2 elastic compute cloud uses virtualized computing nodes cloud architecture systems architecture software systems involved delivery cloud computing typically involves multiple cloud components communicating loose coupling mechanism messaging queue elastic provision implies intelligence use tight loose coupling applied mechanisms others cloud engineering application engineering disciplines cloud computing brings systematic approach high-level concerns commercialization standardization governance conceiving developing operating maintaining cloud computing systems multidisciplinary method encompassing contributions diverse areas systems software web performance information technology engineering security platform risk quality engineering cloud computing poses privacy concerns service provider access data cloud time could accidentally deliberately alter delete information many cloud providers share information third parties necessary purposes law order without warrant permitted privacy policies users must agree start using cloud services solutions privacy include policy legislation well end users choices data stored users encrypt data processed stored within cloud prevent unauthorized access identity management systems also provide practical solutions privacy concerns cloud computing systems distinguish authorized unauthorized users determine amount data accessible entity systems work creating describing identities recording activities getting rid unused identities according cloud security alliance top three threats cloud insecure interfaces api data loss leakage hardware failure —which accounted 29 25 10 cloud security outages respectively together form shared technology vulnerabilities cloud provider platform shared different users may possibility information belonging different customers resides data server additionally eugene schultz chief technology officer emagined security said hackers spending substantial time effort looking ways penetrate cloud real achilles heels cloud infrastructure making big holes bad guys get data hundreds thousands companies stored large cloud servers hackers theoretically gain control huge stores information single attack—a process called hyperjacking examples include dropbox security breach icloud 2014 leak dropbox breached october 2014 7 million users passwords stolen hackers effort get monetary value bitcoins btc passwords able read private data well data indexed search engines making information public problem legal ownership data user stores data cloud cloud provider profit many terms service agreements silent question ownership physical control computer equipment private cloud secure equipment site someone else control public cloud delivers great incentive public cloud computing service providers prioritize building maintaining strong management secure services small businesses n't expertise security could find secure use public cloud risk end users understand issues involved signing cloud service persons sometimes n't read many pages terms service agreement click accept without reading important cloud computing becoming popular required services work example intelligent personal assistant apple siri google fundamentally private cloud seen secure higher levels control owner however public cloud seen flexible requires less time money investment user according bruce schneier downside limited customization options cloud computing cheaper economics scale and—like outsourced task—you tend get get restaurant limited menu cheaper personal chef cook anything want fewer options much cheaper price feature bug also suggests cloud provider might meet legal needs businesses need weigh benefits cloud computing risks cloud computing control back end infrastructure limited cloud vendor cloud providers often decide management policies moderates cloud users able deployment cloud users also limited control management applications data services includes data caps placed cloud users cloud vendor allocating certain amount bandwidth customer often shared among cloud users privacy confidentiality big concerns activities instance sworn translators working stipulations nda might face problems regarding sensitive data encrypted cloud computing beneficial many enterprises lowers costs allows focus competence instead matters infrastructure nevertheless cloud computing proven limitations disadvantages especially smaller business operations particularly regarding security downtime technical outages inevitable occur sometimes cloud service providers csps become overwhelmed process serving clients may result temporary business suspension since technology systems rely internet individual able access applications server data cloud outage cloud computing still subject research driving factor evolution cloud computing chief technology officers seeking minimize risk internal outages mitigate complexity housing network computing hardware in-house major cloud technology companies invest billions dollars per year cloud research development example 2011 microsoft committed 90 percent 9.6 billion r budget cloud research investment bank centaur partners late 2015 forecasted saas revenue would grow 13.5 billion 2011 32.8 billion 2016 issue carrying investigations cloud storage devices physically accessed generated number changes way digital evidence located collected new process models developed formalize collection scenarios existing digital forensics tools employed access cloud storage networked drives although slow process generating large amount internet traffic alternative approach deploy tool processes cloud organizations using office 365 'e5 subscription option use microsoft built-in ediscovery resources although provide functionality typically required forensic process
[ 7148, 7153, 4295, 7165, 7169, 22, 4318, 4319, 24, 1467, 5754, 7189, 1481, 2952, 62, 2960, 5778, 7214, 4364, 5780, 2969, 77, 1509, 1514, 88, 2988, 7242, 108, 5816, 1546, 1550, 1551, 1554, 7271, 3028, 4427, 142, 1582, 3041, 5861, 1585, ...
Test
2,962
7
Grid_Security_Infrastructure:grid security infrastructure grid security infrastructure gsi formerly called globus security infrastructure specification secret tamper-proof delegatable communication software grid computing environment secure authenticatable communication enabled using asymmetric encryption authentication performed using digital signature technology see digital signatures explanation works secure authentication allows resources lock data access authentication introduces problem often service retrieve data resource independent user order must supplied appropriate privileges gsi allows creation delegated privileges new key created marked delegated signed user possible service act behalf user fetch data resource communications may secured using combination methods
[ 6049, 4159, 1293, 7930, 3426 ]
Test
2,963
9
Pattern_directed_invocation_programming_language:pattern directed invocation programming language computer science pattern-directed invocation programming languages programming languages procedures invoked indirectly specifying pattern set procedures opposed specifying one directly name pointer url etc. conventional programming languages initiated planner featured high level plans invoked patterns assertions goals include logic programming languages prolog special case ether pattern-directed invocation language introduced scientific community metaphor pattern-directed invocation commonly used practical alternative first-order theorem proving automated theorem proving primary method implementing blackboard system automated reasoning general database facts la prolog augmented set procedures called demons demon automatically invoked whenever term matching demon pattern added database pattern-directed invocation related rule-based programming
[]
Test
2,964
7
SAP_Anywhere:sap anywhere sap anywhere front office software package sap se sap small medium sized enterprises smbs 10 500 employees early 2018 sap decided sunset product focus smb market established sap business one sap business bydesign erp solutions sap anywhere includes several front office applications intended help retail wholesale businesses market sell products services multiple sales channels including in-store direct sales online system facilitates effective customer relationship management allowing business owners review direct marketing inventory direct customer experiences using single system mobile devices according research firm international data corporation idc many small businesses struggle date processes fail optimise online business tools e-commerce increasing factor maintaining relationships customers sap anywhere intended allow small businesses take advantage digital revolution increase customer reach e-commerce business-to-business b2b business-to-consumer b2c channels president global channels general business sap rodolpho cardenuto said 2016 “ 79 million small midsize companies worldwide lifeblood economy sap anywhere primarily used smbs 20 clients falling outside smb category sap anywhere launched sap china telecom 20 october 2015 mainland china sap german multinational software corporation headquartered walldorf baden-württemberg germany founded 1972 sap focuses creating enterprise software 2014 sap created new division focus smb small-medium business customers smb solutions group smb software preceding sap anywhere includes china telecom established 2000 largest fixed-line service provider people ’ republic china third largest mobile telecommunication provider china developing sap anywhere sap utilised telecommunications infrastructure china telecom developed product customised chinese market smbs represent two thirds businesses china initial plans release focused building strong customer base china expanding markets due competitive pressure sap released sap anywhere english-speaking market earlier planned uk availability announced march 2016 us availability announced may 2016 canadian pilot currently planned 2016 sap anywhere cloud based saas software service delivered sap public cloud amazon cloud us market sap anywhere accessed mobile devices desktops includes applications sap anywhere uses sap hana enables data captured mined real time allowing accurate inventory sales order management across multiple channels sap anywhere integrates constant contact mailchimp payment gateways like paypal stripe sap anywhere uses secure transactions secure sockets layer ssl protection well sap anywhere integrated delivery company ups sap anywhere allows businesses utilise google productivity collaboration tools interact customers google apps integration internal back office enterprise resource planning applications like hr finance also available
[ 1229, 330 ]
Test
2,965
7
Oracle_Fusion_Applications:oracle fusion applications oracle fusion applications ofa enterprise resource planning software applications oracle corporation applications distributed across various product families including financial management human capital management customer relationship management supply chain management procurement governance project portfolio oracle fusion applications announced shortly oracle 18 billion usd acquisition spree peoplesoft jd edwards siebel systems 2005 oracle fusion applications envisioned pitched enterprise resource planning suite—a combination features functionalities taken oracle e-business suite jd edwards peoplesoft siebel product lines suite built top oracle fusion middleware technology stack layers implement oracle fusion architecture leverages capabilities service-oriented architecture oracle fusion applications launched september 2010 released one year later openworld 2011
[ 4482, 7368, 1115 ]
Test
2,966
7
RethinkDB:rethinkdb rethinkdb free open-source distributed document-oriented database originally created company name database stores json documents dynamic schemas designed facilitate pushing real-time updates query results applications initially seed funded combinator june 2009 company announced october 2016 unable build sustainable business products would future entirely open-sourced without commercial support cncf cloud native computing foundation purchased rights rethinkdb source code contributed linux foundation rethinkdb founded 2009 open-sourced version 1.2 2012 2015 rethinkdb released version 2.0 announcing production-ready october 5 2016 company announced shutting transitioning members engineering team stripe would longer offer production support february 6 2017 cloud native computing foundation purchased rights source code relicensed apache license 2.0 rethinkdb uses reql query language internal embedded domain-specific language officially available ruby python java javascript including node.js support table joins groupings aggregations functions also unofficial community-supported drivers languages including c clojure erlang go haskell lua php according db-engines ranking february 2016 46th popular database distinguishing feature rethinkdb first class support real-time change feeds change query returns cursor allows blocking non-blocking requests keep track potentially infinite stream real-time changes due seeming stagnation rethinkdb forked members community may 17 2018 new project called rebirthdb also hosted github project later merged back original repository
[ 2740, 6029, 2451, 3368, 5965, 5571, 7848, 578, 4439, 993, 6428 ]
Test
2,967
5
PME_Aggregation_Function:pme aggregation function pme aggregation function paf computer networking mechanism defined clause 61 ieee 802.3 standard allows one physical medium entities pmes combined together form single logical ethernet link paf located physical coding sublayer pcs media access control mac -phy rate matching function transmission convergence tc sublayer interfaces pmes across λ-interface mac-phy rate matching function using abstract interface paf optional function defined 2007 two ieee 802.3 interfaces 2base-tl 10pass-ts ethernet first mile efm copper physical layers pme aggregation function following characteristics paf transmit function works fragmenting incoming ethernet frames number fragments limited size range 64 512 bytes sequential fragmentation header prepended fragment indicating fragment start-of-packet end-of-packet middle packet frame check sequence fcs appended fragment transmitted next available active pme aggregated group following diagram illustrates paf fragmentation paf receive function reassembles original frames received fragments buffered per-mac fragment buffer algorithm uses fragmentation header make sure reassembled frames order pme aggregation function first defined ieee 802.3ah 2004 original loop aggregation proposal submitted klaus fosmark defunct first mile systems 2001 later referenced itu-t g.998.2 ethernet-based multi-pair bonding ansi equivalent nipp-nai t1.427.02 paf algorithm fragmentation header similar mlppp works layer 3 ip paf asymmetric protocol i.e information required reassembly contained fragmentation header sent fragment allowing great flexibility transmitter receiver implementations requires overhead consuming 5 bandwidth estimation 2base-tl protocol including 64b/65b encapsulation paf optimized ethernet traffic inverse multiplexing atm ima another aggregation protocol unlike paf uses fixed size cells sending across multiple links round-robin fashion ima optimized atm extreme cases short ethernet frames may add much 40 overhead due aal5 encapsulation itu-t g.998.3 multi-pair bonding using time-division inverse multiplexing specification a.k.a g.bond/tdim defines symmetric aggregation protocol sides point-to-point link exchange information aggregation need separate header g.bond/tdim optimized time-division multiplexing packet traffic less 3 overhead estimation ethernet traffic including generic framing procedure gfp encapsulation
[ 4667, 2121, 6265 ]
Test
2,968
3
Intel_82288:intel 82288 intel 82288 bus controller designed intel 80286 chip supplied 20-pin dip package replaces 8288 used earlier processors
[ 2036, 4507 ]
Test
2,969
2
Yield_(multithreading):yield multithreading computer science yield action occurs computer program multithreading forcing processor relinquish control current running thread sending end running queue scheduling priority different programming languages implement yielding various ways coroutines fine-grained concurrency primitive may required yield explicitly may enable specifying another function take control coroutines explicitly yield allow cooperative multitasking
[ 553, 5371, 5559, 4049, 4318, 3458, 1435, 5042, 4154, 1481, 5939, 4159, 1023, 1295, 5947, 3041, 240, 1586, 515, 8024, 2961, 3578, 4993, 5447, 357, 2266, 5890 ]
Test
2,970
3
TuxOnIce:tuxonice tuxonice formerly known suspend2 implementation suspend-to-disk hibernate feature available patches 2.6 linux kernel 2.5 kernel era pavel machek forked original out-of-tree version swsusp approximately beta 10 got merged vanilla kernel development continued swsusp/suspend2/tuxonice line tuxonice includes support smp highmem preemption major advantages swsusp tuxonice originally called 'suspend2 beta releases time pavel forked code base 1.0 release 2.0 release name 'suspend2 developed contraction 'software suspend 2.x efforts made time merge tuxonice vanilla kernel opposed pavel primarily seems pavel believes much suspend-to-disk process run userspace see uswsusp nigel cunningham thinks code belongs kernel nigel stated desire frustration getting tuxonice specific features merged back mainline currently actively pursuing
[ 2182, 3613, 7528, 7532, 2204, 5744, 6443, 2942, 4341, 5762, 3666, 2266, 5453, 7242, 1535, 1924, 6892, 1176, 1933, 1208, 6211, 5865, 7669, 1227, 1596, 165, 7312, 1607, 5884, 1991, 6984, 5571, 578, 4877, 5580, 2765, 4174, 7038, 976, 5627, ...
Test
2,971
1
International_Thylacine_Specimen_Database:international thylacine specimen database international thylacine specimen database itsd culmination four-year research project catalogue digitally photograph known surviving specimen material thylacine thylacinus cynocephalus tasmanian tiger held within museum university private collections itsd first published electronic resource series three cd-roms april 2005 updated july 2006 completely revised may 2009 released single dvd totalling 3.68 gb data images itsd designed free access academic tool promote facilitate undergraduate postgraduate research species accessed offices curators heads department universities museums hold thylacine material alternatively libraries several major zoological societies itsd lists available catalogue data individual specimen e.g holding institution catalogue identification number sex date acquisition specimen type source locality collector field number old additional catalogue numbers purchase exchange information finally additional remarks pertaining specimen support data component significantly enhance educational worth high-resolution digital images specimens included itsd specimen image bank forms largest single photographic resource kind anywhere world primary justification including digital images specimen material within itsd comprises skins skeletons skulls taxidermy mounts wet specimens wet specimens whole animals organs body parts preserved either alcohol formalin specimens thylacine spread extensively around globe search locate specimens outset international search involving total 106 museum university private collections 23 countries master copy itsd held zoological society london mirror copies held within university tasmania hobart australian national wildlife collection canberra queen victoria museum art gallery launceston master mirror copies kept constantly revised updated new information comes light zoological society chosen hold master copy itsd historic association thylacine bulk early scientific papers species published within proceedings society zoo regent park exhibited thylacines zoo outside australia year royal zoological society new south wales hosts whitley awards awards tribute gilbert whitley eminent australian ichthyologist presented outstanding publications contain significant amount new information relating fauna australasian region september 2005 international thylacine specimen database awarded whitley award best zoological database first time history awards whitley citation presented database
[]
Test
2,972
4
IOActive:ioactive ioactive independent computer security company active several areas known reporting high severity security vulnerabilities variety products ioactive offices seattle london dubai madrid
[ 3932, 595, 1748, 1805 ]
Test
2,973
8
P3P:p3p platform privacy preferences project p3p obsolete protocol allowing websites declare intended use information collect web browser users designed give users control personal information browsing p3p developed world wide web consortium w3c officially recommended april 16 2002 development ceased shortly thereafter implementations p3p microsoft internet explorer edge major browsers support p3p microsoft ended support windows 10 onwards microsoft internet explorer edge windows 10 longer support p3p president truste stated p3p implemented widely due difficulty lack value world wide web became genuine medium sell products services electronic commerce websites tried collect information people purchased merchandise companies used controversial practices tracker cookies ascertain users demographic information buying habits using information provide specifically targeted advertisements users saw invasion privacy would sometimes turn http cookies use proxy servers keep personal information secure p3p designed give users precise control kind information allow release according w3c main goal p3p “ increase user trust confidence web technical empowerment. ” p3p machine-readable language helps express website ’ data management practices p3p manages information privacy policies website uses p3p set set policies allows state intended uses personal information may gathered site visitors user decides use p3p set set policies state personal information allow seen sites visit user visits site p3p compare personal information user willing release information server wants get – two match p3p inform user ask he/she willing proceed site risk giving personal information example user may store browser preferences information browsing habits collected policy website states cookie used purpose browser automatically rejects cookie main content privacy policy following privacy policy retrieved xml file included compact form http header location xml policy file applies given document p3p allows specify codice_1 caching dummy /w3c/p3p.xml file could use feature microsoft internet explorer edge mainstream web browsers supported p3p browsers implemented due perceived lack value provides ie provides ability display p3p privacy policies compare p3p policy browser settings decide whether allow cookies particular site however p3p functionality internet explorer extends cookie blocking alert user entire web site violates active privacy preferences microsoft considers feature deprecated browsers totally removed p3p support windows 10 mozilla supported p3p features years p3p related source code removed 2007 privacy finder service also created carnegie mellon usable privacy security laboratory publicly available p3p-enabled search engine user enter search term along stated privacy preferences presented list search results ordered based whether sites comply preferences works crawling web maintaining p3p cache every site ever appears search query cache updated every 24 hours every policy guaranteed relatively date service also allows users quickly determine site comply preferences well allowing view dynamically generated natural language privacy policy based p3p data advantageous simply reading original natural language privacy policy web site many privacy policies written legalese extremely convoluted additionally case user visit web site read privacy policy p3p allows browsers understand privacy policies simplified organized manner rather searching throughout entire website setting privacy settings certain level user enables p3p automatically block cookies user might want computer additionally w3c explains p3p allow browsers transfer user data services ultimately promoting online sharing community additionally p3p toolbox developed internet education foundation recommends anyone concerned increasing users ’ trust privacy consider implementing p3p p3p toolbox site explains companies taken individuals data order promote new products services furthermore recent years companies taken individuals information created profiles market without individual consent moreover data misused consumers pay price become worrisome issues junk mail identity theft forms discrimination therefore implementing p3p protocol good beneficial internet browsers moreover since increase browsers users risk running privacy problems internet education foundation points “ p3p developed help steer force technology step toward automatic communication data management practices individual privacy preferences. ” electronic privacy information center epic critical p3p believes p3p makes difficult users protect privacy 2002 assessed p3p referred technology “ pretty poor policy ” according epic p3p software complex difficult average person understand many internet users unfamiliar use default p3p software computers install additional p3p software another concern websites obligated use p3p neither internet users moreover epic website claims p3ps protocol would become burdensome browser beneficial efficient intended key problem occurs use p3p lack enforcement thus promises made users p3p go unfulfilled though using p3p company/website makes promise privacy use gathered data site ’ users real legal ramifications company decides use information functions currently actual laws passed united states data protection though ideally companies honest use customers personal information binding reason company must actually adhere rules says comply though using p3p technically qualifies contract lack federal regulation downplays need companies abide agreement use p3p puts place unenforceable promises also prolongs adoption federal laws would actually inhibit access ability use private information government step attempt protect internet users federal laws information accessed specific regulations user information used companies ’ maintain leeway use information please despite may actually tell users 2002 epic employee chris hoofnagle argued p3p displacing chances government regulation privacy critics p3p also argue non-compliant sites excluded according study done cylab privacy interest group carnegie mellon university 15 top 5,000 websites incorporate p3p therefore many sites ’ include code practice high privacy standards accessible users use p3p online privacy guide epic also talks development implementation p3p cause monopoly private information since tends major companies implement p3p websites major companies tending gather information seeing privacy policies compare privacy preferences users epic website says incredible complexity p3p combined way popular browsers likely implement protocol would seem preclude privacy-protective technology epic continues state rather p3p may actually strengthen monopoly position personal information u.s. data marketers enjoy failure immediate adoption related idea notice choice approach ’ comply fair information practices according chairman ftc privacy laws key today ’ society order protect consumer providing much personal information others ’ benefit believe limit collection use consumer ’ personal data online currently sites required united states laws comply privacy policies publish therefore p3p causes controversy consumers concerned release personal information able rely p3p ’ protocol protect privacy michael kaply ibm reported saying following mozilla foundation considering removal p3p support browser-line 2004 ah memories ibm wrote original p3p implementation netscape proceeded write companies wasted immense amounts time everyone thought crappy proposal begin remove live leer pr manager opera software explained 2001 deliberate lack p3p support browser moment n't sure whether p3p best solution p3p among specifications considering support future issues well p3p protect privacy reason decided wait resolved p3p user agents option available internet users want ensure privacy several main alternatives p3p include using web browsers privacy mode anonymous e-mailers anonymous proxy servers main alternative p3p may technologies instead stronger laws regulate kind information internet users collected retained websites example europe data protection directive provides individuals certain set principles personal information collected person rights protecting personal data act allows individuals control type information collected various principles included within act rule individual right retrieve data collected time certain conditions moreover individual personal information kept longer necessary personal information released others unless individual gives consent currently united states federal law protecting privacy personal information shared online however sectoral laws federal state level offer protection certain types information collected individuals example fair credit reporting act fcra 1970 makes legal consumer reporting agencies disclose personal information three specified circumstances credit employment insurance evaluation government grant license “ legitimate business need ” involves consumer list sectoral privacy laws united states viewed consumer privacy guide website many groups working future p3p make easier people use groups transparent accountable datamining initiative tami group mit ’ computer science artificial intelligence laboratory goal tami create technical legal policy foundations transparency accountability large-scale aggregation tami hopes help people manage privacy risks world technology constantly changing policy aware web paw scalable mechanism exchange rules proofs unlimited access control web “ creates system policy aware infrastructure using systematic web rules language theorem prover ”
[ 1998, 8154, 5631, 5542, 5637, 4126, 7628, 3363, 6092, 7537, 2489, 5500, 84, 6221, 4635, 3057, 7411, 3338, 4743, 1609, 7315, 87 ]
Test
2,974
7
Commotion_Wireless:commotion wireless commotion wireless open-source wireless mesh network electronic communication project developed open technology institute development included 2 million grant united states department state 2011 use mobile ad hoc network manet concomitant arab spring preliminarily deployed detroit late 2012 launched generally march 2013 project called internet suitcase commotion 1.0 first non-beta release launched december 30 2013 commotion relies several open source projects olsr openwrt openbts serval project ubiquiti tp-link mikrotik
[ 427, 7289 ]
Test
2,975
8
Lamebook:lamebook lamebook blog re-posts 'everything lame funny social networking site facebook users send screenshots unusual amusing facebook posts re-posted site every weekday jonathan standefer matthew genitempo graphic designers austin texas launched web site april 2009 facebook parody site two acquaintances baylor university yet became friends graduated 2005 started lamebook little meeting months got popular able quit jobs offices full time said genitempo graduated 2007 degree graphic design brought lot different design opportunities us last names faces blurred pixellated upon upload avoid invasion privacy content removed request lamebook also discourages users trying contact people seen posts sites lamebook would existence without concept oversharing overshare word year 2008 webster new world® college dictionary defined much information either intentionally accidentally revealed editors webster new world explain new word old phenomenon made much easier emergence modern technology ease combined wide reach many social networking sites allow users made oversharing quite common occurrence today according huffington post online oversharers 32 say experienced poster ’ remorse regretted posting certain information lamebook cocreator jonathan standefer quoted saying people overshare internet favorite ones used mushy ones fights funniest like fighting drunk one friends everyone else room views lamebook forum people vent inappropriate cringe-worthy things inevitably seen facebook glamour magazine described facebook personal confession booth air dirty laundry sitting behind computer screen people often forget everyone else room facebook anything posted outside private message seen many people one communicated leads kinds content people submit lamebook couple fights inappropriate pictures embarrassing statuses etc march 2010 facebook contacted lamebook alleging website infringed diluted facebook trademark requested lamebook cease desist using lamebook mark change name look website 4 november 2010 lamebook filed legal action facebook seeking declaration website infringe rights facebook protection parody first amendment response 11 november facebook sued lamebook trademark infringement claiming site parody provide critique comment facebook 22 november 2010 facebook confirmed deleted lamebook fan page blocked 'like function lamebook powered facebook blocked facebook users able type word lamebook facebook facebook cto bret taylor later conceded mistake part process dealing routine trademark violation issue regarding links posted facebook blocked mentions phrase “ lamebook ” facebook committed promoting free expression facebook apologize mistake case working fix process led happening conor civins one lamebook lawyers said lamebook parody website supposed social commentary protected free speech lamebook website litigation process banner asking viewers support efforts facebook read really love running lamebook aside laughs represents opportunity work incredibly fun project buddies makes lot people happy still allows us make rent end month … problem facebook ’ get joke ’ decided pick little guys small business owners seem match multi-billion dollar behemoth one website ’ going without fight dispute came end facebook efforts relocate litigation process austin texas palo alto california denied texas federal judge joint statement released 25 august 2011 companies proclaimed pleased arrive agreement protects facebook brand trademark allows lamebook continued operation parties satisfied users likely confused thus forth lamebook permitted continue name yet must add disclaimer website reads unofficial parody affiliated associated endorsed approved facebook lamebook also allowed seek trademark protection name lamebook best worst facebook expected released chronicle books 2012
[ 518 ]
Train
2,976
3
Star_Force:star force released north america video ware arcades mega force vertically scrolling shooter released 1984 tehkan game player pilots starship called final star shooting various enemies destroying enemy structures points unlike later vertical scrolling shooters like toaplan twin cobra final star two levels weapon power secondary weapons like missiles and/or bombs stage game named letter greek alphabet certain versions game additional level called infinity represented infinity symbol occurs omega game repeats indefinitely nes version defeating omega target player see black screen tecmo logo announcing future release sequel super star force infinity target becomes available game repeats level boss without increasing difficulty star force ported published 1985 hudson soft msx home computer family computer famicom japan north american version nintendo entertainment system nes published 1987 tecmo although nes version hudson port released famicom japan tecmo made alterations graphics music control increased difficulty game also despite u.s. arcade version titled mega force tecmo decided release nes version original name star force star force also ported sg-1000 sega x68000 dempa shinbunsha mobile phones tecmo 1995 along two nes shooters famicom version star force remade hudson soft minimal upgrades super famicom part japan-only release caravan shooting collection version also included hudson compilation nes shooters 2006 hudson best collection vol 5 original arcade version later added compilation titled tecmo classic arcade released xbox 2009 arcade version made available download wii virtual console 500 wii points one four initial offerings virtual console arcade category wii shop channel three gaplus mappy tower druaga namco
[ 4949, 1237, 4016 ]
Test
2,977
3
Broadwell_(microarchitecture):broadwell microarchitecture broadwell intel codename 14 nanometer die shrink haswell microarchitecture tick intel tick–tock principle next step semiconductor fabrication like previous tick-tock iterations broadwell completely replace full range cpus previous microarchitecture haswell low-end desktop cpus based broadwell processors based broadwell microarchitecture marketed 5th-generation core i3 i5 i7 processors moniker however used marketing broadwell-based celeron pentium xeon chips microarchitecture also introduced core processor branding broadwell h c variants used conjunction intel 9 series chipsets z97 h97 hm97 addition retaining backward compatibility intel 8 series chipsets broadwell launched three major variants broadwell introduces instruction set architecture extensions broadwell intel quick sync video hardware video decoder adds vp8 hardware decoding encoding support adds vp9 hevc 10-bit decoding support integrated gpu hevc decode achieved combination fixed function video decoder shaders also two independent bit stream decoder bsd rings process video commands gt3 gpus allows one bsd ring process decoding bsd ring process encoding time broadwell integrated gpu supports windows direct3d 11.2 opengl 4.4 opengl 4.5 linux opencl 2.0 however marketed direct3d-12-ready broadwell-e introduced intel turbo boost max technology 3.0 september 10 2013 intel showcased broadwell 14 nm processor demonstration idf intel ceo brian krzanich claimed chip would allow systems provide 30 percent improvement power use haswell chips released mid-2013 krzanich also claimed chips would ship end 2013 however shipment delayed due low yields intel 14 nm process october 21 2013 leaked intel roadmap indicated late 2014 early 2015 release k-series broadwell lga 1150 platform parallel previously announced haswell refresh would coincide release intel 9-series chipset would required broadwell processors due change power specifications lga 1150 socket reuters quoted intel ceo promising broadwell-based pcs would shelves holiday season probably back-to-school shopping mobile cpus expected q4 2014 high-performance quad-core cpus 2015 mobile cpus would benefit reduced energy consumption die shrink intel told cnet specialized broadwell-based products would q4 2014 broader availability including mobile cpus would happen 2015. broadwell cpus available intel hardware partners sample quantities intel expected release 17 broadwell u series family microprocessors ces 2015 also according leak posted vr-zone broadwell-e chips would available 2016 intel unveiled formally 14 nm manufacturing process indicated mobile variants process would known core products additionally core products announced shipping end 2014 desktop variants shipping shortly broadwell intel focused mainly laptops miniature desktops all-in-one systems left traditional desktop users new socketed cpu options beyond fourth-generation haswell first arrived 2013 even though company finally introduced two broadwell desktop chips summer 2015 launched high-end sixth-generation skylake cpus shortly thereafter september 2015 kirk skaugen senior vice president general manager intel client computing group admitted skipping desktops broadwell poor decision end-of-life windows xp 2014 lack new desktop chips intel given desktop pc users good reasons upgrade 2015 intel launched first three broadwell-based processors belong low-tdp core family core 5y10 core 5y10a core 5y70 first laptop broadwell intel core 5y70 cpu lenovo yoga 3 pro launched four broadwell based cpus launched belonging core family increasing number launched broadwell cpus seven 17 additional broadwell laptop cpus launched celeron pentium core i3 i5 i7 series intel officially launched 14 nm broadwell-ep xeon e5 v4 cpus intel officially launched 14 nm broadwell-e core i7 69xx/68xx processor family
[ 2449, 2814, 5802, 6332, 6698, 6793, 3942, 3849, 4765, 6170, 3443, 6173, 6344, 6616, 4108, 1465, 7449, 7453, 3020, 7364, 742, 3717, 4514, 584, 5669, 3803, 5670, 6647, 1867, 1770, 3565, 418, 4077, 7484, 4985, 766, 5431, 691, 5343, 5963, 8...
Test
2,978
3
Macintosh_Quadra_630:macintosh quadra 630 macintosh quadra 630 also sold macintosh lc 630 macintosh performa 630 personal computer designed manufactured sold apple computer inc. july 1994 october 1995 introduced replacement quadra 610 least-expensive computer macintosh lineup prices starting 1,199 usd apple transition powerpc cpus already begun introduction power macintosh months prior 630 built around older motorola 68040 68lc040 chips two reasons cited one older chips less expensive two powerpc-native education software almost non-existent time also existing powerpc software yet translated non-english languages 630 last new macintosh quadra introduced though earlier quadra 950 remained available longer discontinued direct replacement 630 form factor retained power macintosh 6200 introduced months earlier entry price 2,300 cost nearly twice much power macintosh 4400 apple inexpensive power macintosh 1,725 still cost several hundred dollars 630 form factor quadra 630 introduced new case design macintosh family front headphone jack volume up/down buttons included first macintosh infrared receiver intended use remote included tv tuner card included performa 637cd 638cd models case motherboard accessible opening cover bottom rear case sliding drawer motherboard mounted similar lc 575 memory 630 models 4 mb memory soldered logic board depending logic board system either one two simm slots cases first simm slot requires 80nm non-parity chips refresh rate 2k better 4 8 16 32 mb simms work second slot supports single-sided simm cards 16 mb size maximum memory therefore 52 mb two-slot systems 36 mb one-slot systems hard drive controller one big differences compared previous macintosh models choice internal hard drive interface conforming standards ibm pc compatible platform cheaper slower ide drives used instead scsi first time external scsi port still available cd-rom used scsi internally 630 used older controller much slower ones used higher-end macs time video one external monitor supported db-15 connector non-upgradeable 1 mb dram soldered motherboard provides resolution 640x480 16-bit color 832x624 8-bit color separate video card required 24-bit color higher resolutions choice use dram instead vram saves money due commonality results lower performance increased chance flickering testing macworld described video performance quadra 630 mediocre cd-rom models equipped cd-rom use apple cd 300i plus 2x-speed scsi drive capable reading 656mb 748mb data cds well audio cds caddy tray quadra 610 replaced tray-based loading mechanism remote control models equipped tv/video system included sony rmc-a1 remote control consequently remote would control macintosh compatible sony television time performance macworld magazine ran benchmarks time quadra release reported performance similar quadra 950 slightly slower 800 quadra 630 different names depending target market macintosh quadra 630 professional business use macintosh lc 630 k-12 educational market macintosh performa 630 consumer higher-education markets performa 630 sold several slightly different model numbers depending included hardware software features models included 14 shadow mask crt called apple performa plus display introduced july 1 1994 introduced july 18 1994 introduced november 3 1994 introduced april 3 1995 introduced may 1 1995 introduced july 17 1995
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 2954, 7572, 6482, 6142, 4373, 7226, 7601, 4749, 3346, 5100, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 552, 5916, 3...
Test
2,979
6
Hardware-based_full_disk_encryption:hardware-based full disk encryption hardware-based full disk encryption fde available many hard disk drive hdd vendors including istorage limited seagate technology hitachi western digital samsung toshiba also solid-state drive vendors ocz sandisk samsung micron integral memory symmetric encryption key maintained independently cpu thus removing computer memory potential attack vector relation hard disk drives term self-encrypting drive sed common usage hardware-fde two major components hardware encryptor data store currently three varieties hardware-fde common use hdd fde made hdd vendors using opal enterprise standards developed trusted computing group key management takes place within hard disk controller encryption keys 128 256 bit advanced encryption standard aes keys authentication power drive must still take place within cpu via either software pre-boot authentication environment i.e. software-based full disk encryption component hybrid full disk encryption bios password hitachi micron seagate samsung toshiba disk drive manufacturers offering tcg opal sata drives older technologies include proprietary seagate drivetrust older less secure pata security command standard shipped drive makers including western digital enterprise sas versions tcg standard called tcg enterprise drives within standard hard drive form factor case encryptor bc smaller form factor commercially available hard disk drive enclosed example viasat formerly stonewood electronics flagstone eclypt drives encryptor bridge chipset bc placed computer standard hard disk drive encrypting every sector written intel announced release danbury chipset since abandoned approach hardware-based encryption built drive within drive enclosure notably transparent user drive except bootup authentication operates like drive degradation performance complication performance overhead unlike disk encryption software since encryption invisible operating system host computers processor two main use cases data rest protection cryptographic disk erasure data rest protection laptop simply powered disk self-protects data data safe even os encrypted secure mode aes locked reading writing drive requires authentication code strong 32 bytes 2^256 unlock crypto-shredding practice 'deleting data deleting overwriting encryption keys cryptographic disk erasure crypto erase command given proper authentication credentials drive self-generates new media encryption key goes 'new drive state without old key old data becomes irretrievable therefore efficient means providing disk sanitization lengthy costly process example unencrypted unclassified computer hard drive requires sanitizing conform department defense standards must overwritten 3+ times one terabyte enterprise sata3 disk would take many hours complete process although use faster solid-state drives ssd technologies improves situation take enterprise far slow problem worsen disk sizes increase every year encrypted drives complete secure data erasure action takes milliseconds simple key change drive safely repurposed quickly sanitization activity protected seds drive key management system built firmware order prevent accidental data erasure confirmation passwords secure authentications related original key required way retrieve data erased way keys self generated randomly record anywhere protecting data accidental loss theft achieved consistent comprehensive data backup policy recent hardware models circumvents booting devices allowing access using dual master boot record mbr system whereby mbr operating system data files encrypted along special mbr required boot operating system data requests intercepted sed firmware allow decryption take place unless system booted special sed operating system load mbr encrypted part drive works separate partition hidden view contains proprietary operating system encryption management system means boot methods allow access drive typical self-encrypting drives unlocked remain unlocked long power provided researchers universität erlangen-nürnberg demonstrated number attacks based moving drive another computer without cutting power additionally may possible reboot computer attacker-controlled operating system without cutting power drive computer self-encrypting drive put sleep mode drive powered encryption password retained memory drive quickly resumed without requesting password attacker take advantage gain easier physical access drive instance inserting extension cables firmware drive may compromised data sent may risk even data encrypted physical medium drive fact firmware controlled malicious third-party means decrypted third-party data encrypted operating system sent scrambled form drive would matter firmware malicious
[ 860, 6899, 1254, 1052, 5571, 1237, 1698, 5440, 2529, 3794, 1382 ]
Test
2,980
8
WebLogic_(company):weblogic company weblogic company 1995 1998 credited creating first j2ee application server weblogic application server paul ambrose bob pasker laurie pitman carl resnikoff founded weblogic inc. september 1995 founders worked together pursue eventually became application server 1998 weblogic appointed ali kutay president ceo weblogic funded regis mckenna frank j. caufield bea systems acquired weblogic inc. 1998 oracle corporation acquired bea systems 2008
[ 2519, 2945 ]
Test
2,981
4
Degradation_(telecommunications):degradation telecommunications telecommunication degradation loss quality electronic signal may categorized either graceful catastrophic following meanings several forms causes degradation electric signals time domain physical domain including runt pulse voltage spike jitter wander swim drift glitch ringing crosstalk antenna effect antenna effect ic manufacturing phase noise degradation usually refers reduction quality analog digital signal signal transmitted received undergoes changes undesirable changes called degradation degradation usually caused
[ 2041, 7453, 4804 ]
Test
2,982
5
Superframe:superframe telecommunications superframe sf t1 framing standard 1970s replaced original t1/d1 framing scheme 1960s framing bit simply alternated 0 1 superframe sometimes called d4 framing avoid confusion single-frequency signaling first supported d2 channel bank first widely deployed d4 channel bank order determine channel located stream data received set 24 channels aligned frame frame 192 bits long 8 24 terminated 193rd bit framing bit used find end frame order framing bit located receiving equipment predictable pattern sent bit equipment search bit correct pattern align framing based bit pattern sent 12 bits long every group 12 frames called superframe pattern used 193rd bit 100011 011100 channel sends two bits call supervision data superframe using robbed-bit signaling frames 6 12 superframe specifically 6th 12th bit superframe pattern least significant data bit channel bit 8 t1 data sent big-endian uses 1-origin numbering replaced channel-associated signalling bit bits b respectively superframe remained service many places turn century replaced improved extended superframe esf 1980s applications additional features desired
[ 5714, 2236, 2050 ]
Test
2,983
3
Wintel:wintel wintel partnership microsoft windows intel producing personal computers using intel x86-compatible processors running microsoft windows word wintel blend windows intel early 1980s chaos incompatibility rife early microcomputer market given way smaller number de facto industry standards including s-100 bus cp/m apple ii microsoft basic read-only memory rom inch floppy drive single firm controlled industry fierce competition ensured innovation hardware software rule rather exception microsoft windows intel processors gained ascendance ongoing alliance gave market dominance intel claimed partnership enabled two companies give customers benefit seemingly unending spiral falling prices rising performance addition claim history innovation shared vision flexible computing agile business 1981 ibm entered microcomputer market ibm pc created small subdivision firm unusual ibm product largely sourced outside component suppliers intended run third-party operating systems software ibm published technical specifications schematics pc allowed third-party companies produce compatible hardware so-called open architecture ibm pc became one successful computers time key feature ibm pc ibm enormous public respect behind accident history ibm pc happened intel cpu instead technically superior motorola 68000 tipped ibm in-house design shipped ibm pc dos licensed version microsoft ms-dos rather cp/m-86 operating system accidents enormous significance later years ibm pc ibm product ibm badge personal computers became respectable became easier business justify buying microcomputer even year two easiest justify buying ibm personal computer since pc architecture well documented ibm manuals pc dos designed similar earlier cp/m operating system pc soon thousands different third-party add-in cards software packages available made pc preferred option many since pc supported hardware software needed industry competitors took one several approaches changing market apple amiga atari acorn persevered independent quite different systems systems apple macintosh one remaining market macintoshes since december 2006 fact wintel-compatible hardware level least others digital world second-largest computer company hewlett-packard apricot concentrated making similar technically superior models early market leaders tandy-radio shack texas instruments stayed outdated architectures proprietary operating systems time belatedly realizing way market trends going switching successful long-term business strategy build machine duplicated ibm pc closely possible sell slightly lower price higher performance given conservative engineering early ibm personal computers higher average prices terribly difficult task first bar great technical challenge crafting bios duplicated function ibm bios exactly infringe copyrights two early leaders last strategy start-up companies columbia data products compaq first achieve reputations close compatibility ibm machines meant could run software written ibm machine without recompilation long ibm best-selling personal computer world least two next-best sellers practical purposes identical software industry effect profound first meant rational write ibm pc clones high priority port versions less common systems leisure second even importantly software writer pre-ibm days careful use plain subset possible techniques practicable able run hardware ran cp/m major part market using exact hardware similar clone practical take advantage every hardware-specific feature offered ibm independent bios companies like award chips technologies phoenix began market clean room bios 100 compatible ibm time competent computer manufacturer could achieve ibm compatibility matter routine around 1984 market fast growing relatively stable yet sign win half wintel though microsoft achieving enormous revenues dos sales ibm ever-growing list manufacturers agreed buy ms-dos license every machine made even shipped competing products intel every pc made either intel processor one made second source supplier license intel intel microsoft enormous revenues compaq many makers made far machines ibm power decide shape personal computer rested firmly ibm hands 1987 ibm introduced ps/2 computer line although open architecture pc successors great success biggest single manufacturer market buying faster cheaper ibm-compatible machines made firms ps/2s remained software compatible hardware quite different introduced technically superior micro channel architecture bus higher speed communication within system failed maintain open bus later called isa bus meant none millions existing add-in cards would function words new ibm machines ibm-compatible ibm planned ps/2 way technical legal reasons would difficult clone instead ibm offered sell ps/2 licence anyone could afford royalty would require royalty every ps/2-compatible machine sold also payment every ibm-compatible machine particular maker ever made past many pc manufacturers signed ps/2 licensees apricot lost badly persevering better pc ibm strategy time one many others many others decided hold committing major manufacturers known gang nine decided group together decide bus type would open manufacturers fast faster ibm microchannel yet still retain backward compatibility isa crucial turning point industry whole longer content let ibm make major decisions technical direction event new eisa bus commercial failure beyond high end time cost implementing eisa reduced extent would implemented desktop pcs much cheaper vesa local bus removed need desktop pcs though remained common servers due example possibility data corruption hard disk drives attached vlb controllers intel pci bus around corner although eisa systems sold achieved purpose ibm longer controlled computer industry ibm would belatedly amend ps/2 series ps/valuepoint line tracked features emerging ad hoc platform around time end 1980s beginning 1990s microsoft windows operating environment started become popular microsoft competitor digital research started recover share dos press dos market dr-dos ibm planned replace dos vastly superior os/2 originally ibm/microsoft joint venture unlike ps/2 hardware highly backward compatible microsoft preferred push industry direction product windows ibm suffering greatest ever public humiliation wake ps/2 disaster massive financial losses marked lack company unity direction microsoft combination soft marketing voice big financial stick effective windows became de facto standard competing computer manufacturers large small common factors provide joint technical leadership operating software microsoft cpus intel following years firms wintel partnership would attempt extend monopolies intel made successful major push motherboard chipset markets—becoming largest motherboard manufacturer world one stage almost chipset manufacturer—but badly fumbled attempt move graphics chip market 1991 faced sharp competition core cpu territory amd cyrix via transmeta microsoft fared better 1990 microsoft two competitors core market digital research ibm intel none 1996 intel two competitors core market cpus microsoft none microsoft pursued policy insisting per-processor royalties thus making competing operating systems unattractive computer manufacturers provoking regulatory scrutiny european commission us authorities leading undertaking microsoft cease practices however integration dos windows 95 masterstroke operating system vendors frozen microsoft could require computer manufacturers comply demands pain higher prices required ibm stop actively marketing os/2 else pay twice much windows 95 competitor compaq withholding designed windows 95 endorsement regarded essential hardware marketing tool microsoft also able require free publicity given hardware makers example windows key advertising symbols nearly modern keyboards strict license restrictions may may displayed system boot windows desktop also microsoft able take networking market formerly domain artisoft lantastic novell*s netware windows nt business application market formerly led lotus wordperfect microsoft office although microsoft far dominant player wintel partnership intel continuing influence underestimated intel microsoft closest partners operated uneasy distance one another since first major dispute intel heavy investment 32-bit optimized pentium pro microsoft delivery unexpectedly high proportion 16-bit code windows 95 firms talk one another competitors time time notably microsoft close relationship amd development windows xp professional x64 edition utilizing amd-designed 64-bit extensions x86 architecture intel decision sell processors apple inc wintel platform still dominant desktop laptop computer architecture opinions microsoft windows natural software bloat eaten much hardware progress intel processors gave wintel platform via moore law rise smartphones netbooks media outlets speculated predicting possible end wintel dominance cheap devices employing technologies intel investing linux microsoft ported windows arm architecture windows 8 strictest sense wintel refers computers run windows intel processor however wintel commonly used refer system running modern microsoft operating system modern x86 compatible cpu manufactured either intel amd pc applications run x86 intel processor usually run x86 amd processor mid-october 2017 microsoft announced windows 10 qualcomm snapdragon final stage testing would considered wintel systems running microsoft operating system using intel processor based itanium arm architecture despite fact processor manufactured intel also considered wintel system
[ 4291, 4759, 6256, 3849, 1727, 4482, 2744, 914, 126, 6910, 740, 7010, 6380, 1592, 5079, 1052, 8139, 4277, 352, 3755 ]
Test
2,984
5
Gnutella:gnutella gnutella large peer-to-peer network first decentralized peer-to-peer network kind leading later networks adopting model celebrated decade existence march 14 2010 user base millions peer-to-peer file sharing june 2005 gnutella population 1.81 million computers increasing three million nodes january 2006 late 2007 popular file-sharing network internet estimated market share 40 first client also called gnutella network got name developed justin frankel tom pepper nullsoft early 2000 soon company acquisition aol march 14 program made available download nullsoft servers event prematurely announced slashdot thousands downloaded program day source code released later gnu general public license gpl however original developers never got chance accomplish purpose next day aol stopped availability program legal concerns restrained nullsoft work project stop gnutella days protocol reverse engineered compatible free open source clones began appear parallel development different clients different groups remains modus operandi gnutella development today among first independent gnutella pioneers gene kan spencer kimball launched first portal aimed assemble open-source community work gnutella also developed gnubile one first open-source gnu-gpl programs implement gnutella protocol gnutella network fully distributed alternative semi-centralized systems fasttrack kazaa original napster initial popularity network spurred napster threatened legal demise early 2001 growing surge popularity revealed limits initial protocol scalability early 2001 variations protocol first implemented proprietary closed source clients allowed improvement scalability instead treating every user client server users treated ultrapeers routing search requests responses users connected allowed network grow popularity late 2001 gnutella client limewire basic became free open source february 2002 morpheus commercial file sharing group abandoned fasttrack-based peer-to-peer software released new client based free open source gnutella client gnucleus word gnutella today refers one project piece software open protocol used various clients name portmanteau gnu nutella brand name italian hazelnut flavored spread supposedly frankel pepper ate lot nutella working original project intended license finished program gnu general public license gnutella associated gnu project gnu peer-to-peer network gnunet october 26 2010 popular gnutella client limewire ordered shut judge kimba wood united states district court southern district new york signed consent decree recording industry plaintiffs limewire agreed event likely cause notable drop size network negotiating injunction limewire staff inserted remote-disabling code software injunction came force users installed affected versions newer 5.5.10 cut p2p network since limewire free software nothing prevented creation forks omitted disabling code long limewire trademarks used shutdown affect example frostwire fork limewire created 2004 carries neither remote-disabling code adware november 9 2010 limewire resurrected secret team developers named limewire pirate edition based limewire 5.6 beta version server dependencies removed pro features enabled free envision gnutella originally worked imagine large circle users called nodes gnutella client software initial startup client software must bootstrap find least one node various methods used including pre-existing address list possibly working nodes shipped software using updated web caches known nodes called gnutella web caches udp host caches rarely even irc connected client requests list working addresses client tries connect nodes shipped well nodes receives clients reaches certain quota connects many nodes locally caching addresses yet tried discards addresses tried invalid user wants search client sends request actively connected node version 0.4 protocol number actively connected nodes client quite small around 5 node forwarded request actively connected nodes turn forwarded request packet reached predetermined number hops sender maximum 7 since version 0.6 2002 gnutella composite network made leaf nodes ultra nodes also called ultrapeers leaf nodes connected small number ultrapeers typically 3 ultrapeer connected 32 ultrapeers higher outdegree maximum number hops query travel lowered 4 leaves ultrapeers use query routing protocol exchange query routing table qrt table 64 ki-slots 2 mi-slots consisting hashed keywords leaf node sends qrt ultrapeers connected ultrapeers merge qrt leaves downsized 128 ki-slots plus qrt share files exchange neighbors query routing done hashing words query seeing whether match qrt ultrapeers check forwarding query leaf node also forwarding query peer ultra node provided last hop query travel search request turns result node result contacts searcher classic gnutella protocol response messages sent back along route query came query contain identifying information node scheme later revised search results delivered user datagram protocol udp directly node initiated search usually ultrapeer node thus current protocol queries carry ip address port number either node lowers amount traffic routed gnutella network making significantly scalable user decides download file negotiate file transfer node requested file firewalled querying node connect directly however node firewalled stopping source node receiving incoming connections client wanting download file sends so-called push request server remote client initiate connection instead push file first push requests routed along original chain used send query rather unreliable routes would often break routed packets always subject flow control therefore so-called push proxies introduced usually ultrapeers leaf node announced search results client connects one push proxies using http request proxy sends push request leaf behalf client normally also possible send push request udp push proxy efficient using tcp push proxies two advantages first ultrapeer-leaf connections stable routes makes push requests much reliable second reduces amount traffic routed gnutella network finally user disconnects client software saves list nodes actively connected collected pong packets use next time attempts connect becomes independent kind bootstrap services practice method searching gnutella network often unreliable node regular computer user constantly connecting disconnecting network never completely stable also bandwidth cost searching gnutella grew exponentially number connected users often saturating connections rendering slower nodes useless therefore search requests would often dropped queries reached small part network observation identified gnutella network unscalable distributed system inspired development distributed hash tables much scalable support exact-match rather keyword search address problems bottlenecks gnutella developers implemented tiered system ultrapeers leaves instead nodes considered equal nodes entering network kept 'edge network leaf responsible routing nodes capable routing messages promoted ultrapeers would accept leaf connections route searches network maintenance messages allowed searches propagate network allowed numerous alterations topology improved efficiency scalability greatly additionally gnutella adopted number techniques reduce traffic overhead make searches efficient notable query routing protocol qrp dynamic querying dq qrp search reaches clients likely files rare files searches grow vastly efficient dq search stops soon program acquired enough search results vastly reduces amount traffic caused popular searches gnutella users vast amount information improvements gnutella user-friendly style one benefits gnutella decentralized make difficult shut network make network users ones decide content available unlike napster entire network relied central server gnutella shut shutting one node impossible company control contents network also due many free open source gnutella clients share network gnutella operate purely query flooding-based protocol outdated gnutella version 0.4 network protocol employs five different packet types namely mainly concerned searching gnutella network file transfers handled using http development gnutella protocol currently led gnutella developers forum gdf many protocol extensions developed software vendors free gnutella developers gdf extensions include intelligent query routing sha-1 checksums query hit transmission via udp querying via udp dynamic queries via tcp file transfers via udp xml metadata source exchange also termed download mesh parallel downloading slices swarming efforts finalize protocol extensions gnutella 0.6 specification gnutella protocol development website gnutella 0.4 standard although still latest protocol specification since extensions exist proposals far outdated fact hard impossible connect today 0.4 handshakes according developers gdf version 0.6 new developers pursue using work-in-progress specifications gnutella protocol remains development spite attempts make clean break complexity inherited old gnutella 0.4 design clean new message architecture still one successful file-sharing protocols date following tables compare general technical information number applications supporting gnutella network tables attempt give complete list gnutella clients tables limited clients participate current gnutella network gnutella2 protocol often referred g2 despite name successor protocol gnutella related original gnutella project rather completely different protocol forked original project piggybacked gnutella name sore point many gnutella developers gnutella2 name conveys upgrade superiority led flame war criticism included use gnutella network bootstrap g2 peers poor documentation g2 protocol additionally frequent search retries shareaza client one initial g2 clients could unnecessarily burden gnutella network protocols undergone significant changes since fork 2002 g2 advantages disadvantages compared gnutella advantage often cited gnutella2 hybrid search efficient original gnutella query flooding later replaced efficient search methods starting query routing 2002 proposed 2001 limewire developers advantage gnutella users number millions whereas g2 network approximately order magnitude smaller difficult compare protocols current form individual client choice probably much effect end user either network
[ 2984, 4571, 3172, 4759, 7714, 1079, 2379, 7343, 3777, 2390, 7637, 7549, 2664, 7093, 6025, 7744, 499, 4434, 2681, 4891, 5414, 3573, 3574, 2430, 2696, 7214, 3915, 5531, 1329, 3338, 4014, 6499, 5447 ]
Validation