node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,385
3
Socket_5:socket 5 socket 5 created second generation intel p5 pentium processors operating speeds 75 120 mhz well certain pentium overdrive pentium mmx processors core voltage 3.3 v. superseded earlier socket 4 released march 1994 consisting 320 pins first socket use staggered pin grid array spga allowed chip pins spaced closer together earlier sockets socket 5 replaced socket 7 1997
[ 2541, 1162, 4123, 6170, 2997, 1729, 2828, 6173, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 2036, 4968, 4972, 5853, 2685, 6935, 8021, 7302, 5963, 866, 3333, 7134, 262, 6683, 5886 ]
Test
3,386
4
Information_Exchange_Gateway:information exchange gateway nato defined concept information exchange gateway ieg facilitate secure communication different security management domains ieg designed provide standard secure method communication nato nato nations non-nato nations coalition forces non government organisations ngos international organisations ios information exchange gateway provides information exchange services ies facilitate exchange information networks including data protocol translation necessary information protection services ips ensure intended information exchanged addition node protection services nps ensure information exchanged safe secure way intended information validated ips exchanged nato defined five main ieg scenarios scenario variants transferring classified information scenarios take account security classifications domains connect well security policy owners administrators domains scenarios ieg must include guard provide ips nps functions used guard ieg dmz split two
[ 2779 ]
Test
3,387
3
Macintosh_SE/30:macintosh se/30 macintosh se/30 personal computer designed manufactured sold apple computer inc. january 1989 october 1991 fastest original black-and-white compact macintosh series se/30 black-and-white monitor single pds slot rather nubus slots iix se/30 shares common architecture supported third-party accelerators network cards display adapter although officially able support 32 mb se/30 could expand 128 mb ram significant amount ram time included 40 80 mb hard drive also first compact mac include 1.44 mb high density floppy disk drive standard late versions se one earlier versions power se/30 demonstrated use produce week newspaper first colour tabloid newspaper uk use new digital pre-press technology personal desktop computer keeping apple practice apple ii+ power macintosh g3 announced logic board upgrade available convert regular se se/30 se would exactly specs se/30 difference floppy drive se 800 kb drive set included new front bezel replace original se bezel se/30 naming scheme used time apple indicated presence 68030 processor adding letter x model name macintosh se upgraded 68030 processor posed awkward problem apple willing name new computer macintosh sex thus se/30 name chosen internally code names green jade fafnir roadrunner used machine followed 1991 macintosh classic ii despite processor clock speed 60 fast se/30 due 16-bit data path supported 10 mb memory lacked internal expansion slot made motorola 68882 fpu optional upgrade although uses 32-bit instructions se/30 rom like iix rom includes code using 24-bit addressing rendering rom 32-bit dirty limited actual amount ram accessed 8 mb system 6.0.8 system extension called mode32 enables access installed extra memory system 6.0.8 system 7.0 system 7.5.5 se/30 use 128 mb ram alternatively replacing rom simm one mac iisi mac iifx makes se/30 32-bit-clean thereby enables use 128 mb ram system 7.5 os 8.1 standard se/30 run system 7.5.5 since mac os 7.6 requires 32-bit-clean rom additionally se/30 run a/ux apple older version unix able run macintosh programs though official upgrade path se/30 several third-party processor upgrades available 68040 upgrade made possible run mac os 8.1 extended se/30 productive life many years micron technology xceed gray-scale 30 video card fit se/30 pds slot enabling display greyscale video internal display non-color compact mac able bruce f. webster wrote macworld march 1989 se/30 break new ground however establish apple commitment classic mac product line provides users apple-supported alternative either small slow mac large powerful one important fills gap macintosh family ... new level power portability macintosh community january 2009 macworld feature commemorating 25th anniversary macintosh three industry commentators – adam c. engst tidbits john gruber daring fireball john siracusa ars technica – chose se/30 favorite mac model time like great mac wrote gruber se/30 n't terrific system debuted remained eminently usable years come think original mac era machine mind se/30 se/30 remains popular hobbyists described “ best computer apple ever make ” used models selling significant premium machines era contemporary pds upgrades allowed se/30 ’ internal monitor upgraded support 256 shades gray original-design macintosh support upgrade 68040 processor se/30 ’ standard ram limit 128mb greatly exceeded even much later models color classic macintosh lc ii 2018 add-ons software became available add wifi even streaming spotify support se/30 nbc tv series seinfeld jerry se/30 sitting desk first seasons would first many macs occupy desk including powerbook duo twentieth anniversary macintosh fx series always sunny philadelphia waitress seen macintosh se/30 bedroom desk episode gang gives back film watchmen ozymandias all-black tempest-shielded se/30 desk film peter parker shown macintosh se/30 bedroom
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 405, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 2294, 6200, 6202, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 5...
Test
3,388
9
TSP_(econometrics_software):tsp econometrics software tsp programming language estimation simulation econometric models tsp stands time series processor although also commonly used cross section panel data program initially developed robert hall graduate studies massachusetts institute technology 1960s company behind program tsp international founded 1978 bronwyn h. hall robert hall wife divorce april 1983 asset tsp split two versions subsequently two versions diverged terms interface types subroutines included one version tsp still developed tsp international version initially named microtsp named eviews developed quantitative micro software
[ 3606, 2820, 1626, 4759, 5548, 1731, 5288, 5117, 5571, 4872, 578, 4705, 4067, 3981, 4070, 3807, 1398, 6934, 1879, 7579, 3410, 256, 3915 ]
Test
3,389
7
Access_Grid:access grid access grid collection resources technologies enables large format audio video based collaboration groups people different locations access grid ensemble resources including multimedia large-format displays presentation interactive environments interfaces grid computing middleware visualization environments simple terms advanced videoconferencing using big displays multiple simultaneous camera feeds node site technology invented argonne national laboratory chicago alliance chautauqua 99 series two-day conferences computational science organised ncsa first large-scale access grid event access grid later demonstrated supercomputing'99 portland international audience latest stable version software release 3.2 also installable bundle additional video codecs hd additional tools access grid generated great interest activity australia factors widely disparate geographic locations relatively low population-densities previously presented great obstacles in-person collaborations international centre excellence education mathematics ice-em funded 10 australian universities construct nodes nodes allow mathematics postgraduate community professionals access international experts visiting australia nodes also provide means carrying collaborative research peers within australia internationally australia first access grid node built sydney vislab australian technology park august 2001 2007 australian ag network grown 30 sites serviced asia pacific access grid apag venue servers university sydney ag2 university queensland ag3 university queensland began providing ag facilities 2002 increasing usage every year since 2004 uq vislab began providing access grid installation packages various linux distributions well freebsd wider ag community although intellectual property concerns placed future linux-based technologies doubt also active developing various enhancements add-ons including shared applications remote sensor monitoring shared application remote thermo shared gis based grass december 2006 new zealand university operational ag node use grid increasing current development work includes federated data management using storage resource broker srb high definition video communications uk academic community support access grid toolkit iocom evo technologies janet provided janet videoconferencing management centre first access grid ag node built university manchester 2001 jisc-funded support access grid support centre agsc manchester april 2004 july 2011 three hundred ag nodes registered uk ranging full room nodes small individual desktop nodes number academic projects using ag technologies taught course centre magic postgraduate mathematics mathematics projects
[ 7428, 5666, 4159 ]
Train
3,390
3
Macintosh_IIci:macintosh iici macintosh iici personal computer designed manufactured sold apple computer inc. september 1989 february 1993 powerful version macintosh iicx released earlier year shares compact case design three expansion slots iici improved upon iicx 16 mhz motorola 68030 cpu 68882 fpu replacing 25 mhz versions chips macintosh quadra 700 introduced end 1991 apple mainstream workstation product replace iici albeit significantly higher price point time apple authorized resellers offering entry-level iici systems 4,000 usd less whereas quadra 700 entered market 6,000 usd apple continued sell iici early 1993 less expensive quadra 650 comparably-priced quadra 800 introduced iici introduced several technical architectural enhancements important preparing system 7 called blue project would influence future macintoshes though came cost compatibility iici one popular longest-lived macintosh models 20th century much lifespan business workhorse macintosh line short time 1989 introduction 40 mhz macintosh iifx iici fastest mac available iici came either 40- 80-megabyte hard disk possible upgrades include 25 33 40 50 mhz daystar 68030 boards quadra 700 motherboard couple different third-party 68040 upgrades two powerpc 601 upgrade cards running either 66 mhz 100 mhz exclusively daystar digital bought xlr8 still holds daystar product logo name line products 68030 68040 upgrades also made sonnet diimo companies quadra 700 released 1991 logic board upgrade made available iici upgrade performance level quadra easter egg exists iici rom system date set september 20 1989 machine release date keys held boot time image development team displayed signatures product design team seen molded plastic case one removes motherboard
[ 7890, 5732, 722, 1094, 2926, 5037, 1103, 5752, 405, 2954, 7572, 6482, 6142, 4373, 7226, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 5...
Test
3,391
1
In-memory_processing:in-memory processing computer science in-memory processing emerging technology processing data stored in-memory database older systems based disk storage relational databases using sql query language increasingly regarded inadequate meet business intelligence bi needs stored data accessed much quickly placed random-access memory ram flash memory in-memory processing allows data analysed real time enabling faster reporting decision-making business hitherto prevalent disk-based technology data loaded computer hard disk form multiple tables multi-dimensional structures queries run disk-based technologies relational database management systems rdms often based structured query language sql sql server mysql oracle many others rdms designed requirements transactional processing using database supports insertions updates well performing aggregations joins typical bi solutions typically slow another drawback sql designed efficiently fetch rows data bi queries usually involve fetching partial rows data involving heavy calculations improve query performance multidimensional databases olap cubes also called multidimensional online analytical processing molap constructed designing cube elaborate lengthy process changing cube structure adapt dynamically changing business needs may cumbersome cubes pre-populated data answer specific queries although increase performance still suitable answering ad-hoc queries information technology staff spend substantial development time optimizing databases constructing indexes aggregates designing cubes star schemas data modeling query analysis reading data hard disk much slower possibly hundreds times compared reading data ram especially analyzing large volumes data performance severely degraded though sql powerful tool complex queries take relatively long time execute often result bringing performance transactional processing order obtain results within acceptable response time many data warehouses designed pre-calculate summaries answer specific queries optimized aggregation algorithms needed increase performance memory processing accomplished via traditional databases oracle db2 microsoft sql server via nosql offerings in-memory data grid like hazelcast infinispan oracle coherence scaleout software in-memory database data grid information initially loaded memory ram flash memory instead hard disks data grid processing occurs three order magnitude faster relational databases advanced functionality acid degrade performance compensation additional functionality arrival column centric databases store similar information together allow data stored efficiently greater compression ratios allows huge amounts data stored physical space reducing amount memory needed perform query increasing processing speed many users software vendors integrated flash memory systems allow systems scale larger data sets economically oracle integrating flash memory oracle exadata products increased performance microsoft sql server 2012 bi/data warehousing software coupled violin memory flash memory arrays enable in-memory processing data sets greater 20tb users query data loaded system ’ memory thereby avoiding slower database access performance bottlenecks differs caching widely used method speed query performance caches subsets specific pre-defined organized data in-memory tools data available analysis large data mart small data warehouse entirely memory accessed quickly multiple concurrent users applications detailed level offers potential enhanced analytics scaling increasing speed application theoretically improvement data access speed 10,000 1,000,000 times compared disk also minimizes need performance tuning staff provides faster service end users certain developments computer technology business needs tended increase relative advantages in-memory technology range in-memory products provide ability connect existing data sources access visually rich interactive dashboards allows business analysts end users create custom reports queries without much training expertise easy navigation ability modify queries fly benefit many users since dashboards populated fresh data users access real time data create reports within minutes in-memory processing may particular benefit call centers warehouse management in-memory processing source database queried instead accessing database every time query run thereby eliminating repetitive processing reducing burden database servers scheduling populate in-memory database overnight database servers used operational purposes peak hours large number users large amount ram needed in-memory configuration turn affects hardware costs investment likely suitable situations speed query response high priority significant growth data volume increase demand reporting facilities may still cost-effective information subject rapid change security another consideration in-memory tools expose huge amounts data end users makers advise ensuring authorized users given access data
[ 7715, 1730, 7442, 476, 1640, 7453, 1564, 2861, 6462, 1670, 5419, 604, 8024, 1592, 3578, 7213, 1232, 1805 ]
Test
3,392
2
MS-DOS_5_Beta:ms-dos 5 beta ms-dos 5.0 project started december 1989 ms-dos 5.0 codename lifeboat based ms-dos 4.00 code ms-dos 5.00 first version ms-dos use betas builds several ms-dos 5.00 betas released final launch
[ 6380 ]
Test
3,393
4
Cyber-arms_industry:cyber-arms industry cyber-arms industry markets associated events surrounding sale software exploits zero-days cyberweaponry surveillance technologies related tools term may extend grey black markets online offline many years burgeoning dark web market remained niche available in-the-know well funded since least 2005 western governments including u.s. united kingdom russia france israel buying exploits defence contractors individual hackers 'legitimate market zero day exploits exists well advertised immediately accessible attempts openly sell zero day exploits governments security vendors keep black market far unsuccessful traditional arms producers military services companies bae systems eads leonardo general dynamics raytheon thales expanded cybersecurity markets however smaller software companies blue coat amesys also become involved often drawing attention providing surveillance censorship technologies regimes bashar al-assad syria muammar gaddafi libya suppliers exploits western governments include massachusetts firm netragard trade show iss world runs every months referred 'international cyber arms bazaar 'wiretappers ball focuses surveillance software lawful interception popular internet forums generally russian ukrainian reports english-only chinese-only german-only vietnamese-only sites among others phishing spear-phishing social engineer campaigns typically done english majority potential victims know language india central bureau investigation describe proliferation underground markets 'widespread colonel john adams head marine corps intelligence activity expressed concerns markets could allow cyberweapony fall hands hostile governments would otherwise lack expertise attack advanced country computer systems online increasing uses encryption privacy mechanisms record messaging cryptocurrencies since 2005 darknet markets black markets 'cyber arms bazaar prices dropping fast cost cyberweapony plummeting least 90 percent botnets increasingly rented cyber criminals commodities variety purposes rdp shops offer cheap access hacked computers recent years many software firms success bug bounty programs cases vupen chrome exploit rejected market value meanwhile vendors hp spent 7 million 2005 2015 buying exploits software behaviour criticised head united states cyber command general keith alexander building black market
[ 2488, 1501, 2427, 501, 3764, 208, 2566, 5412, 2190, 3480, 6756, 88 ]
Train
3,394
4
FireHOL:firehol firehol shell script designed wrapper iptables written ease customization linux kernel firewall netfilter firehol graphical user interface configured easy understand plain text configuration file advantage firehol friendliness beginners n't worry answer packet firehol first parses configuration file sets appropriate iptables rules achieve expected firewall behavior large complex bash script file depending iptables console tools rather communicating kernel directly advantage portability linux system iptables bash appropriate tools run main drawback slower starting times particularly older systems since delay happens per boot—or less resulting rules saved disk—high performance generally important except embedded systems firehol also benefits shell flexibility easily extended configured high degree firehol configuration files fully functional bash scripts one write scripts normal shell syntax operate expected one might loop firehol statement forward entire set ports example firehol free software open-source distributed terms gnu general public license
[ 1249, 3165, 1809, 4759, 7246, 806, 994, 3185, 4492, 7351, 4138, 385, 7536, 2296, 2746, 5571, 6107, 578, 3637, 8100, 6456, 3551, 1291, 7275, 7744, 6560, 4977, 7289, 7478, 7848, 3223, 3484, 4091, 2790, 7683, 6235, 6149, 6951, 7597, 875, 6...
Validation
3,395
2
Surface_(2012_tablet):surface 2012 tablet first-generation surface launched surface windows rt later marketed surface rt hybrid tablet computer developed manufactured microsoft announced june 18 2012 released october 26 2012 first ever personal computer designed in-house microsoft positioned direct competitor apple ipad line surface included several notable features including folding kickstand allowed tablet stand angle ability attach optional protective covers incorporated keyboards surface served launch device windows rt variation windows 8 designed devices based arm architecture windows rt contains notable differences limitations compared windows 8 including several removed features bundled special edition microsoft office 2013 home student besides software included operating system incompatible desktop software runs windows 8 personal computers tablets intel compatible processors windows rt run metro-style apps obtained windows store however visually resembling surface pro 2-in-1 detachable surface considered 2-in-1 pc fact variant hybrid tablet surface met mixed reviews although praised hardware design accessories aspects operating system criticism directed towards performance device well limitations windows rt operating system application ecosystem sales surface poor microsoft cutting price worldwide taking us 990 million loss july 2013 result succeeded surface 2 2013 comes newer rt 8.1 os original surface also since received update support surface 2 end 2023 device announced press-only event los angeles first pc microsoft designed manufactured in-house surface supports wifi wireless connectivity cellular variant tablet went sale eight countries australia canada china france germany hong kong united kingdom united states surface pro launched later surface tablet display 1366x768 pixels five-point multi-touch touchscreen gorilla glass 2 device measures made magnesium kickstand usb port magnetic keyboard interface give surface ability add wireless mouse external keyboard thumb drive also slot microsd card add 200 gb surface runs windows rt preloaded windows mail calendar contacts sports news travel finance camera weather reader skydrive store photos skype longer supported maps games messaging bing desktop xbox music xbox video windows store applications supports microsoft office home student 2013 rt includes word powerpoint excel onenote within desktop application windows rt allows installing windows store applications windows rt compiled entirely arm instruction set architecture major update windows rt 8.0 launched october 17 2013 called windows rt 8.1 update brought many improvements surface overhauled mail app bing apps like reading list onedrive updated skydrive also brought support larger tiles help tips app internet explorer 11 outlook 2013 rt changes pc settings lockscreen photo slideshow infinitely re-sizable apps start button speed improvements later update windows rt 8.1 dubbed windows rt 8.1 update added search button start screen well taskbar modern ui title bar modern ui apps surface launched two accessories type cover touch cover touch cover came white black magenta red cyan type cover came black limited edition touch covers released featuring laser-etched artwork back touch type covers double keyboards magnetically attach surface accessory spine later adapters micro-hdmi hdmi vga released cnet praised design surface noting looked practical without cold feels like high-quality device microsoft cut corners make kickstand also praised feel quality kickstand keyboard cover accessories also noted satisfying clicking sound engaged attached covers deemed essential getting complete surface experience touch cover praised spacious typing area tablet keyboard attachments usable getting used soft feel type cover recommended touch cover due higher quality conventional key design surface display praised larger size widescreen aspect ratio ipad line panned muted color reproduction touchscreen-oriented aspects windows 8 interface praised elegant albeit harder learn android ios windows rt operating system panned still requiring use mouse-oriented desktop interface access applications settings accessible within metro shell poor application ecosystem windows store state on-launch compared ghost town apocalypse surface also panned poor performance especially comparison tegra 3-based tablets conclusion felt paired keyboard cover surface excellent office productivity tool best tablet form entertainment needs n't go far beyond movies tv shows music occasional simple game 're covered well assuming windows store would eventually improve application selection surface wonky performance keep useful productivity device reaching true tablet greatness sales surface windows rt devices poor july 2013 microsoft reported loss us 900 million due lackluster sales surface cut price 30 worldwide microsoft price cut result slight increase market share device late-august 2013 usage data advertising network adduplex provides advertising services within windows store apps revealed surface share increased 6.2 9.8
[ 3076, 8054, 3764, 4575, 4759, 7619, 2550, 6615, 8076, 5563, 5571, 6110, 7189, 3028, 6294, 1864, 7660, 7848, 8118, 1970, 2342, 432, 6054, 972 ]
Validation
3,396
7
Shared-nothing_architecture:shared-nothing architecture shared-nothing architecture sn distributed-computing architecture update request satisfied single node processor/memory/storage unit intent eliminate contention among nodes nodes share independently access memory storage one alternative architecture shared everything requests satisfied arbitrary combinations nodes may introduce contention multiple nodes may seek update data time sn eliminates single points failure allowing overall system continue operating despite failures individual nodes allowing individual nodes upgrade without system-wide shutdown sn system scale simply adding nodes since central resource bottlenecks system another term sn sharding sn system typically partitions data among many nodes refinement replicate commonly used infrequently modified data across many nodes allowing requests resolved single node michael stonebraker university california berkeley used term 1986 database paper teradata delivered first sn database system 1983 tandem computers released nonstop sql shared nothing database 1984 shared-nothing popular web development shared-nothing architectures prevalent data warehousing applications although requests require data multiple nodes dramatically reduce throughput
[ 7788, 5717, 6248, 5014, 6415, 4031, 2827, 3268, 6893, 5289, 3005, 5734, 5735, 6817, 4159, 6461, 1112, 231, 7924, 235, 2054, 2776, 1407, 1132, 4195, 5089, 5447, 2265 ]
Test
3,397
3
Hercules_(processors):hercules processors hercules line arm architecture-based microcontrollers texas instruments built around one arm cortex cores hercules safety microcontroller platform includes series microcontrollers specifically targeted functional safety applications hardware-base fault correction/detection features dual cores run lock-step full path ecc automated self testing memory logic peripheral redundancy monitor/checker cores line includes tms470m tms570 rm4 families families designed specifically iec 61508 iso 26262 safety critical applications however differ significantly degree support safety standards
[ 6082, 6421, 7890, 722, 2926, 5740, 5750, 5752, 5405, 5406, 1864, 67, 446, 451, 6165, 463, 804, 5472, 469, 4041, 3008, 3365, 6910, 1197, 7654, 6919, 1977, 2339, 2711, 550, 3786, 5576, 7364, 1284, 4879, 7376, 5585, 4537, 950, 4197, 5622, ...
Test
3,398
9
Lively_Kernel:lively kernel lively kernel open-source web programming environment supports desktop-style applications rich graphics direct manipulation abilities without installation upgrade troubles conventional desktop applications development began sun microsystems laboratories menlo park california later moved hasso plattner institute potsdam-babelsberg near berlin lively kernel graphical composition integrated programming environment written fully programming language javascript using standard browser graphics w3c canvas svg thus accessible browser web page begins operating soon web page loaded able edit code graphics built-in webdav support save results even clone onto new web pages along application development abilities also function integrated development environment ide making whole system self-sufficient tools except browser lively kernel uses morphic graphics model add behavior scene graph built browser graphics simple graphics thus assembled standard widgets sliders scroll bars text views lists clipping frames simple window system built widgets offers object inspectors file browsers code browsers even rudimentary demo pages thus ability edit test new code simple code browser system running lively used build simple web sites including tutorial also client-side wiki system stores pages versioned repository content vary relatively static pages text fully dynamic models look behave like adobe flash simulations lively kernel achieves complex dynamic behavior without specific animation support use animation features svg simple scheduling multiple green-thread processes javascript lively kernel includes multifont text editor written javascript includes support centering justification similar rudimentary text composition abilities working lively thus much feel working web page design program except on-the-fly text layout done offline composition program built-in dynamic behavior text lively kernel liveliness lively graphics becomes even apparent manipulating scale rotation handles objects text whole code browser used tilted 20 degrees side text editor made entirely lively graphics works perfectly well rotated scaled scroll bars clipping frames rest entire user interface lively kernel depends browser support javascript svg canvas graphics part w3c standards 2009 means runs safari firefox chrome opera browsers requirement might seem less compatible html lively actually compatible across browsers runs html uniformity among javascript svg canvas implementations one html implementation another except one small initial file lively kernel code base entirely free tests client browser used 2011 lively kernel runs best webkit-based browsers safari macintosh chromium google chrome windows running internet explorer windows requires google chrome frame testing popular browsers planned next release lively includes integrated development environment considerable power designed work via webdav local set dozen source javascript files synchronizable versioned repository user opens systembrowser javascript source files listed file pane browser user clicks one files read parsed ometa javascript parser displayed similar smalltalk browser functions class definitions listed class method names shown user click method name edit code bottom pane save new definition new definition checked syntax correct stored back .js file moreover eval mode usual case method redefined system running allows non-critical changes made without need restart lively applications developed source files loaded rapid scan find every reference selected text present code bodies match separate sub-browser lively ide includes object inspectors morph style panels controlling fills borders text styles also facilities debugging error points profiling performance tuning pushed owing improving quality run-time support major browsers ide operates source code files versioned repository manage evolution lively code base approach used empower users control active web content form client-side wiki lively includes facilities edit content worlds scene graphs content store content web pages webdav connection allows lively store new versions page content incrementally developed new version saved viewable rest internet prior versions retrieved cases error change mind notable wiki style evolving web content extends textual graphical scripting content lively well new forms may defined yet without need wiki server kind required server providing http webdav interface increasing amounts lively project content maintained manner lively qt new implementation lively kernel kernel parts replaced functionality offered qt framework lively qt inherits basic functionality implementation widgets layout management core event handling core javascript support qt lively qt retains exceptionally interactive nature liveliness lively kernel e.g. allowing user interface application source code edited fly however lively qt development work performed using familiar well-documented apis qt platform
[ 6788, 1445, 6428, 1840, 2568, 405, 6116, 54, 7573, 422, 3663, 5786, 1895, 5787, 6858, 4017, 5091, 1152, 1154, 4755, 4759, 2639, 6172, 3368, 2658, 486, 6933, 5172, 7310, 183, 3092, 562, 2740, 8085, 5571, 7734, 2040, 930, 5948, 237, 6660,...
Validation
3,399
5
Wireless_Framework_Telecommunication_(code_name:_Beep):wireless framework telecommunication code name beep wireless framework telecommunication beep implementation xmpp protocol mobile devices enable two roaming mobile devices positioned two different locations exchange data order communication stream successful mobile devices must connected internet wireless technology regardless wireless technologies using internet acts middle carrier developers trying best offer communication services highest possible quality relieve user paying current high costs communication moreover project empower client mobile device roaming capabilities allowing mobile device easily locate initiate interaction session another mobile device within unlimited range beep implementation generic high level abstract well-defined framework supports wireless communication internet enabling two roaming mobile devices exchange data necessarily using wireless technology use protocol enable developers program application run top protocol exchange data different types licensed gnu general public license gpl
[]
Test
3,400
4
National_Cybersecurity_Center_of_Excellence:national cybersecurity center excellence national cybersecurity center excellence nccoe us government organization builds publicly shares solutions cybersecurity problems faced u.s. businesses center located rockville maryland established 2012 partnership national institute standards technology nist state maryland montgomery county center partnered nearly 20 market-leading companies contribute hardware software expertise nccoe asks industry sector members cybersecurity problems selects issues affect entire sector reaches across sectors center forms team people cybersecurity technology companies federal agencies academia address problem teams work center ’ labs build example solutions using commercially available off-the-shelf products example solution nccoe publishes practice guide collection materials information needed deploy example solution makes available general public center ’ goal “ accelerate deployment use secure technologies ” help businesses improve defenses cyber attack nccoe part nist non-regulatory federal agency within u.s. department commerce develops measurement standards conducts research measurement science according nist website federal information security management act 2002 fisma “ reaffirmed nist ’ role developing information security standards federal information processing standards guidelines non-national security federal information systems assigned nist specific responsibilities including development standards used federal agencies categorize information information systems based objectives providing appropriate levels information security according range risk levels guidelines recommending types information information systems included category minimum information security requirements management operational technical security controls information information systems category. ” many private sector organizations voluntarily adopt standards guidelines security requirements nist center nccoe applied space demonstration standards-based approaches cybersecurity president barack obama issued executive order 13636 “ improving critical infrastructure cybersecurity ” february 2013 tasking nist create cybersecurity framework helps organizations mitigate risks nation ’ essential systems power generation distribution financial services sector transportation nist released framework improving critical infrastructure cybersecurity february 2014 “ consists standards guidelines practices promote protection critical infrastructure. ” nccoe demonstrates framework implemented real-world environments industrial sector approaches center cybersecurity problem center maps solution ’ hoped-for capabilities cybersecurity framework well standards controls best practices nccoe ’ launch formally announced february 21 2012 u.s senator barbara mikulski d-md maryland lt governor anthony brown montgomery county executive isiah leggett secretary commerce standards technology nist director patrick d. gallagher nist issued press release day stating center created “ work strengthen u.s. economic growth supporting automated trustworthy e-government e-commerce. ” nccoe “ host multi-institutional collaborative efforts build expertise industry government ” according press release september 2014 national institute standards technology nist awarded contract mitre corporation operate department commerce ’ first federally funded research development center ffrdc national cybersecurity ffrdc supports nccoe according press release nist website “ ffrdc first solely dedicated enhancing security nation ’ information systems. ” press release states ffrdc help nccoe “ expand accelerate public-private collaborations ” focus “ boosting security u.s. information systems. ” “ ffrdcs operate public interest required free organizational conflicts interest well bias toward particular company technology product—key attributes given nccoe ’ collaborative nature…the first three task orders contract allow nccoe expand efforts developing use cases building blocks provide operations management facilities planning. ” partners founded nccoe national institute standards technology nist state maryland montgomery county partnership instrumental establishing center nationally recognized cybersecurity resource potential increase number local cybersecurity companies local workforce development provide local companies exposure nist ’ expertise national cybersecurity excellence partners nceps offer technology companies opportunity develop long-term relationships nccoe nist core partners nceps provide hardware software personnel collaborate nccoe current projects sector representatives approach nccoe behalf industry share business problems solved cybersecurity solution representatives also provide insight project build process help validate center ’ approach developing example solution members government agencies academic institutions discuss cybersecurity challenges nccoe provide insight feedback existing center projects collaborate technology companies center ’ labs users businesses working improve cybersecurity opportunity test nccoe ’ example solutions evaluate effectiveness provide feedback
[ 5609, 4036 ]
Test
3,401
5
CryptoNote:cryptonote cryptonote application layer protocol aims solve problems outlined bitcoin core protocol behind bitcoin protocol powers several decentralized privacy-oriented cryptocurrencies nothing known original author cryptonote nicolas van saberhagen
[ 6430, 6069, 4759, 5571, 1329, 6216, 8124, 3024, 538, 744 ]
Test
3,402
4
National_Collegiate_Cyber_Defense_Competition:national collegiate cyber defense competition national collegiate cyber defense competition nccdc championship event collegiate cyber defense competition system – largest college-level cyber defense competition usa event held annually san antonio area effort help facilitate development regular national level cyber security exercise center infrastructure assurance security university texas san antonio utsa hosted first collegiate cyber defense competition southwestern region may 2005 june 29 2010 united states house legislature passed recognizing national ccdc promoting cyber security curriculum similar cyber defense competitions many aspects nccdc unique focuses operational aspect managing protecting existing network infrastructure exercises examine abilities group students design configure protect network course entire semester competition focused operational task assuming administrative protective duties existing commercial network teams assessed based ability detect respond outside threats maintain availability existing services mail servers web servers respond business requests addition removal additional services balance security needs business needs nccdc operated rules published center infrastructure assurance utsa current rules found homepage several regional groups formed provide qualifying events nccdc annual event regions share overlap various states every effort made make regional event consistent nccdc event
[]
Test
3,403
6
CRFS:crfs crfs coherent remote file system network file system protocol zach brown formerly oracle intended leverage btrfs architecture gain higher performance existing protocols nfs smb expose btrfs features snapshots remote clients code unmaintained one looking network file system top btrfs number options available active support development including ceph beegfs glusterfs samba
[ 6117, 2536 ]
Train
3,404
2
Michael_Kerrisk:michael kerrisk michael kerrisk technical author programmer since 2004 maintainer linux man-pages project succeeding andries brouwer born 1961 new zealand lives munich germany kerrisk worked digital equipment google linux foundation editor writer lwn.net currently works freelance consultant trainer best known book linux programming interface published starch press 2010 book widely regarded definitive work linux system programming translated several languages maintainer linux man-pages project kerrisk authored co-authored third man pages worked improving project infrastructure contributions received special award 2016 new zealand open source awards
[ 2182, 3938, 3613, 1822, 7528, 7532, 5744, 6443, 4341, 7559, 5759, 5762, 412, 3666, 2260, 5453, 7242, 462, 1535, 1924, 6892, 1176, 4401, 1933, 5829, 1192, 1208, 6211, 4435, 2689, 5865, 7669, 1227, 1596, 165, 7312, 1607, 5884, 1991, 3084, ...
Test
3,405
3
Palm_VII:palm vii palm vii personal digital assistant made palm computing division 3com device featured antenna used wireless data communication first palm device connectivity provided mobitex network defunct palm.net service web clipping applications also known palm query applications pqas made use network request post web data devices also provided pqa developers user position form zipcode making palm vii first web-enabled location-based services mobile platform cost service 14.95 per month allowed limited number web pages viewed palm vii expensive palm sold date unit pricing starting us 599 despite high price tag palm vii proved popular one first truly wireless data-capable information devices
[ 7326, 4754, 2551, 4317, 5571, 488, 7919, 1581, 1237, 1702 ]
Test
3,406
3
AMULET_microprocessor:amulet microprocessor amulet series microprocessors implementing arm processor architecture developed advanced processor technologies group school computer science university manchester formerly amulet pal groups based institution amulet unique amongst arm implementations asynchronous microprocessor making use square wave clock signal data synchronization movement
[ 949, 1237, 5947 ]
Test
3,407
2
Graphics_Device_Interface:graphics device interface graphics device interface gdi microsoft windows application programming interface core operating system component responsible representing graphical objects transmitting output devices monitors printers gdi responsible tasks drawing lines curves rendering fonts handling palettes directly responsible drawing windows menus etc task reserved user subsystem resides user32.dll built atop gdi systems components similar gdi example macos quartz x window system xlib/xcb gdi significant advantages direct methods accessing hardware perhaps scaling capabilities abstract representation target devices using gdi easy draw multiple devices screen printer expect proper reproduction case capability center see get applications microsoft windows simple games require fast graphics rendering may use gdi however gdi relatively hard use advanced animation lacks notion synchronizing individual video frames video card lacks hardware rasterization 3d etc modern games usually use directx opengl instead let programmers exploit features modern hardware device context dc used define attributes text images output screen printer actual context maintained gdi handle device context hdc obtained output written released elements written gdi uses bresenham line drawing algorithm draw aliased lines gdi present initial release windows ms-dos programs hitherto manipulated graphics hardware using software interrupts sometimes via video bios manipulating video memory directly code written way expects user video memory tenable windowed system like microsoft windows multiple applications would want write subwindows concurrently byte december 1983 discussed microsoft plans system output graphics printers monitors code forthcoming first release windows introduction windows xp gdi complemented c++-based gdi+ subsystem gdi+ adds anti-aliased 2d graphics floating point coordinates gradient shading complex path management intrinsic support modern graphics-file formats like jpeg png support composition affine transformations 2d view pipeline gdi+ uses argb values represent color use features apparent windows xp user interface several applications microsoft paint windows picture fax viewer photo printing wizard pictures slideshow screensaver presence basic graphics layer greatly simplifies implementations vector-graphics systems flash svg gdi+ included versions windows windows xp gdi+ dynamic library also shipped application used older versions windows windows 98 windows nt 4.0 onwards additional text processing resolution independence capabilities gdi+ text rendering performed cpu nearly order magnitude slower hardware accelerated gdi chris jackson published tests indicating piece text rendering code written could render 99,000 glyphs per second gdi code using gdi+ rendered 16,600 glyphs per second microsoft .net class library provides managed interface gdi+ via codice_1 namespace gdi+ similar purpose structure apple quickdraw gx subsystem open-source libart cairo libraries windows vista windows applications including gdi gdi+ applications run new compositing engine desktop window manager dwm built atop windows display driver model gdi rendering implemented canonical display driver cdd.dll draws system memory surfaces redirected dwm gdi longer hardware-accelerated video card driver however due nature desktop composition internal management moving bitmaps transparency anti-aliasing gdi+ handled dwm core operations like window moves faster responsive underlying content need re-rendered application windows 7 includes gdi hardware acceleration blitting operations windows display driver model v1.1 improves gdi performance canonical display driver allows dwm engine use local video memory compositing thereby reducing system memory footprint increasing performance graphics operations primitive gdi operations still hardware-accelerated unlike direct2d november 2009 amd nvidia released wddm v1.1 compatible video drivers gdi+ continues rely software rendering windows 7 gdi printer winprinter analogous winmodem printer designed accept output host computer running gdi windows host computer print processing gdi software renders page bitmap sent software printer driver usually supplied printer manufacturer processing particular printer printer combination gdi driver bidirectional receive information printer whether ready print paper ink non-gdi printers require hardware firmware memory page rendering gdi printer uses host computer making cheaper manufacture similar non-gdi printer manufacturers produce essentially printer version compatible printer control language pcl postscript cheaper gdi-only version cases lowest-cost models given manufacturer range support gdi printer control language accept input device suitable driver gdi printer requires pc running windows compatible hardware operating systems general gdi printers compatible hardware print servers although servers built-in processing capability making compatible specified gdi printers gdi printers made available computers network connected shared printers computer running windows generic gdi drivers pnm2ppa written make gdi printers compatible non-windows operating systems freebsd guarantee particular gdi printer supported order allow simpler creation drivers winprinters microsoft universal printer driver created allows printer vendors write generic printer description gpd minidrivers describe printer capabilities command set plaintext rather kernel mode driver development time window opened consumes gdi objects complexity window increases additional features buttons images gdi object usage also increases many objects use windows unable draw gdi objects leading misbehaving software frozen unresponsive program operation many applications also incorrectly coded fail release gdi objects use adds problem total available gdi objects varies one version windows next windows 95 98 millennium limit 1,200 total objects windows 2000 limit 16,384 objects windows xp vista windows 7 configurable limit via registry defaults 10,000 objects per process theoretical maximum 65,536 entire session windows 8 8.1 increase gdi object limit 65,536 per user logon session earlier versions windows windows 3.1 windows 98 included resource meter program allow user monitor much total system gdi resources use unfortunately resource meter consumed gdi objects later versions windows 2000 windows xp report gdi object usage program task manager tell user total gdi capacity available overflowing gdi capacity affect windows preventing new windows opening menus displaying alert boxes appearing situation difficult clear potentially require forced hard-reset system since prevents core system programs functioning windows 8 8.1 forced logoffs occur result gdi capacity overflow instead hard reboot example forcing frozen process end using task manager normally makes sure alert window appear free gdi windows beeps error alert choice appear gdi-overflowing processes terminated unless user uses taskkill command direct2d directwrite designed replace gdi/gdi+ uniscribe respectively screen-oriented rendering shipped windows 7 windows server 2008 r2 well windows vista windows server 2008 platform update installed wpf/uwp based-application win2d gdi like class library developed microsoft downloaded inside visual studio using nuget win2d easy-to-use windows runtime api immediate mode 2d graphics rendering gpu acceleration
[ 7149, 7879, 3937, 3263, 6420, 714, 378, 2198, 720, 1460, 6096, 1840, 2928, 7907, 1475, 5747, 7553, 7195, 5410, 7564, 2953, 6840, 422, 6844, 2245, 5784, 435, 1897, 5442, 4377, 4017, 3340, 5090, 6504, 447, 7602, 4022, 4026, 7607, 1526, 61...
Test
3,408
8
NCSA_HTTPd:ncsa httpd ncsa httpd early discontinued web server originally developed ncsa university illinois urbana–champaign robert mccool others first released 1993 among earliest web servers developed following tim berners-lee cern httpd tony sanders plexus server others time natural counterpart mosaic web browser client–server world wide web also introduced common gateway interface allowing creation dynamic websites robert mccool left ncsa mid-1994 development ncsa httpd slowed greatly independent effort apache project took codebase continued meanwhile ncsa released one version 1.5 ceased development august 1995 ncsa httpd powered web servers internet nearly quickly switched apache april 1996 apache passed ncsa httpd 1 server internet retained position mid-to-late 2016
[ 3168, 3508, 5369, 1349, 5206, 5820, 5214, 2646, 6270, 1834, 2291, 479, 8182, 6536, 26, 7988, 7544, 4701, 1392, 7786, 417, 3135, 2506, 1686, 1602, 6061, 7411, 84, 7952, 2807 ]
Validation
3,409
9
Mitchell_Wand:mitchell wand mitchell wand computer science professor northeastern university received ph.d. massachusetts institute technology research centred programming languages member northeastern programming research lab also co-author daniel p. friedman christopher t. haynes essentials programming languages
[ 1243, 4737, 7204, 7852 ]
Validation
3,410
9
Maple_(software):maple software maple symbolic numeric computing environment also multi-paradigm programming language developed maplesoft maple also covers aspects technical computing including visualization data analysis matrix computation connectivity toolbox maplesim adds functionality multidomain physical modeling code generation users enter mathematics traditional mathematical notation custom user interfaces also created support numeric computations arbitrary precision well symbolic computation visualization examples symbolic computations given maple incorporates dynamically typed imperative-style programming language resembles pascal language permits variables lexical scope also interfaces languages c c fortran java matlab visual basic also interface excel maple supports mathml 2.0 w3c format representing interpreting mathematical expressions including display web pages maple based small kernel written c provides maple language functionality provided libraries come variety sources libraries written maple language viewable source code many numerical computations performed nag numerical libraries atlas libraries gmp libraries different functionality maple requires numerical data different formats symbolic expressions stored memory directed acyclic graphs standard interface calculator interface written java first concept maple arose meeting november 1980 university waterloo researchers university wished purchase computer powerful enough run macsyma instead decided would develop computer algebra system would able run lower cost computers first limited version appearing december 1980 maple demonstrated first conferences beginning 1982 name reference maple canadian heritage end 1983 50 universities copies maple installed machines 1984 research group arranged watcom products inc license distribute first commercially available version maple 3.3 1988 waterloo maple inc. founded company ’ original goal manage distribution software eventually company evolved r department maple development done today rest done university research labs worldwide including symbolic computation laboratory university waterloo ontario research centre computer algebra university western ontario 1989 first graphical user interface maple developed included version 4.3 macintosh x11 windows versions new interface followed 1990 maple v. 1992 maple v release 2 introduced maple worksheet combined text graphics input typeset output 1994 special issue newsletter created maple developers called mapletech published 1999 release maple 6 maple included nag numerical libraries 2003 current standard interface introduced maple 9 interface primarily written java although portions rules typesetting mathematical formulae written maple language java interface criticized slow improvements made later versions although maple 11 documentation recommends previous classic interface users less 500 mb physical memory mid 1995 2005 maple lost significant market share competitors due weaker user interface 2005 maple 10 introduced new document mode part standard interface developed following years september 2009 maple maplesoft acquired japanese software retailer cybernet systems features maple include sample imperative programming constructs simple functions also defined using maps arrow notation find answer compute determinant matrix series tanh x x=0,15 high order polynomial equation plot x*sin x x=-10..10 plot3d x^2+y^2 x=-1..1 y=-1..1 plots -animate subs k .5 f x=-30..30 t=-10..10 numpoints=200 frames=50 color=red thickness=3 plots -animate3d cos t*x *sin 3*t*y x=-pi..pi y=-pi..pi t=1..2 matrix 400,400,200 100,100 -400 1,1,1 datatype=float 8 plot3d 1 x=0..2*pi y=0..pi axes=none coords=spherical viewpoint= path=m f 1+a*t+b*t^2 *exp c*t find functions formula_17 satisfy integral equation maple engine used within several products maplesoft listed third-party commercial products longer use maple engine
[ 6507, 5098, 2451, 5983, 1158, 3606, 2820, 1626, 4759, 4302, 5548, 7333, 7966, 4039, 1731, 3619, 5288, 5117, 6356, 1435, 4872, 578, 7005, 3383, 4705, 1569, 666, 4067, 3981, 3388, 4070, 3807, 5948, 1398, 2803, 6934, 1879, 5885, 7579, 3326, ...
Validation
3,411
4
Cyberoam:cyberoam cyberoam technologies sophos company global network security appliances provider presence 125 countries company offers user identity-based network security firewalls/ unified threat management appliances allowing visibility granular control users activities business networks soho smb large enterprise networks ensures security built around network user protection apts insider threats malware hacker sophisticated network attacks cyberoam sales offices north america emea apac company customer support development centers india 550+ employees across globe channel-centric approach sales global network 4500+ partners company also conducts training programs customers partners cyberoam ’ product range offers network security solution firewall utm appliances centralized security management cyberoam central console appliances centralized visibility cyberoam iview cyberoam netgenie home small office networks cyberoam network security appliances include multiple features like firewall – vpn ssl vpn ipsec gateway anti-virus anti-spyware anti-spam intrusion prevention system ips content application filtering web application firewall application visibility control bandwidth management multiple link management load balancing gateway failover single platform cyberoam offers visibility control 2000+ key applications offers complete visibility applications accessed within organization user irrespective ports protocols stops sophisticated application-layer threats right network perimeter ensuring application security granular controls applications ensure qos critical applications cyberoam utm ’ on-appliance reporting gives details every type attack vector attacker details victim details also graphically represents general security trends organization cyberoam solutions aid compliance regulatory needs organizations cyberoam firewall technology eal4+ certified eal4+ certification security product firewall requires in-depth evaluation independent third-party test lab globally regarded decisive measure quality security product cyberoam gsmc global iso 20000 2011 certified post sales technical services global customers cyberoam cr series utm level 5 checkmark certified cyberoam firewall certified icsa labs firewall certification icsa labs firewall certification demands required icsa labs independent division cybertrust validating cyberoam ’ firewall capabilities effectively protecting customers ’ networks malicious internet threats cyberoam ‘ ipv6 ready ’ certified identify process ipv6 traffic ipv6 ready logo program driven ipv6 forum international testing program 3000 test cases product rigorously tested cyberoam patented layer 8 technology also known identity based security adds 8th layer human layer network protocol stack thereby considering user ’ identity part firewall rule matching criteria cyberoam attaches user identity security authenticating authorizing auditing aaa network allowing network administrator see control ‘ user ’ network instead ip address enables administrators identify users control internet activity users network set user based policies reporting username cyberoam launched global mission sign academies bridge demand-supply gap network security recently called cyberoam academy order propagate knowledge identity-based technology among upcoming networking students cyberoam tied nescot north east surrey college technology -its first master uk training academy nescot offers cyberoam certified security courses includes basic-level course namely 'ccnsp cyberoam certified security professional advanced-level course namely 'ccnse cyberoam certified security expert cyberoam threat research labs ctrl identifies security threats eventually raising resistance various vulnerabilities malware attacks publishing security upgrades research reports reports help users remain protected detailed guidance malware threat prevention advice using appropriate configuration parameters cyberoam appliances ctrl goes beyond finding emerging potential threats aims providing insightful investigation advanced threats engineered imagined around today ’ internet usage apps tor project researcher google software security engineer revealed july 2012 cyberoam appliances ssl traffic inspection capabilities using self-generated ca certificate default made possible intercept traffic victim cyberoam device cyberoam device indeed extract key device import dpi deep packet inspection devices use interception cyberoam issued over-the-air ota update unified threat management utm appliances order force devices use unique certificate authority ca ssl certificates intercepting ssl traffic corporate networks hotfix applied individual appliance required unique ca certificate
[ 1368, 4734, 651, 2746, 2213, 5813, 991, 3486, 1805, 6305 ]
Test
3,412
9
HyperCard:hypercard hypercard software application development kit apple macintosh apple iigs computers among first successful hypermedia systems predating world wide web hypercard combines flat-file database graphical flexible user-modifiable interface hypercard includes built-in programming language called hypertalk manipulating data user interface combination features – database simple form layout flexible support graphics ease programming – suits hypercard many different projects rapid application development applications databases interactive applications database requirements command control systems many examples demoscene hypercard originally released 1987 49.95 included free new macs sold withdrawn sale march 2004 received final update 1998 upon return steve jobs apple hypercard runs classic environment ported mac os x. hypercard based concept stack virtual cards cards hold data would rolodex card-filing device card contains set interactive objects including text fields check boxes buttons similar common graphical user interface gui elements users browse stack navigating card card using built-in navigation features powerful search mechanism user-created scripts users build modify stacks adding new cards place gui objects cards using interactive layout engine based simple drag-and-drop interface also hypercard includes prototype template cards called backgrounds new cards created refer one background cards causes objects background copied onto new card way stack cards common layout functionality created layout engine similar concept form used rapid application development rad environments borland delphi microsoft visual basic visual studio database features hypercard system based storage state objects cards physical file representing stack database exist separate system within hypercard stack database engine similar construct exists instead state object system considered live editable time hypercard runtime perspective difference moving text field card typing operations simply change state target object within stack changes immediately saved complete typing field causes text stored stack physical file system operates largely stateless fashion need save operation common many database-oriented systems although somewhat different document-based applications final key element hypercard script single code-carrying element every object within stack script text field whose contents interpreted hypertalk language like property script object edited time changes saved soon complete user invokes actions gui like clicking button typing field actions translated events hypercard runtime runtime examines script object target event like button see script object contains event code called handler hypertalk engine runs handler runtime examines objects visual hierarchy concepts make majority hypercard system stacks backgrounds cards provide form-like gui system stack file provides object persistence database-like functionality hypertalk allows handlers written gui events unlike majority rad database systems era however hypercard combines features user-facing developer-facing single application allows rapid turnaround immediate prototyping possibly without coding allowing users author custom solutions problems personalized interface empowerment became catchword possibility embraced macintosh community phrase programming rest us anyone professional programmers combination features also makes hypercard powerful hypermedia system users build backgrounds suit needs system say rolodex use simple hypertalk commands provide buttons move place place within stack provide navigation system within data elements ui like text fields using features easy build linked systems similar hypertext links web unlike web programming placement browsing tool similar systems created html traditional web services considerably heavyweight hypercard contains object oriented scripting language called hypertalk hypertalk object classes predetermined hypercard environment although others added use externals weakly typed hypertalk supports standard programming structures if-then repeat hypertalk verbose hence ease use readability hypertalk code segments referred scripts term considered less daunting beginning programmers hypercard extended significantly use external command xcmd external function xfcn modules code libraries packaged resource fork integrate either system generally hypertalk language specifically early example plug-in concept unlike conventional plug-ins require separate installation available use included stack directly available scripts stack hypercard peak popularity late 1980s whole ecosystem vendors offered thousands externals hypertalk compilers graphing systems database access internet connectivity animation oracle offered xcmd allows hypercard directly query oracle databases platform superseded oracle card beehive technologies offered hardware interface allows computer control external devices connected via apple desktop bus adb instrument read state connected external switches write digital outputs multitude devices externals allow access macintosh toolbox contains many lower-level commands functions native hypertalk control serial adb ports hypercard created bill atkinson following lsd trip work began march 1985 name wildcard hence creator code wild 1986 dan winkler began work hypertalk name changed hypercard trademark reasons initially released august 1987 understanding atkinson would give hypercard apple company promised release free macs apple timed release coincide macworld conference expo boston massachusetts guarantee maximum publicity hypercard successful almost instantly apple programmer developer association apda said hypercard informational feeding frenzy august 1987 announced october phones never stopped ringing zoo within months release multiple hypercard books 50 disk set public domain stacks apple project managers found hypercard used huge number people internally externally bug reports upgrade suggestions continued flow demonstrating wide variety users since also free difficult justify dedicating engineering resources improvements software apple mainstream developers understood hypercard user empowerment could reduce sales ordinary shrink-wrapped products stewart alsop ii speculated hypercard might replace finder macintosh graphical user interface late 1989 kevin calhoun hypercard engineer apple led effort upgrade program resulted hypercard 2.0 released 1990 new version included on-the-fly compiler greatly increased performance computationally intensive code new debugger many improvements underlying hypertalk language time hypercard 2.0 developed separate group within apple developed 1991 released hypercard iigs version hypercard apple iigs system aimed mainly education market hypercard iigs roughly feature set 1.x versions macintosh hypercard adding support color graphics abilities iigs although stacks hypercard program documents binary-compatible translator program another hypercard stack allows moved one platform apple decided application software packages including hypercard would property wholly owned subsidiary called claris many hypercard developers chose stay apple rather move claris causing development team split claris attempted create business model hypercard could also generate revenues first freely-distributed versions hypercard shipped authoring disabled early versions claris hypercard contain easter egg typing magic message box converts player full hypercard authoring environment trick became nearly universal wrote new version hypercard player apple distributed macintosh operating system claris sold full version commercially many users upset pay use software traditionally supplied free many considered basic part mac even hypercard generating revenue claris little market development continued minor upgrades first failed attempt create third generation hypercard period hypercard began losing market share without several important basic features hypercard authors began moving systems supercard macromedia authorware nonetheless hypercard continued popular used widening range applications game manhole earlier effort creators myst corporate information services apple eventually folded claris back parent company returning hypercard apple core engineering group 1992 apple released eagerly anticipated upgrade hypercard 2.2 included licensed versions color tools addmotion ii adding support color pictures animations however tools limited often cumbersome use hypercard 2.0 lacks true internal color support several attempts made restart hypercard development returned apple product widespread use multimedia-authoring tool rolled quicktime group new effort allow hypercard create quicktime interactive qti movies started direction kevin calhoun qti extended quicktime core multimedia playback features provide true interactive facilities low-level programming language based 68000 assembly language resulting hypercard 3.0 first presented 1996 alpha-quality version shown developers apple annual apple worldwide developers conference wwdc leadership dan crow development continued late 1990s public demos showing many popular features color support internet connectivity ability play hypercard stacks special quicktime movies web browser development upon hypercard 3.0 stalled quicktime team focused away developing quicktime interactive streaming features quicktime 4.0. 1998 steve jobs disliked software atkinson chosen stay apple finish instead joining jobs next according atkinson sculley stink 2000 hypercard engineering team reassigned tasks jobs decided abandon product calhoun crow left apple shortly 2001 final release 1998 totally discontinued march 2004 hypercard runs natively classic mac os still used mac os x classic mode powerpc based machines g5 earlier last functional native hypercard authoring environment classic mode mac os x 10.4 tiger powerpc-based machines hypercard used range hypertext artistic purposes advent powerpoint hypercard often used general-purpose presentation program examples hypercard applications include simple databases choose adventure -type games educational teaching aids due rapid application design facilities hypercard also often used prototyping applications sometimes even version 1.0 implementations inside apple quicktime team one hypercard biggest customers hypercard lower hardware requirements macromedia director several commercial software products created hypercard notably original version interactive game narrative myst voyager company expanded books multimedia cd-roms beethoven ninth symphony cd-rom hard day night beatles voyager macbeth early electronic edition whole earth catalog implemented hypercard stored cd-rom prototype demo popular game n't know jack written hypercard french auto manufacturer renault used control inventory system quebec canada hypercard used control robot arm used insert retrieve video disks national film board cinérobothèque hypercard used prototype fully functional prototype sidoci one first experiments world develop integrated electronic patient record system heavily used montréal consulting firm dmr demonstrate typical day life patient get surgery would look like paperless age activision mainly game company saw hypercard entry point business market changing name mediagenic published several major hypercard-based applications notably danny goodman focal point personal information manager reports hypercard program nine five software allows users treat hypercard full database system robust information viewing printing features hypercard-inspired supercard included roadster plug-in allowed stacks placed inside web pages viewed web browsers appropriate browser plug-in even windows version plug-in allowing computers macintoshes use plug-in first hypercard virus discovered belgium netherlands april 1991 hypercard executed scripts stacks immediately opening also one first applications susceptible macro viruses merryxmas virus discovered early 1993 ken dunham two years concept virus viruses based hypercard overall impact minimal compute apple applications 1987 stated hypercard may make macintosh personal computer choice noting large memory requirement made best suited computers 2 mb memory hard drives magazine predicted smallest programming shop able turn stackware especially using cd-roms compute predicted 1988 future mac software would developed using hypercard using addictive developers wo n't able tear away long enough create anything else byte 1989 listed among excellence winners byte awards stating like first entry flaws magazine wrote hypercard opened new category software praised apple bundling every mac 2001 steve wozniak called hypercard best program ever written hypercard one first products made use popularized hypertext concept large popular base users jakob nielsen pointed hypercard really hypermedia program since links started regions card text objects actual html-style text hyperlinks possible later versions awkward implement seldom used deena larsen programmed links hypercard marble springs bill atkinson later lamented realized power network-oriented stacks instead focusing local stacks single machine hypercard could become first web browser hypercard saw loss popularity growth world wide web since web could handle deliver data much way hypercard without limited files local hard disk hypercard significant impact web inspired creation http influence tim berners-lee colleague robert cailliau javascript whose creator brendan eich inspired hypertalk also key inspiration violawww early web browser pointing-finger cursor used navigating stacks later used first web browsers hyperlink cursor myst computer game franchise initially released hypercard stack included bundled macs example performa 5300 still lives making hypercard facilitating technology starting one best-selling computer games time according ward cunningham inventor wiki wiki concept traced back hypercard stack wrote late 1980s 2017 internet archive established project preserve emulate hypercard stacks allowing users upload gui prototype apple wizzy active lifestyle telephone based hypercard hypercard influenced development web late 1990 influence robert cailliau assisted developing tim berners-lee first web browser javascript inspired hypertalk although hypercard stacks operate internet 1988 least 300 stacks publicly available download commercial compuserve network connected official internet yet system link phone numbers user computer together enable dial numbers without modem using less expensive piece hardware hyperdialer sense like web form association-based experience information browsing via links though operating remotely tcp/ip protocol like web also allows connections many different kinds media companies offered versions four products available offer hypercard-like abilities past products include addition many basic concepts original system later re-used forms apple built system-wide scripting engine applescript language similar hypertalk often used desktop publishing dtp workflow automation needs 1990s facespan provided third-party graphical interface applescript also native graphical programming front-end called automator released mac os x tiger april 2005 one hypercard strengths handling multimedia many multimedia systems like macromedia authorware macromedia director based concepts originating hypercard appware originally named serius developer sometimes seen similar hypercard rapid application development rad systems appware sold early 90s worked mac windows systems
[ 4655, 6788, 1069, 1815, 2547, 7890, 6802, 5378, 7537, 4320, 4690, 734, 3291, 2574, 1103, 5752, 405, 6125, 2954, 1123, 4352, 6847, 4003, 6142, 2609, 1897, 84, 4376, 5091, 445, 4749, 1152, 5450, 7601, 4755, 6165, 3001, 2284, 7628, 7259, 2...
Test
3,413
6
SQX:sqx sqx-archiver open free data compression archival format used one applications free charge license royalty free homepage provides sdk source compiled dlls likewise unencumbered license costs format designed speedproject squeez also supported tugzip
[ 7555, 7746, 5382, 1254, 2589, 7584, 169, 1471, 7201, 3219, 510, 7387, 658 ]
Test
3,414
7
Semantic_web_data_space:semantic web data space semantic web data space container domain specific portable data provided human and/or machine friendly structures data data space referenced identifier linked data across spaces domains thus viewed object-oriented fashion underlying paradigm brings together ideas technologies various sources approach applied web based systems desktop-based systems data data spaces linked across spaces domains enhance meaning internal data supports work linked data project part semantic web effort benefit useful point querying information across domains assists development web data data space fully supportive data portability advocated dataportability project means object data space movable also ability referenced using identifier uniform resource identifier
[ 4635, 8174, 7290, 2054, 84, 7649, 3383 ]
Test
3,415
4
Joint_Cyber-Defence_Command:joint cyber-defence command joint cyber-defence command mccd spanish cyber defence service defence staff responsible planning execution actions related cyber defence networks information telecommunications systems ministry defense others might entrusted well contributing adequate response cyberspace threats aggressions may affect national defense sense mccd directs coordinates matter cyber defense activity centers response incidents security information different branches armed forces exercises timely legitimate proportionate response cyberspace threats aggressions may affect national defense defines directs coordinates awareness training specialized training area addition responsible development detail information security policies information telecommunications systems seginfosit direction execution control compliance policies within scope ministry defense mccd created february 19 2013 defence ministry order 10/2013 joint cyber-defence command created current chief commander mccd divisional general rafael garcía hernández functions joint cyber defence command joint cyber defense command composed following bodies
[ 946 ]
Validation
3,416
6
Unrar:unrar unrar name two different command-line applications extracting rar file archives source-available freeware windows command-line version unrar created rarlab company created commercial winrar software software extract newer rar v5.0 file archives supported competitors free software linux version unrar based old version rarlab unrar permission author eugene roshal licensed gpl support rar3 format
[ 8074, 619 ]
Test
3,417
2
Shell_builtin:shell builtin computing shell builtin command function called shell executed directly shell instead external executable program shell would load execute shell builtins work significantly faster external programs program loading overhead however code inherently present shell thus modifying updating requires modifications shell therefore shell builtins usually used simple almost trivial functions text output nature operating systems functions systems must necessarily implemented shell builtins notable example codice_1 command changes working directory shell since executable program runs separate process working directories specific process loading codice_1 external program would affect working directory shell loaded widely used shell-builtin codice_3 function terminates session function different names depending shell
[ 361, 6789, 1812, 366, 4662, 6088, 1837, 3984, 2589, 1140, 5789, 4020, 3685, 4387, 1537, 2999, 5116, 5480, 126, 5138, 7272, 1572, 1213, 7667, 6242, 4464, 3085, 3106, 5571, 6997, 923, 5933, 3795, 3797, 5942, 6648, 5946, 7021, 3493, 4547, ...
Test
3,418
9
Richard_Wexelblat:richard wexelblat richard l. wexelblat aka dick wexelblat american artisanal woodturner former computer scientist wexelblat received bsee msee cs ph.d. cs moore school electrical engineering university pennsylvania 6/1959 6/1961 12/1965 respectively doctorate believed many reported acm first ever awarded formally recognized computer science department note first cs doctorate first awarded cs department andy van dam share distinction completed cs dissertation essentially time left computer field become artisanal woodturner said originator wexelblat scheduling algorithm choose two good fast cheap stated bob rosin said originated 'm sure also credited first refer occam razor 'the law least astonishment sons alan david brother paul also computer scientists although paul mostly retired david halfway law school
[]
Validation
3,419
2
Jar_Launcher:jar launcher jar launcher program mac os x launches java jar files aqua/java runtime environment jar file double clicked jar launcher also launches class manner jar launcher execute java files rather passes java virtual machine jvm appropriate parameters java programs without gui run command line may properly execute without pseudo terminal jar launcher located codice_1 part apple computer java implementation installed default mac os x 10.11 see link
[ 5571 ]
Test
3,420
7
Tolino:tolino tolino brand name e-readers tablets marketed leading booksellers germany austria switzerland cooperation deutsche telekom since 2014 e-reader also available belgium netherlands italy purchased january 2017 rakuten kobo inc german bookstores hugendubel thalia weltbild founded along deutsche telekom tolino-allianz tolino alliance deutsche telekom functions alliance technology partner responsible entire software hardware element platform well marketing tolino library digital e-books despite alliance book stores remain competition one-another motivation founding tolino alliance provide e-reading solution german e-book readers prevent migration german users international competitors notably amazon kindle however closed nature amazon ecosystem proprietary azw e-book format makes difficult return customers german booktrade first negotiations four german book stores took place spring 2012 summer 2012 tolino alliance formed tolino brand constructed march 2013 introduction brand public tolino first e-book reader tolino shine come november 2013 tolino shine complemented two tablets tolino tab 7 tolino tab 8.9 january 2014 co-founding member group weltbild filed bankruptcy dissolved paragon partners shortly march 2014 deutsche telekom introduced e-book shop pageplace tolino second improved e-reader tolino vision introduced market april 2014 october 2014 frankfurt bookfair bookwholesaler libri announced would become part tolino alliance following 1,000 independent bookstores removed tolino products shelves connected online shops tolino cloud new partner goal become comprehensive alternative digital reading entire german bookmarket likewise autumn 2014 belgium producer standaard boekhandel joined tolino alliance italian bookstore ibs italy became yet another partner ibs offered books ibs.it libraccio.it new improved tolino vision 2 introduced november 2014 featured water-resistant shell tap2flip tolino tab 8 tablet complemented introduction e-reader september 2015 announced bookstores mayersche osiander new partners tolino alliance tolino alliance prominence increased induction netherlandic bookstore libris.nl also blz.nl group frankfurt book festival october 2015 tolino introduced two new e-readers immediately thereafter two made available purchase tolino vision 3 hd became new model tolino-vision line aimed high-end market tolino shine 2 hd lower-end cheaper model serves improved version previous tolino shine november 2015 another italian online shop introduced italian tolino-partners ibs ever since indie-book.it marketed tolino products italy previously announced direct group bertelsmann founding member firm club bertelsmann derclub.de ceased operation end 2015 2015 tolino brand voted readers lesen.net e-reader provider year tolino followed amazon kindle 45 product line 35 previous two years tolino secured first place 34 2013 37 2014 tolino chosen e-reader brand year allese-book.de 2015 tolino received 44.3 votes kobo 27.7 amazon 17.8 previous year survey tolino ranked fourth capturing 17.7 voters
[ 6550, 136, 4474, 4097, 1581, 6015, 2706, 6219 ]
Test
3,421
3
Pac-Land:pac-land diverging previous pac-man titles pac-land side-scrolling platform game large characters colorful backgrounds closer gameplay style nintendo super mario bros. would released following year includes parallax scrolling pac-land split trips trips objective get fairy kept pac-man hat fairyland also return home pac-man house majority trip involves moving left right avoiding various obstacles enemy ghosts water spurts quicksand traps trip divided number rounds end provides pac-man bonus points depending much time left also position jumping end round player runs time finishing round sue purple ghost speed rapidly final round trip ends pac-man entering fairyland returning fairy hat fairy queen return fairy queen gives pac-man magic boots final round trip pac-man travel right left back home assistance uses magic boots allow jump repeatedly mid-air pac-man completes trip greeted ms. pac-man baby pac-man us release game pac-man cat dog cartoon series sour puss chomp-chomp also welcome pac-man home pac-man begins next trip following objectives although difficulty increases original pac-man fruit appear eat bonus points power pellets turn ghosts blue vulnerable hidden item sometimes accidentally dropped ghosts flagship galaxian rewards 7650 points collected reference namco goroawase number 765 galaxian flagship long running cameo appears bandai namco-made pac-man games also hidden bonuses game eating ghosts certain order give extra time pushing fire hydrant opposite direction give extra lives invincibility balloons collect points warps arcade cabinet version game unique instead joystick six plastic buttons three player although two players would alternate turns two-player game two buttons moved pac-man right left third made jump pictographs cabinet showed images pac-man moving right left jumping turbografx-16 version game made attempt emulate offering type-b control scheme switched pac-man movements buttons controller rather thumb-pad also famicom version uses b run d-pad jump contrast majority famicom games use d-pad run jump b attack japanese release namco pac-man sprite resembles official artwork character longer nose pac-man-shaped eyes game tyrolean hat feather american release pac-land bally midway characters appearances based designs pac-man animated series produced hanna-barbera promote animated series well video game series addition versions feature main background music jingles aforementioned series midway version also features faster game play namco pac-land ported commodore 64 amiga atari lynx atari st turbografx-16 zx spectrum amstrad cpc msx famicom board game handheld lcd game pac-land also produced pac-land republished 1996 part namco museum volume 4 playstation 2012 namco released pac-land namco arcade app iphone ipad pac-land one games included pac-man museum ports home consoles computers released inside outside japan based namco version game namco arcade application version game based midway version non-japanese versions application namco version japanese version pac-land released wii u virtual console game also appears stage super smash bros. wii u super smash bros ultimate rob swan reviewed atari lynx version august 1991 issue cvg magazine gave game score 80 100 robert a. jung also reviewed lynx version giving score 7 10 raze magazine reviewed lynx version also gave score 74
[ 5822, 6788, 5720, 4575, 7179, 1237, 6939, 3044, 2934, 6713, 63, 2148 ]
Test
3,422
2
Lxrun:lxrun unix computing lxrun compatibility layer allow linux binaries run unixware sco openserver solaris without recompilation created mike davidson open source software project since 1997 available mozilla public license sco sun microsystems began officially supporting lxrun 1999 according official lxrun website lxrun maintenance mode meaning longer actively developed reasons cited declining interest lxrun include wide availability real linux machines availability capable emulation systems sco linux kernel personality lkp opensolaris brandz various virtual machine solutions newer linux applications host operating systems officially supported lxrun
[ 6046, 5571, 578, 2467 ]
Test
3,423
2
JumpStart_(Solaris):jumpstart solaris jumpstart computer network installation tool set used solaris operating system jumpstart used manage operating system installation many information technology environments corporate otherwise solaris operating system computers widely used provide easier installation minor setup central server one command installation client system start installing also allows completely consistent system installation many systems time install exactly system configuration software tools alternatively different types systems installed different purposes case consistent installations given defined type tools used manipulate jumpstart include jet jumpstart enterprise toolkit created thomas fritz 1994 sun jumpstart consists two main parts network booting system network installation network booting proceeds similarly solaris standard network booting capabilities jumpstart network booting server set local network system installed technically network boot install servers separate functions typically system client system begins jumpstart process accesses operating system component software packages stored jumpstart server usually exclusively using network file system packages optionally additional tools applications automatically installed system rebooted additional configuration may manually performed system configuration may set completely automatically
[ 3697, 4229, 3732, 5571, 8037, 3042, 2098, 3678, 3423, 6505 ]
Test
3,424
4
Cybereason:cybereason cybereason cyber security company specializing endpoint detection response software company based boston massachusetts cybereason founded 2012 tel aviv israel former cyber security experts israel defense forces unit 8200 company moved headquarters boston 2014 december 2016 cybereason released free consumer software product prevention ransomware 2014 cybereason raised series funding charles river ventures total cybereason reports raised 88.6m funding rounds receiving 59m series c round softbank 2015 august 2019 cybereason raised 200 million new financing softbank group affiliates cybereason offers endpoint detection response software “ hybrid sensors endpoints communicate ‘ hunting engine ’ cloud
[ 7359 ]
Test
3,425
1
Postgres-XL:postgres-xl postgres-xl distributed relational database management system rdbms software based postgresql aims provide feature parity postgresql distributing workload cluster name postgres-xl stands extensible lattice postgres-xl based postgres-xc earlier distributed postgresql system developed ntt data enterprisedb 2012 cloud database startup stormdb adopted postgres-xc developed proprietary extensions improvements 2013 stormdb acquired translattice improved software open-sourced name postgres-xl 2014 since 2015 postgres-xl development also supported 2ndquadrant postgres-xl provides cluster-wide consistent transaction snapshots via central global transaction manager gtm node requires fast interconnect nodes postgres-xl suited geographically distributed clusters larger queries split parallelized multiple nodes individual database tables chosen fully replicated across cluster usually smaller tables sharded separate nodes write scalability
[ 2674, 6535, 2054, 5956, 7115 ]
Test
3,426
4
Man-in-the-middle_attack:man-in-the-middle attack cryptography computer security man-in-the-middle attack mitm attack attacker secretly relays possibly alters communications two parties believe directly communicating one example mitm attack active eavesdropping attacker makes independent connections victims relays messages make believe talking directly private connection fact entire conversation controlled attacker attacker must able intercept relevant messages passing two victims inject new ones straightforward many circumstances example attacker within reception range unencrypted wireless access point wi-fi could insert man-in-the-middle aims circumvent mutual authentication mitm attack succeed attacker impersonates endpoint sufficiently well satisfy expectations cryptographic protocols include form endpoint authentication specifically prevent mitm attacks example tls authenticate one parties using mutually trusted certificate authority suppose alice wishes communicate bob meanwhile mallory wishes intercept conversation eavesdrop optionally deliver false message bob first alice asks bob public key bob sends public key alice mallory able intercept mitm attack begin mallory sends alice forged message appears originate bob instead includes mallory public key alice believing public key bob encrypts message mallory key sends enciphered message back bob mallory intercepts deciphers message using private key possibly alters wants re-enciphers using public key intercepted bob originally tried send alice bob receives newly enciphered message believes came alice example shows need alice bob way ensure truly using public keys rather public key attacker otherwise attacks generally possible principle message sent using public-key technology variety techniques help defend mitm attacks mitm attacks prevented detected two means authentication tamper detection authentication provides degree certainty given message come legitimate source tamper detection merely shows evidence message may altered cryptographic systems secure mitm attacks provide method authentication messages require exchange information public keys addition message secure channel protocols often using key-agreement protocols developed different security requirements secure channel though attempted remove requirement secure channel public key infrastructure transport layer security may harden transmission control protocol mitm attacks structures clients servers exchange certificates issued verified trusted third party called certificate authority ca original key authenticate ca subject mitm attack certificates issued ca may used authenticate messages sent owner certificate use mutual authentication server client validate communication covers ends mitm attack though default behavior connections authenticate server attestments verbal communications shared value zrtp recorded attestments audio/visual recordings public key hash used ward mitm attacks visual media much difficult time-consuming imitate simple data packet communication however methods require human loop order successfully initiate transaction corporate environment successful authentication indicated browser green padlock always imply secure connection remote server corporate security policies might contemplate addition custom certificates workstations web browsers order able inspect encrypted traffic consequence green padlock indicate client successfully authenticated remote server corporate server/proxy used ssl/tls inspection http public key pinning hpkp sometimes called certificate pinning helps prevent mitm attack certificate authority compromised server provide list pinned public key hashes first transaction subsequent transactions require one keys list must used server order authenticate transaction dnssec extends dns protocol use signatures authenticate dns records preventing simple mitm attacks directing client malicious ip address latency examination potentially detect attack certain situations long calculations lead tens seconds like hash functions detect potential attacks parties check discrepancies response times example say two parties normally take certain amount time perform particular transaction one transaction however take abnormal length time reach party could indicative third party interference inserting additional latency transaction quantum cryptography theory provides tamper-evidence transactions no-cloning theorem protocols based quantum cryptography typically authenticate part classical communication unconditionally secure authentication scheme e.g wegman-carter authentication captured network traffic suspected attack analyzed order determine whether attack determine source attack important evidence analyze performing network forensics suspected attack includes notable non-cryptographic mitm attack perpetrated belkin wireless network router 2003 periodically would take http connection routed would fail pass traffic destination instead responded intended server reply sent place web page user requested advertisement another belkin product outcry technically literate users 'feature removed later versions router firmware 2011 security breach dutch certificate authority diginotar resulted fraudulent issuing certificates subsequently fraudulent certificates used perform mitm attacks 2013 nokia xpress browser revealed decrypting https traffic nokia proxy servers giving company clear text access customers encrypted browser traffic nokia responded saying content stored permanently company organizational technical measures prevent access private information 2017 equifax withdrew mobile phone apps following concern mitm vulnerabilities notable real-life implementations include following
[ 2173, 363, 359, 7151, 6417, 6419, 6795, 7522, 716, 1460, 7175, 2566, 7548, 5399, 7186, 2577, 3638, 5401, 6823, 6458, 2944, 2587, 7567, 7925, 7928, 57, 7209, 2962, 1886, 7214, 7217, 74, 3338, 1899, 84, 1513, 2620, 3680, 4025, 794, 796, ...
Test
3,427
7
HP_Information_Management_Software:hp information management software hp information management software software hp software division used organize protect retrieve acquire manage maintain information hp software division also offers information analytics software amount data companies deal grown tremendously past decade making management information difficult university california berkeley claims amount information produced globally increases 30 percent annually april 2010 information management article cited survey nearly 90 percent businesses blame poor performance data growth survey concluded many businesses applications databases growing 50 percent annually making difficult manage rapid expansion information information explosion companies created technology solutions help businesses manage ever-expanding data hp software division offers many information management analytics software products hp autonomy business resulting acquisition autonomy corporation 2011 autonomy provided capabilities managing unstructured data acquisition vertica 2011 added information analytics managing structured data june 2013 hp announced analytics platform managing big data—consisting structured unstructured data april 2011 hp software division announced refresh upgrade hp information management software portfolio including enhancements hp trim records management system hp data protector integrated archive platform database archiving hp storage essentials number consulting professional services designed help customers integrate deploy information management solutions across lifecycle including capture monitor protect retain find portfolio included methodology technology services companies government organizations create holistic approach information management 6 acquisition autonomy corporation hp information management analytics software portfolio includes data protection ediscovery information analytics unified information access information archiving enterprise content management marketing optimization 2013 hp announced cloud services support support marketing call center applications hp data protection software includes server virtual server remote branch office endpoint device data protection products include hp connected backup hp livevault hp data protector hp data protector software automates high-performance backup recovery disk tape enable 24x7 business continuity software used size business grows single server environment largest distributed enterprise infrastructure thousands clients many 100,000 sessions daily hp ediscovery solutions help companies meet requirements legal electronic discovery compliance regulations meet electronic discovery reference model edrm 5 capturing classifying preserving finding analyzing recovering information hp ediscovery part hp autonomy legal compliance performance suite detecting acting new signals risk understanding protecting governing collaborating information maintaining compliance local federal international regulations information analytics collection analysis data use powerful computers identify patterns trends data set new greatly enhanced past years result quality output high enough used tool decision-making process based hp idol intelligent data operating layer hp information analytics solutions help organizations extract meaning forms human information audio text video hp idol uses advanced pattern-matching technology understand key concepts forms information including free text video audio image social media web unlike traditional keyword-dependent systems hp idol retrieves relevant information conceptually related query going beyond search help users discover information may know look hp sells archiving products delivered enterprise-class software premises cloud hybrid model hp offers autonomy ecm suite enterprise content management hp autonomy ecm organizations access understand almost data type system well control leverage take action information concert internal regulatory policies current version 9.0 released january 2013 october 2013 hp extream solutions joined hp autonomy business within hp software division adding new content management capabilities portfolio hp exstream customer communications management system hp autonomy marketing optimization solutions include contact center management marketing analytics rich media management web experience management web optimization search engine marketing october 2013 hp announced hp digital marketing hub dynamically identifying customer segments building prescriptive models match segments targeted campaigns engaging customers real-time across advertising contact center mobile print social web touch points grid-based column-oriented hp vertica analytics platform designed manage large fast-growing volumes data provide fast query performance used data warehouses query-intensive applications june 2013 hp announced platform analyzing finding meaning big data—petabytes structured unstructured information also aims identify information needed placed low cost storage even dumped uses open source hadoop software technologies hp acquired autonomy vertica arcsight actual user group itrc online forum hp software solutions products new user group hp software solutions community officially launched publicly april 2010 includes former software-related communities june 2011 hp software announced new discover performance community online resource center designed serve executives cios retrieved
[ 3882 ]
Test
3,428
3
Bridging_model:bridging model computer science bridging model abstract model computer provides conceptual bridge physical implementation machine abstraction available programmer machine words intended provide common level understanding hardware software engineers successful bridging model one efficiently implemented reality efficiently targeted programmers particular possible compiler produce good code typical high-level language term introduced leslie valiant 1990 paper bridging model parallel computation argued strength von neumann model largely responsible success computing whole paper goes develop bulk synchronous parallel model analogous model parallel computing
[ 1361, 4864 ]
Test
3,429
9
Shriram_Krishnamurthi:shriram krishnamurthi shriram krishnamurthi computer scientist currently professor computer science brown university member core development group racket programming languages responsible creation software packages including debugger frtime package networking library since 2006 krishnamurthi leading contributor bootstrap curriculum project integrate computer science education grades 6–12 krishnamurthi received phd rice university 2000 direction matthias felleisen dissertation linguistic reuse macro systems presence first-class modules starting topic krishnamurthi moved software engineering working topics access control modularization verification web-based interactive programming recent effort novel time-oriented programming language called flapjax support asynchronous web programming krishnamurthi also authored textbook programming language design 2012 krishnamurthi became inaugural winner robin milner young researcher award given sigplan researcher whose research career began within 20 years nomination date award citation describes krishnamurthi prolific researcher brings programming language theory bear many disciplines thus exposing foundational value
[ 7878, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 1557, 218, 1478, 5494, 4704, 3880, 4609, 6116, 3212, 5501, 6210, 1116, 144, 4074, 6471, 6475, 7481, 2144, 2600, 7298, 5515, 8025, 5077, 7032, 4543, 1889, 2156, 3749, ...
Test
3,430
7
Accellion:accellion accellion inc. palo alto california-based private cloud solutions company focused secure file sharing collaboration users able access edit share enterprise content device maintaining compliance security accellion software supports deployment on-premises off-premises public private hybrid cloud fips 140-2 certified environment accellion founded 1999 singapore mohan nikhil jhingan originally focused providing distributed file storage management backup technology beginning 2001 company moved headquarters palo alto ca concentrated business file transfer technology 2009 2012 company grew increasingly focused security compliance aspects file sharing september 2000 accellion raised 33 million venture funding barings private equity later april 2012 raised additional 12 million riverwood capital bringing company total funding 45 million gartner 2014 magic quadrant report accellion named leader enterprise file synchronization sharing year accellion named leader mobile content management aragon research accellion positioned gartner leaders quadrant 2015 according wall street journal accellion valued 500 million 2014 accellion released first file transfer appliance may 2005 physical on-premises appliance ogilvy mather accellion ’ first enterprise customer computerworld ’ premier 100 leaders 2005 best class award implementation accellion file transfer march 2011 accellion released secure collaboration product industry research firm 451 group characterized accellion grown collaboration market file-transfer roots 2012 company introduced accellion mobile file sharing packages enterprise business individuals packages included synchronization feature called kitedrive early demand company file transfer applications came organizations needed transfer large files including advertising marketing firms healthcare universities accellion provided email attachment application reducing email storage improving email performance offloading file transfers email company also provided clients mobile product called accellion mobile productivity suite let users create edit collaborate microsoft word excel powerpoint files mobile devices january 2014 accellion launched kiteworks secure mobile file-sharing product enables users work files projects remotely software integrates sharepoint documentum open text home drive windows file shares dropbox box onedrive google drive november 2014 accellion introduced secure mobile platform kiteworks suite allows employees securely access share content third-party providers laptops smartphones tablets wearable devices
[ 7102, 7083, 3943, 1589 ]
Validation
3,431
2
4DOS:4dos 4dos command-line interpreter jp software designed replace default command interpreter codice_1 dos windows 95/windows 98/windows 98se/windows 4os2 4nt replace codice_2 os/2 windows nt respectively 4dos written rex c. conn tom rawson first released 1989 programs also initiated command line and/or called scripts 4dos often used ms-dos-windows 95 stream operating systems also used windows nt type machines ibm pc dos dr-dos versions since windows nt-2000 includes codice_1 codice_2 4dos 4nt derivatives installed earlier versions 4os2 run windows nt os/2 run two dos windows nt shells three used windows nt-type machines os/2 multiple boot machines among many commands statements functions 4dos lacking ms-dos/windows 95/98 codice_1 reading keyboard input simpler method working colors screen text default file extension 4dos scripts .btm graphical version 4dos 4os2 4nt called take command released feature set corresponding version 4dos 5.5 4os2 4nt 2.5 updated development line stopped corresponding text mode versions graphical program take command/16 windows 3.1 4os2 similar replacement ibm os/2 command interpreter first released time 4dos version 4 similar feature set like 4dos released open source appeared feature set 2011 ecomstation 2.10 freeware os2free project 4nt first released 4dos windows nt versions 1.x 2.x became 4nt restructure version 8 program recompilation 4os2 continues features os/2 command processor codice_2 running rexx scripts extproc support corresponding take command/32 exists version 1 corresponding 4nt 2.5 4nt take command/32 released ansi windows 9x unicode windows nt forms ansi version dropped version 5 new win32 program tabbed command interface tci released time 4nt version 7 program allowed one attach thereby reducing screen clutter detach tabbed consoles single window program requires windows xp later new version take command extends original tabbed command interface expanded extra windows allow input composed graphically navigate directories files extra features 4nt bundled take command console light feature-reduced version tcc released free download jp software released released versions 9 12.1 corresponding underlying 4nt/tcc version 4dos features number enhancements compared codice_1 originally distributed shareware 4dos later released unsupported freeware currently source code available modified mit license may used commercial product without written permission rex c. conn may compiled use operating system freedos qualify open source defined open source initiative last update jp software version 7.50.130 released august 2004 15-year history 4dos underwent numerous updates significant versions norton utilities dos included modified copies 4dos called ndos last version ndos bundled norton utilities 8 corresponded 4dos 4.03
[ 4291, 1524, 4843, 4759, 6256, 7246, 6088, 5116, 1734, 204, 5480, 2472, 5571, 126, 6380, 7021, 852, 6940, 1975, 4539, 5441 ]
Test
3,432
3
TinyLinux:tinylinux tinylinux project started matt mackall 2003 reduce size linux kernel memory usage binary filesize purpose make compact linux system embedded devices development sponsored ce linux forum also known -tiny tree 2006 project mostly abandoned received new attention 2007 sponsorship celf seen minimal activity since 2007 tinylinux consists set patches linux kernel make certain features optional add system monitoring measurement optimization take place made mergeable mainline kernel many patches merged date features include ability disable elf core dumps reduce number swap files use slob memory allocator ability disable bug measuring accounting features include ability kmalloc/kfree allocations monitored /proc/kmalloc measurement inline usage kernel compiling tinylinux requires intel 80386 better run embeddable linux kernel subset elks
[ 7985, 8116, 3768, 578 ]
Test
3,433
4
Enterprise_information_security_architecture:enterprise information security architecture enterprise information security architecture eisa part enterprise architecture focusing information security throughout enterprise name implies difference may exist small/medium-sized businesses larger organizations enterprise information security architecture eisa practice applying comprehensive rigorous method describing current and/or future structure behavior organization security processes information security systems personnel organizational sub-units align organization core goals strategic direction although often associated strictly information security technology relates broadly security practice business optimization addresses business security architecture performance management security process architecture well enterprise information security architecture becoming common practice within financial institutions around globe primary purpose creating enterprise information security architecture ensure business strategy security aligned enterprise information security architecture allows traceability business strategy underlying technology enterprise information security architecture first formally positioned gartner whitepaper called “ incorporating security enterprise architecture process ” published 24 january 2006 since publication security architecture moved silo based architecture enterprise focused solution incorporates business information technology picture represents one-dimensional view enterprise architecture service-oriented architecture also reflects new addition enterprise architecture family called “ security ” business architecture information architecture technology architecture used called bit short security part architecture family become bits security architectural change imperatives include things like practice enterprise information security architecture involves developing architecture security framework describe series current intermediate target reference architectures applying align programs change frameworks detail organizations roles entities relationships exist exist perform set business processes framework provide rigorous taxonomy ontology clearly identifies processes business performs detailed information processes executed secured end product set artifacts describe varying degrees detail exactly business operates security controls required artifacts often graphical given descriptions whose levels detail vary according affordability practical considerations decision makers provided means make informed decisions invest resources realign organizational goals processes policies procedures support core missions business functions strong enterprise information security architecture process helps answer basic questions like implementing enterprise information security architecture generally starts documenting organization strategy necessary details operates process cascades documenting discrete core competencies business processes organization interacts external parties customers suppliers government entities documented organization strategy structure architecture process flows discrete information technology components wherever possible related explicitly organization strategy goals operations enterprise information security architecture document current state technical security components listed well ideal-world desired future state reference architecture finally target future state result engineering tradeoffs compromises vs. ideal essentially result nested interrelated set models usually managed maintained specialised software available market exhaustive mapping dependencies notable overlaps metadata general sense itil concept configuration management database maintaining accuracy data significant challenge along models diagrams goes set best practices aimed securing adaptability scalability manageability etc systems engineering best practices unique enterprise information security architecture essential success nonetheless involve things componentization asynchronous communication major components standardization key identifiers successful application enterprise information security architecture requires appropriate positioning organization analogy city-planning often invoked connection instructive intermediate outcome architecture process comprehensive inventory business security strategy business security processes organizational charts technical security inventories system interface diagrams network topologies explicit relationships inventories diagrams merely tools support decision making sufficient must living process organization must design implement process ensures continual movement current state future state future state generally combination one enterprise information security architecture frameworks subset enterprise architecture frameworks simplify conceptual abstraction enterprise information security architecture within generic framework picture right would acceptable high-level conceptual security architecture framework open enterprise architecture frameworks enterprise information security architecture key component information security technology governance process organization significant size companies implementing formal enterprise security architecture process support governance management however noted opening paragraph article ideally relates broadly practice business optimization addresses business security architecture performance management process security architecture well enterprise information security architecture also related security portfolio management metadata enterprise sense
[ 1467, 1469, 5568, 7911, 5447 ]
Test
3,434
5
Kerberized_Internet_Negotiation_of_Keys:kerberized internet negotiation keys kerberized internet negotiation keys kink protocol defined rfc 4430 used set ipsec security association sa similar internet key exchange ike utilizing kerberos protocol allow trusted third parties handle authentication peers management security policies centralized fashion motivation given rfc 3129 alternative ike peers must use x.509 certificates authentication use diffie–hellman key exchange dh encryption know implement security policy every peer connect authentication x.509 certificates either pre-arranged using dns preferably dnssec utilizing kerberos kink peers must mutually authenticate appropriate authentication server key distribution center kdc turn controlling distribution keying material encryption therefore controlling ipsec security policy kink command/response protocol create delete maintain ipsec sas command response contains common header along set type-length-value payloads type command response constrains payloads sent messages exchange kink stateless protocol command response require storage hard state kink contrast ike uses main mode first establish internet security association key management protocol isakmp sa followed subsequent quick mode exchanges kink uses kerberos mechanisms provide mutual authentication replay protection establishing sas kink provides confidentiality payloads follow kerberos ap-req payload design kink mitigates denial service attacks requiring authenticated exchanges use public key operations installation state kink also provides means using kerberos user-to-user mechanisms key shared server kdc typically limited case ipsec peers using pkinit initial authentication kink directly reuses quick mode payloads defined section 5.5 ike minor changes omissions cases kink exchanges single command response optional third message required creating sas responder rejects first proposal initiator wants contribute keying materials kink also provides rekeying dead peer detection kink message includes following fields kink payloads defined following payloads defined following open source implementations kink currently available
[ 7626, 6533, 4237, 4261, 516, 7785, 2644 ]
Validation
3,435
2
Partitioning_Communication_System:partitioning communication system partitioning communication system computer communications security architecture based information flow separation policy pcs extends four foundational security policies mils multiple independent levels security software architecture network pcs leverages software separation enable application layer entities enforce manage control application layer security policies manner application layer security policies result communications architecture allows software separation kernel pcs share responsibility security application pcs invented ois ois collaborated extensively requirements pcs
[]
Validation
3,436
4
Collateral_freedom:collateral freedom collateral freedom anti-censorship strategy attempts make economically prohibitive censors block content internet achieved hosting content cloud services considered censors important block using encryption prevent censors identifying requests censored information hosted among content forcing censors either allow access censored information take entire services
[ 2961, 2566 ]
Test
3,437
9
Jensen's_Device:jensen device jensen device computer programming technique exploits call name devised danish computer scientist jørn jensen worked peter naur regnecentralen worked gier algol compiler one earliest correct implementations algol 60 algol 60 used call name jensen device exploits call name side-effects call name argument passing convention delays evaluation argument actually used procedure consequence copy rule procedures algol introduced call name classic example jensen device procedure computes sum series formula_1 procedure index variable codice_1 summation term codice_2 passed name call name enables procedure change value index variable execution codice_3 loop call name also causes codice_2 argument reevaluated iteration loop typically codice_2 depend upon changing side-effected codice_1 example code compute sum first 100 terms real array codice_7 would execution codice_8 actual argument codice_9 increment step codice_3 loop procedure evaluations codice_2 use current value codice_9 access successive array elements codice_13 jensen device general double summation done codice_8 function employed arbitrary functions merely employing appropriate expressions sum integers desired expression would codice_15 sum squares integers codice_16 slight variation would suitable initiating numerical integration expression method similar codice_8 evaluation codice_2 implemented thunk essentially subroutine environment thunk closure arguments time procedure needs value formal argument simply calls thunk thunk evaluates actual argument scope calling code scope procedure absence pass-by-name facility would necessary define functions embodying expressions passed according protocols computer language create compendium function along arrangement select desired expression usage another example gps general problem solver described d. e. knuth j. n. merner algol 60 confidential following single statement finds m-th prime using gps jensen device relies call name call name subtle problems consequently call name available languages knuth comments algol 60 express codice_20 procedure increases argument one call codice_21 expected action codice_9 functional changes access knuth says use 'macro definition facilities extend language instead relying solely procedures purpose results satisfactory running program others point call name procedure swaps argument subtle problems obvious swapping procedure procedure right thing many arguments invocation codice_23 problematic using copy rule leads assignments problem second assignment changes codice_9 codice_25 third assignment probably array element start hand procedure coded way around b saved temp instead desired action would result unless invoked codice_26
[ 622, 6485, 7382, 1114, 5986, 7005, 7693 ]
Test
3,438
6
WebDFS:webdfs open source distributed file system used behind http server apache lighttpd hiawatha cherokee etc implement highly scalable dfs storing images etc webdfs mostly based algorithms algorithms come family algorithms known rush family replication scalable hashing built correctly system built rush algorithms following characteristics text taken algorithm whitepaper
[ 6461, 5571, 578 ]
Test
3,439
3
Kilocore:kilocore kilocore rapport inc. ibm high-performance low-power multi-core microprocessor 1,025 cores contains single powerpc processing core 1,024 eight-bit processing elements running 125 mhz dynamically reconfigured connected shared interconnect allows high performance parallel processing rapport first product market kc256 256 8-bit processing elements kc256 started shipping 2006 elements grouped 16 stripes 16 processing elements stripe able dedicated particular task thousand core products kc1024 kc1025 due 2008 1024 8-bit processing elements 32 x 32-stripe configuration kc1025 powerpc cpu kc1024 processing elements ibm says kilocore1025 enable streaming live- high-definition video low-power mobile device 5 10 times speed existing processors
[ 6226, 1237, 7453, 7320 ]
Validation
3,440
3
RHPPC:rhppc rhppc radiation hardened processor based powerpc 603e technology licensed motorola freescale manufactured honeywell rhppc equivalent commercial powerpc 603e processor minor exceptions phase locked loop pll processor version register pvr rhppc processor compatible powerpc architecture book i-iii powerpc 603e programmers interface also supported common powerpc software tools embedded operating systems like vxworks rhppc processor generates 190 mips dhrystone mix core clock 100 mhz i.e rhppc processor completes 1.9 instructions per cycle rhppc runs 25 33.3 40 50 mhz 60x bus clock sysclk generated based pci clock 60x bus clock de-skewed on-chip pll also multiplied rhppc processor superscalar machine five execution units system register unit integer unit load/store unit floating point unit branch processing unit dispatch unit issue two instructions per cycle floating point unit three level deep pipeline order execution supported use shadow rename registers completion unit complete two instructions per cycle order copying results rename registers real registers independently branch processing unit complete branch cycle thus theory rhppc processor complete three instructions per cycle within rhppc processor 16 kb instruction 16 kb data l1 caches 4 way set associative support write copy-back protocol cache line fixed eight words rhppc processor fabricated honeywell ’ soi-v 0.35 µm four level metal process standard cells custom drop-ins used packaged hermetic aluminium oxide 21 x 21 mm grid array package 255 16 x 16 leads leads 1.27 mm centers lead either solder balls solder columns short pins attached standard die attach wire bond die interconnect used
[ 7327, 2719, 3348, 3936, 1075, 1346, 4847, 2458, 1083, 5999, 4408, 5652, 912, 7361, 2845, 3708, 5665, 1199, 1386, 7099, 2501, 239, 6474, 8125, 4815, 1131, 7499, 2257, 3156, 3674, 5622 ]
Validation
3,441
4
Void_pantograph:void pantograph security printing void pantograph refers method making copy-evident tamper-resistant patterns background document normally invisible eye become obvious document photocopied typically spell void copy invalid indicator message void pantographs work exploiting limitations features copying equipment scanner photocopier act low-pass filter original image blurring edges slightly also perfectly aligned directions document causing aliasing features smaller resolution also reproduced addition human vision sensitive luminance contrast ratio means grey region consists grid small dark dots filtering produce lighter grey region larger dots affected differently big-dot-little-dot makes possible see pattern invisible numerous variations exist including printing marks using raster lines one direction background lines another direction using fine line patterns alias visible moire pattern copied
[ 4420 ]
Test
3,442
2
Intel_Memory_Model:intel memory model computing intel memory model refers set six different memory models x86 cpu operating real mode control segment registers used default size pointers four registers used refer four segments 16-bit x86 segmented memory architecture ds data segment cs code segment ss stack segment es extra segment another 16-bit register act offset given segment logical address platform written segment offset typically hexadecimal notation real mode order calculate physical address byte memory hardware shifts contents appropriate segment register 4 bits left effectively multiplying 16 adds offset example logical address 7522 f139 yields 20-bit physical address note process leads aliasing memory given physical address may multiple logical representations means comparison pointers different segments complicated process pointer formats known near far huge memory models protected mode segment writable executable therefore implementing tiny memory model code segment register must point physical address limit data segment register defeated one features 80286 makes sure data segments never executable code segments never writable means self-modifying code never allowed however 80386 paged memory management unit possible protect individual memory pages writing memory models limited 16-bit programs possible use segmentation 32-bit protected mode well resulting 48-bit pointers exist c language compilers support however segmentation 32-bit mode allow access larger address space single segment would cover unless segments always present memory linear address space used cache larger segmented virtual space allows better protection access various objects areas 1 mb long benefit one-byte access protection granularity versus coarse 4 kib granularity offered sole paging therefore used specialized applications like telecommunications software technically flat 32-bit address space tiny memory model segmented address space reigns four segment registers contain one value x86-64 platform total seven memory models exist majority symbol references 32 bits wide addresses known link time opposed position-independent code affect pointers used always flat 64-bit pointers values accessed via symbols placed
[ 3557, 352, 4810, 4128, 2403, 1335, 5190, 858 ]
Test
3,443
3
Ivy_Bridge_(microarchitecture):ivy bridge microarchitecture ivy bridge codename third generation intel core processors core i7 i5 i3 ivy bridge die shrink 22 nanometer manufacturing process based 32 nanometer sandy bridge second generation intel core see tick–tock model name also applied broadly 22 nm die shrink sandy bridge microarchitecture based finfet 3d tri-gate transistors also used xeon core i7 ivy bridge-ex ivytown ivy bridge-ep ivy bridge-e microprocessors released 2013 ivy bridge processors backwards compatible sandy bridge platform systems might require firmware update vendor specific 2011 intel released 7-series panther point chipsets integrated usb 3.0 complement ivy bridge volume production ivy bridge chips began third quarter 2011 quad-core dual-core-mobile models launched april 29 2012 may 31 2012 respectively core i3 desktop processors well first 22 nm pentium announced available first week september 2012 ivy bridge earliest intel microarchitecture officially support windows 10 64-bit ivy bridge cpu microarchitecture shrink sandy bridge remains largely unchanged like predecessor sandy bridge ivy bridge also primarily developed intel israel branch located haifa israel notable improvements include mobile desktop ivy bridge chips also include significant changes sandy bridge compared predecessor sandy bridge ivy bridge temperatures reportedly 10 °c higher compared sandy bridge cpu overclocked even default voltage setting impress pc watch japanese website performed experiments confirmed earlier speculations intel used poor quality perhaps lower cost thermal interface material thermal paste tim chip heat spreader instead fluxless solder previous generations mobile ivy bridge processors affected issue use heat spreader chip cooling system enthusiast reports describe tim used intel low-quality par premium cpu speculation design encourage sales prior processors analyses caution processor damaged void warranty home users attempt remedy matter tim much lower thermal conductivity causing heat trap die experiments replacing tim higher-quality one heat removal methods showed substantial temperature drop improvements increased voltages overclocking sustainable ivy bridge chips intel claims smaller die ivy bridge related increase thermal density expected result higher temperatures cpu overclocked intel also stated expected likely improve future revisions ivy bridge processors one two four cores report cpuid model 0x000306a9 built four different configurations differing number cores l3 cache gpu execution units ivy bridge-e family follow-up sandy bridge-e using cpu core ivy bridge processor lga 2011 lga 1356 lga 2011-1 packages workstations servers ivy bridge-e family made three different versions number cores three market segments basic ivy bridge-e single-socket processor sold core i7-49xx available six-core s1 stepping versions limited four active cores ivy bridge-en xeon e5-14xx v2 xeon e5-24xx v2 model single- dual-socket servers using lga 1356 10 cores ivy bridge-ep xeon e5-16xx v2 xeon e5-26xx v2 xeon e5-46xx v2 scales four lga 2011 sockets 12 cores per chip fact three die flavors ivy bridge-ep meaning manufactured organized differently according number cores ivy bridge-ep cpu includes ivy bridge-ex 15 cores scales 8 sockets 15-core die organized three columns five cores three interconnect rings connecting two columns per ring five-core column separate l3 cache processor supposed new run sure technology speculated odd number cores involve keeping one reserve processors featuring intel hd 4000 graphics hd p4000 xeon set bold processors feature hd 2500 graphics hd graphics unless indicated n/a list announced desktop processors follows suffixes denote additional high-end server processors based ivy bridge architecture code named ivytown announced september 10 2013 intel developer forum usual one year interval consumer server product releases ivy bridge-ep processor line announced september 2013 12 cores 30 mb third level cache rumors ivy bridge-ex 15 cores increased third level cache 37.5 mb although early leaked lineup ivy bridge-e included processors maximum 6 cores core-i7 xeon versions produced xeon versions marketed xeon e5-1400 v2 act drop-in replacements existing sandy bridge-en based xeon e5 xeon e5-2600 v2 versions act drop-in replacements existing sandy bridge-ep based xeon e5 core-i7 versions designated i7-4820k i7-4930k i7-4960x released september 10 2013 remaining compatible x79 lga 2011 hardware intermediate lga 1356 socket intel launched xeon e5-2400 v2 codenamed ivy bridge-en series january 2014 10 cores new ivy bridge-ex line marketed xeon e7 v2 corresponding predecessor using sandy bridge microarchitecture instead followed older westmere-ex processors suffixes denote intel demonstrated haswell architecture september 2011 began release 2013 successor sandy bridge ivy bridge
[ 2449, 2814, 5802, 6332, 6698, 6793, 4847, 3942, 3849, 4765, 6170, 6173, 6344, 6523, 4108, 7442, 1465, 7449, 1645, 5305, 7453, 3020, 7364, 3717, 4514, 5669, 584, 5670, 3803, 6647, 5853, 1867, 3565, 418, 4077, 6935, 7484, 4985, 766, 5431, ...
Test
3,444
3
Bodhi_Linux:bodhi linux bodhi linux lightweight linux distribution based ubuntu uses moksha window manager philosophy distribution provide minimal base system users populate software want thus default includes software essential linux users including file browser pcmanfm web browser midori terminal emulator terminology include software features developers deem unnecessary make populating systems software easy bodhi linux developers maintain online database lightweight software installed one click via apturl addition standard version bodhi linux intel-compatible processors alpha release version tablet devices arm processors based debian tablet device version bodhi officially supported anymore amount time needed keep date package image updates rarely made future system requirements include 256 mb ram 4 gb hard disk space 500 mhz processor 32 bit processors without pae capability supported terms pae-enabled ones difference bodhi versions older kernel used using enlightenment dr17-based fork called moksha desktop bodhi provides rich desktop effects animations require high end computer hardware rationale forking project dr17 due established performance functionality e19 possessed optimizations break existing features users enjoy use per jeff hoogland statement enlightenment window manager well tools developed specifically bodhi linux written c programming language python bodhi linux derived ubuntu long term support releases 14.04 16.04 18.04 ... support follows pattern security bug fixes released daily basis throughout five-year period opposed ubuntu bodhi short term support installed bodhi linux upgraded latest state via command line package manager releases numbered x.y.z major release x.y.z e.g version 2.y.z 3.0.0 follows ubuntu long term support delay months goal deliver new major release july every year following new ubuntu lts expected april new functionality added release bodhi linux 3.0.0 branch released february 2015 additional legacy version older hardware update/point release x.y.z e.g version 2.3.z 2.4.0 similar point releases ubuntu 12.04.1 12.04.2 ... frequent used delivering new software versions improvements related security beginning version 2.4.0 update frequency reduced three times year every four months january may september new update come bodhi linux 2.4.0 planned release august 2013 appeared little late mid-september ready bug fix release x.y.z e.g version 2.4.0 2.4.1 meant correcting errors default configuration r_pi bodhi linux build built directly top raspbian incorporates changes improvements produce optimized ″hard float″ code raspberry pi armhf arm hf technically r_pi bodhi linux built compilation settings adjusted produce optimized ″hard float″ code raspberry pi armhf arm hf hard float application binary interface arm11 32-bit risc microprocessor arm architecture armv6 architectural additions provides enormous performance gains many use cases however required significant effort port elements debian wheezy armv6 cpu official builds require armv7 significantly enhance performance applications make heavy use floating point arithmetic operations previous less efficient soft float settings native armv6 architecture floating point arithmetic operations simulated software effort build working release armhf release officially supported anymore moment jack germain linuxinsider wrote positive review bodhi linux 5.0.0 noting bodhi linux elegant lightweight distribution productive computing platform
[ 2179, 2187, 2909, 5724, 6086, 7894, 2935, 6453, 2581, 2585, 2228, 1487, 58, 3996, 7587, 4008, 1893, 7954, 1909, 6884, 7969, 463, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, 3023, 6549, 1960, 6209, 2680, 4435, 5163, ...
Validation
3,445
2
HomeKit:homekit homekit software framework apple lets users set ios device configure communicate control smart-home appliances designing rooms items actions homekit service users enable automatic actions house simple voice dictation siri apps homekit first released ios 8 september 2014 homekit support also included macos mojave used devices siri manufacturers homekit-enabled devices required mfi program homekit products required encryption co-processor later changed ios 11 added support software authentication equipment manufactured without homekit support enabled use gateway product hub connects devices homekit service
[ 6788, 3940, 713, 7890, 4320, 2926, 4690, 2566, 734, 5752, 405, 6832, 6125, 3989, 2954, 2597, 1123, 3322, 6847, 1502, 4003, 6142, 2609, 5786, 1895, 4740, 1897, 4376, 5091, 4749, 5450, 6505, 7601, 2627, 7609, 6165, 1171, 5109, 3001, 2284, ...
Test
3,446
4
Zeobit:zeobit zeobit llc stylized zeobit technology software company formed 2009 ceo slava kolomiychuk located sunnyvale california company specialized computer security software internet security december 2016 longer business zeobit best known bundled utility software mackeeper software received mixed reviews reviewers divided effectiveness product zeobit llc incorporated september 2009 us state california slava kolomiychuk zeobit management headquarters sunnyvale california partnership offices europe asia house developers customer support march 2010 first product mackeeper macos released september 2010 pckeeper microsoft windows released may 13 2010 first beta version mackeeper version 0.8 released october 4 2010 pckeeper mackeeper equivalent windows pcs version 1.1.48 released october 26 2010 zeobit released mackeeper 1.0 january 30 2012 mackeeper 2.0 released updates security data control cleaning optimization 2014 pennsylvania woman filed class action lawsuit zeobit llc claiming company computer security program identifies problems n't exist generates false error messages scare users purchasing upgrade see holly yencha et al v. zeobit llc case 2:13-cv-00578 u.s. district court western district pennsylvania according complaint filed us district court installed mackeeper prompts user conduct diagnostic scan mackeeper class action lawsuit says scan purportedly detects errors lead problems identified zeobit marketing materials i.e. performance issues security privacy threats —problems mackeeper supposedly designed fix however zeobit class action lawsuit alleges diagnostic scan completed mackeeper reports identified thousands issues cause computer critical condition trial version mackeeper purports fix limited number issues customers encouraged purchase full registered version security software fully repair computer yencha alleges neither free trial full versions mackeeper perform reliable diagnostic testing computer instead zeobit intentionally designed mackeeper invariably ominously report user mac needs repair at-risk due harmful fabricated errors privacy threats computer problems regardless computer actual condition class action lawsuit alleges class action settled 2015 admission wrongdoing customers given refunds mackeeper utility software macos claims provide tools security cleaning optimization data control mackeeper zeobit official sponsors macworld iworld expo san francisco california 2011 2012 acquired kromtech alliance corp may 2013 mackeeper often criticized unethical marketing tactics including pop-up advertising buying domain names similar names antivirus programs zeobit claims affiliates responsible advertising accused unethical mackeeper sometimes referred potentially unwanted program detected antivirus programs pckeeper bundle important system utilities performing different tasks pс antivirus data control optimization tools drive clean-up utilities much according virus bulletin pckeeper scored 91.9 rap test listed number 6 antivirus world acquired kromtech alliance corp may 2013 zeodisk project cloud storage solution also integrated existing zeobit products 2011 zeobit partnered avira integrate virus database technology mackeeper pckeeper internet security features partnership allowed zeobit offer internet security options macos windows linux freebsd openbsd solaris computing platforms zeobit member better business bureau f rating due complaints advertising quality products zeobit microsoft silver certified developer zeobit official opswat partner
[ 4759, 1847, 578, 4678 ]
Test
3,447
5
Secure_Neighbor_Discovery:secure neighbor discovery secure neighbor discovery send protocol security extension neighbor discovery protocol ndp ipv6 defined rfc 3971 updated rfc 6494 neighbor discovery protocol ndp responsible ipv6 discovery network nodes local link determine link layer addresses nodes find available routers maintain reachability information paths active neighbor nodes rfc 4861 ndp insecure susceptible malicious interference intent send provide alternate mechanism securing ndp cryptographic method independent ipsec original inherent method securing ipv6 communications send uses cryptographically generated addresses cga new ndp options icmpv6 packet types used ndp send updated use resource public key infrastructure rpki rfc 6494 rfc 6495 define use send certificate profile utilizing modified rfc 6487 rpki certificate profile must include single rfc 3779 ip address delegation extension concerns algorithm agility vis-à-vis attacks hash functions used send expressed rfc 6273 cga currently uses sha-1 hash algorithm pkix certificates provide support alternative hash algorithms
[ 3821, 7070, 4710, 456, 2644, 3312, 7297, 3797, 7189 ]
Test
3,448
4
Runtime_application_self-protection:runtime application self-protection runtime application self-protection rasp security technology uses runtime instrumentation detect block computer attacks taking advantage information inside running software technology differs perimeter-based protections firewalls detect block attacks using network information without contextual awareness rasp technology said improve security software monitoring inputs blocking could allow attacks protecting runtime environment unwanted changes tampering rasp-protected applications rely less external devices like firewalls provide runtime security protection threat detected rasp prevent exploitation possibly take actions including terminating user session shutting application alerting security personnel sending warning user rasp aims close gap left application security testing network perimeter controls neither enough insight real-time data event flows either prevent vulnerabilities slipping review process block new threats unforeseen development rasp integrated framework module runs conjunction program codes libraries system calls technology also implemented virtualization application security solutions rasp technology used conjunction dynamic application security testing dast technology create interactive application security testing security product rasp solutions deployed two different ways monitor protection mode monitor mode rasp solution reports web application attacks block attack protection mode rasp solution reports blocks web application attacks
[ 623, 3932, 6694, 6515, 2105, 1461, 651, 2566, 6725, 2747, 5485, 1376, 3794, 5401, 2310, 6823, 2491, 1805, 5149, 6376, 3726, 1584, 4440, 6756, 3486, 2789, 74, 7865, 7319, 3680, 3681 ]
Test
3,449
4
Dual-homed:dual-homed dual-homed dual-homing refer either ethernet device one network interface redundancy purposes firewall technology one firewall architectures implementing preventive security example dual-homed devices enthusiast computing motherboards incorporate dual ethernet network interface cards ethernet lans dual-homing network topology whereby networked device built one network interface interface port connected network one connection active time connection activated primary connection fails traffic quickly rerouted backup connection event link failure feature designed provide telecommunications grade reliability redundancy ethernet networks multihoming general category referring device one network connection firewall dual-homing provides first-line defense protection technology keeping untrusted bodies compromising information security violating trusted network space dual-homed host dual-homed gateway system fitted two network interfaces nics sits untrusted network like internet trusted network corporate network provide secure access dual-homed general term proxies gateways firewalls server provides secured applications services directly untrusted network dual-homed hosts seen special case bastion hosts multi-homed hosts fall category application-based firewalls dual-homed hosts act firewalls provided forward ip datagrams unconditionally firewall architectures include network-layer firewall types screening router screened-host screened subnet
[ 3338, 4374, 2779 ]
Test
3,450
5
PAROLI:paroli paroli proprietary protocol used inside multi-shelf carrier routing system cisco stands parallel optical link used connect line-cards so-called line-card chassis switching fabric switch-fabric chassis traffic kinds chassis comparable data flows backplane single-shelf system required bandwidth high need reliability shelves interconnected using several fibre optic cables protocol/feature used multi-shelf cisco-crs systems find ios xr special high performance version cisco ios basically two types multi-shelf crs systems second option allows fault-tolerant system crs system although single shelf switch-fabric allows redundancy levels power fans management-cards switch-cards etc multi-shelf system based two switch-fabric cards least two line-card chassis continue run even one switch-fabric shelves completely four scc/2 lcc also gives optimal availability reliability without loss throughput case switch fabric module fails although different shelves multi-shelf routing system often placed directly next paroli system allows distance shelves want place different shelves different rooms e.g system two switch-fabris chassis one chassis 50 line-card chassis dataroom 1 rest system room 2 even fire one room system continue work possible long length fibre-optic canles n't exceed 100 meters 328 feet also allow move individual shelves system traffic coming multi-shelf crs system come via interface line card line-card shelf traffic sent switch-fabric shelf packet processed based destination course system-configuration data sent outgoing interface line-card line-card shelf inter shelf communication links therefore process kind data-volumes backplane normally carry single-shelf router allow speeds via external fibre optic cabling cisco designed special modules make possible multi-shelf system need three kind connections line-card chassis switch-fabric chassis management alarm external clock cabling allow management different shelves system different type management clock signalling options least one management cabling required general rp ethernet connection controller cabling cisco created special module use fabric card chassis 22 port shelf controller gigabit ethernet module sc-ge-22 lcc use two ethernet interfaces provided two rp chassis single sfc two lcc install sc-ge-22 modules single sfc interface rp connect twice single sfc 2 x 2 setup one ge port rp connects one sfc ge port connects sfc four sfc setup first rp connects sfc 1 3 rp shelf connects sfc 2 4 allow redundancy connect ethernetport0 interface rp port first fc-fe-22 interface 1 second sc-fe-22 allow communication two sc-fe-22 modules creating mesh-network connect port 22 sc-fe-22 dual sfc sc-fe-22 direct full mesh link 3 sc-fe-22 4 sfc system also create full-mesh network fc-fe-22 modules cabling means one sfc two lcc need 8+1 ethernet cables network control dual sfc need 14 cables 8xsc-lc 6 lcc mesh 4 sfc-2 lcc need 8 lc cables 28 sfc-sfc mesh cables finally need fabric cabling carry actual data payload line card chassis switch fabric chassis interconnection system uses 8 fabric planes numbered 0 7 combination uses 3 components stages packet arrives via interface linecard lcc ingress fcc stage 1 goes switch-fabric stage 2 destination line-card stage 3 .it course possible linecard ingress resides shelf egress line card 3 stage model used lcc use stage 1 3 cards s13 cards sfc stage 2 cards s2 single sfc setup 8 s2 cards reside single sfc multi sfc setupthe s2 cards distributed sfc communication based two line-card chassis need 72 fibres 3 s1,2,3 x 8 planes x 3 2xlcc+1fcc even one sfc still use 72 cables two sfc setup 50 fibres lcc connect sfc1 50 sfc2 similar 4 node system cables ordered lengths 10–100 meters steps 5 meters come sets 24 thus interconnect system need 3 sets required length future configurations two lcc supported currently multi-shelf configuration supports two line card chassis 1,2 3 switch fabric chassis
[ 3450, 4783 ]
Test
3,451
3
QUICC:quicc quicc abbreviation quad integrated communications controller original quicc 68k-based motorola 68360 followed powerpc-based powerquicc powerquicc ii powerquicc ii+ powerquicc iii early chips used separate risc engine control serial interfaces enhancing performance slower speed designs pq2+ pq3 designs first family offer gigabit ethernet speeds using conventional ethernet controllers without need risc co-processor exceptions 832x bridge chips chips many integrated devices/controllers directly targeted telecom industry still used applications well technology backbone many motorola cellular base stations pq2+ chips moved directions well many designs sata controllers san based applications networking always strength every current freescale pq cpu/board comes working linux environment freescale continues offer mqx true rtos ppc growing basis
[ 608, 7990, 2353 ]
Test
3,452
0
Bibliotheca_Polyglotta:bibliotheca polyglotta bibliotheca polyglotta norwegian database multilingualism project french language science per global history university oslo aim project according pages producing web corpus buddhist texts using multilingual lexicography generally texts used study sanskrit chinese tibetan
[ 2054 ]
Test
3,453
4
Eva_Galperin:eva galperin eva galperin director cybersecurity electronic frontier foundation eff technical advisor freedom press foundation noted extensive work protecting global privacy free speech research malware nation-state spyware galperin became interested computers early age father computer security specialist 12 created desktop unix/solaris computer became active usenet discussion areas science fiction novels playing interactive text games later became active web development attended college san francisco state university political science international relations working unix system administrator various companies silicon valley galperin joined eff 2007 prior eff worked center us-china policy studies helped organize conferences researched chinese energy policy eff led threat lab project promoted eff director cybersecurity 2017 since 2018 focused eradication stalkerware spyware used domestic abuse industry working victims stalkerwares malicious applications marketed abusive spouses overbearing parents stalkers installed secretly mobile devices allowing owners monitor targets activities april 2019 convinced anti-virus provider kaspersky lab begin explicitly alerting users security threats upon detection stalkerware company android product also asked apple allow antivirus applications marketplace like kaspersky alert users mobile devices jailbroken rooted galperin stated due competition cybersecurity companies prompted follow suit meet heightened standard also called u.s. state federal officials arrest prosecute executives companies developing selling stalkerwares charges hacking
[ 5452, 1863, 6417, 5700, 2379 ]
Test
3,454
4
UK_Cyber_Security_Forum:uk cyber security forum uk cyber security forum social enterprise spanning united kingdom representing small medium-sized enterprises smes uk cyber sector divided 20 regional cyber clusters provide free membership events members forms part uk cyber security community forum praised uk government helping address cyber skills gap faced u.k concept providing regional cyber security clusters later supported laid u.k government cyber security strategy late 2014 national news reported effectiveness forum especially terms aiding collaboration uk cyber companies considerable coverage certain cyber clusters london cyber cluster featured heavily media currently 20 official cyber clusters u.k supported u.k government
[ 4648, 1805, 7560 ]
Validation
3,455
2
WebSphere_Application_Server_for_z/OS:websphere application server z/os ibm websphere application server z/os one platform implementations ibm websphere application server family latest version version 9.0 open standard interfaces supported common across platforms provided version release levels aligned however functional implementation open standard specification line differs platforms allows specific attributes platform exploited without jeopardizing common programming interface specification level websphere application server z/os v7 product code directly exploit following attributes platform version 7.0 websphere application server z/os provides five functions informally known zdiff functions represent specific exploitation z/os platform functions websphere application server z/os v8 introduced ability configure application server behavior request level rather server level function built upon existing wlm classification file used assign wlm transaction classes identified requests v8 provided additional xml tags assign server behavior requests identified xml following xml tags apply different behavior may v8 apply identified individual requests websphere application server version 8.5 announced april 24 2012 component v8.5 liberty profile runtime model composable web container server runtime dynamic update capabilities liberty profile z/os several extensions designed take advantage specific z/os platform functions extensions br
[ 2807 ]
Test
3,456
6
Modes_(Unix):modes unix modes file system permissions given user group others classes access files unix shown listing files long format access control lists use using getfacl modes changed chmod traditional unix permissions setfacl access control lists traditional unix permissions symbolic mode composed three components combined form single string text references classes used distinguish users permissions apply references specified defaults except references explicitly specified final outcome masked umask value references represented one following letters chmod program uses operator specify modes file adjusted following operators accepted modes indicate permissions granted taken away specified classes three basic modes correspond basic permissions combination three components produces string understood chmod command multiple changes specified separating multiple symbolic modes commas example following command would used add read write permissions user group classes file directory named sample command removes permissions allowing one read write execute file named sample following command changes permissions user group read execute write permission sample
[ 3599, 2547, 7161, 4672, 3626, 6117, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 4480, 4855, 7718, 200, 12...
Test
3,457
2
Nintendo_Switch_system_software:nintendo switch system software nintendo switch system software updatable firmware operating system used nintendo switch video game console nintendo released limited information switch internals public computer security researchers well developers nintendo 3ds emulator citra analyzed operating system found operating system internal name horizon evolution nintendo 3ds system software implements microkernel architecture drivers run userspace including nvidia driver security researchers described “ kind similar linux driver ” graphics driver features undocumented thin api layer called nvn “ kind like vulkan ” userspace processes use address space layout randomization sandboxed according nintendo switch system software licensing information code freebsd kernel utilized horizon horizon utilizes several components android stagefright multimedia framework according citra authors – also begun develop switch emulator called yuzu – “ nintendo re-purposed android graphics stack used switch rendering. ” rendering web content done via webkit although end-user web browser available console thus far webkit applet still accessible connecting network requires web login webkit applet also used several operating system functions nintendo eshop unlike previous consoles nintendo purposefully designed system software minimalist possible home menu running 200 kilobytes minimalism meant improve system performance launch games faster nintendo switch home screen battery internet time information top right corner grid showing software system downloaded physical underneath shortcuts os functions nintendo eshop settings sleep mode button news function nintendo switch software allows users read gaming news advertisements provided nintendo third-party developers news also displayed system locked news interface originally available 1.0.0 version software however new headlines transmitted 2.0.0 update released 3.0.0 update revamped news system adding multiple news channels different games users subscribe news headlines appear depend channels subscribed 4.0.0 update improved news screen updating layout nintendo eshop option home menu opens webkit-based interface allows games purchased downloaded nintendo eshop album stores captured screenshots videos pressing capture button controller supported software save screenshot either microsd card system memory album allows users view screenshots taken screenshots edited adding text shared facebook twitter addition supported games holding capture button briefly save last 30 seconds video album trimmed posted online 2.0.0 update added ability post screenshots facebook twitter within system ui making easier share screenshots 4.0.0 update added support saving 30 second videos compatible games controllers menu allows controllers paired disconnected reconnected 3.0.0 update added find controllers option allows nearby controllers paired remotely turned vibrated help find lost controllers settings option allows system settings changed includes functionality creating miis initial version system software nintendo switch launch day consoles updated day one patch 3 march 2017 console launch date update added online features previously missing original software official launch date notable features update access nintendo eshop well ability add friends friends list similar nintendo 3ds october 17th 2018 custom firmware named atmosphère first released many different custom firmwares system two popular reinx sx os
[ 5268, 3838, 1341, 7514, 3081, 6794, 191, 5021, 6085, 6711, 1356, 3856, 6984, 908, 1547, 7355, 728, 481, 1279, 5571, 8194, 8096, 1193, 738, 3636, 4059, 6367, 6369, 2583, 8001, 6918, 6294, 5760, 5065, 594, 4441, 6477, 4534, 424, 2512, 525...
Test
3,458
3
Instruction_window:instruction window instruction window computer architecture refers set instructions execute out-of-order speculative processor particular conventional design instruction window consists instructions re-order buffer rob processor instruction within instruction window executed operands ready out-of-order processors derive name may occur out-of-order operands younger instruction ready older instruction instruction window finite size new instructions enter window usually called dispatch allocate instructions leave window usually called retire commit instructions enter leave instruction window program order instruction leave window oldest instruction window completed hence instruction window seen sliding window instructions become out-of-order execution within window speculative i.e. side-effects applied outside cpu committed order support asynchronous exception handling like interrupts paradigm also known restricted dataflow instructions within window execute dataflow order necessarily program order window occurs restricted finite size instruction window distinct pipelining instructions in-order pipeline instruction window conventionally understood sense execute order respect one another out-of-order processors usually built around pipelines many pipeline stages e.g. front-end instruction fetch decode stages considered part instruction window
[ 4847, 553, 5371, 1546, 4049, 5042, 7453, 7507, 4154, 1481, 5939, 4159, 1023, 1295, 6922, 3041, 1405, 1586, 1678, 515, 2961, 8130, 3667, 1786, 2969, 6148, 4742, 5447, 357, 4839, 5890 ]
Train
3,459
3
Macintosh_Plus:macintosh plus macintosh plus computer third model macintosh line introduced january 16 1986 two years original macintosh little year macintosh 512k price tag us 2599 evolutionary improvement 512k shipped 1 mb ram standard expandable 4 mb external scsi peripheral bus among smaller improvements originally generally beige-colored case original macintosh pantone 453 1987 case color changed long-lived warm gray platinum color earliest macintosh model able run system 7 os bruce webster byte reported rumor december 1985 supposedly apple releasing big mac time column sees print said mac reportedly come 1 megabyte ram ... new 128k-byte rom ... double-sided 800k bytes disk drive standard mac box introduced macintosh plus first macintosh model include scsi port launched popularity external scsi devices macs including hard disks tape drives cd-rom drives printers zip drives even monitors scsi implementation plus engineered shortly initial scsi spec finalized 100 scsi-compliant scsi ports remained standard equipment macs introduction imac 1998 replaced apple legacy ports usb macintosh plus last classic mac phone cord-like port front unit keyboard well de-9 connector mouse models released macintosh plus would use adb ports mac plus first apple computer utilize user-upgradable simm memory modules instead single dip dram chips four simm slots provided computer shipped four 256k simms 1mb total ram replacing 1mb simms possible 4mb ram although 30-pin simms could support 16mb total ram mac plus motherboard 22 address lines connected 4mb maximum new -inch double-sided 800 kb floppy drive offering double capacity floppy disks previous macs along backward compatibility then-new drive controlled iwm chip previous models implementing variable speed gcr drive still completely incompatible pc drives 800 kb drive two read/write heads enabling simultaneously use sides floppy disk thereby double storage capacity like 400 kb drive companion macintosh 800k external drive available option however increased disk storage capacity combined 2-4x available ram external drive less necessity 128k 512k mac plus 128 kb rom motherboard double amount rom previous macs roms included software support scsi then-new 800 kb floppy drive hierarchical file system hfs uses true directory structure disks opposed earlier mfs macintosh file system files stored single directory one level pseudo-folders overlaid programmers fourth inside macintosh volume details use hfs rest mac plus new system software plus still include provision internal hard drive would nine months apple would offer scsi drive replacement slow hard disk 20 would well year apple would offer first internal hard disk drive macintosh compact mac plus 512×342 pixel monochrome display resolution 72 ppi identical previous macintosh models unlike earlier macs mac plus keyboard includes numeric keypad directional arrow keys previous macs one-button mouse fan making extremely quiet operation lack cooling fan mac plus led frequent problems overheating hardware malfunctions applications macpaint macwrite bundled mac plus august 1987 hypercard multifinder also bundled third-party software applications available included macdraw microsoft word excel powerpoint well aldus pagemaker microsoft excel powerpoint originally forethought actually developed released first macintosh similarly microsoft word 1 macintosh first time gui version software introduced personal computer platform time exclusive availability excel pagemaker macintosh noticeable drivers sales platform case design essentially identical original macintosh debuted beige labeled macintosh plus front macintosh plus 1 mb back denote 1 mb ram configuration shipped january 1987 transitioned apple long-lived platinum-gray color rest apple product line keyboard keycaps changed brown gray january 1988 reduced ram prices apple began shipping 2- 4- mb configurations rebranded simply macintosh plus among design changes included trademarked inlaid apple logo recessed port icons apple iic iigs essentially retained original design upgrade kit offered earlier macintosh 128k macintosh 512k/ enhanced includes new motherboard floppy disk drive rear case owner retained front case monitor analog board macintosh plus front upgraded units apple logo recessed bottom left hand corner front case however label back case reads macintosh plus 1mb new extended plus keyboard could also purchased unfortunately upgrade cost almost much new machine mac plus upgraded use third-party accelerators clipped soldered onto 68000 processor 32 mhz 68030 processor used 16 mb ram allows run mac os 7.6.1 program available called mini vmac emulate mac plus variety platforms including unix windows dos classic mac os macos pocket pc ios even nintendo ds although mac plus would become overshadowed two new macs macintosh se macintosh ii march 1987 remained production cheaper alternative introduction macintosh classic october 15 1990 made macintosh plus longest-produced macintosh ever sale 1,734 days 2nd generation mac pro introduced december 19 2013 surpassed record september 18 2018 continued supported versions classic mac os version 7.5.5 released 1996 additionally period general market relevance heavily discounted like 512k/512k e offered educational market badged macintosh plus ed due popularity long life introduction many features would become mainstays macintosh platform years plus common base model many software hardware products lack fan could cause life macintosh plus end early users power supply would heat solder joints inside would fracture causing many problems loss deflection monitor complete loss power early compact macs problem common yoke connector flyback transformer horizontal drive coupling capacitor fan also often added reduce heat machine upgraded full ram capacity 4 mb debut macintosh 128k macintosh plus various third-party cooling add-ons available help increase airflow unit apple reorganized compact macintosh case accommodate fan release macintosh se optionally included heat-generating internal hard disk plus went two rom revisions general market relevance initial rom replaced first two months serious bug prevented mac booting external scsi device powered second revision fixed problem scsi devices could send mac endless reset post
[ 2547, 7890, 5732, 722, 1094, 2926, 5037, 1103, 5752, 405, 2954, 7572, 6482, 5079, 6142, 4373, 7226, 2978, 7601, 4749, 3346, 6165, 4389, 4759, 5463, 102, 5469, 4768, 3008, 5477, 7269, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, ...
Test
3,460
8
Yandex.Metrica:yandex.metrica yandex.metrica free web analytics service offered yandex tracks reports website traffic yandex launched service 2008 made public 2009 2019 yandex.metrica third widely used web analytics service web yandex.metrica uses simple javascript tag webmaster implements website tag collects audience traffic behaviour data website metrica also linked yandex.direct online advertising platform collect ads conversion rate
[ 2451, 4600, 3943, 3850 ]
Train
3,461
4
Lattice-based_access_control:lattice-based access control computer security lattice-based access control lbac complex access control model based interaction combination objects resources computers applications subjects individuals groups organizations type label-based mandatory access control model lattice used define levels security object may subject may access subject allowed access object security level subject greater equal object mathematically security level access may also expressed terms lattice partial order set object subject greatest lower bound meet least upper bound join access rights example two subjects b need access object security level defined meet levels b another example two objects x combined form another object z assigned security level formed join levels x lbac also known label-based access control rule-based access control restriction opposed role-based access control rbac lattice based access control models first formally defined denning 1976 see also sandhu 1993
[ 1249, 2384, 2557, 3884, 6162, 6944, 5725, 5074, 1805 ]
Test
3,462
5
Flow_control_(data):flow control data data communications flow control process managing rate data transmission two nodes prevent fast sender overwhelming slow receiver provides mechanism receiver control transmission speed receiving node overwhelmed data transmitting node flow control distinguished congestion control used controlling flow data congestion actually occurred flow control mechanisms classified whether receiving node sends feedback sending node flow control important possible sending computer transmit information faster rate destination computer receive process happen receiving computers heavy traffic load comparison sending computer receiving computer less processing power sending computer stop-and-wait flow control simplest form flow control method message broken multiple frames receiver indicates readiness receive frame data sender waits receipt acknowledgement ack every frame specified time called time receiver sends ack let sender know frame data received correctly sender send next frame ack frame ack lost transmission frame re-transmitted re-transmission process known arq automatic repeat request problem stop-and wait one frame transmitted time often leads inefficient transmission sender receives ack transmit new packet time sender channel unutilised pros advantage method flow control simplicity cons sender needs wait ack every frame transmits source inefficiency particularly bad propagation delay much longer transmission delay stop wait also create inefficiencies sending longer transmissions longer transmissions sent likely chance error protocol messages short errors likely detected early inefficiency created single messages broken separate frames makes transmission longer method flow control receiver gives transmitter permission transmit data window full window full transmitter must stop transmitting receiver advertises larger window sliding-window flow control best utilized buffer size limited pre-established typical communication sender receiver receiver allocates buffer space n frames n buffer size frames sender send receiver accept n frames without wait acknowledgement sequence number assigned frames order help keep track frames receive acknowledgement receiver acknowledges frame sending acknowledgement includes sequence number next frame expected acknowledgement announces receiver ready receive n frames beginning number specified sender receiver maintain called window size window less equal buffer size sliding window flow control far better performance stop-and-wait flow control example wireless environment data rates low noise level high waiting acknowledgement every packet transferred feasible therefore transferring data bulk would yield better performance terms higher throughput sliding window flow control point point protocol assuming entity tries communicate current data transfer complete window maintained sender indicates frames send sender sends frames window waits acknowledgement opposed acknowledging every frame sender shifts window corresponding sequence number thus indicating frames within window starting current sequence number sent automatic repeat request arq algorithm used error correction negative acknowledgement nak causes retransmission word error well next n–1 words value n usually chosen time taken transmit n words less round trip delay transmitter receiver back therefore buffer needed receiver normalized propagation delay tp length l propagation velocity v tt bitrate r framerate f get utilization must define window size n n greater equal 2a 1 utilization 1 full utilization transmission channel less 2a 1 equation must used compute utilization selective repeat connection oriented protocol transmitter receiver window sequence numbers protocol maximum number messages sent without acknowledgement window becomes full protocol blocked acknowledgement received earliest outstanding message point transmitter clear send messages section geared towards idea comparing stop-and-wait sliding window subsets go back n selective repeat error free formula_1 errors formula_2 define throughout average number blocks communicated per transmitted block convenient calculate average number transmissions necessary communicate block quantity denote 0 determine equation formula_3 transmit flow control may occur transmission rate may controlled network dte requirements transmit flow control occur independently two directions data transfer thus permitting transfer rates one direction different transfer rates direction transmit flow control flow control performed common rs-232 pairs control lines usually referred hardware flow control hardware flow control typically handled dte master end first raising asserting line command side example hardware flow control half-duplex radio modem computer interface case controlling software modem computer may written give priority incoming radio signals outgoing data computer paused lowering cts modem detects reception conversely xon/xoff usually referred software flow control open-loop flow control mechanism characterized feedback receiver transmitter simple means control widely used allocation resources must prior reservation hop-to-hop type open-loop flow control inherent problems maximizing utilization network resources resource allocation made connection setup using cac connection admission control allocation made using information already old news lifetime connection often over-allocation resources reserved unused capacities wasted open-loop flow control used atm cbr vbr ubr services see traffic contract congestion control open-loop flow control incorporates two controls controller regulator regulator able alter input variable response signal controller open-loop system feedback feed forward mechanism input output signals directly related increased traffic variability also lower arrival rate system higher loss rate open control system controllers operate regulators regular intervals assurance output variable maintained desired level may cheaper use model open-loop model unstable closed-loop flow control mechanism characterized ability network report pending network congestion back transmitter information used transmitter various ways adapt activity existing network conditions closed-loop flow control used abr see traffic contract congestion control transmit flow control described form closed-loop flow control system incorporates basic control elements sensor transmitter controller regulator sensor used capture process variable process variable sent transmitter translates variable controller controller examines information respect desired value initiates correction action required controller communicates regulator action needed ensure output variable value matching desired value therefore high degree assurance output variable maintained desired level closed-loop control system feedback feed forward system feedback closed-loop system feed-back mechanism directly relates input output signals feed-back mechanism monitors output variable determines additional correction required output variable value fed backward used initiate corrective action regulator control loops industry feedback type feed-forward closed loop system measured process variable input variable measured signal used fashion feedback system closed-loop model produces lower loss rate queuing delays well results congestion-responsive traffic closed-loop model always stable number active lows bounded sliding window
[ 791, 1068, 709, 3618, 3855, 1540, 6432, 7637, 4151, 5492, 3799, 4062, 585, 1022, 7470, 3563, 1869, 3315, 1981, 7590, 3597 ]
Test
3,463
6
Apache_Subversion:apache subversion apache subversion often abbreviated svn command name svn software versioning revision control system distributed open source apache license software developers use subversion maintain current historical versions files source code web pages documentation goal mostly compatible successor widely used concurrent versions system cvs open source community used subversion widely example projects apache software foundation free pascal freebsd gcc sourceforge codeplex previously common host subversion repositories subversion created collabnet inc. 2000 top-level apache project built used global community contributors collabnet founded subversion project 2000 effort write open-source version-control system operated much like cvs fixed bugs supplied features missing cvs 2001 subversion advanced sufficiently host source code february 2004 version 1.0 released november 2009 subversion accepted apache incubator marked beginning process become standard top-level apache project became top-level apache project february 17 2010 release dates extracted apache subversion codice_1 file records release history subversion offers two types repository storage original development subversion used berkeley db package subversion limitations berkeley db usage program accesses database crashes terminates forcibly data loss corruption occurs repository remains offline berkeley db replays journal cleans outstanding locks safest way use subversion berkeley db repository involves single server-process running one user instead shared filesystem 2004 new storage subsystem developed named fsfs works faster berkeley db backend directories large number files takes less disk space due less logging beginning subversion 1.2 fsfs became default data store new repositories etymology fsfs based subversion use term filesystem repository storage system fsfs stores contents directly within operating system filesystem rather structured system like berkeley db thus subversion filesystem atop filesystem new file system called fsx development remove limitations fsfs version 1.9 considered production-ready access subversion repositories take place three means access fsfs berkeley db repositories 1.x version client work 1.x server newer clients servers additional features performance capabilities fallback support older clients/servers internally subversion system comprises several libraries arranged layers performs specific task allows developers create tools desired level complexity specificity one view subversion filesystem two-dimensional two coordinates used unambiguously address filesystem items revision subversion filesystem root used access contents revision files stored links recent change thus subversion repository quite compact system consumes storage space proportional number changes made number revisions subversion filesystem uses transactions keep changes atomic transaction operates specified revision filesystem necessarily latest transaction root changes made either committed becomes latest revision aborted transaction actually long-lived filesystem object client need commit abort transaction rather also begin transaction exit re-open transaction continue using potentially multiple clients access transaction work together atomic change though existing clients expose capability one important feature subversion filesystem properties simple name value pairs text properties occur filesystem entries i.e. files directories versioned like changes filesystem subversion client reserves 'svn prefix built-in properties names used define custom properties subversion also uses properties revisions like properties filesystem entries names completely arbitrary subversion client using certain properties prefixed 'svn however properties versioned changed later allowed pre-revprop-change hook subversion uses inter-file branching model perforce implement branches tagging branch separate line development tagging refers labeling repository certain point time easily found future subversion difference branches tags used new branch tag set using svn copy command used place native operating system mechanism copied directory linked original repository preserve history copy takes little extra space repository versions branch maintain history file point copy plus changes made since one merge changes back trunk branches known problem subversion affects implementation file directory rename operation subversion implements renaming files directories copy new name followed delete old name names change data relating edit history remains subversion still use old name older revisions tree however subversion may become confused move conflicts edits made elsewhere regular commits merging branches subversion 1.5 release addressed scenarios others remained problematic subversion 1.8 release addressed problems making moves first-class operation client still treated copy+delete repository subversion lacks repository-administration management features instance someone may wish edit repository permanently remove historical records certain data subversion built-in support achieve simply subversion stores additional copies data local machine become issue large projects files developers work multiple branches simultaneously versions prior 1.7 .svn directories client side could become corrupted ill-advised user activity like global search/replace operations starting version 1.7 subversion uses single centralized .svn folder per working area subversion store modification times files file checked subversion repository 'current date instead modification time repository file checked repository date check-in instead modification time file checked might always wanted mitigate third-party tools exist allow preserving modification time filesystem meta-data however giving checked files current date important well — tools like make 1 take notice changed file rebuilding subversion uses centralized revision control model ben collins-sussman one designers subversion believes centralised model would help prevent insecure programmers hiding work team members users version control systems see centralised model detrimental famously linus torvalds attacked subversion model developers subversion often deal well filename normalization performed hfs+ filesystem cause problems files accented characters names added repository non-hfs+ filesystem repository used hfs+ revision numbers difficult remember version-control system reason systems offer symbolic tags user-friendly references subversion feature documentation recommends use instead different nature instead implementing tags references points history subversion recommends making snapshot copies well-known subdirectory codice_2 space repository tree predefined references available head base prev committed history-to-space projection multiple issues 1 snapshot taken system assign special meaning name tag/snapshot difference copy reference revision recorded snapshot accessed url makes operations less convenient others impossible instance naïve codice_3 work slightly complicated achieve requiring user know input url/paths snapshots instead names codice_4 operations like instance codice_5 impossible 2 two ideally independent object types live repository tree fight top ensue words often difficult decide level create codice_2 subdirectory 3 tags conventional definition read-only light-weight repository client subversion copies read-only light-weight repository incredibly heavy-weight client address issues posters subversion mailing lists suggested new feature called labels aliases svn labels would closely resemble tags systems cvs git fact subversion global revision numbers opens way simple label → revision implementation yet 2013 progress made symbolic tags list wanted features collabnet continued involvement subversion project runs independent open source community november 2009 project accepted apache incubator aiming become part apache software foundation efforts since march 2010 project formally known apache subversion part apache top-level projects october 2009 wandisco announced hiring core subversion committers company moved become major corporate sponsor project included hyrum wright president subversion corporation release manager subversion project since early 2008 joined company lead open source team subversion open-source community provide binaries potential users download binaries volunteers subversion project include official graphical user interface gui use subversion third parties developed number different guis along wide variety additional ancillary software work announced 2009 included subversionj java api implementation obliterate command similar provided perforce enhancements sponsored wandisco subversion committers normally least one two new features active development one time 1.7 release subversion october 2011 included streamlined http transport improve performance rewritten working-copy library
[ 4296, 7516, 4303, 5728, 6428, 3955, 7896, 1105, 6821, 5054, 5408, 5075, 7933, 6137, 1511, 4742, 7955, 1906, 1155, 4028, 7238, 5117, 1554, 138, 840, 3031, 4435, 5863, 5874, 1989, 6952, 4469, 894, 1630, 2011, 2741, 3106, 917, 5571, 1286, ...
Test
3,464
9
Adin_Falkoff:adin falkoff adin d. falkoff 19 december 1921 – 13 august 2010 engineer computer systems programming systems designer mostly known work programming language apl systems ibm falkoff born new jersey received bachelor engineering b.ch.e city college new york 1941 master degree m.a mathematics yale university 1963 researcher manager ibm research since 1955 forty years retiring collaborated ken iverson 1960 1980 design development use apl programming language interactive environment special note landmark article formal description system/360 describing new ibm system/360 computer system formally apl programming notation falkoff visiting member faculty ibm systems research institute taught computer science yale university one researchers established managed ibm philadelphia scientific center received many awards work especially apl
[ 7331, 811, 6263, 470, 6285, 752, 5322, 1774, 1308, 7758, 6846, 8137, 3060, 1892, 6064, 356 ]
Validation
3,465
9
Eltron_Programming_Language:eltron programming language eltron programming language epl epl2 printer control language used produce printed paper labels various eltron zebra model printers newer printers support also zebra programming language zpl epl2 markup line-at-a-time language suitable printing media reduced space although supports bitmaps therefore arbitrary images use usually labels including barcode information epl2 line starts one letters indicating command may followed one comma-separated arguments commands arguments case-sensitive arguments numeric belong fixed set options see i.e reverse argument inlined string set variable values must surrounded double-quotes see i.e text argument although epl2 language quite lengthy complete number commands basic original author r team led eddy lee main author steven huang
[]
Test
3,466
0
Juergen_Pirner:juergen pirner juergen pirner born 1956 german creator jabberwock chatterbot 2003 loebner prize pirner created jabberwock modelling jabberwocky lewis carroll poem name initially jabberwock would give rude fantasy-related answers years pirner programmed better responses 2007 taught 2.7 million responses pirner lives hamburg germany
[ 4337 ]
Test
3,467
3
J.B._Harold_Murder_Club:j.b. harold murder club j.b. harold murder club known j.b. harold jikenbo 1 murder club japan 1986 murder mystery adventure game developed riverhillsoft released nec pc-98 msx ms-dos nec turbografx-cd turboduo nintendo ds platforms turbografx-cd version featured still photographs text audio voices well option select language english japanese first entry j.b. harold series released various platforms sold 20 million copies 2011 horrible murder taken place sleepy little town liberty bill robbins wealthy man known wild womanizing ways victim list possible suspects keeps growing j.b. harold must figure case solve mystery need travel various locations interview people search clues game laid grid map displays various locations though game mainly presented form still photos j.b. harold murder club first japanese j b. harold series murder mystery graphic adventure games includes manhattan requiem 1987 kiss murder 1988 d.c connection 1989 blue chicago blues 1995 j.b harold murder club first title series released united states series sold 20 million copies ios version second game manhattan requiem released western world 2008 enhanced remake game released japanese nintendo ds title keiji j.b. harold jikenbo satsujin club game reviewed 1991 dragon 176 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars wrote great game mystery fans thinking game well worth money video games computer entertainment critic donn nauert praised game sound graphics playability giving overall score 9 10 defunct games stated type game doubt appeal gamers love good murder mystery perfect denying best game kind type game n't see much anymore real shame j.b harold lot fun gave game score 70 gamespot included game list titles deserve enhanced remake stating one difficult games ever made memorable voice acting time day n't much quite like compared recent titles adventure games shenmue 1999 shadow memories 2001 well role-playing video game 2003 stating similarly features character interaction major gameplay element similar type multiple phrase response game generated controversy reference fictional unsolved rape donn nauert stated n't think subject american public comfortable video game even though dealt graphically ... review game dragon also criticized including warning box mature subject matter game reference unsolved rape case
[ 5822, 4759, 6380, 3467 ]
Test
3,468
2
Prefetcher:prefetcher prefetcher component microsoft windows introduced windows xp component memory manager speed windows boot process shorten amount time takes start programs accomplishes caching files needed application ram application launched thus consolidating disk reads reducing disk seeks feature covered us patent 6,633,968 since windows vista prefetcher extended superfetch readyboost superfetch attempts accelerate application launch times monitoring adapting application usage patterns periods time caching majority files data needed memory advance accessed quickly needed readyboost enabled uses external memory like usb flash drive extend system cache beyond amount ram installed computer readyboost also component called readyboot replaces prefetcher boot process system 700 mb ram windows system boots components many files need read memory processed often different parts file e.g registry hives loaded different times result significant amount time spent 'jumping file file back multiple times even though single access would efficient prefetcher works watching data accessed boot process including data read ntfs master file table recording trace file activity boot prefetcher continue watch activity 30 seconds user shell started 60 seconds services finished initializing 120 seconds system booted whichever elapses first future boots use information recorded trace file load code data efficient fashion i.e re-ordering disk reads minimise eliminate need access file multiple times thus minimising disk head movements application prefetching works similar fashion instead localized single application startup first 10 seconds activity monitored prefetcher stores trace files prefetch folder inside windows folder typically codice_1 name boot trace file always codice_2 application trace files concatenation application executable name hyphen hexadecimal representation hash path file resides .pf extension applications host components i.e microsoft management console dllhost name loaded component included computed hash well results different trace files created component note task scheduler process responsible parsing trace data collected prefetcher writing files prefetcher directory result prefetcher operate correctly task scheduler service started improve access times task scheduler calls windows disk defragmenter every three days machine idle lists files directories referenced boot process application startups processed processed result stored codice_3 prefetch directory subsequently passed disk defragmenter instructing re-order files sequential positions physical hard drive improve performance minimising distance hard drive heads moved one file next possible trigger re-ordering running defrag.exe systemdrive -b command line without running full defragmentation system installed solid-state drive superfetch disabled regular prefetching left enabled prefetcher configuration stored windows registry codice_4 enableprefetcher value set one following recommended value 3 values higher 3 increase performance changing value 2 make windows boot faster often found internet /prefetch:1 application tweak valid misunderstood switch used distinguish different operating modes executable case different modes would significantly different prefetch traces second myth user delete prefetch folder contents speed computer done windows need re-create prefetch files thereby slowing windows boot program starts prefetch files created—unless prefetcher disabled windows maintains prefetch files prefetch folder 128 recently launched programs
[ 5805, 458, 7038, 4759, 5637, 1534, 757, 8167, 578, 6684, 1971, 1992 ]
Test
3,469
8
Ping.fm:ping.fm ping.fm advertising-supported social networking micro-blogging web service enabled users post multiple social networks simultaneously making update ping.fm pushed update number different social websites allowed individuals using multiple social networks update status without update social media individually ping.fm grouped services three categories – status updates blogs micro-blogs – updates could sent group separately ping.fm shut 5 july 2012 replaced seesmic ping seesmic later acquired hootsuite ping.fm created intent making easy possible post updates multiple social networking sites simultaneously free service discontinued six months closed beta announcement made 2 september 2008 would longer require private invite beta codes used register use service launch open beta covered outlets like wired mashable ping.fm compared favorably websites similar functionality like hellotxt shut august 2012 ping.fm powered lamp linux apache mysql php .net used core software api allows programmers apply application key order develop third party applications users must apply api key user profile user configure ping.fm account aggregate content following services note google buzz discontinued google december 15 2011 4 january 2010 seesmic announced would acquiring ping.fm may 2012 seesmic announced blog ping.fm would closed june 2012 september 2012 seesmic acquired hootsuite
[ 2086, 6029, 6986, 2530, 578 ]
Test
3,470
9
Frances_E._Allen:frances e. allen frances elizabeth fran allen born august 4 1932 american computer scientist pioneer field optimizing compilers allen first female ibm fellow 2006 became first woman win turing award achievements include seminal work compilers program optimization parallelization since 2002 fellow emerita ibm allen grew farm peru new york graduated new york state college teachers part state university new york albany suny b.sc mathematics 1954 began teaching school peru new york two years enrolled university michigan earned m.sc degree mathematics 1957 deeply debt joined ibm research poughkeepsie ny programmer 1957 taught incoming employees basics fortran planned return teaching student loans paid ended staying ibm entire 45-year career allen assigned harvest project code breaking national security agency 1959 worked programming language called alpha managed compiler-optimization team harvest stretch project 1960s contributed acs-1 project 1970s pl/i 1970 1971 spent sabbatical new york university acted adjunct professor years afterwards another sabbatical brought stanford university 1977 allen became first female ibm fellow 1989 retired ibm 2002 remains affiliated corporation fellow emerita 2007 ibm ph.d. fellowship award created honor a.m. turing award citation reads publications include allen fellow institute electrical electronics engineers ieee association computing machinery acm 2000 made fellow computer history museum contributions program optimization compiling parallel computers elected national academy engineering 1987 american philosophical society 2001 national academy sciences 2010 nominated fellow american academy arts sciences 1994 received ieee computer society charles babbage award 1997 computer pioneer award ieee computer society 2004 1997 allen inducted witi hall fame 2002 augusta ada lovelace award association women computing 2004 allen winner abie award technical leadership anita borg institute allen recognized work high-performance computing 2006 turing award became first woman recipient forty-year history award considered equivalent nobel prize computing given association computing machinery interviews following award hoped would give opportunities women science computing engineering 2009 awarded honorary doctor science degree mcgill university pioneering contributions theory practice optimizing compiler techniques laid foundation modern optimizing compilers automatic parallel execution allen married nyu professor jacob t. schwartz 1972 divorced ten years later children
[ 7707, 1361, 1746, 5932, 4876, 1381, 1854, 7009, 43, 1308, 5424, 6485, 7863, 1600, 2803, 360 ]
Test
3,471
9
HyperFun:hyperfun hyperfun hyperdimensional functions programming language software used create visualize fabricate volumetric 3d higher-dimensional models team maintaining hyperfun project freely associated group researchers students different countries world uk russia france japan norway usa others called digital materialization group digitalmaterial.org hyperfun allows users easily model objects quality found reality nature system based new mathematical framework geometry function representation frep provides uniform method model surface geometry internal composition simultaneously also compact precise framework represent objects unlimited complexity properties compared traditional modeling systems hyperfun able digitally describe create modify models real imagined object environment technically complex geometric objects hyperfun constructed simple primitives various operations performed object three-dimensional space defined function point coordinates f x z continuous real function positive inside object negative outside takes zero value surface similarly multidimensional object defined function several variables f x1 x2 x3 ... xn example object changing time defined f x z representing time attributes color material density also defined corresponding functions constitutes new paradigm procedural function-based volume modeling rendering object shape properties locally evaluated request using black box procedures
[ 3915, 5571 ]
Test
3,472
3
Jesus_(video_game):jesus video game game name refers space station called j.e.s.u.s. named central christian figure jesus ship shaped like double-edged sword la book revelation inhabitants go fight mysterious demonic alien halley comet game takes place 2061 halley comet approaching mars quite time nations earth send mission investigate comet form life detected inside gas musou hayao stationed space lab jesus speaks commanding officer station requests track members two crews sent comet give access cards using spaceships hayao meets 7 different crew members time chinese doctor german captain soviet captain american xenobiologist french mathematician italian computer engineer brazilian astronomer mathematician also hayao love interest eline share heartfelt goodbye boarding different ships mission depart two weeks apart another eline ship leaving comet first eline happens talented musician well mathematician plays song wrote leaves meeting crew cuts hayao ship arrived halley comet hayao sent investigate first ship finds crew missing eline intelligent robot pet fojii found ship docking bay updating data offers hayao assistance tracking missing crew members unfortunately many found dead beginning die whispering dire vague warnings hayao something else board crew member tells hayao fire hurt none dead crew display physical signs harm except small pinprick one fingers hayao collects key cards missing murdered crew access journal entries video recordings showing xenomorph-like creature attacking ship recordings also say eline fled alien creature hid giving hayao hope may still alive ship investigating eline hayao fojii eventually come face-to-face monster first fleeing way harming eventually attacking freeze gun looted armory 4th floor ship manage kill slowing movements ensure chase eline soon found hiding one engine rooms hayao reunites asking happened arrived tells eline crew died make plans use shuttlepods escape spaceship shuttles take one passenger eline uses first shuttle hayao following shortly leaves encounters alien monster leaves behind piece skin body hayao contacts xenobiologist requests bring back sample study back first ship xenobiologist carson begins research alien monster soon enough sample monster breaks free hides ship hayao carson suspect alien able regrow sample much like worm cut half searching ship clues hayao discovers happenings eerily reminiscent second ship previous crew doctor cryogenic pod used access astronomer favourite food hamburgers found littered one storage bays briefing room tape recording eline song found starts playing randomly comms player explores ship abruptly stop upon returning room tape containing eline song crushed suddenly carson attacked monster missing presumably dead hayao commanding officer jesus arrives aid capturing killing monster costs hayao eline board commander vessel plan next attempt locate ultimately destroy monster carson manages send signal first ship hayao goes back investigate however upon returning commander vessel monster also boarded ship breaks nearby vent hayao eline manage escape due commander sacrifice closes door behind pushing two safety primary ship hide cryo-pods fearful alien next moves hayao finds way communicate jesus carson pod carson hooked pod comm system main labs midst sending distress call jesus alien monster evolved begins speak strange language eline notes language sounds like many human languages mangled together fojii begins decrypting speech able communicate alien speech combination chinese german russian english italian portuguese making clear alien taken knowledge memories crew members killed using dna stole bodies evolve monster informs hayao taken control ship plans head jesus order conquer mankind killing sake advanced evolution alien mentions longer harmed hayao freeze rays shown earlier confrontations developing resistance hayao eline try bargaining alien avail hayao bluffs claims remote detonator use destroy ship alien meet lure alien ship considering options searching sort weapon harm fojii helps hayao recall happened tape eline song started playing monster one crushed tape finding harmony unbearable foreign biology takes eline synthesizer confronts alien front airlock plays eline song monster disabled long enough hayao jettison creature space hearing telepathically voices crew members killed tell hayao eline memories live inside alien creature one although long gone assure two humanity strength fight new breed monster even returns attempt destroy mankind day suspect hayao eline hold one another ship staring void space knowing tell tales fallen colleagues prepare earth future confrontation halley comet returns game proceeds linear adventure game player chooses action perform action actions vary based room situation although game implies danger various points seem possible lose three main sections game although first section mostly introduction characters game largely presented anime style although art fairly bright positive style first section game changes sections atmosphere game music game music composed koichi sugiyama dragon quest fame overworld theme dragon quest another game enix present pc-8801 version game sequel titled jesus ii ジーザス2 jīzasu tsū released 1991 nec pc-8801 nec pc-9801 sharp x68000 home computers
[ 4907 ]
Test
3,473
4
Manu_propria:manu propria also found several ancient documents front writer signature end document richly decorated manu propria signs frequently used medieval dignitaries literates verify authenticity handwritten documents mppria commonly used 18th century however used latin documents later official documents routinely accompanied abbreviation example declaration war serbia emperor franz joseph 1914 ends m.p. ordinary personal cheques frequently include abbreviation end signature line countries still regularly use manu propria include
[ 6672, 3794, 1266 ]
Test
3,474
4
NIST_Cybersecurity_Framework:nist cybersecurity framework nist cybersecurity framework provides policy framework computer security guidance private sector organizations united states assess improve ability prevent detect respond cyber attacks framework translated many languages used governments japan israel among others provides high level taxonomy cybersecurity outcomes methodology assess manage outcomes version 1.0 published us national institute standards technology 2014 originally aimed operators critical infrastructure used wide range businesses organizations helps shift organizations proactive risk management 2017 draft version framework version 1.1 circulated public comment version 1.1 announced made publicly available april 16 2018 version 1.1 still compatible version 1.0 changes include guidance perform self-assessments additional detail supply chain risk management guidance interact supply chain stakeholders security framework adoption study reported 70 surveyed organizations see nist framework popular best practice computer security many note requires significant investment includes guidance relevant protections privacy civil liberties 2017 nist published nist baldrige cyber security excellence builder leverages 2014 framework includes simpler self-assessment questions divided six areas results section nist cybersecurity framework designed individual businesses organizations use assess risks face framework divided three parts core profile tiers framework core contains array activities outcomes references aspects approaches cybersecurity framework implementation tiers used organization clarify partners views cybersecurity risk degree sophistication management approach framework profile list outcomes organization chosen categories subcategories based needs risk assessments organization typically starts using framework develop current profile describes cybersecurity activities outcomes achieving develop target profile adopt baseline profile tailored sector e.g infrastructure industry type organization define steps switch current profile target profile nist cybersecurity framework organizes core material five functions subdivided total 23 categories category defines number subcategories cybersecurity outcomes security controls 108 subcategories subcategory also provides informative resources referencing specific sections variety information security standards including cobit nist sp 800-53 ansi/isa-62443 council cybersecurity critical security controls ccs csc managed center internet security special publications sp aside informative references requires paid membership purchase access respective guides cost complexity framework resulted bills houses congress direct nist create cybersecurity framework guides accessible small medium businesses functions categories along unique identifiers definitions stated category column spreadsheet view core standard develop organizational understanding manage cybersecurity risk systems assets data capabilities develop implement appropriate safeguards ensure delivery critical infrastructure services develop implement appropriate activities identify occurrence cybersecurity event develop implement appropriate activities take action regarding detected cybersecurity event develop implement appropriate activities maintain plans resilience restore capabilities services impaired due cybersecurity event
[ 2513, 6301, 284, 6189, 4440, 2754, 2829, 7486, 1805 ]
Test
3,475
5
IBM_1009:ibm 1009 ibm 1009 data transmission unit ibm communications controller introduced 1960 1009 used synchronous transmit-receive str protocol transfer data 150 characters per second cps single point-to-point dial leased telephone line system advertised able link magnetic core memories ibm 1401 computers telephone lines 1009 attached ibm 1400 series computers 1401 1961 transmission rate doubled 300 cps 1962 1009 part test data communications using telstar satellite link two 1401 computer systems
[]
Test
3,476
4
Rop_Gonggrijp:rop gonggrijp robbert rop valentijn gonggrijp born 14 february 1968 dutch hacker one founders xs4all gonggrijp born amsterdam growing wormer dutch zaanstreek area became known teenage hacker appeared one main characters jan jacobs book kraken en computers hacking computers veen uitgevers 1985 describes early hacker scene netherlands moved amsterdam 1988 founded hacker magazine hack-tic 1989 believed major security threat authorities netherlands united states masthead hack-tic gonggrijp described role hoofdverdachte 'prime suspect convinced internet would radically alter society 1993 number people surrounding hack-tic including gonggrijp founded xs4all first isp offered access internet private individuals netherlands gonggrijp sold company former enemy dutch-telecom kpn 1997 left xs4all gonggrijp founded itsx computer security evaluation company bought madison gurkha 2006 2001 gonggrijp started work cryptophone mobile telephone encrypt conversations since 1989 gonggrijp main organizer hacker events held every four years originally organized cast hack-tic events continued live day throughout years repeatedly shown concerns increasing amount information individuals government agencies companies access rop held controversial talk titled lost war chaos communication congress 2005 berlin together frank rieger 2006 founded organisation wij vertrouwen stemcomputers niet trust voting computers campaigns use electronic voting systems without voter verified paper audit trail showed october 2006 dutch television electronic voting machine manufacturer nedap could easily hacked findings taken seriously dutch government international election observers 16 may 2008 dutch government decided elections would held using paper ballots red pencil proposal develop new generation voting computers rejected gonggrijp worked wikileaks helping prepare collateral murder april 2010 release video footage baghdad airstrike 14 december 2010 relation ongoing investigations wikileaks us department justice issued subpoena ordering twitter release information regarding gonggrijp account well julian assange chelsea manning birgitta jónsdóttir jacob appelbaum 637,000 users following wikileaks reason gonggrijp collaboration releasing collateral murder video april 2010 wikileaks action
[ 2923, 208, 2566, 1356, 3486 ]
Validation
3,477
4
Ivan_Krstić:ivan krstić ivan krstić croatian computer security expert currently working core security apple inc. krstić previously director security architecture one laptop per child co-author official ubuntu book born croatia krstić received scholarship attend cranbrook kingswood school michigan u.s 15 2004 enrolled harvard college took year leave work secure electronic healthcare croatia largest children hospital returning harvard 2005 took another leave offered position one laptop per child designed bitfrost security architecture personally oversaw project first two in-country deployments uruguay peru left project early 2008 later joined apple may 2009 2007 krstić became tr35 laureate selected mit technology review one world top 35 innovators age 35 year later eweek magazine declared one top three influential people modern computer security one top 100
[ 1805 ]
Validation
3,478
9
Nu_(programming_language):nu programming language nu interpreted object-oriented programming language lisp-like syntax created tim burks alternative scripting language program os x cocoa application programming interface api implementations also exist iphone linux language first announced c4 conference indie mac developers held august 2007 nu code defines simple complex numbers class example basic definition complex number defines instance variables method initialize object shows similarity code nu equivalent objective-c also shows similarity ruby sample nuke tool bundled nu also shows influence objective-c lisp ruby design language
[ 3779, 6507, 6788, 4543, 5571, 5786, 352, 7848, 578, 1287, 6428 ]
Test
3,479
1
Apache_iBATIS:apache ibatis ibatis persistence framework automates mapping sql databases objects java .net ruby rails java objects pojos plain old java objects mappings decoupled application logic packaging sql statements xml configuration files result significant reduction amount code developer needs access relational database using lower level apis like jdbc odbc persistence frameworks hibernate allow creation object model java say user create maintain relational database automatically ibatis takes reverse approach developer starts sql database ibatis automates creation java objects approaches advantages ibatis good choice developer full control sql database schema example application may need access existing sql database used software access new database whose schema fully application developer control specialized database design team created schema carefully optimized high performance may 21 2010 development team forked code creating new project called mybatis making new releases consequence apache ibatis project became inactive moved apache attic june 2010 example assume database table java class read product record key new pojo following mapping added ibatis xml mapping file new java product object retrieved database product number 123 follows mapping file example codice_1 refers long integer value passed query parameter java object values properties object inserted query using similar codice_2 notation example parameter class codice_3 property called codice_4 codice_1 replaced codice_6 codice_7 object instance class codice_8 founder ibatis publicly stated dismay java 5 continued release new versions ibatis java versions 2.3.1 2.3.2 came april 2008 2.3.3 july framework currently available java .net ruby rbatis versions jbati project javascript orm inspired ibatis apache ibator tool closely related connects database uses metadata generate ibatis mapping files java classes 2001 project called ibatis started clinton begin originally focus development cryptographic software solutions first product released ibatis secrets personal data encryption signing tool much like pgp secrets written entirely java released open source license year microsoft published paper demonstrate recent .net 1.0 framework productive java purpose microsoft built version sun web pet store web project sun used show java best practices java blueprints microsoft claimed .net 10 times faster 4 times productive java 2002 clinton developed application called jpetstore demonstrate java could productive .net could also achieving better architecture used microsoft implementation jpetstore 1.0 big impact database layer clinton used attracted attention community soon ibatis database layer 1.0 project started composed two components ibatis dao ibatis sql maps ibatis 2.0 released june 2004 complete redesign keeping features clinton donated ibatis name code apache software foundation project stayed asf six years eventually ibatis dao deprecated considering better dao frameworks available spring framework may 19 2010 ibatis 3.0 published simultaneously development team decided continue development framework google code new project called mybatis june 16 2010 apache announced ibatis retired moved apache attic
[ 2180, 6604, 7238, 894, 4303, 5728, 7805, 6428, 2741, 7444, 7896, 917, 5571, 2660, 3463, 3542, 3204, 1286, 6821, 5054, 840, 1392, 3031, 5408, 3558, 5677, 7109, 5863, 6387, 5075, 6137, 7488, 7857, 5874, 3915, 6156, 1511, 2530, 4742, 5007, ...
Test
3,480
4
Cybercrime:cybercrime cybercrime computer-oriented crime crime involves computer network computer may used commission crime may target cybercrimes defined offences committed individuals groups individuals criminal motive intentionally harm reputation victim cause physical mental harm loss victim directly indirectly using modern telecommunication networks internet networks including chat rooms emails notice boards groups mobile phones bluetooth/sms/mms cybercrime may threaten person nation security financial health issues surrounding types crimes become high-profile particularly surrounding hacking copyright infringement unwarranted mass-surveillance sextortion child pornography child grooming also problems privacy confidential information intercepted disclosed lawfully otherwise debarati halder k. jaishankar define cybercrime perspective gender defined 'cybercrime women crimes targeted women motive intentionally harm victim psychologically physically using modern telecommunication networks internet mobile phones internationally governmental non-state actors engage cybercrimes including espionage financial theft cross-border crimes cybercrimes crossing international borders involving actions least one nation-state sometimes referred cyberwarfare report sponsored mcafee published 2014 estimated annual damage global economy 445 billion approximately 1.5 billion lost 2012 online credit debit card fraud us 2018 study center strategic international studies csis partnership mcafee concludes close 600 billion nearly one percent global gdp lost cybercrime year computer crime encompasses broad range activities computer fraud dishonest misrepresentation fact intended let another refrain something causes loss context fraud result obtaining benefit forms fraud may facilitated using computer systems including bank fraud carding identity theft extortion theft classified information types crime often result loss private information monetary information government officials information technology security specialists documented significant increase internet problems server scans since early 2001 growing concern among government agencies federal bureau investigations fbi central intelligence agency cia intrusions part organized effort cyberterrorists foreign intelligence services groups map potential security holes critical systems cyberterrorist someone intimidates coerces government organization advance political social objectives launching computer-based attack computers networks information stored cyberterrorism general defined act terrorism committed use cyberspace computer resources parker 1983 simple propaganda piece internet bomb attacks holidays considered cyberterrorism also hacking activities directed towards individuals families organized groups within networks tending cause fear among people demonstrate power collecting information relevant ruining peoples lives robberies blackmailing etc cyberextortion occurs website e-mail server computer system subjected threatened repeated denial service attacks malicious hackers hackers demand money return promising stop attacks offer protection according federal bureau investigation cybercrime extortionists increasingly attacking corporate websites networks crippling ability operate demanding payments restore service 20 cases reported month fbi many go unreported order keep victim name public domain perpetrators typically use distributed denial-of-service attack however cyberextortion techniques exist doxing extortion bug poaching example cyberextortion attack sony pictures 2014 u.s. department defense dod notes cyberspace emerged national-level concern several recent events geostrategic significance among included attack estonia infrastructure 2007 allegedly russian hackers august 2008 russia allegedly conducted cyber attacks time coordinated synchronized kinetic non-kinetic campaign country georgia december 2015 ukraine power grid cyberattack also attributed russia considered first successful cyber attack power grid fearing attacks may become norm future warfare among nation-states concept cyberspace operations impacts adapted warfighting military commanders future crimes committed selected group criminals unlike crimes using computer tool crimes require technical knowledge perpetrators technology evolves nature crime crimes relatively new existence long computers have—which explains unprepared society world general towards combating crimes numerous crimes nature committed daily internet crimes primarily target computer networks devices include individual main target cybercrime computer considered tool rather target crimes generally involve less technical expertise human weaknesses generally exploited damage dealt largely psychological intangible making legal action variants difficult crimes existed centuries offline world scams theft likes existed even development high-tech equipment criminal simply given tool increases potential pool victims makes harder trace apprehend crimes use computer networks devices advance ends include unsolicited sending bulk email commercial purposes spam unlawful jurisdictions phishing mostly propagated via email phishing emails may contain links websites affected malware may contain links fake online banking websites used steal private account information content websites electronic communications may distasteful obscene offensive variety reasons instances communications may illegal extent communications unlawful varies greatly countries even within nations sensitive area courts become involved arbitrating groups strong beliefs one area internet pornography target strongest efforts curtailment child pornography illegal jurisdictions world whereas content may offensive non-specific way harassment directs obscenities derogatory comments specific individuals focusing example gender race religion nationality sexual orientation often occurs chat rooms newsgroups sending hate e-mail interested parties harassment internet also includes revenge porn instances committing crime using computer lead enhanced sentence example case united states v. neil scott kramer kramer served enhanced sentence according u.s sentencing guidelines manual §2g1.3 b 3 use cell phone persuade induce entice coerce facilitate travel minor engage prohibited sexual conduct kramer argued claim insufficient charge included persuading computer device cellular phone technically computer although kramer tried argue point u.s sentencing guidelines manual states term computer means electronic magnetic optical electrochemically high-speed data processing device performing logical arithmetic storage functions includes data storage facility communications facility directly related operating conjunction device connecticut u.s. state pass statute making criminal offense harass someone computer michigan arizona virginia south carolina also passed laws banning harassment electronic means harassment defined u.s. computer statutes typically distinct cyberbullying former usually relates person use computer computer network communicate obscene vulgar profane lewd lascivious indecent language make suggestion proposal obscene nature threaten illegal immoral act latter need involve anything sexual nature although freedom speech protected law democratic societies us done first amendment include types speech fact spoken written true threat speech/text criminalized intent harm intimidate also applies online type network related threats written text speech us supreme court definition true threat statements speaker means communicate serious expression intent commit act unlawful violence particular individual group darknet markets used buy sell recreational drugs online drug traffickers use encrypted messaging tools communicate drug mules dark web site silk road major online marketplace drugs shut law enforcement reopened new management shut law enforcement silk road 2.0 went silk road 3 reloaded emerged however older marketplace named diabolus market used name exposure brand previous success broad diffusion cybercriminal activities issue computer crimes detection prosecution according jean-loup richet associate professor sorbonne business school technical expertise accessibility longer act barriers entry cybercrime indeed hacking much less complex years ago hacking communities greatly diffused knowledge internet blogs communities hugely contributed information sharing beginners could benefit older hackers knowledge advice furthermore hacking cheaper ever cloud computing era order spam scam one needed dedicated server skills server management network configuration maintenance knowledge internet service provider standards etc comparison mail software-as-a-service scalable inexpensive bulk transactional e-mail-sending service marketing purposes could easily set spam jean-loup richet explains cloud computing could helpful cybercriminal way leverage attack – brute-forcing password improve reach botnet facilitating spamming campaign computer source evidence see digital forensics even computer directly used criminal purposes may contain records value criminal investigators form logfile countries internet service providers required law keep logfiles predetermined amount time example european wide data retention directive applicable eu member states states e-mail traffic retained minimum 12 months method cybercrime investigation many ways cybercrime take place investigations tend start ip address trace however necessarily factual basis upon detectives solve case different types high-tech crime may also include elements low-tech crime vice versa making cybercrime investigators indispensable part modern law enforcement method cybercrime detective work dynamic constantly improving whether closed police units international cooperation framework due easily exploitable laws cybercriminals use developing countries order evade detection prosecution law enforcement developing countries philippines laws cybercrime weak sometimes nonexistent weak laws allow cybercriminals strike international borders remain undetected even identified criminals avoid punished extradited country united states developed laws allow prosecution proves difficult cases agencies fbi used deception subterfuge catch criminals example two russian hackers evading fbi time fbi set fake computing company based seattle washington proceeded lure two russian men united states offering work company upon completion interview suspects arrested outside building clever tricks like sometimes necessary part catching cybercriminals weak legislation makes impossible otherwise then-president barack obama released executive order april 2015 combat cybercrime executive order allows united states freeze assets convicted cybercriminals block economic activity within united states first solid legislation combats cybercrime way european union adopted directive 2013/40/eu offences directive definitions procedural institutions also council europe convention cybercrime.. usa european union introducing new measures cybercrime 31 may 2017 china announced new cybersecurity law takes effect date penalties computer-related crimes new york state range fine short period jail time class misdemeanor unauthorized use computer computer tampering first degree class c felony carry 3 15 years prison however hackers hired information security experts private companies due inside knowledge computer crime phenomenon theoretically could create perverse incentives possible counter courts ban convicted hackers using internet computers even released prisonthough computers internet become central everyday life type punishment may viewed harsh draconian however nuanced approaches developed manage cyber offenders behavior without resorting total computer internet bans approaches involve restricting individuals specific devices subject computer monitoring computer searches probation parole officers technology advances people rely internet store sensitive information banking credit card information criminals increasingly attempt steal information cybercrime becoming threat people across world raising awareness information protected tactics criminals use steal information continues grow importance according fbi internet crime complaint center 2014 269,422 complaints filed claims combined reported total loss 800,492,073 cybercrime yet seem average person radar 1.5 million cyber-attacks annually means 4,000 attacks day 170 attacks every hour nearly three attacks every minute studies showing us 16 victims asked people carrying attacks stop anybody uses internet reason victim important aware one protected online cybercrime proliferated professional ecosystem evolved support individuals groups seeking profit cybercriminal activities ecosystem become quite specialized including malware developers botnet operators professional cybercrime groups groups specializing sale stolen content forth leading cybersecurity companies skills resources visibility follow activities individuals group wide variety information available sources used defensive purposes including technical indicators hashes infected files malicious ips/urls well strategic information profiling goals techniques campaigns profiled groups freely published consistent on-going access typically requires subscribing adversary intelligence subscription service level individual threat actor threat intelligence often referred actor ttp tactics techniques procedures infrastructure tools technical indicators often trivial attackers change corporate sectors considering crucial role artificial intelligence cybersecurity
[ 5269, 3076, 3932, 4025, 5722, 7795, 803, 1631, 2190, 5466, 6328, 2382, 6715, 6092, 3964, 1376, 1380, 2850, 8100, 5051, 496, 2944, 4256, 3393, 6654, 1872, 6756, 1124, 3486, 2782, 3573, 2961, 5251, 3147, 1691, 1321, 4196, 1241, 3921, 84, ...
Test
3,481
3
Pachicom:pachicom game pachinko hugely popular japan since involves playing pinball element slot machines mixed along gambling four different gameplay modes choose two assign player pachinko machine two allow players choose machine game based standard pachinko rules replicating experience playing pachinko parlor game board layout nails sticking metal balls would either fall holes created pegs order traverse board certain compartments added board metal ball find way one compartments player receive points similar credits slot machine players expect lose ball point falls bottom board similar falling bottomless pit action game initially player starts one hundred balls points mode clock goes forward 000000 seconds reaches 999999 seconds equivalent either 16666.65 non-real time minutes 2777.775 non-real time hours 115.740625 non-real time days occurs game remaining points stored top three score list mode b except clock goes backwards 999999 seconds way back 000000 seconds easy mash button repeatedly around direction pad right order accumulate mass winnings pachinko games cheat system hidden message famicom version found hex editor almost five percent entire rom 2.05 kilobytes 41 kilobyte rom image taken otherwise inaccessible message message written romaji features lengthy rant towards game executives harshly criticizing forcing changes fly particularly sound effects even showing replace initially intended sounds much shorter rant presumably written person also romaji accessed via hex editor included msx release
[]
Train
3,482
2
BrickOS:brickos brickos previously legos developed markus noga alternative operating system lego mindstorms rcx controller also provides c/c++ development environment rcx programs using gcc g++ gnu c c++ cross compilation tool chain necessary tools download programs rcx
[ 1522, 1435, 5571 ]
Validation
3,483
7
Cloud_broker:cloud broker cloud broker entity manages use performance delivery cloud services negotiates relationships cloud providers cloud consumers cloud computing evolves integration cloud services may complex cloud consumers manage alone cases cloud consumer may request cloud services cloud broker instead contacting cloud provider directly according nist cloud computing reference architecture cloud brokers provides single point entry manage multiple cloud services business technical purposes two important unique features cloud broker ability provide single consistent interface multiple differing cloud providers clear visibility broker allows company providing services background general cloud brokers provide services three categories benefits using cloud broker business technical purpose include following pay needed cloud brokers provide selected assortment services required consumer despite benefits cloud broker provide also concerns related use cloud broker
[ 2961 ]
Test
3,484
4
Arptables:arptables arptables computer software utility network administrator tool maintaining address resolution protocol arp packet filter rules linux kernel firewall modules tools may used create update view tables contain filtering rules similarly iptables program developed popular application creation filter configurations prevent arp spoofing linux kernel 2.4 offers two arp filtering chains input output linux kernel 2.6 adds third forward applied bridging packets
[ 1249, 3165, 4759, 806, 994, 3185, 4492, 4138, 385, 7536, 2746, 6107, 578, 3637, 8100, 3797, 3551, 1291, 7275, 7744, 3394, 6560, 4977, 7478, 3223, 4091, 2790, 6235, 6149, 6951, 7597, 875, 4208, 6962 ]
Test