node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,085
4
Netcat:netcat netcat often abbreviated nc computer networking utility reading writing network connections using tcp udp command designed dependable back-end used directly easily driven programs scripts time feature-rich network debugging investigation tool since produce almost kind connection user could need number built-in capabilities list features includes port scanning transferring files port listening used backdoor original netcat features include rewrites like gnu openbsd support additional features example openbsd nc supports tls nc mail.server.net 25 full response including http headers dumped standard output file accessed via web browser nowiki http //servername:8080/ /nowiki netcat serves file first client connects exits also provides content length browsers expect work fine lan may potentially fail kind firewall between. versions netcat like netcat-traditional debian 8.6 need specify -p port number nc -vzu 192.168.0.1 nowiki 80-90 /nowiki note udp tests always show open test useful shell access server tested know whether firewall blocking specific udp port server listening host i.e server whose port needs checked following sending host following – note codice_1 hostname listening host text typed sending host type something hit enter displayed also listening host udp port 4172 open open get error connection refused caveat machines ipv6 may default ip version use codice_2 thus host specified hostname contacted using ipv6 user might know ports may appear closed test even though would open using ipv4 difficult notice may cause false impression port blocked actually open force use ipv4 using adding codice_3 options codice_4 commands echo 0 message nc -w 1 -u loggerhost 514 uncommon use codice_2 port scanning netcat considered best tool job sufficient advanced tool nmap codice_6 parameter prevents dns lookup codice_7 makes codice_4 receive data server codice_9 makes connection timeout 1 second inactivity another useful behaviour using codice_2 proxy ports hosts redirected look example port 12345 represents request starts codice_4 server port 12345 connections get redirected codice_12 web browser makes request codice_4 request sent google response sent web browser pipes unidirectional worked around named pipe redirect input output codice_14 option may also used codice_15 implementation using named pipe reliable method using codice_14 option provides one-shot proxy another useful feature proxy ssl connections way traffic viewed wire sniffing applications wireshark accomplished unixes utilizing codice_17 codice_2 codice_19 codice_2 used make process network server listen port pipe input receives process codice_21 option spawns executable input output redirected via network socket example possible expose bourne shell process remote computers computer ip address 192.168.1.2 run command computer network one could run codice_4 command way codice_21 option used create rudimentary backdoor administrators perceive risk thus allow codice_2 computer ncat similar tool netcat provided nmap suite ncat n't built code “ traditional ” netcat implementation ncat definitely based netcat spirit functionality codice_29 user host1 ncat -l 9899 outputfile user host2 ncat host1 9899 inputfile user host1 ncat -l 9899 inputfile user host2 ncat host1 9899 outputfile suppose ssh tunnel want copy file remote machine could codice_32 directly opens another connection goal re-use existing connection use netcat ssh add codice_33 port forwarding sending everything port 31000 remote machine port local machine extra overhead tcp takes care error correction ssh already encrypted pipe original version netcat unix program last version 1.10 released march 1996 several implementations posix systems including rewrites scratch like gnu netcat openbsd netcat latter supports ipv6 tls openbsd version ported freebsd base windows/cygwin mac os x comes netcat installed osx 10.13 users use macports install variant dos version netcat called ntool included freedos package group networking based wattcp stack licensed european union public licence version 1.1 known ports embedded systems includes versions windows ce named netcat 4 wince iphone busybox includes default lightweight version netcat solaris 11 includes netcat implementation based openbsd netcat socat complex variant netcat larger flexible options must configured given task february 1 2016 santiago zanella-beguelin microsoft vulnerability research issued security advisory regarding composite diffie-hellman parameter hard-coded openssl implementation socat implausibility composite might unintentionally introduced prime number required led suspicion sabotage introduce backdoor software vulnerability socat bug affected version 1.7.3.0 2.0.0-b8 corrected following releases 1.7.3.1 2.0.0-b9 cryptcat version netcat integrated transport encryption capabilities middle 2005 nmap announced another netcat incarnation called ncat features new possibilities connection brokering tcp/udp redirection socks4 client server support ability chain ncat processes http connect proxying proxy chaining ssl connect/listen support ip address/connection filtering like nmap ncat cross-platform systems modified versions similar netcat utilities go command name codice_4 codice_15 codice_38 codice_39 codice_40 codice_41 codice_42
[ 6412, 361, 362, 6788, 6789, 2817, 6879, 4759, 6609, 1537, 204, 5480, 7637, 3106, 5571, 1942, 5931, 578, 923, 5138, 224, 667, 588, 2589, 5946, 2500, 3818, 3819, 4814, 4539, 6489, 7765, 74, 3915, 3417, 6404, 4283, 7696, 4020 ]
Test
3,086
5
Structured_Stream_Transport:structured stream transport computer networking structured stream transport sst experimental transport protocol provides ordered reliable byte stream abstraction similar tcp enhances optimizes stream management permit applications use streams much fine-grained fashion feasible tcp streams
[ 7637, 2901 ]
Test
3,087
4
Spanish_Cybersecurity_Research_Conference:spanish cybersecurity research conference spanish cybersecurity research conference spanish jornadas nacionales de investigación en ciberseguridad jnic scientific congress works meeting point different actors working field cybersecurity research universities technological research centres companies public authorities exchange knowledge experience shared goal strengthening research cybersecurity field national level need run kind conferences identified drafting summary report feasibility study design network centers excellence r cybersecurity consensus participants strategic plan spanish network excellence cybersecurity research included measure 17 creation national cybsersecurity r d+i conferences intended scientific meeting point network excellence particular research ecosystem general could demonstrate capacities terms knowledge talent terms research findings potential transference market equally measure 12 study proposed design open call proposals mechanisms evaluate select candidates order grant awards acknowledgement research excellence edition conferences organised institution selected according procedure laid regulation jnic organising committee named based regulations established jnic general chair committee representative organising institution responsible event spanish national cybersecurity institute incibe mission support research cybersecurity strengthening cybersecurity sector participates organization conference aim converting jnic scientific forum excellence national cybersecurity field promotes innovation first time 2017 edition complete technological transfer program designed instrument bring final users companies organisms etc contact researchers order solve cybersecurity problems currently unresolved formulated scientific challenges good reception success participation new initiative challengers research teams expected program continue grow transfer track part jnic future editions
[]
Test
3,088
4
Nessus_(software):nessus software nessus proprietary vulnerability scanner developed tenable inc. nasdaq tenb examples vulnerabilities exposures nessus scan include nessus scans cover wide range technologies including operating systems network devices hypervisors databases web servers critical infrastructure results scan reported various formats plain text xml html latex results also saved knowledge base debugging unix scanning automated use command-line client exist many different commercial free open source tools unix windows manage individual distributed nessus scanners nessus provides additional functionality beyond testing known network vulnerabilities instance use windows credentials examine patch levels computers running windows operating system nessus also support configuration compliance audits scada audits pci compliance nessus project started renaud deraison 1998 provide internet community free remote security scanner october 5 2005 tenable network security company renaud deraison co-founded changed nessus 3 proprietary closed source license nessus 2 engine minority plugins still gpl leading forked open source projects based nessus like openvas porz-wahn today product still exists two formats limited free version full-feature paid subscription option nessus available linux windows mac os x. tenable inc. went public july 26 2018 twenty years nessus ’ creation
[ 5272, 4759, 4583, 2466, 1461, 3287, 2478, 5571, 1942, 3540, 5577, 5051, 588, 848, 6129, 1691, 3915 ]
Test
3,089
4
Malwarebytes_(software):malwarebytes software malwarebytes formerly malwarebytes anti-malware abbreviated mbam anti-malware software microsoft windows macos android ios finds removes malware made malwarebytes corporation first released january 2006 available free version scans removes malware started manually paid version additionally provides scheduled scans real-time protection flash-memory scanner malwarebytes formerly known malwarebytes anti-malware primarily scanner scans removes malicious software including rogue security software adware spyware malwarebytes scans batch mode rather scanning files opened reducing interference another on-demand anti-malware software also running computer malwarebytes available free premium paid version free version run manually user desired whereas paid version perform scheduled scans automatically scan files opened block ip addresses malicious web sites scan services programs device drivers currently use december 8 2016 malwarebytes inc. released version 3.0 general public includes protection malware ransomware exploit malicious websites november 2 2009 malwarebytes accused rival iobit incorporating database malwarebytes anti-malware several products vendors named security software iobit security 360 iobit denied accusation stated database based user submissions sometimes signature names malwarebytes get placed results said time filter signature names similar malwarebytes iobit also stated malwarebytes convincing proof promised databases stolen declaration iobit malwarebytes replied convinced argument iobit malwarebytes claims served dmca infringement notices cnet download.com majorgeeks order download sites remove iobit software iobit said version 1.3 database updated address accusations intellectual property theft made earlier malwarebytes vonteera adware uses stolen certificates disables anti-malware virus protection malwarebytes malwarebytes listed solution eliminating threat february 2 2016 project zero announced four vulnerabilities malwarebytes flagship product including lack server-side encryption update files lack proper payload signing within encrypted data combination allowed attacker recompile encrypted payload exploits malwarebytes responded one day disclosure blog article detailing extreme difficulty executing attacks well revealing announced server-side encryption issues resolved within days private disclosure outstanding time project zero published research malwarebytes also published information protect current users patch released event also resulted establishment formal bug bounty program malwarebytes offers 1000 per disclosure depending severity exploitability
[ 2545, 385, 1838, 4689, 6823, 7193, 73, 7597, 88, 5452, 91, 4759, 1931, 2296, 4783, 496, 5144, 501, 142, 4456, 2354, 6962, 4115, 4492, 4138, 910, 5571, 3111, 6644, 3123, 4522, 935, 5601, 6305, 2789, 8134, 6697, 7425, 6005, 6006, 1376, ...
Test
3,090
3
Lords_of_Time:lords time lords time interactive fiction computer game designed sue gazzard released level 9 computing 1983 originally purely textual adventure 8 bit microcomputers game later released part time magik compilation graphics added floppy disk versions like level 9 adventures time written in-house a-code language platform-independent – implementation virtual machine allowed quick porting across platforms anonymous hero game controlled player appears computer programmer contemporary times start game hero contacted father time sends hero quest recover nine treasures order defeat machinations evil time lords game divided 9 eras time including starting section hero living room 20th century ice age age dinosaurs dark ages future middle ages tudor england roman empire due meddling time lords anachronisms abound example cavemen found living era dinosaurs access nine different eras via grandfather clock turns time machine disguise game re-released 1988 part time magik compilation alongside red moon price magik although positioned within compilation first part trilogy real connection latter two opposed sister compilation release silicon dreams three games form trilogy reception lords time positive crash reviewing spectrum version declared find impossible justly describe brilliant adventure lords time really computer video games magazine multiformat review claimed ..the game light-hearted one fun play difficult progress suspect take rather long time complete could ask personal computer games rated pcg hit
[ 6380, 6030 ]
Test
3,091
7
Native_cloud_application:native cloud application native cloud application nca type computer software natively utilizes services infrastructure cloud computing providers amazon ec2 force.com microsoft azure ncas exhibit combined usage three fundamental technologies
[ 4211, 5894, 4217, 2988, 7613, 370, 632, 189, 289, 1634, 7165, 6262, 3954, 7722, 3958, 6806, 22, 3627, 1550, 5927, 2212, 6906, 5135, 7741, 320, 1757, 3028, 5940, 2317, 7838, 842, 3309, 754, 5064, 7924, 330, 7114, 4627, 2961, 2430, 4636, ...
Validation
3,092
8
SWFAddress:swfaddress swfaddress open-source javascript library enables adobe flash/flex javascript/ajax websites web applications support deep linking practice enables users link specific section page content importance rich internet application platforms provide single url access specific content user navigation within content uniquely identified shared means url developer content integrates swfaddress users able use standard browser navigation functionality share bookmark unique urls represent currently displayed section state content library commonly used flash websites web applications available deep linking javascript library flash web swfaddress found used 100,000 websites 2011 swfaddress uses hash portion url interact web browsers simulate page navigation works two ways library built integrate free google analytics web analytics system order record page view statistics track popularity individual pages viewer navigates virtual pages states content also integrates popular swfobject javascript library automatically enable deep linking content loaded swfaddress works major web browsers major operating systems integrated flash content written outdated actionscript 1 recent actionscript 2 latest actionscript 3
[ 183, 2451, 4755, 5632, 3850, 6172, 1355, 5998, 4600, 2658, 7734, 313, 3719, 2040, 6368, 237, 54, 3398, 2870, 6660, 422, 340, 3663, 5172, 6400, 6674, 7687, 1989, 4287 ]
Validation
3,093
4
Verinice:verinice verinice free open source information security management system isms application help creating maintaining systems information security management verinice written maintained primarily german company named sernet service network gmbh verinice licensed gnu general public license version 3 later main users usually small medium companies big enterprises government agencies germany verinice recommended verinice supports operating systems windows linux os x licensed baseline protection catalogs federal office information security
[ 7402, 3745, 3915, 5571, 578 ]
Test
3,094
4
Sybil_attack:sybil attack sybil attack attacker subverts reputation system peer-to-peer network creating large number pseudonymous identities uses gain disproportionately large influence named subject book sybil case study woman diagnosed dissociative identity disorder name suggested 2002 brian zill microsoft research term pseudospoofing previously coined l. detweiler cypherpunks mailing list used literature peer-to-peer systems class attacks prior 2002 term gain much influence sybil attack sybil attack computer security attack wherein reputation system subverted forging identities peer-to-peer networks reputation system vulnerability sybil attack depends cheaply identities generated degree reputation system accepts inputs entities chain trust linking trusted entity whether reputation system treats entities identically evidence showed large-scale sybil attacks could carried cheap efficient way extant realistic systems bittorrent mainline dht entity peer-to-peer network piece software access local resources entity advertises peer-to-peer network presenting identity one identity correspond single entity words mapping identities entities many one entities peer-to-peer networks use multiple identities purposes redundancy resource sharing reliability integrity peer-to-peer networks identity used abstraction remote entity aware identities without necessarily knowing correspondence identities local entities default distinct identity usually assumed correspond distinct local entity reality many identities may correspond local entity adversary may present multiple identities peer-to-peer network order appear function multiple distinct nodes adversary may thus able acquire disproportionate level control network affecting voting outcomes context human online communities multiple identities sometimes known sockpuppets notable sybil attack conjunction traffic confirmation attack launched tor anonymity network several months 2014 unknown perpetrators validation techniques used prevent sybil attacks dismiss masquerading hostile entities local entity may accept remote identity based central authority ensures one-to-one correspondence identity entity may even provide reverse lookup identity may validated either directly indirectly direct validation local entity queries central authority validate remote identities indirect validation local entity relies already accepted identities turn vouch validity remote identity question identity-based validation techniques generally provide accountability expense anonymity undesirable tradeoff especially online forums wish permit censorship-free information exchange open discussion sensitive topics validation authority attempt preserve users anonymity refusing perform reverse lookups approach makes validation authority prime target attack alternatively authority use mechanism knowledge user real identity verification unidentified person physical presence particular place time enforce one-to-one correspondence online identities real-world users sybil prevention techniques based connectivity characteristics social graphs also limit extent damage caused given sybil attacker preserving anonymity though techniques prevent sybil attacks entirely may vulnerable widespread small-scale sybil attacks examples prevention techniques sybilguard advogato trust metric also sparsity based metric identify sybil clusters distributed p2p based reputation system alternatively proof work used make sybil attacks expensive i2p implementation kademlia modified mitigate kademlia vulnerabilities sybil attacks
[ 1846, 7504, 8124, 1805, 5052 ]
Test
3,095
0
Articulatory_speech_recognition:articulatory speech recognition articulatory speech recognition means recovery speech forms phonemes syllables words acoustic signals help articulatory modeling extra input articulatory movement data speech recognition automatic speech recognition acoustic speech recognition means recovery speech acoustics sound wave articulatory information extremely helpful acoustic input low quality perhaps noise missing data
[ 3941, 1314, 7372 ]
Validation
3,096
4
Invincea:invincea invincea suite endpoint protection products formerly sold sophos invincea inc. originally secure command llc venture backed software company provided malware threat detection prevention pre-breach forensic intelligence acquired sophos 2017 sophos ended immediate end sale invincea products april 2018 founded 2006 anup ghosh company headquartered fairfax virginia major investors include dell ventures new atlantic ventures grotech ventures aeris capital harbert venture partners 2012 invincea used 21 million grant darpa improve security us military android-based devices tablet pcs smart phones invincea software secures data unauthorized access protects device malicious applications june 2013 dell announced oem partnership invincea began shipping new endpoint security solution dubbed “ dell data protection protected workspace ” commercial tablets pcs worldwide december 2013 invincea acquired sandboxie undisclosed amount sandboxie pioneer windows containment sandboxing market making logical addition invincea ’ technology portfolio may 2016 invincea launched x invincea x protects endpoints detecting blocking known unknown malware—without signatures real-time x combines deep learning advanced form machine learning behavioral analysis isolation technology one lightweight agent february 2017 invincea acquired sophos security software hardware company august year subsidiary invincea labs renamed two six labs january 2018 sophos announced invincea would integrated intercept x end-point security product april 16 2018 announced immediate end sale invincea-branded products support maintenance available existing contracts december 31st 2019 point support maintenance invincea products cease april 16 2018 sophos announced would longer selling invincea-related products although would continue support existing sales end 2019
[ 1395, 972, 2465, 1805, 6305 ]
Test
3,097
2
OpenEZX:openezx openezx project tries gather information linux based motorola ezx phone platform tries provide 100 free software stack phones especially way avoid proprietary filesystem and/or device drivers also aims provide current 2.6.x kernel required hardware support ezx phones currently supported phones
[ 3081, 2187, 4400, 474, 2564, 5391, 2300, 5486, 578, 5579, 740, 5236, 5062, 1399, 3039, 1582, 5068, 2503, 2240, 424, 7030, 5872, 7126, 2520, 4549, 2071, 349, 5794, 6158, 7956 ]
Test
3,098
3
MCST-R1000:mcst-r1000 mcst r1000 64-bit microprocessor developed moscow center sparc technologies mcst fabricated tsmc development microprocessor designated mcst-4r
[ 5055, 4657, 1761, 5364, 3747, 7499, 1237, 352, 971, 6956, 1753, 1778, 8102, 6480 ]
Test
3,099
2
AHI_(Amiga):ahi amiga ahi ahi audio system retargetable audio subsystem amigaos morphos aros created martin blom mid-1990s allow standardized operating system support audio hardware native amiga sound chip example 16-bit sound cards ahi offers improved functionality available amigaos audio device driver seamless audio playback user selected audio device applications supported ahi standardized functionality audio recording efficient software mixing routines combining multiple sound channels thus overcoming four channel hardware limit original amiga chipset also incorporated unique mode produced 14-bit playback using amiga chipset combining two 8-bit channels set different volumes first official release ahi 1996 ahi became widely supported standard audio hardware audio software amiga systems officially included later operating system releases author stated referring software correct term 'ahi audio system 'ahi 'audio hardware interface term sometimes used press
[ 6161, 6431, 7384, 5571, 5833, 5660, 5661 ]
Validation
3,100
4
Side-channel_attack:side-channel attack computer security side-channel attack attack based information gained implementation computer system rather weaknesses implemented algorithm e.g cryptanalysis software bugs timing information power consumption electromagnetic leaks even sound provide extra source information exploited side-channel attacks require technical knowledge internal operation system although others differential power analysis effective black-box attacks rise web 2.0 applications software-as-a-service also significantly raised possibility side-channel attacks web even transmissions web browser server encrypted e.g. https wifi encryption according researchers microsoft research indiana university many powerful side-channel attacks based statistical methods pioneered paul kocher attempts break cryptosystem deceiving coercing people legitimate access typically considered side-channel attacks see social engineering rubber-hose cryptanalysis general classes side channel attack include cases underlying principle physical effects caused operation cryptosystem side provide useful extra information secrets system example cryptographic key partial state information full partial plaintexts forth term cryptophthora secret degradation sometimes used express degradation secret key material resulting side-channel leakage works monitoring security critical operations aes t-table entry modular exponentiation multiplicand accesses attacker able recover secret key depending accesses made made victim deducing encryption key also unlike side-channel attacks method create fault ongoing cryptographic operation invisible victim 2017 cache-based vulnerabilities discovered cpus dubbed meltdown spectre allow attacker leak memory contents processes operating system timing attack watches data movement cpu memory hardware running cryptosystem algorithm simply observing variations long takes perform cryptographic operations might possible determine entire secret key attacks involve statistical analysis timing measurements demonstrated across networks power-analysis attack provide even detailed information observing power consumption hardware device cpu cryptographic circuit attacks roughly categorized simple power analysis spa differential power analysis dpa fluctuations current also generate radio waves enabling attacks analyze measurements electromagnetic emanations attacks typically involve similar statistical techniques power-analysis attacks historical analogues modern side-channel attacks known recently declassified nsa document reveals far back 1943 engineer bell telephone observed decipherable spikes oscilloscope associated decrypted output certain encrypting teletype according former mi5 officer peter wright british security service analyzed emissions french cipher equipment 1960s 1980s soviet eavesdroppers suspected planted bugs inside ibm selectric typewriters monitor electrical noise generated type ball rotated pitched strike paper characteristics signals could determine key pressed power consumption devices causes heating offset cooling effects temperature changes create thermally induced mechanical stress stress create low level acoustic emissions operating cpus 10 khz cases recent research shamir et al suggested information operation cryptosystems algorithms obtained way well acoustic cryptanalysis attack surface cpu chip cases cpu package observed infrared images also provide information code executed cpu known thermal-imaging attack optical side-channel attack examples include gleaning information hard disk activity indicator reading small number photons emitted transistors change state side-channel attacks rely relationship information emitted leaked side channel secret data countermeasures fall two main categories 1 eliminate reduce release information 2 eliminate relationship leaked information secret data make leaked information unrelated rather uncorrelated secret data typically form randomization ciphertext transforms data way undone cryptographic operation e.g. decryption completed first category displays special shielding lessen electromagnetic emissions reducing susceptibility tempest attacks commercially available power line conditioning filtering help deter power-monitoring attacks although measures must used cautiously since even small correlations remain compromise security physical enclosures reduce risk surreptitious installation microphones counter acoustic attacks micro-monitoring devices cpu power-draw thermal-imaging attacks another countermeasure still first category jam emitted channel noise instance random delay added deter timing attacks although adversaries compensate delays averaging multiple measurements generally using measurements analysis amount noise side channel increases adversary needs collect measurements another countermeasure first category use security analysis software identify certain classes side channel attacks found design stages underlying hardware timing attacks cache attacks identifiable certain commercially available security analysis software platforms allow testing identify attack vulnerability well effectiveness architectural change circumvent vulnerability comprehensive method employ countermeasure create secure development lifecycle hardware includes utilizing available security analysis platforms respective stages hardware development lifecycle case timing attacks targets whose computation times quantized discrete clock cycle counts effective countermeasure design software isochronous run exactly constant amount time independently secret values makes timing attacks impossible countermeasures difficult implement practice since even individual instructions variable timing cpus one partial countermeasure simple power attacks differential power-analysis attacks design software pc-secure program counter security model pc-secure program execution path depend secret values words conditional branches depend public information even though multiply operations draw power nop practically cpus using constant execution path prevents operation-dependent power differences differences power choosing one branch another leaking secret information architectures instruction execution time data-dependent pc-secure program also immune timing attacks another way code non-isochronous modern cpus memory cache accessing infrequently used information incurs large timing penalty revealing information frequency use memory blocks cryptographic code designed resist cache attacks attempts use memory predictable fashion accessing input outputs program data according fixed pattern example data-dependent table lookups must avoided cache could reveal part lookup table accessed partial countermeasures attempt reduce amount information leaked data-dependent power differences operations use power correlated number 1 bits secret value using constant-weight code using fredkin gates dual-rail encoding reduce leakage information hamming weight secret value although exploitable correlations likely remain unless balancing perfect balanced design approximated software manipulating data complement together several secure cpus built asynchronous cpus global timing reference cpus intended make timing power attacks difficult subsequent research found timing variations asynchronous circuits harder remove typical example second category decorrelation technique known blinding case rsa decryption secret exponent formula_1 corresponding encryption exponent formula_2 modulus formula_3 technique applies follows simplicity modular reduction omitted formulas decrypting computing result formula_4 given ciphertext formula_5 system picks random number formula_6 encrypts public exponent formula_2 obtain formula_8 decryption done formula_9 obtain formula_10 since decrypting system chose formula_6 compute inverse modulo formula_3 cancel factor formula_6 result obtain formula_4 actual result decryption attacks require collecting side-channel information operations data controlled attacker blinding effective countermeasure since actual operation executed randomized version data attacker control even knowledge another general countermeasure effective side-channel attacks masking countermeasure principle masking avoid manipulating sensitive value formula_5 directly rather manipulate sharing set variables called shares formula_16 formula_17 formula_18 xor operation attacker must recover values shares get meaningful information
[ 704, 3932, 1811, 7614, 2823, 4930, 6419, 464, 807, 1353, 6411, 6348, 2918, 7533, 476, 119, 4867, 2566, 5484, 5305, 7548, 3635, 6637, 5842, 1480, 8147, 6647, 7200, 7385, 4805, 5765, 1770, 5327, 2774, 6657, 1587, 7928, 5333, 6569, 4536, 5...
Test
3,101
6
XtreemFS:xtreemfs xtreemfs object-based distributed file system wide area networks xtreemfs outstanding feature full components real failure scenarios including network partitions fault tolerance maintaining posix file system semantics fault-tolerance achieved using paxos-based lease negotiation algorithms used replicate files metadata ssl x.509 certificates support make xtreemfs usable public networks xtreemfs development since early 2007 first public release made august 2008 xtreemfs 1.0 released august 2009 1.0 release includes support read-only replication failover data center replica maps parallel reads writes native windows client 1.1 added automatic on-close replication posix advisory locks mid-2011 release 1.3 added read/write replication files version 1.4 underwent extensive testing considered production-quality improved hadoop integration support ssds added version 1.5 xtreemfs funded european commission ist programme original xtreemfs team founded quobyte inc. 2013 quobyte offers professional storage system commercial product
[ 4159, 2763, 1624, 5239, 4759, 5571, 578, 2536 ]
Test
3,102
8
Eagle_(application_server):eagle application server eagle web-based mainframe-powered application server provides direct secure high performance internet access mainframe computer data transactions using real-time transaction processing rather middleware external gateways originally based ibm 3270 environment developed university florida reduce delivery time student record applications engine configured web 1996 removed need screen scraping interface eagle provides direct network access mainframe data transactions web applications talk directly native mainframe resources without complexity expense middleware non-mainframe resources accessed via hooks customized communication programs using xml edi since eagle mainframe computer transaction application pages created internally delivered via web reduces overhead compared external call interfaces resulting considerable performance gains periods peak demand university florida eagle routinely handles 400,000 transactions per day maintaining sub-second response time web defined stateless environment—normally web page requested web page delivered interaction eagle associates pages user handles authentication authorization eagle session management engine protected behind mainframe security eagle awarded patent 6,532,463 state maintenance mechanism
[ 5666, 84 ]
Validation
3,103
1
Associative_entity:associative entity associative entity term used relational entity–relationship theory relational database requires implementation base relation base table resolve many-to-many relationships base relation representing kind entity called informally associative table mentioned associative entities implemented database structure using associative tables tables contain references columns different database tables within database associative junction table maps two tables together referencing primary keys data table effect contains number foreign keys many-to-one relationship junction table individual data tables pk associative table typically composed fk columns associative tables colloquially known many names including association table bridge table cross-reference table crosswalk intermediary table intersection table join table junction table link table linking table many-to-many resolver map table mapping table pairing table pivot table used incorrectly laravel confused correct use pivot table spreadsheets transition table example practical use associative table would assign permissions users multiple users user assigned zero permissions individual permissions may granted one users select-statement junction table usually involves joining main table junction table return list users permissions inserting junction table involves multiple steps first inserting main table updating junction table using foreign keys database automatically dereference values userpermissions table tables
[ 7999, 6462, 5663, 6543, 243 ]
Test
3,104
3
Multiuser_DOS_Federation:multiuser dos federation multiuser dos federation mdos industry alliance promote growth acceptance multi-user dos-based solutions 286 386 486 computers formed july 1990 idea reduce costs allowing workgroups run dos applications shared pc working terminals workstations 18 february 1991 several members multiuser dos federation issued press release regarding intentions support dpmi mostly dpmi 1.0 products including alloy computer products inc. pc-plus bluebird systems inc. superdos concurrent controls inc. cci multiuser dos digital research inc. dr multiuser dos h computer systems inc. tsx-32 starpath systems inc. vmos/3 software link pc-mos/386 theos software corporation theos intelligent graphics corporation vm/386
[ 1648, 6634 ]
Validation
3,105
5
Precision_Time_Protocol:precision time protocol precision time protocol ptp protocol used synchronize clocks throughout computer network local area network achieves clock accuracy sub-microsecond range making suitable measurement control systems ptp currently employed synchronize financial transactions mobile phone tower transmissions sub-sea acoustic arrays networks require precise timing lack access satellite navigation signals ptp originally defined ieee 1588-2002 standard officially entitled standard precision clock synchronization protocol networked measurement control systems published 2002 2008 ieee 1588-2008 released revised standard also known ptp version 2 improves accuracy precision robustness backward compatible original 2002 version according john eidson led ieee 1588-2002 standardization effort ieee 1588 designed fill niche well served either two dominant protocols ntp gps ieee 1588 designed local systems requiring accuracies beyond attainable using ntp also designed applications bear cost gps receiver node gps signals inaccessible ieee 1588 standards describe hierarchical master-slave architecture clock distribution architecture time distribution system consists one communication media network segments one clocks ordinary clock device single network connection either source master destination slave synchronization reference boundary clock multiple network connections accurately synchronize one network segment another synchronization master selected network segments system root timing reference called grandmaster grandmaster transmits synchronization information clocks residing network segment boundary clocks presence segment relay accurate time segments also connected simplified ptp system frequently consists ordinary clocks connected single network boundary clocks used grandmaster elected clocks synchronize directly ieee 1588-2008 introduces clock associated network equipment used convey ptp messages transparent clock modifies ptp messages pass device timestamps messages corrected time spent traversing network equipment scheme improves distribution accuracy compensating delivery variability across network ptp typically uses epoch unix time start 1 january 1970 unix time based coordinated universal time utc subject leap seconds ptp based international atomic time tai ptp grandmaster communicates current offset utc tai utc computed received ptp time synchronization management ptp system achieved exchange messages across communications medium end ptp uses following message types messages categorized event general messages event messages time-critical accuracy transmission receipt timestamp accuracy directly affects clock distribution accuracy sync delay_req pdelay_req pdelay_resp event messages general messages conventional protocol data units data messages importance ptp transmission receipt timestamps announce follow_up delay_resp pdelay_resp_follow_up management signaling messages members general message class ptp messages may use user datagram protocol internet protocol udp/ip transport ieee 1588-2002 uses ipv4 transports extended include ipv6 ieee 1588-2008 ieee 1588-2002 ptp messages sent using multicast messaging ieee 1588-2008 introduced option devices negotiate unicast transmission port-by-port basis multicast transmissions use ip multicast addressing multicast group addresses defined ipv4 ipv6 see table time-critical event messages sync delay_req pdelay_req pdelay_resp sent port number 319 general messages announce follow_up delay_resp pdelay_resp_follow_up management signaling use port number 320 ieee 1588-2008 encapsulation also defined devicenet controlnet profinet domain interacting set clocks synchronize one another using ptp clocks assigned domain virtue contents subdomain name ieee 1588-2002 domainnumber ieee 1588-2008 fields ptp messages receive generate domains allow multiple clock distribution systems share communications medium best master clock bmc algorithm performs distributed selection best candidate clock based following clock properties ieee 1588-2008 uses hierarchical selection algorithm based following properties indicated order ieee 1588-2002 uses selection algorithm based similar properties clock properties advertised ieee 1588-2002 sync messages ieee 1588-2008 announce messages current clock master transmits information regular interval clock considers better master clock transmit information order invoke change master clock current master recognises better clock current master stops transmitting sync messages associated clock properties announce messages case ieee 1588-2008 better clock takes master bmc algorithm considers self-declared quality clocks take network link quality consideration use bmc algorithm ptp selects master source time ieee 1588 domain network segment domain clocks determine offset master let variable formula_1 represent physical time given slave device offset formula_2 time formula_1 defined formula_5 represents time measured slave clock physical time formula_1 formula_7 represents time measured master clock physical time formula_1 master periodically broadcasts current time message clocks ieee 1588-2002 broadcasts per second ieee 1588-2008 10 per second permitted broadcast begins time formula_9 sync message sent master clocks domain clock receiving message takes note local time formula_10 message received master may subsequently send multicast follow_up accurate formula_9 timestamp masters ability present accurate timestamp sync message transmission complete able retrieve accurate timestamp sync transmission network hardware masters limitation use follow_up message convey formula_9 masters ptp capabilities built network hardware able present accurate timestamp sync message need send follow_up messages order accurately synchronize master clocks must individually determine network transit time sync messages transit time determined indirectly measuring round-trip time clock master clocks initiate exchange master designed measure transit time formula_13 exchange begins clock sending delay_req message time formula_14 master master receives timestamps delay_req time formula_15 responds delay_resp message master includes timestamp formula_15 delay_resp message exchanges clock learns formula_9 formula_10 formula_14 formula_15 formula_13 transit time sync message formula_22 constant offset master slave clocks combining two equations find clock knows offset formula_22 transaction correct amount bring agreement master one assumption exchange messages happens period time small offset safely considered constant period another assumption transit time message going master slave equal transit time message going slave master finally assumed master slave accurately measure time send receive message degree assumptions hold true determines accuracy clock slave device ieee 1588-2008 standard lists following set features implementations may choose support
[ 979, 6071, 4926, 4321, 2659, 309, 3799, 5847, 2672, 7209, 3819, 3821, 3230, 4093, 7217, 4738, 5181, 7777, 4836, 4377, 2714 ]
Train
3,106
9
Make_(software):make software software development make build automation tool automatically builds executable programs libraries source code reading files called makefiles specify derive target program though integrated development environments language-specific compiler features also used manage build process make remains widely used especially unix unix-like operating systems besides building programs make used manage project files must updated automatically others whenever others change number dependency-tracking build utilities make one widespread primarily due inclusion unix starting pwb/unix 1.0 featured variety tools targeting software development tasks originally created stuart feldman april 1976 bell labs feldman received 2003 acm software system award authoring widespread tool feldman inspired write make experience coworker futilely debugging program executable accidentally updated changes make introduction unix build system commonly consisted operating system dependent make install shell scripts accompanying program source able combine commands different targets single file able abstract dependency tracking archive handling important step direction modern build environments make gone number rewrites including number from-scratch variants used file format basic algorithmic principles also provided number non-standard enhancements posix includes standardization basic features operation make utility implemented varying degrees completeness unix-based versions make general simple makefiles may used various versions make reasonable success gnu make makepp versions bsd make default looking first files named gnumakefile makeppfile bsdmakefile respectively allows one put makefiles use implementation-defined behavior separate locations make typically used build executable programs libraries source code generally though make applicable process involves executing arbitrary commands transform source file target result example make could used detect change made image file source transformation actions might convert file specific format copy result content management system send e-mail predefined set users indicating actions performed make invoked list target file names build command-line arguments make target ... without arguments make builds first target appears makefile traditionally symbolic phony target named make decides whether target needs regenerated comparing file modification times solves problem avoiding building files already date fails file changes modification time stays past changes could caused restoring older version source file network filesystem source files clock timezone synchronized machine running make user must handle situation forcing complete build conversely source file modification time future triggers unnecessary rebuilding may inconvenience users make searches current directory makefile use e.g gnu make searches files order file named one gnumakefile makefile makefile runs specified default target file makefile language similar declarative programming class language necessary end conditions described order actions taken important sometimes confusing programmers used imperative programming one problem build automation tailoring build process given platform instance compiler used one platform might accept options one used another well handled make problem typically handled generating platform-specific build instructions turn processed make common tools process autoconf cmake gyp advanced ng makefile consists rules rule begins textual dependency line defines target followed colon optionally enumeration components files targets target depends dependency line arranged target left hand colon depends components right hand colon common refer components prerequisites target usually rule single unique target rather multiple targets example c .o object file created .c files .c files come first i.e specific object file target depends c source file header files make understand recognize distinguish different kinds files opens possibility human error forgotten extra dependency may immediately obvious may result subtle bugs generated software possible write makefiles generate dependencies calling third-party tools makefile generators automake toolchain provided gnu project automatically dependency line may followed series tab indented command lines define transform components usually source files target usually output prerequisites recent modification time target command lines run gnu make documentation refers commands associated rule recipe first command may appear line prerequisites separated semicolon targets prerequisites command example hello echo hello make decide start topological sorting command line must begin tab character recognized command tab whitespace character space character special meaning problematic since may visual difference tab series space characters aspect syntax makefiles often subject criticism described eric s. raymond one worst design botches history unix unix-haters handbook said using tabs part syntax like one pungee stick traps green berets feldman explains choice caused workaround early implementation difficulty preserved desire backward compatibility first users however gnu make since version 3.82 allows choose symbol one character recipe prefix using .recipeprefix special variable example .recipeprefix command executed separate shell command-line interpreter instance since operating systems use different command-line interpreters lead unportable makefiles instance gnu make default executes commands /bin/sh unix commands like cp normally used contrast microsoft nmake executes commands cmd.exe batch commands like copy available necessarily cp rule may command lines defined dependency line consist solely components refer targets example realclean clean distclean command lines rule usually arranged generate target example file.html newer converted text contents makefile file.txt file.html rule would triggered make updates file.txt following invocation make would typically use rule update file.txt target file.html newer make file.txt command lines one following three prefixes ignoring errors silencing echo alternatively obtained via special targets .ignore .silent microsoft nmake predefined rules omitted makefiles e.g c.obj cc cflags makefile contain definitions macros macros usually referred variables hold simple string definitions like cc=clang macros makefiles may overridden command-line arguments passed make utility environment variables also available macros macros allow users specify programs invoked custom behavior build process example macro cc frequently used makefiles refer location c compiler user may wish specify particular compiler use new macros simple variables traditionally defined using capital letters macro definition macro used expanding traditionally done enclosing name inside codice_1 omitting parentheses leads make interpreting next letter entire variable name equivalent form uses curly braces rather parentheses i.e codice_2 style used bsds new_macro macro macro2 macros composed shell commands using command substitution operator denoted backticks codice_3 yyyymmdd date content definition stored lazy evaluation used meaning macros normally expanded expansions actually required used command lines rule extended example package package version date y. archive package version dist generic syntax overriding macros command line make macro= value macro= value ... target target ... makefiles access number predefined internal macros common target component1 component2 suffix rules targets names form codice_4 used launch actions based file extension command lines suffix rules posix specifies internal macro codice_5 refers first prerequisite codice_6 refers target example converts html file text shell redirection token codice_7 part command line whereas codice_5 macro referring html file .suffixes .txt .html .html.txt called command line example expands make -n file.txt lynx -dump file.html file.txt suffix rules prerequisites treated normal files unusual names suffix rules gnu make supports suffix rules compatibility old makefiles otherwise encourages usage pattern rules pattern rule looks like ordinary rule except target contains exactly one character target considered pattern matching file names match substring zero characters characters match prerequisites likewise use show names relate target name example suffix rule would look like following pattern rule .txt .html single-line comments started hash symbol directives makefiles include makefiles line continuation indicated backslash codice_9 character end line makefiles traditionally used compiling code *.c *.cc *.c etc also used providing commands automate common tasks one makefile called command line make without argument runs first target make help show available targets make dist make release archive current dir makefile package package version date y. release_dir .. release_file package version help list dist simple makefile default rule listed first compiles source file called helloworld.c using system c compiler also provides clean target remove generated files user desires start codice_6 codice_5 two so-called internal macros also known automatic variables stand target name implicit source respectively example codice_12 expands space delimited list prerequisites number internal macros cflags -g helloworld helloworld helloworld.o helloworld.o helloworld.c clean frc frc many systems come predefined make rules macros specify common tasks compilation based file suffix lets users omit actual often unportable instructions generate target source system makefile could modified follows helloworld helloworld helloworld.o clean frc .c.o frc .suffixes .c helloworld.o depends helloworld.c automatically handled make simple example one illustrated hardly matters real power suffix rules becomes evident number source files software project starts grow one write rule linking step declare object files prerequisites make implicitly determine make object files look changes source files simple suffix rules work well long source files depend files header files another route simplify build process use so-called pattern matching rules combined compiler-assisted dependency generation final example requiring gcc compiler gnu make generic makefile compiles c files folder corresponding object files links final executable compilation takes place dependencies gathered makefile-friendly format hidden file .depend included makefile portable programs ought avoid constructs used ifneq makefile requires gnu make endif program foo c_files wildcard *.c objs patsubst .c .o c_files cc cc cflags -wall -pedantic ldflags ldlibs -lm program program .depend objs depend .depend .depend cmd gcc -mm -mf depend var cat depend » .depend .depend -include .depend .o .c .c clean .phony clean depend
[ 361, 6789, 4662, 366, 2183, 3944, 1837, 3984, 2589, 3987, 6470, 1493, 5416, 4722, 5786, 5789, 4020, 3683, 6507, 3685, 4387, 7246, 1537, 473, 5480, 3023, 5138, 1572, 3031, 1213, 149, 7667, 4447, 6577, 8029, 1598, 6233, 3417, 1991, 6242, ...
Test
3,107
2
IPhone_5:iphone 5 iphone 5 smartphone designed marketed apple inc sixth generation iphone succeeding iphone 4s preceding iphone 5s iphone 5c formally unveiled part press event september 12 2012 released september 21 2012 iphone 5 first iphone announced september setting trend subsequent iphone releases first iphone completely developed guidance tim cook last iphone overseen steve jobs iphone 5 featured major design changes comparison predecessor included aluminum-based body thinner lighter previous models taller screen nearly aspect ratio apple a6 system-on-chip lte support lightning new compact dock connector replaced 30-pin design used previous iphone models second apple phone include new sony-made 8 mp camera first introduced iphone 4s apple began taking pre-orders september 14 2012 two million received within 24 hours initial demand iphone 5 exceeded supply available launch september 21 2012 described apple extraordinary pre-orders sold twenty times faster predecessors reception iphone 5 generally positive consumers reviewers noted hardware issues unintended purple hue photos taken phone coating prone chipping reception also mixed apple decision switch different dock connector design change affected iphone 5 compatibility accessories otherwise compatible previous iterations line iphone 5 officially discontinued apple september 10 2013 announcement successors iphone 5s iphone 5c iphone 5 second-shortest lifespan iphone ever produced twelve months production breaking apple standard practice selling existing iphone model reduced price upon release new model broken iphone x ten-months production november 2017 september 2018 replaced midrange entry-level device iphone 5c 5c internal hardware specifications almost identical 5 albeit less expensive polycarbonate exterior iphone 5 supports ios 6 7 8 9 10 iphone 5 second iphone support five major versions ios iphone 4s rumors began shortly announcement iphone 4s though detailed leaks emerge june 2012 july 30 2012 reports pinpointed dates iphone 5 would unveiled released along accurate predictions features september 4 2012 apple announced would hosting event yerba buena center arts san francisco september 12 2012 shadow numeral 5 featured invitations sent media suggesting next iphone would unveiled event unveiling apple announced iphone 5 also introduced new ipod nano ipod touch models also stated pre-orders would accepted starting september 14 2012 two million pre-orders received within 24 hours initial demand new phone exceeded record set predecessor iphone 4s selling 5 million units first three days november 30 2012 apple added unlocked version iphone 5 online us store 16 gb model starting us 649 iphone 5 officially discontinued apple september 10 2013 announcement successors iphone 5s iphone 5c 5c shared almost internal hardware iphone 5 5c used lower-cost poly-carbonate plastic case place original 5 aluminum form introduction 5c deviated apple previous market strategy previous iphone model would remain production sold lower price point new model april 28 2014 apple initiated warranty recall program replace failing power buttons iphone 5 models manufactured prior march 2013 cost august 23 2014 apple announced program replace batteries iphone 5 models may suddenly experience shorter battery life need charged frequently sold september 2012 january 2013 following release iphone 5 samsung announced filing lawsuit apple infringing eight patents case scheduled begin 2014 statement samsung said little choice take steps necessary protect innovations intellectual property rights litigation two involving patent infringement ongoing fought several court cases around world components labor required construct basic iphone 5 estimated cost us 207 us 19 cost components corresponding iphone 4s model lte module iphone 5 alone costs 34 10 cellular module iphone 4s similarly screens used iphone 5 cost 44 7 screen predecessor mashable noted profit margin selling device huge iphone 5 retails us 649 announcement device lack supply evident due shortage components screen reports emerged stating sharp unable ship screen debut iphone 5 manufacturers reported difficult keep demand result number pre-orders rose due uncertainty stock retail stores delivery dates pre-orders postponed dates initial release date device china labor watch new york state–based ngo reported three four thousand foxconn workers work iphone 5 production plant zhengzhou stopped working october 5 2012 strikes occurred apple implemented stricter quality standard products includes 0.02 mm restriction indentations inflicted production imposed demands related scratches frames back covers strikes also attributed employer forcing employees work public holiday report stated training inadequate quality demands expected led employees producing products meet standards strike conflicts quality control inspectors employees resulted brawls china labor watch also claimed concerns raised inspectors addressed factory management foxconn spokesmen admitted micromanagement problem exists also said 300 400 workers absent conflicts influence production processes november 2012 foxconn chairman terry gou reported delay production due undisclosed difficulties assembly features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode iphone 5 shipped ios 6 released september 19 2012 many features work specifically included ios 6.0 operating system worked certain territories release apple said rolling program take longer implement across regions phone act hotspot sharing internet connection wifi bluetooth usb also accesses app store online application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple play music movies television shows ebooks audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options always presented alphabetically except playlists retain order itunes users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks iphone 5 volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist like iphone 4s iphone 5 siri allows user operate iphone spoken commands software improved ios 6 include ability make restaurant reservations launch apps dictate facebook twitter updates retrieve movie reviews detailed sports statistics texting aided voice assistant converts speech text addition regular texting messaging supports imessage specialized instant messaging program service allows unlimited texting apple devices running ios 5 later supports inclusion content images sound text messages integration device voice-controlled software assistant read acknowledgements sent messages input device comes keyboard displayed multi-touch screen voice-to text speaking microphone entered text supported predictive suggestion software multi-language spell-checker recognises many regional accents different languages ios 6 features several new and/or updated apps includes apple maps passbook apple built-in maps app replaced former maps app powered google maps universally derided lacked many features present competing maps apps uses apple new vector-based engine eliminates lag making smoother zooming new maps turn-by-turn navigation spoken directions 3d views major cities real-time traffic ios 6 able retrieve documents boarding passes admission tickets coupons loyalty cards new passbook app ios device passbook scanned reader process mobile payment locations compatible hardware app context-aware features notifications relevant coupons immediate vicinity given store facebook comes integrated apple native apps ios 6 facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store new privacy settings available user addition location services following added ios 6 photos already partially restricted ios 5 contacts address book calendars reminders bluetooth sharing twitter facebook sina weibo ios 6 also comes limit ad tracking user control general settings menu allow users option prevent targeted advertising apple advertising identifier replaces company existing unique device identification udid standard advertising networks yet using apple advertising identifier device identifier standard would affected although apple require standard future apple emphasized improved build quality iphone 5 press event frame used previous versions redesigned use aluminum composite frame used stainless steel instead aluminium due steve jobs preference metal thought looks beautiful wears 18 thinner 20 lighter 12 less overall volume predecessor iphone 4s phone aluminum body thick september 2012 conference apple claimed thinnest smartphone world 7.6 mm though claim disputed chinese oppo finder thinner smartphones could considered thinner depending upon thickness measured oppo finder measured thinnest point thickest point making overall thinner iphone uses system chip soc called apple a6 soc comprises 1.3 ghz dual-core processor 1gb ram tri-core powervr sgx543mp4 running 266 mhz. ref name= geekbench test 28/9 /ref operating memory lpddr2-1066 edram doubled 512 mb 1 gb storage capacities available fixed 16 32 64 gb 4s plug-in memory cards supported two color options black black glass slate-colored metal trim white white ceramic silver-colored metal trim color options though differently implemented predecessor 4s iphone 5 retains 8 megapixel back camera iphone 4s improved low-light performance 40 faster photo capture predecessors purple hue strong source light present photograph front camera accessible facetime camera app lower resolution 1.2 megapixels rechargeable lithium-ion battery charge capacity 1440mah built replaced user rated ≤225 hours standby time ≤8 hours talk time three separate models phone available one supporting cdma two gsm versions knock-on effects version device actually work countries/regions phone takes nano-sim smaller micro-sim hardware benchmarking conducted using geekbench glbenchmark validates several claims apple included website mentioned unveiling device include two times faster two times graphics performance geekbench overall hardware assessment iphone 5 received score approximately 2.5 times higher iphone 4s benchmark conducted using glbenchmark iphone 5 returned score 2 times better iphone 4s result however inconsistent 3d graphics benchmark assessment using passmark returned score approximately 1.45 times better iphone 4s battery life assessments conducted anandtech concluded battery life shorter iphone 5 predecessor performing certain tasks however performing tasks iphone 5 battery outlasts iphone 4s retina display 1,136 × 640 pixels aspect ratio almost exactly 16:9 minus one extra row horizontal pixels diagonal 4 display size 6.7 square inches compared 5.7 iphone 4 4s pixel density remains 4s model 326 pixels per inch screen icons iphone 5 arranged matrix six rows four icons increased screen size allows sixth row icons added five rows present iphone 4 in-cell touch sensor technology sharp slims screen allows thinner phone screen color saturation 44 greater predecessor three microphones placed front side back noise cancellation video calls april 28 2014 apple initiated warranty recall program replace failing power buttons iphone 5 models manufactured prior march 2013 cost august 23 2014 apple announced program replace batteries iphone 5 models may suddenly experience shorter battery life need charged frequently sold september 2012 january 2013 well ipod touch 5th generation ipod nano 7th generation ipad 4th generation ipad mini feature new dock connector named lightning replaces 30-pin apple dock connector introduced 2003 apple ipod 3rd generation apple lightning connector eight pins signaling digital new connector smaller previous one helping slimmer predecessors apple lightning cables duplicate pins two sides plug inserted either way round various accessories available convert apple lightning connector older 30-pin apple dock connector usb although old accessories work signals available particular video output ipod feature bmw automobiles earphones known apple earpods included iphone 5 devices announced apple media event september 12 2012 superseded earphones included previous generation iphones ipods according technology commentators redesign earphones aimed improve sound quality allowing air travel freely apple states redesign earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although redesigned earphones sounded better predecessor reviewers felt quality sound produced poor verizon sprint offer lte access us uk ee three able offer lte access march 26 2013 t-mobile announced would begin carrying iphone 5 making first iphone available four nationwide carriers united states t-mobile version iphone features modified version a1428 iphone 5 model enabling advanced wireless services aws support carriers canada selling lte networks including rogers wireless fido solutions bell mobility virgin mobile canada telus mobility koodo mobile 42 officially recognized bands exist lte however rollouts coalescing around more-popular bands based historically made available specific regions europe bands available lte include 2.6 ghz 3g-expansion band 800 mhz cleared analogue tv 1,800 mhz appearing places including uk germany carrier network supported t-mobile 1,800 mhz band allocated lte countries europe including denmark norway sweden others—will able offer lte connectivity via iphone 5 customers current lte networks already deployed lte 2.6 ghz band iphone 5 support november 2012 representative swisscom reported iphone 5 supports lte networks tested certified apple unlike iphone 4s world phone produced apple three versions iphone 5 differ frequency used three work 2g gsm/gprs 3g umts/edge networks 800 1900 mhz bands used americas 900 1800 mhz bands used elsewhere cdma a1429 model works cdma networks sprint verizon another version supports lte 1700/2100 mhz aws band 700 mhz band recovered conversion digital television us channels 52 56 currently network supports band gsm a1429 supports several lte bands available countries lte bands 1 3 5 received mainly positive reviews commentators reviewers tim stevens engadget praised high resolution screen surpassing considered one best phone screens available market stevens critical new connector incompatible devices cables use superseded 30-pin connector although la times reported change necessary make device smaller predecessor engadget agreed apple fulfilled promises stated website better battery performance two times graphics performance two times faster david pogue new york times considered 4-inch retina display nice life-changing change praised lightning connector size sturdiness reversibility noting lack support older accessories remarking apple long history killing technologies inconveniently expensively public come love technology columnist ed baig usa today impressed apple met public lofty expectations iphone 5 competitive market repair-ability review ifixit found iphone 5 easier disassemble repair predecessor wired reported iphone 5 design carried iphone 5s iphone se regarded long golden child apple phone design benchmark phones general succeeding iphone 6/6s design less critically acclaimed felt little bit wrong though holding slick 650 bar soap wired described iphone 5 elegance rooted way aluminum glass work together felt streamlined yet substantial different iphone 6 feels substantial size alone plus unlike ubiquitous rounded corners 6 iphone 5 ’ really look like anything else market time however iphone 5 design suited scaling contrast iphone 6/6s could better accommodate growing consumer trend towards larger screen sizes indeed spawned 6/6s plus phablet models reviewers commentators critical new maps app replaced google maps ios 6 reported contain errors misplacement landmark tags directing users incorrect locations poor satellite images nine days maps release apple issued statement apologizing frustration caused customers recommending try alternate mapping services gizmodo editor diaz discussed correspondence apple reader purple flare pictures taken iphone 5 camera apple response issue normal advised customer aim camera away bright light sources taking photos tests conducted techcrunch indicate problem existed iphone 4s distinct pronounced iphone 5 consumer reports found purple haze effect occurred several manufacturers phones including samsung galaxy iii motorola droid razr maxx less pronounced iphone 4s report concluded digital cameras general including higher-end slrs suffer lens flare purple-tinted effect uncommon anecdotal claims iphone 5 coating chipping exposing bright aluminium underneath apple executive response email correspondence affected customer summarized normal aluminum scratch term scuffgate reference antennagate affected iphone 4 applied various sources cnet yahoo news things digital describe scuffing issue users reported internet white model leaked light behind screen though issue unique iphone 5 also affected apple devices techcrunch reported sold twenty times faster 4 4s models apple said blown away customer response phil schiller apple vice-president worldwide marketing said two million orders received first 24 hours said fastest-selling iphone company ever offered selling five million units launch weekend exceeding supply available release sale iphone 5 also slowed growth android according market share reports released kantar worldpanel comtech first 16 days phone initial release comprised 20 phones sold period j.p. morgan chief economist michael feroli said sales could boost annualized us gdp growth 3.2 billion 12.8 billion annual rate shortly announcement iphone 5 preceding launch apple stock price rose record 705.07 within three months fell 507.48 according analysis eric savitz apple stock decline resulting losses result issue new maps application disappointed investors points initial hardware sales five million compared projections twice primary cause since release iphone 5 discounts previous generation iphones enabled apple maintain market lead united states japan iphone continued lag behind combined total android phones global market
[ 6788, 3940, 7890, 722, 1094, 4320, 2926, 4690, 734, 740, 5752, 405, 6125, 2954, 1123, 6847, 6142, 2609, 1895, 4376, 5091, 4749, 5450, 7601, 6165, 3001, 2284, 3008, 5477, 120, 1940, 2300, 5486, 6198, 3025, 2665, 2679, 1582, 2327, 6565, 2...
Test
3,108
3
Annapurna_Labs:annapurna labs annapurna labs israel-based microelectronics company acquired amazon.com amazon web services division reputedly us 350–370m january 2015 annapurna labs owned avigdor willenz investors including british-based holding companies venture capital firm walden international board members include lip-bu tan ceo walden international cadence design systems features features al73400 announced november 2018 amazon aws invent 2018 features
[ 5064, 5472, 2711 ]
Test
3,109
4
Macrium_Reflect:macrium reflect macrium reflect backup utility microsoft windows developed paramount software uk ltd 2006 creates disk images file backup archives using microsoft volume shadow copy service ensure 'point time data accuracy macrium reflect backup whole partitions individual files folders single compressed mountable archive file used restore exact images partitions hard disk disaster recovery new hard disk data migration received numerous favorable reviews often recommended used example program cloning backup tutorials macrium reflect create full incremental differential backup images selectively back individual files folders data compressed encrypted real time using lz-based compression aes encryption algorithms images mounted drive letter windows explorer restored using custom macrium reflect rescue cd event partial complete system loss image used restore entire disk one partitions individual files folders macrium reflect clone one disk onto another restore image new hardware using pre-created macrium reflect rescue cd critical drivers required new system inserted image taken old system making compatible new hardware central management console available enables scheduling restore monitoring multiple networked computers running macrium reflect using web browser user interface unsupported free edition available home commercial use lacks features full versions incremental backup though includes differential backup still features found expensive commercial products
[ 6289, 2885, 4759, 5571, 8092, 788 ]
Test
3,110
2
Ettore_Perazzoli:ettore perazzoli ettore perazzoli june 15 1974 december 10 2003 italian free software developer born milan italy studied engineering politecnico di milano university wrote port x64 commodore 64 emulator unix dos thus turning cross-platform emulator renamed vice maintainer vice many years started microsoft windows port popular version vice started contributing gnome linux desktop environment helped writing gtkhtml nautilus evolution close friend nat friedman miguel de icaza invited work company founded ximian accepted 2001 moved boston united states ximian headquartered ximian led effort create evolution remained project manager died started writing application managing digital photo albums c personal use november 8 2003 published gnome concurrent versions system cvs server name f-spot december 12 2003 gnomedesktop.org website announced death
[ 1155, 3915, 4759, 578, 5690 ]
Test
3,111
4
AVG_AntiVirus:avg antivirus avg antivirus previously known avg abbreviation anti-virus guard family antivirus software developed avg technologies subsidiary avast available windows macos android brand avg comes grisoft first product anti-virus guard launched 1992 czech republic 1997 first avg licenses sold germany uk avg introduced u.s. 1998 avg free edition helped raise awareness avg product line 2006 avg security package grew include anti-spyware avg technologies acquired ewido networks anti-spyware group avg technologies acquired exploit prevention labs xpl december 2007 incorporated company linkscanner safe search surf technology avg 8.0 security product range released march 2008 january 2009 avg technologies acquired sana security developer identity theft prevention software software incorporated avg security product range march 2009 according avg technologies company 200 million active users worldwide including 100 million use products services mobile devices 7 july 2016 avast announced agreement acquire avg 1.3 billion avg provides avg antivirus free windows avg antivirus mac macos avg antivirus android android devices freemium products free download install update use technical support premium plan must purchased avg stopped providing new features windows xp windows vista january 2019 new versions require windows 7 later virus definitions still provided previous versions avg features common functions available modern antivirus internet security programs including periodic scans scans sent received emails including adding footers emails indicating ability repair virus-infected files quarantine area virus vault infected files held patent pending linkscanner technology acquired exploit prevention labs built avg products provides real-time updated protection exploits drive-by downloads linkscanner includes search-shield – safe search component places safety ratings next link google yahoo msn search results plus active surf-shield – safe surf component scans contents web site real-time ensure safe opened concerns regarding web analytics made linkscanner controversial component see linkscanner concerns avg 8.0 first released linkscanner safe search feature shown cause increase traffic web sites appear high search engine results pages since linkscanner disguises scans coming internet explorer 6 browser prescans site listed search results web site usage logs showed incorrect overinflated site visitor statistics prescanning every link search results also caused web sites transfer data usual resulting higher bandwidth usage web site operators slow performance users avg initially said site administrators would able filter linkscanner traffic site statistics leaving problem excess bandwidth usage still solved pay-per-click advertising affected increase traffic avg online shield feature designed check files ensure safe avg online shield also ensures safety exchanging files via instant messengers voip clients response complaints avg announced 9 july 2008 search-shield longer scan search result online new exploits causing spikes webmasters addressed us releasing new build date applies local blacklist prefetches scans links clicked user 2014 numerous reports dating back 2012 avg safeguard toolbar installs without consent user side effect installing applications toolbar program appears cause significant ram issues considered intrusive potentially unwanted program pup installed avg toolbar virtually impossible remove toolbar uninstaller function instead re-installing add-on manually removed consequently many discussions blog posts described complex procedures removal avg toolbar mixed results september 2015 avg announced would start tracking users profit analyzing data sale advertising industry measure received criticism consumers press security industry many users intended use software order protect spyware would expect functions spyware hidden security software december 2015 avg web tuneup google chrome extension automatically installed avg antivirus revealed contain multiple critical security vulnerabilities notably chrome users browsing history could exposed website cookies site user visited could read attacker trivial cross-site scripting xss issues could allow website execute arbitrary code another domain xss vulnerability allowed user mail mail.google.com read website financial information read user online banking site avg team fixed allowing mysearch.avg.com webtuneup.avg.com execute scripts despite remediation attackers could leverage attacks xss vulnerability found avg sites april 2016 web tuneup still available download avg website avg antivirus free 2012 selected pc magazine editors choice free antivirus category avg antivirus free 2015 received editor choice badge softchamp
[ 3165, 5452, 91, 4115, 7425, 3089, 4492, 1931, 4138, 385, 910, 1838, 6005, 2296, 2746, 4689, 5571, 6006, 4783, 3111, 7087, 496, 6644, 5144, 7193, 3123, 142, 935, 1395, 3561, 7478, 5601, 6043, 6305, 8134, 4456, 6777, 4645, 7597, 88 ]
Test
3,112
4
Purple_Penelope:purple penelope purple penelope demonstration secure system created defence research agency dra uk aim show security functionality windows nt could extended support users handling classified information purple penelope implemented domain based security model developed uk ministry defence dra take advantage using commercial shelf cots software implement secure systems within security domain access controls designed stop users accessing material without need-to-know prevent making mistakes handling classified data controls sharing information security domains stringent defend attacks hold users account actions model calls discretionary security labelling role based access controls within domain user-sanctioned release information domain coupled application oriented accounting audit purple penelope extended windows nt microsoft office application suite main features system discretionary labelling trusted path authorising security critical actions discretionary labelling mechanism added security labels files application windows clipboard user desktop display augmented stripe across top screen showed security label application window focus security label clipboard data copied clipboard clipboard label set source application window data copied clipboard destination application window label floated label new data user free change label window clipboard time user also access shared file store files shared file store labelled opened application application window label set file shared file store could written directly application user able copy files shared file store required confirm action using trusted path interface inaccessible applications software created purple penelope project licensed argus systems developed product called deep purple software also laid foundation qinetiq sybard suite product work cross-domain guard led production dera swipsy firewall toolkit purple derived colour associated joint operations uk mod time penelope name wife odysseus tricked suitors weaving burial shroud day unpicking night slow progress thought reflect state secure system development time
[ 7239, 6998, 4834, 2779 ]
Test
3,113
3
Gradius_(video_game):gradius video game arcade version gradius released internationally outside japan title nemesis although subsequent home releases original title home versions released various platforms nes msx home computer pc engine player controls trans-dimensional spaceship vic viper must battle waves enemies various environments game became synonymous phrase destroy core standard boss battles gradius series involved combat giant craft center would situated one several blue colored spheres bosses would designed way would straight passage exterior giant craft leads directly one cores player must fire shots passage avoiding attack patterns weapon emplacements body boss however small destructible walls situated passage impeding bullet shots damaging core must whittled away repeated well-placed shots way tiny walls represent boss shielding gauge core finally vulnerable attack bosses ability regenerate walls core sustained enough hits usually changes color blue red indicating critical condition destruction imminent upon destruction core piece boss may put commission seeing longer powered core cores destroyed entire boss defeated explodes satisfyingly note cores present organic bosses gradius bosses weak spots places mouth head eye gameplay begins vic viper relatively slow weak gun level capability generally insufficient engaging enemies vic viper gain greater capabilities collecting using power-up items arcade games utilize distinct power up-items correspond specific effect player character gradius single power-up item effect power-up item advance currently selected item power-up menu appears bottom screen desired power-up highlighted player obtain pressing power-up button returning menu initial state power-up highlighted development gradius began series creator hiroyasu machiguchi given team work asked kind game wanted develop response shoot 'em intent surpassing namco xevious made horizontal shooting game wanted reuse material scramble much possible originally naming game scramble 2 development lasted year refining experimenting gameplay team originally tried twenty different movement patterns options used process elimination something work story hiroyasu team inspired science fiction movies popular sci-fi films time star wars anime adaptations lensman team saw lensman together influenced game story plasma laser impressed gradius features laser weapon moai included add mysterious element game like xevious nazca lines gradius first released japan konami bubble system arcade board allows operators change software used proprietary magnetic-based media called bubble software game distributed standard printed circuit board north america europe title nemesis north american version nemesis features considerably increased difficulty compared japanese european version balance game spawns fleet orange enemies player loses life order provide many power-up capsules possible order recover many upgrades possible title screen also updated showing in-game reproduction promotional artwork behind logo first home conversion gradius released nintendo famicom console april 25 1986 japan due hardware limitations famicom many level designs simplified moai stage example lacks vertical scrolling present arcade game maximum amount options player upgrade reduced four two version added cheat code entered game paused grants player ship almost power-ups code would appear many later konami nes consoles contra life force becoming known konami code nes version gradius released north america december 1986 first nes game released konami region unlike original arcade game title kept unchanged regions nes version produced arcades nintendo vs. system board title vs. gradius well playchoice 10 cabinet msx version gradius released july 25 1986 japan months famicom version also released europe nemesis title version underwent changes similar famicom version adds slew exclusive content make downgrade new stage bone planet added inverted volcano stage antennoid stage featuring exclusive enemy types also four hidden warp zones ability play titular ship twinbee msx version game played alongside nemesis pc engine version gradius released november 15 1991 exclusively japan released 2-megabit hucard relatively omissions compared nes msx versions added desert planet stage similar bone planet stage msx version lower resolution pc engine compared original arcade hardware pc engine features slight vertical-scrolling addition msx gradius also ported microcomputers shortly release zx spectrum amstrad cpc commodore 64 europe nemesis final challenge well nec pc-8801 sharp x1 japan port x68000 computer also included early models computer original gradius also included collection gradius deluxe pack playstation sega saturn gradius collection playstation portable arcade version digitally released playstation 4 part arcade archives series option play four regional variants game game went number 2 uk sales charts behind feud western cover art nes version claimed sold one million copies japan gamespot stated gradius one toughest side-scrolling shooter games available nes second contra ign given game rating 7 10 re-release wii virtual console hailed one greatest classic side-scrolling shooter games gradius spawned several sequels first 1986 salamander series continued seventh generation gradius rebirth also re-released windows store december 20 2013 gamenow may 2014 playstation 4 arcade archives january 25 japan nes port re-released nintendo switch online september 19 2018 worldwide update release november 14 2018 worldwide
[ 4759, 7619, 7947, 6429 ]
Validation
3,114
2
BoundsChecker:boundschecker boundschecker memory checking api call validation tool used c++ software development microsoft visual c++ created numega early 1990s numega purchased compuware 1997 boundschecker became part larger tool suite devpartner studio micro focus purchased product line compuware 2009 comparable tools include purify insure++ valgrind boundschecker may run two distinct modes activecheck work application finalcheck makes use instrumentation added application built activecheck performs less intrusive analysis monitors calls application c runtime library windows api calls com objects monitoring memory allocations releases detect memory leaks overruns monitoring api com calls enables activecheck check parameters returns exceptions report exceptions occur thread deadlocks also detected monitoring synchronization objects calls giving actual potential deadlock detection finalcheck requires instrumented build gives much deeper intrusive analysis provides detection features activecheck plus ability detect buffer overflows read write uninitialized memory accesses monitors every scope change tracks pointers referencing memory objects api calls monitored input parameters verified function calls actually performed warning possible problems api return codes also monitored error codes logged validation limited apis known boundschecker currently several thousand number memory tracking enabled api call validation make use information gathered precise validation memory pointers memory tracking api validation enabled becomes possible detect many kinds array buffer overrun conditions compiler instrumentation enhances ability feature product originally named api com method .net interop function calls logged detail noting call parameter values resulting return values feature limited value non-trivial applications often result session log quickly becoming large report generated analyzing .net interop garbage collection finalizer activity life process test certain kinds deadly embraces lockups detected current version 11.4.2898 boundschecker supports 32-bit 64-bit native applications windows xp windows 10 2019 spring update ms-dos 16-bit windows windows 2000 applications longer supported part devpartner studio product integrates visual studio 2005 sp1 2008 sp1 2010 sp1 2012 update 4 2013 update 4 2015 update 3 2017 update 15.9.11 2019 update 16.0.3 may 2019 deadlock analysis feature yet supported x64 applications
[ 1203, 1019, 2153, 572, 573, 5571, 4017 ]
Test
3,115
1
James_Martin_(author):james martin author james martin 19 october 1933 – 24 june 2013 british information technology consultant author known work information technology engineering james martin born 19 october 1933 ashby-de-la-zouch england earned degree physics keble college oxford martin joined ibm 1959 since 1980s established several consultancy firms starting 1981 dixon doll tony carter established dmw doll martin worldwide london uk later renamed james martin associates jma partly bought texas instruments software 1991 later co-founded database design inc. ddi ann arbor michigan promulgate database design techniques develop tools help implement becoming market leader information technology engineering software ddi renamed knowledgeware eventually purchased fran tarkenton took public martin awarded honorary fellowship keble college oxford honorary doctor science degree university warwick july 2009 gave turing lecture 2008 according computerworld ’ 25th anniversary issue ranked fourth among 25 individuals influenced world computer science 1990s onwards martin lived private island agar ’ island bermuda died 24 june 2013 apparently swimming accident martin expert field systems design software development methodology information technology engineering computer-aided software engineering one first promote fourth-generation programming languages one main developers rapid application development methodology information technology engineering ite approach designing developing information systems somewhat chequered history follows two distinct threads said originated australia 1976 1980 appears first literature 1981 savant institute publication information engineering james martin clive finkelstein information technology engineering first provided data analysis database design techniques could used database administrators dbas systems analysts develop database designs systems based upon understanding operational processing needs organisations 1980s finkelstein thread evolved 1980 data processing dp -driven variant ie 1983 till 1986 ie evolved business-driven variant ie intended address rapidly changing business environment technical director charles m. richter 1983 1987 played significant role revamping ie methodology well designing ie software product user-data helped automate ie methodology opening way next generation information architecture martin thread information technology engineering strategy-driven outset 1983 focused possibility automating development process provision techniques business description could used populate data dictionary encyclopaedia could turn used source material code generation martin methodology provided foundation case computer-aided software engineering tool industry martin significant stakes least four case tool vendors—intech excelerator higher order software knowledgeware originally database design inc information engineering workbench james martin associates originally dmw headstrong original designers texas instruments ’ ca gen facility principal developers methodology end 1980s early 1990s martin thread incorporated rapid application development rad business process re-engineering bpr soon also entered object oriented field rapid application development rad term originally used describing software development process first developed successfully deployed mid-1970s d.dinadasa getahetta telephone co systems development center direction dan gielan following series remarkably successful implementations process gielan lectured extensively various forums methodology practice benefits process martin introduced approach 1991 martin ’ methodology involves iterative development construction prototypes recently term acronym come used broader generic sense encompasses variety techniques aimed speeding application development use web application frameworks types software frameworks rad approaches may entail compromises functionality performance exchange enabling faster development facilitating application maintenance 2004 martin donated £60m help establish james martin 21st century school 2010 renamed oxford martin school university oxford largest single donation university school aims formulate new concepts policies technologies make future better place 2009 martin pledged additional 50 million could matched donors condition met april 2010 martin wrote hundred books many best sellers information technology industry selection
[ 6507, 7999, 3166, 6144, 2866, 1600, 6123, 5424, 7017, 6345, 360 ]
Test
3,116
1
IMO_number:imo number international maritime organization imo number unique reference ships registered ship owners management companies imo numbers introduced improve maritime safety security reduce maritime fraud consist three letters imo followed unique seven-digit numbers assigned international convention safety life sea solas 1987 imo adopted resolution a.600 15 aimed enhancement maritime safety pollution prevention prevention maritime fraud assigning ship permanent identification number imo number remains linked hull lifetime regardless changes names flags owners imo adopted existing unique 7-digit numbers applied ships lloyd register since 1969 modified 6-digit numbers introduced 1963 solas regulation xi/3 adopted 1994 came force 1 january 1996 made imo numbers mandatory applied cargo vessels least 300 gross tons gt passenger vessels least 100 gt solas convention cargo ships means ships passenger ships imo scheme however apply december 2002 diplomatic conference maritime security adopted number measures aimed enhancing security ships port facilities included modification solas regulation xi-1/3 require ships identification numbers permanently marked visible place either ship hull superstructure well internally ship certificates passenger ships also carry marking horizontal surface visible air may 2005 imo adopted new solas regulation xi-1/3-1 mandatory company registered owner identification number scheme entry force 1 january 2009 regulation provides every ship owner management company shall unique identification number amendments require numbers added relevant certificates documents international safety management code ism international ship port facility security code isps like imo ship identification number company identification number seven-digit number prefix imo example ship atlantic star imo 5304986 referred former ship manager pullmantur cruises ship management ltd imo 5364264 former owner pullmantur cruises empress ltd. imo identification numbers ships companies registered owners assigned ihs markit previously lloyd register-fairplay new vessels imo number assigned hull construction generally upon keel laying many vessels fall outside mandatory requirements solas numbers allocated lloyd register ihs markit numerical series including fishing vessels commercial yachts imo number made three letters imo followed seven-digit number consists six-digit sequential unique number followed check digit integrity imo number verified using check digit done multiplying first six digits factor 2 7 corresponding position right left rightmost digit sum check digit example imo 9074729 9× 7 0× 6 7× 5 4× 4 7× 3 2× 2 139 01718423143
[ 7941 ]
Test
3,117
4
Egress_filtering:egress filtering computer networking egress filtering practice monitoring potentially restricting flow information outbound one network another typically information private tcp/ip computer network internet controlled tcp/ip packets sent internal network examined via router firewall similar edge device packets meet security policies allowed leave – denied egress egress filtering helps ensure unauthorized malicious traffic never leaves internal network corporate network typical recommendations traffic except emerging select set servers would denied egress restrictions made select protocols http email dns allowed user workstations would need configured either manually via proxy auto-config use one allowed servers proxy corporate networks also typically limited number internal address blocks use edge device boundary internal corporate network external networks internet used perform egress checks packets leaving internal network verifying source ip address outbound packets within range allocated internal address blocks egress filtering may require policy changes administrative work whenever new application requires external network access reason egress filtering uncommon feature consumer small business networks
[ 1567, 2043, 4734, 3017, 3338, 3638 ]
Test
3,118
0
IGlue:iglue iglue experimental database detailed search options containing entities information editing tool organizes interrelated images videos individuals institutions objects websites geographical locations cohesive data structures important components iglue system flexible database contains semantic elements entities relational connections in4 kft established august 2007 company specialised development online applications based university researches participation young university researchers power dream ventures financial investor
[ 1314, 2054 ]
Test
3,119
1
Cardinality_(data_modeling):cardinality data modeling database design cardinality fundamental principle one data aspect respect another critical feature relationship one must precise exact order explain aspect links together relational model tables related one-to-many many-to-many one-to-zero-or-one etc.. said cardinality given table relation another example consider database designed keep track hospital records database could many tables like model one-to-one relationship mostly used split table two order provide information concisely make understandable hospital example relationship could used keep apart doctors unique professional information administrative details data modeling collections data elements grouped data tables contain groups data field names called database attributes tables linked key fields primary key assigns field special order table example doctor last name field might assigned primary key doctor table people last name organized alphabetically according first three letters first name table also foreign key indicates field linked primary key another table complex data model involve hundreds related tables renowned computer scientist edgar f. codd created systematic method decompose organize relational databases codd steps organizing database tables keys called database normalization avoids certain hidden database design errors delete anomalies update anomalies real life process database normalization ends breaking tables larger number smaller tables real world data modeling critical data grows voluminous tables linked keys must used speed programmed retrieval data data model poorly crafted even computer applications system million records give end-users unacceptable response time delays reason data modeling keystone skills needed modern software developer entity–relationship model proposes technique produces entity–relationship diagrams erds employed capture information data model entity types relationships cardinality crow foot shows one-to-many relationship alternatively single line represents one-to-one relationship object-oriented application programming paradigm related database structure design uml class diagrams may used object modeling case object relationships modeled using uml associations multiplicity used associations denote cardinality examples
[ 1905, 6604, 7330, 7341, 6345, 5561, 906, 5217, 6098, 4054, 6543, 6636, 2663, 2124, 6737, 6739, 3801, 7999, 5943, 2054, 6932, 6386, 684, 6390, 7937, 7303, 6144, 4457, 6320, 1902, 6594 ]
Test
3,120
3
Dataflow:dataflow dataflow term used computing various meanings depending application context term used context software architecture data flow relates stream processing reactive programming dataflow software paradigm based idea disconnecting computational actors stages pipelines execute concurrently dataflow also called stream processing reactive programming multiple data-flow/stream processing languages various forms see stream processing data-flow hardware see dataflow architecture alternative classic von neumann architecture obvious example data-flow programming subset known reactive programming spreadsheets user enters new values instantly transmitted next logical actor formula calculation distributed data flows also proposed programming abstraction captures dynamics distributed multi-protocols data-centric perspective characteristic data flow programming promotes high-level functional specifications simplifies formal reasoning system components hardware architectures dataflow major topic computer architecture research 1970s early 1980s jack dennis mit pioneered field static dataflow architectures designs use conventional memory addresses data dependency tags called static dataflow machines machines allow multiple instances routines executed simultaneously simple tags could differentiate designs use content-addressable memory called dynamic dataflow machines arvind use tags memory facilitate parallelism data flows around computer components computer gets entered input devices leave output devices printer etc. dataflow network network concurrently executing processes automata communicate sending data channels see message passing kahn process networks named gilles kahn processes determinate implies determinate process computes continuous function input streams output streams network determinate processes determinate thus computing continuous function implies behavior networks described set recursive equations solved using fixed point theory movement transformation data represented series shapes lines
[ 4573, 7966, 5371, 718, 3531, 4864, 5662, 1854, 7557, 2764, 5947, 6922, 938, 5420, 6387, 3578, 357, 5190 ]
Test
3,121
3
Attack_of_the_Killer_Tomatoes_(1986_video_game):attack killer tomatoes 1986 video game attack killer tomatoes computer game released 1986 sinclair spectrum amstrad cpc msx based 1978 comedy film name player takes control wimp plasbot works tomato puree plant must rid plant mutated killer tomatoes referred title wimp plasbot checked 9:00 begin another day work discovered tomatoes mutated wimp must destroy killer tomatoes ensuring pizza parlours still supplied puree bouncing ones player must control wimp explores various isometric 3d rooms attempts destroy mutated killer tomatoes three different types tomato found factory killer tomatoes walk around legs square patterns kill wimp touch wimp must destroy tomatoes crushing hammer found somewhere factory second type tomato bounce wimp must stop bouncing squirting tomato sauce take crusher keep supply tomato puree third type tomato sit floor factory wimp touches cause time clock accelerate short clocking time reached killer tomatoes destroyed player loses punch cards found around factory give player extra time reviews fairly positive crash giving 89 sinclair rating 8/10 zx computing rating great crash said game despite awfulness movie name akt excellent game though owe quite lot previous releases rachael smith sinclair said ... converting film nominated worst vegetable movie time global created tie-in far better original deserved far better many superior films received zx computing said killer tomatoes quite complex professionally produced game keep occupied quite similarity knight lore inspired titles left feeling n't really offer anything n't seen
[ 4060 ]
Test
3,122
9
Program_slicing:program slicing computer programming program slicing computation set program statements program slice may affect values point interest referred slicing criterion program slicing used debugging locate source errors easily applications slicing include software maintenance optimization program analysis information flow control slicing techniques seeing rapid development since original definition mark weiser first slicing static i.e. applied source code information source code bogdan korel janusz laski introduced dynamic slicing works specific execution program given execution trace forms slicing exist instance path slicing based original definition weiser informally static program slice consists statements program p may affect value variable v statement x slice defined slicing criterion c= x v x statement program p v variable x static slice includes statements affect value variable v statement x possible input static slices computed backtracking dependencies statements specifically compute static slice x v first find statements directly affect value v statement x encountered recursively statement affect value v statement x compute slices variables z affect value v. union slices static slice x v example consider c program let compute slice write sum sum value sum directly affected statements sum sum w n 1 int sum 0 n 1 slice write sum sum union three slices int sum 0 statement dependencies fairly easy see slice sum sum w sum consists sum sum w int sum 0 two prior statements affect value sum sum sum w similarly slice sum sum w contains 1 n ++i slice sum sum w w contains statement int w 7 union statements executable code make slice executable slice merely add end brace loop declaration resulting static executable slice shown original code static executable slice criteria codice_1 sum new program shown fact static slicing techniques including weiser technique also remove codice_1 statement since statement codice_1 value codice_4 dependent statement often slice particular statement x include one variable v set variables statement x slice x v union slices criteria x v v variable set v. fast scalable yet slightly less accurate slicing approach extremely useful number reasons developers low cost practical means estimate impact change within minutes versus days important planning implementation new features understanding change related parts system also provide inexpensive test determine full expensive analysis system warranted fast slicing approach open new avenues research metrics mining histories based slicing slicing conducted large systems entire version histories practical time frames opens door number experiments empirical investigations previously costly undertake makes use information particular execution program dynamic slice contains statements actually affect value variable program point particular execution program rather statements may affected value variable program point arbitrary execution program example clarify difference static dynamic slicing consider small piece program unit iteration block containing if-else block statements codice_5 codice_6 blocks effect variable case static slicing since whole program unit looked irrespective particular execution program affected statements blocks would included slice case dynamic slicing consider particular execution program wherein codice_5 block gets executed affected statements codice_6 block get executed particular execution case dynamic slice would contain statements codice_5 block
[ 3552 ]
Test
3,123
4
ESET_NOD32:eset nod32 eset nod32 antivirus commonly known nod32 antivirus software package made slovak company eset eset nod32 antivirus sold two editions home edition business edition business edition packages add eset remote administrator allowing server deployment management mirroring threat signature database updates ability install microsoft windows server operating systems acronym nod stands nemocnica na okraji disku hospital end disk pun related czechoslovak medical drama series nemocnice na kraji města hospital end city first version nod32 called nod-ice dos-based program created 1987 miroslav trnka peter paško time computer viruses started become increasingly prevalent pcs running dos due limitations os lack multitasking among others n't feature on-demand/on-access protection features current versions besides virus scanning cleaning functionality featured heuristic analysis increasing popularity windows environment advent 32-bit cpus shift pc market increasing popularity internet came need completely different antivirus approach well thus original program re-written christened nod32 emphasize radical shift previous version win32 system compatibility initially program gained popularity workers eastern european countries eset based slovakia though program abbreviation originally pronounced individual letters worldwide use program led common single-word pronunciation sounding like english word nod additionally 32 portion name anachronism release 64-bit version windows 7 era company reached 10000th update virus definitions june 25 2014 march 10 2010 eset released eset mail security microsoft exchange server contains antimalware antispam modules supports microsoft exchange 5.5 2000 2003 2007 2010 eset mobile security replacement eset mobile antivirus provided anti-malware antispam functionality eset mobile security contains features older product adds new anti-theft features sim locking remote wipe well security audit firewall versions windows mobile symbian os available september 2010 home enterprise users eset remote administrator central management console designed allow network administrators manage eset software across corporate network november 5 2007 eset released internet security suite eset smart security version 3.0 compete security suites companies mcafee symantec avg kaspersky eset smart security incorporates anti-spam bidirectional firewall along traditional anti-malware features eset nod32 antivirus march 2 2009 eset smart security version 4.0 released adding integration eset sysinspector support mozilla thunderbird windows live mail new self-defense module updated firewall module eset sysrescue wizard creating bootable cd usb flash drives initially compatibility problems eset smart security 4.0 windows vista service pack 2 remedied update august 17 2010 eset smart security version 4.2 released new features enhancements changes september 14 2011 eset smart security version 5.0 released january 15 2013 eset smart security version 6.0 released version included anti-theft feature tracking lost misplaced stolen laptop october 16 2013 eset smart security version 7.0 released offers enhanced operation memory scanning blocks misuses known exploits october 2 2014 eset smart security version 8.0 released adds exploit blocking java botnet protection october 13 2015 eset smart security version 9.0 released eset sysinspector diagnostic tool allows in-depth analysis various aspects operating system including running processes registry content startup items network connections anti-stealth technology used discover hidden objects rootkits master boot record boot sector registry entries drivers services processes sysinspector logs standard xml files submitted experts analysis two logs compared find set items common logs log file saved service script removing malicious objects computer eset sysrescue live linux-based bootable live cd/usb image used boot clean heavily infected computers independent installed operating system program offered free charge download updates network connection present eset released free standalone removers malware widespread mebroot june 1 2010 first release candidate eset file security microsoft windows server v4.3 made available public program updated version eset nod32 antivirus business edition designed microsoft windows server operating systems contains revised user interface automatic exclusions critical directories files unspecified optimizations operation servers april 22 2010 eset mobile security windows mobile symbian os went public beta home edition released september 2 2010 january 20 2011 business edition went beta april 29 2011 eset beta test version android released august 10 2011 release candidate made available december 2 2009 eset nod32 antivirus 4 mac os x desktop eset nod32 antivirus 4 linux desktop released public testing eset stated release automatically detects cleans cross-platform malware scans archives automatically scans removable media usb flash drives mounted performs real-time scanning provides reports offers gui similar microsoft windows version second beta test versions released january 9 2010 third june 10 2010 september 13 2010 eset released eset nod32 antivirus mac os x business edition announced release candidate eset cybersecurity mac os x september 24 2010 eset released release candidate eset cybersecurity mac os x january 21 2011 eset released release candidate eset nod32 antivirus linux desktop may 5 2011 eset released beta test version eset smart security 5.0 beta version adds parental control cloud-based file reputation service gamer mode hips improvements antispam firewall removable media control functions june 14 2011 eset released release candidate eset smart security version 5.0 august 5 2014 eset smart security version 8.0 public beta 1 released offers enhanced exploit blocking botnet detection eset mobile antivirus aimed protecting smartphones viruses spyware adware trojans worms rootkits unwanted software also provided antispam filtering sms messages versions windows mobile symbian os available eset discontinued eset mobile antivirus january 2011 provides eset mobile security free upgrade licensed users eset mobile antivirus 1 february 2010 eset discontinued version 2.7 nod32 antivirus previous version nod32 antivirus removed eset website including product pages e-store version 2.7 last version supporting microsoft 95/98/me novell netware operating systems virus signature database updates customer support discontinued february 1 2012 network nod32 clients update central mirror server network nod32 antivirus holds icsa labs certifications nod32 accumulated one hundred eleven vb100 awards virus bulletin failed receive award three times comparative report virus bulletin published 2 september 2008 nod32 detected 94.4 malware 94.7 spyware stood competitors like norton internet security zonealarm windows live onecare avira antivir rap averages quadrant december 2011 june 2012 virus bulletin found eset pretty much level 94 noted ability block spam phishing earning award award 19 antivirus companies able acquire 28 april 2008 robert vamosi cnet.com reviewed version 3.0 nod32 gave score 3.5/5 6 march 2009 seth rosenblatt download.com reviewed 4.0 version nod32 gave rating 4.6/5 15 september 2011 seth rosenblatt cnet reviewed 5.0 version nod32 gave rating 5/5
[ 5452, 91, 4115, 4759, 7425, 2191, 3089, 7975, 2642, 4492, 1931, 385, 910, 4138, 1838, 2296, 4689, 5571, 6006, 4783, 3111, 7087, 578, 5401, 496, 3551, 5144, 6644, 7193, 142, 935, 1395, 3561, 6005, 7478, 5601, 6043, 6305, 8134, 73, 4734, ...
Test
3,124
3
Michael_Jackson's_Moonwalker:michael jackson moonwalker michael jackson moonwalker name several video games based 1988 michael jackson film moonwalker u.s. gold published various games home computers released 1989 sega developed two similarly themed beat 'em video games 1990 one released arcades another released mega drive/genesis master system games stories loosely follow story film michael jackson must rescue kidnapped children evil mr. big incorporate synthesized versions musician songs versions game released popular 8-bit 16-bit home computers time developed two small software houses irish emerald software ltd american keypunch software published u.k. company u.s. gold game features four different levels first level top-down maze-style level next level similar gameplay riding motorcycle collecting tokens third level side-scrolling level based smooth criminal clip player collects ammunition shoots gangsters openings player character last level involves morphing robot shooting soldiers openings player controlling crosshair different home computer version arcade video game sega programming triumph international audiovisuals help jackson released sega system 18 hardware game suffered sega suicide battery arcade board battery accidentally otherwise renders game unplayable end lifespan arcade distinctively different gameplay computer console counterparts focusing beat 'em gameplay elements rather platform game essentially beat-em-up although jackson attacks magic powers instead physical contact ability shoot short-ranged magic power enemies magic power charged holding attack button increase range damage magic power close enemies jackson executes spinning melee attack using magic power cabinet supports three people play simultaneously three players play jackson dressed suit white player 1 red player 2 black player 3 jackson special attack termed dance magic three different dance routines may performed player starts one three attacks per credit depending machine set bubbles chimpanzee michael real-life pet appears level collected rescued chimp transforms michael robotic version pop singer ability shoot laser bursts missiles absorb significantly damage home versions game released sega mega drive/genesis master system home video game systems though gameplay completely different arcade version version also rated pegi release virtual console never materialized never specified version considered rerelease home console versions actually based evolved version home computer version game gameplay somewhat similar shinobi series contrast arcade version three-quarters view shooter/fighter type game game involves player controlling pop star quest save kids kidnapped mr. big game levels music borrowed film though many music tracks taken jackson thriller album well player ability destroy enemies making dance jackson become robot rescuing certain child grabbing comet falls sky gameplay focused finding children resemble katie movie scattered throughout level behind objects doors objects empty contain enemies jackson standard attack stylized high kick commonly incorporated dance routines player continues hold kick button moves jackson backwards performs moonwalk dance move critical reviews mixed positive sinclair compared spectrum version game gauntlet operation wolf saying well animated surprising amount fun megatech said megadrive version addictive platform game excellent graphics mega magazine placed game number 91 list best megadrive games time saying average jackson later would go cameo role sega space channel 5 music/rhythm games dreamcast playstation 2 jackson also appeared secret character
[]
Test
3,125
3
Dragon_Knight_(video_game):dragon knight video game dragon knight ドラゴンナイト fantasy-themed eroge role-playing video game original entry dragon knight franchise originally developed published elf corporation 1989 remake created nec avenue 1995 versions released japan game adapted anime film 1991 followed dragon knight ii 1990 gameplay-wise dragon knight dungeon crawler typical era similar early wizardry games exploration combat shown first-person perspective using 2d engine combat game turn-based enemies encountered randomly similar system also used first sequel new floor mazes becomes sophisticated however helpful mini-map grid coordinates enemies getting stronger fights first game difficult unbalanced protagonist attack defend use spells items fight monsters three kingdom strawberry fields ストロベリーフィールズ place inhabited women goddess tower protected land people generations one day monstrous dragon knights corrupted evil led demon gazelbaan ゲイゼルバーン descended upon tower people strawberry fields suddenly find threatened army monsters turned goddess aquarina アクァーリナー stone captured warrior women demanding six gems source magical power goddess delivered else would kill hostages answering plea help queen luna ルナ voiced noriko hidaka young warrior traveler yamato takeru ヤマト・タケル voiced akira kamiya takes luna mother voiced rei sakuma floor tower captured females takeru rescue rapists game originally released 1989 pc88 pc98 msx followed sharp x68000 version 1990 1995 remake dragon knight graffiti pc engine developed released nec avenue two soundtracks dragon knight treasure king water chapter ドラゴンナイト~水の宝王篇~ pc engine world — dragon knight graffiti released japan datam polystar 1990 nec avenue distributed nippon columbia 1995 respectively ova anime adaptation released polystar vhs ld 1991 soft cel pictures distributed english version vhs format also re-released dvd 2003 cast included yasunori matsuno takeru yūko mizutani luna release famicom tsūshin scored pc engine remake 22 40 also giving 8 10 reader cross review information russian article square faction japanese wikipedia
[ 4686, 5822 ]
Test
3,126
2
Brendan_Gregg:brendan gregg brendan gregg kernel performance engineer netflix known work systems performance analysis previously worked sun microsystems oracle corporation joyent gregg born newcastle new south wales attended university newcastle australia working technical instructor sun microsystems later consultant hired join sun fishworks team san francisco october 2010 left oracle position lead performance engineer joyent march 2014 became senior performance architect netflix gregg one leading experts dtrace creator dtracetoolkit author books dtrace systems performance also star shouting data center viral video november 2013 awarded lisa outstanding achievement award contributions field system administration particularly groundbreaking work systems performance analysis methodologies investigates writes linux performance new blog gregg developed various methodologies performance analysis notably use method methodology short utilization saturation errors method also created visualization types aid performance analysis including latency heat maps utilization heat maps subsecond offset heat maps flame graphs
[ 8037, 6046 ]
Test
3,127
7
Apttus:apttus apttus american business-to-business software provider specializing business process automation company provides calls “ middle office ” solutions utilizing artificial intelligence optimize various financial commercial functions quote-to-cash revenue management e-commerce management apttus ’ software originally developed leverage salesforce customer relationship management platform since integrated microsoft azure ibm cloud well september 2018 private equity firm thoma bravo purchased majority stake apttus resulted significant turnover executive ranks thoma bravo installed new ceo cfo chief legal officer chief people officer vice president finance corporate controller end 2018 apttus founded 2006 kirk krappe neehar giri kent perkocha three co-founders reportedly developed company ideas written napkins laundry room krappe served company ’ first ceo giri chief solutions officer perkocha chief customer officer company bootstrapped took outside funding 2013 raised 37 million series financing group investors including k1 capital iconiq salesforce time 2018 buyout apttus received total 404 million investment capital five rounds fundraising gave company valuation approximately 1.3 billion september 2016 despite publicly discussing likelihood initial public offering 2016 apttus never went public acquired thoma bravo 2015 acquisition apttus rival steelbrick salesforce early apttus investor widely blamed apttus ’ inability complete ipo find buyer favorable terms july 2018 krappe departed apttus little warning move later reported driven accusations sexual assault misrepresentations company ’ financial performance allegations became public november 1 2018 publication business insider investigative piece highlighted company sales retreat one palmilla resort near cabo san lucas mexico krappe reportedly sexually assaulted 26 year-old female business development employee allegations accused krappe presenting misleading data apttus ’ size financial health time report “ several ” sexual harassment claims underway well three lawsuits financial misrepresentation issues
[ 7037 ]
Train
3,128
4
Fireblade_(company):fireblade company fireblade acquired stackpath israeli company founded 2008 provides website security traffic management software based cloud ’ two tier saas application protects websites ddos attacks data scrapping improves website health security performance fireblade founded shay rapaport erez azaria ceo cto respectively offers integration cpanel whm service offers protection ddos attacks spam scrapping cms vulnerability brute force anda reputational behavioral firewalls also offers dynamic optimization 30 points presence tier-1 cdn tools
[]
Test
3,129
6
Ext3cow:ext3cow ext3cow third extended filesystem copy-on-write open source versioning file system based ext3 file system versioning implemented block-level copy-on-write shares many performance characteristics ext3 ext3cow provides time-shifting interface permits real-time continuous view data past time-shifting novel interface introduced ext3cow allowing users navigate access past namespaces adding time component commands ext3cow designed platform compliance versioning auditability requirements recent us electronic record retention legislation sarbanes-oxley hipaa version ext3cow linux 2.6 kernel released march 30 2007 details ext3cow implementation found 2005 paper
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 44...
Test
3,130
2
Just_enough_operating_system:enough operating system enough operating system jeos pronounced juice paradigm customizing operating systems fit needs particular application software appliance platform includes operating system components required support particular application third-party components contained appliance e.g. kernel makes appliance smaller faster boot execute particular application potentially secure application running full general-purpose os typically jeos consist following important differentiate true fully minimalized os install profiles forced example security hardening tools representing recovery console images jeos richer install profiles designed built wider audience usage vm/va creators users easily perform needed installation configuration tasks
[ 2585, 710, 6835, 5571, 3751, 578 ]
Test
3,131
8
Browserless_Web:browserless web browserless web communication web applications without need web browser term coined article network world referring mainly business-to-business interaction
[ 84 ]
Validation
3,132
4
Cherax_snowden:cherax snowden cherax snowden species crayfish west papua indonesia oinsok river drainage sawiat district chendravasikh kepala burung peninsulas wild live freshwater river tributaries popular freshwater aquarium pet across asia europe north america orange-tipped claws specimens previously misidentified members cherax holthuisi also west papua adult body length 10 cm males 7 cm females different shades green brownish-green bluish-green predominant body color throughout lives claw tips orange first samples became known west 2006 means internet pet shops time examined professional zoologists 2015 cherax snowden new species crayfish crustacea decapoda parastacidae kepala burung vogelkop peninsula irian jaya west papua indonesia already popular pet europe east asia america name orange tip scientific species description published german zoologists institute environmental sciences university koblenz-landau landau species named edward snowden honor contribution freedom speech
[]
Test
3,133
2
Peter_MacDonald_(computer_programmer):peter macdonald computer programmer peter macdonald canadian software engineer best known creator softlanding linux system sls widely regarded first complete linux distribution work served foundation wine also created tcl web browser browsex pdqi suite tcl utilities current projects include jsish embeddable javascript interpreter builtin type-checking peter charles macdonald born victoria british columbia june 28 1957 graduated computer science program university victoria bsc 1989 msc 1996 master thesis decomposing linux kernel dynamically loadable modules macdonald co-developed early features linux kernel early 1990s including shared libraries pseudo terminals select call virtual consoles announced softlanding linux system sls first standalone linux install testing august 1992 15 floppy disks general release october 1992 recommending least 10 mb disk space sls became popular also drew criticism macdonald criticized trying make money free software defended linus torvalds two early linux distributions made specifically reaction sls ian murdock debian compensate sls bugs patrick volkerding slackware include installer patches n't added sls macdonald would n't allow volkerding distribute independently initial 1993 wine windows emulator based tcl/tk windowing functions macdonald wrote though later rewritten direct xlib calls macdonald founded browsex systems 1999 put version 1.0 browsex open source tcl-based cross-platform web browser meant smaller faster netscape last update browsex 2003 company renamed pdq interfaces inc. put set various tcl based utilities jsish javascript interpreter builtin sqlite json websocket zvfs support
[ 5540, 5453, 5803, 3938, 3174, 3084, 462, 1351, 1535, 1260, 1822, 7429, 7528, 2285, 1176, 4401, 5292, 2559, 3780, 7075, 5829, 6725, 486, 1192, 578, 6736, 7740, 7463, 7555, 7559, 5759, 589, 3559, 412, 2680, 4435, 2689, 3404, 1128, 1227, 7...
Test
3,134
6
Logical_volume_management:logical volume management computer storage logical volume management lvm provides method allocating space mass-storage devices flexible conventional partitioning schemes store volumes particular volume manager concatenate stripe together otherwise combine partitions block devices general larger virtual partitions administrators re-size move potentially without interrupting system use volume management represents one many forms storage virtualization implementation takes place layer device-driver stack operating system os opposed within storage devices network volume-manager implementations share basic design start physical volumes pvs either hard disks hard disk partitions logical unit numbers luns external storage device volume management treats pv composed sequence chunks called physical extents pes volume managers hp-ux linux pes uniform size others veritas variably-sized pes split merged normally pes simply map one-to-one logical extents les mirroring multiple pes map le pes drawn physical volume group pvg set same-sized pvs act similarly hard disks raid1 array pvgs usually laid reside different disks data buses maximum redundancy system pools les volume group vg pooled les concatenated together virtual disk partitions called logical volumes lvs systems use lvs raw block devices like disk partitions creating mountable file systems using swap storage striped lvs allocate successive le different pv depending size le improve performance large sequential reads bringing bear combined read-throughput multiple pvs administrators grow lvs concatenating les shrink returning les pool concatenated les contiguous allows lvs grow without move already-allocated les volume managers allow re-sizing lvs either direction online changing size lv necessarily change size file system merely changes size containing space file system resized online recommended allows system adjust storage on-the-fly without interrupting applications pvs lvs shared span different vgs although volume managers may allow moving vgs host allows administrators conveniently bring vgs online take offline move host systems single administrative unit vgs grow storage pool absorbing new pvs shrink retracting pvs may involve moving already-allocated les pv volume managers perform movement online underlying hardware hot-pluggable allows engineers upgrade replace storage without system downtime hybrid volume volume intentionally opaquely makes use two separate physical volumes instance workload may consist random seeks ssd may used permanently store frequently used recently written data using higher-capacity rotational magnetic media long-term storage rarely needed data linux bcache dm-cache may used purpose fusion drive may used os x. zfs also implements functionality file system level allowing administrators configure multi-level read/write caching hybrid volumes present similar concept hybrid drives also combine solid-state storage rotational magnetic media volume managers also implement snapshots applying copy-on-write le scheme volume manager copy le copy-on-write table written preserves old version lv snapshot may later reconstructed overlaying copy-on-write table atop current lv unless volume management supports thin provisioning discard le origin volume written permanently stored snapshot volume snapshot volume made smaller origin common practice may render snapshot inoperable snapshots useful backing self-consistent versions volatile data table files busy database rolling back large changes operating system upgrade single operation snapshots similar effect rendering storage quiescent similar shadow copy vss service microsoft windows linux-based live cds also use snapshots simulate read-write access read-only optical disc logical volumes suffer external fragmentation underlying storage devices allocate pes contiguously reduce i/o performance slow-seeking media magnetic disks rotational media volume managers use fixed-size pes however typically make pes relatively large example linux lvm uses 4 mb default order amortize cost seeks implementations solely volume management core storage linux lvm separating abstracting away volume management file system loses ability easily make storage decisions particular files directories example certain directory entire file system permanently moved faster storage file system layout underlying volume management layer need traversed example linux would needed manually determine offset file contents within file system manually extents along data related file faster storage volume file management implemented within subsystem instead implemented separate subsystems makes overall process theoretically simpler
[ 3599, 1438, 1910, 3764, 1254, 890, 7242, 2728, 8066, 5373, 900, 6892, 1734, 5571, 2032, 1750, 578, 7010, 6117, 1391, 1394, 3311, 1315, 2885, 6586, 5440, 4199, 4740, 5447, 788, 6505 ]
Validation
3,135
8
Internet_Information_Services:internet information services internet information services iis formerly internet information server extensible web server created microsoft use windows nt family iis supports http http/2 https ftp ftps smtp nntp integral part windows nt family since windows nt 4.0 though may absent editions e.g windows xp home edition active default first microsoft web server research project european microsoft windows nt academic centre emwac part university edinburgh scotland distributed freeware however since emwac server unable handle volume traffic going microsoft.com microsoft forced develop web server iis almost every version iis released either alongside version microsoft windows versions iis prior 7.0 running client operating systems supported 10 simultaneous connections single website microsoft criticized vendors web server software including o'reilly associates netscape licensing early versions windows nt workstation edition os permitted ten simultaneous tcp/ip connections whereas expensive server edition otherwise additional features permitted unlimited connections bundled iis implied intended discourage consumers running alternative web server packages cheaper edition netscape wrote open letter antitrust division u.s. department justice regarding distinction product licensing asserted technical merit o'reilly showed user could remove enforced limits meant cripple nt 4.0 workstation web server two registry key changes trivial configuration file tweaking iis 6.0 higher support following authentication mechanisms iis 7.0 modular architecture modules also called extensions added removed individually modules required specific functionality installed iis 7 includes native modules part full installation modules individual features server uses process requests include following iis 7.5 includes following additional enhanced security features authentication changed slightly iis 6.0 iis 7 notably anonymous user named iusr_ machinename built-in account vista future operating systems named iusr notably iis 7 authentication mechanism isolated module installed uninstalled iis 8.0 offers new features targeted performance easier administration new features iis 8.5 several improvements related performance large-scale scenarios used commercial hosting providers microsoft cloud offerings also several added features related logging troubleshooting new features iis express lightweight 4.5–6.6 mb version iis available standalone freeware server may installed windows xp service pack 3 subsequent versions microsoft windows iis 7.5 express supports http https protocols portable stores configuration per-user basis require administrative privileges attempts avoid conflicting existing web servers machine iis express downloaded separately part webmatrix visual studio 2012 later visual studio 2010 earlier web developers developing asp.net apps used asp.net development server codenamed cassini default iis express serves local traffic iis releases new feature modules major version releases add new functionality following extensions available iis 7.5 according netcraft february 2014 iis market share sites 32.80 making second popular web server world behind apache http server 38.22 netcraft showed rising trend market share iis since 2012 14 february 2014 however w3techs shows different results according w3techs iis third used web server behind apache http server 1st place nginx furthermore shows consistently falling trend iis use since february 2013 netcraft data february 2017 indicates iis market share top million busiest sites 10.19 making third popular web server world behind apache 41.41 nginx 28.34 iis 4 iis 5 affected ca-2001-13 security vulnerability led infamous code red attack however versions 6.0 7.0 reported issues specific vulnerability iis 6.0 microsoft opted change behaviour pre-installed isapi handlers many culprits vulnerabilities 4.0 5.0 thus reducing attack surface iis addition iis 6.0 added feature called web service extensions prevents iis launching program without explicit permission administrator default iis 5.1 earlier run websites single process running context system account windows account administrative rights 6.0 request handling processes run context network service account significantly fewer privileges vulnerability feature custom code wo n't necessarily compromise entire system given sandboxed environment worker processes run iis 6.0 also contained new kernel http stack codice_1 stricter http request parser response cache static dynamic content according secunia iis 7 total six resolved vulnerabilities iis 6 total eleven vulnerabilities one still unpatched unpatched security advisory severity rating 2 5 june 2007 google study 80 million domains concluded iis market share 23 time iis servers hosted 49 world malware apache servers whose market share 66 study also observed geographical location dirty servers suggested cause could use unlicensed copies windows could obtain security updates microsoft blog post 28 april 2009 microsoft noted supplies security updates everyone without genuine verification 2013 mass surveillance disclosures made widely known iis particularly bad supporting perfect forward secrecy pfs especially used conjunction internet explorer possessing one long term asymmetric secret keys used establish https session make easier derive short term session key decrypt conversation even later time diffie–hellman key exchange dhe elliptic curve diffie–hellman key exchange ecdhe 2013 ones known property 30 firefox opera chromium browser sessions use nearly 0 apple safari microsoft internet explorer sessions
[ 6412, 3932, 7879, 7154, 3937, 3263, 378, 3953, 2198, 3958, 6096, 3962, 1840, 26, 7544, 3290, 1475, 6110, 4701, 7553, 7195, 5410, 46, 7564, 2953, 417, 422, 6844, 2245, 432, 435, 5442, 3338, 4377, 5090, 3340, 5794, 7952, 7602, 6164, 458, ...
Test
3,136
4
NetCentrics:netcentrics netcentrics corporation based herndon virginia contractor us federal government netcentrics provides enterprise cloud cybersecurity services netcentrics founded 1995 bob dixon bob dougherty company first ceo july 2017 cynthia barreda succeeded dougherty current ceo netcentrics recognized comparably 2017 2018 receiving total 13 awards including best companies dc best ceo best company diversity best company outlook 2018 barreda recognized dca live federal entrepreneur netcentrics recognized one fastest growing cybersecurity companies washington metropolitan area
[]
Test
3,137
3
Ralf_Brown's_Interrupt_List:ralf brown interrupt list ralf brown interrupt list aka rbil x86 interrupt list ms-dos interrupt list inter comprehensive list interrupts calls hooks interfaces data structures cmos settings memory port addresses well processor opcodes special function registers x86 machines including many clones start pc era 1981 2000 still applying pcs today list covers operating systems device drivers application software documented undocumented information including bugs incompatibilities shortcomings workarounds version locale date information often detail level far beyond found contemporary literature large part covers system bioses internals operating systems dos os/2 windows well interactions widely used resource ibm pc system developers analysts well application programmers pre-windows era parts compiled information used creation several books systems programming also translated chinese japanese russian compilation proven important resource developing various closed open source operating systems including linux freedos today still used reference bios calls develop programs dos well system-level software project result research collaborative effort 650 listed contributors worldwide period 15 years 290 provided significant information 55 even original list created january 1985 janet jack others named interrupt list ms-dos subsequently maintained mailed requestors usenet ross m. greenberg 1986 since october 1987 maintained ralf d. brown researcher carnegie mellon university language technologies institute information several interrupt listings merged list order establish one comprehensive reference compilation years michael a. shiels timothy patrick farley matthias r. paul robin d. h. walker wolfgang lierz tamura jones became major contributors project providing information list project also expanded include pc development related information therefore absorbed number independently maintained lists pc i/o ports wim osterholt matthias r. paul bios cmos memory contents atley padgett peterson processor opcodes alex v. potemkin bugs harald feldmann brown paul also conducted several systematic surveys specific hard- software details among number dedicated user groups order validate info help fill gaps list originally list distributed archive named interrup various compression formats well form diffs distribution file name changed include version form internyy n issue number yy 2-digit release year 1988 mid 1989 distribution settled use zip compression archive reached size 360 kb floppy june 1991 distribution split several files following interrrp.zip naming scheme rr revision starting 26 version 91.3 p part indicator package starting letter officially named ms-dos interrupt list x86 interrupt list abbreviated inter maintainer community coined unofficial name ralf brown interrupt list abbreviated rbil 1990s publication currently revision 61 17 july 2000 almost 8 mb ascii text including close entries plus tables fully cross linked would result 3700 pages 60 lines per page condensed information printed interrupt list makes 5.5 mb 2500 pages printed project officially abandoned website still maintained 2018 new releases forthcoming long time despite fact information still pending release even inter61 release 2000 new releases planned several times 2001 2002 materialize portions new information dos pc internals provided paul circulated preliminary form development community peer-review assist operating system development
[ 2717, 276, 1442, 5274, 7058, 4759, 6504, 2379, 204, 5571, 5743, 126, 6907, 6634, 578, 7093, 1668, 6380, 3221, 4171, 6658, 7021, 4088, 4271, 4547, 1052, 5784, 4277, 352, 263, 8043, 1335, 2900 ]
Train
3,138
3
The_Goonies_(MSX_video_game):goonies msx video game goonies 1986 platform game konami msx based film name music simple rendition song goonies r good enough cyndi lauper goonies platform puzzle game featuring five 'scenes successfully completed scene key word given thus player continue game point time
[]
Validation
3,139
4
Intel_Management_Engine:intel management engine intel management engine also known manageability engine autonomous subsystem incorporated virtually intel processor chipsets since 2008 located platform controller hub modern intel motherboards part intel active management technology allows system administrators perform tasks machine remotely system administrators use turn computer login remotely computer regardless whether operating system installed intel management engine always runs long motherboard receiving power even computer turned ime attractive target hackers since top level access devices completely bypasses operating system intel released much information intel management engine prompting speculation may include backdoor electronic frontier foundation voiced concern ime amd processors similar feature called amd secure technology subsystem primarily consists proprietary firmware running separate microprocessor performs tasks boot-up computer running asleep long chipset soc connected current via battery power supply continues run even system turned intel claims required provide full performance exact workings largely undocumented code obfuscated using confidential huffman tables stored directly hardware firmware contain information necessary decode contents intel main competitor amd incorporated equivalent amd secure technology formally called platform security processor virtually post-2013 cpus starting 11 based intel quark x86-based 32-bit cpu runs minix 3 operating system state stored partition spi flash using embedded flash file system effs previous versions based arc core management engine running threadx rtos versions 1.x 5.x used arctangent-a4 32-bit instructions whereas versions 6.x 8.x used newer arcompact mixed 32- 16-bit instruction set architecture starting 7.1 arc processor could also execute signed java applets mac ip address out-of-band interface direct access ethernet controller one portion ethernet traffic diverted even reaching host operating system support exists various ethernet controllers exported made configurable via management component transport protocol mctp also communicates host via pci interface linux communication host done via /dev/mei release nehalem processors usually embedded motherboard northbridge following memory controller hub mch layout newer intel architectures intel 5 series onwards included platform controller hub pch intel current terminology 2017 one several firmware sets converged security manageability engine csme prior amt version 11 csme called intel management engine bios extension intel mebx russian company positive technologies dmitry sklyarov found firmware version 11 runs minix 3 several weaknesses found may 1 2017 intel confirmed remote elevation privilege bug sa-00075 management technology every intel platform provisioned intel standard manageability active management technology small business technology nehalem 2008 kaby lake 2017 remotely exploitable security hole several ways disable without authorization could allow functions sabotaged found additional major security flaws affecting large number computers incorporating trusted execution engine txe server platform services sps firmware skylake 2015 coffee lake 2017 confirmed intel 20 november 2017 sa-00086 unlike sa-00075 bug even present amt absent provisioned disabled known unofficial methods july 2018 another set vulnerabilitites disclosed sa-00112 september 2018 yet another vulnerability published sa-00125 normally possible user disable undocumented methods discovered however methods supported intel security architecture designed prevent disabling thus possibility considered intel security vulnerability example virus could abuse make computer lose functionality typical end-user expects ability play media drm hand malicious actor could use remotely compromise system strictly speaking none known methods disables completely since required booting main cpu known methods merely make go abnormal states soon boot seems working functionality still physically connected current microprocessor continuing execute code 2016 me_cleaner project found integrity verification broken supposed detect tampered case shut pc forcibly every 30 minutes system start prevents compromised system running undetected yet allows owner fix issue flashing valid version firmware grace period project found making unauthorized changes firmware possible force abnormal error state prevented triggering shutdown even large parts firmware overwritten thus made inoperable august 2017 russian company positive technologies dmitry sklyarov published method disable via undocumented built-in mode intel confirmed contains switch enable government authorities nsa make go high-assurance platform hap mode boot mode disables functions authorized use government authorities supposed available machines produced yet turned machines sold retail market tricked activating switch.. manipulation hap bit quickly incorporated me_cleaner project late 2017 several laptop vendors announced intentions ship laptops intel disabled none two methods disable discovered far turned effective countermeasure sa-00086 vulnerability vulnerability early-loaded module essential boot main cpu ring −3 rootkit demonstrated invisible things lab q35 chipset work later q45 chipset intel implemented additional protections exploit worked remapping normally protected memory region top 16 mb ram reserved rootkit could installed regardless whether amt present enabled system chipset always contains arc coprocessor −3 designation chosen coprocessor works even system s3 state thus considered layer system management mode rootkits vulnerable q35 chipset keystroke logger me-based rootkit demonstrated patrick stewin another security evaluation vassilios ververis showed serious weaknesses gm45 chipset implementation particular criticized amt transmitting unencrypted passwords smb provisioning mode ide redirection serial lan features used also found zero touch provisioning mode ztc still enabled even amt appears disabled bios 60 euros ververis purchased go daddy certificate accepted firmware allows remote zero touch provisioning possibly unsuspecting machines broadcast hello packets would-be configuration servers may 2017 intel confirmed many computers amt unpatched critical privilege escalation vulnerability cve-2017-5689 vulnerability nicknamed silent bob silent researchers reported intel affects numerous laptops desktops servers sold dell fujitsu hewlett-packard later hewlett packard enterprise hp inc. intel lenovo possibly others researchers claimed bug affects systems made 2010 later reports claimed bug also affects systems made long ago 2008 vulnerability described giving remote attackers june 2017 platinum cybercrime group became notable exploiting serial lan sol capabilities amt perform data exfiltration stolen documents months previous bugs subsequent warnings eff security firm positive technologies claimed developed working exploit 20 november 2017 intel confirmed number serious flaws found management engine mainstream trusted execution engine tablet/mobile server platform services high end server firmware released critical firmware update essentially every intel-based computer last several years including desktops servers found vulnerable security compromised although potential routes exploitation entirely known possible patch problems operating system firmware uefi bios update motherboard required anticipated take quite time many individual manufacturers accomplish ever would many systems none known unofficial methods disable prevent exploitation vulnerability firmware update vendor required however discovered vulnerability note firmware updates fully effective either attacker access firmware region simply flash old vulnerable version exploit bug july 2018 intel announced 3 vulnerabilities cve-2018-3628 cve-2018-3629 cve-2018-3632 discovered patch csme firmware would required intel indicated would patch 3rd generation core processors earlier despite chips chipsets far back intel core 2 duo vpro intel centrino 2 vpro affected critics like electronic frontier foundation eff security expert damien zammit accused backdoor privacy concern zammit stresses full access memory without parent cpu knowledge full access tcp/ip stack send receive network packets independently operating system thus bypassing firewall intel responded saying intel put back doors products products give intel control access computing systems without explicit permission end user intel design backdoors access products recent reports claiming otherwise misinformed blatantly false intel participate efforts decrease security technology context criticism intel amd secure technology pointed nsa budget request 2013 contained sigint enabling project goal insert vulnerabilities commercial encryption systems systems … conjectured intel amd secure technology might part programme google attempting eliminate proprietary firmware servers found hurdle shortly sa-00086 patched vendors amd processor mainboards started shipping bios updates allow disabling amd secure technology subsystem similar function management engine often confused intel amt amt runs available processors vpro amt enables owners remote administration computer like turning reinstalling operating system however built intel chipsets since 2008 amt amt unprovisioned owner official documented way disable
[ 3764, 2367, 3173, 3942, 6523, 6616, 3717, 5669, 584, 6647, 2498, 1770, 5165, 1134, 5431, 74, 3747, 6675, 1237, 352, 972, 4108 ]
Validation
3,140
4
Positive_Hack_Days:positive hack days positive hack days phdays computer security conference held every year moscow first conference held 2011 conference addresses topics zero-day attacks digital investigations cryptography cyberwarfare security person state cyberworld attendance fee required free tickets available winners special hacking contests students participated positive education program phdays aimed wide range audience hackers technical experts businessmen politicians presentations given russian english first conference held may 19 2011 reports workshops covered topics government control information security russia internet banking system safety secure connection voip protection data cloud virtualization system security keynote speaker event dmitry sklyarov conference capture flag ctf competition held among information security specialists different countries u.s. team ppp winner hacking contests one participant detected zero-day vulnerability safari windows among speakers experts kaspersky lab russian agricultural bank vimpelcom rostelecom cisco systems leta it-company positive technologies pwc 500 people attended one-day event second conference conducted may 30 31 2012 digital october center new technologies along six parallel streams presentations workshops ctf competition security-related contests held topics divided two areas technical exploiting radio noise password protection telecom security usage sqlmap business internet banking security data leakage government seeking specialists information security conference featured bruce schneier american cryptographer author applied cryptography datuk mohd noor amin impact un alexander peslyak known solar designer creator password cracking tool john ripper significant events include demonstration zero-day vulnerabilities windows xp freebsd 8.3 cracking iphone 4s contests taking control ar.drone analyzing internet banking system security young school competition young scientists research papers took place first time among conference participants representatives kaspersky lab national agency computer security tunisia cisco systems eset openwall project highload lab companies phdays 2012 gathered 2,000 people third conference held may 23 24 world trade center among main topics ics protection web application mobile application security preventing attacks banking systems cooperation government researchers information society marc van hauser heuse creator thc-hydra amap susefirewall founder hacker choice became leading speaker significant events include report scada strangelove security siemens simatic software workshop hacking atm workshop open organisation lockpickers experts nondestructive lock opening model railroad controlled real industrial systems labyrinth rooms laser field motion detectors george hotz geohot participated ctf contest member ppp first unlock iphone allowed using providers besides george hotz also 2drunk2hack contest participants hack web applications strong drink fail specialists kaspersky lab cisco systems nokia rsa iponweb qualys visited conference phdays iii saw 2,500 attendees movie preparation conference released 2013 conference took place may 21 22 2014 digital october among main topics protection ics critical infrastructure components internet banking system security internet things regulation information security industry cyberwarfare alisa shevchenko detected several zero-day vulnerabilities indusoft web studio 7.1 contest analyzing ics security significant events include contest identifying threats smart home discussion security telecommunications companies lack really smart grids power industry security-related competition participants managed withdraw money banking system developed especially competition filled vulnerabilities commonly occur real internet banking systems specialists kaspersky lab cisco systems revuln toool parameter security took part conference phdays iv drew 2,500 attendees conference held 26 27 may 2015 world trade center moscow russia conference held 17 18 may 2016 world trade center moscow russia conference held 23 24 may 2017 world trade center moscow russia conference held 15 16 may 2018 12 krasnopresnenskaya embankment moscow russia conference held 21 22 may 2019 crocus expo international exhibition center moscow russia technical reports workshops competitions discussions regulation industry business development commonly held phdays however feature conference providing special activities aimed creating open cyberpunk atmosphere conference always ends live performances popular russian rock bands 2014 cyberpunk movies played night two days conference
[ 5427, 1594, 6628, 7614, 7830 ]
Validation
3,141
9
Mizar_system:mizar system mizar system consists formal language writing mathematical definitions proofs proof assistant able mechanically check proofs written language library formalized mathematics used proof new theorems system maintained developed mizar project formerly direction founder andrzej trybulec 2009 mizar mathematical library largest coherent body strictly formalized mathematics existence mizar project started around 1973 andrzej trybulec attempt reconstruct mathematical vernacular checked computer current goal apart continual development mizar system collaborative creation large library formally verified proofs covering core modern mathematics line influential qed manifesto currently project developed maintained research groups białystok university poland university alberta canada shinshu university japan mizar proof checker remains proprietary mizar mathematical library—the sizable body formalized mathematics verified—is licensed open-source papers related mizar system regularly appear peer-reviewed journals mathematic formalization academic community include studies logic grammar rhetoric intelligent computer mathematics interactive theorem proving journal automated reasoning journal formalized reasoning distinctive feature mizar language readability common mathematical text relies classical logic declarative style mizar articles written ordinary ascii language designed close enough mathematical vernacular mathematicians could read understand mizar articles without special training yet language enables increased level formality necessary automated proof checking proof admitted steps justified either elementary logical arguments citing previously verified proofs results higher level rigor detail customary mathematical textbooks publications thus typical mizar article four times long equivalent paper written ordinary style formalization relatively labor-intensive impossibly difficult one versed system takes one week full-time work textbook page formally verified suggests benefits reach applied fields probability theory economics mizar mathematical library mml includes theorems authors refer newly written articles approved proof checker evaluated process peer-review appropriate contribution style accepted published associated journal formalized mathematics added mml july 2012 mml included 1150 articles written 241 authors aggregate contain 10,000 formal definitions mathematical objects 52,000 theorems proved objects 180 named mathematical facts benefited formal codification examples hahn–banach theorem kőnig lemma brouwer fixed point theorem gödel completeness theorem jordan curve theorem breadth coverage led suggest mizar one leading approximations qed utopia encoding core mathematics computer verifiable form mml articles available pdf form papers journal formalized mathematics full text mml distributed mizar checker freely downloaded mizar website ongoing recent project library also made available experimental wiki form admits edits approved mizar checker mml query website implements powerful search engine contents mml among abilities retrieve mml theorems proved particular type operator mml built axioms tarski–grothendieck set theory even though semantically objects sets language allows one define use syntactical weak types example set may declared type nat internal structure conforms particular list requirements turn list serves definition natural numbers set sets conform list denoted nat implementation types seeks reflect way mathematicians formally think symbols streamline codification distributions mizar proof checker major operating systems freely available download mizar project website use proof checker free non-commercial purposes written free pascal source code available members association mizar users
[ 6507, 3254, 3149, 7711, 6015, 3955 ]
Validation
3,142
4
Uniloc:uniloc uniloc corporation patent assertion entity founded australia 1992 develops try buy software distributed via magazines preinstalled new computers uniloc technology based patent granted inventor ric richardson also principal uniloc company original patent application dated late 1992 australia granted us 1996 covers technology popularly known product activation try buy software machine locking 1993 uniloc distributed try buy versions software multiple publishers via marketing agreement ibm initial success sale thousands copies software package first aid developed cybermedia distributed front cover windows sources magazine 1994 later uniloc worked us magazine publisher ziff davis distribute unlockable versions software front cover magazines including windows magazine 1997 us subsidiary set called uniloc pc preload produce preloaded unlockable editions popular software products new pcs distribution agreements executed emachines toshiba family pc magazine also produced two months magazines featuring unlockable software uniloc pc preload cover 2000 2003 uniloc corporation set us subsidiary called uniloc usa operates rhode island southern california company currently licensing patented technology software publishers entertainment companies including sega uniloc sued 73 companies alleges violated one copy-protection patents according uniloc 25 companies settled court due abstract nature patents litigious activities uniloc deemed patent troll critics uniloc sued microsoft 2003 violating patent relating technology designed deter software piracy 2006 us district judge william smith ruled favour microsoft appeals court overturned decision saying genuine issue material fact ruled case without hearing jury april 8 2009 rhode island jury found microsoft violated patent told microsoft pay uniloc 388 million damages success uniloc filed new patent infringement suits sony america mcafee activision quark borland software aspyr media decision microsoft subsequently overturned september 29 2009 judge smith vacated jury verdict ruled favour microsoft saying jury lacked grasp issues reached finding without legally sufficient basis uniloc appealed judge decision alleging bias 2011 jury verdict reinstated microsoft us court appeals federal circuit said instead using usual 25 percent rule damage awards infringement would need recalculated july 20 2012 uniloc filed lawsuit mojang citing minecraft pocket edition infringement upon patents claiming exclusive rights method software license checking markus persson mojang stated believe minecraft infringes uniloc us patent 6,857,067 mojang ab defend lawsuit lawsuit also filed android game developers including electronic arts maker bejeweled 2 laminar research maker x-plane distinctive developments gameloft halfbrick studios madfinger games square enix
[ 315 ]
Validation
3,143
4
Security_awareness:security awareness security awareness knowledge attitude members organization possess regarding protection physical especially informational assets organization many organizations require formal security awareness training workers join organization periodically thereafter usually annually topics covered security awareness training include security aware means understand potential people deliberately accidentally steal damage misuse data stored within company computer systems throughout organization therefore would prudent support assets institution information physical personal trying stop happening according european network information security agency 'awareness risks available safeguards first line defence security information systems networks 'the focus security awareness consultancy achieve long term shift attitude employees towards security whilst promoting cultural behavioural change within organisation security policies viewed key enablers organisation series rules restricting efficient working business 2016 study developed method measuring security awareness specifically measured understanding circumventing security protocols disrupting intended functions systems collecting valuable information getting caught p. 38 researchers created method could distinguish experts novices people organize different security scenarios groups experts organize scenarios based centralized security themes novices organize scenarios based superficial themes
[ 3932, 2493, 3727, 308, 6189, 5004, 2213 ]
Validation
3,144
3
Atmel_AVR_instruction_set:atmel avr instruction set atmel avr instruction set machine language atmel avr modified harvard architecture 8-bit risc single chip microcontroller developed atmel 1996 avr one first microcontroller families use on-chip flash memory program storage 32 general-purpose 8-bit registers r0–r31 arithmetic logic operations operate registers load store instructions access ram limited number instructions operate 16-bit register pairs lower-numbered register pair holds least significant bits must even-numbered last three register pairs used pointer registers memory addressing known x r27 r26 r29 r28 z r31 r30 postincrement predecrement addressing modes supported three z also support six-bit positive displacement instructions allow immediate value limited registers r16–r31 8-bit operations register pairs r25 r24–r31 r30 16-bit operations adiw sbiw variants mul operation limited eight registers r16 r23 addition 32 general-purpose registers cpu special-purpose registers status register bits following address spaces available first 64 i/o registers accessible i/o data address space therefore two different addresses usually written 0x00 0x20 0x3f 0x5f first item i/o address second parentheses data address special-purpose cpu registers exception pc accessed i/o registers registers rampx rampy may present machines less 64 kib addressable memory typical atmega memory map may look like ramend last ram address parts lacking extended i/o ram would start 0x0060 arithmetic operations work registers r0–r31 directly ram take one clock cycle except multiplication word-wide addition adiw sbiw take two cycles ram i/o space accessed copying registers indirect access including optional postincrement predecrement constant displacement possible registers x z accesses ram takes two clock cycles moving registers i/o one cycle moving eight sixteen bit data registers constant register also one cycle reading program memory lpm takes three cycles instructions one 16-bit word long save including 16-bit 22-bit address take two words two types conditional branches jumps address skips conditional branches brxx test alu flag jump specified address skips sbxx test arbitrary bit register i/o skip next instruction test true following instructions implemented atmel avr controllers case instructions performing multiplications extended loads/jumps/calls long jumps power control optional instructions may grouped three categories higher-end processors tend capable cores memory presence one guarantee presence beginning original classic core enhancements organized following levels includes preceding less capable classic cpu cores two subsets avr1 core avr tiny confusingly attiny branded processors variety cores including avr1 attiny11 attiny28 classic attiny22 attiny26 classic+ attiny24 avrtiny attiny20 attiny40 avr1 subset popular new models introduced since 2000 omits ram except 32 registers mapped address 0–31 i/o ports addresses 32–95 stack replaced 3-level hardware stack codice_7 codice_8 instructions deleted 16-bit operations deleted codice_9 codice_10 load store addressing modes except indirect via z second successful attempt subset avr instruction set avr tiny core significant change avrtiny core omits registers r0–r15 registers also memory-mapped i/o ports 0–63 general-purpose ram beginning address 64 16-bit arithmetic operations codice_11 codice_12 omitted load/store displacement addressing modes codice_13 codice_14 predecrement postincrement addressing modes retained codice_1 instruction omitted instead program rom mapped data address space may accessed normal load instructions finally avrtiny core deletes 2-word codice_16 codice_17 instructions direct ram addressing instead uses opcode space previously assigned load/store displacement instructions new 1-word codice_16 codice_17 instructions access first 128 locations general-purpose ram addresses 0x40 0xbf codice_20 codice_21 instructions provide direct access i/o space 0 0x3f smallest cores ≤256 bytes data address space meaning ≤128 bytes ram i/o ports reserved addresses removed ≤8192 bytes 8 kib program rom 8-bit stack pointer spl support 12-bit relative jump/call instructions codice_22/codice_23 avr program counter counts 16-bit words bytes 12-bit offset sufficient address 2 bytes rom additional memory addressing capabilities present required access available resources three instructions present models corresponding hardware facility architectures avr1 named according avr-libc conventions bit assignments atmel avr uses many split fields bits contiguous instruction word load/store offset instructions extreme example 6-bit offset broken three pieces
[ 1438, 1252, 421 ]
Test
3,145
3
Socket_AM2+:socket am2+ socket am2+ cpu socket immediate successor socket am2 used several amd processors athlon 64 x2 socket am2+ mid-migration socket am2 socket am3 am2+ am2 socket cpus motherboards potential operate together actual interoperability depends upon factors especially availability compatible bios software pc retailers dell provided compatible bios versions allow use socket am2+ cpus products utilizing socket am2 motherboards inspiron 531 main differences socket am2 am2+ socket processors follows technical documentation readily available earlier generations amd processor sockets am2r2 processor functional data sheet amd document number 41607 made publicly available amd confirmed am2 processors work am2+ motherboards am2+ processors work am2 motherboards however operation am2+ processors am2 motherboards limited specifications socket am2 1 ghz hypertransport 2.0 one power plane cores imc am2 processors benefit faster hypertransport 3.0 separate power planes am2+ motherboards am2 components am2+ cpus motherboards designed use ddr2 ram exclusively many manufacturers dell case inspiron 531 yet may choose release bios updates would enable compatibility result consumers unable upgrade pcs am2+ cpus despite technically possible instead would buy new motherboard upgrade processor msi simply stated am2 motherboards compatible am2+ processors amd confirmed upgrade path socket am2+ am3 pin configuration am2+ socket 940 pins mechanically different am3 socket 941 pins 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable motherboard manufacturers e.g asrock jetway msi released hybrid motherboards equipped am2+ socket ddr2 ddr3 memory slots boards permit use am2/am2+ processors ddr2 ram am3 processors either ddr2 ddr3 ram sole principal change am2+ am3 support ddr3 sdram am3+ modification am3 socket designed cpus use bulldozer microarchitecture
[ 2539, 6599, 2541, 5895, 4931, 7163, 3362, 1735, 5377, 6351, 913, 7826, 2751, 6545, 6373, 5063, 6655, 6562, 7484, 4090, 866, 5436, 780, 1143 ]
Test
3,146
1
Polymorphic_association:polymorphic association polymorphic association term used discussions object-relational mapping respect problem representing relational database domain relationship one class multiple classes statically typed languages java multiple classes subclasses superclass languages duck typing ruby necessarily case java persistence hibernate chapter 5 bauer christian gavin king manning copyright 2007
[ 6462, 1803, 6428 ]
Test
3,147
4
Referer_spoofing:referer spoofing http networking typically world wide web referer spoofing based canonised misspelling referrer sends incorrect referer information http request order prevent website obtaining accurate data identity web page previously visited user referer spoofing typically done data privacy reasons testing order request information without genuine authority web servers may supply response requests specific http referers improve privacy individual browser users may replace accurate referer data inaccurate data though many simply suppress browser sending referer data sending referrer information technically spoofing though sometimes also described software systems networks testing sometimes penetration testing referer spoofing often part larger procedure transmitting accurate inaccurate well expected unexpected input httpd system tested observing results many web sites configured gather referer information serve different content depending referer information obtained exclusively relying http referer information authentication authorization purposes genuine computer security measure http referer information freely alterable interceptable password though poorly configured systems treat websites especially many image hosting sites use referer information secure materials browsers arriving web pages served images additionally site may want users click pages advertisements directly able access downloadable file — using referring page referring site information help site redirect unauthorized users landing page site would like use attackers acquire knowledge approved referers often trivial many sites follow common template use information combined exploit gain access materials spoofing often allows access site content site web server configured block browsers send referer headers website owners may disallow hotlinking also used defeat referer checking controls used mitigate cross-site request forgery attacks several software tools exist facilitate referer spoofing web browsers extensions popular browsers mozilla firefox internet explorer may provide facilities customise manage referrer urls website user visits tools include proxy servers individual configures browser send http requests proxy forwards different headers intended website usually removing modifying referer header proxies may also present privacy issues users may log user activity
[ 2944, 5149, 5722, 1321, 3480, 3338, 3921, 84, 3794, 3999, 1805 ]
Test
3,148
9
OpenModelica:openmodelica openmodelica free open source environment based modelica modeling language modeling simulating optimizing analyzing complex dynamic systems software actively developed open source modelica consortium non-profit non-governmental organization open source modelica consortium run project rise sics east ab collaboration linköping university openmodelica used academic industrial environments industrial applications include use openmodelica along proprietary software fields power plant optimization automotive water treatment openmodelica compiler omc modelica compiler translating modelica c code symbol table containing definitions classes functions variables definitions predefined user-defined obtained libraries compiler also includes modelica interpreter interactive usage constant expression evaluation subsystem also includes facilities building simulation executables linked selected numerical ode dae solvers omc written metamodelica unified equation-based semantical mathematical modeling language bootstrapped openmodelica connection editor open source graphical user interface creating editing simulating modelica models textual graphical modes omedit communicates omc interactive api requests model information creates models/connection diagrams based modelica annotations implementation based c++ qt library openmodelica shell omshell interactive command line interface parses interprets commands modelica expressions evaluation simulation plotting etc session handler also contains simple history facilities completion file names certain identifiers commands openmodelica notebook omnotebook light-weight mathematica-style editor modelica implements interactive wysiwyg realization literate programming form programming programs integrated documentation document omnotebook primarily used teaching allows mix hierarchically structured text cells containing modelica models expressions evaluated simulated plotted results displayed directly omnotebook ompython python interface enabling users access modeling simulation capabilities openmodelica python uses corba omniorb zeromq communicate openmodelica scripting api mdt eclipse plugin integrates openmodelica compiler eclipse provides editor advanced text based model editing code assistance mdt interacts openmodelica compiler existing corba based api used primarily development openmodelica compiler
[ 6527, 7841, 7516, 1336, 4759, 2524, 5571, 578, 1435 ]
Test
3,149
9
Automath:automath automath automating mathematics formal language devised nicolaas govert de bruijn starting 1967 expressing complete mathematical theories way included automated proof checker verify correctness automath system included many novel notions later adopted and/or reinvented areas typed lambda calculus explicit substitution dependent types one outstanding example automath also first practical system exploited curry–howard correspondence propositions represented sets called categories proofs question provability became question non-emptiness type inhabitation de bruijn unaware howard work stated correspondence independently l. s. van benthem jutting part ph.d. thesis 1976 translated edmund landau foundations analysis automath checked correctness automath never widely publicized time however never achieved widespread use nonetheless proved influential later development logical frameworks proof assistants mizar system system writing checking formalized mathematics still active use influenced automath
[ 3141, 3254, 4240, 6223 ]
Test
3,150
4
Bit-flipping_attack:bit-flipping attack bit-flipping attack attack cryptographic cipher attacker change ciphertext way result predictable change plaintext although attacker able learn plaintext note type attack not—directly—against cipher cryptanalysis would particular message series messages extreme could become denial service attack messages particular channel using cipher attack especially dangerous attacker knows format message situation attacker turn similar message one important information altered example change destination address might alter message route way force re-encryption weaker cipher thus possibly making easier attacker decipher message applied digital signatures attacker might able change promissory note stating owe 10.00 one stating owe 10000 stream ciphers rc4 vulnerable bit-flipping attack block cipher modes operation see stream cipher attack keyed message authentication code digital signature authentication mechanism allows recipient detect bits flipped transit
[ 309, 1353 ]
Test
3,151
2
Bonjour_(software):bonjour software bonjour apple implementation zero-configuration networking zeroconf group technologies includes service discovery address assignment hostname resolution bonjour locates devices printers computers services devices offer local network using multicast domain name system mdns service records software comes built-in apple macos ios operating systems bonjour also installed onto computers running microsoft windows bonjour components may also included within software itunes safari introduction 2002 mac os x 10.2 rendezvous software renamed 2005 bonjour following out-of-court trademark dispute settlement bonjour provides general method discover services local area network software widely used throughout macos allows users set network without configuration used find printers file-sharing servers examples applications using bonjour software bonjour browser istumbler macos zeroconf neighborhood explorer windows used view services declared applications apple remote application iphone ipod touch also uses bonjour establish connection itunes libraries via wi-fi bonjour works within single broadcast domain usually small area without special dns configuration macos bonjour windows airport base stations may configured use wide area bonjour allows wide area service discovery via appropriately configured dns server applications generally implement bonjour services using standard tcp/ip calls rather operating system although macos provides various bonjour services bonjour also works operating systems apple made source code bonjour multicast dns responder core component service discovery available darwin open source project project provides source code build responder daemon wide range platforms including mac os 9 macos linux *bsd solaris vxworks windows apple also provides user-installable set services called bonjour windows java libraries number windows programs use zeroconf including adtec digital adobe systems creative suite 3 itunes cerulean studios trillian pro 3 ruckus music player ruckus network text editor e. bonjour released terms-of-limited-use license apple freeware clients though developers software companies wish redistribute part software package use bonjour logo may need licensing agreement source code mdnsresponder available apache license apple originally introduced bonjour software august 2002 part mac os x 10.2 name rendezvous august 27 2003 tibco software inc announced filed lawsuit trademark infringement tibco enterprise application integration product called tibco rendezvous market since 1994 stated tried come agreement apple computer july 2004 apple computer tibco reached out-of-court settlement specifics settlement released public april 12 2005 apple announced renaming rendezvous bonjour current name bonjour french morning afternoon greeting good day previous name rendezvous french meeting appointment date bonjour version 2.0 released february 24 2010 works microsoft windows 2000 2003 xp vista 7 8 10 systems use primarily facilitate installation configuration use network printers thus runs startup bonjour fully implemented windows features—such ichat—allow communication windows mac os bonjour windows also adds zeroconf capabilities internet explorer provides zeroconf implementation java vms third-party applications adobe photoshop cs3 suite also come bundled bonjour take advantage zeroconf technology installers windows systems normally place bonjour files folder called bonjour within program files folder modifies windows system-registry entries related internal network configuration operation bonjour runs mdnsresponder.exe communications across network take place udp port 5353 may require reconfiguring personal corporate firewalls block bonjour packets full installation bonjour windows include plug-in internet explorer printer wizard network communication services components included installed part third-party application component apple software itunes vpn clients configured local network services unavailable computer vpn software active connected case local zeroconf services available bonjour zeroconf implementation september 2008 two security vulnerabilities found bonjour windows certain installations bonjour windows lack uninstaller display human-readable entry windows services listing 32- 64-bit releases windows 7 older still available versions bonjour services disable network connectivity adding entry 0.0.0.0 default gateway bug reported 2013 open-source im clients pidgin kopete adium support bonjour im protocol non-gpl trillian client number browsers allow end-user graphically explore devices found using bonjour bonjour browser creative commons licensed macos application displays services declared using bonjour program originally called rendezvous browser changed name version 1.5.4 apple changed protocol name bonjour certain protocols double clicking list item launch associated helper 1.5.6 first universal binary version future versions allow users completely define service instead relying author bonjour browser recommended service discovery macaddict 123 student research project columbia university produced java-based system match functionality bonjour browser called jbonjourbrowser jbonjourbrowser open-source available gpl jbonjourbrowser built emulate functionality bonjour browser time work multiple platforms requires apple bonjour java library run native windows application offers similar functions bonjour browser mac os bonjour browser windows offered free hobbyist software handydev software commercial implementation called mdnsbrowser offered netputing systems inc
[ 6788, 3940, 713, 6436, 4690, 734, 6832, 3989, 2597, 2241, 3322, 1502, 5786, 4740, 1897, 4014, 6505, 2627, 7609, 4759, 1171, 5109, 1928, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 502, 6557, 2679, 5859, 2327, 6565, 2329, 3050, 5519, 163, ...
Test
3,152
6
GNOME_Archive_Manager:gnome archive manager archive manager previously file roller archive manager gnome desktop environment archive manager backend programs needed use archive manager frontend archive manager supports following file formats archive manager ability use various formats 7z rar etc appropriate plugins n't give option compress using different levels compression via gui high normal/fast etc unlike many utilities set however using gconf-editor
[ 7959, 4213, 7058, 2091, 985, 7159, 6883, 2728, 1352, 1267, 4685, 6992, 6011, 1471, 5571, 658, 4700, 2581, 1955, 499, 7746, 2131, 3032, 2589, 7201, 3809, 7387, 510, 3219, 761, 8126, 1127, 2334, 6940, 4732, 5256, 3152, 5523, 169, 1139, 73...
Test
3,153
4
DNS_Flood:dns flood dns flood type denial-of-service attack process whereby traffic network resource machine stopped time offender sends great number requests resource machine might become unavailable might try reach dns flood host connects internet disrupted due overload traffic referred disruption causes work resource machine halt allowing traffic land attack mainly done hackers benefit attacked resource machine ddos attacks perpetrated many reasons including blackmailing website owners knocking websites including high-profile sites large bank websites many methods adopted prevent types attacks include dropping malformed packages use filters avoid receiving packages sources potential attack timing half open connections greater hostility one also set syn icmp udp lower levels prevent ddos attacks harming one network
[ 1691 ]
Test
3,154
4
Rustock_botnet:rustock botnet rustock botnet botnet operated around 2006 march 2011 consisted computers running microsoft windows capable sending 25,000 spam messages per hour infected pc height activities sent average 192 spam messages per compromised machine per minute reported estimates size vary greatly across different sources claims botnet may comprised anywhere 150,000 2,400,000 machines size botnet increased maintained mostly self-propagation botnet sent many malicious e-mails intended infect machines opening trojan would incorporate machine botnet botnet took hit 2008 takedown mccolo isp responsible hosting botnet command control servers mccolo regained internet connectivity several hours hours 15 mbit second traffic observed likely indicating transfer command control russia actions temporarily reduced global spam levels around 75 effect last long spam levels increased 60 january june 2009 40 attributed rustock botnet march 16 2011 botnet taken initially reported coordinated effort internet service providers software vendors revealed next day take-down called operation b107 action microsoft u.s. federal law enforcement agents fireeye university washington capture individuals involved rustock botnet july 18 2011 microsoft offering monetary reward amount us 250,000 new information results identification arrest criminal conviction individual botnets composed infected computers used unwitting internet users order hide presence user anti-virus software rustock botnet employed rootkit technology computer infected would seek contact command-and-control servers number ip addresses 2,500 domains backup domains may direct zombies botnet perform various tasks sending spam executing distributed denial service ddos attacks ninety-six servers operation time takedown sending spam botnet uses tls encryption around 35 percent cases extra layer protection hide presence whether detected creates additional overhead mail servers handling spam experts pointed extra load could negatively impact mail infrastructure internet e-mails sent days spam
[ 2173, 3076, 2632, 2724, 2376, 1632, 6715, 7441, 3281, 651, 924, 7186, 2577, 1383, 3875, 5401, 6740, 6823, 6370, 5675, 7657, 1766, 51, 7294, 2693, 3575, 1500, 2789, 862, 5611, 7307, 2618, 7600, 2535, 4110, 6328 ]
Validation
3,155
7
Bright_Computing:bright computing bright computing inc. developer software deploying managing high-performance hpc clusters kubernetes clusters openstack private clouds on-prem data centers well public cloud bright computing founded matthijs van leeuwen 2009 spun company clustervision co-founded alex ninaber arijan sauer alex matthijs worked together uk ’ compusys one first companies commercially build hpc clusters left compusys 2002 start clustervision netherlands determining growing market building managing supercomputer clusters using off-the-shelf hardware components open source software tied together customized scripts clustervision also provided delivery installation support services hpc clusters universities government entities 2004 martijn de vries joined clustervision began development cluster management software software made available customers 2008 name clustervisionos v4 2009 bright computing spun clustervision clustervisionos renamed bright cluster manager van leeuwen named bright computing ’ ceo 2010 ing corporate investments made 2.5 million investment bright computing 2014 draper fisher jurvetson dfj us dfj esprit uk prime ventures nl ing corporate investments invested 14.5 million bright computing time bright computing clustervision completely separated february 2016 bright appointed bill wagner chief executive officer matthijs van leeuwen became chief strategy officer left company board directors 2018 wagner presided multiple layoffs august 2019 controversial alliance huawei announced sc 18 early customers included boeing sandia national laboratories virginia tech hewlett packard nsa drexel university many early customers introduced resellers including sicorp cray dell advanced hpc 2019 company 700 customers including 50 fortune 500 companies.this citation 2016 cites much lower number removed bright cluster manager hpc lets customers deploy manage complete clusters provides management hardware operating system hpc software users 2014 company announced bright openstack software deploy provision manage openstack-based private cloud infrastructures 2016 bright started bundling several machine learning frameworks associated tools libraries product make easy get machine learning workload running bright cluster december 2018 version 8.2 released introduced support arm64 architecture edge capabilities build clusters spread many different geographical locations improved workload accounting reporting features well many improvements bright integration kubernetes bright cluster manager software frequently sold original equipment manufacturer oem resellers including dell cray technology partners include bright computing covered software magazine yahoo finance among publications 2016 bright computing awarded €1.5m horizon 2020 sme instrument grant european commission bright computing one 33 grant recipients 960 submitted proposals category 5 260 grants awarded
[ 6690, 1023, 4802, 6130, 2159, 5064, 4783, 6586, 972, 7189 ]
Test
3,156
3
Arithmetic_logic_unit:arithmetic logic unit arithmetic logic unit alu combinational digital electronic circuit performs arithmetic bitwise operations integer binary numbers contrast floating-point unit fpu operates floating point numbers alu fundamental building block many types computing circuits including central processing unit cpu computers fpus graphics processing units gpus single cpu fpu gpu may contain multiple alus inputs alu data operated called operands code indicating operation performed alu output result performed operation many designs alu also status inputs outputs convey information previous operation current operation respectively alu external status registers alu variety input output nets electrical conductors used convey digital signals alu external circuitry alu operating external circuits apply signals alu inputs response alu produces conveys signals external circuitry via outputs basic alu three parallel data buses consisting two input operands b result output data bus group signals conveys one binary integer number typically b bus widths number signals comprising bus identical match native word size external circuitry e.g. encapsulating cpu processor opcode input parallel bus conveys alu operation selection code enumerated value specifies desired arithmetic logic operation performed alu opcode size bus width determines maximum number different operations alu perform example four-bit opcode specify sixteen different alu operations generally alu opcode machine language opcode though cases may directly encoded bit field within machine language opcode status outputs various individual signals convey supplemental information result current alu operation general-purpose alus commonly status signals end alu operation status output signals usually stored external registers make available future alu operations e.g. implement multiple-precision arithmetic controlling conditional branching collection bit registers store status outputs often treated single multi-bit register referred status register condition code register status inputs allow additional information made available alu performing operation typically single carry-in bit stored carry-out previous alu operation alu combinational logic circuit meaning outputs change asynchronously response input changes normal operation stable signals applied alu inputs enough time known propagation delay passed signals propagate alu circuitry result alu operation appears alu outputs external circuitry connected alu responsible ensuring stability alu input signals throughout operation allowing sufficient time signals propagate alu sampling alu result general external circuitry controls alu applying signals inputs typically external circuitry employs sequential logic control alu operation paced clock signal sufficiently low frequency ensure enough time alu outputs settle worst-case conditions example cpu begins alu addition operation routing operands sources usually registers alu operand inputs control unit simultaneously applies value alu opcode input configuring perform addition time cpu also routes alu result output destination register receive sum alu input signals held stable next clock allowed propagate alu destination register cpu waits next clock next clock arrives destination register stores alu result since alu operation completed alu inputs may set next alu operation number basic arithmetic bitwise logic functions commonly supported alus basic general purpose alus typically include operations repertoires alu shift operations cause operand b shift left right depending opcode shifted operand appears simple alus typically shift operand one bit position whereas complex alus employ barrel shifters allow shift operand arbitrary number bits one operation single-bit shift operations bit shifted operand appears carry-out value bit shifted operand depends type shift integer arithmetic computations multiple-precision arithmetic algorithm operates integers larger alu word size algorithm treats operand ordered collection alu-size fragments arranged most-significant ms least-significant ls vice versa example case 8-bit alu 24-bit integer codice_1 would treated collection three 8-bit fragments codice_2 ms codice_3 codice_4 ls since size fragment exactly matches alu word size alu directly operate piece operand algorithm uses alu directly operate particular operand fragments thus generate corresponding fragment partial multi-precision result partial generated written associated region storage designated multiple-precision result process repeated operand fragments generate complete collection partials result multiple-precision operation arithmetic operations e.g. addition subtraction algorithm starts invoking alu operation operands ls fragments thereby producing ls partial carry bit algorithm writes partial designated storage whereas processor state machine typically stores carry bit alu status register algorithm advances next fragment operand collection invokes alu operation fragments along stored carry bit previous alu operation thus producing another significant partial carry bit carry bit stored status register partial written designated storage process repeats operand fragments processed resulting complete collection partials storage comprise multi-precision arithmetic result multiple-precision shift operations order operand fragment processing depends shift direction left-shift operations fragments processed ls first ls bit partial—which conveyed via stored carry bit—must obtained ms bit previously left-shifted less-significant operand conversely operands processed ms first right-shift operations ms bit partial must obtained ls bit previously right-shifted more-significant operand bitwise logical operations e.g. logical logical operand fragments may processed arbitrary order partial depends corresponding operand fragments stored carry bit previous alu operation ignored although alu designed perform complex functions resulting higher circuit complexity cost power consumption larger size makes impractical many cases consequently alus often limited simple functions executed high speeds i.e. short propagation delays external processor circuitry responsible performing complex functions orchestrating sequence simpler alu operations example computing square root number might implemented various ways depending alu complexity implementations transition fastest expensive slowest least costly square root calculated cases processors simple alus take longer perform calculation multiple alu operations must performed alu usually implemented either stand-alone integrated circuit ic 74181 part complex ic latter case alu typically instantiated synthesizing description written vhdl verilog hardware description language example following vhdl code describes simple 8-bit alu mathematician john von neumann proposed alu concept 1945 report foundations new computer called edvac cost size power consumption electronic circuitry relatively high throughout infancy information age consequently serial computers many early computers pdp-8 simple alu operated one data bit time although often presented wider word size programmers one earliest computers multiple discrete single-bit alu circuits 1948 whirlwind employed sixteen math units enable operate 16-bit words 1967 fairchild introduced first alu implemented integrated circuit fairchild 3800 consisting eight-bit alu accumulator integrated-circuit alus soon emerged including four-bit alus am2901 74181 devices typically bit slice capable meaning carry look ahead signals facilitated use multiple interconnected alu chips create alu wider word size devices quickly became popular widely used bit-slice minicomputers microprocessors began appear early 1970s even though transistors become smaller often insufficient die space full-word-width alu result early microprocessors employed narrow alu required multiple cycles per machine language instruction examples includes popular zilog z80 performed eight-bit additions four-bit alu time transistor geometries shrank following moore law became feasible build wider alus microprocessors modern integrated circuit ic transistors orders magnitude smaller early microprocessors making possible fit highly complex alus ics today many modern alus wide word widths architectural enhancements barrel shifters binary multipliers allow perform single clock cycle operations would required multiple operations earlier alus
[ 708, 5012, 1447, 5371, 3948, 7527, 7529, 1458, 5737, 7541, 2567, 2929, 4694, 5042, 1854, 1481, 5055, 1112, 2226, 3308, 1867, 5079, 2248, 4007, 4370, 6148, 3674, 441, 6865, 2266, 3347, 1922, 4765, 2999, 4047, 4408, 5483, 1556, 2659, 5487, ...
Test
3,157
4
Internet_Storm_Center:internet storm center internet storm center isc program sans technology institute branch sans institute monitors level malicious activity internet particularly regard large-scale infrastructure events isc evolved incidents.org site initially founded sans institute assist public-private sector cooperation y2k cutover 2000 incidents.org started cooperate dshield create consensus incidents database cid collected security information cooperating sites agencies mass analysis march 22 2001 sans cid responsible early detection lion worm attacks various facilities quick warning counter-efforts organized cid instrumental controlling damage done worm otherwise might considerably worse later dshield integrated closer incidents.org sans institute started sponsor dshield cid renamed internet storm center acknowledgement way uses distributed sensor network similar way weather reporting center detect track atmospheric storm provide warnings since time isc expanded monitoring operations website cites figure twenty million intrusion detection log entries per day continues provide analyses alerts security threats internet community last hours 2005 first weeks 2006 internet storm center went longest period time yellow infocon wmf vulnerability prominent feature isc daily handler diary prepared one 40 volunteer incident handlers summarized events day frequently first public source new attack trends actively facilitates cooperation soliciting information understand particular attacks better internet storm center currently staffed approximately 40 volunteers representing 8 countries many industries
[ 4645, 4585, 128 ]
Test
3,158
0
Word_embedding:word embedding word embedding collective name set language modeling feature learning techniques natural language processing nlp words phrases vocabulary mapped vectors real numbers conceptually involves mathematical embedding space many dimensions per word continuous vector space much lower dimension methods generate mapping include neural networks dimensionality reduction word co-occurrence matrix probabilistic models explainable knowledge base method explicit representation terms context words appear word phrase embeddings used underlying input representation shown boost performance nlp tasks syntactic parsing sentiment analysis linguistics word embeddings discussed research area distributional semantics aims quantify categorize semantic similarities linguistic items based distributional properties large samples language data underlying idea word characterized company keeps popularized firth technique representing words vectors roots 1960s development vector space model information retrieval reducing number dimensions using singular value decomposition led introduction latent semantic analysis late 1980s 2000 bengio et al provided series papers neural probabilistic language models reduce high dimensionality words representations contexts learning distributed representation words bengio et al 2003 word embeddings come two different styles one words expressed vectors co-occurring words another words expressed vectors linguistic contexts words occur different styles studied lavelli et al 2004 roweis saul published science use locally linear embedding lle discover representations high dimensional data structures area developed gradually really took 2010 partly important advances made since quality vectors training speed model many branches many research groups working word embeddings 2013 team google led tomas mikolov created word2vec word embedding toolkit train vector space models faster previous approaches new word embedding techniques rely neural network architecture instead traditional n-gram models unsupervised learning one main limitations word embeddings word vector space models general possible meanings word conflated single representation single vector semantic space sense embeddings proposed solution problem individual meanings words represented distinct vectors space word embeddings n- grams biological sequences e.g dna rna proteins bioinformatics applications proposed asgari mofrad named bio-vectors biovec refer biological sequences general protein-vectors protvec proteins amino-acid sequences gene-vectors genevec gene sequences representation widely used applications deep learning proteomics genomics results presented asgari mofrad suggest biovectors characterize biological sequences terms biochemical biophysical interpretations underlying patterns thought vectors extension word embeddings entire sentences even documents researchers hope improve quality machine translation software training using word embeddings includes tomas mikolov word2vec stanford university glove allennlp elmo fasttext gensim indra deeplearning4j principal component analysis pca t-distributed stochastic neighbour embedding t-sne used reduce dimensionality word vector spaces visualize word embeddings clusters instance fasttext also used calculate word embeddings text corpora sketch engine available online
[ 2648, 5429, 1839, 5286, 6166, 5304, 6925, 715, 3660, 5008, 2832 ]
Validation
3,159
0
BulSemCor:bulsemcor bulgarian sense-annotated corpus bulsemcor bulgarian български семантично анотиран корпус булсемкор structured corpus bulgarian texts lexical item assigned sense tag bulsemcor created department computational linguistics institute bulgarian language bulgarian academy sciences bulsemcor created part nationally funded project titled bulnet – lexico-semantic network bulgarian language 2005–2010 follows general methodology semcor combined specific principles corpus annotation consists 101,791 tokens covering excerpt bulgarian brown corpus modelled brown corpus important feature bulsemcor samples selected using heuristics provide optimal coverage ambiguous lexis bulsemcor manually sense-annotated according bulgarian wordnet size comparable contemporary semantically annotated corpora pool acceptable linguistic components semantic annotation consists associating lexical item corpus exactly one synonym set synset bulgarian wordnet best describes sense particular context selection best match among suggested candidates based set procedures synset members synset gloss explanatory definition position given candidate wordnet structure number annotated tokens 99,480 difference number tokens compared initial corpus due fact linguistic items simple word count 86,842 multiword expressions mwe 5,797 12,638 tokens words bulsemcor assigned sense according established practice simple content words content word classes typically nouns verbs annotated since 2000 development language resources broadened include annotation function words multiword expressions covering particular senses types words expressions respect bulsemcor annotation exhaustive hence provides greater opportunities linguistic observations non-linear programming nlp applications annotated items inherit linguistic information associated corresponding synset along morphological semanic tags may include annotation one following additional levels
[ 5136, 5152, 5429 ]
Test
3,160
8
Excite:excite excite stylized excite internet portal launched 1995 provides variety content including news weather metasearch engine web-based email instant messaging stock quotes customizable user homepage currently operated iac applications formerly mindspark iac excite networks u.s. main excite site long personal start page called excite excite also operates e-mail service although longer open new customers original excite company founded 1994 went public two years later excite one recognized brands internet decade main portal site excite.com sixth visited website 1997 fourth 2000 company merged broadband provider home network together went bankrupt 2001 excite portal services acquired iwon.com ask jeeves website went steep decline popularity afterwards january 2019 excite.com ranks 3616th u.s. according alexa rankings popular excite site local japanese one ranks 240th japan excite originally started architext june 1993 garage cupertino california graham spencer joe kraus mark vanharen ryan mcintyre ben lutch martin reinfried students stanford university goal create software manage vast information world wide web july 1994 international data group paid us 80,000 develop online service january 1995 vinod khosla former stanford student partner venture capital firm kleiner perkins caufield byers arranged us 250,000 first round backing project us 1.5 million provided ten-month period soon thereafter geoff yang institutional venture partners introduced additional us 1.5 million financing excite formally launched october 1995 january 1996 george bell joined excite chief executive officer ceo excite also purchased two search engines magellan webcrawler signed exclusive distribution agreements netscape microsoft apple addition companies jim bellows 72 hired excite 1994 figure present content journalistic manner paid good journalists write brief reviews web sites however users wanted get directly content skipped reviews partnership bellows ended 1998 excite original website design mostly based orange color 1997 redesigned black yellow theme mostly continues day april 4 1996 excite went public initial offering two million shares offering however overshadowed biggest rival yahoo also went public time excite six founders became millionaires offering november 1996 america online aol agreed make excite exclusive search directory service return larger 20 percent share excite sale webcrawler june 1997 intuit maker quicken turbotax purchased 19 stake excite finalized seven-year partnership deal october 16 1997 excite purchased netbot comparison shopping agent time intuit announced launch excite business investing later year deal finalized ticketmaster provide direct online ticketing march 31 1998 excite reported net loss approximately 30.2 million according first quarter report enough available capital meet obligations december content excite portal collated 100 different sources excite first portal start offering free e-mail step followed rivals yahoo lycos november 1997 press release showed 11.8 million unique visitors excite network 28-day period september october december 1998 yahoo negotiations purchase excite 5.5 billion 6 billion however prompted kleiner perkins home network chairman ceo thomas jermoluk met excite chairman ceo george bell december 19 excite subsequently acquired home network january 19 1999 time excite sixth largest internet portal traffic one point microsoft also interested excite plans merge msn.com portal according justin rohrlich writing minyanville.com later 1999 two graduate students stanford university sergey brin larry page decided google search engine developed taking time using study went bell offered 1 million bell rejected offer later threw vinod khosla one excite venture capitalists office negotiated brin page 750,000 excite refusal buy became 900 billion company 2019 labeled rohrlich stupid business decision 2014 podcast later cnbc then-ceo excite george bell said deal fell apart larry page wanted excite search technologies replaced google bell agree us 6.7 billion merger excite home network 1999 became one largest mergers two internet companies time home high-speed internet services existing portal combined excite search engine portal move towards personalized web portal content following merger new company named excite home stock symbol company name regulatory filing records remained home corporation athm six months merger tom jermoluk stepped ceo excite home excite george bell president excite division home merger became new ceo combined excite home whilst jermoluk remained chairman board merger billed new media network 21st century following merger excite division purchased imall well online greeting card company blue mountain arts excite also acquired photo sharing company webshots excite furthermore paid sponsorship infiniti indy car driver eddie cheever jr. 2000 2001 racing seasons however merger excite home fell disastrously short expectations online advertising revenue plummeted cable network isp revenue continued grow september 21 2000 stock value dropped 90 george bell announced plans step ceo within six months april 23 2001 excite home announced patti s. hart former ceo telocity would become third ceo three years announcement george bell resigned left company completely company also reported first-quarter net loss 61.6 million compared loss 4.6 million period prior year search engine magellan excite purchased 1996 closed may 2001 june 11 2001 excite home announced raised 100 million financing promethean capital management angelo gordon co. part deal loan repayable immediately excite home stock delisted nasdaq loan structured note convertible shares excite interest rate zero august 20 year excite home replaced auditors ernst young pricewaterhousecoopers triggered demand promethean capital management angelo gordon co immediate repayment 50 million debt furthermore cox cable comcast announced would separate excite home first quarter 2002 september 13 2001 excite home sold blue mountain arts american greetings less 5 paid less two years earlier october 1 2001 excite home filed chapter 11 bankruptcy protection u.s. bankruptcy court northern district california company remaining 1,350 employees laid following months part agreement home national high-speed fiber network access would sold back corporation home liquidating trust became successor company excite home charged sale assets former company end 2001 webshots assets purchased company founders 2.4 million cash bankruptcy court despite financial problems excite network sites continued draw many visitors u.s. albeit behind aol time warner microsoft/msn yahoo collapse excite home iwon.com irvington new york–based venture surreptitiously commenced design new excite website iwon.com planned acquire excite.com domain name brand course bankruptcy proceedings iwon.com eventually made joint bid seattle infospace purchase domain name brand november 28 2001 court accepted bid gave iwon less three weeks launch new excite portal bill daugherty iwon founder co-chief executive time told new york times feel like guy lived hurricane got pounded pounded managed survive everyone else destroyed suddenly walk outside storm beachfront property excite us december 16 2001 iwon launched new excite portal transferred millions excite users new home iwon changed corporate name excite network continued operate excite iwon third portal myway outside united states excite italia took control portals uk germany spain france italy netherlands poland switzerland austria infospace part owned operated web search function excite excite database depreciated instead using overture inktomi search results along dmoz open directory directory dogpile metasearch news results proved short-sighted arrangement searching became big business internet ensuing years excite continued operate excite network acquired ask jeeves ask.com march 2004 ask jeeves promised rejuvenate iwon excite able ask jeeves management became distracted according east bay business times first search feature arms race google yahoo merger barry diller iac/interactivecorp announced march 2005 hopefully start invest get staff place changes portal properties want hope see revenue grow back latter half year said ask jeeves ceo steve berkowitz conference call analysts april 27 2005 may 20 2005 ask jeeves made two announcements regarding rejuvenation excite brand first announced acquired excite italia b.v. operator excite europe tiscali s.p.a. secondly company reported reached comprehensive settlement infospace regarding excite united states whereby ask jeeves infospace would share marketing costs revenue excite web search function regarding acquisition ask jeeves ceo steve berkowitz said look forward working infospace enhance search experience excite interests aligned october 17 2007 goadv media company specializing generation internet traffic announced completion acquisition european excite group companies excite never managed recover back heyday popularity remains notable japan however excite japan headquartered tokyo founded august 4 1997 partnership itochu excite home collapse itochu became majority shareholder excite japan 90 percent bid compete internet service providers like netzero juno online offered free low-cost dial-up access united states excite started offering no-pay service private customers partnering 1stup.com create freelane excite 1stup would allow excite customers download software order able log-on internet software would rotate series sponsored banner advertisements user computer surfed internet 1stup.com soon went business excite switched another partner named worldshare rebranding freelane freelane version 2.0 march 1 2001 freelane discontinued ticketsmate partnership excite sells tickets customers united states portal essentially ticket selling website users buy tickets search thousands events venues powerful search engine capabilities excite server utilized website help user search tickets events since 1999 excite also education portal used people search apply different degrees online courses excite education portal features list thousands educational institutes across america prospective students browse apply
[ 8084, 5342, 6092, 5000, 84, 518 ]
Test
3,161
8
Heritrix:heritrix heritrix web crawler designed web archiving written internet archive available free software license written java main interface accessible using web browser command-line tool optionally used initiate crawls heritrix developed jointly internet archive nordic national libraries specifications written early 2003 first official release january 2004 continually improved employees internet archive interested parties heritrix main crawler used crawl content internet archive web collection many years largest contributor collection 2011 alexa internet alexa crawls web purposes using crawler named ia_archiver alexa donates material internet archive internet archive crawling using heritrix smaller scale starting 2008 internet archive began performance improvements wide scale crawling collect content number organizations national libraries using heritrix among older versions heritrix default stored web resources crawls arc file file format wholly unrelated arc file format format used internet archive since 1996 store web archives recently saves default warc file format similar arc precisely specified flexible heritrix also configured store files directory format similar wget crawler uses url name directory filename resource arc file stores multiple archived resources single file order avoid managing large number small files file consists sequence url records header containing metadata resource requested followed http header response arc files range 100 600 mb example heritrix includes command-line tool called arcreader used extract contents arc file following command lists urls metadata stored given arc file cdx format following command extracts hello.html example assuming record starts offset 140 tools heritrix comes several command-line tools tools available part internet archive warctools project tools internet archive links related tools
[ 6114, 2739, 503, 4759, 654, 80, 5571, 7886, 578, 855, 1333, 1732, 518 ]
Test
3,162
4
John_McAfee:john mcafee john david mcafee born september 18 1945 british-american computer programmer businessman founded software company mcafee associates 1987 ran 1994 resigned company mcafee associates achieved early success creators mcafee first commercial antivirus software business produces range enterprise security software company purchased intel 2011 spun back 2017 tpg capital owning majority stake though software always borne mcafee brand name mcafee wealth peaked 2007 100 million investments plummeted global financial crisis began year since leaving mcafee associates founded companies tribal voice makers powwow chat program quorumex future tense central among others involved leadership positions companies everykey mgt capital investments luxcore among others personal business interests include smartphone apps cryptocurrency yoga all-natural antibiotics resided number years belize later returned united states 2013 mcafee also political activist sought 2016 libertarian party nomination president united states 2016 election losing former new mexico governor gary johnson mcafee born cinderford forest dean gloucestershire united kingdom september 18 1945 u.s. army base american father stationed english mother raised salem virginia mcafee said feels much british american mcafee 15 father abusive alcoholic committed suicide received bachelor degree mathematics 1967 roanoke college subsequently awarded honorary sc.d degree 2008 mcafee employed programmer nasa institute space studies new york city 1968 1970 went univac software designer later xerox operating system architect 1978 joined computer sciences corporation software consultant worked consulting firm booz allen hamilton 1980–1982 1980s employed lockheed mcafee received copy brain computer virus began developing software combat viruses 1987 mcafee founded mcafee associates computer anti-virus company 1989 quit lockheed began working full-time mcafee associates initially operated home santa clara california company incorporated delaware 1992 mcafee resigned company 1994 two years mcafee associates went public mcafee sold remaining stake company network associates formed 1997 merger mcafee associates network general network associates company name retained seven years renamed mcafee inc august 2010 intel bought mcafee maintaining separate branding january 2014 announced mcafee-related products marketed intel security mcafee expressed pleasure name change saying everlastingly grateful intel freeing terrible association worst software planet unit spun intel april 2017 mcafee llc joint venture tpg capital intel business ventures founded mcafee include tribal voice developed one first instant messaging programs powwow 2000 invested joined board directors zone labs makers firewall software prior acquisition check point software 2003 august 2009 new york times reported mcafee personal fortune declined 4 million peak 100 million effect global financial crisis recession investments 2009 mcafee interviewed belize cnbc special bubble decade reported invested and/or built many mansions usa went unsold 2007 global recession hit report also discussed quest produce plants possible medicinal uses land belize february 2010 mcafee started company quorumex headquartered belize aimed produce commercial natural antibiotics based anti-quorum sensing technology june 2013 mcafee uploaded parody video uninstall mcafee antivirus onto youtube channel video mcafee criticized mcafee antivirus software snorting white powder stroked undressed scantily clad women video garnered 9 million views mcafee told reuters made video ridicule media negative coverage spokesman mcafee inc. called video statements ludicrous also 2013 mcafee started company future tense central aimed produce secure computer network device called d-central 2016 also serving incubator february 2014 mcafee announced cognizant application smartphones displays information permissions installed applications april 2014 cognizant renamed dcentral 1 android version released free google play def con conference las vegas nevada august 2014 warned americans use smartphones suggesting apps used spy clueless consumers read privacy user agreements january 2016 became chief evangelist security startup everykey february 2016 mcafee received media attention publicly volunteering decrypt iphone used san bernardino shooters avoiding need apple build backdoor mcafee later admitted claims simple cracking phone publicity stunt though still claimed could pull may 2016 mcafee appointed chief executive chairman ceo mgt capital investments technology holding company company initially stated would rename john mcafee global technologies although plan abandoned due dispute intel rights mcafee name mcafee changed mgt focus social gaming cybersecurity stating interview anti-virus software dead longer works new paradigm stop hacker getting damage soon joining mgt mcafee claimed team exploited flaw android operating system allowed read encrypted messages whatsapp gizmodo investigated claims reported mcafee sent reporters malware-infected phones make hack work mcafee responded accusations writing course phones malware malware got story release speaking google involves serious flaw android architecture mcafee also moved mgt mining bitcoin cryptocurrencies saying intended make money company increase mgt expertise dealing blockchains thought important cybersecurity extremely bullish bitcoin writing twitter july 2017 predicted price one bitcoin would jump 500,000 within three years eat dick national television november 2017 increased prediction 1 million august 2017 mcafee stepped ceo instead serving mgt chief cybersecurity visionary january 2018 left company altogether sides stated decision amicable mcafee saying wanted spend time cryptocurrencies company stated getting pressured potential investors disassociate mcafee august 13 2018 mcafee took position ceo luxcore cryptocurrency company focused enterprise solutions mcafee identifies libertarian advocating decriminalization cannabis end war drugs non-interventionism foreign policy free market economy redistribute wealth upholds free trade mcafee supports abolishing transportation security administration mcafee advocates increased cyber awareness action threat cyberwarfare mcafee advocated religious liberty saying business owners able deny service cases contradict religious beliefs one forcing buy anything choose one person another forced anything harming choice sell choice buy september 8 2015 mcafee announced would seek office president united states 2016 presidential election candidate newly formed political party called cyber party december 24 2015 re-announced candidacy bid saying would instead seek presidential nomination libertarian party campaign trail mcafee consistently polled among top three presidential candidates party rivals gary johnson austin petersen three candidates appeared libertarian party first nationally televised presidential debate march 29 2016 mcafee announced vice presidential choice would photographer former commercial real estate broker libertarian activist judd weiss mcafee announced plans run president 2020 presidential election primary platform promote use cryptocurrencies stated either seek nomination libertarian party form party mcafee contended taxes illegal claimed filed tax return eight years refers “ prime target ” us internal revenue service mcafee lives wife janice dyson lexington tennessee night mcafee arrived united states deported guatemala december 2012 solicited dyson prostitute south beach florida two spent night together mcafee dyson 30 years mcafee junior subsequently began relationship married 2013 mcafee originally took residence portland oregon 2013 2012 article mensa bulletin magazine american mensa mcafee stated developer first commercial anti-virus program made popular hacking target confiding hackers see hacking badge honor added security people buy computer equipment uses pseudonyms setting computers logging changes ip address several times day asked another occasion personally uses mcafee antivirus software mcafee replied take annoying mcafee claims former cocaine baron boston george jung writing official biography domain mcafee taught yoga written several books yoga june 22 2018 mcafee announced unconscious hospitalized two days vidant medical center greenville north carolina claimed due malicious tampering something ingested since december 2018 mcafee stated several times twitter 47 biological children april 30 2012 mcafee property orange walk town belize raided gang suppression unit belize police department time mcafee bed girlfriend mcafee said traumatized incident gsu press release stated mcafee arrested unlicensed drug manufacturing possession unlicensed weapon released without charge 2012 belize police spokesman raphael martinez confirmed mcafee neither convicted charged suspected november 12 2012 belize police started search mcafee person interest connection murder american expatriate gregory viant faull faull found dead gunshot wound november 11 2012 home island ambergris caye largest island belize faull neighbor mcafee november 2012 interview wired mcafee said always afraid police would kill thus refused routine questions since evaded belizean authorities belize prime minister dean barrow called mcafee extremely paranoid even bonkers mcafee fled belize sought questioning concerning murder magazine vice accidentally gave away mcafee location guatemalan resort early december 2012 photo taken one journalists accompanying mcafee posted exif geolocation metadata still attached guatemala mcafee asked chad essley american cartoonist animator set blog mcafee could write experience run mcafee appeared publicly guatemala city attempted seek political asylum december 5 2012 mcafee arrested illegally entering guatemala shortly afterward placed arrest board review mcafee plea asylum formed committee denied asylum taken holding facility detention center order await deportation belize december 6 2012 reuters abc news reported mcafee two minor heart attacks guatemalan detention center hospitalized mcafee lawyer stated client suffered heart attacks instead suffered high blood pressure anxiety attacks mcafee later said faked heart attacks held guatemala buy time attorney file series appeals ultimately prevented deportation belize thus hastening government decision send back united states december 12 2012 mcafee released detention guatemala deported united states january 2014 belizean police presented new accusations persisted seeking mcafee imprisonment crimes accused however auctioned mcafee seized assets home burned suspicious circumstances august 2 2015 mcafee arrested henderson county tennessee charges one count driving influence one count possession firearm intoxicated november 14 2018 circuit court orlando florida refused dismiss wrongful death lawsuit mcafee faull death january 2019 mcafee announced run u.s. authorities living internationally boat following convening grand jury indict wife four 2020 presidential campaign workers tax-related charges irs independently confirmed existence charges july 2019 mcafee members entourage arrested yacht docked puerto plata dominican republic suspicion carrying high-caliber weapons ammunition held four days released. showtime networks documentary portion mcafee life spent belize began airing september 2016 documentary covers allegations rape mcafee former business partner allison adonizio murders belizean david middleton american expat gregory faull interview bloomberg pimm fox kathleen hayes september 8 2016 mcafee claimed incidents fabricated saying belize third-world banana republic go make story want pay interviewees showtime march 27 2017 announced johnny depp would portray mcafee forthcoming film titled king jungle film focus mcafee life belize takes wired magazine writer tour compound glenn ficarra john requa direct film scott alexander larry karaszewski write script october 2018 announced michael keaton would replace johnny depp key role may 12 2017 mcafee interviewed abc 20/20 regarding alleged murder neighbor greg faull hour janice mcafee john wife also interviewed
[ 496, 113, 1931, 2733, 6430, 74, 5571, 7503, 6756, 3713, 2805, 740, 6043, 744 ]
Validation
3,163
1
Polyglot_persistence:polyglot persistence polyglot persistence concept using different data storage technologies handle different data storage needs within given software application polyglot programming term coined neal ford 2006 expresses idea computer applications written mix different programming languages order take advantage fact different languages suitable tackling different problems complex applications combine different types problems picking right language job may productive trying solve aspects problem using single language concept applied databases application communicate different databases using best achieve end goal hence term polyglot persistence numerous databases available solve different problems using single database satisfy program requirements result non-performant jack trades master none solution relational databases example good enforcing relationships exist various data tables discover relationship find data different tables belong object sql join operation used might work data smaller size becomes problematic data involved grows larger graph database might solve problem relationships case big data might solve problem database transactions provided rdbm systems instead nosql document database might used store unstructured data particular part problem thus different problems solved different database systems within application
[ 2054 ]
Test
3,164
1
Object_Design,_Incorporated:object design incorporated object design incorporated often called odi software company founded 1988 developed commercialized object database called objectstore object design founded several former symbolics employees including daniel weinreb based burlington massachusetts objectstore object-oriented database shipped 1990 1994 odi listed 1 inc. magazine list fastest-growing private companies u.s. major early customer telstra used map toll-free telephone numbers end point close caller example local taxi company chain restaurant odi went public 1996 listed nasdaq odis 1999 odi shipped excelon xml application development environment marketed integration server january 2000 odi renamed excelon focussed marketing xml integration software 2002 odi acquired progress software continued develop 2013 progress software sold objectstore product line among others aurea software inc. newly formed operating subsidiary esw capital investment arm trilogy enterprises part deal objectstore moved separate operating subsidiary esw capital
[]
Validation
3,165
4
Outpost_Firewall_Pro:outpost firewall pro outpost firewall pro discontinued personal firewall developed agnitum founded 1999 st. petersburg russia outpost firewall pro monitors incoming outgoing network traffic windows machines outpost also monitors application behavior attempt stop malicious software covertly infecting windows systems agnitum called technology component control anti-leak control included hips-based host protection module product also includes spyware scanner monitor along pop-up blocker spyware filter internet explorer mozilla firefox outpost web surfing security tools included black-lists ips urls unwanted web page element filters ad-blocking technology altogether known web control version 7.5 adds new techniques help pc users block unknown new threats activation version 8 introduces improvements well windows 8 compatibility redesigned user interface version 8 also extends x64 host-based intrusion-prevention system hips support outpost firewall pro allows user specifically define pc application connects internet known rules wizard mode policy default behavior program mode outpost firewall pro displays prompt time new process attempts network access process requests connection covered pre-validated rules idea let user decide whether application allowed network connection specific address port protocol outpost firewall includes pre-set rules many popular applications users could optionally submit rules created first versions outpost firewall pro 1.0–4.0 allow users create plugins add third-party plugins meet specific needs later versions plugin programming interface outpost firewall pro users developed unofficial web forum fed agnitum since 2002 discuss product features support forum moderated experienced senior users outpost firewall pro offers help support technical advice program assistance outpost firewall pro self-protection technology aims detecting attempts modify disable services hinder program protection received accolades comparison testers capable sophisticated detecting known methods disabling without user permission testing site matousec.com performing test-set leak-tests known software including pc firewalls consistently gives outpost firewall pro highest ratings pc firewalls independent comparisons outpost firewall pro 30 awards 15 countries computer media test labs since 2002 product also licensed several security software publishers 2003–2010 sophos uk usa lavasoft sweden canon japan bullguard uk cat-quickheal india novell usa avg czech republic czech republic proland software india others outpost generate large number security alerts experts believe lead inexperienced end-user habitually dismissing alerts even important ones firewall preferred experienced users agnitum direction give end user complete control aspects system avoid unwanted changes malicious software disclosure personal information malware advanced security mode outpost component control notify user every time network enabled application changed component anti-leak control notify user whenever application performs potentially dangerous operation overwriting another application memory space practice result high number alerts quickly become intrusive mediate outpost includes option apply validated pre-sets automatically allow secure configuration yet provide ease use december 9 2015 yandex acquired agnitum order use technology yandex browser valid license holders given january 31 2016 exchange license keys 1 year license kaspersky internet security
[ 1249, 1809, 4759, 806, 994, 3185, 4492, 7351, 4138, 385, 7536, 2296, 2746, 5571, 6107, 3111, 578, 3637, 8100, 6456, 3551, 1291, 7275, 7744, 3394, 6560, 4977, 7289, 7478, 3223, 3484, 6305, 4091, 2790, 7683, 4456, 6235, 6149, 6951, 7597, ...
Test
3,166
9
Grace_Hopper:grace hopper grace brewster murray hopper december 9 1906 – january 1 1992 american computer scientist united states navy rear admiral one first programmers harvard mark computer pioneer computer programming invented one first linkers popularized idea machine-independent programming languages led development cobol early high-level programming language still use today prior joining navy hopper earned ph.d. mathematics yale university professor mathematics vassar college hopper attempted enlist navy world war ii rejected 34 years old instead joined navy reserves hopper began computing career 1944 worked harvard mark team led howard h. aiken 1949 joined eckert–mauchly computer corporation part team developed univac computer eckert–mauchly began developing compiler believed programming language based english possible compiler converted english terms machine code understood computers 1952 hopper finished program linker originally called compiler written a-0 system wartime service co-authored three papers based work harvard mark 1 1954 eckert–mauchly chose hopper lead department automatic programming led release first compiled languages like flow-matic 1959 participated codasyl consortium consulted hopper guide creating machine-independent programming language led cobol language inspired idea language based english words 1966 retired naval reserve 1967 navy recalled active duty retired navy 1986 found work consultant digital equipment corporation sharing computing experiences u.s. navy guided-missile destroyer named cray xe6 hopper supercomputer nersc lifetime hopper awarded 40 honorary degrees universities across world college yale university renamed honor 1991 received national medal technology november 22 2016 posthumously awarded presidential medal freedom president barack obama hopper born new york city eldest three children parents walter fletcher murray mary campbell van horne scottish dutch descent attended west end collegiate church great-grandfather alexander wilson russell admiral us navy fought battle mobile bay civil war grace curious child lifelong trait age seven decided determine alarm clock worked dismantled seven alarm clocks mother realized limited one clock preparatory school education attended hartridge school plainfield new jersey hopper initially rejected early admission vassar college age 16 test scores latin low admitted following year graduated phi beta kappa vassar 1928 bachelor degree mathematics physics earned master degree yale university 1930 1934 earned ph.d. mathematics yale direction øystein ore dissertation new types irreducibility criteria published year hopper began teaching mathematics vassar 1931 promoted associate professor 1941 married new york university professor vincent foster hopper 1906–1976 1930 divorce 1945 marry chose retain surname hopper tried enlist navy early world war ii rejected reasons age 34 old enlist weight height ratio low also denied basis job mathematician mathematics professor vassar college valuable war effort war 1943 hopper obtained leave absence vassar sworn united states navy reserve one many women volunteered serve waves get exemption enlist navy minimum weight reported december trained naval reserve midshipmen school smith college northampton massachusetts hopper graduated first class 1944 assigned bureau ships computation project harvard university lieutenant junior grade served mark computer programming staff headed howard h. aiken hopper aiken co-authored three papers mark also known automatic sequence controlled calculator hopper request transfer regular navy end war declined due advanced age 38 continued serve navy reserve hopper remained harvard computation lab 1949 turning full professorship vassar favor working research fellow navy contract harvard 1949 hopper became employee eckert–mauchly computer corporation senior mathematician joined team developing univac i. hopper also served univac director automatic programming development remington rand univac first known large-scale electronic computer market 1950 competitive processing information mark hopper recommended development new programming language would use entirely english words told quickly could n't computers n't understand english still persisted “ much easier people write english statement use symbols ” explained “ decided data processors ought able write programs english computers would translate machine code. ” idea accepted 3 years meantime published first paper subject compilers 1952 early 1950s company taken remington rand corporation working original compiler work done program known compiler first version a-0 1952 operational link-loader time referred compiler later said nobody believed running compiler nobody would touch told computers could arithmetic goes say compiler translated mathematical notation machine code manipulating symbols fine mathematicians good data processors symbol manipulators people really symbol manipulators become professional mathematicians data processors much easier people write english statement use symbols decided data processors ought able write programs english computers would translate machine code beginning cobol computer language data processors could say subtract income tax pay instead trying write octal code using kinds symbols cobol major language used today data processing 1954 hopper named company first director automatic programming department released first compiler-based programming languages including math-matic flow-matic spring 1959 computer experts industry government brought together two-day conference known conference data systems languages codasyl hopper served technical consultant committee many former employees served short-term committee defined new language cobol acronym common business-oriented language new language extended hopper flow-matic language ideas ibm equivalent comtran hopper belief programs written language close english rather machine code languages close machine code assembly languages captured new business language cobol went ubiquitous business language date among members committee worked cobol mount holyoke college alumnus jean e. sammet 1967 1977 hopper served director navy programming languages group navy office information systems planning promoted rank captain 1973 developed validation software cobol compiler part cobol standardization program entire navy 1970s hopper advocated defense department replace large centralized systems networks small distributed computers user computer node could access common databases located network developed implementation standards testing computer systems components significantly early programming languages fortran cobol navy tests conformance standards led significant convergence among programming language dialects major computer vendors 1980s tests official administration assumed national bureau standards nbs known today national institute standards technology nist accordance navy attrition regulations hopper retired naval reserve rank commander age 60 end 1966. ref name= urlattrition/retirement /ref recalled active duty august 1967 six-month period turned indefinite assignment retired 1971 asked return active duty 1972 promoted captain 1973 admiral elmo r. zumwalt jr. republican representative philip crane saw march 1983 segment 60 minutes championed joint resolution originating house representatives led promotion 15 december 1983 commodore special presidential appointment president ronald reagan remained active duty several years beyond mandatory retirement special approval congress effective november 8 1985 rank commodore renamed rear admiral lower half hopper became one navy female admirals following career spanned 42 years admiral hopper took retirement navy august 14 1986 celebration held boston commemorate retirement hopper awarded defense distinguished service medal highest non-combat decoration awarded department defense time retirement oldest active-duty commissioned officer united states navy 79 years eight months five days retirement ceremony aboard oldest commissioned ship united states navy 188 years nine months 23 days admirals william d. leahy chester w. nimitz hyman g. rickover charles stewart officers navy history serve active duty higher age leahy nimitz served active duty life due promotions rank fleet admiral following retirement navy hired senior consultant digital equipment corporation dec hopper initially offered job position rita yavinsky insisted applying position dec going typical formal interview process also sent letter yavinsky boss explaining would available alternating thursdays receiving high salary access unlimited expense account exhibited museum computing pioneer proposal hopper hired full-time senior consultant part position would report yavinsky position hopper represented company industry forums serving various industry committees along obligations retained position death age 85 1992 hopper goodwill ambassador primary activity capacity lectured widely early days computing career efforts computer vendors could take make life easier users visited digital engineering facilities generally received standing ovation conclusion remarks although longer serving officer always wore navy full dress uniform lectures allowed u.s. department defense regulation 32 cfr 53.2 2 important thing 've accomplished building compiler said training young people come know say 'do think say 'try back 'em need keep track get older stir 'em intervals n't forget take chances new year day 1992 hopper died sleep natural causes home arlington virginia 85 years age interred full military honors arlington national cemetery legacy inspiring factor creation grace hopper celebration women computing held yearly conference designed bring research career interests women computing forefront
[ 6507, 6511, 4662, 4670, 2733, 4940, 1361, 6897, 5836, 4508, 1381, 3115, 7999, 7921, 7017, 4435, 6470, 851, 336, 5424, 7303, 7863, 1600, 5784, 6774, 6497, 1243, 5621, 2265, 5190, 360 ]
Test
3,167
1
DOTO_Database:doto database doto database documentation oppressed online portal data hate-crime based religious identity happened india since 2014 website launched 7 march 2018 constitution club india new delhi inauguration ceremony attended ram punyani teesta setalvad saba naqvi zafar ul islam khan john dayal social activists documentation oppressed independent non-profit documentation center based new delhi run network civil society organizations national grassroot level like quill foundation human rights watch amnesty international chri people union civil liberties others doto database functions tracker violence site in-depth narratives database mixes crowd-sourcing model investigative editorial teams past years marked increase violence conducted certain sections society violence manifests different forms organized institutional violence state actions allied groups furtherance internalized biases primary objective doto database create common documentation platform civil society report hate crime incidents happening across india database document verifiable incidents targeted violence specific communities reported english urdu media well fact-finding civil society reports also provides platform in-depth narratives doto increase media reportage amalgamation crowd-sourcing model along investigative editorial teams easy-to-use model ultimately seeks make essential information accessible address number issues systemic violation fundamental rights erosion constitutional values deployment hate towards religious minorities india
[]
Test
3,168
8
Cherokee_(web_server):cherokee web server cherokee open-source cross-platform web server runs linux bsd variants solaris windows lightweight high-performance web server/reverse proxy licensed gnu general public license goal fast fully functional yet still light major features cherokee include graphical administration interface named cherokee-admin modular light-weight design independent tests shown cherokee better performing apache serving static dynamic content cherokee maintained developed open source community configuration wizards provided automatically configure web server perform specific tasks run frameworks applications provide support php fastcgi ruby rails coldfusion glassfish django alfresco gnu mailman .net mono rtorrent symfony zend engine plus generic video streaming uwsgi last years cherokee adopted numerous electronic device makes iot technology manufacturers examples include gopro action cameras drones xiaomi action cameras digi international internet things kits atn corporation high-end rifle scopes defender security cameras etc since cherokee open source software require manufacturers license code way know many companies embedding cherokee products
[ 2451, 7062, 5369, 1349, 5206, 5820, 7169, 5214, 2646, 6270, 1834, 2291, 8182, 6536, 26, 5571, 7544, 7988, 578, 3543, 3794, 4701, 6029, 1392, 3219, 417, 7786, 3135, 2506, 1686, 3408, 5965, 3915, 1602, 6061, 7411, 2530, 3338, 7952, 1435, ...
Test
3,169
9
HyperTalk:hypertalk hypertalk high-level procedural programming language created 1987 dan winkler used conjunction apple computer hypercard hypermedia program bill atkinson main target audience hypertalk beginning programmers hypertalk programmers usually called authors process writing programs scripting hypertalk scripts resembled written english used logical structure similar pascal programming language hypertalk supported basic control structures procedural languages repeat for/while/until if/then/else well function message handler calls function handler subroutine message handler procedure data types usually need specified programmer conversion happened transparently background strings numbers classes data structures traditional sense place special string literals lists items delimited commas later versions itemdelimiter property allowed choosing arbitrary character late 1980s apple considered using hypercard hypertalk scripting language standard language across company within classic mac os operating system well interprocess communication apple non-apple products company oppose development imitations like supercard created hypertalk standards committee avoid incompatibility language variants case-insensitive language initially interpreted gained just-in-time compilation hypercard 2.0 basic operations including mathematical computations hypertalk favored natural-language ordering predicates ordering used mathematical notation example hypertalk codice_1 assignment command variable placed end statement whereas traditional basic programming language others would accomplished writing hypertalk code side-effect creating variable theresult fly scripts could assign type value variable using codice_1 command making hypertalk weakly typed conversions variable types invisible automatic string 3 could multiplied number 5 produce number 15 number 5 concatenated onto string 3 produce string 35 hypertalk would complain unless types could automatically converted flow control logic generally similar common languages using codice_3 structure conditionals supporting loops based flexible codice_4 syntax comments prefaced two minus signs codice_5 hypercard primary user interface concept card display system emulated index card cards normally used store information similar record conventional flat-file database graphical layout card created using mouse placing various elements card text fields buttons master layout card known background shown behind transparent areas card objects placed background fields buttons would shared common layout among several cards card-specific content collection cards backgrounds associated data stored stored single file known stack cards collectively data-containing objects referred containers hypertalk functions scripts normally stored within codice_6 property available many stack containers scripts could access properties container corresponding instance variables using codice_7 codice_8 instructions script property held plain text special properties scripts could placed run text container including string variables imported stacks using codice_9 command script could even user-provided text typed on-screen text field arbitrary text could executed using codice_10 command manner similar dynamic sql key concept hypertalk way referred containers navigational system based visual hierarchy stack every container stack given unique id number created could also given name scripts could refer objects using either identifiers along object type specified using codice_11 operator operator used natural language syntax making easily readable self-documenting code instance script stored button card might wish take user-supplied text gathered using text field store text variable called thevalue various contextual aspects statements could inferred interpreter statement example script would running context button specific card identifier card understood refer card user interacting addition value text submitted user assumed main property target operations otherwise specified likewise card field assumed target command opposed background field information could also omitted even container types short forms programmers could use save typing thus code equivalent shorter form objects within given context—the card background instance—were also given runtime number based z-order screen assist using position navigation hypertalk also included variety ordinal cardinal referencing systems simplify syntax assuming field typehere field card code could also written choice addressing style left programmer often different styles used different statements order make code readable hypertalk included codice_12 container acted fashion codice_13 qualifier found object-oriented languages allowing simple access current container object less common codice_14 variable held value last operation certain built-in operators example uses codice_15 command display dialog box capture text typed accompanying text field dialog completed hitting clicking value assigned codice_14 pseudo-variable code copies value card field using codice_1 assignment operator containers given type also available collections pluralized version container type name—the collection fields card codice_18 collections containers properties key among codice_19 property widely used iterations similar tasks instance one wanted hide fields card could accomplished code code exposes another common feature hypertalk property might several names operators case codice_20 command associated codice_21 act setting value container codice_22 property thus codice_23 exactly equivalent codice_24 similar example codice_25 command stopped visual updating short form codice_26 codice_27 property hypercard itself—also container many examples sort syntactic sugar found hypertalk order simplify syntax improve readability common code hypercard 2.2 later collection collections also available container codice_28 allowed script address objects container single iterator notable feature hypertalk container model handling text every collection text whether literal string program text typed text field considered container multiple collections containers within allowed scripts parse text using navigational commands container instance parsing space-delimited data file one might want extract third column like syntax allowed script walk text find particular data example process treating text container known chunking functions chunk expressions sorts expressions used handle file manipulation along set file management functions following code opens known file reads extracts data closes file hypertalk also included functions chunking strings using substring-find operation using codice_29 operator following code finds examples given pattern using codice_29 part codice_31 loop codice_32 finds location pattern within string hypertalk used chunking system produce structures like arrays lists structure would created placing multiple data items variable separated commas various types data could imported hypertalk script using strings would get parsed required instance position objects screen defined pair numbers representing x coordinates relative upper left corner following code creates variable called pos holds coordinate pair manipulates re-position buttons card diagonal top-left bottom-right codice_33 chunking expression originally based comma delimiter later versions hypercard changed value codice_34 offering ability parse arbitrary lists structures hypertalk used object-oriented concept calling scripts objects stack sending events would processed handlers declared interest receiving events using codice_35 syntax instance gui containers could send codice_36 event mouse button clicked released top container script could capture events like events first sent script object created event instance user clicked button codice_36 event first sent button button script object codice_36 handler script passed card background stack stacks whose scripts explicitly imported using codice_9 command home stack user-selected always-open hypercard stack finally hypercard application many simple events like mouse clicks buttons script would placed directly within object question button instance one might use example code within button handler fashion case code called multiple locations used global handler event script could determine original sender event using codice_40 function likewise scripts could send events containers using codice_41 command using navigational code refer container holding handlers code combining hypertalk string processing codice_10 command allowed construction interactive interpreters placing text field card placing code field script codice_43 global property returns name line number last field clicked form like line 10 card field 4 code first selects text clicked line extracts line number local variable uses codice_10 run text hypercard script codice_45 message sent button user clicked codice_36 sent user released mouse inside trigger action similarly hypercard sent periodic codice_47 message codice_48 codice_49 ... various messages related navigation different cards hypercard stack well user input codice_50 codice_51 ... system events far scripters concerned main event loops like procedural programming languages unlike general rapid application development platforms hypercard stacks always looked like stacks menu bar hypercard programmer default—scripting could add delete modify menus single window fixed size early versions certain cases commands central operation part application directly available hypertalk good example creation new cards part application directly accessible hypertalk language new card could created using new card menu item could simulated code usingcodice_52 hypertalk called menu commands menu commands also invoked handlers hypertalk run custom code copy menu item selected one would place script stack using codice_53 handler examine codice_54 see copy hypertalk also provided script control built-in drawing tools simply scripting needed changes paint tools simulating mouse movements using codice_55 codice_56 commands although hypertalk language languished like hypercard received second lease life plugin protocol so-called external commands xcmds external functions xfcns native code containers attached stacks macintosh-specific resources single entry point return value xcmds xfcns could called like regular message function handlers hypertalk scripts also able send messages back hypercard application enterprising xcmd authors added advanced features like full color support colorizehc hypertint addcolor multiple special-purpose windows prompt tabloid textoid listoid showdialog megawindows drag drop support various hardware interfaces language various scripting languages taken cues hypertalk commonly regrouped loosely defined family named xtalk well second-level clones like many method names first popularized hypertalk made later languages codice_57 event handler javascript although asymetrix toolbook often also considered hypercard clone scripting language apparently bears little resemblance hypertalk clones dialects commonly referred moniker xtalk-languages added various features language expected modern programming language like exception handling user-defined object properties timers multi-threading even user-defined objects
[ 6507, 2451, 4755, 1815, 3772, 6172, 381, 6002, 4869, 6994, 1378, 405, 7277, 4252, 5948, 1964, 6392, 3412, 961, 6407, 1803, 3503 ]
Test
3,170
4
M86_Security:m86 security m86 security privately owned internet threat protection company specialized web email security products content filtering appliances company international headquarters located basingstoke development centers located california israel new zealand founded 1995 company changed name 8e6 technologies 2000 co-founder ceo ten years george shih developed many technologies used 8e6 internet filtering products originally effort provide “ pornography-free internet use children ” company offered filtering software computers used education environments later 8e6 technologies developed products manage internet access markets company internet filtering reporting monitoring appliances named “ best buy ” sc magazine 2007 2008 november 2008 8e6 technologies marshal limited provider email web security products merged became marshal8e6 george shih remained interim ceo former finjan ceo john vigouroux named position april 2009 november 2008 8e6 technologies company sold web filtering products marshal software provider integrated email web security products merged form marshal8e6 march 2009 marshal8e6 acquired avinti along behavior-based malware technology detecting blended threats occur email upon completion merger avinti ceo william kilmer joined marshal8e6 chief marketing officer part rebranding campaign marshal8e6 changed name m86 security september 2009 following november m86 security acquired finjan software along secure web gateway formerly finjan vital security product licenses patents real-time code analysis technology giving company malware detection prevention capabilities web gateway company previously announced john vigouroux ceo finjan software new ceo m86 security marshal trace labs finjan malicious code research center combined form m86 security labs researches reports web email-based security threats august 2010 m86 ranked number 1,230 inc. 5000 annual listing fastest private growing companies america march 6 2012 announced chicago based trustwave holdings would acquire m86 security march 19 2012 trustwave completed acquisition m86 security subsequently rebranded products operations trustwave name
[ 429, 2789, 1632, 3338, 7506 ]
Test
3,171
4
R-U-Dead-Yet:r-u-dead-yet r.u.d.y. short r u dead yet acronym used describe denial service dos tool used hackers perform slow-rate a.k.a “ low slow ” attacks directing long form fields targeted server known interactive console thus making user-friendly tool opens fewer connections website targeted long period keeps sessions open long feasible amount open sessions overtires server website making unavailable authentic visitors data sent small packs incredibly slow rate normally gap ten seconds byte intervals definite may vary avert detection victim servers types attacks may face issues able access particular website disrupt connection drastically slow network performance etc hackers use attacks different purposes targeting different servers hosts purposes include limited blackmail vengeance sometimes even activism rudy attack opens concurrent post http connections http server delays sending body post request point server resources saturated attack sends numerous small packets slow rate keep connection open server busy low-and slow attack behavior makes relatively difficult detect compared flooding dos attacks raise traffic volume abnormally
[ 1954, 6459, 1691, 4716 ]
Test
3,172
7
Client_(computing):client computing client computer program part operation relies sending request another program computer hardware software accesses service made available server may may located another computer example web browsers clients connect web servers retrieve web pages display email clients retrieve email mail servers online chat uses variety clients vary depending chat protocol used multiplayer video games online video games may run client computer term client may also applied computers devices run client software users use client software client part client–server model still used today clients servers may computer programs run machine connect via inter-process communication techniques combined internet sockets programs may connect service operating possibly remote system internet protocol suite servers wait potential clients initiate connections may accept term first applied devices capable running stand-alone programs could interact remote computers via network computer terminals clients time-sharing mainframe computer one classification client computers devices either thick clients thin clients hybrid clients thick client also known rich client fat client client performs bulk data processing operations necessarily rely server personal computer common example fat client relatively large set features capabilities light reliance upon server example computer running art program krita sketchup ultimately shares result work network thick client computer runs almost entirely standalone machine save send receive files via network standard called workstation thin client minimal sort client thin clients use resources host computer thin client generally presents processed data provided application server performs bulk required data processing device using web application office web apps thin client hybrid client mixture two client models similar fat client processes locally relies server storing persistent data approach offers features fat client multimedia support high performance thin client high manageability flexibility device running online version video game diablo iii example hybrid client
[ 3603, 374, 3945, 2192, 3618, 6090, 382, 2924, 6102, 393, 3646, 44, 5414, 3655, 2597, 4352, 4357, 6135, 7214, 6499, 3338, 4014, 84, 1513, 1152, 2984, 1912, 4757, 5808, 6878, 4759, 7975, 4045, 7638, 1554, 1559, 6908, 1194, 2664, 499, 3031...
Train
3,173
3
Advanced_Synchronization_Facility:advanced synchronization facility advanced synchronization facility asf proposed extension x86-64 instruction set architecture adds hardware transactional memory support introduced amd latest specification dated march 2009. still proposal stage released microprocessors implement extension asf provides capability start end abort transactional execution mark cache lines protected memory access transactional code regions contains four new instructions—codice_1 codice_2 codice_3 codice_4—and turns otherwise invalid codice_5-prefixed codice_6 codice_7 codice_8 instructions valid ones inside transactional code regions 256 levels nested transactional code regions supported codice_1 codice_2 instructions mark start end transactional code region inside transactional code regions codice_5-prefixed codice_12 codice_7 codice_8 instructions mark four cache lines protected memory access accesses processor cores protected cache lines result exceptions turn cause transaction aborts stores protected cache lines must performed using codice_15 instructions marked cache lines released protection codice_4 instruction transaction aborts generated hardware explicitly requested codice_3 instruction rolls back modifications protected cache lines restarts execution instruction following top-level codice_1 instruction
[ 2000, 4845, 2989, 4224, 6523, 6616, 1465, 5665, 5934, 742, 5669, 5670, 584, 5055, 6647, 2226, 1770, 2498, 4077, 6563, 5165, 3139, 6133, 2332, 1881, 5431, 3747, 6675, 6236, 7499, 352, 971, 6956, 3248 ]
Train
3,174
3
Linux-libre:linux-libre linux-libre operating system kernel gnu package gnu project attempts keep linux-libre synchronization upstream development linux kernel removing software include source code source code obfuscated released proprietary license software components available source code called binary blobs mostly used proprietary firmware images linux kernel generally redistributable binary blobs give user freedom audit modify consequently redistribute modified versions linux kernel started include binary blobs 1996 work clear binary blobs began 2006 gnewsense find-firmware gen-kernel work taken blag linux distribution 2007 deblob linux-libre born linux-libre first released free software foundation latin america fsfla endorsed free software foundation fsf valuable component totally free linux distributions became gnu package march 2012 alexandre oliva project maintainer removal process achieved using script called deblob-main script inspired one used gnewsense jeff moe made subsequent modifications meet certain requirements use blag linux gnu distribution another script called deblob-check used check kernel source file patch compressed sources file still contains software suspected proprietary aside primary intended effect running system free software practical consequences removing device firmware user allowed study modify positive negative effects advantages include removal device firmware audited bugs security problems malicious operations backdoors fixed linux kernel maintainers even know possible entire system compromised malicious firmware without ability perform security audit manufacturer-provided firmware even innocent bug could undermine safety running system downside removing proprietary firmware kernel cause loss functionality certain hardware free software replacement available affects certain sound video tv tuner network especially wireless cards well devices possible free software replacement firmware provided substitute openfwwf b43 carl9170 ath9k_htc wireless card drivers source code precompiled packages deblobbed linux kernel available directly distributions use linux-libre scripts freed-ora subproject prepares maintains rpm packages based fedora also precompiled packages debian derived distributions ubuntu distros n't use packaged linux-libre instead completely deblob proprietary linux kernel tools make linux-libre source compiled resulting free linux kernel used default systems distributions linux default kernel used propose linux-libre alternative kernel
[ 1807, 707, 3256, 2182, 3938, 3613, 6422, 4675, 7528, 3271, 7532, 2559, 1434, 1100, 5744, 6443, 2942, 5055, 5757, 4341, 3981, 6117, 7555, 7559, 5762, 412, 415, 761, 2240, 2599, 7581, 3666, 74, 7587, 2970, 5787, 7954, 4020, 7956, 1523, 54...
Test
3,175
4
Smurf_attack:smurf attack smurf attack distributed denial-of-service attack large numbers internet control message protocol icmp packets intended victim spoofed source ip broadcast computer network using ip broadcast address devices network default respond sending reply source ip address number machines network receive respond packets large victim computer flooded traffic slow victim computer point becomes impossible work original smurf.c written dan moschuk aka tfreak late 1990s many ip networks would participate smurf attacks prompted would respond icmp requests sent broadcast addresses name comes idea small numerous attackers overwhelming much larger opponent see smurfs today administrators make network immune abuse therefore networks remain vulnerable smurf attacks fix two-fold another proposed solution network ingress filtering rejects attacking packets basis forged source address example configuring router forward packets broadcast addresses cisco router smurf amplifier computer network lends used smurf attack smurf amplifiers act worsen severity smurf attack configured way generate large number icmp replies victim spoofed source ip address fraggle attack variation smurf attack attacker sends large amount udp traffic ports 7 echo 19 chargen ip broadcast address intended victim spoofed source ip address works similarly smurf attack many computers network respond traffic sending traffic back spoofed source ip victim flooding traffic source code attack also released tfreak
[ 4665, 3775, 651, 1372, 4783, 1567, 4716, 1690, 1691, 6062, 1612 ]
Test
3,176
4
Gordon–Loeb_model:gordon–loeb model gordon–loeb /ˈgȯr-dən ˈlōb/ model mathematical economic model analyzing optimal investment level information security investing protect company data involves cost unlike investments usually generate profit however serve prevent additional costs thus important compare expensive protect specific set data potential loss case said data stolen lost damaged corrupted draft model company must possess knowledge three parameters much data worth much data risk probability attack data going successful last parameter gordon loeb defined vulnerability product said parameters provides medium money loss security investment model gather amount money company spends protecting information cases small fraction predicted loss example expected value loss following security breach specifically model shows generally inconvenient invest informatics security including cybersecurity computer security related activities amounts higher 37 predicted loss gordon–loeb model also shows specific level potential loss amount resources invest order protect information set always increase increase vulnerability said set thus companies enjoy greater economic returns investing cyber/information security activities aimed increase security data sets medium level vulnerability words investment safeguarding company data reduces vulnerability decreasing incremental returns example suppose estimated data value 1.000.000 euros attack probability 15 80 chance attack would successful case potential loss given product 1.000.000 euros x 0.15 x 0.8 120.000 euros according gordon loeb company investment security exceed 120.000 euros x 0.37 44.000 euros gordon–loeb model first published lawrence a. gordon martin p. loeb 2002 paper acm transactions information system security entitled economics information security investment paper reprinted 2004 book economics information security gordon loeb professors university maryland robert h. smith school business gordon–loeb model one well accepted analytical models economics cyber/information security literature model widely referenced academic practitioner literature model also empirically tested several different settings research mathematicians marc lelarge yuliy baryshnikov generalized results gordon–loeb model gordon–loeb model featured popular press wall street journal financial times
[ 1805, 3932 ]
Test
3,177
4
HTTP_Flood:http flood http flood type distributed denial service ddos attack attacker manipulates http post unwanted requests order attack web server application attacks often use interconnected computers taken aid malware trojan horses instead using malformed packets spoofing reflection techniques http floods require less bandwidth attack targeted sites servers http flood http clients web browser interact application server send http requests request either “ get ” “ post ” aim attack compel server allocate many resources possible serving attack thus denying legitimate users access server resources get request used retrieve static content like images typically induces relatively low load server per request post requests likely require server perform kind processing looking items database therefore http post flood attacks typically impose higher load server per request http flood attacks use standard url requests hence quite challenging differentiate valid traffic one effective mitigation methods combination traffic profiling methods mainly includes identification ip reputation tracking abnormal actions employing progressive sanctuary challenges
[ 4109 ]
Test
3,178
2
FFADO:ffado free firewire audio drivers ffado project provide open-source drivers firewire sound interfaces linux project began freebob driver specifically firewire audio devices based technology made bridgeco use interface named bebob current version allows devices accessed via jack audio connection kit jack following presentation paper 2007 linux audio conference outlining future project march 26 2007 announced project would renamed ffado drivers rewritten include support firewire audio chipsets
[ 2060, 5571, 578 ]
Test
3,179
4
Computer_Online_Forensic_Evidence_Extractor:computer online forensic evidence extractor computer online forensic evidence extractor cofee tool kit developed microsoft help computer forensic investigators extract evidence windows computer installed usb flash drive external disk drive acts automated forensic tool live analysis microsoft provides cofee devices online technical support free law enforcement agencies cofee developed anthony fung former hong kong police officer works senior investigator microsoft internet safety enforcement team fung conceived device following discussions 2006 law enforcement technology conference sponsored microsoft device used 2,000 officers least 15 countries case cited microsoft april 2008 credits cofee crucial new zealand investigation trafficking child pornography producing evidence led arrest april 2009 microsoft interpol signed agreement interpol would serve principal international distributor cofee university college dublin center cyber crime investigations conjunction interpol develops programs training forensic experts using cofee national white collar crime center licensed microsoft sole us domestic distributor cofee november 6 2009 copies microsoft cofee leaked onto various torrent websites analysis leaked tool indicates largely wrapper around utilities previously available investigators microsoft confirmed leak however spokesperson firm said anticipate possible availability cofee cybercriminals download find ways ‘ build around significant concern device activated plugged usb port contains 150 tools graphical user interface help investigators collect data software reported made three sections first cofee configured advance investigator selecting data wish export saved usb device plugging target computer interface generates reports collected data estimates cited microsoft state jobs previously took 3–4 hours done cofee little 20 minutes cofee includes tools password decryption internet history recovery data extraction also recovers data stored volatile memory could lost computer shut mid late 2009 tool named detect eliminate computer acquired forensics decaf announced uninvolved group programmers tool would reportedly protect computers cofee render tool ineffective alleged would provide real-time monitoring cofee signatures usb devices running applications cofee signature detected decaf performs numerous user-defined processes included cofee log clearing ejecting usb devices contamination spoofing mac addresses december 18 2009 decaf creators announced tool hoax part stunt raise awareness security need better forensic tools
[ 1715, 5561, 6528, 3700, 7825, 1380, 6020, 1756, 4523, 3823, 5254, 4187, 6488, 5181 ]
Test
3,180
3
Windows_Server_2016:windows server 2016 windows server 2016 server operating system developed microsoft part windows nt family operating systems developed concurrently windows 10 first early preview version technical preview became available october 1 2014 together first technical preview system center windows server 2016 released september 26 2016 microsoft ignite conference became generally available october 12 2016 two successors windows server 2019 windows server semi-annual channel excludes graphical user interface many older components windows server 2016 variety new features including microsoft announced new installation option nano server offers minimal-footprint headless version windows server excludes graphical user interface wow64 support 32-bit software windows installer support console login either locally via remote desktop connection management performed remotely via windows management instrumentation wmi windows powershell remote server management tools collection web-based gui command line tools however technical preview 5 microsoft re-added ability administer nano server locally powershell according microsoft engineer jeffrey snover nano server 93 lower vhd size 92 fewer critical security advisories 80 fewer reboots windows server nano server available microsoft software assurance customers cloud computing platforms microsoft azure amazon web services starting new feature release windows server version 1709 nano server installed inside container host microsoft reorganized satya nadella putting server system center teams together previously server team closely aligned windows client team azure team also working closely server team march 2017 microsoft demonstrated internal version server 2016 running armv8-a architecture reported microsoft working qualcomm centriq cavium thunderx2 chips according james vincent verge decision endangers intel dominance server cpu market however later inquiry microsoft revealed version windows server internal use impacts subscribers microsoft azure service public beta version windows server 2016 still called vnext branded windows server technical preview released october 1 2014 technical preview builds aimed toward enterprise users first technical preview first set expire april 15 2015 microsoft later released tool extend expiry date last second tech preview os may 2015 second beta version technical preview 2 released may 4 2015 third preview version technical preview 3 released august 19 2015 technical preview 4 released november 19 2015 technical preview 5 released april 27 2016 windows server 2016 insider preview build 16237 released windows insiders july 13 2017 windows server 2016 officially released microsoft ignite conference september 26 2016 unlike predecessor windows server 2016 licensed number cpu cores rather number cpu sockets—a change similarly adopted biztalk server 2013 sql server 2014 new licensing structure adopted windows server 2016 also moved away windows server 2012/2012r2 cpu socket licensing model amount cores covered one license limited windows server 2016 standard datacenter core licensing covers minimum 8 core licenses physical processor minimum 16 core licenses server core licenses sold packs two standard edition providing familiar rights run 2 virtualized os environments server goes 16 core licenses 2 processor server additional licenses required windows server 2016 windows server 2016 technical preview released october 1 2014 first beta version operating system made publicly available version number 6.4.9841 windows server 2016 technical preview 2 made available may 4 2015 version number 10.0.10074 similar jump significant part version number 6 10 seen windows 10 highlights version include third technical preview windows server 2016 made available august 19 2015 version number 10.0.10514 highlights version include fourth technical preview operating system made available november 19 2015 one year one month initial technical preview version number 10.0.10586 highlights include last technical preview windows server 2016 made available april 27 2016 version number 10.0.14300 highlights include windows server 2016 released manufacturing september 26 2016 bearing version number 10.0.14393 windows 10 anniversary update microsoft added following final touches windows server version 1709 based windows 10 fall creators update released october 17 2017 release dropped windows server 2016 name called windows server microsoft offered microsoft software assurance customers active windows server 2016 license system requirements first windows server product fall semi-annual channel sac release cadence product features server core nano server modes two server core mode os installed bare system nano server mode available operating system container windows server version 1803 based windows 10 april 2018 update second semi-annual channel release windows server also final version branched server 2016 codebase next release shares version number 1809 windows server 2019
[ 4293, 4295, 4670, 4687, 1097, 5064, 6136, 1882, 5781, 7217, 5442, 4377, 5794, 444, 447, 448, 1522, 6874, 458, 4759, 7616, 1534, 1536, 1925, 6526, 6558, 7660, 1970, 2329, 3048, 6572, 6575, 3057, 2341, 6580, 866, 2701, 7685, 3751, 3074, 6...
Train
3,181
6
Ext2Fsd:ext2fsd ext2fsd short ext2 file system driver free installable file system driver written c microsoft windows operating system family facilitates read write access ext2 ext3 ext4 file systems driver installed windows 2000 windows xp windows server 2003 windows vista windows 7 windows 8 windows 10 windows server 2008 windows server 2008 r2 support windows nt dropped version 0.30 program ext2mgr optionally installed additionally manage drive letters april 2019 main web site ext2fsd.com gone dark german computer magazine pc-welt reported frequent program crashes 2009 program able access ext3 partitions smoothly often led blue screen crashes type lead data loss example yet permanently stored data main memory program could access ext2 partitions without errors 2012 computerwoche warned access ext3 partitions harmless data loss may occur warning issued release version 0.69 n't use ext2fsd 0.68 earlier versions latest ubuntu debian systems ext2fsd 0.68 process ext4 64-bit mode enabled could corrupt data sorry disaster issue 'm working improvement unclear whether v0.69 corrects deficiency
[ 4494, 2885, 5783, 4759, 5571, 6256, 2728, 1281, 174, 6500, 7827, 1435 ]
Test
3,182
3
Qualcomm_Centriq:qualcomm centriq centriq brand system chip soc semiconductor products designed marketed qualcomm data centers centriq central processing unit cpu uses arm risc instruction set multiple cpu cores single chip november 2014 qualcomm announced developing arm armv8-a microarchitecture based cpu purpose-built data centers december 2016 company announced demonstrated first multi-core cpus based custom arm armv8-a microarchitecture first centriq 2400 series products made available server manufacturers november 2017 first products qualcomm introduced falkor armv8-a microarchitecture chip 48 qualcomm custom designed falkor cores 2.6ghz six-channel ddr4 memory 60 mb l3 cache number reviews noted release centriq expected face significant competition established x86-64 data-center cpu manufacturers intel amd arm microarchitecture server products cavium thunderx2 addition competitive pressures noted running established workloads arm microarchitectures requires re-optimizing recompiling software x86-64 emulation presenting barrier entry potential customers
[ 6082, 6421, 7890, 722, 2926, 5740, 5750, 5752, 5405, 5406, 1864, 67, 446, 451, 6874, 6165, 463, 804, 5472, 469, 4041, 3008, 3365, 6910, 7654, 6919, 1592, 1977, 2339, 1237, 2711, 550, 3786, 5576, 7364, 1284, 4879, 7376, 5585, 4537, 950, ...
Test
3,183
0
North_American_Chapter_of_the_Association_for_Computational_Linguistics:north american chapter association computational linguistics north american chapter association computational linguistics naacl provides regional focus members association computational linguistics acl north america well central south america organizes annual conferences promotes cooperation information exchange among related scientific professional societies encourages facilitates acl membership people institutions americas provides source information regional activities acl executive committee naacl hosts annual professional conference north american city alternating years acl holds annual conference elsewhere current officers naacl include owen rambow chair lillian lee secretary christopher manning treasurer graeme hirst past chair
[ 5429, 1314, 5388, 7372 ]
Validation
3,184
7
WEB2GRID:web2grid web2grid project aims support web 2.0 communities dynamically building necessary infrastructure needed processing high-end tasks community way content generated joint effort members web2grid technology enables community build required infrastructure joint community effort exploiting volunteer computing resources community members order achieve goal web2grid exploits sztaki desktop grid boinc 3g bridge technologies developed eu fp7 edges enabling desktop grids e-science eu fp7 edgi european desktop grid initiative projects project started 2009 technically coordinated prof. peter kacsuk head laboratory parallel distributed systems lpds mta-sztaki hungary web2 technologies assist assure resources desktop grid community voluntary settlement bases developed platform extended desktop grid systems offers back-end infrastructure operational requirements web2 portals systems combining web2 desktop grid technologies web2 extend capabilities community contents towards shared services help grid technologies project aims develop tools interfaces methodologies above-mentioned targeted services established closed local desktop grid open global desktop grid environments three main blocks project grid web2 connections two technologies last decades grid systems offered large-scale distributed computing storage services mainly academic university research area focus shifting towards services knowledge sharing extension application domain standardized access methods eliminating system heterogeneity grid point view project relies results eu fp7 supported edges enabling desktop grids e-science infrastructure project desktop grids system often based community offerings similar web2 content building solution edges project important grid/web2 integration web2grid project also extends edges technologies towards direction commercial grids web2 services owner server provides service framework real content shared maintained users generally due large number connections users web2 systems handle heavy data traffic complex relations may needs large computational power many cases web2 side numerous application topics large capacity solved grid technologies connection web2 grid realized well defined low-level application development interface api high-level graphical application development solutions project partners web2 applications come various fields justifies need development multi-level interfaces project benefits numerous eu fp6 eu fp7 project achievements connecting web2 communities grid technologies project aims achieve various social economical goals including following partners participate project
[ 4226, 5870 ]
Train