node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
3,285 | 0 | Audio_mining:audio mining audio mining technique content audio signal automatically analysed searched commonly used field automatic speech recognition analysis tries identify speech within audio audio typically processed speech recognition system order identify word phoneme units likely occur spoken content information may either used immediately pre-defined searches keywords phrases real-time word spotting system output speech recogniser may stored index file one audio mining index files loaded later date order run searches keywords phrases results search normally terms hits regions within files good matches chosen keywords user may able listen audio corresponding hits order verify correct match found audio mining systems used field speech recognition often divided two groups use large vocabulary continuous speech recognisers lvcsr use phonetic recognition musical audio mining also known music information retrieval relates identification perceptually important characteristics piece music melodic harmonic rhythmic structure searches carried find pieces music similar terms melodic harmonic and/or rhythmic characteristics | [
1314,
7372
] | Validation |
3,286 | 2 | Wii_Freeloader:wii freeloader wii freeloader bootdisc developed datel circumvent regional lockout wii video game console allows playing games regions allow use dvd±r commonly used backups copies homebrew used combination modchip allow compatibility games use update blocker user enters bootdisc wii system launches application wii menu replaces disc region-locked game disc disc allows user play foreign gamecube games issues reported different signals games simply working foreign system even use wii freeloader wii games one version game disc siliconera reported north american version video game played japanese wii using wii freeloader switch play japanese version game system | [
728,
4815
] | Test |
3,287 | 4 | Default_password:default password device needs username and/or password log default password usually provided allows device accessed initial setup resetting factory defaults manufacturers equipment typically use simple password admin password equipment ship expectation users change password configuration default username password usually found instruction manual common devices device default passwords one major contributing factors large-scale compromises home routers leaving password devices available public huge security risk devices wireless routers come unique default router username passwords printed sticker secure option common default password vendors however derive password device mac address using known algorithm case password also easily reproduced attackers access internet connected devices network user must know default ip address manufacturers typically use codice_1 also codice_2 default router ip address however variations similarly login details leaving unchanged lead security issues | [
74,
3088,
5181
] | Validation |
3,288 | 7 | Nsite_Software:nsite software nsite a.k.a nsite.com nsite software platform service company based bay area specializing sales force enhancements although several pre-built applications offered platform promising part nsite ability customer use product develop application using simple internet-based interface since 2006 part sap business objects company claimed 27,000 customers worldwide acquired sap business objects november 2006 flagship product subscription-based nsite platform components provide quote proposal order management custom development platform ajax front-end ms-sql back-end paul tabet co-founded nsite 1998 together others chief executive officer 2002 2002 alf goebel announced ceo two years later bob jandro announced new ceo nsite grew 27,000 customers height success started downward spiral shortly sap business objects acquisition finally met end 2010 announced retirement | [
2414
] | Validation |
3,289 | 9 | GrGen:grgen grgen.net software development tool offers programming languages domain specific languages optimized processing graph structured data core languages consists modular graph rewrite rules built declarative graph pattern matching rewriting supplemented many constructs used imperative object-oriented programming completed language devices known database query languages graph rewrite generator compiles languages efficient cli assemblies via c -code intermediate step integrated via api code written .net-language grgen executed windows linux mono needed open source available lgpl v3 rapid prototyping debugging interactive shell vcg- graph viewer included package languages visual stepwise debugging grgen allows one develop natural level abstraction graph-based representations employed engineering model transformation computational linguistics compiler construction intermediate representation grgen increases productivity kinds tasks far beyond achieved programming traditional programming language due many implemented performance optimizations still allows one achieve high-performance solutions authors claim system offers highest combined speed development execution available algorithmic processing graph-based representations based performance regarding diverse tasks posed different editions transformation tool contest /grabats example containing graph model rule specifications grgen.net-solution antworld-case posed grabats 08 graph model rewrite rules | [
1361,
6507,
1314,
3915,
4759,
5571,
7474,
578,
684,
5116
] | Validation |
3,290 | 2 | Internet_Server_Application_Programming_Interface:internet server application programming interface internet server application programming interface isapi n-tier api internet information services iis microsoft collection windows-based web server services prominent application iis isapi microsoft web server isapi also implemented apache mod_isapi module server-side web applications written microsoft iis used apache third-party web servers like zeus web server offer isapi interfaces microsoft web server application software called internet information services made number sub-applications configurable asp.net one slice iis allowing programmer write web applications choice programming language vb.net c f supported microsoft .net clr isapi much lower-level programming system giving much better performance expense simplicity isapi consists two components extensions filters two types applications developed using isapi filters extensions must compiled dll files registered iis run web server isapi applications written using language allows export standard c functions instance c c++ delphi couple libraries available help ease development isapi applications delphi pascal intraweb components web-application development mfc includes classes developing isapi applications additionally atl server technology includes c++ library dedicated developing isapi applications isapi extensions true applications run iis access functionality provided iis isapi extensions implemented dlls loaded process controlled iis clients access isapi extensions way access static html page certain file extensions complete folder site mapped handled isapi extension isapi filters used modify enhance functionality provided iis always run iis server filter every request find one need process filters programmed examine modify incoming outgoing streams data internally programmed externally configured priorities determine order filters called filters implemented dlls registered iis server site level global level i.e. apply sites iis server filters initialised worker process started listens requests site installed common tasks performed isapi filters include list common isapi applications implemented isapi extensions isapi applications developed using development tool generate windows dll wizards generating isapi framework applications available microsoft development tools since visual c++ 4.0 | [
5983,
4759,
5820,
7438,
6986,
6991,
1277,
3543,
5310,
3383,
6029,
8006,
3135,
3900,
4082,
4445,
5432,
6059,
6858,
4017,
87,
6787
] | Test |
3,291 | 5 | Galeon:galeon galeon discontinued gecko-based web browser created marco pesenti gritti goal delivering consistent browsing experience gnome desktop environment gained popularity early 2000s due speed flexibility configuration features disagreement future galeon split development team 2002 resulted departure browser initial author several developers event marked beginning browser popularity decline led discontinuation september 2008 galeon features subsequently ported epiphany called web – descendant galeon galeon made use gecko features including configuration options standards support apart galeon several features uncommon browsers time project started marco pesenti gritti goal creating web browser would fast consistent gnome desktop environment first public version galeon 0.6 released june 2000 first releases galeon criticised lack basic features cookie proxy support though browser added features every release version 1.2 galeon introduced many new features drew attention general public time galeon creation popular linux browsers including netscape mozilla large multi-functional programs made slow start often impractical due high memory usage processor requirements opera somewhat faster proprietary software distributed trialware adware versions lacked functionality microsoft windows version galeon widely seen one best linux browsers available polls revealed substantial usage share galeon though popularity regarded owing lack stability evident mozilla browsers release new version gtk+ widget toolkit used construct user interface galeon team decided write new version galeon scratch time gnome project adopted new human interface guidelines promoted simplicity uniform design galeon team differing opinions new guidelines author lead developer marco pesenti gritti endorsed saw rewrite opportunity make galeon simpler many developers believed reducing number preferences simplifying user interface would harm project november 2002 result several discussions topic gritti made decision cease work galeon fork project started development hig-compliant web browser called epiphany known web gritti longer controlled development galeon previous functionality restored subsequent releases new features added though development got slow split time rising popularity firefox status default browser major distribution overwhelming number extensions led decline galeon user base eventually galeon developers announced plans halt development galeon saying current approach unsustainable regarding resources required maintain instead planned develop set extensions epiphany provide similar functionality even development ceased september 2008 browser remained popular december 2011 still available linux distribution repositories debian 6 squeeze although part debian 7 wheezy galeon praised customizability speed compared netscape navigator firefox though konqueror opera still faster older hardware galeon noted session handling crash recovery november 2002 osnews conducted poll determine popular gecko-based browser included several browsers microsoft windows mac os x linux n't include netscape navigator mozilla suite linux-only galeon second popular cross-platform firefox time known phoenix critics noted galeon tricky plugin installation | [
4655,
6802,
5378,
2205,
7537,
6809,
393,
2574,
2577,
6452,
4352,
4725,
1136,
6858,
2261,
84,
445,
1152,
1525,
4759,
7628,
5821,
5127,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
3060,
3412,
5887,
6966,
5542,
2379,
1276,
5571,
5... | Test |
3,292 | 0 | Sentence_extraction:sentence extraction sentence extraction technique used automatic summarization text shallow approach statistical heuristics used identify salient sentences text sentence extraction low-cost approach compared knowledge-intensive deeper approaches require additional knowledge bases ontologies linguistic knowledge short sentence extraction works filter allows important sentences pass major downside applying sentence-extraction techniques task summarization loss coherence resulting summary nevertheless sentence extraction summaries give valuable clues main points document frequently sufficiently intelligible human readers usually combination heuristics used determine important sentences within document heuristic assigns positive negative score sentence heuristics applied highest-scoring sentences included summary individual heuristics weighted according importance seminal papers laid foundations many techniques used today published hans peter luhn 1958 h. p edmundson 1969 luhn proposed assign weight sentences beginning document paragraph edmundson stressed importance title-words summarization first employ stop-lists order filter uninformative words low semantic content e.g grammatical words also distinguished bonus words stigma words i.e words probably occur together important e.g word form significant unimportant information idea using key-words i.e words occur significantly frequently document still one core heuristics today summarizers large linguistic corpora available today tf–idf value originated information retrieval successfully applied identify key words text example word cat occurs significantly often text summarized tf term frequency corpus idf means inverse document frequency corpus meant document cat likely important word text text may fact text cats | [
3601,
1718,
1444,
4760,
8065,
715,
5304,
2215,
1751,
7372,
4337,
3651,
4349,
4089,
5429,
5528,
5612,
7138,
5885,
5008
] | Test |
3,293 | 2 | Generic_Security_Services_Application_Program_Interface:generic security services application program interface generic security service application program interface gssapi also gss-api application programming interface programs access security services gssapi ietf standard addresses problem many similar incompatible security services use today gssapi provide security instead security-service vendors provide gssapi implementations usually form libraries installed security software libraries present gssapi-compatible interface application writers write application use vendor-independent gssapi security implementation ever needs replacing application need rewritten definitive feature gssapi applications exchange opaque messages tokens hide implementation detail higher-level application client server sides application written convey tokens given respective gssapi implementations gssapi tokens usually travel insecure network mechanisms provide inherent message security exchange number tokens gssapi implementations ends inform local application security context established security context established sensitive application messages wrapped encrypted gssapi secure communication client server typical protections guaranteed gssapi wrapping include confidentiality secrecy integrity authenticity gssapi also provide local guarantees identity remote user remote host gssapi describes 45 procedure calls significant ones include gssapi standardized c rfc 2744 language java implements gssapi jgss java generic security services application program interface limitations gssapi include standardizes authentication authorization assumes client–server architecture anticipating new security mechanisms gssapi includes negotiating pseudo mechanism spnego discover use new mechanisms present original application built dominant gssapi mechanism implementation use kerberos unlike gssapi kerberos api standardized various existing implementations use incompatible apis gssapi allows kerberos implementations api compatible | [
3,
2993,
1460,
6717,
1464,
7088,
3794,
664,
5149,
4261,
5956,
6045,
1593,
7214,
1418,
699,
1989,
1435,
7230
] | Train |
3,294 | 3 | SPARC_T4:sparc t4 sparc t4 sparc multicore microprocessor introduced 2011 oracle corporation processor designed offer high multithreaded performance 8 threads per core 8 cores per chip well high single threaded performance chip chip 4th generation processor t-series family sun microsystems brought first t-series processor ultrasparc t1 market 2005 chip first sun/oracle sparc chip use dynamic threading out-of-order execution incorporates one floating point unit one dedicated cryptographic unit per core cores use 64-bit sparc version 9 architecture running frequencies 2.85 ghz 3.0 ghz built 40 nm process die size eight core eight thread per core chip built 40 nm process running 2.5 ghz described sun microsystems processor roadmap 2009 codenamed yosemite falls given expected release date late 2011 processor expected introduce new microarchitecture codenamed vt core online technology website register speculated chip would named t4 successor sparc t3 yosemite falls cpu product remained oracle corporation processor roadmap company took sun early 2010 december 2010 t4 processor confirmed oracle vp hardware development designed improved per-thread performance eight cores expected release within one year processor design presented 2011 hot chips conference cores renamed s3 vt included dual-issue 16 stage integer pipeline 11-cycle floating point pipeline giving improvements previous s2 core used sparc t3 processor core associated 16 kb data 16 kb instruction l1 caches unified 128 kb l2 cache eight cores share 4 mb l3 cache total transistor count approximately 855 million design first sun/oracle sparc processor out-of-order execution first processor sparc t-series family include ability issue one instruction per cycle core execution units t4 processor officially introduced part oracle sparc t4 servers september 2011 initial product releases single processor t4-1 rack server ran 2.85 ghz dual processor t4-2 ran 2.85 ghz frequency quad processor t4-4 server ran 3.0 ghz sparc s3 core also include thread priority mechanism called dynamic threading whereby thread allocated resources based need giving increased performance s3 core resources shared among active threads 8 shared resources include branch prediction structures various buffer entries out-of-order execution resources static resource allocation reserves resources threads based policy whether thread use dynamic threading allocates resources threads ready use thus improving performance cryptographic performance also increased t3 chip design improvements including new set cryptographic instructions ultrasparc t2 t3 per-core cryptographic coprocessors replaced in-core accelerators instruction-based cryptography implementation designed achieve wire speed encryption decryption sparc t4 10-gbit/s ethernet ports architectural changes claimed deliver 5x improvement single thread integer performance twice per-thread throughput performance compared previous generation t3 published specjvm2008 result 16-core t4-2 454 ops/m 321 ops/m 32-core t3-2 ratio 2.8x performance per core | [
3761,
6329,
1254,
4847,
1258,
2992,
1263,
5737,
1185,
1937,
7639,
2299,
4418,
7453,
3026,
4515,
4967,
6647,
2765,
418,
515,
1590,
8138,
7499,
1237,
8145,
441,
971,
6956
] | Test |
3,295 | 2 | Benoit_Schillings:benoit schillings benoit schillings belgian software engineer distinguished engineer google x leading early projects x known one lead developers operating system beos noted amateur astronomer schillings association inc. began 1990 developer software apple macintosh visited apple expo paris met jean-louis gassée gassée left apple computer found asked schillings become second engineer would work operating system new computer called bebox schillings accepted offer starting march 1991 developed file system known old file system ofs associated user-space database application called zookeeper indexed metadata file system file system fast efficient later replaced dominic giampaolo file system schillings also developed graphics system beos known app server well programming frameworks interface kit application kit used software developers write software operating system joining trolltech october 2005 schillings worked distinguished engineer cto openwave mike reed led team developed version 7 openwave phone suite mobile phone applications benoit also ran android ios mobile teams yahoo 2013 2017 | [] | Validation |
3,296 | 3 | Dragon_MSX:dragon msx dragon msx msx 1 home computer designed radofin creators mattel aquarius dragon data well known dragon 64 home computer clone trs-80 color computer rare prototypes ever built | [
1052,
5571,
1237,
974
] | Test |
3,297 | 9 | Anthony_James_Barr:anthony james barr anthony james barr born september 24 1940 aka tony barr jim barr american programming language designer software engineer inventor among notable contributions statistical analysis system sas automated lumber yield optimization automated classification medical entities acme widely used internationally science government industry academia sas system founded barr 1966 september 1966 athens georgia presented conceptual ideas sas members committee statistical software university statisticians southern experiment stations usses barr earlier created analysis-of-variance modeling language inspired notation statistician maurice kendall developed assembly language ibm 1410 graduate student north carolina state university 1962 1963 dr. a. grandage author ibm 650 analysis-of-variance programs advised statistical computations followed multiple regression program flexible input format algebraic transformation variables 1963 1964 drawing programs along experience structured data files created sas placing statistical procedures formatted file framework barr experience structured data files gained working formatted file system see 1966 1968 barr developed fundamental structure language sas 1968 barr began collaboration others barr designed implemented programming language data management report writing systems areas evolving system 1976 sas institute inc. incorporated anthony j. barr james h. goodnight john p. sall jane t. helwig barr holding largest share 40 sold shares 1979 barr created acme program national center health statistics 1967 1969 acme computer program assigns one underlying cause death based multiple causes death listed death certificate acme conjunction components comprise mortality medical data system mmds system used uniformly determine underlying cause death death certificates united states acme become de facto international standard automated selection underlying cause death components mmds variations used many nations around world system provides essential data used calculating mortality statistics 1971 1972 barr along partner sandy mullin designed patented built first computerized equipment optimize usage lumber furniture industry device read marked flaws board calculated cross rip cuts required optimal board usage marked cut lines board 1973 barr-mullin inc. incorporated lumber yield optimization technology remains widely used american wood industry 1968 barr created first non-ibm linking loader ibm/360 named ldr loader sponsored american data processing inc. raleigh north carolina barr loader cut typical program testing times twenty-five percent ibm offer equivalent loader eighteen months barr loader commercially available 1971 barr created first non-ibm hasp terminal emulator marketed university computing company ucc hasp emulator gave significant performance increase ibm 2780 emulator developed ucc 1969 emulators developed pdp-8 minicomputer allowed cope terminals communicate ibm/360 ibm/370 1971 barr also implemented hasp workstation computer industries orange california implemented data general nova minicomputer program became singer corporation remote batch terminal singer ucc sold terminal divisions harris corporation continued market products 1983 barr developed hardware software performing hasp remote job entry communication ibm pc company barr systems inc. marketed sold barr hasp went implement support bisync sna sdlc workstations gateways along data communications output management products barr employed ibm federal systems division pentagon washington d.c. 1964 1966 worked nips formatted file system ffs generalized data base management system retrieval report writing one first data management systems take advantage defined file structure data storage retrieval efficiency assigned work national military command center information processing branch joint chiefs staff barr rewrote enhanced ffs implementing three five major components retrieval sorting file update work featured innovation uniform lexical analyzer languages system uniform method handling error messages working ffs introduced barr potential defined file structure become central concept sas barr born new york city grew summit new jersey graduated summit high school 1958 | [
3209,
7858,
5590,
4580,
1879,
336
] | Validation |
3,298 | 2 | Memory_pool:memory pool memory pools also called fixed-size blocks allocation use pools memory management allows dynamic memory allocation comparable malloc c++ operator new implementations suffer fragmentation variable block sizes recommendable use real time system due performance efficient solution preallocating number memory blocks size called memory pool application allocate access free blocks represented handles run time many real-time operating systems use memory pools transaction processing facility systems like web server nginx use term memory pool refer group variable-size allocations later deallocated also known region see region-based memory management simple memory pool module allocate example three pools compile time block sizes optimized application deploying module application allocate access free memory following interface benefits drawbacks | [
4269,
7605,
2291,
771,
1208,
3566,
6982
] | Test |
3,299 | 2 | TempleOS:templeos templeos formerly j operating system sparrowos losethos biblical-themed lightweight operating system designed third temple prophesied bible created american programmer terry a. davis developed alone course decade series episodes later described revelation god system characterized modern x86-64 commodore 64 using interface similar mixture dos turbo c. davis proclaimed system features 640x480 resolution 16-color display single audio voice explicitly instructed god programmed original variation c named holyc place basic included original flight simulator compiler kernel templeos released 2013 last updated 2017 received largely favorable reviews tech communities davis amassed small online following died august 11 2018 terry a. davis 1969–2018 began experiencing regular manic episodes 1996 leading numerous stays mental hospitals initially diagnosed bipolar disorder later declared schizophrenic remained unemployed rest life suffered delusions space aliens government agents left briefly hospitalized mental health issues experiencing self-described revelation proclaimed direct communication god god told operating system god third temple davis began developing templeos circa 2003 one early names j operating system renaming losethos reference scene 1986 film platoon 2008 davis wrote losethos primarily making video games networking internet support far 'm concerned would reinventing wheel another name used sparrowos settling templeos mid-2013 website announced god temple finished god kills cia spreads davis died hit train august 11 2018 templeos 64-bit non-preemptive multi-tasking multi-cored public domain open source ring-0-only single address space non-networked pc operating system recreational programming os runs 8-bit ascii graphics source code 2d 3d graphics library run 640x480 vga 16 colors like modern operating systems keyboard mouse support supports iso 9660 fat32 redsea file systems last created davis support file compression according davis many specifications—such 640x480 resolution 16-color display single audio voice—were instructed god explained limited resolution make easier children draw illustrations god operating system includes original flight simulator compiler kernel one bundled program egypt game player travels burning bush use high-speed stopwatch stopwatch meant act oracle generates pseudo-random text something davis likened ouija board glossolalia example generated text follows templeos written programming language developed davis c c++ called holyc holyc variation c developed davis programming language templeos used interact shell write execute entire applications shell ide comes templeos supports several features embedding images code uses non-standard text format known doldoc support hypertext links images 3d meshes embedded otherwise regular ascii files file spinning 3d model tank comment source code code jit-compiled davis ultimately wrote 100,000 lines code os templeos received mostly favorable reviews tech journalist david cassel opined partly programming websites tried find necessary patience understanding accommodate davis techrepublic osnews published positive articles davis work even though davis banned latter hostile comments targeting readers staff review techrepublic james sanders concluded templeos testament dedication passion one man displaying technological prowess n't need anything osnews editor kroc kamen wrote os shows computing still hobby everybody serious days want code os uses interpretive dance input method allowed companies like apple damned 2017 os shown part outsider art exhibition bourogne france davis death osnews editor thom holwerda wrote davis clearly gifted programmer – writing entire operating system small feat – sad see affected mental illness one fan described davis programming legend another computer engineer compared development templeos one-man-built skyscraper engineer previously spoken davis length believed davis could steve jobs steve wozniak illness added actually boggles mind one man wrote hard lay person understand phenomenal achievement write entire operating system alone another computer engineer said templeos contained innovations developer accomplished particularly runs certain part computer processor maintain extremely quick speed | [
1361,
6002,
1522,
7581,
1599,
5571,
3751,
7453,
1435,
4882
] | Test |
3,300 | 9 | Frank_Pfenning:frank pfenning frank pfenning professor computer science adjunct professor department philosophy head computer science department carnegie mellon university received ph.d. carnegie mellon university department mathematics 1987 dissertation entitled proof transformations higher-order logic student peter b. andrews research includes work area programming languages logic type theory logical frameworks automated deduction trustworthy computing one principal authors twelf system also developed carnegie mellon introductory imperative programming course undergraduates c0 programming language used course 2015 named fellow association computing machinery contributions logical foundations automatic theorem proving types programming languages competitive squash player ranked top five university squash ladder | [
3895,
3659,
4240
] | Test |
3,301 | 5 | MC-LAG:mc-lag mc-lag multi-chassis link aggregation group type link aggregation group lag constituent ports terminate separate chassis primarily purpose providing redundancy event one chassis fails ieee 802.1ax-2008 industry standard link aggregation mention mc-lag preclude implementation varies vendor notably protocol existing chassis proprietary 2012 ieee created standardized alternative mc-lag ieee 802.1aq shortest path bridging lag link aggregation group method inverse multiplexing multiple ethernet links thereby increasing bandwidth providing redundancy defined ieee 802.1ax-2008 standard states link aggregation allows one links aggregated together form link aggregation group mac client treat link aggregation group single link layer 2 transparency achieved lag using single mac address device ’ ports lag group lag configured either static dynamic dynamic lag uses peer-to-peer protocol control called link aggregation control protocol lacp lacp protocol also defined within 802.1ax-2008 standard lag implemented two ways lag n lag n+n lag n load sharing mode lag lag n+n provides worker standby flavour lag n protocol automatically distributes load balances traffic across working links within lag thus maximising use group ethernet links go come back providing improved resilience throughput different style resilience 2 nodes complete implementation lacp protocol supports separate worker/standby lag subgroups lag n+n worker links group fail standby links one links worker group fail note lacp marks links standby mode using sync flag mc-lag adds node-level redundancy normal link-level redundancy lag provides allows two nodes share common lag endpoint multiple nodes present single logical lag remote end note mc-lag implementations vendor-specific cooperating chassis remain externally compliant ieee 802.1ax-2008 standard nodes mc-lag cluster communicate synchronize negotiate automatic switchovers failover implementations may support administrator-initiated manual switchovers diagram shows four configurations ha configuration superior spanning tree load shared across links normal operation whereas spanning tree must disable links prevent loops following table lists known vendor implementations mc-lag proprietary | [
1527,
4926,
5181
] | Test |
3,302 | 4 | Kasidet_POS_RAM_Scraper_Malware:kasidet pos ram scraper malware kasidet pos malware variant point sale pos malware performs ddos attacks using namecoin dot-bit service scrape payment card details also known trojan.mwzlesson neutrino found september 2015 cyber security experts combination backdoor.neutrino.50 pos malware kasidet pos worm gets system along malware gets downloaded unknowingly user visits malicious websites malware different pos malware scrapes data advanced features first scrapes pos ram steals payment card details scraped information sent cyber criminal intercepted get post requests browser difficult detect bot using security programs sometimes detectable email spam campaigns exploit kits scraping capability kasidet enhanced cyber criminals hides c c server namecoin dns service dot-bit | [
7194,
1691,
4256,
4440
] | Test |
3,303 | 9 | GW-BASIC:gw-basic gw-basic dialect basic programming language developed microsoft basica originally compaq otherwise identical microsoft/ibm basica fully self-contained executable need rom basic bundled ms-dos operating systems ibm pc compatibles microsoft microsoft also sold basic compiler bascom compatible gw-basic programs needing speed language suitable simple games business programs like since included versions ms-dos also low-cost way many aspiring programmers learn fundamentals computer programming release ms-dos 5.0 gw-basic place eventually taken qbasic interpreter part separately available quickbasic compiler ibm basica gw-basic largely ports mbasic version 5.x added features specifically ibm pc hardware common features basic-80 5.x basica/gw-basic include ability crunch program lines omitting spaces common feature earlier microsoft basic implementations removed basic-80 5.x basica/gwbasic basic-80 programs using peek/poke statements would run gw-basic basica added large number features ibm pc sound graphics memory commands features present basic-80 included ability execute rnd function parameters ability also save programs protected format preventing listed basica also allowed double-precision numbers used mathematical trigonometric functions cos sin atn n't allowed 8-bit versions basic feature normally enabled required optional parameter /d startup i.e codice_1 basic memory footprint slightly increased used microsoft offer generic version ms-dos v3.20 1986 variants operating system oem versions depending oem basic distributed either basica.exe gwbasic.exe former confused ibm basica always came .com file variants basic extra features support particular machine example tandy versions dos included special gw-basic supported enhanced sound graphics capabilities initial version gw-basic one included compaq dos 1.13 released compaq portable 1983 analogous ibm basica 1.10 used cp/m-derived file control blocks disk access support subdirectories later versions added feature improved graphics capabilities gw-basic 3.20 1986 added ega graphics support version basica gw-basic vga support effect last new version released superseded qbasic buyers hercules graphics cards received special version gw-basic card utility disk called hbasic added support 720×348 monochrome graphics versions basica/gw-basic support hercules graphics could display graphics card use third-party cga emulation simcga gw-basic command line-based integrated development environment ide based dartmouth basic using cursor movement keys line displayed screen edited also includes function key shortcuts bottom screen like early microcomputer versions basic gw-basic lacked many structures needed structured programming local variables gw-basic programs executed relatively slowly interpreted language program lines must numbered non-numbered lines considered commands direct mode executed immediately program source files normally saved binary compressed format tokens replacing keywords option save ascii text form gw-basic command-line environment commands codice_2 current program quit operating codice_3 commands also used program statements little support structured programming gw-basic codice_4 conditional statements must written one line although codice_5 statements may group multiple lines functions defined using single line codice_6 statement e.g. codice_7 data type variables specified character end variable name codice_8 string characters codice_9 integer etc groups variables also set default types based initial letter name use codice_10 etc. statements default type undeclared variables identified typing statements single-precision floating point 32-bit mbf gw-basic allowed use joystick light pen input devices gw-basic read write files com ports also event trapping ports since cassette port interface original ibm pc never implemented compatibles cassette operations supported gw-basic play simple music using codice_11 statement needing string notes represented music macro language e.g. codice_12 low-level control possible codice_13 statement takes arguments frequency hertz length clock ticks standard internal pc speaker ibm machines consequently sound limited single channel beeps whistles befits 'business machine home-based pcs like tandy 1000 allowed three channels sound codice_13 codice_11 commands several theories initials gw stand greg whitten early microsoft employee developed standards company basic compiler line says bill gates picked name gw-basic whitten refers gee-whiz basic unsure gates named program microsoft user manual microsoft press also refers name may also nicknamed gee-whiz large number graphics commands common theories initials origins include graphics windows gates william microsoft president time gates-whitten two main designers program | [
3931,
5367,
12,
3275,
2925,
7906,
4697,
2941,
53,
61,
425,
4003,
5784,
1508,
4012,
4745,
1524,
7619,
7621,
7971,
2283,
6891,
5129,
5137,
2341,
5877,
4843,
1255,
3772,
7715,
4139,
8085,
2023,
5926,
5571,
8094,
5234,
941,
1304,
1684,
2085... | Test |
3,304 | 3 | GT_Racing_Cockpit:gt racing cockpit gt racing cockpit see trademark symbols difference name line gran turismo official video game racing cockpits designed sparco logitech a.k.a logicool japan collaboration polyphony digital official kits co-designed released japan logicool sparco distributed import tuner endless north america compatible kits designed released worldwide european manufacturers playseats movetech fia homologated driving simulation cockpit line sku lpsk standing logicool playstation sparco kit official kits logicool auto part maker sparco joint designed sparco racing cockpit/seat official wheels gt force wheels although gt force wheels supported professional oriented playseats compatible kits line playseats based upon different design e.g g25 racing wheel playseats kit includes parts named gearshift holder seat slider sparco racing cockpit official kit original gt force gran turismo 3 a-spec released japan 2001 kits two parts named steering pod bucket chair official product steering pod features sparco gran turismo double name emblem plate sparco speed seat gt logos official kit gt force pro gran turismo 5 prologue sparco racing cockpit pro fighter model released december 22 2003 japan first kit one features emblem plate logos racing cockpit pro kits specially designed gt force pro wheel compatible models including prior gt force wheels updated version gt force pro gran turismo 4 kit released june 10 2004 japan kit replaces fighter seat gran turismo custom sparco speed seat evolution speed bucket seat still features official sparco gran turismo plate logos released june 2005 endless sku north american licensed version racing cockpit pro hence srcp sparco racing cockpit pro seat kit frame e.g steering floor mat steering pod official sparco gran turismo plate available though sparco sprint bucket seat north american version lpsk-02002 though replaces fighter bucket seat similar sparco model called sprint although sparco gran turismo plate included sparco seat regular one gt logo larger individuals version type 1 simultaneously released north american market version called sparco siena reclinable seat type 2 replaces regular bucket seat larger retractable model called siena srcp-001 kit sparco seat gt custom | [
4011,
3704,
1379
] | Train |
3,305 | 0 | Hindi-to-Punjabi_Machine_Translation_System:hindi-to-punjabi machine translation system hindi punjabi machine translation system developed punjabi university patiala gurpreet singh lehal dr. vishal goyal aimed translate hindi text punjabi text based direct approach includes preprocessing text normalization replacing collocations replacing proper nouns translation engine identifying surnames identifying titles lexicon lookup word-sense disambiguation inflection analysis transliteration post processing module system available online | [
5008
] | Test |
3,306 | 3 | Acorn_Network_Computer:acorn network computer acorn network computer network computer type thin client designed manufactured acorn computers ltd implementation network computer reference profile oracle corporation commissioned acorn specify network computers detail history see acorn network computer sophie wilson acorn led effort launched august 1996 ncos operating system used first implementation based risc os ran arm hardware manufacturing obligations achieved contract fujitsu subsidiary d2d 1997 acorn offered designs cost licensees netstation available two versions one modem home use via television version ethernet card use businesses schools vga monitors on-site bsd unix fileserver based riscbsd early arm port netbsd versions upgradable modem ethernet cards replaceable podules acorn-format eurocards home version trialled 1997/98 conjunction bt used supported pal ntsc svga displays identical specifications used strongarm sa-110 200mhz processor arm7500-based desklite launched 1998 acorn continued produce arm-based designs demonstrating first strongarm prototype may 1996 6 months later evolved concord launched late 1997 designs included set-top box nc second generation network computer operating system longer based risc os instead consisted netbsd 1.2.1 code later ncs produced based intel pentium architecture netstation planned ship smart card enable internet banking | [
768,
2630,
6378,
7588,
5571,
1237,
7311,
7364,
1284,
3758
] | Validation |
3,307 | 1 | Borland_Database_Engine:borland database engine borland database engine bde windows-based core database engine connectivity software behind borland delphi c++builder intrabuilder paradox windows visual dbase windows borland ’ turbo pascal database toolbox add-on beginning borland compiler add-ons facilitated database connectivity came paradox engine windows – pxengwin – could compiled program facilitate connectivity paradox tables first dll-based connectivity engine odapi open database api represented borland ’ attempt centralise connectivity suite applications included brand-new paradox windows 4 quattro version 4.5 5.0 paradox windows database engine crystallised idapi 2000 borland introduced new sql driver architecture called dbexpress deprecated bde sql links technology 2014 embarcadero removed bde installer rad studio xe7 install making separate download order strengthen message bde deprecated number years programmers using bde encouraged update software use newer database connectivity technologies like embarcadero firedac third party provided solutions included set database drivers enables consistent access standard data sources paradox dbase foxpro access text databases add microsoft odbc drivers needed built-in odbc socket optionally borland sql links product provides access range database management systems dbms including informix db2 interbase oracle sybase bde object-oriented design runtime application developers interact bde creating various bde objects runtime objects used manipulate database entities tables queries bde application program interface api provides direct c c++ optimized access database engine well bde built-in drivers dbase paradox foxpro access text databases core database engine files consist set dlls fully re-entrant thread-safe included bde set supplemental tools examples sample code bde system configured using bde administrator bdeadmin.exe included bde borland local sql subset ansi-92 sql enhanced support paradox dbase standard naming conventions tables fields called columns sql local sql lets use sql query local standard database tables reside database server well remote dbms servers local sql also essential make multi-table queries across local standard tables remote sql servers older name bde api integrated database application program interface idapi | [
4798,
5252,
4759,
3238,
7618,
3244,
1435
] | Test |
3,308 | 3 | R800_(CPU):r800 cpu r800 central processing unit used msx turbo-r home computer r800 designed ascii corporation japan built mitsui co. ltd.. goals fastest cpu possible maintaining compatibility old msx zilog z80-based hardware software order preserve software compatibility old msx software r800 uses superset z80 instruction set addition z80 opcodes two multiplication instructions added mulub 8-bit muluw 16-bit also many undocumented z80 instructions made official including opcodes dealing ix iy 8-bit registers ixh ixl iyh iyl r800 based directly z80 stems z800 family lacks undocumented z80 features instance undocumented flags represented bits 3 5 f register n't assume values z80 causing fail zexall tests undocumented opcode often called sll alias sla instruction hardware side radical changes made internal 4-bit alu z80 replaced new 16-bit alu opcodes like add hl bc previously took 11 clock cycles run fast one bus cycle conditions maximum cpu clock speed also increased 14.32 mhz—four times fast original 3.57 mhz z80 used msx bus clock increased 7.16 mhz data bus remained 8-bit maintain compatibility old hardware additional changes made way cpu fetches opcodes original z80 uses 4 cycles fetch simple instruction like additional waitstate issued msx architecture review z80 fetch mechanism typical msx environment needed understand r800 since implementations msx use ram memory disposed 256×256 bytes block two cycles required set address fetch r800 avoids remembering last known state higher 8-bits next instruction 256-byte boundaries higher 8-bits set cycle saved however z80 refresh cycles destroy information higher bits workaround needed solution used r800 refresh entire blocks ram instead refreshing one line ram instruction issued 30μs cpu halted 4μs time used refresh block ram since refresh fetch instructions waitstate removed due faster ram chips simple instructions issued using one cycle cycle would cycle 2 z80 example cycle 1 becomes optional issued program crosses 256-byte boundary applies fast ram used msx turbor external hardware connected cartridge slots uses timings similar z80 even internal rom turbor fast enough fetch scheme additional chips turbor mirror contents rom ram order make run faster | [
4023,
4212,
3605,
1817,
1237,
3156,
263
] | Train |
3,309 | 7 | Chromebit:chromebit chromebit dongle running google chrome os operating system placed hdmi port television monitor device turns display personal computer chromebit allows adding keyboard mouse bluetooth wi-fi device announced april 2015 began shipping november chromebit turns display hdmi port desktop variant chromebook laptop runs google chrome os operating system chrome os primarily supports single application web browser thereby relying heavily internet connection software functionality data storage chromebits superficial resemblance chromecast another google device whereas chromecast designed display video still images television large-screen display chromebit self-contained personal computer device compete intel compute stick offers similar plug-in functionality using two operating systems windows 8.1 ubuntu internally first chromebit resembles standard chromebook laptop device features 802.11ac wi-fi bluetooth 4.0 well usb 2.0 port one end end swivels enabling fit variety hdmi slots google announced chromebit march 31 2015 google asus began shipping first model november | [
2902,
5372,
6427,
6806,
3627,
2212,
2569,
7924,
2591,
5064,
5775,
2961,
6153,
1514,
5455,
2988,
7613,
4762,
7967,
6176,
5476,
831,
5135,
5141,
3028,
136,
2317,
2673,
842,
7285,
2683,
855,
6937,
2700,
168,
6950,
5534,
2712,
5889,
4116,
1... | Validation |
3,310 | 2 | List_of_Android_launchers:list android launchers list android launchers presents main view device responsible starting apps hosting live widgets 51 lyse kim 8 march 2019 go launcher popular android launcher retrieved original 28 february 2019 | [
3933,
5372,
6427,
1095,
5386,
740,
4340,
42,
2591,
5771,
5775,
7956,
5473,
474,
6183,
822,
136,
6209,
6937,
6232,
4116,
5195,
2003,
195,
6978,
7346,
561,
201,
2017,
5919,
7357,
2398,
7001,
2037,
2756,
7007,
7749,
2417,
2054,
2788,
3507,... | Test |
3,311 | 6 | ZFS+:zfs+ zfs+ combined file system logical volume manager software subsystem initially released common development distribution license cddl based zfs originally developed sun microsystems proprietary data deduplication features added greenbytes subsequently made proprietary storage system product greenbytes originally owned trademark zfs+ confused zfs trademark currently held oracle corporation greenbytes owned oracle greenbytes created storage appliance called cypress nas filer originally based upon sun microsystems x86-64-based sun fire x4500 platform bundled zfs+ implementation value-add technology greenbytes claimed zfs+ technology could reduce storage power consumption 50 2009 greenbytes relaunched technology new name gbfs greenbytes file system | [
3134,
6505
] | Validation |
3,312 | 5 | Internet_Control_Message_Protocol_for_IPv6:internet control message protocol ipv6 internet control message protocol version 6 icmpv6 implementation internet control message protocol icmp internet protocol version 6 ipv6 icmpv6 defined rfc 4443 icmpv6 integral part ipv6 performs error reporting diagnostic functions e.g. ping framework extensions implement future changes several extensions published defining new icmpv6 message types well new options existing icmpv6 message types neighbor discovery protocol ndp node discovery protocol ipv6 replaces enhances functions arp secure neighbor discovery send extension ndp extra security multicast listener discovery mld used ipv6 routers discovering multicast listeners directly attached link much like internet group management protocol igmp used ipv4 multicast router discovery mrd allows discovery multicast routers icmpv6 messages may classified error messages information messages icmpv6 messages transported ipv6 packets ipv6 next header value icmpv6 set value 58 icmpv6 message consists header protocol payload header contains three fields type 8 bits code 8 bits checksum 16 bits type specifies type message values range 0 127 high-order bit 0 indicate error message values range 128 255 high-order bit 1 indicate information message code field value depends message type provides additional level message granularity checksum field provides minimal level integrity verification icmp message control messages identified value type field code field gives additional context information message messages serve purpose correspondingly named icmp message types note table comprehensive current complete list assigned icmpv6 types found link iana icmpv6 parameters icmpv6 provides minimal level message integrity verification inclusion 16-bit checksum header checksum calculated starting pseudo-header ipv6 header fields according ipv6 standard consists source destination addresses packet length next header field latter set value 58 following pseudo header checksum continued icmpv6 message checksum computation performed according internet protocol standards using 16-bit ones complement summation followed final ones complement checksum inserting checksum field note differs way calculated ipv4 icmp similar calculation done tcp icmpv6 node receives packet must undertake actions depend type message icmpv6 protocol must limit number error messages sent destination avoid network overloading example node continues forward erroneous packets icmp signal error first packet periodically fixed minimum period fixed network maximum load icmp error message must never sent response another icmp error message | [
7148,
709,
4676,
4677,
7170,
4683,
6432,
1462,
5039,
6446,
2219,
3640,
4709,
4710,
7214,
7217,
2612,
3337,
1900,
456,
5456,
6879,
2281,
6521,
106,
2644,
6531,
2650,
121,
7637,
4414,
6908,
3379,
5492,
3383,
494,
7297,
5169,
2335,
1984,
5... | Test |
3,313 | 3 | Arkanoid:arkanoid player controls vaus space vessel acts game paddle prevents ball falling playing field attempting bounce number bricks ball striking brick causes brick disappear bricks gone player goes next level another pattern bricks appears number variations bricks hit multiple times flying enemy ships etc power-up capsules enhance vaus expand vaus multiply number balls equip laser cannon break directly next level etc gameplay remains final stage 33 versions 36 nes player takes game boss doh head resembling moai point reached player longer option continue running lives making segment difficult game regardless outcome japan gave silver award one four best games 1986 along taito bubble bobble sega fantasy zone tecmo rygar europe reviewed clare edgeley december 1986 issue computer video games compared pong space invaders simplicity addictiveness described arkanoid lovely game fast colourful simple addictive concluded great little game also commercially successful arcades game appeared number-three euromax nationwide uk arcade chart 1987 capcom 1942 number-one westone wonder boy number-two home versions also well received computer gaming world stated 1988 arkanoid amiga perfect version arcade game ... incredible named nes version best arcade translation console year praising graphics play mechanics game reviewed 1989 dragon 144 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars compute named game list nine great games 1989 describing hypnotic addictive fascinating along breakout magazine noted arkanoid also elements pong space invaders well pac-man use power-ups arkanoid ported zx spectrum amstrad cpc commodore 64 bbc micro msx atari 8-bit family apple ii nes amiga atari st apple ii ibm pc macintosh version released 1987 port released tandy color computer 3 1989 computer conversions published imagine nes port packaged custom controller arkanoid followed number direct indirect sequels tournament arkanoid released 1987 exclusively united states romstar unlike original game developed taito america rather taito japan mission-pack sequel true sequel since exact gameplay original arkanoid levels different. arkanoid 2 released arcades 1987 unlike tournament arkanoid revenge doh true sequel game featuring new gameplay mechanics. arkanoid returns published 1997 followed arkanoid ds 2007 xbox 360 version arkanoid titled arkanoid live released may 6 2009 xbox live arcade wiiware version arkanoid titled arkanoid plus released japan may 26 2009 pal regions august 21 2009 north america september 28 2009 version arkanoid iphone released worldwide august 31 2009 mashup arkanoid vs. space invaders released 2017 ios android arkanoid world-record score belongs zack hample known snagged 10,000 baseballs major league baseball games | [
6788,
6072,
6789,
5924,
7104,
6380,
8015,
2148,
7854,
5526,
1508,
1237,
2892
] | Test |
3,314 | 5 | G.hn:g.hn g.hn specification home networking data rates 2 gbit/s operation four types legacy wires telephone wiring coaxial cables power lines plastic optical fiber single g.hn semiconductor device able network supported home wire types benefits multi-wire standard lower equipment development costs lower deployment costs service providers allowing customer self-install g.hn developed international telecommunication union telecommunication standardization sector itu-t promoted homegrid forum several organizations itu-t recommendation itu term standard g.9960 received approval october 9 2009 specified physical layers architecture g.hn data link layer recommendation g.9961 approved june 11 2010 key promoters cepca homepna upa creators two interfaces united behind latest version standard february 2009 itu-t extended technology multiple input multiple output mimo technology increase data rates signaling distance new feature approved march 2012 g.9963 recommendation amendments main g.9960/g.9961 added new functionalities base standard g.hn specifies single physical layer based fast fourier transform fft orthogonal frequency-division multiplexing ofdm modulation low-density parity-check code ldpc forward error correction fec code g.hn includes capability notch specific frequency bands avoid interference amateur radio bands licensed radio services g.hn includes mechanisms avoid interference legacy home networking technologies also wireline systems vdsl2 types dsl used access home ofdm systems split transmitted signal multiple orthogonal sub-carriers g.hn one sub-carriers modulated using qam maximum qam constellation supported g.hn 4096-qam 12-bit qam g.hn media access control based time division multiple access tdma architecture domain master schedules transmission opportunities txops used one devices domain two types txops although elements g.hn common three media supported standard power lines phone lines coaxial cable g.hn includes media-specific optimizations media media-specific parameters include g.hn uses advanced encryption standard aes encryption algorithm 128-bit key length using ccmp protocol ensure confidentiality message integrity authentication key exchange done following itu-t recommendation x.1035 g.hn specifies point-to-point security inside domain means pair transmitter receiver uses unique encryption key shared devices domain example node alice sends data node bob node eve domain alice bob able easily eavesdrop communication g.hn supports concept relays one device receive message one node deliver another node farther away domain relaying becomes critical applications complex network topologies need cover large distances found industrial utility applications relay read source target addresses read message content due body end-to-end-encrypted g.hn architecture includes concept profiles profiles intended address g.hn nodes significantly different levels complexity g.hn higher complexity profiles proper supersets lower complexity profiles devices based different profiles interoperate examples g.hn devices based high complexity profiles residential gateways set-top boxes examples g.hn devices based low complexity profiles home automation home security smart grid devices g.hn spectrum depends medium shown diagram g.hn specifies physical layer data link layer according osi model pmd sub-layer sub-layer g.hn stack medium dependent i.e. parameters may different values media power lines phone lines coaxial cable rest sub-layers apc llc mac pcs pma medium independent interface application entity data link layer called a-interface interface data link layer physical layer called medium independent interface mii interface physical layer actual transmission medium called medium dependent interface mdi recommendation g.9960 granted approval october 2009 study group 15 plenary meeting recommendation g.9961 received approval june 11 2010 meeting concerns regulatory conformance raised amendment g.hn standard proposed eliminated passband 100 mhz 200 mhz reduced baseband operational spectrum 100 mhz 80 mhz changes included amendment included reduction transmit power meet regulatory complaints raised meeting june 2011 joint forum held itu-t itu-r organizations recognized itu-t g.hn considered electromagnetic compatibility emc mitigation techniques go well beyond considered essential protecting radio services non-itu compliant home network equipment may cause problems october 2010 sigma designs announced first g.hn-compliant chipset called cg5110 january 2011 lantiq introduced family g.hn-compliant chips called hnx176 hnx156 june 2011 four silicon vendors lantiq marvell semiconductor metanoia sigma designs announced participation open interoperability plugfest geneva hosted homegrid forum broadband forum itu homegrid forum showcased world first live public demonstration g.hn interoperability ces january 10–13 2012 homegrid forum members lantiq marvell metanoia sigma designs joined together highlight real-world g.hn capabilities january 2012 tangotec ltd. announced fully compliant itu-t g.hn chipset family available 2012 tangotec demonstrated g.hn capabilities three media ces 2012 december 2012 marvell homegrid forum announced marvell g.hn silicon passed compliance tests first compliance certified g.hn silicon first certified g.hn silicon interop testing remains homegrid forum non-profit trade group promoting g.hn homegrid forum provides technical marketing efforts addresses certification interoperability g.hn-compliant products cooperates complementary industry alliances homegrid forum members include actiontec electronics inc. allion test labs inc. arris bc institute technology best buy british telecom bt chunghwa telecom comtrend corporation holland electronics llc institute information industry iii korea electrotechnology research institute keri korea polytechnic university kpu kwangwoon university lan s.a.r.l marvell metanoia communications inc. mitrastar sigma designs teleconnect gmbh telefónica university british columbia trac global xingtera inc vendors promoting g.hn include maxlinear lantiq devolo ag microprocessor manufacturer intel system-on-a-chip vendor sigma designs xingtera announced product january 2013 first live public demonstration g.hn interoperability shown ces january 10–13 2012 lantiq marvell technology group metanoia sigma designs february 26 2009 part homepna press release makes use wireline home networking part u-verse iptv service expressed support work developed itu-t creating standards home networking including g.hn service providers like promoted g.hn service providers contributors work itu-t study group include british telecom telefónica april 2008 first announcement homegrid forum echostar manufacturer set-top boxes service provider market expressed support unified standard march 2009 best buy largest retailer consumer electronics united states joined board directors homegrid forum expressed support g.hn panasonic one largest manufacturers consumer electronics also contributor member homegrid forum 2008 several marketing firms promoted g.hn made optimistic predictions february 25 2009 three home networking organizations promoted previously incompatible technologies cepca homepna universal powerline association announced agreed work homegrid forum promote g.hn single next-generation standard wired home networking work ensure coexistence existing products market october 2008 continental automated buildings association caba homegrid forum signed liaison agreement support homegrid forum efforts conjunction itu-t g.hn make easy consumers connect devices enjoy innovative applications using existing home wiring july 2009 homegrid forum dlna signed liaison agreement setting stage collaboration two organizations approval g.hn dlna-recognized physical layer technology june 2010 broadband forum homegrid forum signed agreement deliver compliance interoperability testing program products using g.hn technology broadband forum support homegrid forum validation g.hn products promotion product conformance interoperability help expedite total time market homegrid forum certified products may 2011 organizations jointly announced first open g.hn plugfest itu g.9970 also known g.hnta recommendation developed itu-t describes generic architecture home networks interfaces operators broadband access networks itu g.9972 also known g.cx recommendation developed itu-t specifies coexistence mechanism home networking transceivers capable operating power line wiring coexistence mechanism would allow g.hn devices implement g.9972 coexist devices implementing g.9972 operating power line wiring itu g.9991 also known g.vlc recommendation developed itu-t specifies phy dll high speed indoor visible light communication transceivers used applications li-fi g.vlc reuses phy dll g.hn enabling chips used applications major motivation wired home networking technologies iptv especially offered service provider part triple play service voice data service offering u-verse smart grid applications like home automation demand side management also targeted g.hn-compliant devices implement low-complexity profiles many customers homes residential gateway provides internet access located close iptv set-top box scenario becomes common service providers start offer service packages multiple set-top boxes per subscriber g.hn connect residential gateway one set-top boxes using existing home wiring using g.hn iptv service providers need install new ethernet wires 802.11 wireless networks g.hn supports kind home wiring end users might install iptv home network thus reducing cost service provider although wi-fi technology popular consumer home networks g.hn also intended use application g.hn adequate solution consumers situations using wireless needed example connect stationary device like tv network-attached storage device desired due security concerns feasible example due limited range wireless signals consumer electronics ce products support internet connectivity using technologies wi-fi bluetooth ethernet many products traditionally associated computer use tvs hi-fi equipment provide options connect internet computer using home network provide access digital content g.hn intended provide high-speed connectivity ce products capable displaying high definition television integrating power connection data connection provides potential energy savings ce devices given ce devices home theater receivers often run standby vampire power represent major savings homeowners power connection also data connection device could reliably turned displaying source g.hn operate wires including ac dc power lines provide communication infrastructure required smart grid applications comprehensive smart grid system requires reaching every ac outlet home building devices participate energy conserving strategies september 2009 us national institute standards technology included g.hn one standards smart grid believed strong stakeholder consensus part early draft nist framework roadmap smart grid interoperability standards january 2010 g.hn removed final version standards identified implementation broad concept smart grid includes applications overlapping scopes demand side management energy conservation measures advanced metering infrastructure ami home networks g.hn supports popular protocols like ipv4 ipv6 g.hn-based networks easily integrated ip-based networks well-known network management protocols like simple network management protocol snmp manage ip networks including g.hn devices | [
7876,
6871,
1068,
4667,
1540,
1543,
7169,
6987,
2566,
7824,
3794,
5492,
2219,
1952,
7916,
3892,
3314,
3819,
5693,
768,
5175,
4101,
5181,
3597,
1709
] | Test |
3,315 | 5 | TCP_window_scale_option:tcp window scale option tcp window scale option option increase receive window size allowed transmission control protocol former maximum value 65,535 bytes tcp option along several others defined ietf rfc 1323 deals long fat networks lfns throughput communication limited two windows congestion window receive window congestion window tries exceed capacity network congestion control receive window tries exceed capacity receiver process data flow control receiver may overwhelmed data example busy web server tcp segment contains current value receive window example sender receives ack acknowledges byte 4000 specifies receive window 10000 bytes sender send packets byte 14000 even congestion window allows tcp window scale option needed efficient transfer data bandwidth-delay product bdp greater 64k instance t1 transmission line 1.5 mbit/second used satellite link 513 millisecond round trip time rtt bandwidth-delay product formula_1 bits 96,187 bytes using maximum buffer size 64 kib allows buffer filled 65,535 96,187 68 theoretical maximum speed 1.5 mbits/second 1.02 mbit/s example receive window formula_2 bytes receive window 2 bytes tcp header window scale factor options tcp 3 calculation follows formula_3 bytes essence formula_4 shifting 3 bits left note options field window scale factor sent syn packet also value window scale factor go 255 formula_5 byte maximum allowed 14 reason maximum value 14 formula_6 increases beyond surpass sequence sequence 4 bytes formula_7 size window ca n't go beyond maximum value sequence using window scale option receive window size may increased maximum value 1,073,725,440 bytes done specifying one byte shift count header options field true receive window size left shifted value shift count maximum value 14 may used shift count value would allow single tcp connection transfer data example satellite link 1.5 mbit/second utilizing available bandwidth essentially one full transmission window transferred within one round-trip time period window scale option enables single tcp connection fully utilize lfn bdp 1 gb e.g 10 gbit/s link round-trip time 800 ms. firewalls properly implement tcp window scaling cause user internet connection malfunction intermittently minutes appear start working reason also issue firewall n't support tcp extensions tcp window scaling implemented windows since windows 2000 enabled default windows vista server 2008 newer turned manually required windows vista windows 7 fixed default tcp receive buffer 64 kb scaling 16 mb autotuning limiting manual tcp tuning long fat networks linux kernels 2.6.8 august 2004 enabled tcp window scaling default configuration parameters found /proc filesystem see pseudo-file companions information section sysctl scaling turned issuing command root maintain changes restart include line systemd 207 default setting freebsd openbsd netbsd mac os x window scaling features related rfc 1323 enabled verify status user check value variable via sysctl command value 1 output means scaling enabled 0 means disabled enabled turned issuing command setting lost across system restart ensure set boot time add following line /etc/sysctl.conf codice_1 | [
5714,
7054,
1068,
7637,
4759,
3462
] | Train |
3,316 | 3 | Brian_Jacks_Superstar_Challenge:brian jacks superstar challenge brian jacks superstar challenge 1985 sports simulation game released various home computers martech licensed british sportsman brian jacks released systems including commodore 64 bbc micro acorn electron electron user praised superb graphics variety found different games | [] | Test |
3,317 | 4 | WhiteSource:whitesource whitesource open source security license compliance management platform founded 2011 ron rymon azi cohen rami sass company founded three co-founders sold previous company eurekify ca technologies due diligence process co-founders experienced first hand challenge generating accurate open source inventory report company launched open source license management platform software discovers open source components customers ’ apps alerts vulnerable code added software projects used threats pop affect existing software main investors company include susquehanna growth equity 83north microsoft ventures david strohm israeli innovation authority company raised 46 million 2018 whitesource bolt launched 2016 | [] | Validation |
3,318 | 9 | OpenWebGlobe:openwebglobe openwebglobe project technology processing interactively visualizing vast volumes geospatial data 3d virtual globe openwebglobe virtual globe several data categories like image data elevation data points interest vector data 3d objects streaming massive complex data internet data must pre-processed pre-processing usually comprises transformation local global reference system creation pyramid layers levels detail lod tiling data optionally compression encryption recently algorithms ported high performance compute cluster using openmp mpi also released open-source data sets usually large containing several terabytes advanced out-of-core rendering mechanisms level detail approach used visualization openwebglobe open-source project written webgl lead developer institute geomatics engineering university applied sciences northwestern switzerland openwebglobe sdk also 3d engine top webgl openwebglobe sdk possible create custom virtual globe applications javascript hello world example creates virtual globe adds image elevation layer demo version potential 3d viewer codice_1 geo-portal swiss confederation online openwebglobe website july 31 2012 scene covered entire switzerland based high resolution data swisstopo swissimage | [
562,
3915,
5571
] | Test |
3,319 | 3 | Ensoniq_AudioPCI:ensoniq audiopci ensoniq audiopci pci-based sound card released 1997 ensoniq last sound card product acquired creative technology card represented shift ensoniq market positioning whereas soundscape line made primarily low-volume high-end products full features audiopci designed simple low-cost product appeal system oems thus hopefully sell mass quantities towards end 1990s ensoniq struggling financially cards popular pc oems costs high musical instrument division fading revenue pressure intense competition especially dominant creative labs forcing audio card makers try keep prices low audiopci released july 1997 designed primarily cheap comparison wide variety chips sheer size older soundscape boards highly integrated two chip design audiopci obvious shift design philosophy board consists small software-driven audio chip one following s5016 es1370 es 1371 companion digital-to-analog converter dac another cost-cutting move previously typical rom chip used storage samples sample-based synthesis replaced facility use system ram storage audio data made possible move pci bus far greater bandwidth efficient bus mastering interface compared older isa bus standard audiopci designed cheap still quite functional offers many audio capabilities soundscape elite card surpasses soundscape cards notably audiopci supports several digital effects reverb chorus spatial enhancement used microsoft windows 95 later versions windows audiopci surprises market one first cards microsoft directsound3d 4-speaker playback support 4-speaker mode activated software supporting directsound3d quadraphonic mode oddity rear channel connected output jack line input jack switches modes 4-speaker output became active dos windows drivers support sample-based synthesis ensoniq .ecw patch set format several patch set choices available varying size instrument quality 2 4 8 mb .ecw file format ensoniq concert wavetable never made open hoped enthusiasts consequently custom wave sets available contrast huge availability home-made releases e-mu soundfont format particularly unfortunate audiopci used system ram patch set storage offers tremendous potential new patch sets traditional rom storage previously used also disappointing considering incredible popularity longevity ensoniq es1370 chipset descendants still use six years original audiopci board fact dos drivers far newer sound blaster audigy still use .ecw wave sets newer cards unable use soundfonts dos limiting three official .ecw wavesets late '90s one incomplete unofficial waveset audiopci supported dos games applications using software driver would install dos real-mode boot-time portion windows 9x driver virtualized sound blaster-compatible isa sound card use pc nmi tsr program allowed audiopci compatible out-of-the-box dos support pci competitors time example competing monster sound diamond multimedia limited running dos games windows 9x-based dos command windows meaning dos compatibility frequently reliable additional isa sound card creative struggling challenge legacy support well created sb-link interconnect allowed access serial-irq pc/pci grant/request sideband signals offered pci chipsets time order achieve dos compatibility sound blaster awe64-variant pci sound cards sb-link also used number chipset vendors ess yamaha ensoniq approach generally worked games older games problems detecting virtualized hardware systems addition dos driver required memory manager emm386 loaded required additional conventional memory space also put cpu virtual-86 mode conflicting games utilized modified form protected mode called 'flat mode mode allowed fast direct access system entire ram without requiring memory manager memory protection mechanism requirement exclusive audiopci however number isa sound cards used well including creative awe isa series audiopci dos driver included ensoniq soundscape 16-bit digital audio sample-based synthesis support along support sound blaster pro adlib gold general midi mt-32 however without actual hardware fm synthesis fm music sound effects simulated using samples often unacceptable results therefore practical configure dos games utilize general midi synthesizer digital sound effects whenever possible better sound quality dos midi utilizes .ecw patch set files windows midi part deal ensoniq purchased creative labs integrate audiopci dos driver upcoming sound blaster live creative added sound blaster 16 emulation driver removed ensoniq soundscape support audiopci re-branded several creative labs sound cards including sound blaster pci 64 pci 128 vibra pci others ensoniq es1370 audio chip renamed creative 5507 revised ac'97-compliant variants es1371 es1373 used several years card integrated motherboard audio cards es1370 run natively 44 khz sampling frequency meaning 12 24 32 48 khz become resampled resampling means lower sound quality worse synchronization possibly higher cpu utilization cards es1371 run 48 khz conforming ac97 11 22 44 khz become resampled soundcards feature multiple quartzes pll resampling often used potential problems creative labs malvern former ensoniq company acquired later released ectiva 1938 ev1938 single chip pci audio controller based es1371/es1373 register compatible previous chips main difference ev1938 previous chips inclusion built-in ac'97 codec hence producing cheaper single chip audio solution ev1938 also used integrated audio laptops/motherboards cards sound blaster audiopci 64v ct4730 audiopci es1370 developed ensoniq one important feature chip used pci bus instead isa bus commonly used sound cards point one first pci sound card solutions offer ms-dos legacy compatibility without special hardware extensions standard pci slot paired capable codec ak4531 pre-ac'97 es1370 supported then-latest 3d audio positioning 4-speaker surround sound chip also pci bus master device designed provide high-speed access system ram resources sample synthesis data effect processing depending drivers may also called sound blaster 64/128 device manager es1370 one first audio chips support microsoft directsound3d audio api programs took full advantage api capabilities es1370 capable global spatial localized 3d sound effects 2 4-speaker mode chip capable spatializing audio automatically still required directsound3d usage specific localization sounds es1370 also emulated piece virtual hardware qemu vmware ensoniq/creative es1371 es1373 audiopci 97 ac'97-compatible versions https //downloadcenter.intel.com/detail_desc.aspx lang=eng changelang=true dwnldid=2583 ct5880 chip relabeled es1371 may found cheap cards i.e sb creative vibra 128 pci creative ev1938 audiopci 64v virtually identical es1371/es1373 later cost reduced product | [
3760,
4295,
6256,
5743,
578,
4879,
1659,
2226,
6830,
6380,
3319,
858,
5970,
6237,
7228,
3755,
1150
] | Validation |
3,320 | 8 | Personyze:personyze personyze web 2.0 start-up company based tel aviv israel provides software service saas website personalization personyze founded november 2008 tel aviv israel yakov shabat danny hen within two years became leading personalization website providers facebook integration behavioral targeting personyze also provides analytics a/b testing june 2011 rapleaf announced partnership personyze allow use demographics database july 2011 introduced plugins content management systems wordpress joomla personyze criticized forbes contributing filter bubble technology sorts everything basis user activities may consequently present visitors portion content/offers excluding content/offers ever presented russian website- http //www.personyze.ru | [
933,
330
] | Test |
3,321 | 2 | Sendo_X2:sendo x2 sendo x2 second series 60 mobile phone developed sendo announced smallest lightest series 60 mobile marketplace sendo x2 first music mobile announced good six months sony ericsson announced w800 walkman phone although phone announced shown 3gsm world congress cannes february 2005 x2 never made production sendo went administration matter weeks x2 due released led uk based mobile phone magazines publishing reviews phone knew sendo codename x2 development tobi | [
5062,
740,
1582
] | Test |
3,322 | 2 | ODBC_Administrator:odbc administrator odbc administrator 32-bit utility mac os x operating system administering odbc enables interaction odbc-compliant data sources features include connection pooling trace log creation odbc driver management among administration features although apple started including underlying iodbc libraries mac os x jaguar 10.2.x continued least macos high sierra 10.13.x apple included odbc administrator mac os x leopard 10.5.x temporarily made available separate download since removed mac os x snow leopard 10.6.x alternatives apple 32-bit odbc administrator include free open source 32-bit 64-bit iodbc administrator included iodbc sdk available extant versions mac os x 10.0.x 10.13.x | [
3940,
713,
4690,
734,
405,
6832,
3989,
2597,
1502,
5786,
4740,
1897,
6505,
2627,
7609,
1171,
5109,
2284,
1178,
6188,
1187,
1562,
6909,
6548,
502,
6557,
2679,
6565,
2329,
3050,
163,
6582,
5535,
5191,
8051,
7335,
3445,
569,
5571,
7000,
62... | Test |
3,323 | 4 | DoublePulsar:doublepulsar doublepulsar backdoor implant tool developed u.s. national security agency nsa equation group leaked shadow brokers early 2017 tool infected 200,000 microsoft windows computers weeks used alongside eternalblue may 2017 wannacry ransomware attack variant doublepulsar first seen wild march 2016 discovered symantec sean dillon senior analyst security company risksense inc. first dissected inspected doublepulsar said nsa exploits 10 times worse heartbleed security bug use doublepulsar primary payload doublepulsar runs kernel mode grants cybercriminals high level control computer system installed uses three commands ping kill exec latter used load malware onto system | [
704,
3932,
2912,
376,
3277,
2923,
2587,
5779,
74,
7600,
4025,
1528,
4759,
2991,
1173,
6526,
5485,
6904,
6541,
6194,
2678,
3038,
3047,
6569,
2693,
862,
7307,
6589,
5187,
1996,
7328,
208,
2021,
5922,
6628,
924,
4531,
600,
1307,
3493,
2800... | Train |
3,324 | 3 | Superman:_The_Man_of_Steel_(1989_video_game):superman man steel 1989 video game superman man steel 1989 video game based dc comics flagship character superman developed published uk software company tynesoft license first star software game split distinct levels including 3d flying overhead vertical scrolling side scrolling sections sections different almost like different games number sections depended format e.g part seven missing versions sections linked comic book graphics telling story first level pseudo-3d forward scrolling flying level similar space harrier superman en route metropolis s.t.a.r labs attacked darkseid para-demons part two set ship lois lane held hostage terrorists takes form side scrolling fighting game superman fighting terrorists reach free lois third part overhead view vertical scrolling section set space superman must escort space shuttle manned professor gorwin asteroid kryptonite field s.t.a.r lab satellite next section another side-scrolling level set inside satellite superman must battle faulty robot defence system mistaken superman enemy intruder fifth part set outside satellite another asteroid field approaches gameplay identical level three part six similar parts three five rather asteroids superman must fly enemy satellite disrupting signals s.t.a.r lab satellite way must battle darkseid mini-robots large boss robot part seven set outside enemy satellite identified belonging lex luthor superman uses telescopic sight identify attack weak spots avoiding satellite defences final part set inside lex satellite similar part four superman must battle defence robots side-scrolling level object game destroy 'geo-disruptor found end level tynesoft ported published first star boulder dash spy vs. spy acorn platforms uk looking licenses first star held home computer rights superman used tynesoft developed entirely new game many different computers possible versions released home computer platforms day including atari st amiga pc commodore 64 zx spectrum amstrad cpc msx bbc micro acorn electron version apple ii also created us market evidence ever published released game published first star us distributed capstone software 16-bit versions generally received moderately favourable reviews one praised game incorporation style comic book source found gameplay frustrating particularly play sub games sequence gave score 69 amiga version 66 atari st version amiga computing similarly praised look game also pointing top notch sound awarding overall score 62 reception 8-bit versions game much mixed still praising presentation graphics zzap 64 gave c64 version overall score 39 complaining lightweight nature sub games tedious multi-load particular problem loading tape lengthy load level start new game tape would need rewound correct position first level crash gave spectrum version 35 praise given sound even graphics version came criticism including matchstick figure representing superman sideways scrolling section electron user much positive acorn electron version giving overall score 8/10 still criticised multi-load frustrating gameplay | [
4277,
5888,
6867
] | Validation |
3,325 | 3 | Gunship_(video_game):gunship video game gunship combat flight simulator video game developed published microprose 1986 game controlling simulated ah-64 apache helicopter players navigate missions attack enemy targets protect friendly forces commercially critically successful gunship followed gunship 2000 gunship game features missions seven regions including u.s. training southeast asia 1st air cavalry division central america 82nd airborne division middle east 101st airborne division western europe 3rd armored division selection region style enemies pilot assigned primary mission secondary mission could include objectives destroy enemy headquarters support friendly troops i.e destroy targets near friendly forces latter would easier mission battle would fought closer friendly lines pilot arms apache helicopter gunship usually selecting agm-114 hellfire air-to-ground missiles guided missiles destroy hard targets bunkers tanks ffars folding fin aerial rockets unguided rockets destroy soft targets infantry installations hedp high-explosive dual-purpose rounds 30 mm cannon all-purpose weapon maximum range 1.5 km central america middle east western europe aim-9 sidewinders would also standard equipment usually backup air-to-air weapon case cannon failure patient players might move short jumps crouching behind hills block enemy line sight suddenly popping attack aggressive players generally fly fast erratically evade enemy fire flying low deliver devastating cannon attacks close range since flight time component mission evaluation either method advantages latter however rather dangerous 1st line enemies whose fast reaction times cause chopper pummelled relentless fire enemy fire especially small caliber deflected armor cause systems damage enough damaging hits structural integrity fail causing general power failure manifests dual-engine flameout warranting emergency landing emergency landing seriously injured pilot enemy territory causes become missing action pilot lands without serious injury escape back base live fight another day defined time limit game player return number forward area resupply points rearmed refueled damage repaired returning home base end mission ideally pilot completes missions knocks targets makes back base within 20 minutes ending gunship promotions stop pilot makes colonel although continue amassing medals purple heart air medal bronze star silver star distinguished service cross medal honor retire final promotion brig general medals game prerequisites earning others requirement shooting two hinds one mission medal honor led believe possible earn earning lower medals repeated medals harder earn first one criteria winning medals based types targets destroyed number targets destroyed objectives met time elapsed sometimes whether pilot wounded real life medals game awarded posthumously microprose intended gunship simulate urban helicopter akin blue thunder found city graphics difficult instead used tools developed f-15 strike eagle create another military simulation game released 1986 pc dos atari st amiga commodore 64 fm towns msx pc-98 sharp x68000 zx spectrum gunship also ported sega mega drive u.s. gold 1993 however version game differed others featuring arcade-style gameplay horizontal shoot 'em stages gunship microprose third best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 info magazine gave gunship commodore 64 five stars five describing without qualification best combat flight simulator ever released 8-bit computer praising graphics weapons sound controls physics documentation magazine concluded prime computer gaming world stated reviewer heartily recommends gunship ... five-star rating highest well-deserved 1994 survey wargames magazine gave title three stars five stating initially released helicopter simulation gunship received origins award best screen graphics home computer game 1986 award best simulation game year according readers crash 1987 computer gaming world named gunship action game year 1988 game joined magazine hall fame games highly rated time readers 1996 magazine ranked 102nd best game time follow-up game gunship 2000 released microprose several platforms 1991 1996 successor gunship followed 1999 pc windows | [
767,
6380
] | Validation |
3,326 | 2 | Tim_Bray:tim bray timothy william bray born june 21 1955 canadian software developer entrepreneur one co-authors original xml specification worked amazon web services since december 2014 previously google sun microsystems digital equipment corporation dec several start-ups bray born june 21 1955 alberta canada grew beirut lebanon returned canada attend school university guelph guelph ontario graduated 1981 bachelor science double majoring mathematics computer science 2009 would return guelph receive honorary doctor science degree tim described switch focus math computer science way math ’ worked like dog cs cs worked much less as—and learned got paid well fresh university bray joined digital equipment corporation dec toronto software specialist 1983 bray left dec microtel pacific research joined new oxford english dictionary oed project university waterloo 1987 manager time bray worked sgml technology would later become central open text corporation xml atom standardization work bray co-founded antarctica systems bray director web technologies sun microsystems early 2004 early 2010 joined google developer advocate 2010 focusing android identity left google march 2014 unwilling relocate silicon valley vancouver started working amazon web services december 2014 bray involved several entrepreneurial activities including tim bray served part-time ceo waterloo maple 1989–1990 waterloo maple developer popular maple mathematical software bray left new oed project 1989 co-found open text corporation two colleagues open text commercialised search engine employed new oed project bray recalled “ 1994 heard conference speaker say search engines would big internet five seconds pieces fell place head realized could build thing technology. ” thus 1995 open text released open text index one first popular commercial web search engines open text corporation publicly traded nasdaq symbol otex 1991 1996 bray held position senior vice president—technology bray along wife dr. lauren wood ran textuality successful consulting practice field web publishing technology contracted netscape 1999 along ramanathan v. guha part create new version meta content framework called resource description framework rdf used xml language 1999 founded antarctica systems vancouver british columbia canada-based company specializes visualization-based business analytics bray contributed several important standards technology particularly web standards world wide web consortium w3c invited expert world wide web consortium 1996 1999 bray co-edited xml xml namespace specifications halfway project bray accepted consulting engagement netscape provoking vociferous protests netscape competitor microsoft supported initial moves bring sgml web bray temporarily asked resign editorship led intense dispute working group eventually solved appointment microsoft jean paoli third co-editor 2001 bray wrote article called taxi future xml.com proposed means improve web client user experience web server system performance via transform-aggregate-send xml-interact architecture—this proposed system similar ajax paradigm popularized around 2005 2001 2004 served tim berners-lee appointee w3c technical architecture group october 2007 bray co-chairing paul hoffman atom-focused atompub working group internet engineering task force atom web syndication format developed address perceived deficiencies rss 2.0 format bray worked ietf json working group 2013 2014 serving editor rfc 7159 specification json data interchange format revised rfc 4627 highlighted interoperability best practices released march 2014 bray written many software applications including bonnie inspiration bonnie++ unix file system benchmarking tool lark first xml processor ape atom protocol exerciser | [
1458,
3326,
6986,
3410,
5968,
5064,
84,
87,
6428
] | Test |
3,327 | 3 | Zoids:_The_Battle_Begins:zoids battle begins zoids battle begins 1986 battle simulation developed released europe zx spectrum amstrad cpc msx c64 personal computers martech licensed zoids toy manufacturer tomy players control human fused machine known spiderzoid human tasked reclaiming six parts large machine named zoidzilla parts captured enemy red zoids part reclaimed boost power player spiderzoid game well received magazines | [] | Test |
3,328 | 7 | Norton_Zone:norton zone norton zone cloud file sharing online backup tool service operated symantec used share sync access store backup data also allows file collaboration commenting norton zone accessible apps windows windows rt android mac ios platforms norton zone uses encrypted replicated cloud storage provides client-side encryption leading antivirus provider via norton antivirus software symantec distinguishes norton zone competition automatically scanning files malware viruses norton zone offered 5 gb storage free larger storage allocations via subscription june 3 2014 symantec announced norton zone would discontinued august 6 2014 | [
4594,
5401,
7102,
2566,
4759,
5571,
7083,
3943,
4645,
1589
] | Test |
3,329 | 4 | Sealing_wax:sealing wax sealing wax wax material seal melting hardens quickly paper parchment ribbons wire material forming bond difficult separate without noticeable tampering wax used verify something document unopened verify sender identity example signet ring decoration sealing wax used take impressions seals wax used seal letters close later 16th century envelopes sealing wax romans used bitumen purpose formulas vary major shift european trade indies opened middle ages sealing wax typically made beeswax venice turpentine greenish-yellow resinous extract european larch tree earliest wax uncoloured later wax coloured red vermilion 16th century compounded various proportions shellac turpentine resin chalk plaster colouring matter often vermilion red lead necessarily beeswax proportion chalk varied coarser grades used seal wine bottles fruit preserves finer grades documents situations large seals public documents beeswax used occasion sealing wax historically perfumed ambergris musk scents 1866 many colours available gold using mica blue using smalt verditer black using lamp black white using lead white yellow using mercuric mineral turpeth also known schuetteite green using verdigris users british crown assigned different colours different types documents today range synthetic colours available sealing wax available form sticks sometimes wick granules stick melted one end ignited blackened granules heated spoon normally using flame placed required usually flap envelope wax still soft seal preferably temperature wax best impression quickly firmly pressed released modern day brought sealing wax new level use application traditional sealing wax candles produced canada spain france italy scotland formulations similar used historically since advent postal system use sealing wax become ceremony security modern times required new styles wax allowing mailing seal without damage removal new waxes flexible mailing referred glue-gun sealing wax faux sealing wax flexible sealing wax | [
1266
] | Test |
3,330 | 1 | Schema-agnostic_databases:schema-agnostic databases schema-agnostic databases vocabulary-independent databases aim supporting users abstracted representation data supporting automatic semantic matching queries databases schema-agnosticism property database mapping query issued user terminology structure automatically mapping dataset vocabulary increase size semantic heterogeneity database schemas bring new requirements users querying searching structured data scale become unfeasible data consumers familiar representation data order query center discussion semantic gap users databases becomes central scale complexity data grows evolution data environments towards consumption data multiple data sources growth schema size complexity dynamicity decentralisation scodd schemas increases complexity contemporary data management scodd trend emerges central data management concern big data scenarios users applications demand complete data produced independent data sources different semantic assumptions contexts use typical scenario semantic web data applications evolution databases direction heterogeneous data environments strongly impacts usability semiotics semantic assumptions behind existing data accessibility methods structured queries keyword-based search visual query systems schema-less databases containing potentially millions dynamically changing attributes becomes unfeasible users become aware 'schema vocabulary order query database scale effort understanding schema order build structured query become prohibitive schema-agnostic queries defined query approaches structured databases allow users satisfying complex information needs without understanding representation schema database similarly tran et al defines search approaches require users know schema underlying data approaches keyword-based search databases allow users query databases without employing structured queries however discussed tran et al points users however navigation exploration address complex information needs unlike keyword search used web focuses simple needs keyword search elaborated used obtain complex results instead single set resources goal compute complex sets resources relations development approaches support natural language interfaces nli databases aimed towards goal schema-agnostic queries complementarily approaches based keyword search targeted keyword-based queries express complex information needs approaches explored construction structured queries databases schema constraints relaxed approaches natural language keyword-based search structured queries targeted different degrees sophistication addressing problem supporting flexible semantic matching queries data vary completely absence semantic concern principled semantic models demand schema-agnosticism implicit requirement across semantic search natural language query systems structured data sufficiently individuated concept necessary requirement contemporary database management systems recent works started define model semantic aspects involved schema-agnostic queries consist schema-agnostic queries following syntax structured standard example sql sparql syntax semantics operators maintained different terminologies used maps following sparql query dataset vocabulary maps following sparql query dataset vocabulary consist schema-agnostic queries using keyword queries case syntax semantics operators different structured query syntax 2016 concept schema-agnostic queries developed primarily academia schema-agnostic query systems investigated context natural language interfaces databases semantic web works explore application semantic parsing techniques large heterogeneous schema-less databases recently individuation concept schema-agnostic query systems databases appeared explicitly within literature freitas et al provide probabilistic model semantic complexity mapping schema-agnostic queries | [
7999,
4635,
5612,
7290,
2054,
808
] | Test |
3,331 | 1 | FloraBase:florabase florabase public access web-based database flora western australia provides authoritative scientific information 12,978 taxa including descriptions maps images conservation status nomenclatural details 1,272 alien taxa naturalised weeds also recorded system takes data datasets including census western australian plants western australian herbarium specimen database nearly 725,000 vouchered plant collections operated western australian herbarium within department parks wildlife established november 1998 distribution guide uses combination ibra version 5.1 john stanley beard botanical provinces | [] | Test |
3,332 | 3 | Hang-On:hang-on game also built versions master system title derived biker turning hang bike bike leaning suzuki read japanese bike magazine though suzuki learned later technique called hang north america nevertheless chose keep former name 1995 interview suzuki said felt hang-on impressive game time release master system version also came two different compilation cartridges one astro warrior one safari hunt using behind motorcycle perspective player races linear race track divided several stages within limited time reaching checkpoint end stage extends time limit game ends time runs race finished arcade game contains in-game billboards bridgestone desert dueler tires shell garelli motorcycles tag john player special cigarettes forum cigarettes marbor obvious parody marlboro cigarettes arcade flyer features bike marlboro colors sponsored yamaha yzr500 world championships mid late 1980s would controversy cigarette ads games marketed children upon release another sega racing game super monaco gp 1989 three arcade cabinet designs—the usual upright machine handlebar brake levers instead joystick buttons upright machine addition seat third version looked roughly like real motorcycle steer player leaned tilt bike steered in-game bike screen mounted windshield area bike sg-1000-exclusive sequel hang-on ii released 1985 though essentially port original game modified work within limitations console hardware 1987 followed sequel super hang-on arcade later range platforms including sega genesis zx spectrum commodore 64 amstrad cpc commodore amiga atari st. polygon based sequel developed genki released sega saturn named variously hang-on gp '95 japan hang-on gp usa hang-on gp '96 europe power drift motorcycle hidden vehicle accessed finishing first place five tracks courses c e. playable extra stage sonic riders hang-on gear super hang-on gear bought shop one playing respective music racing. gear unlockable form sit-down arcade cabinet however collecting 100 rings pressing button race changes gear main music sequel sit-down arcade cabinet outride crisis said game sonic free riders hang-on gear super hang-on gear bought shop original sonic riders shenmue shenmue ii feature hang-on mini-game well ability win miniature toy versions bikes gashapon machines xbox version shenmue ii playable xbox 360 crashes trying play hang-on sonic all-stars racing transformed ryo drives hang-on sit-down arcade cabinet water-based portions race daytona usa h.o entered high score table clip main theme hang-on play | [
8187,
1237,
3518,
440,
7994,
7854
] | Test |
3,333 | 3 | Socket_G1:socket g1 socket g1 also known rpga 988a socket g/rpga 989 sockets take socket g1/rpga 988a socket g2/rpga 988b packaged processors intel cpu socket line mobile core i7 successor core 2 line based intel nehalem architecture first available 1366-pin socket b like predecessor lga775 uses lga socket configuration later followed updated lga-1156 socket moved qpi pci-express controller northbridge onto cpu result lower pin count lga-1156 systems later socket g1 systems run dual-channel memory mode opposed triple-channel mode unique lga-1366 platform subsequent xeon sockets nehalem mobile variant released september 23 2009 form i7-720qm 820qm 920xm models followed i7-740qm 840qm 940xm models june 21 2010 newer cpus use new clarksfield core maintained 45 nm manufacturing process desktop-based nehalems nehalem received die shrink january 7 2010 core name westmere intel gma hd graphics ironlake core packaged onto cpu substrate integrated directly processor die goes create arrandale-based line current cpus use package core i7-6x0m series core i5-4x0m series core i5-5x0m series core i3-3x0m series finally pentium p6x00 series celeron p4x00 series released march 28 2010 however available socket g1 available bga package also known pga988 socket processors | [
2541,
2814,
4123,
3849,
1729,
2828,
6173,
7974,
2830,
3002,
4314,
5379,
3193,
1841,
1645,
3203,
4968,
3385,
4972,
5853,
2685,
6935,
8021,
7302,
5963,
866,
7134,
262,
6683,
5886
] | Test |
3,334 | 4 | Movieland:movieland movieland also known movieland.com moviepass.tv popcorn.net subscription-based movie download service subject thousands complaints federal trade commission washington state attorney general office better business bureau agencies consumers said held hostage repeated pop-up windows demands payment triggered free 3-day trial period many said never even heard movieland saw first pop-up movieland advertised service spyware personal information would need filled begin free trial federal trade commission ftc filed complaint movieland eleven defendants august 2006 charging engaged nationwide scheme use deception coercion extract payments consumers attorney general state washington also filed complaint charging movieland several defendants violating state computer spyware act consumer protection act movieland advertises movie download service using pop-up ads sites ads offer three-day free trial access members-only content including music news updated sports scores adult movies ads say forms fill need provide credit card number e-mail address making trial appear anonymous site homepage states spyware virus free extra charge site installs program mediapipe used access service movieland.com began operations sometime fall 2005 earlier consumer complaints began soon thereafter consumers claimed never signed free trial never used service never even heard movieland got first pop-up demand payment said found software computers downloading screensaver free utility company denied installed software stealthy means media coverage early january 2006 recounted consumer complaints mentioned several anti-spyware companies buying google advertisements boasting product ability remove movieland report updated february 20 2008 berkman center internet society harvard law school calls movieland mediapipe component badware fully disclose installing completely remove components 'obligations uninstall process modifies software without disclosure richard stiennon it-harvest referred movieland form ransomware due behaviour july 2008 mediapipe report still cited berkman center internet society harvard law school august 8 2006 ftc filed complaint united states district court obtain preliminary permanent injunctive relief rescission contracts restitution disgorgement equitable relief defendants deceptive unfair acts practices violation section 5 ftc act complaint alleged defendants demanding payment fix problem created installing disruptive software could removed reasonable means according ftc complaint movieland repeatedly bombarded consumers pop-up windows accompanied music lasted nearly minute demanded minimum payment 29.95 end recurring pop-up cycle claiming consumers signed three-day free trial cancel service trial period complaint charged pop-ups large dark background took much screen blocking access windows contain close minimize buttons forcing user continue first pop-up showed date time content access software installed system 3 day free trial began text click 'continue purchase license stop reminders graphic reading stop reminders click continue option offered button labeled continue clicking continue brought next pop-up 40-second audiovisual clip featuring woman introduced personal customer service representative stated cancel trial period legally obligated make payment per terms conditions agreed installed content delivery software clip neared conclusion new dialog box entitled payment options appeared choosing close window option ended pop-ups unvarying cycle began addition complaint alleged defendants made numerous false statements attempting collect payments consumers claiming computer owner someone else consented receiving pop-up payment demands paid owner computer received pop-ups legally obligated pay movieland computer owner obligated satisfy contract person entered using computer customer service telephone number provided 900 number consumers called recorded greeting told would incur 34.95 charge hang within three seconds complaint also alleged defendants made difficult impossible consumers uninstall software attempting remove windows control panel add remove programs function redirected web page telling pay 29.95 fee stop pop-ups way many consumers could regain control computers pay fee pay computer technician remove software movieland representatives said downloads spyware get computers accidentally insisting drive-by downloads said ftc lawsuit improperly brought pointed time complaint filed federal judge rejected ftc request temporary restraining order would immediately ended cited billing practices terms service movieland web site warned users cancel pay three-day period pop-up billing reminders would begin appear frequently choose one payment options pay license movieland said pop-ups anti-fraud mechanism received without consumers intentionally downloading software several intentional steps default setting cancel company also stated extrinsic programs adware otherwise bundled software company disputed ftc claim software difficult get rid said could removed using windows control panel following ten companies two individuals named defendants ftc complaint november 2006 defendants ftc signed stipulations governing pre-trial conduct without admitting wrongdoing violation law involvement acts practices alleged complaint defendants agreed make clear prominent disclosures prior software download installation download install software without user explicit consent without disclosing clearly prominently site terms service nature frequency duration pop-up windows may appear regarding purported obligation payment pop-ups also must lock access rest computer also agreed fixed limits many pop-ups generate computer maximum 5 per day 1 per hour requirement provide mute button sound content pop-ups able close windows provide hyperlink toll-free number email utility request stopping pop-ups certain conditions defendants also promised clearly label single-click download install buttons pre-select default also required represent consumers legal contractual obligation pay software unless computer owner provided personal identification agreed pay failure pay result collection proceedings affect computer owner credit status unless owner provided personal identification credit card agreed pay customer service agents may state believe computer owner responsible paying download offer several purchase options including one-time 30-day non-renewing license 29.95 access service terminate ftc complaint scheduled tried united states district court january 2008 trial defendants chose settle court ftc movieland settled ftc september 2007 without admitting wrongdoing violation law defendants agreed make permanent terms pre-trial stipulations including limiting number frequency duration billing pop-ups pay ftc 501,367 reimburse consumers paid program result repeated pop-up demands defendants also agreed stop offering anonymous free trials users certify install time least 18 years age provide install-time link terms service end user license agreement download software reinstalls user removed prominently post removal instructions web sites agreement also requires herd garroni notify ftc change name address employment status new business affiliations five years august 14 2006 rob mckenna attorney general state washington charged movieland digital enterprises herd garroni violating state computer spyware act consumer protection act complaint filed king county superior court seattle alleged misrepresentations unlawful business acts practices similar alleged ftc complaint alleged violations washington state law defendants subject fines 100,000 per violation spyware act 2,000 per violation consumer protection act found liable also subject paying restitution affected consumers alleged violations washington state law included taking control user computer violation spyware act consumer protection act cpa remotely installing billing software initiates controls pop-up cycle misrepresenting ability uninstall software violation acts listing software add/remove programs although software uninstalled unconscionable business practices violation cpa aggressive harassing billing method used failure disclose including use billing method forces payment completely obstructing users access computers threats harassment intimidation billing practices violation cpa threatening collection proceedings adverse effect users credit records fact defendants even know consumer name referring consumers legal obligation pay fact legally binding contract failure disclose material facts violation cpa aggressive relentless threatening form payment demands fact uninstallation option software disabled defendants transmit software user computer surreptitiously misrepresentations violation cpa including stating software contains spyware fact software constitutes spyware behavior announcing suit following seven-month investigation washington attorney general rob mckenna rejected one possible defense defendants claim users legally obligated pay service lacks merit consumers provide knowing consent installation relentless pop-up demands said furthermore computer owners responsible satisfy contracts people including minors entered using computer also said defendants threats collection proceedings adverse effects users credit ratings empty defendants way personally identify computer users assistant attorney general paula selis said tactics forced consumers give pay 20 100 service said sued getting complaints consumers felt harassed held barrel payments n't agree make selis said harassment intimidation consumer using high-pressure tactic make pay something legally obligated pay movieland settled washington april 2007 terms similar ftc settlement specific washington consumers agreeing pay washington 50,000 consumer reimbursement prominently state important contract terms including cost subscription service advertisements | [
3334,
1847,
2241
] | Test |
3,335 | 4 | Ann_Z._Caracristi:ann z. caracristi ann zeilinger caracristi february 1 1921 – january 10 2016 american cryptanalyst former deputy director national security agency served various positions 40-year career served member secretary defense joint security commission president foreign intelligence advisory board became first woman nsa promoted gs-18 rank 1975 became chief research operations born bronxville new york attended russell sage college women ’ college troy new york graduated 1942 english history major graduation recruited army signal intelligence service work code breaker recommendation dean russell sage caracristi sent washington d.c. attended cryptanalysis courses william friedman puzzles used train cryptographers art pattern recognition world war ii caracristi cryptography work focused deciphering additive systems used japanese military forces merchant fleet known exceptional talent reconstructing enemy code books colleagues among first americans learn japan planned surrender deciphered code august 14 1945 following war caracristi hired agency would later become part national security agency promoted first supergrade higher civil service paygrade 1959 gs-18 highest supergrade chief research operations 1975 1980 caracristi became sixth nsa deputy director first woman serve role received department defense distinguished civilian service award 1980 highest award given civilians deputy director credited providing leadership new generations code breakers integrating use computers technology retired 1982 continued serve panels intelligence community including president clinton ’ foreign intelligence advisory board appointed 1993 2003 caracristi given honorary degree national intelligence university academic award name given high-performing graduate student year lived adult life one-bedroom cottage georgetown hobbies included birds collecting pewter 2002 name given naval intelligence professionals award caracristi died january 10 2016 washington age 94 dementia later years 1980 received department defense distinguished civilian service award one subjects 2017 non-fiction book code girls untold story american women code breakers world war ii liza mundy | [
4666,
1821,
1353,
202,
7895,
7191,
228,
4429,
7568,
4727,
4988,
258
] | Validation |
3,336 | 6 | Install_(Unix):install unix install command unix program used copy files set file permissions implementations offer invoke strip installing executable files | [
1710,
569,
4020
] | Test |
3,337 | 5 | Common_Open_Policy_Service:common open policy service common open policy service cops protocol part internet protocol suite defined ietf rfc 2748 cops specifies simple client/server model supporting policy control quality service qos signaling protocols e.g rsvp policies stored servers acted upon policy decision points pdp enforced clients also known policy enforcement points pep two models cops outsourcing model provisioning model considered view client pep outsourcing model simplest cops implementation model policies stored pdp whenever pep needs make decision sends relevant information pdp pdp analyzes information makes decision relays pep pep simply enforces decision provisioning model see rfc 3084 cops usage policy provisioning cops-pr pep reports decision-making capabilities pdp pdp downloads relevant policies pep pep make decisions based policies provisioning model uses policy information base repository policies | [
7148,
456,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
3383,
3640,
2219,
3797,
2043,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880,
84
] | Validation |
3,338 | 4 | Proxy_server:proxy server computer networks proxy server server computer system application acts intermediary requests clients seeking resources servers client connects proxy server requesting service file connection web page resource available different server proxy server evaluates request way simplify control complexity proxies invented add structure encapsulation distributed systems proxy server may reside user local computer point user computer destination servers internet open proxy forwarding proxy server accessible internet user 2008 gordon lyon estimates hundreds thousands open proxies internet anonymous open proxy allows users conceal ip address browsing web using internet services varying degrees anonymity however well number methods 'tricking client revealing regardless proxy used reverse proxy surrogate proxy server appears clients ordinary server reverse proxies forward requests one ordinary servers handle request response proxy server returned came directly original server leaving client knowledge original server reverse proxies installed neighborhood one web servers traffic coming internet destination one neighborhood web servers goes proxy server use reverse originates counterpart forward proxy since reverse proxy sits closer web server serves restricted set websites several reasons installing reverse proxy servers content-filtering web proxy server provides administrative control content may relayed one directions proxy commonly used commercial non-commercial organizations especially schools ensure internet usage conforms acceptable use policy content filtering proxy often support user authentication control web access also usually produces logs either give detailed information urls accessed specific users monitor bandwidth usage statistics may also communicate daemon-based and/or icap-based antivirus software provide security virus malware scanning incoming content real time enters network many workplaces schools colleges restrict web sites online services accessible available buildings governments also censor undesirable content done either specialized proxy called content filter commercial free products available using cache-extension protocol icap allows plug-in extensions open caching architecture websites commonly used students circumvent filters access blocked content often include proxy user access websites filter trying block requests may filtered several methods url dns blacklists blacklist url regex filtering mime filtering content keyword filtering products known employ content analysis techniques look traits commonly used certain types content providers blacklists often provided maintained web-filtering companies often grouped categories pornography gambling shopping social networks etc. assuming requested url acceptable content fetched proxy point dynamic filter may applied return path example jpeg files could blocked based fleshtone matches language filters could dynamically detect unwanted language content rejected http fetch error may returned requester web filtering companies use internet-wide crawling robot assesses likelihood content certain type resultant database corrected manual labor based complaints known flaws content-matching algorithms proxies scan outbound content e.g. data loss prevention scan content malicious software web filtering proxies able peer inside secure sockets http transactions assuming chain-of-trust ssl/tls transport layer security tampered ssl/tls chain-of-trust relies trusted root certificate authorities workplace setting client managed organization trust might granted root certificate whose private key known proxy consequently root certificate generated proxy installed browser ca list staff situations proxy analysis contents ssl/tls transaction becomes possible proxy effectively operating man-in-the-middle attack allowed client trust root certificate proxy owns destination server filters content based origin request use proxy circumvent filter example server using ip-based geolocation restrict service certain country accessed using proxy located country access service web proxies common means bypassing government censorship although 3 internet users use circumvention tools cases users circumvent proxies filter using blacklists using services designed proxy information non-blacklisted location proxies installed order eavesdrop upon data-flow client machines web content sent accessed – including passwords submitted cookies used – captured analyzed proxy operator reason passwords online services webmail banking always exchanged cryptographically secured connection ssl chaining proxies reveal data original requester possible obfuscate activities eyes user destination however traces left intermediate hops could used offered trace user activities policies administrators proxies unknown user may fall victim false sense security details sight mind inconvenience risk proxy users may find blocked certain web sites numerous forums web sites block ip addresses proxies known spammed trolled site proxy bouncing used maintain privacy caching proxy server accelerates service requests retrieving content saved previous request made client even clients caching proxies keep local copies frequently requested resources allowing large organizations significantly reduce upstream bandwidth usage costs significantly increasing performance isps large businesses caching proxy caching proxies first kind proxy server web proxies commonly used cache web pages web server poorly implemented caching proxies cause problems inability use user authentication proxy designed mitigate specific link related issues degradation performance enhancing proxy peps typically used improve tcp performance presence high round-trip times high packet loss wireless mobile phone networks highly asymmetric links featuring different upload download rates peps make efficient use network example merging tcp acks acknowledgements compressing data sent application layer translation proxy proxy server used localize website experience different markets traffic global audience routed translation proxy source website visitors browse proxied site requests go back source site pages rendered original language content response replaced translated content passes back proxy translations used translation proxy either machine translation human translation combination machine human translation different translation proxy implementations different capabilities allow customization source site local audience excluding source content substituting source content original local content proxy used automatically repair errors proxied content instance bikiniproxy system instruments javascript code fly order detect automatically repair errors happening browser.. another kind repair done proxy fix accessibility issues anonymous proxy server sometimes called web proxy generally attempts anonymize web surfing different varieties anonymizers destination server server ultimately satisfies web request receives requests anonymizing proxy server thus receive information end user address requests anonymous anonymizing proxy server however degree trust present proxy server user many proxy servers funded continued advertising link user access control proxy servers implement logon requirement large organizations authorized users must log gain access web organization thereby track usage individuals anonymizing proxy servers may forward data packets header lines http_via http_x_forwarded_for http_forwarded may reveal ip address client anonymizing proxy servers known elite high-anonymity proxies make appear proxy server client website could still suspect proxy used client sends packets include cookie previous visit use high-anonymity proxy server clearing cookies possibly cache would solve problem advertisers use proxy servers validating checking quality assurance geotargeted ads geotargeting ad server checks request source ip address uses geo-ip database determine geographic source requests using proxy server physically located inside specific country city gives advertisers ability test geotargeted ads proxy keep internal network structure company secret using network address translation help security internal network makes requests machines users local network anonymous proxies also combined firewalls incorrectly configured proxy provide access network otherwise isolated internet proxies allow web sites make web requests externally hosted resources e.g images music files etc cross-domain restrictions prohibit web site linking directly outside domains proxies also allow browser make web requests externally hosted content behalf website cross-domain restrictions place protect websites likes data theft prohibit browser directly accessing outside domains secondary market brokers use web proxy servers buy large stocks limited products limited sneakers tickets web proxies forward http requests request client regular http request except full url passed instead path request sent proxy server proxy makes request specified returns response web proxies allow http connect method set forwarding arbitrary data connection common policy forward port 443 allow https traffic examples web proxy servers include apache mod_proxy traffic server haproxy iis configured proxy e.g. application request routing nginx privoxy squid varnish reverse proxy wingate ziproxy tinyproxy rabbit4 polipo clients problem complex multiple proxy-servers solved client-serer proxy auto-config protocol pac file socks also forwards arbitrary data connection phase similar http connect web proxies also known intercepting proxy inline proxy forced proxy transparent proxy intercepts normal communication without requiring special client configuration clients need aware existence proxy transparent proxy normally located client internet proxy performing functions gateway router 'transparent proxy proxy modify request response beyond required proxy authentication identification 'non-transparent proxy proxy modifies request response order provide added service user agent group annotation services media type transformation protocol reduction anonymity filtering tcp intercept traffic filtering security feature protects tcp servers tcp syn flood attacks type denial-of-service attack tcp intercept available ip traffic 2009 security flaw way transparent proxies operate published robert auger computer emergency response team issued advisory listing dozens affected transparent intercepting proxy servers intercepting proxies commonly used businesses enforce acceptable use policy ease administrative overheads since client browser configuration required second reason however mitigated features active directory group policy dhcp automatic proxy detection intercepting proxies also commonly used isps countries save upstream bandwidth improve customer response times caching common countries bandwidth limited e.g island nations must paid diversion interception tcp connection creates several issues firstly original destination ip port must somehow communicated proxy always possible e.g. gateway proxy reside different hosts class cross site attacks depend certain behaviour intercepting proxies check access information original intercepted destination problem may resolved using integrated packet-level application level appliance software able communicate information packet handler proxy intercepting also creates problems http authentication especially connection-oriented authentication ntlm client browser believes talking server rather proxy cause problems intercepting proxy requires authentication user connects site also requires authentication finally intercepting connections cause problems http caches requests responses become uncacheable shared cache integrated firewall proxy servers router/firewall host proxy communicating original destination information done method example microsoft tmg wingate interception also performed using cisco wccp web cache control protocol proprietary protocol resides router configured cache allowing cache determine ports traffic sent via transparent redirection router redirection occur one two ways gre tunneling osi layer 3 mac rewrites osi layer 2 traffic reaches proxy machine interception commonly performed nat network address translation setups invisible client browser leave proxy visible web server devices internet side proxy recent linux bsd releases provide tproxy transparent proxy performs ip-level osi layer 3 transparent interception spoofing outbound traffic hiding proxy ip address network devices several methods often used detect presence intercepting proxy server cgi web proxy accepts target urls using web form user browser window processes request returns results user browser consequently used device network allow true proxy settings changed first recorded cgi proxy named rover time renamed 1998 cgiproxy developed american computer scientist james marshall early 1996 article unix review rich morin majority cgi proxies powered one cgiproxy written perl language glype written php language phproxy written php language april 2016 cgiproxy received 2 million downloads glype received almost million downloads whilst phproxy still receives hundreds downloads per week despite waning popularity due vpns privacy methods still several thousand cgi proxies online cgi proxies set purposes making websites accessible disabled people since shut due excessive traffic usually caused third party advertising service means bypass local filtering since many users n't care collateral damage causing became necessary organizations hide proxies disclosing urls take trouble contact organization demonstrate genuine need suffix proxy allows user access web content appending name proxy server url requested content e.g en.wikipedia.org. suffixproxy.com suffix proxy servers easier use regular proxy servers offer high levels anonymity primary use bypassing web filters however rarely used due advanced web filters tor short onion router system intended enable online anonymity tor client software routes internet traffic worldwide volunteer network servers order conceal user location usage someone conducting network surveillance traffic analysis using tor makes difficult trace internet activity including visits web sites online posts instant messages communication forms back user intended protect users personal freedom privacy ability conduct confidential business keeping internet activities monitored onion routing refers layered nature encryption service original data encrypted re-encrypted multiple times sent successive tor relays one decrypts layer encryption passing data next relay ultimately destination reduces possibility original data unscrambled understood transit tor client free software additional charges use network i2p anonymous network 'i2p proxy network aiming online anonymity implements garlic routing enhancement tor onion routing i2p fully distributed works encrypting communications various layers relaying network routers run volunteers various locations keeping source information hidden i2p offers censorship resistance goals i2p protect users personal freedom privacy ability conduct confidential business user i2p runs i2p router computer node i2p router takes care finding peers building anonymizing tunnels i2p provides proxies protocols http irc socks ... software free open-source network free charge use 'proxy refers layer-7 application osi reference model network address translation nat similar proxy operates layer-3 client configuration layer-3 nat configuring gateway sufficient however client configuration layer-7 proxy destination packets client generates must always proxy server layer-7 proxy server reads packet finds true destination nat operates layer-3 less resource-intensive layer-7 proxy also less flexible compare two technologies might encounter terminology known 'transparent firewall transparent firewall means proxy uses layer-7 proxy advantages without knowledge client client presumes gateway nat layer-3 idea inside packet method layer-3 packets sent layer-7 proxy investigation dns proxy server takes dns queries usually local network forwards internet domain name server may also cache dns records client programs socks-ify allows adaptation networked software connect external networks via certain types proxy servers mostly socks | [
5369,
6419,
376,
5375,
5733,
2563,
5392,
1474,
6107,
3637,
2577,
1496,
3999,
62,
1886,
1136,
6492,
79,
436,
1145,
2973,
84,
4014,
7232,
2984,
5806,
7967,
104,
1175,
1542,
2291,
7637,
5486,
835,
3383,
5495,
7275,
841,
5850,
8009,
3727,
... | Test |
3,339 | 1 | Répertoire_International_de_Littérature_Musicale:répertoire international de littérature musicale répertoire international de littérature musicale international repertory music literature internationales repertorium der musikliteratur commonly known acronym rilm nonprofit organization offers digital collections advanced tools locating research topics related music mission “ make knowledge accessible research performance communities worldwide….to include music scholarship countries languages across disciplinary cultural boundaries thereby fostering research arts humanities sciences social sciences. ” central rilm ’ work mission international bibliography scholarship relating facets music research rilm founded 1966 american musicologist barry s. brook 1918–1997 joint sponsorship international musicological society ims international association music libraries archives documentation centres iaml 2007 international council traditional music ictm joined third sponsoring organization 1967 1968 rilm developed first set computer programs automated processing sorting bibliographic records author/subject indexes ran first mainframe ibm computer ibm system/360 computing center city university new york s/360 delivered ibm 1964 time advanced computing machine original ibm s/360 software later migrated ibm system/370 used production rilm abstracts twenty years 1969 1988 rilm ’ development procedures computerized data processing immediately adopted répertoire international de littérature ’ art rila founded upon rilm ’ model started publishing abstracts 1975 1979 rilm entered agreement lockheed research laboratory palo alto division lockheed missiles space company inc. distribution data telephone lines later agreement transferred dialog information retrieval services although available online already advent internet end twentieth century primary medium distribution bibliographic records printed volumes 1993 onward rilm longer available dialog information retrieval service 1989 national information service corporation nisc baltimore released rilm abstracts music literature cd-rom 1990s rilm abstracts became available online nisc muse 1993–2010 oclc first search 1994–2010 ovid/silverplatter 2002–2010 cambridge scientific abstracts/proquest 2002–2010 platforms rilm databases currently exclusively available ebsco information services rilm ’ first editorial office located queens college city university new york 1967–68 graduate center cuny provided institutional context rilm ’ international center since 1968 rilm staff 40 employees editors technology experts administrators governed guided board directors advisory committee commission mixte international consists appointed members international musicological society ims international association music libraries archives documentation centres iaml international council traditional music ictm barry brook ’ second report published march 1968 issue notes details deliberations commission mixte worked establish procedures functioning rilm rilm abstracts music literature rilm abstracts music literature covers significant international scholarship printed digital media language published since august 1967 consists citations articles single-author books collections essays bibliographies catalogues master ’ theses doctoral dissertations festschriften films videos technical drawings instruments facsimile editions iconographies commentaries included critical editions music ethnographic recordings conference proceedings reviews web resources well 3500 periodicals dovetail coverage répertoire international de la presse musicale differs music periodical indexes coverage books abstracts indexing broad international yet selective coverage entry provides title original language english translation title full bibliographic data abstract detailed index help convey “ aboutness ” record amplified online relevance-based order display individual record many non-english entries also include abstract language publication following unesco model rilm abstracts conceived cooperative national committees responsible contributing bibliographic citations abstracts publications issued respective countries international office new york today committees contribute 15,000 records annually edited indexed added online database another 35,000 records per year produced editors international office bibliographic information abstracts—as well journals yet covered rilm—can also submitted directly international center new york rilm abstracts music literature first abstracted bibliography humanities designated american council learned societies acls pilot project development computerized bibliographical system humanities serve model 30 constituent scholarly societies acls time rilm abstracts published print subject thesaurus name equivalencies led users preferred terms translated seventeen languages alphabetically integrated subject index practice allowed users find desired english-language term spelling personal name initiating search language familiar gradually rilm abstracts expanded multilingual environment database includes besides standard english-language abstracts also abstracts language publication languages whenever available mid-2000s rilm abstracts began expand coverage asian publications music scholarship published chinese periodicals concurrently elements bibliographic records publications issued non-roman writing systems offered bilingual rilm abstracts music literature appeared 1967 1983 triannual printed volumes indexes corresponding annual volumes well cumulative indexes corresponding five-year periods 1984 1999 annual volumes corresponding indexes since 2000 available exclusively online ebsco host rilm abstracts music literature full text july 2016 rilm abstracts music literature expanded addition music periodicals full-text rilm abstracts music literature full text raft offers access 240 music periodicals 50 countries coverage also includes reviews well obituaries editorials correspondence advertisements news published early twentieth century present addition metadata abstracts indexing raft offers searching browsing tools full-text issue cover cover database updated monthly details title ’ current coverage found title list rilm.org/fulltext new titles added time rilm music encyclopedias december 2015 rilm launched rilm music encyclopedias rme 41 titles librarian laurie sampsel asserts “ cross searching full text many titles yields results impossible highly unlikely find using print versions encyclopaedias. ” stephen henry mentions rme ’ “ ability provide access excellent european resources might otherwise available libraries less comprehensive collections. ” rme ’ titles stem different periods countries earliest jean jacques rousseau ’ dictionnaire de musique published 1775 also first edition “ grove ” edition published theodore presser 1895 largest amount titles date 2000 onward among ken bloom ’ broadway lol henderson lee stacey ’ encyclopedia music 20 century peter matzke et al. das gothic- und dark wave-lexikon richard kostelanetz ’ dictionary avant-gardes comprehensive conceived 1972 bis 2006 also included rme holds important titles ethnomusicologists among garland encyclopedia world music eileen southern ’ biographical dictionary afro-american african musicians first single comprehensive volume kind collection expands annually additions four titles average one titles regularly updated new articles additions existing articles titles listed rilm music encyclopedias index printed music 1 july 2018 rilm assumed ownership ipm previously owned james adrian music company founded 2000 george r. hill index printed music ipm digital finding aid searching specific musical works contained printed collections sets series indexes individual pieces music printed complete works composers anthologies containing pieces disparate historical periods scholarly editions provides granular level detail piece including performing forces language multiple clefs figured bass ipm includes complete contents collected editions historical series sets monuments music bibliography george r. hill norris l. stephens berkeley fallen leaf press 1997 turn based upon anna h. heyer ’ historical sets collected editions monuments music guide contents american library association 1957–1980 since 2019 ipm offers new features among biographical facts identifying composers editors lyricists hyperlinks open-access editions music incipits works otherwise difficult distinguish easy toggling collections individual works contained therein expanded search filters enable refined searching place date publication document type genre language text bibliolore rilm hosts blog bibliolore whose posts direct relationships content found rilm abstracts music literature enhancement rilm abstracts music literature full text well rilm music encyclopedias mgg online index printed music new posts appear every week many celebrate round birthdays musical figures anniversaries since inception 2009 bibliolore published 1300 posts viewed 500,000 times 1967 1999 rilm published rilm abstracts music literature print first quarterly later annually 1999 volume last print volume largest 19,619 records since 1972 rilm also published print volumes rilm retrospectives series topical bibliographies commenced first edition barry s. brook ’ thematic catalogues music annotated bibliography stuyvesant ny pendragon press 1972 recent volumes published series include speaking music music conferences 1835–1966 2004 annotated bibliography 5948 papers musical topics presented 447 conferences building previous efforts volume stays true brook ’ original vision expanding upon well covers 130 years conference proceedings worldwide scope though western europe remains focus subsequent volume liber amicorum festschriften music scholars nonmusicians 1840–1966 annotated bibliography catalogue 574 festschriften totaling 118 pages 715 entries next part volume totaling 355 pages 3881 entries documents articles pertaining music found listed festschriften preceded introductory history festschriften volumes principally devoted research materials published rilm issued first volume 1967 rilm perspectives series conference proceedings explores topics related organization ’ global mission inaugural volume music ’ intellectual history founders followers fads 2009 based papers presented conference history music historiography held graduate center cuny 16–19 march 2005 rilm issued two editions comprehensive style guide write music rilm manual style second edition introduces material included 2005 publication well revisions based suggestions readers manual differs significantly generalized style guides mla apa explicating matters gender-neutral language dead language punctuation serial comma em dash lens music manual specifically suited students rilm developed stand-alone platform advanced search browse capabilities host distribute music reference works beginning authoritative german-language music encyclopedia die musik geschichte und gegenwart mgg platform facilitates automatic translation content 100 languages via google translate integration user accounts annotations notes created saved shared cross references linking related content throughout mgg online links related content rilm abstracts music literature others well interface compatible mobile tablet devices search function hailed powerful easy-to-use tool different options available limiting search results specific search results easily located preview section mgg online based second edition includes continuous updates revisions additions platform allows user access earlier versions revised articles platform currently developed knowledge exchange | [
7331,
3339
] | Test |
3,340 | 2 | Chess_Titans:chess titans chess titans chess game 3d graphics developed oberon games included windows vista windows 7 home premium business/professional enterprise ultimate fully animated photorealistic interactive game ten difficulty levels played two participants one player computer game publicly introduced windows vista build 5219 another chess program known simply chess bundled microsoft entertainment pack 4 developed david norris former microsoft employee author chess engine ziggurat game fully animated designed windows aero glass-like view game features photorealistic board rotated 3d themes available chess pieces board showcases 3d capabilities vista game played either mouse keyboard gamepad controller windows also played windows media center using remote control provided tv tuner cards certain laptops well player turn chess titans displays last move made opponent player also click chess piece highlight valid moves piece features turned options dialog box chess titans ten difficulty levels selected options dialog box player also choose whether play black white playing computer first time player prompted choose initial difficulty level beginner level 2 intermediate level 5 advanced level 8 chess titans keeps record many games player drawn lost computer difficulty level two-player game chess board automatically turns 180 degrees opposite player move option turned chess titans saves two-player game scores | [
7879,
3937,
3263,
378,
2198,
6096,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
435,
5442,
4377,
5090,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
6558,
6575,
3407,
... | Validation |
3,341 | 1 | Valid_time:valid time temporal databases valid time vt time period database fact valid modeled reality december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define application-time period tables valid-time tables valid time coined richard t. snodgrass doctoral student database table valid time often represented two extra table-columns startvt endvt time interval closed lower bound open upper bound example valid time time fact true real world example person table gets two extra fields valid-from valid-to specifying person address valid real world april 4 1975 john father proudly registered son birth official insert new entry database stating john lives smallville april 3rd notice although data inserted 4th database states information valid since 3rd official yet know john ever move better place database valid-to filled infinity ∞ resulting entry database december 27 1994 john reports new address bigtown living since august 26 1994 bigtown official change address current entry john doe database adds new one original entry person john doe smallville 3-apr-1975 ∞ updated removed since known john stopped living smallville august 26 1994 valid-to entry filled database contains two entries john doe john dies database updated current entry updated stating john live bigtown longer new entry added officials never report heaven new address database looks like | [
1768,
3343
] | Test |
3,342 | 4 | Installer.app:installer.app installer.app freeware software installer iphone created nullriver later maintained ripdev first released summer 2007 maintained summer 2009 installer allowed users install third-party applications iphone applications directory native applications kept users could install applications variety sources wi-fi umts provided software developers directly onto iphone without requiring computer users could browse lists applications inside installer find ones wanted install june 2009 ripdev dropped support installer favor developing different package manager installer named icy 2.0 firmware released framework changes present applications compiled iphone os 1.2 longer able run 2.0 therefore installer 3 n't available 2.0 vast majority users switched cydia time ripdev russian iphone development took installer project started developing installer 4.0 installer 4.0 finished added quickpwn software payload installer 4.0 gain much popularity installer 3.0 jailbreak users become accustomed using cydia may 2011 team developers called infini-dev recreated installer 4 could run ios 4 although main current repositories compatible cydia longer compatible installer ripdev put old installer repo back online since infini-dev released installer also repos like greek-iphone offer date packages installer slava karpenko announced project work installer 5 slava karpenko revealed infini dev project dropped infini-dev took moved project apptapp team name currently working installer 5 developers working project release date tbd although public beta released july 3 2019 | [
6788,
569,
3559,
5571,
5189
] | Test |
3,343 | 1 | Transaction_time:transaction time temporal databases transaction time tt time fact stored database considered true december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define system-versioned tables transaction-time tables database table transaction interval often represented interval allowing system remove entries using two table-columns starttt endtt time interval closed lower bound open upper bound ending transaction time unknown may considered changed academic researchers rdbms represented changed largest timestamp supported keyword forever convention technically precise term coined richard t. snodgrass doctoral student | [
1768,
3341
] | Test |
3,344 | 3 | Xain'd_Sleena:xain 'd sleena main character xain galactic bounty-hunter must defeat evil forces oppress five different planets player select order play various planets 'official sequence play u.s. version game released 'solar warrior version goes set sequence instead choose planets planet played right horizontal vertical scrolling shooting enemies dodging natural hazards xain crouch double crouch prone jump double jump planets player need kill sub-boss resume certain enemies carry powerup changes default laser gun different weapon different weapons cycled powerups include laser-grenade gun 2-way gun spreadfire gun strong bullet gun respective damage directional firing capabilities end planet player goes battle boss defeated player plants bomb boss base ten seconds escape starship next half planet stage interlude stage player must battle waves enemy ships heading next planet three planets battle asteroid field giant mothership five planets liberated player play longer final stage gigantic metallic fortress facing bosses previously met five planets fighting bosses stage optional halfway stage player plants bomb fortress core 60 seconds reach exit hangar jump starship giving commodore 64 port score 499 points ace compared game firebird game crosswize.. games machine gave atari st commodore 64 zx spectrum ports scores 70 77 86 respectively | [
1237
] | Train |
3,345 | 9 | SOAP_with_Attachments_API_for_Java:soap attachments api java soap attachments api java saaj provides standard way send xml documents internet java platform saaj enables developers produce consume messages conforming soap 1.1 1.2 specifications soap attachments note used alternative jax-rpc jax-ws soap simple object access protocol created mohsen al-ghosein dave winer bob atkinson box 1998 help microsoft | [
4682,
773,
7315,
4422
] | Test |
3,346 | 3 | Macintosh_II:macintosh ii macintosh ii personal computer designed manufactured sold apple computer inc. march 1987 january 1990 first model macintosh ii family first macintosh support color display first introduced basic system 20 mb drive monitor cost 13-inch color monitor 8-bit display card price around price placed competition workstations silicon graphics sun microsystems hewlett-packard macintosh ii designed hardware engineers michael dhuey computer brian berkeley monitor industrial designer hartmut esslinger case eighteen months introduction macintosh ii updated powerful cpu sold macintosh iix early 1989 compact macintosh iicx introduced price similar original macintosh ii beginning 1990 sales stopped altogether motherboard upgrades turn macintosh ii iix macintosh iifx offered apple two common criticisms macintosh introduction 1984 closed architecture lack color rumors color macintosh began almost immediately macintosh ii project begun dhuey berkeley 1985 without knowledge apple co-founder macintosh division head steve jobs opposed features like expansion slots color basis former complicated user experience latter conform wysiwyg since color printers common instead wanted higher-resolution monochrome displays macintosh initially referred little big mac macintosh ii codenamed milwaukee dhuey hometown later went series new names including reno becks cabernet uzi paris jean-louis gassée apple products manager protected semi-clandestine project cancellation jobs fired apple september 1985 project could proceed openly macintosh ii introduced appleworld 1987 conference los angeles low-volume initial shipments starting two months later retailing us 5,498 macintosh ii first modular macintosh model called came horizontal desktop case like many ibm pc compatibles time previous macintosh computers used all-in-one design built-in black-and-white crt macintosh ii drive bays internal hard disk originally 40 mb 80 mb optional second floppy disk drive along macintosh se first macintosh computer use apple desktop bus adb introduced apple iigs keyboard mouse interface primary improvement macintosh ii color quickdraw rom color version graphics language heart machine among many innovations color quickdraw ability handle display size 8-bit color depth multiple monitors color quickdraw included macintosh ii rom relied new 68020 instructions earlier macintoshes could upgraded display color september 1988 shortly introduction macintosh iix apple increased list price macintosh ii 20 cpu macintosh ii built around motorola 68020 processor operating 16 mhz teamed motorola 68881 floating point unit machine shipped socket mmu apple hmmu chip vlsi vi475 chip installed implement virtual memory instead translated 24-bit addresses 32-bit addresses mac os would 32-bit clean system 7 memory standard memory 1 megabyte expandable 8 mb mac ii eight 30-pin simms memory installed groups four called bank bank b original macintosh ii pmmu default relied memory controller hardware map installed memory contiguous address space hardware restriction address space dedicated bank must larger bank b though memory controller designed support 16mb 30-pin simms 128mb ram original macintosh ii roms problems limiting amount ram installed 8mb macintosh iix roms also shipped fdhd upgrade fixed problem though still 32-bit memory manager boot 32-bit addressing mode mac os without assistance mode32 mode32 contained workaround allowed larger simms put bank b pmmu installed case roms boot think computer 8mb less ram mode32 reprograms memory controller dedicate address space bank allowing additional memory bank b accessed since makes physical address space discontiguous pmmu used remap address space contiguous block graphics macintosh ii includes graphics card supports true-color 16.7 million color palette available two configurations 4-bit 8-bit 4-bit model supports 16 colors 640×480 display 256 colors 8-bit video 512×384 display means vram 256 kb 8-bit model supports 256-color video 640×480 display means vram 512 kb size optional ram upgrade requiring 120ns dip chips 4-bit version supports 640×480 8-bit color video card include hardware acceleration drawing operations display apple offered choice two displays 12 black white unit expensive 13 high-resolution color display based sony trinitron technology one display could attached computer objects could easily dragged one screen next third-party displays quickly became available los angeles times reviewer called color spectacular operating system user interface remained black white even color monitors exception apple logo appeared rainbow color storage 5.25-inch 40 mb internal scsi hard disk optional second internal 800 kilobyte 3.5-inch floppy disk drive expansion six nubus slots available expansion least one used graphics card mac ii onboard graphics chipset os n't support headless booting possible connect many six displays macintosh ii filling nubus slots graphics cards another option expansion included mac286 included intel 80286 chip could used ms-dos compatibility original roms macintosh ii contained bug prevented system recognizing one megabyte memory address space nubus card every macintosh ii manufactured approximately november 1987 defect happened slot manager 32-bit clean apple offered well-publicized recall faulty roms released program test whether particular macintosh ii defect result rare find macintosh ii original roms accessories macintosh ii macintosh se first apple computers since apple sold without keyboard instead customer offered choice new adb apple keyboard apple extended keyboard separate purchase dealers could bundle third-party keyboard attempt upsell customer expensive higher-profit extended keyboard audio macintosh ii first macintosh chimes death accompany sad mac logo whenever serious hardware error occurred new extensions featured macintosh ii time a/rose sound manager macintosh ii offered three configurations systems included mouse single 800 kb 3.5-inch floppy disk drive 68551 pmmu available option | [
7890,
5732,
722,
1094,
2926,
5037,
1103,
5752,
405,
2954,
7572,
6482,
6142,
4373,
7226,
2978,
7601,
4749,
5097,
6165,
4389,
5463,
102,
5469,
4768,
3008,
5477,
2294,
7269,
6200,
6202,
4066,
3387,
3390,
1216,
2331,
4820,
4453,
1599,
1234,
... | Test |
3,347 | 3 | Bit_slicing:bit slicing bit slicing technique constructing processor modules processors smaller bit width purpose increasing word length theory make arbitrary n-bit cpu component modules processes one bit field slice operand grouped processing components would capability process chosen full word-length particular software design bit slicing less died due advent microprocessor recently used alus quantum computers used software technique e.g x86 cpus cryptography bit slice processors usually include arithmetic logic unit alu 1 2 4 8 16 bits control lines including carry overflow signals internal processor non-bitsliced cpu designs example two 4-bit alu chips could arranged side side control lines form 8-bit alu result need power two e.g three 1-bit make 3-bit alu thus 3-bit n-bit cpu 3-bit cpu higher odd-number bits n't manufactured sold volume four 4-bit alu chips could used build 16-bit alu would take eight chips build 32-bit word alu designer could add many slices required manipulate increasingly longer word lengths microsequencer control rom would used execute logic provide data control signals regulate function component alus known bit-slice microprocessor modules bit slicing although called time also used computers large scale integrated circuits lsi predecessor today vlsi very-large-scale integration circuits first bit-sliced machine edsac 2 built university cambridge mathematical laboratory 1956–1958 prior mid-1970s late 1980s debate much bus width necessary given computer system make function silicon chip technology parts much expensive today using multiple simpler thus less expensive alus seen way increase computing power cost effective manner 32-bit architecture microprocessors discussed time production univac 1100 series mainframes one oldest series originating 1950s 36-bit architecture 1100/60 introduced 1979 used nine motorola mc10800 4-bit alu chips implement needed word width using modern integrated circuits time 16-bit processors common expensive 8-bit processors z80 widely used nascent home computer market combining components produce bit slice products allowed engineers students create powerful complex computers reasonable cost using off-the-shelf components could custom-configured complexities creating new computer architecture greatly reduced details alu already specified debugged main advantage bit slicing made economically possible smaller processors use bipolar transistors switch much faster nmos cmos transistors allowed much higher clock rates speed needed example dsp functions matrix transformation xerox alto combination flexibility speed discrete cpus able deliver recent times term bit slicing re-coined matthew kwan refer technique using general purpose cpu implement multiple parallel simple virtual machines using general logic instructions perform single instruction multiple data simd operations technique also known simd within register swar initially reference eli biham 1997 paper fast new des implementation software achieved significant gains performance des using method simplify circuit structure reduce hardware cost quantum computers proposed run mips32 instruction set 50 ghz superconducting 4-bit bit-slice arithmetic logic unit alu 32-bit rapid single-flux-quantum microprocessors demonstrated | [
5012,
5680,
1237,
3156,
7043,
352,
8117,
7314,
5911,
2172,
6687
] | Validation |
3,348 | 3 | PowerPC_400:powerpc 400 powerpc 400 family line 32-bit embedded risc processor cores based powerpc power isa instruction set architectures cores designed fit inside specialized applications ranging system-on-a-chip soc microcontrollers network appliances application-specific integrated circuits asics field-programmable gate arrays fpgas set-top boxes storage devices supercomputers applied micro circuits corporation amcc bought assets concerning 400 family cores ibm april 2004 227 million market processors name ibm continues evolving cores supplying design foundry services around cores several cores also available licensing oems ibm synopsys introduced 1994 powerpc 403 one first powerpc processors first one targeted strictly embedded market compared powerpc processors era powerpc 601 powerpc 603 powerpc 604 low end lacking memory management unit mmu floating point unit fpu instance core offered custom chips pre packaged versions including versions mmu speeds ranging 20 80 mhz powerpc 403 used among appliances thin clients set-top boxes raid-controllers network switches printers first tivo used 54 mhz powerpc 403gcx amcc acquired design 403 ibm 2004 chosen market instead focusing 405 440 cores 403 popular also high performance costly applications 1996 ibm released bare bones powerpc core called powerpc 401 single issue three-stage pipeline mmu dma 2 kb instruction 1 kb data l1 caches design contained 85,000 transistors operated 100 mhz drawing 0.1 w less applications using 401 core range set-top boxes telecom switches printers fax machines powerpc 405 released 1998 designed price performance sensitive low-end embedded system-on-a-chip soc designs five-stage pipeline separate 16 kb instruction data l1 caches coreconnect bus auxiliary processing unit apu interface expandability supports clock rates exceeding 400 mhz 405 core adheres current power isa v.2.03 using book iii-e specification amcc ibm developing marketing processors using 405 cores ibm synopsys also offers fully synthesizable core ibm announced plans make specifications powerpc 405 core freely available academic research community powerpc-405-based applications include digital cameras modems set-top boxes ibm stb04xxx processors cellphones gps-devices printers fax machines network cards network switches storage devices service processors servers two 405 cores used xilinx virtex-ii pro virtex-4 fpgas 2004 hifn bought ibm powernp network processors uses 405 cores introduced 1999 powerpc 440 first powerpc core ibm include book e extension powerpc specification also included coreconnect bus technology designed interface parts inside powerpc based system-on-a-chip soc device high-performance core separate 32 kb instruction data l1 caches seven-stage out-of-order dual-issue pipeline supporting speeds 800 mhz l2 caches 256 kb core lacks floating point unit fpu associated four-stage fpu included using apu auxiliary processing unit interface 440 core adheres power isa v.2.03 using book iii-e specification xilinx currently incorporates one two cores depending member family virtex-5 fxt fpga amcc ibm developing marketing stand alone processors using 440 cores ibm synopsys also offers fully synthesized cores processing core blue gene/p supercomputer designed manufactured ibm similar powerpc 440 details disclosed introduced 2006 460 cores similar 440 reach 1.4 ghz developed multi-core applications mind 24 additional digital signal processing dsp instructions cores designed low-power high performance 464-h90 expected draw 0.53 w 1 ghz 460 core adheres power isa v.2.03 using book iii-e specification 470 embedded customizable core adhering power isa v2.05 book iii-e designed ibm together lsi implemented powerpc 476fp 2009 476fp core 32/32 kb l1 cache dual integer units simd capable double precision fpu handles dsp instructions emitting 1.6 w 1.6 ghz 45 nm fabrication process 9 stage order 5-issue pipeline handles speeds 2 ghz supports plb6 bus 1 mb l2 cache 16 cores smp configurations | [
7327,
2719,
4661,
3936,
1075,
1346,
2458,
3440,
1083,
4408,
5652,
912,
7361,
2845,
3708,
578,
5665,
4702,
1199,
7093,
1386,
4336,
1388,
6204,
7099,
2765,
1023,
234,
2501,
239,
6474,
8125,
4815,
1131,
6226,
608,
3747,
7499,
2257,
3674,
4... | Test |
3,349 | 0 | Linguatec:linguatec linguatec sprachtechnologien gmbh language technology provider specialized field machine translation speech synthesis speech recognition linguatec founded munich 1996 headquarters pasing linguatec european information society technologies prize three times website using online service voice reader web information read every language means text-to-speech function | [
1314,
5008,
7372
] | Test |
3,350 | 5 | Signal_Protocol:signal protocol signal protocol formerly known textsecure protocol non-federated cryptographic protocol used provide end-to-end encryption voice calls video calls instant messaging conversations protocol developed open whisper systems 2013 first introduced open-source textsecure app later became signal several closed-source applications claim implemented protocol whatsapp said encrypt conversations billion people worldwide facebook messenger also say offer protocol optional secret conversations skype private conversations protocol combines double ratchet algorithm prekeys triple elliptic-curve diffie–hellman 3-dh handshake uses curve25519 aes-256 hmac-sha256 primitives signal protocol development started trevor perrin moxie marlinspike open whisper systems 2013 first version protocol textsecure v1 based off-the-record messaging otr 24 february 2014 open whisper systems introduced textsecure v2 migrated axolotl ratchet design axolotl ratchet based ephemeral key exchange introduced otr combines symmetric-key ratchet modeled silent circle instant messaging protocol scimp brought support asynchronous communication offline messages major new feature well better resilience distorted order messages simpler support conversations multiple participants axolotl ratchet named critically endangered aquatic salamander axolotl extraordinary self-healing capabilities developers refer algorithm self-healing automatically disables attacker accessing cleartext later messages compromised session key third version protocol textsecure v3 made changes cryptographic primitives wire protocol october 2014 researchers ruhr university bochum published analysis textsecure v3 among findings presented unknown key-share attack protocol general found secure march 2016 developers renamed protocol signal protocol also renamed axolotl ratchet double ratchet algorithm better differentiate ratchet full protocol used name axolotl referring full protocol signal protocol based textsecure v3 additional cryptographic changes october 2016 researchers uk university oxford australia queensland university technology canada mcmaster university published formal analysis protocol concluded protocol cryptographically sound protocol provides confidentiality integrity authentication participant consistency destination validation forward secrecy post-compromise security aka future secrecy causality preservation message unlinkability message repudiation participation repudiation asynchronicity provide anonymity preservation requires servers relaying messages storing public key material signal protocol also supports end-to-end encrypted group chats group chat protocol combination pairwise double ratchet multicast encryption addition properties provided one-to-one protocol group chat protocol provides speaker consistency out-of-order resilience dropped message resilience computational equality trust equality subgroup messaging well contractible expandable membership authentication users manually compare public key fingerprints outside channel makes possible users verify identities avoid man-in-the-middle attack implementation also choose employ trust first use mechanism order notify users correspondent key changes signal protocol prevent company retaining information users communicate therefore differences messaging service providers choose handle information signal privacy policy states recipients identifiers kept signal servers long necessary order transmit message june 2016 moxie marlinspike told intercept closest piece information metadata signal server stores last time user connected server precision information reduced day rather hour minute second october 2018 signal messenger announced implemented sealed sender feature signal reduces amount metadata signal servers access concealing sender identifier sender identity conveyed recipient message encrypted key server done automatically sender recipient contacts access signal profile users also enable option receive sealed sender messages non-contacts people access signal profile contemporaneous wiretap user device and/or signal servers may still reveal device ip address accessed signal server send receive messages certain times open whisper systems first introduced protocol textsecure app later merged encrypted voice calling application called redphone textsecure app renamed signal redphone used zrtp encrypt calls march 2017 signal transitioned new webrtc-based calling system also introduced ability make video calls signal new calling system uses signal protocol end-to-end encryption november 2014 open whisper systems announced partnership whatsapp provide end-to-end encryption incorporating signal protocol whatsapp client platform open whisper systems said already incorporated protocol latest whatsapp client android support clients group/media messages key verification would coming soon april 5 2016 whatsapp open whisper systems announced finished adding end-to-end encryption every form communication whatsapp users could verify keys february 2017 whatsapp announced new feature whatsapp status uses signal protocol secure contents september 2015 g data software launched new messaging app called secure chat used signal protocol g data discontinued service may 2018 september 2016 google launched new messaging app called allo featured optional incognito mode used signal protocol end-to-end encryption march 2019 google discontinued allo favor messages app android october 2016 facebook deployed optional mode called secret conversations facebook messenger provides end-to-end encryption using implementation signal protocol january 2018 open whisper systems microsoft announced addition signal protocol support optional skype mode called private conversations signal protocol influence cryptographic protocols may 2016 viber said encryption protocol custom implementation uses concepts signal protocol forsta developers said app uses custom implementation signal protocol double ratchet algorithm introduced part signal protocol also adopted protocols omemo xmpp extension protocol xep introduced conversations messaging app approved xmpp standards foundation xsf december 2016 xep-0384 matrix open communications protocol includes olm library provides optional end-to-end encryption room-by-room basis via double ratchet algorithm implementation developers wire said app uses custom implementation double ratchet algorithm signal messenger maintains following signal protocol libraries github | [
7148,
2555,
7170,
2201,
1460,
6458,
7567,
5773,
7214,
6487,
5440,
4014,
5808,
7967,
7975,
2284,
7258,
5488,
1559,
1958,
1210,
3050,
6582,
1989,
5535,
177,
3426,
4122,
3769,
1259,
6624,
6629,
2399,
4887,
2048,
7753,
2426,
6668,
6312,
4559,... | Test |
3,351 | 2 | Finalizer:finalizer computer science finalizer finalize method special method performs finalization generally form cleanup finalizer executed object destruction prior object deallocated complementary initializer executed object creation following allocation finalizers strongly discouraged due difficulty proper use complexity add alternatives suggested instead primarily dispose pattern – see problems finalizers term finalizer primarily used object-oriented functional languages use garbage collection archetype smalltalk contrasted destructor method called finalization languages deterministic object lifetimes archetypically c++ generally exclusive – language either finalizers garbage collected destructors deterministic rare cases language may c++/cli case reference counting instead tracing garbage collection terminology varies technical usage finalizer may also used refer destructors also perform finalization subtler distinctions drawn – see terminology term final also used indicate class inherited unrelated terminology finalizer finalization versus destructor destruction varies authors sometimes unclear common usage destructor method called deterministically object destruction archetype c++ destructors finalizer called non-deterministically garbage collector archetype java codice_1 methods languages implement garbage collection via reference counting terminology varies languages objective-c perl using destructor languages python using finalizer per spec python garbage collected reference cpython implementation uses reference counting reflects fact reference counting results semi-deterministic object lifetime objects part cycle objects destroyed deterministically reference count drops zero objects part cycle destroyed non-deterministically part separate form garbage collection certain narrow technical usage constructor destructor language-level terms meaning methods defined class initializer finalizer implementation-level terms meaning methods called object creation destruction thus example original specification c language referred destructors even though c garbage-collected specification common language infrastructure cli implementation runtime environment common language runtime clr referred finalizers reflected c language committee notes read part c compiler compiles destructors ... probably instance finalizer terminology confusing thus recent versions c spec refer language-level method finalizers another language make terminology distinction d. although classes garbage collected cleanup functions called destructors finalization primarily used cleanup release memory resources deallocate memory allocated via manual memory management clear references reference counting used decrement reference counts release resources particularly resource acquisition initialization raii idiom unregister object amount finalization varies significantly languages extensive finalization c++ manual memory management reference counting deterministic object lifetimes often finalization java non-deterministic object lifetimes often implemented tracing garbage collector also possible little explicit user-specified finalization significant implicit finalization performed compiler interpreter runtime common case automatic reference counting cpython reference implementation python automatic reference counting apple implementation objective-c automatically break references finalization finalizer include arbitrary code particularly complex use automatically return object object pool memory deallocation finalization common languages like c++ manual memory management standard also occurs managed languages memory allocated outside managed heap externally language java occurs java native interface jni codice_2 objects new i/o nio latter cause problems due garbage collector able track external resources collected aggressively enough cause out-of-memory errors due exhausting unmanaged memory – avoided treating native memory resource using dispose pattern discussed finalizers generally much less necessary much less used destructors much less necessary garbage collection automates memory management much less used generally executed deterministically – may called timely manner even execution environment predicted – thus cleanup must done deterministic way must instead done method frequently manually via dispose pattern notably java python guarantee finalizers ever called thus relied cleanup due lack programmer control execution usually recommended avoid finalizers trivial operations particular operations often performed destructors usually appropriate finalizers common anti-pattern write finalizers destructors unnecessary ineffectual due differences finalizers destructors particularly common among c++ programmers destructors heavily used idiomatic c++ following resource acquisition initialization raii idiom programming languages use finalizers include c++/cli c clean go java python syntax varies significantly language java finalizer method called codice_1 overrides codice_4 method python finalizer method called codice_5 perl finalizer method called codice_6 c finalizer called destructor earlier versions standard method whose name class name codice_7 prefixed codice_8 – syntax c++ destructor methods originally called destructors analogy c++ despite different behavior renamed finalizers due confusion caused c++/cli destructors finalizers destructor method whose name class name codice_7 prefixed codice_8 c++ finalizer method whose name class name codice_11 prefixed codice_12 go finalizers applied single pointer calling codice_13 function standard library finalizer called object garbage collected – object become garbage unreachable memory deallocated finalization occurs non-deterministically discretion garbage collector might never occur contrasts destructors called deterministically soon object longer use always called except case uncontrolled program termination finalizers frequently instance methods due needing object-specific operations garbage collector must also account possibility object resurrection commonly done first executing finalizers checking whether objects resurrected aborting destruction additional check potentially expensive – simple implementation re-checks garbage even single object finalizer – thus slows complicates garbage collection reason objects finalizers may collected less frequently objects without finalizers certain cycles exacerbating problems caused relying prompt finalization resource leaks object resurrected question whether finalizer called next destroyed – unlike destructors finalizers potentially called multiple times finalizers called resurrected objects objects may repeatedly resurrect indestructible occurs cpython implementation python prior python 3.4 clr languages c avoid many languages including java objective-c least recent apple implementations python python 3.4 objects finalized requires tracking object finalized yet cases notably clr languages like c finalization tracked separately objects objects repeatedly registered deregistered finalization finalizers cause significant number problems thus strongly discouraged number authorities problems include finalizers may fail run due object remaining reachable beyond expected garbage either due programming errors due unexpected reachability example python catches exception exception caught interactive mode keeps reference stack frame exception raised keeps objects referenced stack frame alive finalizers superclass also slow garbage collection subclass finalizer potentially refer fields subclass thus field garbage collected following cycle finalizer run avoided using composition inheritance common anti-pattern use finalizers release resources analogy resource acquisition initialization raii idiom c++ acquire resource initializer constructor release finalizer destructor work number reasons basically finalizers may never called even called may called timely manner – thus using finalizers release resources generally cause resource leaks finalizers called prescribed order resources often need released specific order frequently opposite order acquired also finalizers called discretion garbage collector often called managed memory pressure little managed memory available regardless resource pressure – scarce resources held garbage plenty managed memory available garbage collection may occur thus reclaiming resources thus instead using finalizers automatic resource management garbage-collected languages one instead must manually manage resources generally using dispose pattern case resources may still acquired initializer called explicitly object instantiation released dispose method dispose method may called explicitly implicitly language constructs c codice_14 java codice_15-with-resources python codice_16 however certain cases dispose pattern finalizers used releasing resources primarily found clr languages c finalization used backup disposal resource acquired acquiring object queued finalization resource released object destruction even resource released manual disposal languages deterministic object lifetimes notably c++ resource management frequently done tying resource possession lifetime object lifetime acquiring resources initialization releasing finalization known resource acquisition initialization raii ensures resource possession class invariant resources released promptly object destroyed however languages non-deterministic object lifetimes – include major languages garbage collection c java python – work finalization may timely may happen thus resources may released long time even causing resource leaks languages resources instead generally managed manually via dispose pattern resources may still acquired initialization released calling codice_17 method nevertheless using finalization releasing resources languages common anti-pattern forgetting call codice_17 still cause resource leak cases techniques combined using explicit dispose method also releasing still-held resources finalization backup commonly found c implemented registering object finalization whenever resource acquired suppressing finalization whenever resource released user-specified finalizers allowed possible finalization cause object resurrection finalizers run arbitrary code may create references live objects objects destroyed languages without garbage collection severe bug causes dangling references memory safety violations languages garbage collection prevented garbage collector commonly adding another step garbage collection running user-specified finalizers check resurrection complicates slows garbage collection object resurrection means object may destroyed pathological cases object always resurrect finalization making indestructible prevent languages like java python python 3.4 finalize objects finalize resurrected objects concretely done tracking object finalized object-by-object basis objective-c also tracks finalization least recent apple versions similar reasons treating resurrection bug different approach used .net framework notably c visual basic .net finalization tracked queue rather object case user-specified finalizer provided default object finalized queued finalization creation dequeued finalized changed via calling codice_19 module finalization prevented calling codice_20 dequeues object reactivated calling codice_21 enqueues object particularly used using finalization resource management supplement dispose pattern implementing object pool finalization formally complementary initialization – initialization occurs start lifetime finalization end – differs significantly practice variables objects initialized primarily assign values general objects finalized general need clear values – memory simply deallocated reclaimed operating system beyond assigning initial values initialization primarily used acquire resources register object service like event handler actions symmetric release unregister actions symmetrically handled finalizer done raii however many languages notably garbage collection object lifetime asymmetric object creation happens deterministically explicit point code object destruction happens non-deterministically unspecified environment discretion garbage collector asymmetry means finalization effectively used complement initialization happen timely manner specified order specified environment symmetry partially restored also disposing object explicit point case disposal destruction happen point object may disposed still alive state weakens class invariants complicates use variables generally initialized start lifetime finalized end lifetime – though variable object value object may finalized cases variables also finalized gcc extensions allow finalization variables reflected naming finalization codice_22 construct fulfill similar purposes performing final action generally cleaning something else finished differ occur – codice_22 clause executed program execution leaves body associated codice_15 clause – occurs stack unwind thus stack pending codice_22 clauses order – finalization occurs object destroyed happens depending memory management method general simply set objects awaiting finalization – often heap – need happen specific order however cases coincide c++ object destruction deterministic behavior codice_22 clause produced local variable object value whose scope block corresponds body codice_15 clause – object finalized destructed execution exits scope exactly codice_22 clause reason c++ codice_22 construct – difference finalization defined class definition destructor method rather call site codice_22 clause conversely case codice_22 clause coroutine like python generator coroutine may never terminate – ever yielding – thus ordinary execution codice_22 clause never executed one interprets instances coroutine objects codice_22 clause considered finalizer object thus executed instance garbage collected python terminology definition coroutine generator function instance generator iterator thus codice_22 clause generator function becomes finalizer generator iterators instantiated function notion finalization separate step object destruction dates analogy earlier distinction initialization object construction literature prior point used destruction process distinguishing finalization deallocation programming languages dating period like c++ perl use term destruction terms finalize finalization also used influential book design patterns 1994 introduction java 1995 contained codice_1 methods popularized term associated garbage collection languages point generally make distinction use term finalization particularly context garbage collection | [
1616,
6605,
3515,
8066,
993,
379,
2736,
7530,
1363,
572,
1191,
401,
1855,
1019,
1208,
4164,
505,
4347,
3566,
56,
5965,
2530,
4920
] | Test |
3,352 | 4 | Copyright_alternatives:copyright alternatives various copyright alternatives alternative compensation systems acs proposed ways allow widespread reproduction digital copyrighted works still paying authors copyright owners works article discusses proposals involve form government intervention models street performer protocol voluntary collective licenses could arguably called alternative compensation systems although different generally less effective solving free rider problem impetus proposals come widespread use peer-to-peer file sharing networks authors argue acs simply practical response situation acs advocates go holding p2p file sharing fact greatly beneficial tax levy funded systems actually desirable tools paying artists sales coupled drm copy prevention technologies artistic freedom voucher afv proposal argues current copyright system providing state enforced monopoly leads enormous inefficiencies creates substantial enforcement problems afv proposed system individuals would allowed contribute refundable tax credit approximately 100 creative worker contribution would act voucher used support artistic creative work recipients afv contribution would turn required register government similar fashion religious charitable institutions tax-exempt status sole purpose registration would prevent fraud would evaluation quality work produced alongside registration artists would also ineligible copyright protection set period time 5 years example work contributed public domain allowed freely reproduced afv would affect creative workers ability receive funds via live performances proponents claim system could create 20 billion annually pay artists far greater currently flows copyrighted material 100 per adult voucher 500,000 writers musicians singers actors creative workers could paid 40,000 year baker also states realistic assume savings reduced expenditures copyrighted work would vastly exceed cost afv majority savings would come individuals deciding use afv supported work place copyrighted work well lower advertising costs afv material would public domain copyright enforcement demand would also decrease afv material increased assumptions made low end direct costs public copyrighted material would reduced around 20 percent high end way 60 percent time also likely savings would increase due lesser costs system brighter prospects 2010 article critical afv proposal graphic designer mark stanley writes like school vouchers flat tax pretenders afv assumes necessity state intervention tries bend liberty around strictures freedom ’ forgiving manipulation systematic restructuring copyright laws proposed afv far put practice concept paying artists donations tested success 2006 musician jeff rosenstock founded quote unquote records advertised first donation-based record label artists label make music available download free invite listeners make small donation want donations ticket sales live shows quote unquote records successfully recording music expanding number bands label past twelve years proposals included targeted levies internet connections blank cds digital media players etc many goods levied various countries existing private copying schemes income taxation optional payments users terms economic theory consumer opt regimes different universal ones depending scheme administered differences might large example default option isp subscribers pay acs surcharge could avoided filing signed commitment make unauthorised downloads p2p networks effects might quite similar scheme however unsuitable business owners maintain free internet connections incentive customers would responsibility business owner monitor customer internet use various proposals made base distribution royalties measures consumer downloading usage voting computer security issues addressed collecting data considerable privacy verifiability obstacles similar encountered internet voting may soluble hardware assistance currently available ordinary pcs practical way deploy acs short term would collect statistical samples much smaller population actual distribution royalties would likely carried copyright collecting society alternative compensation systems two significant advantages digital copyright impose artificial scarcity copyright works everyone download many songs ebooks films want economic terns acs eliminate deadweight loss copyright monopolies also avoid high technological social costs digital copyright enforcement two greatest drawbacks acses excess burden taxation collected need decide tax/levy rates use system although methods contingent valuation may help little question canada private copying levy unforeseen result temporarily creating acs kinds p2p downloading bmg v. doe dictum suggested also apply uploading dictum criticised appeal france december 2005 dadvsi amendments passed senate would created acs called global license amendments removed bill finally became law 2009 german social democratic party added proposal acs variant called cultural flat-rate party platform | [
2026,
8161
] | Train |
3,353 | 4 | Moralityware:moralityware moralityware subset malware infects pc intention imposing morality upon user example blocking pornographic websites first cited example appeared eweek example cited trojan deemed yusufali-a sophos said monitor internet explorer title bars content potentially relating pornography upon triggering internet explorer window minimized window take place quote koran translated several languages time trojan display exit button trap mouse cursor within window button attempted clicked displaying message oh 'm cage trojan require computer logged minimum return control mouse remains unclear whether trojan designed joke truly moral guardian regardless anti-virus makers blocking software virus definitions additionally remains seen whether indicates trend malware simply new term one-time occurrence | [
6305
] | Test |
3,354 | 4 | Poor_man's_copyright:poor man copyright poor man copyright method using registered dating postal service notary public highly trusted source date intellectual property thereby helping establish material one possession since particular time concept based notion event intellectual property misused third party poor-man copyright would least establish legally recognized date possession proof third party may possess countries central copyright registration authority difficult author prove work created united kingdom patent office says ... copy could deposited bank solicitor alternatively creator could send copy special delivery post gives clear date stamp envelope leaving envelope unopened return number private companies operate unofficial registers would sensible check carefully paying choosing route important note prove work original created ... provision us copyright law regarding type protection poor man copyright therefore substitute registration according section 101 u.s copyright act 1976 17 u.s.c 408 registration work copyright office prerequisite copyright protection furthermore eric goldman noted absence cases actually giving value poor man copyright | [] | Test |
3,355 | 3 | La_Abadía_del_Crimen:la abadía del crimen la abadía del crimen abbey crime computer video game programmed 1987 paco menéndez graphics made juan delcán game originally conceived version umberto eco book name rose however paco menéndez opera soft received reply eco order secure rights name game released la abadía del crimen abbey crime fact original working title novel name rose game videoadventure 3d isometric graphics franciscan friar william occam william baskerville book young novice adso discover perpetrator series murders medieval italian abbey player controls movement friar fra william mistakenly described monk user manual player also possibility control movement novice adso within screen fra william key controlling novice pressed follows fra william time game features characters representing monks abbey behave according programmed artificial intelligence move throughout mapping abbey show series dialogs shown written text moved along lower part screen extensive mapping abbey represented large series screens 3d isometric graphics series objects collected order successfully complete game action occurs seven days subdivided different canonical hours time day current hour indicated bottom left screen game starts abbot welcoming fra william explaining monk disappeared also explains fra william obligated obey orders abbot rules monastery attend religious services meals stay cell night research crimes pursued game novice adso remind players attend offices meals players follow forget way church refectory players disobey orders late services etc. obsequium level indicated bottom right-hand-side screen drop obsequium latin subservience obedience obsequium level drops zero abbot tolerate disrespect longer players leave abbey would result game actions missing prayer office altogether caught wandering around night result immediate expulsion end game game originally developed amstrad cpc 6128 8 bit platform ported systems zx spectrum msx pc amstrad cpc 464 version different 6128 original since several rooms decoration removed fit game 64k 464 spectrum version 128 platform music played game corresponds minuet g major sonata flute bwv 1033 bach crystal palace gwendal original pc version also featured ave maria schubert short chorus recording played speaker player went church form copy protection pc version illegal copy game created church area instead ave maria voice crying pirata pirata pirata several times heard instead game crash game programmed making capacities 8-bit computers taking high level care details plot mapping graphics artificial intelligence characters sound etc made game regarded one best video games made 8-bit computers spite singular qualities expressed positive initial reviews game modest commercial success never officially released outside spain country came achieve cult following game also considered one perfect ten games spectrum 128 according retro gamer | [
4759,
7310,
4277,
352,
3355,
578,
4060
] | Test |
3,356 | 3 | Beamrider:beamrider beamrider fixed shooter designed intellivision david rolfe published activision 1983 game ported atari 2600 slightly reduced feature set atari 5200 atari 8-bit family colecovision commodore 64 zx spectrum msx platforms beamrider takes place earth atmosphere large alien shield called restrictor shield surrounds earth player objective clear shield 99 sectors alien craft piloting beamrider ship beamrider equipped short-range laser lariat limited supply torpedoes player given three start sector clear sector fifteen enemy ships must destroyed sentinel ship appear destroyed using torpedo remain bonus points enemy ships destroyed torpedoes must simply dodged occasionally sector yellow rejuvenators extra lives appear picked extra ship shot transform ship-damaging debris activision offered special beamrider patches players could get sector 14 40,000 points sent screenshot accomplishment deseret news 1984 gave colecovision version beamrider three stars describing basically slide-and-shoot space game reviewer commodore described commodore 64 version game really good wholesome arcade zapping game | [
3079
] | Test |
3,357 | 4 | Aladdin_Knowledge_Systems:aladdin knowledge systems aladdin knowledge systems formerly company produced software digital rights management internet security company acquired safenet inc 2009 corporate headquarters located belcamp md aladdin knowledge systems founded 1985 jacob yanki margalit 23 years old soon joined brother dany margalit took responsibility product development age 18 time completing mathematics computer science degree tel aviv university early years company developed two product lines artificial intelligence package dropped early hardware product prevent unauthorized software copying similar digital rights management yanki raised 10,000 initial capital company digital rights management product became success 1993 generated sales 4,000,000 year company initial public offering nasdaq raising 7,900,000 2004 company shares also listed tel aviv stock exchange 2007 company annual revenues reached 105 million mid-2008 vector capital attempting purchase aladdin vector initially offered 14.50 per share aladdin founder margalit refused offer arguing company worth aladdin shareholders agreed merger february 2009 11.50 per share cash march 2009 vector capital acquired aladdin officially merged safenet aladdin hasp product line digital rights management drm suite protection licensing software 40 global market share used 30,000 software publishers used across many platforms windows linux mac hasp stands hardware software piracy company first product evolved complete digital rights management suite includes software option back office management application recent years also software service capability late 1990s company started diversifying began offering internet security network security products offering two product lines etoken portable device two-factor authentication pasdigital identity management mainly deployed usb token esafe line integrated network security content filtering products protecting networks cracked pirated internet-borne software used adobe macromedia 30-days product trials | [
2489,
2789,
1395,
651,
5807,
7867,
330,
6842
] | Test |
3,358 | 7 | Cloud28+:cloud28+ cloud28+ worldwide cloud computing services marketplace federation cloud computing organizations developed sponsored hewlett packard enterprise hpe december 2016 world biggest aggregator cloud computing services federation originally launched europe march 2015 aim accelerating cloud adoption europe opened members worldwide november 2016 point around 330 member companies offered around 1,300 infrastructure-as-a-service iaas platform-as-a-service paas software-as-a-service saas services cloud28+ launched hpe event frankfurt germany march 2015 development since april 2014 purpose creating single catalogue european cloud computing services hp trying figure grow ecosystem cloud suppliers europe mapping services providers isvs resellers according hp executive xavier poisson gouyou beauchamps 6 june 2017 poisson cloud leadership award 2017 datacloud europe judges citing growth cloud28+ making selection microsoft joined cloud28+ technology partner july 2017 pledging collaborate hpe create new on-boarding programme designed bring independent software vendors isvs marketplace february 2018 mphasis partnered hpe cloud28+ specific solutions services launch cloud28+ required services catalog built hpe helion version openstack open-source cloud software platform may 2016 support extended include microsoft azure vmware docker technologies service hub also extended app center automates installation docker-based applications | [
2961,
1134,
4295,
330
] | Validation |
3,359 | 2 | Commodore_DOS:commodore dos commodore dos also known cbm dos disk operating system used commodore 8-bit computers unlike doses loaded disk computer ram executed cbm dos executed internally drive dos resides rom chips inside drive run one dedicated mos 6502 family cpus thus data transfer commodore 8-bit computers disk drives closely resembles local area network connection typical disk/host transfers least seven distinctly numbered versions commodore dos known exist following list gives version numbers related disk drives unless otherwise noted drives 5¼-inch format lp code designates low profile drives drives whose model number starts 15 connect via commodore unique cbm-488 serial talk/listen protocols others use parallel ieee-488 version 2.6 far commonly used known dos version due use 1541 part c64 systems revised firmware 1571 fixed relative file bug also identified v3.0 thus possible tell two versions apart version number alone 1541 commodore floppy disk contain 144 files flat namespace subdirectories directory stored reserved track 18 located halfway hub edge 35-track single-sided disk file name may 16 bytes length theoretically unique using direct access methods directory structure possible rename file another—although accessing files may difficult impossible files identical names usually serve purpose except inform visually manage files one popular trick used example final cartridge iii add files named codice_1 type codice_2 directory files could rearranged around lines form groups many game developers warez group members demoscene hackers used clever custom directory entries well file names may contain shifted space character codice_3 directory listing viewed basic portion file name beyond codice_3 character appear separated first part file name quotation mark causing basic consider part full file name feature used create directory entries appear directory listing example user moves cursor beginning line types word codice_5 file size presses basic interprets causing program loaded memory anything colon secondary address executed since computer ignores command load alternatively user could press program automatically null byte embedded file name interrupt listing loading basic three null bytes makes difficult list basic many machine language programmers would experiment null bytes attempt make harder basic programmers access code tamper basic directory accessed non-executable pseudo-basic program case dual drive followed codice_6 first line line number 0 1 indicating drive number showing reverse video name id disk shorthand code dos version created codes vary far dos versions use incompatible disk formats 2a used 5.25-inch dos versions 3d the-3.5 inch 1581 lines size file disk blocks pseudo line number followed file name quotes three-letter type code last line shows number unallocated blocks disk pseudo line number followed words blocks free commodore 64 entering flood screen garbage instead loading directory basic ram drive assigns directory load address 0401 1025 equivalent start basic commodore pet corresponds default screen memory c64 starting second character first line screen viewing directory command overwrites basic program memory dos wedge various third-party cartridges extenders epyx fastload action replay final cartridge iii allow viewing disk directory using special commands load directory screen memory without destroying current basic program versions commodore basic include codice_7 codice_8 command performs function following file types supported presence asterisk codice_19 prepended file type directory listing example codice_20 indicates file properly closed writing drive commanded close file opened writing associated buffer flushed disk block availability map bam updated accurately reflect blocks used program crash problem user removing disk file open results orphan file also referred poison splat file buffers flushed bam accurately reflect disk usage putting disk risk corruption poison file generally accessed opened modify mode attempt use dos codice_21 command delete file may cause filesystem corruption crosslinking practical method removing one files opening file modify mode fixing validating disk see dos codice_22 command latter rebuilds bam removes poison file references directory infamous save-with-replace bug could result creation splat files codice_23 special type written on-disk directory entry files deleted files shown normal directory listing data blocks directory entries reused files subsequently created utility programs allow un-deletion files data blocks directory entries yet overwritten files codice_24 commonly used insert banners comment sections directory listing file types codice_25 example codice_26 locked deleted—they opened reading however commodore dos command explicitly set clear status many third-party utilities written allow done utilities generally read directory using direct-access commands perform necessary modifications raw data write changes back disk accessing files primarily issue host computer kernal rom computer contains necessary primitive routines needed access files basic rom contains higher level abstraction file access using basic syntax components concern dos file name parsing secondary address section give overview necessary basic commands sake completeness opening file commodore disk unit entails processing number parameters vaguely analogous file opening procedures environments since dos actually running drive controller file opening sequence must pass enough information drive assure unambiguous interpretation typical statement basic write sequential file would follows parameters following codice_27 verb follows files also loaded saved codice_5 codice_34 commands file name specifiers also used example saves basic program codice_12 program file saves basic program sequential file secondary address n't specified specified 0 e.g file saved/loaded basic memory area c64 starts default 0801 secondary address specified non-zero value e.g program loaded starting address specified file prg header first two bytes file —this form command common loading machine code programs load relocation first introduced vic-20 machine could start basic ram several different locations depending memory expansion installed older commodore pet series support relocation would effect file would loaded memory region saved load relocation happens host exception said secondary address used device-internally since pet relocate files basic programs written later commodore machines must modified using sector editor change header bytes also possible use pet built-in machine language monitor change link address basic program loading command load first program disk starting file-specified memory location one popular load commands platforms method start majority commercial software example note fact wildcard expansion pick first catalog name file disk accessed name last-used file kept memory subsequent commands load file rather first however always load first file disk directories disks two-drive units accessed codice_36 codice_37 access directory actual files one drive happen named codice_38 partial directories loaded adding colon template example would load partial directory shows files whose name starts letter k type prg partial directories still contain initial disk name line final blocks free line commodore dos also offers save-with-replace command allows file saved existing file without need first codice_39 existing file done prepending codice_40 symbol file name codice_27 codice_34 operation instance years rumors spread beginning 4040 drive bug command implementation first denied commentators prizes offered prove existence bug early 1985 compute magazine advised readers avoid using command year various authors independently published articles proving save-with-replace bug real including methods could triggered affected devices included single-drive 1541 dual-drive 4040 8050 8250 exhibit issue commentators suggested bug could avoided always explicitly specifying codice_29 drive number saving though later shown disk operations without drive number sufficient lead bug bug stemmed fact affected dos implementations modified versions dos contained earlier commodore pet dual drives 8050 created phantom drive codice_44 single-drive systems resulting allocation unnecessary buffer conditions since save-with-replace command used five drive buffers method phantom buffer allocated meet specifications resulted scrambled data written disk conditions september 1986 philip a. slaymaker published article describing great detail cause bug providing patches 1541 drive roms readers eprom burner could produce patched roms could swapped drive commodore made aware slaymaker findings never issued official update original 1541 roms fix bug revision 5 1571 roms also roms 1541-c 1541-ii drives although supported commodore known 1541-ii firmware 1541-c also used original 1541 drive using eproms fix bug drive well previously noted commodore dos accessed via command channel using syntax like used access files issuing commands dos retrieving status error messages generated response commands accomplished opening file device using 15 secondary address example retrieve display device status one could code example codice_45 hold error number zero error exists codice_46 terse text description error codice_47 represent disk track error occurred codice_31 sector track codice_47 error refers error exists equivalent returned four variables note codice_50 run mode verb also programs issue many disk commands customary open file device command channel start program close program finished commodore basic versions 4.0 later provide pseudo-variable referred codice_51 may used retrieve drive status lieu code reserved variable available earlier versions basic command channel must manually read demonstrated note immediately power-on reset dos revision returned example 1541 return error code 73 common drive models may used determine drive reset power-on state also command seeking relative type files codice_52 several block-level direct-access commands codice_53 codice_54 codice_55 block management codice_56 codice_57 drive memory manipulation execution program code drive processor codice_58 codice_59 codice_60 codice_61 user-definable functions codice_62 codice_63 commands theoretically user-definable functions rededicated accessing new functionality dos versions 1.0 | [
7161,
4670,
4307,
6801,
4771,
5562,
5926,
578,
4792,
336,
8030,
3748,
1237,
2076
] | Train |
3,360 | 4 | Navidad_virus:navidad virus w32.navidad mass-mailing worm program virus discovered december 2000 designed spread email clients microsoft outlook masquerading electronic christmas card infected computers identified blue eye icons appear windows system tray users move mouse cursor eye icons presented variety different messages including one states emmanuel-god us may god bless u.and ash lk lj | [
4759
] | Test |
3,361 | 3 | Golden_Basket:golden basket golden basket 1990 computer basketball game developed published opera soft opera sports label zx spectrum amstrad cpc msx ms-dos game features five-a-side basketball match showing lateral view | [
6380
] | Test |
3,362 | 3 | Socket_AM3+:socket am3+ am3+ modification am3 socket released mid-2011 designed cpus use amd bulldozer microarchitecture retains compatibility am3 processors vishera line amd cpus also use socket am3+ am3+ socket specification contains noteworthy design changes am3 predecessor 942 pin count am3+ increase one compared am3 socket layout am3+ socket larger pin socket diameter 0.51 mm compared 0.45 mm am3 socket faster serial link 3400 khz cpu power controller compared 400 khz am3+ socket offers improved power regulation power quality specifications including increased maximum current support 145 versus 110 also redesigned cpu cooler retention harness allowing slightly better airflow cpu cooling retaining cooler backward compatibility manufacturers brought am3+ support am3 motherboards via simple bios upgrade mechanical compatibility confirmed possible am3+ cpus fit am3 boards provided supply enough peak current another issue use sideband temperature sensor interface reading temperature cpu therefore cpu pwm fan headers may run full speed also certain power-saving features may work due lack support rapid vcore switching am3+ cpus technically pin-compatible am2 am2+ boards work due lack ddr2 controller cpu 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable | [
2539,
6599,
2541,
5895,
4931,
7163,
2997,
5559,
1735,
5377,
6351,
913,
7826,
2751,
6545,
6373,
5063,
6655,
7569,
6562,
3145,
4090,
1052,
866,
5436,
1143
] | Test |
3,363 | 5 | VoiceXML:voicexml voicexml vxml digital document standard specifying interactive media voice dialogs humans computers used developing audio voice response applications banking systems automated customer service portals voicexml applications developed deployed manner analogous web browser interprets visually renders hypertext markup language html receives web server voicexml documents interpreted voice browser common deployment architectures users interact voice browsers via public switched telephone network pstn voicexml document format based extensible markup language xml standard developed world wide web consortium w3c voicexml applications commonly used many industries segments commerce applications include order inquiry package tracking driving directions emergency notification wake-up flight tracking voice access email customer relationship management prescription refilling audio news magazines voice dialing real-estate information national directory assistance applications voicexml tags instruct voice browser provide speech synthesis automatic speech recognition dialog management audio playback following example voicexml document interpreted voicexml interpreter output hello world synthesized speech typically http used transport protocol fetching voicexml pages applications may use static voicexml pages others rely dynamic voicexml page generation using application server like tomcat weblogic iis websphere historically voicexml platform vendors implemented standard different ways added proprietary features voicexml 2.0 standard adopted w3c recommendation 16 march 2004 clarified areas difference voicexml forum industry group promoting use standard provides conformance testing process certifies vendors implementations conformant corporation ibm lucent motorola formed voicexml forum march 1999 order develop standard markup language specifying voice dialogs september 1999 forum released voicexml 0.9 member comment march 2000 published voicexml 1.0 soon afterwards forum turned control standard w3c w3c produced several intermediate versions voicexml 2.0 reached final recommendation stage march 2004 voicexml 2.1 added relatively small set additional features voicexml 2.0 based feedback implementations 2.0 standard backward compatible voicexml 2.0 reached w3c recommendation status june 2007 voicexml 3.0 next major release voicexml new major features includes new xml statechart description language called scxml w3c speech interface framework also defines standards closely associated voicexml speech recognition grammar specification srgs used tell speech recognizer sentence patterns expect hear patterns called grammars speech recognizer determines likely sentence heard needs extract semantic meaning sentence return voicexml interpreter semantic interpretation specified via semantic interpretation speech recognition sisr standard sisr used inside srgs specify semantic results associated grammars i.e. set ecmascript assignments create semantic structure returned speech recognizer speech synthesis markup language ssml used decorate textual prompts information best render synthetic speech example speech synthesizer voice use speak louder softer pronunciation lexicon specification pls used define words pronounced generated pronunciation information meant used speech recognizers speech synthesizers voice browsing applications call control extensible markup language ccxml complementary w3c standard ccxml interpreter used voicexml platforms handle initial call setup caller voice browser provide telephony services like call transfer disconnect voice browser ccxml also used non-voicexml contexts media server applications often necessary several call legs interact example multi-party conference deficiencies identified voicexml application companies designed specific scripting languages deal environment media server markup language msml convedia solution media server control markup language mscml snowshore solution snowshore owned dialogic convedia owned radisys languages also contain 'hooks external scripts like voicexml run call legs ivr functionality required ietf working group called mediactrl media control working successor scripting systems hoped progress open widely adopted standard | [
8154,
5631,
5542,
4126,
6172,
1830,
7628,
7537,
4787,
7372,
7694,
150,
3135,
6221,
4635,
7411,
2973,
4743,
1609,
7315,
87
] | Test |
3,364 | 4 | DenyHosts:denyhosts denyhosts log-based intrusion-prevention security tool ssh servers written python intended prevent brute-force attacks ssh servers monitoring invalid login attempts authentication log blocking originating ip addresses denyhosts developed phil schwartz also developer kodos python regular expression debugger denyhosts checks end authentication log recent failed login attempts records information originating ip addresses compares number invalid attempts user-specified threshold many invalid attempts assumes dictionary attack occurring prevents ip address making attempts adding codice_1 server denyhosts 2.0 support centralized synchronization repeat offenders blocked many computers site denyhosts.net gathers statistics computers running software denyhosts restricted connections using ipv4 work ipv6 denyhosts may run manually daemon cron job july 2007 register reported may july year compromised computers oracle uk listed among ten worst offenders launching brute force ssh attacks internet according public denyhosts listings investigation oracle able refute suggestions computers compromised daniel b. cid wrote paper showing denyhosts well similar programs fail2ban blockhosts vulnerable remote log injection attack technique similar sql injection specially crafted user name used trigger block site chosen attacker fixed version 2.6 since development original author phil schwartz release version 2.6 december 2006 claimed version 2.7 november 2008 actual downloadable package available development first continued february 2012 matt ruffalo github repository independent separate fork started almost-identically named denyhost sourceforge project site release different version 2.7 may 2014 version 2.9 new sourceforge project merged earlier github repository newer versions available via means software runs centralized synchronization server denyhosts versions 2.0 use never released independent synchronization server software developed jan-pascal van best since june 2015 general references | [
623,
2626,
5272,
7214,
5965,
5571,
7848,
578,
4443,
3819,
3073,
1805
] | Validation |
3,365 | 3 | ARM_Cortex-M:arm cortex-m arm cortex-m group 32-bit risc arm processor cores licensed arm holdings intended microcontroller use shipped tens billions devices cores consist cortex-m0 cortex-m0+ cortex-m1 cortex-m3 cortex-m4 cortex-m7 cortex-m23 cortex-m33 cortex-m35p cortex-m4 m7 m33 m35p cores fpu silicon option included silicon cores known cortex-mx fpu cortex-mxf x core number arm cortex-m family arm microprocessor cores designed use microcontrollers asics assps fpgas socs cortex-m cores commonly used dedicated microcontroller chips also hidden inside soc chips power management controllers i/o controllers system controllers touch screen controllers smart battery controllers sensors controllers though 8-bit microcontrollers popular past cortex-m slowly chipping away 8-bit market prices low-end cortex-m chips moved downward cortex-m become popular replacements 8-bit chips applications benefit 32-bit math operations replacing older legacy arm cores arm7 arm9 arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions including floating point optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation silicon options cortex-m cores additional silicon options cortex-m0 m0+ m1 implement armv6-m architecture cortex-m3 implements armv7-m architecture cortex-m4 cortex-m7 implements armv7e-m architecture architectures binary instruction upward compatible armv6-m armv7-m armv7e-m. binary instructions available cortex-m0 cortex-m0+ cortex-m1 execute without modification cortex-m3 cortex-m4 cortex-m7 binary instructions available cortex-m3 execute without modification cortex-m4 cortex-m7 cortex-m33 cortex-m35p thumb-1 thumb-2 instruction sets supported cortex-m architectures legacy 32-bit arm instruction set n't supported six cortex-m cores implement common subset instructions consists thumb-1 thumb-2 including 32-bit result multiply cortex-m0 cortex-m0+ cortex-m1 cortex-m23 designed create smallest silicon die thus fewest instructions cortex-m family cortex-m0 m0+ m1 include thumb-1 instructions except new instructions cbz cbnz added armv7-m architecture cortex-m0 m0+ m1 include minor subset thumb-2 instructions bl dmb dsb isb mrs msr cortex-m3 m4 m7 m33 m35p base thumb-1 thumb-2 instructions cortex-m3 adds three thumb-1 instructions thumb-2 instructions hardware integer divide saturation arithmetic instructions cortex-m4 adds dsp instructions optional single-precision floating-point unit vfpv4-sp cortex-m7 adds optional double-precision fpu vfpv5 cortex-m23 m33 add trustzone instructions arm architecture arm cortex-m series removed features older legacy cores capabilities 32-bit arm instruction set duplicated many ways thumb-1 thumb-2 instruction sets arm features n't similar feature 16-bit thumb-1 instruction set evolved time since first released legacy arm7t cores armv4t architecture new thumb-1 instructions added legacy armv5 armv6 armv6t2 architectures released 16-bit thumb-1 instructions removed cortex-m cores cortex-m0 core optimized small silicon die size use lowest price chips key features cortex-m0 core silicon options following microcontrollers based cortex-m0 core following chips cortex-m0 secondary core cortex-m0+ optimized superset cortex-m0 cortex-m0+ complete instruction set compatibility cortex-m0 thus allowing use compiler debug tools cortex-m0+ pipeline reduced 3 2 stages lowers power usage addition debug features existing cortex-m0 silicon option added cortex-m0+ called micro trace buffer mtb provides simple instruction trace buffer cortex-m0+ also received cortex-m3 cortex-m4 features added silicon options memory protection unit mpu vector table relocation key features cortex-m0+ core silicon options following microcontrollers based cortex-m0+ core following chips cortex-m0+ secondary core smallest arm microcontrollers cortex-m0+ type 2014 smallest 1.6 mm 2 mm kinetis kl03 21 june 2018 world smallest computer computer device announced based arm cortex-m0+ including ram wireless transmitters receivers based photovoltaics university michigan researchers 2018 symposia vlsi technology circuits paper 0.04mm3 16nw wireless batteryless sensor system integrated cortex-m0+ processor optical communication cellular temperature measurement device 1/10th size ibm previously claimed world-record-sized computer months back march 2018 smaller grain salt cortex-m1 optimized core especially designed loaded fpga chips key features cortex-m1 core silicon options following vendors support cortex-m1 soft-cores fpga chips key features cortex-m3 core silicon options following microcontrollers based cortex-m3 core following chips cortex-m3 secondary core following fpgas include cortex-m3 core following vendors support cortex-m3 soft-cores fpga chips conceptually cortex-m4 cortex-m3 plus dsp instructions optional floating-point unit fpu core fpu known cortex-m4f key features cortex-m4 core silicon options following microcontrollers based cortex-m4 core following microcontrollers based cortex-m4f m4 fpu core following chips either cortex-m4 m4f secondary core cortex-m7 high-performance core almost double power efficiency older cortex-m4 features 6-stage superscalar pipeline branch prediction optional floating-point unit capable single-precision optionally double-precision operations instruction data buses enlarged 64-bit wide previous 32-bit buses core contains fpu known cortex-m7f otherwise cortex-m7 key features cortex-m7 core silicon options following microcontrollers based cortex-m7 core cortex-m23 core announced october 2016 based newer armv8-m architecture previously announced november 2015 conceptually cortex-m23 similar cortex-m0+ plus integer divide instructions trustzone security features also 2-stage instruction pipeline key features cortex-m23 core silicon options following microcontrollers based cortex-m23 core cortex-m33 core announced october 2016 based newer armv8-m architecture previously announced november 2015 conceptually cortex-m33 similar cross cortex-m4 cortex-m23 also 3-stage instruction pipeline key features cortex-m33 core silicon options following microcontrollers based cortex-m33 core cortex-m35p core announced may 2018 conceptually cortex-m33 core new instruction cache plus new tamper-resistant hardware concepts borrowed arm securcore family configurable parity ecc features limited public information currently available cortex-m35p technical reference manual released 2019 following microcontrollers based cortex-m35p core documentation arm chips extensive past 8-bit microcontroller documentation would typically fit single document microcontrollers evolved everything required support documentation package arm chips typically consists collection documents ic manufacturer well cpu core vendor arm holdings typical top-down documentation tree ic manufacturers additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official arm documents | [
7876,
7519,
6082,
6421,
7890,
722,
5737,
2926,
1473,
7905,
5750,
4703,
5752,
4336,
5405,
5055,
5406,
1864,
5762,
5423,
67,
5079,
771,
1150,
446,
7960,
451,
6165,
5459,
463,
804,
5472,
469,
4041,
3008,
3365,
1556,
2659,
7990,
6910,
4061,... | Validation |
3,366 | 2 | Portage_(software):portage software portage package management system originally created used gentoo linux also chrome os sabayon funtoo linux among others portage based concept ports collections gentoo sometimes referred meta-distribution due extreme flexibility portage makes operating-system-independent gentoo/alt project concerned using portage manage operating systems bsds macos solaris notable implementations gentoo/freebsd project ongoing effort called package manager specification project pms standardise document behaviour portage allowing ebuild tree gentoo system packages used alternative package managers paludis pkgcore goal specify exact set features behaviour package managers ebuilds serving authoritative reference portage portage similar bsd-style package management known ports originally designed freebsd ports mind portage written python programming language main utility defines gentoo although system known portage consists two main parts ebuild system emerge ebuild system takes care actual work building installing packages emerge provides interface ebuild managing ebuild repository resolving dependencies similar issues two therefore roughly relation rpm yum dpkg apt gtk+-based gui porthole available working portage also himerge gui stands haskell interface emerge portage characterized main function compiling source code packages user wishes install allows customization compiler target-application options fit system specifications user wishes functionalities related system management include allowing parallel package-version installation tracking cross-package dependencies managing database installed packages providing local ebuild repository synchronizing local portage tree remote repositories functionalities related individual package installation include specifying compilation settings target machine choosing package components portage distinguishes three levels stability ebuilds stable e.g. software works intended known security issues time release keyword masked mainly packages sufficiently tested target system architecture considered stable hard masked broken insecure packages emerge command-line tool heart portage command customizable many options modifiers emerge tool important utility accessing features portage command line program calculates manages dependencies executes ebuilds maintains local portage tree database installed packages compilation settings used ebuilds changed cflags environment variable based specifications individual computer user desire optimization emerge utility executes ebuilds sandbox environment way system protected software executed ebuild resulting binaries merged successful build sandboxed install emerge installs dependencies affected use flag-settings decide optional features included installing upgrading application emerge command also used download install precompiled binary files portage system offers use use flags allows users indicate software features would like include exclude building packages example use flag include dvd support available packages compiled flag enabled use flags affect dependencies required generally affecting optional features built given program compiled example packages use configure script use flag codice_1 would translate codice_2 specification use flags usual way configure programs gentoo use flags may set manually via user-friendly tools 'ufed use flag editor lists flags along description list available use flags available gentoo website use flag index gentoo default use binary packages package management systems like pacman employing instead format known ebuild whereas rpm binaries precompiled binaries ebuilds shell scripts variables functions contain description software instructions obtain configure compile install closely akin powerful .spec files distributed srpms 19,000 ebuilds available majority distributed gentoo mirrors new updated ebuilds obtained synchronizing local ebuild repository mirrors done executing command codice_3 historically gentoo provided pre-compiled binary packages many common programs especially lengthy compile mozilla firefox openoffice.org still installed emerge appending -bin package name instead install binary version gentoo binary packaging format .tbz2 file tar bzip2 compression additional metadata feature enables building binary packages one system using portage codice_4 codice_5 followed quick installation identical systems portage codice_6 codice_7 see portage features gentoo linux handbook information masking gentoo determines packages suitable system ebuilds designed different architectures experimental software usually masked manner prevents stable system installing without user intervention packages generally require testing often work fine said keyword masked i.e available systems accept_keywords make.conf entry starting character codice_8 codice_9 codice_10 codice_11 standard way unmask individual keyword masked package adding file full package name keyword codice_12 users make subdirectories well allowing custom organization example masked package multiple masked dependencies user could make directory name original masked package put mask files package dependencies directory scheme replaces older scheme codice_13 text file list packages known problems considered mature enough candidates stable hard masked one various package.mask files /usr/portage/profiles entries generally accompanied comment developers explaining reason mask | [
5017,
5726,
4675,
6428,
5386,
2581,
7555,
2594,
781,
5092,
4759,
7246,
7619,
7251,
5480,
4778,
4059,
3036,
1582,
4441,
523,
163,
1598,
169,
5530,
4832,
8055,
1621,
5200,
5545,
6609,
1260,
5912,
6268,
5571,
213,
578,
2034,
2771,
6663,
16... | Test |
3,367 | 1 | Database_seeding:database seeding database seeding initial seeding database data seeding database process initial set data provided database installed especially useful want populate database data want develop future often automated process executed upon initial setup application data dummy data necessary data initial administrator account \migrations\configuration.cs appbundle/datafixtures/orm/customer.yml version 1 hautelook/alicebundle app/database/seeds/users.php | [
2702
] | Test |
3,368 | 9 | Lua_(programming_language):lua programming language lua meaning moon lightweight high-level multi-paradigm programming language designed primarily embedded use applications lua cross-platform since interpreter compiled bytecode written ansi c lua relatively simple c api embed applications lua originally designed 1993 language extending software applications meet increasing demand customization time provided basic facilities procedural programming languages complicated domain-specific features included rather included mechanisms extending language allowing programmers implement features lua intended general embeddable extension language designers lua focused improving speed portability extensibility ease-of-use development lua created 1993 roberto ierusalimschy luiz henrique de figueiredo waldemar celes members computer graphics technology group tecgraf pontifical catholic university rio de janeiro brazil 1977 1992 brazil policy strong trade barriers called market reserve computer hardware software atmosphere tecgraf clients could afford either politically financially buy customized software abroad reasons led tecgraf implement basic tools needed scratch lua predecessors data-description/configuration languages sol simple object language del data-entry language independently developed tecgraf 1992–1993 add flexibility two different projects interactive graphical programs engineering applications petrobras company lack flow-control structures sol del petrobras felt growing need add full programming power evolution lua language authors wrote lua 1.0 designed way object constructors slightly different current light flexible style incorporated data-description syntax sol hence name lua sol also portuguese word sun lua word moon lua syntax control structures mostly borrowed modula codice_1 codice_2 codice_3/codice_4 also taken influence clu multiple assignments multiple returns function calls simpler alternative reference parameters explicit pointers c++ neat idea allowing local variable declared need snobol awk associative arrays article published dr. dobb journal lua creators also state lisp scheme single ubiquitous data-structure mechanism list major influence decision develop table primary data structure lua lua semantics increasingly influenced scheme time especially introduction anonymous functions full lexical scoping several features added new lua versions versions lua prior version 5.0 released license similar bsd license version 5.0 onwards lua licensed mit license permissive free software licences almost identical lua commonly described multi-paradigm language providing small set general features extended fit different problem types lua contain explicit support inheritance allows implemented metatables similarly lua allows programmers implement namespaces classes related features using single table implementation first-class functions allow employment many techniques functional programming full lexical scoping allows fine-grained information hiding enforce principle least privilege general lua strives provide simple flexible meta-features extended needed rather supply feature-set specific one programming paradigm result base language light—the full reference interpreter 247 kb compiled—and easily adaptable broad range applications lua dynamically typed language intended use extension scripting language compact enough fit variety host platforms supports small number atomic data structures boolean values numbers double-precision floating point 64-bit integers default strings typical data structures arrays sets lists records represented using lua single native data structure table essentially heterogeneous associative array lua implements small set advanced features first-class functions garbage collection closures proper tail calls coercion automatic conversion string number values run time coroutines cooperative multitasking dynamic module loading classic hello world program written follows print hello world print 'hello world comment lua starts double-hyphen runs end line similar ada eiffel haskell sql vhdl multi-line strings comments adorned double square brackets factorial function implemented function example function factorial n end lua four types loops codice_2 loop codice_3 loop similar codice_7 loop numeric codice_8 loop generic codice_8 loop -- condition true condition end repeat condition first last delta -- delta may negative allowing loop count end generic codice_8 loop key value pairs _g end would iterate table codice_11 using standard iterator function codice_12 returns codice_13 also nested loop loop inside another loop local grid row ipairs grid end lua treatment functions first-class values shown following example print function behavior modified end future calls codice_14 routed new function lua lexical scoping old print function accessible new modified print lua also supports closures demonstrated function addto x end fourplus addto 4 print fourplus 3 -- prints 7 -- also achieved calling function following way print addto 4 3 -- calling returned function 'addto 4 argument 3 directly new closure variable codice_15 created every time codice_16 called new anonymous function returned always access codice_15 parameter closure managed lua garbage collector like object tables important data structures design built-in composite data type lua foundation user-created types conceptually similar associative arrays php dictionaries python hashes ruby perl table collection key data pairs data referenced key words hashed heterogeneous associative array tables created using codice_18 constructor syntax tables always passed reference see call sharing key index value except codice_13 nan including functions table often used structure record using strings keys use common lua features special syntax accessing fields using table store related functions act namespace tables automatically assigned numerical key enabling used array data type first automatic index 1 rather 0 many programming languages though explicit index 0 allowed numeric key codice_20 distinct string key codice_21 length table codice_22 defined integer index codice_23 codice_24 codice_13 codice_26 codice_13 moreover codice_28 codice_13 codice_23 zero regular array non-nil values 1 given codice_23 length exactly codice_23 index last value array holes nil values non-nil values codice_33 indices directly precedes codice_13 value may consider nil value end array table array objects using hash map emulate array normally slower using actual array however lua tables optimized use arrays help avoid issue extensible semantics key feature lua metatable concept allows lua tables customized powerful ways following example demonstrates infinite table codice_23 codice_36 give codice_23-th fibonacci number using dynamic programming memoization fibs 1 1 -- initial values fibs 1 fibs 2 setmetatable fibs although lua built-in concept classes object-oriented programming achieved using two language features first-class functions tables placing functions related data table object formed inheritance single multiple implemented using metatable mechanism telling object look nonexistent methods fields parent object concept class techniques rather prototypes used similar self javascript new objects created either factory method constructs new objects scratch cloning existing object lua provides syntactic sugar facilitate object orientation declare member functions inside prototype table one use equivalent calling class methods also makes use colon equivalent creating basic vector object vector.__index vector function vector new x z -- constructor end function vector magnitude -- another method end local vec vector new 0 1 0 -- create vector print vec magnitude -- call method output 1 print vec.x -- access member variable output 0 lua programs interpreted directly textual lua file compiled bytecode run lua virtual machine compilation process typically invisible user performed run-time done offline order increase loading performance reduce memory footprint host environment leaving compiler lua bytecode also produced executed within lua using codice_38 function string library codice_39 functions lua version 5.3.4 implemented approximately 24,000 lines c code like cpus unlike virtual machines stack-based lua vm register-based therefore closely resembles actual hardware design register architecture avoids excessive copying values reduces total number instructions per function virtual machine lua 5 one first register-based pure vms wide use perl's parrot android dalvik two well-known register-based vms example bytecode listing factorial function defined shown codice_40 5.1 compiler lua intended embedded applications provides c api purpose api divided two parts lua core lua auxiliary library lua api design eliminates need manual reference management c code unlike python api api like language minimalistic advanced functionality provided auxiliary library consists largely preprocessor macros assist complex table operations lua c api stack based lua provides functions push pop simple c data types integers floats etc stack well functions manipulating tables stack lua stack somewhat different traditional stack stack indexed directly example negative indices indicate offsets top stack example −1 top recently pushed value positive indices indicate offsets bottom oldest value marshalling data c lua functions also done using stack call lua function arguments pushed onto stack codice_41 used call actual function writing c function directly called lua arguments read stack example calling lua function c int main void running example gives c api also provides special tables located various pseudo-indices lua stack codice_42 prior lua 5.2 globals table codice_11 within lua main namespace also registry located codice_44 c programs store lua values later retrieval possible write extension modules using lua api extension modules shared objects used extend functionality interpreter providing native facilities lua scripts lua side module appears namespace table holding functions variables lua scripts may load extension modules using codice_45 like modules written lua growing collection modules known rocks available package management system called luarocks spirit cpan rubygems python eggs prewritten lua bindings exist popular programming languages including scripting languages c++ number template-based approaches automatic binding generators video game development lua widely used scripting language game programmers perhaps due perceived easiness embed fast execution short learning curve 2003 poll conducted gamedev.net showed lua popular scripting language game programming 12 january 2012 lua announced winner front line award 2011 magazine game developer category programming tools large number non-game applications also use lua extensibility luatex implementation tex type-setting language redis key-value database nginx web server scribunto extension lua available scripting language mediawiki software powers wikipedia wikis among uses allowing integration data wikidata articles powering | [
361,
2176,
7514,
1819,
4302,
6082,
6428,
6095,
1840,
1474,
3968,
1102,
1478,
4705,
7914,
6116,
7557,
753,
7201,
417,
54,
7570,
5420,
1495,
7573,
7933,
1882,
7581,
771,
2966,
6489,
775,
7582,
5786,
5787,
6497,
2619,
4017,
5091,
790,
6507... | Test |
3,369 | 5 | Financial_Information_eXchange:financial information exchange financial information exchange fix protocol electronic communications protocol initiated 1992 international real-time exchange information related securities transactions markets trillions dollars traded annually nasdaq alone financial service entities investing heavily optimizing electronic trading platforms employing direct market access dma increase speed financial markets managing delivery trading applications keeping latency low increasingly requires understanding fix protocol fix protocol specification originally authored 1992 robert bob lamoureux chris morstatt enable electronic communication equity trading data fidelity investments salomon brothers fix initially addressed information broker-dealers institutional clients time information communicated verbally telephone fidelity realized information broker-dealers could routed wrong trader simply lost parties hung phones wanted communications replaced machine-readable data could shared among traders analyzed acted stored example broker-dealers call indication interest ioi buy sell block stock fix initiative created new messages ioi according fix trading community fix become de facto messaging standard pre-trade trade communication global equity markets expanding post-trade space support straight-through processing well continuing expand foreign exchange fixed income derivatives markets fix trading community non-profit industry-driven standards body mission address business regulatory issues impacting multi-asset trading across global financial markets increased use standards including fix protocol messaging language delivering operational efficiency increased transparency reduced costs risk market participants fix widely used sell side institutions well buy side brokers/dealers financial markets among users mutual funds investment banks brokers stock exchanges ecns see fix trading community organization extensive list major fix users fix become standard electronic protocol pre-trade communications trade execution although mainly used equity transactions front office area bond derivatives fx-transactions also possible one could say whereas swift standard back office messaging fix standard front office messaging however today membership fix protocol ltd. extending fix block trade allocation phases trading process every market virtually every asset class originally fix standard monolithic including application layer semantics message encoding session layer single technical specification remained monolithic fix version 4.2 thereafter message encodings session layer specifications began split separate documents ultimately fix evolved family related technical standards message encoding called presentation layer open systems interconnection model osi model responsible wire format messages original fix message encoding known tagvalue encoding field consists unique numeric tag value tag identifies field semantically therefore messages self-describing tagvalue encoding character-based using ascii codes message fields delimited using ascii 01 start header character composed header body trailer fix.4.4 header contained three fields 8 codice_1 9 codice_2 35 codice_3 tags fixt.1.1 fix.5.0 header contains five mandatory fields one optional field 8 codice_1 9 codice_2 35 codice_3 49 codice_7 56 codice_8 1128 codice_9 present must 6th position content body message specified tag 35 codice_3 message type defined header last field message tag 10 fix message checksum always expressed three-digit number e.g codice_11 header+body+trailer fix content example fix message execution report pipe character used represent soh character fixmessage body length 9 correct checksum 10 checked using source available quickfix open-source fix implementation fix messages formed number fields field tag value pairing separated next field delimiter soh 0x01 tag integer indicates meaning field value array bytes hold specific meaning particular tag e.g tag 48 securityid string identifies security tag 22 idsource integer indicates identifier class used values may plain text encoded pure binary case value preceded length field fix protocol defines meanings tags leaves range tags reserved private use consenting parties fix protocol also defines sets fields make particular message within set fields mandatory others optional ordering fields within message generally unimportant however repeating groups preceded count encrypted fields preceded length message broken three distinct sections head body tail fields must remain within correct section within section position may important fields act delimiters stop one message running next final field fix message tag 10 checksum two main groups messages—admin application admin messages handle basics fix session allow session started terminated recovery missed messages application messages deal sending receiving trade-related information order request information current state subsequent execution order body length character count starting tag 35 included way tag 10 excluded soh delimiters count body length. br example soh replaced by'| br body length 65. br soh delimiter end tag=value belongs tag checksum fix message always last field message composed three characters tag 10 given summing ascii value characters message except checksum field performing modulo 256 resulting summation example message summation ascii values including soh character value 1 ascii table results 4158 performing modulo operation gives value 62 since checksum composed three characters 062 used fixml xml schema fix messages semantically equivalent tagvalue encoded messages takes advantage xml parser technology fixml commonly used back-office clearing applications rather trading simple binary encoding defines wire format using primitive data types native computing systems message encoding decoding therefore much lower latency character-based protocols since translation needed put data format computers use aside latency advantages performance deterministic sbe messages constrained templates fixed-length data elements preferred another consequence fields generally fixed position message filters routers need crack entire message access key fields sbe developed fix high performance working group support high performance trading tagvalue encoding deemed longer fit-for-purpose since character based rather binary variable-length fields messages result non-deterministic performance unlike tagvalue fixml sbe message self-describing data sent wire minimal header identify template controls message metadata describes message layout exchanged out-of-band peers fix trading community publishes xml schema sbe message schemas message schema may contain number message templates template describes fields constitute message additionally schema provides listing simple composite data types may reused number fields fix trading community also developed standard mappings fix message protocols including session layer responsible message exchange including checkpoint recovery mechanisms original fix session protocol name since part monolithic specification covering application layer semantics message encoding well however starting fix version 5.0 session layer split independent specification introduction fixt fixt largely original unnamed session layer version 4.x offered one significant innovation -- provided mechanism mix fix application layer versions common session version current fixt version 1.1 theoretically fixt transport independent however usually employed transmission control protocol tcp fixt point-to-point protocol guarantees message delivery directions messages sent direction carry message sequence number message header communication fault peer may request retransmission missed messages message delivery supported even event disconnection later reestablishment session implement session establishment guaranteed delivery fixt classic fix 4.x define session message types fixp developed fix high performance working group meet needs high performance trading primary need low latency message encoding decoding control message delivery guarantees provide low latency binary message encodings supported session layer application messages actual wire format abstracted fixp specification users may select fix encoding choice long peers agree protocol use early development used simple binary encoding fixp covers point-to-point multicast use cases common primitives point-to-point session established peers negotiate delivery guarantees among following choices delivery guarantees may asymmetrical example trader may enter orders idempotent flow executions returned recoverable flow fast moving markets delay inherent retransmission often undesirable resulting missed opportunities bad trades diagram fix messaging looks buyside/customer sellside/supplier latest version fix protocol implements transport independence permitting multiple versions application messages carried single version transport independent fix session fixt.1.1 higher transport independence also paves way transport protocols message queues web services used instead traditional fix tcp fix supports algorithmic trading use fix algorithmic trading definition language fixatdl fix protocol limited released fast protocol stands fix adapted streaming fast binary protocol used mostly sending multicast market data via udp connections many companies offer fix testing products services | [
3369,
6986,
7637,
7315
] | Test |
3,370 | 9 | Common_Lisp_Music:common lisp music clm originally acronym common lisp music music synthesis signal processing package music v family created bill schottstaedt runs number various lisp implementations part snd audio editor using scheme ruby forth also realtime implementation snd-rt developed kjetil s. matheussen software used digitally stretch beethoven 9th symphony create leif inge 9 beet stretch | [
1716,
3250,
6876,
1445,
6888,
2915,
6352,
6191,
4878,
4332,
5494,
5757,
6116,
3212,
7750,
6210,
1116,
6471,
940,
1676,
4535,
5077,
7032,
2249,
1890,
6408,
5266
] | Test |
3,371 | 1 | List_of_in-memory_databases:list in-memory databases article list in-memory database system software | [
7605,
4384,
5544,
5106,
7715,
6184,
3863,
1096,
4781,
4697,
402,
4798,
7379,
7468,
5419,
1132,
7213,
6489,
1435
] | Test |
3,372 | 9 | Spacecraft_command_language:spacecraft command language spacecraft command language satellite control language spacecraft control language systems test operation language stol satellite test operation language etc computer command language commanding spacecraft mission systems ultimately languages used command remote spacecraft telecommands also used development verification onboard systems prototype engineering model flight hardware software ground systems prior launch spacecraft command languages typically written format similar human languages contrast telecommand protocols usually binary formats although may displayed hexadecimal broken labelled fields command displays spacecraft command languages scl plexil executed spacecraft onboard executive nasa gsfc systems test operation language stol functional requirements language description 1978 illustrates concept systems test operation language stol provides means user communication payloads applications programs ground system elements systems operation language enables operator user communicate command computer system system interprets high level language directive user performs indicated action executing program printing snapshot sending payload command using stol payload test operations personnel may relieved repetitive tasks ensuring recurring fixed sequences operations always performed exactly order guaranteeing repeatability test procedures project operations control center pocc operations original language acronym stol applied gsfc systems test operation language designed 1970s nasa goddard space flight center provide standardized language functionality previously represented least three satellite operation language efforts gsfc various stols created locations mission-specific site-specific names proliferated extent jargon interpreter program prototyped one gsfc convert english statements limited set mstol directives plans stol dialects.. languages later developed offered private companies part satellite control software suites following examples show natural language cstol commands lower-level spacecraft commands translated particular spacecraft first two examples show two different cstol commands translated spacecraft command indicating spacecraft command takes different values argument last example cstol command translated another cstol command would translated spacecraft command still-human-readable textual format command uplinked as-is spacecraft ability read text format otherwise command translated packed binary representation ground prior uplink | [
5102,
5612,
3966
] | Test |
3,373 | 9 | Symbolic_data_analysis:symbolic data analysis symbolic data analysis sda extension standard data analysis symbolic data tables used input symbolic objects made output result data units called symbolic since complex standard ones contain values categories also include internal variation structure sda based four spaces space individuals space concepts space descriptions space symbolic objects space descriptions models individuals space symbolic objects models concepts | [] | Test |
3,374 | 4 | Security_of_automated_teller_machines:security automated teller machines automated teller machines atms first introduced 1939 2015 3 million units installed worldwide number atm units increase machines prone hacker attacks fraud robberies security breaches past main purpose atms deliver cash form bank notes debit corresponding bank account however atms becoming complicated serve numerous functions thus becoming high priority target robbers hackers modern atms implemented high-security protection measures work complex systems networks perform transactions data processed atms usually encrypted hackers employ discreet hacking devices hack accounts withdraw account balance alternative unskilled robbers threaten bank patrons weapon loot withdrawn money account main article atm fraud atm vandals either physically tamper atm obtain cash employ credit card skimming methods acquire control user credit card account credit card fraud done inserting discreet skimming devices keypad credit card reader alternative way credit card fraud identify pin directly devices cameras concealed near keypad validation on-line pin occurs terminal question connected central database pin supplied customer always compared recorded reference pin financial institutions however one disadvantage malfunction network renders atm unusable fixed off-line pin validation atm connected central database condition off-line pin validation atm able compare customer entered pin pin reference terminal must able perform cryptographic operations must required encryption keys disposal offline validation scheme extremely slow inefficient offline pin validation obsolete atms connected central server protected wireless networks three pin procedures operation high security interchange transaction supplied pin encrypted entry terminal step secret cryptographic key used addition transaction elements encrypted pin transmitted acquirer system encrypted pin routed acquirer system hardware security module within pin decrypted cryptographic key used interchange decrypted key immediately reencrypted routed issuer system normal communications channels lastly routed pin decrypted issuer security module validated basis techniques on-line local pin validation different transaction methods used shared atms regards encipherment pin message authentication among called zone encryption method trusted authority appointed operate behalf group banks could interchange messages atm payment approvals successful communication banks atms incorporation cryptographic module usually called security module critical component maintaining proper connections banks machines security module designed tamper resistant security module performs plethora functions among pin verification pin translation interchange key management message authentication use pin interchanges causing concerns security pin translated security module format used interchange moreover security module generate protect maintaining keys associated user network personal verification process begins user supply personal verification information information include pin provided customer information recorded bank account cases storage cryptographic key bank card called personal key pk personal identification processes done authentication parameter ap capable operating two ways first option ap time invariant second option ap time variant case ip based time variant information transaction request message case ap used message authentication code mac use message authentication made recourse find stale bogus messages might routed communication path detection modified messages fraudulent traverse non-secure communication systems cases ap serves two purposes security breaches electronic funds transfer systems done without delimiting components electronic funds transfer systems three components communication links computers terminals atms first communication links prone attacks data exposed passive means direct means device inserted retrieve data second component computer security different techniques used acquire access computer accessing via remote terminal peripheral devices card reader hacker gained unauthorized access system programs data manipulated altered hacker terminal security significant component cases cipher keys reside terminals absence physical security abuser may probe key substitutes value | [] | Test |
3,375 | 4 | Video_door-phone:video door-phone video door-phone also known video door entry video intercom stand-alone intercom system used manage calls made entrance building residential complex detached family home workplace etc access controlled audiovisual communication inside outside main feature video door entry enables person indoors identify visitor wish engage conversation and/or open door allow access person calling video door entry consists outside indoor elements outdoor panel outside electronic lock release indoor monitor outdoor panel street panel installed beside entrance door gateway incorporates different elements ready use climate conditions one several pushbuttons make call usually one per home apartment micro camera adapted night vision capture image caller microphone pick voice speaker reproduce voice occupant indoors video door entry panel may include push buttons call homes offices camera capture street scene video entry monitor allows occupant see called talk visitor open door installed indoors monitor consists screen showing image person calling microphone earpiece conversation pushbutton trigger door lock release communication set full duplex electric door release device installed door lock operated inside building lift latch clear way visitor several variations basic format addition outdoor panels one pushbutton per apartment possible find others numeric keypad case designed large residential installations homes identified codes others built-in cardholders panels even small screens guide user facilitate entry people disabilities video entry monitors earpiece similar telephone handset others hands-free examples monitors memories store image every time someone calls door touchscreen video entry systems video door phone classified two possible classification 1 security layers level 1 security – security layer added vdp system community entrance layer given guard directly verify entry visitor community systems community level b level 2 security also known lobby security – get access lobby apartment case visitor dial number flat flat owner allows access visitor lobby entrance c. level 3 security case visitor communicates outdoor camera front house door villa gate 2 technologies classification a. standalone – standalone vdp device used villas individual home owners types technology standalone vdp – i. analog vdp – analog display camera ii.connected digital vdp – digital lcd display digital camera usually image capture video capturing ability bell pressed case normally additional camera integration also allowed iii wireless video door bell vdb camera units gets connected interned router allows communication ones mobile tablet top communicate visitor b. multi-apartment- solution mass housing scenario i. analog multi-apartment systems – analog vdp providing 3 tier security ii ip vdp multi-apartment system – ip vdp 3 tier security integration bms building management system security systems like intrusion cctv building security cases even home automation visitor presses one outdoor panel pushbuttons built-in camera connected image captured outdoors appears monitor screen connection takes place automatically need activate equipment one essential elements video door entry point person inside building open door wish begin conversation usually secret heard users facility equipment also disconnects automatically set time elapsed video entry system whole runs low voltage energy building ’ trunk many terminals currently market ready accept extensions making monitor small automatic function control centre user view one several additional cameras installed access points trigger light switches open second door etc video door entry systems commonly found integrated different access control systems means elements installed outdoor panel allow certain previously authorised users access premises common means proximity cards fingerprint readers keypad secret numbers even bluetooth triggered mobile phone different equipment sets currently found market make use accessible people different disabilities thinking visually impaired outdoor panel may include information braille alongside pushbuttons voice synthesiser also added indicates door opened people hearing impairment outdoor panel may include screen icons signalling communication status user calling someone speaking indoors opening door also type user mind monitor may fitted inductive loop element interacts conventional hearing aids facilitate conversation outside without presence noticed users kit also includes visual audio call alerts | [] | Test |
3,376 | 4 | David_Wang_(hacker):david wang hacker david wang jail break developer mobile phone hacker apple phone hacking competition hacked iphone use android apps platform | [
6788
] | Test |
3,377 | 3 | Schools_Interoperability_Framework:schools interoperability framework schools interoperability framework systems interoperability framework uk sif data-sharing open specification academic institutions kindergarten workforce specification used primarily united states canada uk australia new zealand however increasingly implemented india elsewhere specification comprises two parts xml specification modeling educational data specific educational locale north america australia uk service-oriented architecture soa based direct brokered restful-models sharing data institutions international shared locales sif product industry initiative enables diverse applications interact share data sif estimated used 48 us states 6 countries supporting five million students specification started maintained specification body schools interoperability framework association renamed access learning community a4l 2015 traditionally standalone applications used public school districts limitation data isolation difficult access share data often results redundant data entry data integrity problems inefficient incomplete reporting cases student information appear multiple places may identical example decision makers may working incomplete inaccurate information many district site technology coordinators also experience increase technical support problems maintaining numerous proprietary systems sif created solve issues schools interoperability framework sif began initiative chiefly championed initially microsoft create blueprint educational software interoperability data access designed initiative drawing upon strengths leading vendors k-12 market enable schools professionals build manage upgrade systems endorsed close 20 leading k-12 vendors student information library transportation food service applications first pilot sites began summer 1999 first sif-based products began show 2000 beginning clear approach would become national standard united states sif edi vying position 2000 sif began taking lead 2002 2000 national school boards association held panel discussion annual meeting topic sif 2007 united kingdom becta championed adoption sif national standard schools data interchange 2008 announced uk standard become known systems interoperability framework reflects intention uk develop sif used organizations beyond schools sif specification supported a4l community a4l members collaborate variety technical solutions standards include limited schools interoperability framework members include districts states vendors non-profits various government agencies sif pains challenges come soa specification data model building specifications via consensus everyone always happy sometimes end product n't perfect also given moving parts modeling entire k12 enterprise specification many points possible failure particular sif record-level automated system moving standardized data one source another heterogeneous environment out-of-the-box interoperability ease use implementation part 12-18 month focus 2007 2009 sif 2.x relied using broker called zone integration server zis manage communication applications sif 3.x sif 2.8+ allows brokered direct communication applications rather application vendor try set separate connection every application sif defined set rules definitions share data within sif zone — environment logical grouping applications software application agents communicate central communication point zones managed enterprise data broker sometimes called zone integration server zis single zis manage multiple zones however current infrastructure specification supports restful connections directly applications and/or utilizing brokered environment data travels applications series standardized messages queries events written xml json sent using internet protocols sif specification defines events choreography allows data move back forth applications direct sif allow one application communicate directly another via simple rest calls put post get delete resources ideal simple environments two maybe three players complex choreographies necessary easier implement brokered environment two- three-node situations sif agents pieces software exist either internal application installed next sif agents function extensions application serve intermediary software application sif zone brokered environments broker keeps track agents registered environment zones manages transactions agents enabling provide data respond requests broker controls access routing security within system standardization behavior agents broker means sif add standard functionality zone simply adding sif-enabled applications time vertical interoperability situation sif agents different levels organization communicate using sif zone vertical interoperability involves data collection multiple agents upward publishing information multiple agents downward example state-level data warehouse may listen changes district-level data warehouses update database accordingly state entity may wish publish teacher certification data districts three pieces sif specification deal directly vertical interoperability student locator object vertical reporting object data warehouse object good example would century consultants sis agent working pearson slf agent sending student data state agency getting student testing identifiers return sif designed rest soap namespaces web service standards mature today result robust soa vetted current soap specifications use soap ws standards 2.0 sif web services specification began process joining two worlds 3.0 infrastructure specification completes transformation soa specification using modern tools 2.0 web services specification allows generalized xml messaging structures typically found enterprise messaging systems use concept enterprise service bus web service standards also designed support secure public interfaces xml appliances make setup configuration easier sif 2.0 web services specification allows use web services communicate zone 3.0 infrastructure allows data payload moved across designed around restful design patterns allows brokered direct exchanges restful manner utilizing either xml json payloads starting sif 3.0 sif specification relies entirely-unless impossible practical- common education data standards ceds controlled vocabulary element definition allows transport ceds wire compatible ceds-compliant data sets similar standard liss supports vendor integration 'within school site overcomes limitations school elected use zone integration server requirement sif 3.x implementations liss lightweight interoperability standard schools connects primarily smaller 'local modules timetabling roll call reporting others main admin system given school site liss works either across web via local network simpler format sifa also working closely postsecondary electronic standards council pesc scorm standards organizations august 2013 sif association announced release sif implementation specification 3.0 sif implementation specification north america 3.0 made globally utilized reference infrastructure north america data model focusing supporting common education data standards ceds initiative new 3.0 infrastructure allows transport various data models including global sif communities well data numerous “ alphabet soup ” data initiatives populating education landscape essence – education utilize “ one wire one plug ” – never-ending proprietary api ’ “ one ” connections specification fully supports restful web services soap-based protocols australian 3.4 data model specification came fall 2016 well 3.1.2 release global sif infrastructure version 2.8 specification last 2.x version sif sif implementations united states abroad 2.x deployments a4l community released new version sif specification called unity use best objects 3.x specification foundation 2.8 specification able run either 3.x infrastructure 2.x infrastructure boon thousands districts many states using sif 2 infrastructure allows clean migration path utilizing modern restful architectures desired sif 3.2 release includes sif xpress roster sif xpress student record exchange sre result work done various members association vendors agencies regional centers easily adopted easier implement sub-set specification handles roster basic uses cases access learning community recently started taking strong leadership education privacy space globally association created supports organization called student data privacy consortium sdpc working closely national australian privacy efforts | [
382,
6986,
7315
] | Test |
3,378 | 9 | Simulation_software:simulation software simulation software based process modeling real phenomenon set mathematical formulas essentially program allows user observe operation simulation without actually performing operation simulation software used widely design equipment final product close design specs possible without expensive process modification simulation software real-time response often used gaming also important industrial applications penalty improper operation costly airplane pilots nuclear power plant operators chemical plant operators amock actual control panel connected real-time simulation physical response giving valuable training experience without fear disastrous outcome advanced computer programs simulate power system behavior weather conditions electronic circuits chemical reactions mechatronics heat pumps feedback control systems atomic reactions even complex biological processes theory phenomena reduced mathematical data equations simulated computer simulation difficult natural phenomena subject almost infinite number influences one tricks developing useful simulations determine important factors affect goals simulation addition imitating processes see behave different conditions simulations also used test new theories creating theory causal relationships theorist codify relationships form computer program program behaves way real process good chance proposed relationships correct general simulation packages fall two categories discrete event continuous simulation discrete event simulations used model statistical events customers arriving queues bank properly correlating arrival probabilities observed behavior model determine optimal queue count keep queue wait times specified level continuous simulators used model wide variety physical phenomena like ballistic trajectories human respiration electric motor response radio frequency data communication steam turbine power generation etc simulations used initial system design optimize component selection controller gains well model based design systems generate embedded control code real-time operation continuous simulation used operator training off-line controller tuning four main renowned simulation approaches event-scheduling method activity scanning process- interaction three-phase approach comparison following noted event-scheduling method simpler two phases cs bs allow program run faster since scanning condition nal events advantages also tells us something disadvantages method since two phase events mixed bs cs method parsimony means hard enhance pidd,1998 activity scanning approach also simpler three-phase method since calendar support parsimonious modeling however approach much slower three-phase since treats activities treated conditional hand executive two phases usually approach confused three-phase method pidd 1998 process- interaction “ share two common advantages first avoid programs slow run second avoid need think possible logical consequences event ” pidd 1998 yet pidd 1998 claims approach suffers deadlock problem approach attractive novice modelers although schriber et al 2003 says “ process interaction understood elite group individuals beyond reach ordinary programmers ” fact schriber et al 2003 .adds “ .multi- threaded applications talked computer science classes rarely used broader community ” indicates implementation process-interaction difficult implement obvious contradiction previous quote due mix process interaction approach transaction-flow approach see complete idea origins transaction-flow best stated schriber et al 2003 primordial soup gordon simulator arose gordon ’ transaction flow world-view cleverly disguised form process interaction put process interaction approach within grasp ordinary users gordon one great packaging jobs time devised set building blocks could put together build flowchart graphically depicted operation system modeling paradigm flow elements system readily visible focus whole approach three-phase approach allows “ simulate parallelism whilst avoiding deadlock ” pidd cassel 1998 yet three-phase scan schedule bound activities scans conditional activities slow yet many forgo time spent return solving deadlock problem fact three-phase used distributed systems whether talking operating systems databases etc different names among three-phase commit see tanenbaum steen 2002 electronics simulation software utilizes mathematical models replicate behaviour actual electronic device circuit essentially computer program converts computer fully functioning electronics laboratory electronics simulators integrate schematic editor spice simulator onscreen waveforms make “ what-if ” scenarios easy instant simulating circuit ’ behaviour actually building greatly improves efficiency provides insights behavior stability electronics circuit designs simulators use spice engine simulates analog digital mixed circuits exceptional power accuracy also typically contain extensive model device libraries simulators typically printed circuit board pcb export capabilities essential design testing circuits primary application electronic circuit simulation strictly analog electronics circuit simulators include analog event-driven digital simulation capabilities known mixed-mode simulators means simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models mixed-mode simulators provide accurate specification propagation time rise/fall time delays event driven algorithm provided mixed-mode simulators general purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event driven algorithm faster standard spice matrix solution simulation time greatly reduced circuits use event driven models place analog models mixed-mode simulation handled three levels primitive digital elements use timing models built-in 12 16 state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions exact representations used mainly analysis transmission line signal integrity problems close inspection ic ’ i/o characteristics needed boolean logic expressions delay-less functions used provide efficient logic signal processing analog environment two modeling techniques use spice solve problem third method digital primitives use mixed mode capability methods merits target applications fact many simulations particularly use a/d technology call combination three approaches one approach alone sufficient order properly understand operation programmable logic controller plc necessary spend considerable time programming testing debugging plc programs plc systems inherently expensive down-time often costly addition plc programmed incorrectly result lost productivity dangerous conditions plc simulation software valuable tool understanding learning plcs keep knowledge refreshed date plc simulation provides users ability write edit debug programs written using tag-based format many popular plcs use tags powerful method programming plcs also complex plc simulation integrates tag-based ladder logic programs 3d interactive animations enhance user ’ learning experience interactive animations include traffic lights batch processing bottling lines using plc simulation plc programmers freedom try what-if scenarios changing ladder logic instructions programs re-running simulation see changes affect plc operation performance type testing often feasible using hardwired operating plcs control processes often worth hundreds thousands – millions dollars sheet metal forming simulation software utilizes mathematical models replicate behavior actual metal sheet manufacturing process essentially computer program converts computer fully functioning metal manufacturing prediction unit sheet metal forming simulation prevents metal factories defects production lines reduces testing expensive mistakes improving efficiency metal forming process metal casting simulation currently performed finite element method simulation software designed defect-prediction tool foundry engineer order correct and/or improve his/her casting process even prototype trials produced idea use information analyze predict results simple effective manner simulate different processes software would normally following specifications interaction different network entities defined various communication protocols network simulation software simulates behavior networks protocol level network protocol simulation software used develop test scenarios understand network behavior certain protocol messages compliance new protocol stack implementation protocol stack testing simulators based telecommunications protocol architecture specifications developed international standards body itu-t ieee output protocol simulation software detailed packet traces events logs etc understanding computers made many components component many different attributes different manufacturer accordingly computer performance evaluation another application simulation would paramount significance particularly since experimenting possible scenarios nearly impossible commercial simulation packages caught fact two packages offered application namely anylogic 5.0 visual simulation environment | [
1692,
5458,
529,
4106,
5769,
1196
] | Test |
3,379 | 4 | DomainKeys_Identified_Mail:domainkeys identified mail domainkeys identified mail dkim email authentication method designed detect forged sender addresses emails email spoofing technique often used phishing email spam dkim allows receiver check email claimed come specific domain indeed authorized owner domain achieves affixing digital signature linked domain name outgoing email message recipient system verify looking sender public key published dns valid signature also guarantees parts email possibly including attachments modified since signature affixed usually dkim signatures visible end-users affixed verified infrastructure rather message authors recipients dkim internet standard defined rfc 6376 dated september 2011 updates rfc 8301 rfc 8463 need email validated identification arises forged addresses content otherwise easily created widely used spam phishing email-based fraud example fraudster may send message claiming sender example.com goal convincing recipient accept read email difficult recipients establish whether trust message system administrators also deal complaints malicious email appears originated systems dkim provides ability sign message allows signer author organization communicate emails considers legitimate directly prevent disclose abusive behavior dkim also provides process verifying signed message verifying modules typically act behalf receiver organization possibly hop independent simple mail transfer protocol smtp routing aspects operates rfc 5322 message—the transported mail header body—not smtp envelope defined rfc 5321 hence dkim signatures survives basic relaying across multiple mtas signing organization direct handler message author submission site intermediary along transit path indirect handler independent service providing assistance direct handler signing modules insert one codice_1 header fields possibly behalf author organization originating service provider specification allows signers choose header fields sign codice_2 field must always signed resulting header field consists list codice_3 parts example tags used relevant ones b actual digital signature contents headers body mail message bh body hash signing domain selector header body contribute signature first message body hashed always beginning possibly truncated given length may zero second selected header fields hashed order given h. repeated field names matched bottom header upward order codice_4 fields inserted header non-existing field matches empty string adding field name break signature codice_1 field signature created bh equal computed body hash b equal empty string implicitly added second hash albeit name must appear h — refers another preexisting signature hashes text canonicalized according relevant c algorithms result encryption signer private key encoding using base64 b. algorithms fields body length meant chosen assure unambiguous message identification still allowing signatures survive unavoidable changes going occur transit data integrity implied receiving smtp server wanting verify uses domain name selector perform dns lookup example given example signature tag gives author domain verified example.net tag selector brisbane string _domainkey fixed part specification gives txt resource record looked codice_6 data returned query record also list tag-value pairs includes domain public key along key usage tokens flags example receiver use public key value p tag validate signature hash value header field check hash value mail message headers body received two values match cryptographically proves mail signed indicated domain tampered transit signature verification failure force rejection message instead precise reasons authenticity message could proven made available downstream upstream processes methods may include sending back fbl message adding authentication-results header field message described rfc 7001 although domainkeys covered yahoo licensed patent claims dual license scheme domainkeys patent license agreement v1.2 gnu general public license v2.0 version essence dkim spf provide different measures email authenticity dmarc provides ability organisation publish policy specify mechanism dkim spf employed sending email domain check field presented end users receiver deal failures reporting mechanism actions performed policies primary advantage system e-mail recipients allowing signing domain reliably identify stream legitimate email thereby allowing domain-based blacklists whitelists effective also likely make certain kinds phishing attacks easier detect incentives mail senders sign outgoing e-mail dkim method labeling message filter identify spam however widespread use dkim prevent spammers forging source address messages technique commonly employ today spammers forced show correct source domain filtering techniques work effectively particular source domain feed reputation system better identify spam conversely dkim make easier identify mail known spam need filtered receiving system whitelist known good sending domains either locally maintained third party certifiers skip filtering signed mail domains perhaps filter remaining mail aggressively dkim useful anti-phishing technology mailers heavily phished domains sign mail show genuine recipients take absence valid signature mail domains indication mail probably forged best way determine set domains merit degree scrutiny remains open question dkim used optional feature called adsp lets authors sign mail self-identify demoted historic status november 2013 instead dmarc used purpose allows domains self-publish techniques including spf dkim employ makes easier receiver make informed decision whether certain mail spam example using dmarc ebay paypal publish policies mail authenticated requesting receiving system gmail reject implemented using dns records added rfc 5322 header field dkim compatible existing e-mail infrastructure particular transparent existing e-mail systems lack dkim support design approach also compatible related services s/mime openpgp content-protection standards dkim compatible dnssec standard spf dkim requires cryptographic checksums generated message sent mail server results computational overhead otherwise required e-mail delivery additional computational overhead hallmark digital postmarks making sending bulk spam computationally expensive facet dkim may look similar hashcash except receiver side verification negligible amount work typical hashcash algorithm would require far work dkim non-repudiation feature prevents senders spammers credibly denying sent email proven useful news media sources wikileaks able leverage dkim body signatures prove leaked emails genuine tampered definitively repudiating claims hillary clinton 2016 us presidential election running mate tim kaine dnc chair donna brazile rfc identifies number potential attack vectors dkim signatures encompass message envelope holds return-path message recipients since dkim attempt protect mis-addressing affect utility number concerns raised refuted 2013 time standardization concern cryptographic solution would message replay abuse bypasses techniques currently limit level abuse larger domains replay inferred using per-message public keys tracking dns queries keys filtering high number queries due e-mail sent large mailing lists malicious queries bad actors comparison different methods also addressing problem see e-mail authentication mentioned authentication abuse prevention evil email user reputable domain compose bad message dkim-signed sent domain mailbox retrieve file obtain signed copy message use l tag signatures makes doctoring messages even easier signed copy forwarded million recipients example botnet without control email provider signed message block offending user stop diffusion already-signed messages validity signatures messages limited always including expiration time tag signatures revoking public key periodically upon notification incident effectiveness scenario hardly limited filtering outgoing mail implies ability detect message might potentially useful spammers dkim currently features two canonicalization algorithms simple relaxed neither mime-aware mail servers legitimately convert different character set often document x-mime-autoconverted header fields addition servers certain circumstances rewrite mime structure thereby altering preamble epilogue entity boundaries breaks dkim signatures plain text messages written us-ascii provided mime header fields signed enjoy robustness end-to-end integrity requires opendkim project organized data collection involving 21 mail servers millions messages 92.3 observed signatures successfully verified success rate drops slightly 90.5 mailing list traffic considered problems might exacerbated filtering relaying software makes changes message without specific precaution implemented sender footer addition operated mailing lists many central antivirus solutions break dkim signature possible mitigation sign designated number bytes message body indicated l tag dkim-signature header anything added beyond specified length message body taken account calculating dkim signature wo n't work mime messages another workaround whitelist known forwarders e.g. spf yet another workaround proposed forwarders verify signature modify email re-sign message sender header however solution risk forwarded third party signed messages received smtp receivers supporting rfc 5617 adsp protocol thus practice receiving server still whitelist known message streams october 2012 wired reported mathematician zach harris detected demonstrated email source spoofing vulnerability short dkim keys codice_7 corporate domain well several high-profile domains stated authentication 384-bit keys factored little 24 hours laptop 512-bit keys 72 hours cloud computing resources harris found many organizations sign email short keys factored notified organizations vulnerability states 768-bit keys could factored access large amounts computing power suggests dkim signing use key lengths greater 1,024 wired stated harris reported google confirmed began using new longer keys soon disclosure according rfc 6376 receiving party must able validate signatures keys ranging 512 bits 2048 bits thus usage keys shorter 512 bits might incompatible shall avoided rfc 6376 also states signers must use keys least 1024 bits long-lived keys though long-livingness specified dkim resulted 2004 merging two similar efforts enhanced domainkeys yahoo identified internet mail cisco merged specification basis series ietf standards-track specifications support documents eventually resulted std 76 currently rfc 6376 identified internet mail proposed cisco signature-based mail authentication standard domainkeys designed yahoo verify dns domain e-mail sender message integrity aspects domainkeys along parts identified internet mail combined create domainkeys identified mail dkim trendsetting providers implementing dkim include yahoo gmail aol fastmail mail organizations carry dkim signature discussions dkim signatures passing indirect mail flows formally dmarc working group took place right first adoptions new protocol wreaked havoc regular mailing list use however none proposed dkim changes passed instead mailing list software changed 2017 another working group launched dkim crypto update dcrup specific restriction review signing techniques rfc 8301 issued january 2018 bans sha-1 updates key sizes 512-2048 1024-4096 rfc 8463 issued september 2018 adds elliptic curve algorithm existing rsa added key type codice_8 adequately strong featuring short public keys easily publishable dns original domainkeys designed mark delany yahoo enhanced comments many others since 2004 specified historic rfc 4870 superseded standards track rfc 4871 domainkeys identified mail dkim signatures published may 2007 number clarifications conceptualizations collected thereafter specified rfc 5672 august 2009 form corrections existing specification september 2011 rfc 6376 merged updated latter two documents preserving substance dkim protocol public key compatibility earlier domainkeys also possible dkim initially produced informal industry consortium submitted enhancement standardization ietf dkim working group chaired barry leiba stephen farrell eric allman sendmail jon callas pgp corporation mark delany miles libbey yahoo jim fenton michael thomas cisco systems attributed primary authors source code development one common library led opendkim project following recent protocol additions licensing new bsd license | [
3683,
7148,
363,
456,
5722,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
6092,
7170,
4945,
6531,
1462,
2650,
7637,
3017,
1647,
2119,
2482,
4783,
6908,
7088,
7091,
2219,
3383,
3640,
3797,
5673,
3031,
2043,
3312,
2057,
334,
3819,
3820,
3821,
... | Validation |
3,380 | 1 | Asia-Pacific_Trade_Agreements_Database:asia-pacific trade agreements database asia-pacific trade investment agreements database aptiad resource researchers policymakers area international trade investment online database allows searches two ways one relates agreements users search agreements members key terms types scopes agreements status another possibility search publications relevant regional integration trade agreements easier use database users download glossary related terms website trade agreements database component aptiad designed give researchers policymakers overview easy access regional bilateral trade agreements entered negotiation countries asia pacific region june 2008 136 agreements including agreements notified wto official information readily available also agreements negotiation least first formal negotiation round interactive trade indicators component aptiad designed help policymakers calculate commonly used indicators related trade performance national economies and/or trade agreements interactive trade indicator database enables select indicators e.g export/import value export/import growth export/import share trade share trade intensity country region product year export flows downloaded un comtrade using world integrated trade solution wits last 10 years present 1998-2007 selected developed developing countries asia-pacific region asia-pacific trade agreements database aptiad product trade investment division united nations economic social commission asia pacific | [] | Train |
3,381 | 8 | Parlay_X:parlay x parlay x set standard web service apis telephone network fixed mobile defunct replaced oneapi current valid standard gsm association telecom third party api enables software developers use capabilities underlying network apis deliberately high level abstractions designed simple use application developer example invoke single web service request get location mobile device initiate telephone call parlay x web services defined jointly etsi parlay group third generation partnership project 3gpp oma done maintenance specifications 3gpp release 8 apis defined using web service technology interfaces defined using wsdl 1.1 conform web services interoperability ws-i basic profile apis published set specifications general parlay x provides abstraction functionality exposed complex functionally richer parlay apis etsi provide set informative normative parlay x parlay mapping documents parlay x services rolled number telecom operators including bt korea telecom t-com mobilekom sprint | [
6986,
6258,
5631
] | Test |
3,382 | 3 | NMS-8250:nms-8250 philips nms-8250 nms short new media systems professional msx 2 home computer high end market two built floppy disk drives pizza box configuration machine fact manufactured sanyo basically mpc-25fs different color featured professional video output possibilities scart better picture quality detachable keyboard | [
3605,
1670,
1237
] | Test |
3,383 | 5 | Hypertext_Transfer_Protocol:hypertext transfer protocol hypertext transfer protocol http application protocol distributed collaborative hypermedia information systems http foundation data communication world wide web hypertext documents include hyperlinks resources user easily access example mouse click tapping screen web browser development http initiated tim berners-lee cern 1989 development early http requests comments rfcs coordinated effort internet engineering task force ietf world wide web consortium w3c work later moving ietf http/1.1 first documented 1997 specification obsoleted 1999 likewise replaced family rfcs 2014 http/2 efficient expression http semantics wire published 2015 supported major web servers browsers transport layer security tls using application-layer protocol negotiation alpn extension tls 1.2 newer required.. http/3 proposed successor http/2 using udp instead tcp underlying transport protocol like http/2 obsolete previous major versions protocol http functions request–response protocol client–server computing model web browser example may client application running computer hosting website may server client submits http request message server server provides resources html files content performs functions behalf client returns response message client response contains completion status information request may also contain requested content message body web browser example user agent ua types user agent include indexing software used search providers web crawlers voice browsers mobile apps software accesses consumes displays web content http designed permit intermediate network elements improve enable communications clients servers high-traffic websites often benefit web cache servers deliver content behalf upstream servers improve response time web browsers cache previously accessed web resources reuse possible reduce network traffic http proxy servers private network boundaries facilitate communication clients without globally routable address relaying messages external servers http application layer protocol designed within framework internet protocol suite definition presumes underlying reliable transport layer protocol transmission control protocol tcp commonly used however http adapted use unreliable protocols user datagram protocol udp example httpu simple service discovery protocol ssdp http resources identified located network uniform resource locators urls using uniform resource identifiers uri schemes http https example including optional components codice_1 uris encoded hyperlinks html documents form interlinked hypertext documents http/1.1 revision original http http/1.0 http/1.0 separate connection server made every resource request http/1.1 reuse connection multiple times download images scripts stylesheets etc page delivered http/1.1 communications therefore experience less latency establishment tcp connections presents considerable overhead term hypertext coined ted nelson 1965 xanadu project turn inspired vannevar bush 1930s vision microfilm-based information retrieval management memex system described 1945 essay may think tim berners-lee team cern credited inventing original http along html associated technology web server text-based web browser berners-lee first proposed worldwideweb project 1989—now known world wide web first version protocol one method namely get would request page server response server always html page first documented version http http v0.9 1991 dave raggett led http working group http wg 1995 wanted expand protocol extended operations extended negotiation richer meta-information tied security protocol became efficient adding additional methods header fields officially introduced recognized http v1.0 1996 http wg planned publish new standards december 1995 support pre-standard http/1.1 based developing called http-ng rapidly adopted major browser developers early 1996 march year pre-standard http/1.1 supported arena netscape 2.0 netscape navigator gold 2.01 mosaic 2.7 lynx 2.5 internet explorer 2.0 end-user adoption new browsers rapid march 1996 one web hosting company reported 40 browsers use internet http 1.1 compliant web hosting company reported june 1996 65 browsers accessing servers http/1.1 compliant http/1.1 standard defined officially released january 1997 improvements updates http/1.1 standard released june 1999 2007 http working group formed part revise clarify http/1.1 specification june 2014 wg released updated six-part specification obsoleting http/2 published may 2015 http session sequence network request-response transactions http client initiates request establishing transmission control protocol tcp connection particular port server typically port 80 occasionally port 8080 see list tcp udp port numbers http server listening port waits client request message upon receiving request server sends back status line http/1.1 200 ok message body message typically requested resource although error message information may also returned http/0.9 1.0 connection closed single request/response pair http/1.1 keep-alive-mechanism introduced connection could reused one request persistent connections reduce request latency perceptibly client need re-negotiate tcp 3-way-handshake connection first request sent another positive side effect general connection becomes faster time due tcp slow-start-mechanism version 1.1 protocol also made bandwidth optimization improvements http/1.0 example http/1.1 introduced chunked transfer encoding allow content persistent connections streamed rather buffered http pipelining reduces lag time allowing clients send multiple requests waiting response another addition protocol byte serving server transmits portion resource explicitly requested client http stateless protocol stateless protocol require http server retain information status user duration multiple requests however web applications implement states server side sessions using instance http cookies hidden variables within web forms http provides multiple authentication schemes basic access authentication digest access authentication operate via challenge-response mechanism whereby server identifies issues challenge serving requested content http provides general framework access control authentication via extensible set challenge-response authentication schemes used server challenge client request client provide authentication information http authentication specification also provides arbitrary implementation-specific construct dividing resources common given root uri realm value string present combined canonical root uri form protection space component challenge effect allows server define separate authentication scopes one root uri client sends requests server server sends responses request message consists following request line header fields must end cr lf carriage return character followed line feed character empty line must consist cr lf whitespace http/1.1 protocol header fields except host optional request line containing path name accepted servers maintain compatibility http clients http/1.0 specification http defines methods sometimes referred verbs nowhere specification mention verb options head verb indicate desired action performed identified resource resource represents whether pre-existing data data generated dynamically depends implementation server often resource corresponds file output executable residing server http/1.0 specification defined get head post methods http/1.1 specification added five new methods options put delete trace connect specified documents semantics well-known depended client use method server configured support combination methods method unknown intermediate treated unsafe non-idempotent method limit number methods defined allows future methods specified without breaking existing infrastructure example webdav defined 7 new methods specified patch method method names case sensitive contrast http header field names case-insensitive general-purpose http servers required implement least get head methods methods considered optional specification methods example get head options trace convention defined safe means intended information retrieval change state server words side effects beyond relatively harmless effects logging web caching serving banner advertisements incrementing web counter making arbitrary get requests without regard context application state therefore considered safe however mandated standard explicitly acknowledged guaranteed contrast methods post put delete patch intended actions may cause side effects either server external side effects financial transactions transmission email methods therefore usually used conforming web robots web crawlers conform tend make requests without regard context consequences despite prescribed safety get requests practice handling server technically limited way therefore careless deliberate programming cause non-trivial changes server discouraged cause problems web caching search engines automated agents make unintended changes server example website might allow deletion resource url http //example.com/article/1234/delete arbitrarily fetched even using get would simply delete article one example occurring practice short-lived google web accelerator beta prefetched arbitrary urls page user viewing causing records automatically altered deleted en masse beta suspended weeks first release following widespread criticism methods put delete defined idempotent meaning multiple identical requests effect single request methods get head options trace prescribed safe also idempotent http stateless protocol contrast post method necessarily idempotent therefore sending identical post request multiple times may affect state cause side effects financial transactions cases may desirable cases could due accident user realize action result sending another request receive adequate feedback first request successful web browsers may show alert dialog boxes warn users cases reloading page may re-submit post request generally web application handle cases post request submitted note whether method idempotent enforced protocol web server perfectly possible write web application example database insert non-idempotent action triggered get request ignoring recommendation however may result undesirable consequences user agent assumes repeating request safe trace method used part class attacks known cross-site tracing reason common security advice disabled server configuration microsoft iis supports proprietary track method behaves similarly likewise recommended disabled response message consists following status line header fields must end cr lf empty line must consist cr lf whitespace strict requirement cr lf relaxed somewhat within message bodies consistent use system linebreaks cr lf alone http/1.0 since first line http response called status line includes numeric status code 404 textual reason phrase found way user agent handles response depends primarily code secondarily response header fields custom status codes used user agent encounters code recognize use first digit code determine general class response standard reason phrases recommendations replaced local equivalents web developer discretion status code indicated problem user agent might display reason phrase user provide information nature problem standard also allows user agent attempt interpret reason phrase though might unwise since standard explicitly specifies status codes machine-readable reason phrases human-readable http status code primarily divided five groups better explanation request responses client server named popular way establishing encrypted http connection https two methods establishing encrypted http connection also exist secure hypertext transfer protocol using http/1.1 upgrade header specify upgrade tls browser support two however nearly non-existent sample conversation http client http server running www.example.com port 80 client request consisting case request line one header field followed blank line request ends double newline form carriage return followed line feed host field distinguishes various dns names sharing single ip address allowing name-based virtual hosting optional http/1.0 mandatory http/1.1 means /index.html one etag entity tag header field used determine cached version requested resource identical current version resource server content-type specifies internet media type data conveyed http message content-length indicates length bytes http/1.1 webserver publishes ability respond requests certain byte ranges document setting field accept-ranges bytes useful client needs certain portions resource sent server called byte serving connection close sent means web server close tcp connection immediately transfer response header lines optional content-length missing length determined ways chunked transfer encoding uses chunk size 0 mark end content identity encoding without content-length reads content socket closed content-encoding like gzip used compress transmitted data gopher protocol content delivery protocol displaced http early 1990s spdy protocol alternative http developed google superseded new http protocol http/2 | [
7148,
7166,
7168,
7170,
20,
1462,
1474,
1479,
4352,
7214,
7217,
80,
84,
1513,
87,
1525,
106,
1543,
5821,
121,
4414,
4415,
1566,
5847,
7290,
3043,
7297,
4445,
3057,
5880,
7315,
5887,
4509,
5933,
1653,
4511,
1661,
7385,
7390,
3135,
244,
... | Test |
3,384 | 2 | CPU_shielding:cpu shielding cpu shielding practice multiprocessor system cpu multiple cores real-time tasks run one cpu core non-real-time tasks run another operating system must able set cpu affinity processes interrupts linux order shield cpus individual interrupts serviced make sure following kernel configuration parameter set | [
5540,
5453,
5803,
3174,
1535,
1260,
7528,
1176,
2559,
6725,
5571,
7453,
578,
6736,
7555,
3559,
1227,
1237
] | Validation |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.