node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,485
6
Scality:scality scality global company based san francisco california develops software-defined object storage scality scale-out object storage software platform called ring company commercial product scality ring software deploys industry-standard x86 servers store objects files scality also offers number open source tools called zenko including zenko cloudserver compatible amazon s3 api scality founded 2009 jérôme lecat giorgio regni daniel binsfeld serge dugas brad king scality raised 7 million venture capital funding march 2011 c-round 22 million announced june 2013 led menlo ventures iris capital participation fsn pme existing investors including idinvest partners omnes capital galileo partners scality raised 45 million august 2015 series funding led menlo ventures participation existing investors one new strategic investor broadband tower 2016 hpe made strategic investment company april 2018 company announced 60 million round funding scality announced refreshed brand along global distribution agreement hp october 2014 scality added dell cisco global resellers 2015 scality principal product scale-out object storage software platform known ring scality ring delivers petabyte-scale software-defined storage designed use commodity hardware characterized cost-effective scaling performance auto-recovery scality ring multitier architecture scale thousands servers 100 petabytes single global namespace allows customers deploy performance-optimized capacity-optimized storage varied data durability levels small large object file support single global namespace object storage one fastest growing segments enterprise storage market according idc report “ worldwide file – object – based storage forecast 2016 – 2020 ” idc us41685816 september 2016 estimated object-based storage capacity expected grow cagr 30.7 percent 2016 2020 reaching 293.7eb 2020.the scality ring software turns standard x86 servers web-scale storage ring store amount data type incredible efficiency 100 availability guaranteed—all reducing costs much 90 legacy systems zenko scality open source multi-cloud data controller zenko integrates data managed on-premises services available public clouds zenko cloudserver formerly scality s3 server amazon web services simple storage service-compatible open source object storage server code written node.js single instance running docker container uses docker volumes persistent storage cloudserver uses code scality ring s3 interface includes apache 2.0 license note distributed system paid version s3 enterprise however level compatibility s3 interface scality ring zenko orbit cloud-based portal data placement workflows global metadata search product enables asynchronous replication clouds scality recognized consistently years object-based storage idc gartner first magic quadrant distributed file systems object storage scality ranked leader scality 2014 storage system software finalist storage magazine 2017 scality ranked leader gartner magic quadrant distributed file systems object storage
[ 7838, 2763, 3764, 1254, 5064, 5859, 972 ]
Test
3,486
4
Security_hacker:security hacker security hacker someone explores methods breaching defenses exploiting weaknesses computer system network hackers may motivated multitude reasons profit protest information gathering challenge recreation evaluate system weaknesses assist formulating defenses potential hackers subculture evolved around hackers often referred computer underground longstanding controversy surrounds meaning term hacker controversy computer programmers reclaim term hacker arguing refers simply someone advanced understanding computers computer networks cracker appropriate term break computers whether computer criminals black hats computer security experts white hats 2014 article noted ... black-hat meaning still prevails among general public computer security hacker someone focuses security mechanisms computer network systems including endeavor strengthen mechanisms often used mass media popular culture refer seek access despite security measures media portrays 'hacker villain nevertheless parts subculture see aim correcting security problems use word positive sense white hat name given ethical computer hackers utilize hacking helpful way white hats becoming necessary part information security field operate code acknowledges breaking people computers bad discovering exploiting security mechanisms breaking computers still interesting activity done ethically legally accordingly term bears strong connotations favorable pejorative depending context subculture around hackers termed network hacker subculture hacker scene computer underground initially developed context phreaking 1960s microcomputer bbs scene 1980s implicated alt.2600 newsgroup 1980 article august issue psychology today commentary philip zimbardo used term hacker title hacker papers excerpt stanford bulletin board discussion addictive nature computer use 1982 film tron kevin flynn jeff bridges describes intentions break encom computer system saying 've little hacking clu software uses 1983 hacking sense breaking computer security already use computer jargon public awareness activities however release film wargames year featuring computer intrusion norad raised public belief computer security hackers especially teenagers could threat national security concern became real year gang teenage hackers milwaukee wisconsin known 414s broke computer systems throughout united states canada including los alamos national laboratory sloan-kettering cancer center security pacific bank case quickly grew media attention 17-year-old neal patrick emerged spokesman gang including cover story newsweek entitled beware hackers play patrick photograph cover newsweek article appears first use word hacker mainstream media pejorative sense pressured media coverage congressman dan glickman called investigation began work new laws computer hacking neal patrick testified u.s. house representatives september 26 1983 dangers computer hacking six bills concerning computer crime introduced house year result laws computer criminality white hat grey hat black hat hackers try distinguish depending legality activities moral conflicts expressed mentor hacker manifesto published 1986 phrack use term hacker meaning computer criminal also advanced title stalking wily hacker article clifford stoll may 1988 issue communications acm later year release robert tappan morris jr. so-called morris worm provoked popular media spread usage popularity stoll book cuckoo egg published one year later entrenched term public consciousness several subgroups computer underground different attitudes use different terms demarcate try exclude specific group agree eric s. raymond author new hacker dictionary advocates members computer underground called crackers yet people see hackers even try include views raymond see wider hacker culture view raymond harshly rejected instead hacker/cracker dichotomy emphasize spectrum different categories white hat grey hat black hat script kiddie contrast raymond usually reserve term cracker malicious activity according ralph d. clifford cracker cracking gain unauthorized access computer order commit another crime destroying information contained system subgroups may also defined legal status activities white hat hacker breaks security non-malicious reasons either test security system perform penetration tests vulnerability assessments client working security company makes security software term generally synonymous ethical hacker ec-council among others developed certifications courseware classes online training covering diverse arena ethical hacking black hat hacker hacker violates computer security little reason beyond maliciousness personal gain moore 2005 term coined richard stallman contrast maliciousness criminal hacker versus spirit playfulness exploration hacker culture ethos white hat hacker performs hacking duties identify places repair means legitimate employment black hat hackers form stereotypical illegal hacking groups often portrayed popular culture epitome public fears computer criminal grey hat hacker lies black hat white hat hacker grey hat hacker may surf internet hack computer system sole purpose notifying administrator system security defect example may offer correct defect fee grey hat hackers sometimes find defect system publish facts world instead group people even though grey hat hackers may necessarily perform hacking personal gain unauthorized access system considered illegal unethical social status among hackers elite used describe skilled newly discovered exploits circulate among hackers elite groups masters deception conferred kind credibility members script kiddie also known skid skiddie unskilled hacker breaks computer systems using automated tools written others usually black hat hackers hence term script i.e computer script automates hacking kiddie i.e kid child—an individual lacking knowledge experience immature usually little understanding underlying concept neophyte newbie noob someone new hacking phreaking almost knowledge experience workings technology hacking blue hat hacker someone outside computer security consulting firms used bug-test system prior launch looking exploits closed microsoft also uses term bluehat represent series security briefing events hacktivist hacker utilizes technology publicize social ideological religious political message hacktivism divided two main groups intelligence agencies cyberwarfare operatives nation states groups hackers carry organized criminal activities profit typical approach attack internet-connected system order several recurring tools trade techniques used computer criminals security experts security exploit prepared application takes advantage known weakness common examples security exploits sql injection cross-site scripting cross-site request forgery abuse security holes may result substandard programming practice exploits would able used file transfer protocol ftp hypertext transfer protocol http php ssh telnet web pages common web site web domain hacking tools procedures computer underground produced specialized slang 1337speak members often advocate freedom information strongly opposing principles copyright well rights free speech privacy writing software performing activities support views referred hacktivism consider illegal cracking ethically justified goals common form website defacement computer underground frequently compared wild west common hackers use aliases conceal identities computer underground supported regular real-world gatherings called hacker conventions hacker cons events include summercon summer def con hohocon christmas shmoocon february blackhat chaos communication congress athcon hacker halted hope local hackfest groups organize compete develop skills send team prominent convention compete group pentesting exploit forensics larger scale hacker groups became popular early 1980s providing access hacking information resources place learn members computer bulletin board systems bbss utopias provided platforms information-sharing via dial-up modem hackers could also gain credibility affiliated elite groups maximum imprisonment one year fine fourth category commonly known computer fraud abuse act prohibits unauthorized access damage protected computers protected computers defined maximum imprisonment fine violations computer fraud abuse act depends severity violation offender history violations act notable hacker-oriented print publications phrack hakin9 information contained hacker magazines ezines often outdated time published enhanced contributors reputations documenting successes hackers often show interest fictional cyberpunk cyberculture literature movies adoption fictional pseudonyms symbols values metaphors works common
[ 6412, 3932, 1448, 2912, 2192, 6424, 5375, 6430, 2560, 1461, 5381, 2566, 6107, 7185, 4699, 5401, 5051, 744, 6823, 2944, 1863, 5766, 1872, 7927, 5071, 4729, 6140, 7214, 74, 4371, 782, 1512, 84, 6155, 1903, 2622, 3680, 3681, 5798, 6873, 96...
Test
3,487
7
Wercker:wercker wercker docker-based continuous delivery platform helps software developers build deploy applications microservices using command-line interface developers create docker containers desktop automate build deploy processes testing desktop deploy various cloud platforms ranging heroku aws rackspace command-line interface wercker open-sourced business behind wercker also called wercker founded 2012 acquired oracle corporation 2017 wercker targets companies developers focus web applications acts middleman source-code hosting repositories like github cloud servers like amazon web services time developer makes change codebase git wercker retrieves code builds version inside container isolate tests errors notifies user either passed failed wercker integrated docker containers package application code easily moved server server build artifact docker container user take container docker hub private registry build code shipping saas platform enables developers test deploy code often push software updates incrementally ready rather bundled dumps makes easier coders practice continuous integration software engineering practice change developer makes codebase constantly tested process software ’ break goes live wercker based concept pipelines automated workflows pipelines take pieces code automatically execute series steps upon code wercker api provides programmatic access information applications builds deploys code snippets available golang node.js python service includes social networking element providing facebook-like wall team members know colleagues creates high degree transparency needed ever numerous groups work across different countries projects wercker currently available cloud services though wercker working enterprise offering allow on-premises use well hernandez van leuffen came wercker ’ underlying technology thesis project containers automatic resource provisioning university san francisco nexuslabs foundation based amsterdam mit helped wercker attract venture capital united states january 2013 wercker received seed investment a-list group investors round led shamrock ventures additional support greylock venture partners amsterdam-based micro vc vitulum ventures company executives reveal amount funding received wercker allegedly raised close 1 million wercker part 2012 startup incubator program rockstart accelerator amsterdam participated mozilla webfwd program salesforce innovation challenge also gigaom structure europe launchpad competition receiving people ’ choice judge ’ awards startup brought former co-founder openstack andy smith cto september 2014 month later wercker brought 2.4 million bringing total funding 3.2 million notion capital drove investment round along tola capital vitulum ventures shamrock ventures rockstart accelerator wercker originally focused lxc containers converted platform run ever popular docker containers late 2014 launched local development model enabling developers build deploy containerized applications entrepreneur included wercker among 9 essential tools agile product development teams july 2015 december atlassian launched wercker integration git-based bitbucket service called wercker yaml viewer january 2016 wercker announced 4.5 million series investment round led inkef capital participation notion capital bringing company ’ total funding 7.5 million first time inkef capital one largest vc funds netherlands invested developer tool wercker announced would use investment drive developer adoption expand enterprise market deepen automation capabilities flexible complex development pipelines april 17 2017 oracle announced signed definitive agreement acquire wercker
[ 2961, 5965, 2700, 2988, 5927, 5064, 330, 7848, 7756, 993 ]
Validation
3,488
9
Java_API_for_XML_Registries:java api xml registries java api xml registries jaxr defines standard api java platform applications access programmatically interact various kinds metadata registries jaxr one java xml programming apis jaxr api developed java community process jsr 93 jaxr provides uniform standard java api accessing different kinds xml-based metadata registry current implementations jaxr support ebxml registry version 2.0 uddi version 2.0 registries could defined future jaxr provides api clients interact xml registries service provider interface spi registry providers plug registry implementations jaxr api insulates application code underlying registry mechanism writing jaxr based client browse populate registry code change registry changes instance uddi ebxml
[ 2371, 7347, 6986, 4422, 1479, 2126, 2322, 2517, 773, 2519, 2799 ]
Test
3,489
2
Anaconda_(installer):anaconda installer anaconda free open-source system installer linux distributions anaconda used red hat enterprise linux oracle linux scientific linux centos qubes os fedora sabayon linux blag linux gnu also less known discontinued distros like progeny componentized linux based debian founded ian murdock asianux foresight linux rpath linux vidalinux based gentoo anaconda offers text-mode gui mode users install wide range systems designed easily portable supports wide range hardware platforms ia-32 itanium dec alpha ibm esa/390 powerpc armv8 supports installing local storage devices like cd-rom drives harddisks well network resources via ftp http nfs installations automated use kickstart file automatically configures installation allowing users run minimal supervision starting os installation process installer checks system hardware resource requirements requirements satisfied start installation process mainly written python modules written c. graphical frontend based gtk+ 3/pygobject designed glade interface designer anaconda also custom text frontend support computers line printer like terminals ibm esa/390 mainframes
[ 3849, 2104, 5571, 578, 7092, 2226, 3036, 3042, 5956, 3998, 5965, 6586, 8149, 1435, 2536, 7787 ]
Test
3,490
4
Strong_authentication:strong authentication strong authentication notion several definitions strong authentication often confused two-factor authentication generally multi-factor authentication however strong authentication necessarily multi-factor authentication soliciting multiple answers challenge questions may considered strong authentication unless process also retrieves 'something 'something would considered multi-factor authentication ffiec issued supplemental guidance subject august 2006 clarified definition true multifactor authentication requires use solutions two three categories factors using multiple solutions category ... would constitute multifactor authentication another commonly found class definitions relates cryptographic process precisely authentication based challenge response protocol type definition found handbook applied cryptography type definition necessarily relate two-factor authentication since secret key used challenge-response authentication scheme simply derived password one factor third class definitions says strong authentication form authentication verification accomplished without transmission password case example definition found fermilab documentation fourth class legal standing within european economic area strong customer authentication fast identity online fido alliance striving establish technical specifications strong authentication 250 members 150 certified products thus term strong authentication used long notion strong defined context use
[ 8131, 3794, 2319, 4346, 3767, 7865, 4333, 4133, 3227 ]
Test
3,491
2
DX10:dx10 dx10 general purpose multitasking operating system designed operate texas instruments 990/10 990/10a 990/12 minicomputers using memory mapping feature dx10 versatile disk-based operating system capable supporting wide range commercial industrial applications dx10 also multiterminal system capable making several users appear exclusive control system dx10 international operating system designed meet commercial requirements united states european countries japan dx10 supported several models video display terminals vdts permit users enter view process data language dx10 required basic hardware configuration allows additional members extensive group peripherals included configuration system generation could configure dx10 support peripheral devices members 990 family devices require realtime support capability required also provide software control devices communicated dx10 easily system command interpreter sci sci designed provide simple convenient interaction user dx10 conversational format sci access complete control dx10 sci flexible mode communication sci convenient interactive communication data terminal sci accessed batch mode well dx10 capable extensive file management built-in file structures include key indexed files relative record files sequential files group file control utilities exists copying modifying files controlling file parameters dx10 offers number features provide convenient use system's capabilities
[ 1522, 5948, 5571, 7021, 2803, 336 ]
Test
3,492
8
Sportradar:sportradar sportradar ag multinational corporation headquarters st. gallen switzerland collects analyzes sports data sportradar provides services bookmakers national international sports federations media companies january 2016 company 35 offices 24 countries around world including trondheim london ljubljana sportradar products includes live results statistics white-label sports content solutions brand betradar sportradar operates suite tools bookmakers including in-game pre-match odds suggestions resulting market monitoring trading services us subsidiary sportradar us sportradar official data provider us sports federations nfl nhl nascar end 2015 sportradar renewed partnership international tennis federation official data collection service partner 2016 sportradar entered partnership nba third partnership big four since 2005 company partnership german football association detect fraud match fixing system later developed launched fraud detection system addition detection fraud sportradar organizes integrity workshops together federations major league soccer serie international ice hockey federation workshops teach clubs players betting market works different forms match fixing match manipulation detected sportradar started market monitor founded 2000 trondheim norway petter fornæss tore steinkjer market monitor provided services online bookmakers based crawler technology developed part thesis norwegian university science technology market monitor together austrian german partners created product betradar.com 2001 betradar.com provides set reporting monitoring tools online betting markets carsten koerl joined market monitor major investor obtaining 51 shares 2007 sportradar ag founded owners market monitor served parent company various companies group market monitor renamed sportradar became subsidiary sportradar ag 2012 sportradar acquired slovenian development company klika later year eqt acquired minority stake investing 44 million euro company sportradar expansions continued 2013 sportradar became majority shareholder usk-based sportstat sportstat official data collection partner http //www.insidermedia.com/insider/wales/87716-sportstat-merges-swiss-business/ 2013 sportradar also advanced us market acquiring sportsdata sportradar us eqt reinvested sportradar 2014 eqt flagship fund buying shares eqt capital expansion ii 2015 sportradar obtained exclusive distribution rights nascar nfl nhl year sportradar attracted investments michael jordan mark cuban led revolution llc national football league also acquired equity sportradar us part partnership 2016 sportradar acquired core business sportman media holding including laola1.at laola1.tv later year nba announced multi-year partnership sportradar involving integrity services data distribution video streaming sportradar provides federations law enforcement agencies system detecting betting related match fixing services operated sportradar security services division headquarters london england sportradar sport integrity services began early warning system developed 2005 following hoyzer scandal use system one measures bundesliga took prevention match fixing system developed include live monitoring relaunched 2009 fraud detection system fds development fds done cooperation uefa partnership sportradar monitors suspicious matches two top leagues every uefa member nation fds since expanded partnerships sports federations including concacaf fiba esl ioc sportradar also signed agreements several law enforcement agencies notably europol australian federal police fraud detection system works comparing odds movement patterns online bookmakers expected odds movement patterns given match suspicious matches found analyzed reported relevant federation federation start investigations 2015 fraud detection system monitors 65 000 matches across 11 sports half soccer daily system receives roughly 5 billion odds adjustments around 450 different bookmakers since launch fraud detection system sportradar involved several notable match fixing cases nepal scandal 2015 austrian case including sanel kuljić 2013 australian match fixing case 2013 system indicated since 2009 2000 events likely manipulated addition sportradar provides workshops clubs federations educate consequences match fixing sportradar sports distribution covers 325 000 sport events feeds clients like google fox sports sportradar also provides data facebook sports stadium brand betradar sportradar provides bookmakers number sports betting services 2015 sportradar partnered roughly 450 bookmakers including bet365 william hill paddy power ladbrokes sportradar services also used state lotteries veikkaus svenska spel norsk tipping sportradar create odds thousands games across 40 sports odds created feeding sports data collected sportradar mathematical models in-game betting odds requires continuous recalculation outcomes using live data sportradar collects acquires licenses odds sold odds suggestions bookmakers matches bookmakers unable create odds similarly sportradar provides information bookmakers matches start finish allow money placed matches finished subset sportradar collected data goes extensive quality assurance process specialised bet clearing sportradar also provides market monitoring allows bookmakers compare odds rest market bookmakers provide odds make use service thus making odds part comparison bookmakers service allows bookmakers ensure unwanted surebet situation august 12 2019 sportradar extended relationship national football league become exclusive provider official league data sports betting operators united states internationally jurisdictions betting legal regulated sportradar also use integrity services monitor betting nfl games right distribute live audiovisual feeds nfl games sportsbooks select international markets sportradar partnered several sports federations collect distribute sports data handball-bundesliga sportradar collects distributes official data itf umpire enters data directly sportradar systems nhl sportradar ingests redistributes data coming nhl tracking system partnerships us federations nascar nhl nfl handled us subsidiary sportradar us partly order avoid conflict interest federation sportradar involvement betting industry distribution partnerships also include creating official web mobile solutions well rights stream video content partnerships one esl include using data expand sportradar betting services deal signed october 2015 sportradar provide football association malaysia platform managing federation platform federation manage things schedules leagues personnel players referees tool also provides means collecting live data distributed teams partners visualised various web solutions
[ 80, 3492 ]
Test
3,493
3
Exec_(system_call):exec system call computing exec functionality operating system runs executable file context already existing process replacing previous executable act also referred overlay especially important unix-like systems although operating systems implement well since new process created original process identifier pid change machine code data heap stack process replaced new program exec call supported many programming languages including compilable languages scripting languages os command interpreters built-in command replaces shell process specified program interfaces exec implementations vary depending programming language may accessible via one functions depending operating system may represented one actual system calls reason exec sometimes described collection functions standard names functions c see exec linux kernel one corresponding system call named execve whereas aforementioned functions user-space wrappers around higher-level languages usually provide one call named posix standard declares exec functions header file c language functions declared dos see os/2 microsoft windows implementations provide functions named leading underscore e.g _execl base exec execute followed one letters calls new process image inherits current environment variables file descriptor open exec call made remain open new process image unless marked codice_2 codice_3 opened codice_4 latter introduced posix.1-2001 aspect used specify standard streams stdin stdout stderr new program successful overlay destroys previous memory address space process memory areas shared reclaimed operating system consequently data passed new program otherwise saved become lost successful exec replaces current process image return anything program made call processes exit status exec-ing termination process continues exist exec function return calling program error occurred case return value −1 errno set one following values linux kernel may destroy memory map old process start constructing loading new executable discover new executable ca n't loaded example fields executable internal tables contain invalid values case process killed fatal signal sigsegv ideally kernel would fail codice_5 return error indication old executable would significantly complex slower dos multitasking operating system replacing previous executable image great merit due harsh primary memory limitations lack virtual memory api used overlaying programs dos effects similar ones posix systems ms-dos exec functions always load new program memory maximum allocation program executable file header set default value 0xffff exehdr utility used change maximum allocation field program however done program invoked one exec functions program might behave differently program invoked directly operating-system command line one spawn functions see many unix shells also offer builtin command replaces shell process specified program wrapper scripts often use command run program either directly interpreter virtual machine setting environment variables configuration using exec resources used shell program need stay use program started command also perform redirection shells passing arguments means use command redirection without making actual overlay traditional unix system functionality create new process running new executable program one step explains importance exec unix programming systems may use spawn main tool running executables result equivalent fork-exec sequence unix-like systems posix supports posix_spawn routines optional extension usually implemented using vfork os/360 successors include system call xctl transfer control performs similar function exec except type 4 svc usage rare common use link attach invoke load module without terminating current load module particular tso invokes commands attach sharing memory
[ 7246, 8066, 4771, 1361, 5480, 7260, 5571, 1435, 6380, 7570, 5190, 3323, 4539, 607, 3417, 6497, 6778, 2164, 5537, 2084 ]
Test
3,494
4
Authenticated_Received_Chain:authenticated received chain authenticated received chain arc email authentication system designed allow intermediate mail server like mailing list forwarding service sign email original authentication results allows receiving service validate email email spf dkim records rendered invalid intermediate server processing arc defined rfc 8617 published july 2019 experimental dmarc allows sender domain indicate emails protected spf and/or dkim tells receiving service neither authentication methods passes reject message however strict dmarc policy may block legitimate emails sent mailing list forwarder spf check fail due unapproved sender dkim signature invalidated message modified adding subject tag footer arc helps solve problem giving intermediate servers way sign original message validation results even spf dkim validation fail receiving service choose validate arc arc indicates original message passed spf dkim checks modifications made intermediaries trusted receiving service receiving service may choose accept email arc defines three new mail headers sign modification intermediate server performs following steps validate arc recipient performs following steps
[ 3379, 5673 ]
Validation
3,495
2
Sandbox_(computer_security):sandbox computer security computer security sandbox security mechanism separating running programs usually effort mitigate system failures software vulnerabilities spreading often used execute untested untrusted programs code possibly unverified untrusted third parties suppliers users websites without risking harm host machine operating system sandbox typically provides tightly controlled set resources guest programs run scratch space disk memory network access ability inspect host system read input devices usually disallowed heavily restricted sense providing highly controlled environment sandboxes may seen specific example virtualization sandboxing frequently used test unverified programs may contain virus malicious code without allowing software harm host device sandbox implemented executing software restricted operating system environment thus controlling resources example file descriptors memory file system space etc process may use examples sandbox implementations include following use cases sandboxes include following
[ 6427, 2198, 7532, 385, 2577, 5401, 3978, 1805, 1123, 7938, 5781, 6858, 6515, 5461, 6167, 4762, 7247, 7619, 5814, 4771, 3366, 120, 5482, 123, 508, 2327, 163, 4477, 4492, 3781, 6991, 3457, 7359, 5571, 930, 5591, 237, 3135, 5956, 2791, 208...
Test
3,496
3
Blagger_(video_game):blagger video game blagger platform game created antony crowther commodore 64 released alligata 1983 bbc micro port released year acorn electron amstrad cpc amsoft msx 1984 commodore 16 plus/4 1985 countries game released name gangster gameplay similar manic miner also released 1983 sequel son blagger released 1984 third final title blagger goes hollywood released 1985 game divided series single-screen levels goal player screen manipulate blagger burglar collect scattered keys reach safe keys must collected safe opened set amount time blagger walk either left right jump left right jumping action fixed pattern altered initiated gameplay reduces learning best order collect keys correct timing movements jumping platforms solid decay blagger walked platforms serve move blagger particular direction blagger die touches cacti one moving enemy obstacles level falls certain distance moving enemies vary level level include cars aliens mad hatters giant mouths movement enemies fixed pattern repeatedly travelling one point another back bbc electron versions feature floating rg hazards r.g initials programmer versions r.s goodley
[ 6491 ]
Test
3,497
4
Message_forgery:message forgery cryptography message forgery sending message deceive recipient real sender common example sending spam prank e-mail originated address one really used
[]
Test
3,498
8
OASIS_(organization):oasis organization organization advancement structured information standards oasis global nonprofit consortium works development convergence adoption open standards security internet things energy content technologies emergency management areas oasis founded name sgml open 1993 began trade association sgml tool vendors cooperatively promote adoption standard generalized markup language sgml mainly educational activities though amount technical activity also pursued including update cals table model specification specifications fragment interchange entity management 1998 movement high tech industry xml sgml open changed emphasis sgml xml changed name oasis open inclusive xml reflect expanded scope technical work standards focus consortium activities also moved promoting adoption xml getting lots attention developing technical specifications july 2000 new technical committee process approved adoption process manner technical committees created operated progressed work regularized adoption process five technical committees 2004 nearly 70 1999 oasis approached un/cefact committee united nations dealing standards business jointly develop new set specifications electronic business joint initiative called ebxml first met november 1999 chartered three-year period final meeting original charter vienna un/cefact oasis agreed divide remaining work two organizations coordinate completion work coordinating committee 2004 oasis submitted completed ebxml specifications iso tc154 approved iso 15000 consortium headquarters burlington massachusetts shared companies september 4 2014 consortium moved 25 corporate drive suite 103 35 corporate dr suite 150 still loop route following standards development oasis technical committees adhesion consortium requires fees paid must renewed annually depending membership category adherents want access among adherents members american bar association collabora dell eclecticiq general motors ibm iso/iec kde e.v. microsoft novell oracle redhat document foundation universities government agencies individuals employees less-known companies like many bodies producing open standards e.g ecma oasis added reasonable non-discriminatory licensing rand clause policy february 2005 amendment required participants disclose intent apply software patents technologies consideration standard contrary w3c requires participants offer royalty-free licenses anyone using resulting standard oasis offers similar royalty free limited terms mode along royalty free rand terms mode rand reasonable non-discriminatory mode committees compared w3c oasis less restrictive regarding obligation companies grant royalty-free license patents controversy rapidly arisen licensing added silently allows publication standards could require licensing fee payments patent holders situation could effectively eliminate possibility free/open source implementations standards contributors could initially offer royalty-free use patent later imposing per-unit fees standard accepted april 11 2005 new york times reported ibm committed free patents oasis group larry rosen software law expert leader reaction rose oasis quietly included rand clause policy welcomed initiative supposed oasis continue using policy companies involved would follow history proved wrong rand policy still removed commercial companies published free statement towards oasis patrick gannon president ceo oasis 2001 2008 minimized risk company could take advantage standard request royalties established option nobody uses harm sam hiser former marketing lead defunct openoffice.org explained patents towards open standard counterproductive inappropriate also argued ibm microsoft shifting standardization efforts w3c oasis way leverage probably patents portfolio future hiser also attributed rand change oasis policy microsoft rand term could indeed theoretically allow company involved leverage patent future amendment probably added way attract companies consortium encourage contributions potential participants big actors like microsoft could indeed applied pressure made sine-qua-non condition access consortium possibly jeopardize/boycott standard clause present doug mahugh — working microsoft promoter office open xml microsoft document format competing oasis iso/iec 26300 i.e odf v1.0 senior product manager specializing office client interoperability — claimed many countries expressed frustration pace oasis responses defect reports submitted iso/iec 26300 inability sc 34 members participate maintenance odf however rob weir co-chair oasis odf technical committee noted time odf tc received zero defect reports iso/iec national body japan added submitter original japanese defect report murata mokoto satisfied preparation errata also self-published blog post blaming microsoft involving people improve modify accuracy odf openxml wikipedia articles trying make odf sound risky adopt
[ 2185, 4766, 6521, 5111, 4770, 6986, 302, 3794, 6112, 3802, 1760, 5149, 5445, 7565, 4436, 3813, 59, 1409, 245, 2877, 4445, 5251, 345, 4192, 2610, 6586, 7315, 4203, 972 ]
Test
3,499
9
Program_transformation:program transformation program transformation operation takes computer program generates another program many cases transformed program required semantically equivalent original relative particular formal semantics fewer cases transformations result programs semantically differ original predictable ways transformations performed manually often practical use program transformation system applies specifications required transformations program transformations may specified automated procedures modify compiler data structures e.g abstract syntax trees representing program text may specified conveniently using patterns templates representing parameterized source code fragments practical requirement source code transformation systems able effectively process programs written programming language usually requires integration full front-end programming language interest including source code parsing building internal program representations code structures meaning program symbols useful static analyses regeneration valid source code transformed program representations problem building integrating adequate front ends conventional languages java c++ php etc may equal difficulty building program transformation system complexity languages widely useful transformation system must able handle many target programming languages must provide means specifying front ends generalisation semantic equivalence notion program refinement one program refinement another terminates initial states original program terminates state guaranteed terminate possible final state original program words refinement program defined deterministic original program two programs refinements programs equivalent
[ 7515, 2460, 1170, 2387, 646, 1853, 2311, 6029, 6118, 1662, 7474, 3895, 1584, 5429, 7680, 7305, 2073 ]
Validation
3,500
9
Bill_Gosper:bill gosper ralph william gosper jr. born april 26 1943 known bill gosper american mathematician programmer along richard greenblatt may considered founded hacker community holds place pride lisp community high school gosper interested model rockets one friends injured rocketry accident contracted fatal brain infection gosper enrolled mit 1961 received bachelor degree mathematics mit 1965 despite becoming disaffected mathematics department anti-computer attitude second year mit gosper took programming course john mccarthy became affiliated mit ai lab contributions computational mathematics include hakmem mit maclisp system made major contributions macsyma project mac computer algebra system gosper later worked symbolics macsyma inc. commercial versions macsyma 1974 moved stanford university lectured worked donald knuth since time worked consulted xerox parc symbolics wolfram research lawrence livermore laboratory macsyma inc became intensely interested game life shortly john horton conway proposed conway conjectured existence infinitely growing patterns offered reward example gosper first find pattern glider gun prize gosper also originator hashlife algorithm speed computation life patterns many orders magnitude gosper created numerous packing problem puzzles twubblesome twelve gosper first person realize possibilities symbolic computation computer mathematics research tool whereas computer methods previously limited purely numerical methods particular research resulted work continued fraction representations real numbers gosper algorithm finding closed form hypergeometric identities 1985 gosper briefly held world record computing digits pi 17 million digits see chronology computation π
[ 3749, 1494, 685 ]
Test
3,501
6
VMware_VMFS:vmware vmfs vmware vmfs virtual machine file system vmware inc. clustered file system used company flagship server virtualization suite vsphere developed store virtual machine disk images including snapshots multiple servers read/write filesystem simultaneously individual virtual machine files locked vmfs volumes logically grown non-destructively increased size spanning multiple vmfs volumes together five plus one vsan versions vmfs corresponding esx/esxi server product releases java open source vmfs driver enables read-only access files folders partitions formatted virtual machine file system vmfs developed maintained fluid operations ag allows features like offloaded backups virtual machines hosted vmware esxi hosts vmfsv3 based fluidops code vmfs-tools evolved add vmfs features supports read vmfs mounts standard linux vfs fuse framework developed christophe fillot mike hommey available source code download glandium.org vmfs-tools page debian vmfs-tools ubuntu vmfs-tools packages
[ 4406, 4295, 1624, 346, 5571, 576, 578, 5865 ]
Test
3,502
9
DYNAMO_(programming_language):dynamo programming language dynamo dynamic models historically important simulation language accompanying graphical notation developed within system dynamics analytical framework originally industrial dynamics soon extended applications including population resource studies urban planning dynamo initially developed direction jay wright forrester late 1950s dr. phyllis fox alexander l. pugh iii grace duren others m.i.t computation center dynamo used system dynamics simulations global resource-depletion reported club rome limits growth since fallen disuse 1958 forrester unwittingly instigated dynamo development asked mit staff programmer compute needed solutions equations harvard business review paper writing industrial dynamics programmer richard bennett chose implement system simple simulation industrial management problems lots equations took coded equations symbolic input computed solutions simple became proof-of-concept dynamo rather specialist programmer hard-code special-purpose solver general purpose programming language users could specify system equations special simulation language get simulation output one program execution dynamo designed emphasize following among ways dynamo standard time featured units checking numerical types relatively clear error messages earliest versions written assembly language ibm 704 ibm 709 ibm 7090 dynamo ii written aed-0 extended version algol 60 dynamo ii/f 1971 generated portable fortran code dynamo ii/f dynamo iii improved system portability written fortran originally designed batch processing mainframe computers made available minicomputers late 1970s became available micro-dynamo personal computers early 1980s language went several revisions dynamo ii dynamo iv 1983 apart indirectly felt public impact environmental issues raised controversy limits growth dynamo influential history discrete-event simulation even though essentially package continuous simulation specified difference equations said opened opportunities computer modelling even users relatively low mathematical sophistication hand also criticized weak precisely mathematical sophistication required relying euler integration
[ 4033, 2416, 336 ]
Test
3,503
9
Revolution_(software_platform):revolution software platform revolution software development environment/multimedia authoring software tradition hypercard based metacard engine primary focus providing relatively accessible development tool set scripting language enable creation software programs run across multiple platforms little code modifications integrated development environment ide included revolution built partly models created bill atkinson original hypercard team apple subsequently followed many software development products microsoft visual basic revolution includes english language-like scripting language called transcript full programming language superset hypercard scripting language hypertalk higher-grade versions see versions allow applications compiled run one platform including macintosh classic mac os 9 mac os x windows unix-like systems including linux also import hypercard stacks require little modification unless use external functions generally work revolution revolution designed environment non-programmers feel ease programmers feel uncomfortable getting used non-traditional programming syntax like programming language development environment opinions degree aims achieved vary greatly revolution 2 starter kit version available freeware imposed restrictions user allowing scripts longer ten lines compiled however since discontinued longer available download dreamcard version intended home users/hobbyists applications called stacks built using require either dreamcard player full copy revolution run dreamcard include revolution compiler studio version powerful useful creating professional binary applications enterprise version probably expensive casual users compared similar products borland delphi kylix priced competitively one wishes develop programs non-microsoft platforms cross-platform deployment revolution one small handful commercially supported options revolution derived metacard engine metacard stacks 100 compatible revolution however way around necessarily true hypercard stacks run externals run macs supercard stacks must run converter upgraded revolution/metacard format revolution runs mac classic mac os x windows 9x/nt/2000/xp following unix variants standalone applications written revolution run well windows 3.1 limitations march 2005 dreamcard player runs windows mac os classic x linux linux user gnome/xfce/gtk+ theme used gtk+ installed otherwise motif look used mac appearance manager used available otherwise platinum look used windows xp theme standard widgets used users preview motif platinum windows appearance platform many companies groups use revolution engine mainly used freelance programmers make small widgets libraries one example used exclusively christa mcauliffe space education center
[ 3838, 7010, 1069, 3169, 3412, 961, 4759, 352, 578, 900, 971 ]
Test
3,504
4
VLAN_hopping:vlan hopping vlan hopping computer security exploit method attacking networked resources virtual lan vlan basic concept behind vlan hopping attacks attacking host vlan gain access traffic vlans would normally accessible two primary methods vlan hopping switch spoofing double tagging attack vectors mitigated proper switch port configuration switch spoofing attack attacking host imitates trunking switch speaking tagging trunking protocols e.g multiple vlan registration protocol ieee 802.1q dynamic trunking protocol used maintaining vlan traffic multiple vlans accessible attacking host switch spoofing exploited interfaces set negotiate trunk prevent attack cisco ios use one following methods 1 ensure ports set negotiate trunks automatically disabling dtp 2 ensure ports meant trunks explicitly configured access ports double tagging attack attacker connected 802.1q-enabled port prepends two vlan tags frame transmits frame externally tagged vlan id attacker port really member forwarded without first tag native vlan trunk interface second tag visible second switch frame encounters second vlan tag indicates frame destined target host second switch frame sent target host though originated target vlan effectively bypassing network mechanisms logically isolate vlans one another however possible replies forwarded attacking host unidirectional flow double tagging exploited switch ports configured use native vlans trunk ports configured native vlan n't apply vlan tag sending frames allows attacker fake vlan tag read next switch double tagging mitigated following actions incl ios example example double tagging attack consider secure web server vlan called vlan2 hosts vlan2 allowed access web server hosts outside vlan2 blocked layer 3 filters attacking host separate vlan called vlan1 native creates specially formed packet attack web server places header tagging packet belonging vlan2 header tagging packet belonging vlan1 packet sent switch sees default vlan1 header removes forwards packet next switch sees vlan2 header puts packet vlan2 packet thus arrives target server though sent another host vlan2 ignoring layer 3 filtering might place
[ 7623, 651 ]
Validation
3,505
5
Binkp:binkp binkp protocol transferring fidonet wwivnet mail reliable connections typically used deliver mail internet instead point-to-point connections modems historically fidonet traffic transferred mainly serial rs-232 modem connections might error correction layer dial-up-oriented protocols transferring fidonet traffic like emsi zmodem implement error-recovery members fidonet started use tcp/ip transfer fidonet traffic error-recovery overhead became unnecessary assuming connection reliable makes possible eliminate error-checking unnecessary synchronization steps achieving ease implementation improved performance major advantage binkp vs emsi zmodem achieved connections large delays low bandwidth iana internet assigned numbers authority registered port number 24554 binkp used tcp/ip connections
[ 768 ]
Train
3,506
4
AV-Comparatives:av-comparatives av-comparatives austrian independent organization tests assesses antivirus software regularly releasing charts reports freely available public media antivirus vendors meet various requirements regarding trustworthiness reliability order take part tests av-comparatives issues relevant awards based antivirus software comprehensive performance according multiple testing criteria also supported university innsbruck academic bodies around world well austrian federal government regional government tirol av-comparatives real world protection test test environment closely approximates well antivirus product protect real-world users test results released monthly march june august november two detailed overall result reports released june december real world protection test framework recognized “ standortagentur tirol ” 2012 cluster award innovation computer science 2018 av-comparatives started large scale enterprise security software test series consisting real-world test false alarm test malware protection test performance test well review av-comparatives provided undroid apk analyzer free service website users since may 2013 designed android smartphone users provides static analysis android apps users upload android application package apk receive quick online analysis containing file hashes graphical danger level additional information
[ 3551, 142, 25, 4689, 4759, 5925, 6232, 6777, 7478, 578 ]
Test
3,507
2
Google_Assistant:google assistant google assistant artificial intelligence-powered virtual assistant developed google primarily available mobile smart home devices unlike company previous virtual assistant google google assistant engage two-way conversations assistant initially debuted may 2016 part google messaging app allo voice-activated speaker google home period exclusivity pixel pixel xl smartphones began deployed android devices february 2017 including third-party smartphones android wear wear os released standalone app ios operating system may 2017 alongside announcement software development kit april 2017 assistant extended support large variety devices including cars third party smart home appliances functionality assistant also enhanced third-party developers 2017 google assistant installed 400 million devices users primarily interact google assistant natural voice though keyboard input also supported nature manner google assistant able search internet schedule events alarms adjust hardware settings user device show information user google account google also announced assistant able identify objects gather visual information device camera support purchasing products sending money well identifying songs ces 2018 first assistant-powered smart displays smart speakers video screens announced first one released july 2018 google assistant unveiled google developer conference may 18 2016 part unveiling google home smart speaker new messaging app allo google ceo sundar pichai explained assistant designed conversational two-way experience ambient experience extends across devices later month google assigned google doodle leader ryan germick hired former pixar animator emma coats develop little personality system-level integration outside allo app google home google assistant initially exclusive pixel pixel xl smartphones february 2017 google announced begun enable access assistant android smartphones running android marshmallow nougat beginning select english-speaking markets android tablets receive assistant part rollout assistant also integrated android wear 2.0 included future versions android tv android auto october 2017 google pixelbook became first laptop include google assistant google assistant later came google pixel buds december 2017 google announced assistant would released phones running android lollipop update google play services well tablets running 6.0 marshmallow 7.0 nougat february 2019 google reportedly began testing ads google assistant results may 15 2017 android police reported google assistant would coming ios operating system separate app information confirmed two days later google developer conference january 2018 consumer electronics show first assistant-powered smart displays released smart displays shown event lenovo sony jbl lg devices support google duo video calls youtube videos google maps directions google calendar agenda viewing smart camera footage addition services work google home devices devices based android things google-developed software google unveiled smart display google home hub october 2018 utilizes different system platform december 2016 google launched actions google developer platform google assistant actions google allows 3rd party developers build apps google assistant march 2017 google added new tools developing actions google support creation games google assistant originally limited google home smart speaker actions google made available android ios devices may 2017 time google also introduced app directory overview compatible products services incentivize developers build actions google announced competition first place tickets google 2018 developer conference 10,000 walk-through google campus second place third place received 7,500 5,000 respectively google home april 2017 software development kit sdk released allowing third-party developers build hardware run google assistant integrated raspberry pi cars audi volvo smart home appliances including fridges washers ovens companies including irobot lg general electric d-link google updated sdk december 2017 add several features google home smart speakers google assistant smartphone apps previously supported features include may 2 2018 google announced new program blog focuses investing future google assistant early-stage startups focus build environment developers could build richer experiences users includes startups broaden assistant features building new hardware devices simply differentiating different industries google assistant nature manner google search internet schedule events alarms adjust hardware settings user device show information user google account unlike google however assistant engage two-way conversation using google natural language processing algorithm search results presented card format users tap open page february 2017 google announced users google home would able shop entirely voice products google express shopping service products available whole foods market costco walgreens petsmart bed bath beyond launch retailers added following months new partnerships formed google assistant maintain shopping list previously done within notetaking service google keep feature moved google express google home app april 2017 resulting severe loss functionality may 2017 google announced assistant would support keyboard typed input visual responses support identifying objects gather visual information device camera support purchasing products sending money use keyboard users see history queries made google assistant edit delete previous inputs assistant warns deleting however due use previous inputs generate better answers future november 2017 became possible identify songs currently playing asking assistant.. google assistant allows users activate modify vocal shortcut commands order perform actions device android ipad/iphone configuring hub home automation feature speech recognition available english among languages july 2018 google home version assistant gained support multiple actions triggered single vocal shortcut command annual i/o developers conference may 8 2018 google seo announced addition six new voice options google assistant one john legend made possible wavenet voice synthesizer developed deepmind significantly reduced amount audio samples voice actor required produce creating voice model august 2018 google added bilingual capabilities google assistant existing supported languages devices recent reports say may support multilingual support setting third default language android phone default option google assistant n't support two common features speech recognition transcribed texts like punctuation spelling however beta feature speech-to-text enables en-us language users ask detect insert punctuation transcription results speech-to-text recognize commas question marks periods transcription requests april 2019 popular audio games assistant crystal ball lucky trivia biggest voice change software history voice assistant able add expression games instance crystal ball game voice would speak slow soft intro answer revealed make game excitable lucky trivia game voice would become excitable like game show host british accent voice crystal ball voice would say word 'probably downwards slide like sure games used text speech voice makes voice robotic may 2019 however turned bug speech api caused games lose studio quality voices audio games fixed may 20th 2019 may 2018 google revealed duplex extension google assistant allows carry natural conversations mimicking human voice manner dissimilar robocalling assistant autonomously complete tasks calling hair salon book appointment scheduling restaurant reservation calling businesses verify holiday store hours duplex complete tasks fully autonomously able recognize situations unable complete signal human operator finish task duplex created speak natural voice language incorporating speech disfluencies filler words like hmm uh using common phrases mhm gotcha along human-like intonation response latency duplex currently development limited release late 2018 google pixel users limited release pixel phone users atlanta new york phoenix san francisco able use duplex make restaurant reservations announcement concerns made ethical societal questions artificial intelligence technology duplex raises instance human operators may notice speaking digital robot conversing duplex critics view unethical deceitful concerns privacy also identified conversations duplex recorded order virtual assistant analyze respond privacy advocates also raised concerns millions vocal samples gathered consumers fed back algorithms virtual assistants making forms ai smarter use though features individualize user experience critics unsure long term implications giving company unprecedented access human patterns preferences crucial next phase artificial intelligence could potentially lead ai outsmarting creators transparency referred key part experience technology revealed google later clarified statement saying designing feature disclosure built-in 'll make sure system appropriately identified google added certain jurisdictions assistant would inform end phone call recorded pc world mark hachman gave favorable review google assistant saying step cortana siri digital trends called smarter google ever july 2019 belgian public broadcaster vrt nws published article revealing 3rd party contractors paid transcribe audio clips collected google assistant listened sensitive information users sensitive data collected google home devices android phones included names addresses private conversations business calls bedroom conversations 1000 recordings analysed 153 recorded without ‘ okay google ’ command google officially acknowledged 0.2 recordings listened language experts improve google services august 1 2019 germany ’ hamburg commissioner data protection freedom information initiated administrative procedure prohibit google carrying corresponding evaluations employees third parties period three months provisionally protect rights privacy data subjects time citing gdpr google spokesperson stated google paused “ language reviews ” european countries investigated recent media leaks google assistant new feature google assistant supported languages
[ 2902, 362, 3933, 3263, 5372, 6427, 1095, 1842, 2569, 6815, 4337, 4340, 42, 3309, 3310, 7924, 2591, 5771, 5775, 5429, 6153, 7956, 5803, 5455, 4762, 7967, 6176, 5473, 474, 5476, 5122, 6183, 831, 5141, 136, 2317, 2673, 3723, 7285, 2683, 15...
Test
3,508
2
Jim_Jagielski:jim jagielski jim jagielski born march 11 1961 american software engineer specializes web cloud open source technologies jagielski graduated johns hopkins university 1983 bes electrical/computer engineering hired nasa goddard space flight center immediately graduation 1994 jagielski founded jagunet access services web host isp served cto zend technologies cto covalent technologies chief architect springsource/vmware office cto red hat inc. consulting software engineer sr. director capital one tech fellows program currently open source chef consensys speaker various conferences seminars apachecon forrester gigaworld o'reilly open source convention written numerous topics editor apache section slashdot best known cofounder member director apache software foundation asf core developer several asf projects including apache http server apache portable runtime apache tomcat first recognition internet editor a/ux faq system administrator jagubox primary repository third-party software apple a/ux operating system addition involvement asf jagielski involved open-source projects jagielski one founding members apache software foundation member original eight-member apache group jagielski served director asf board incorporation 1999 2018 making longest serving director foundation history served eight years executive vice president secretary three years chairman jagielski served several years president asf jagielski original chair apache incubator project still involved one original co-mentors geronimo project also mentors several incubator podlings jagielski active developer many open source projects asf otherwise development ncsa httpd web server started apache early-to-mid 1995 making likely longest active contributor within asf 2005 jagielski asked serve advisory board open source software institute open source software institute ossi non-profit 501 c 6 organization corporate government academic representatives mission promote development implementation open-source software solutions within u.s. federal state municipal government agencies academic entities 2010 jagielski appointed board directors codeplex foundation later renamed outercurve foundation well director jagielski serves president outercurve 2011 jagielski appointed board directors open source initiative resigned september 2013 based long involvement foss community jagielski one recipients o'reilly open source awards oscon 2012 2012 jagielski appointed new council member marsec-xl foundation 2015 jagielski awarded european commission/open innovation strategy policy group luminary award creating open engagement platforms global efforts promoting open source innovation process jagielski contributed sendmail xntpd bind php perl freebsd among projects
[ 2961, 6029, 3408, 5983, 2294, 2824 ]
Test
3,509
9
System_programming_language:system programming language system programming language programming language used system programming languages designed writing system software usually requires different development approaches compared application software system software computer software designed operate control computer hardware provide platform running application software system software includes software categories motherboard firmware components firmware chipset peripheral controllers sometimes cpu microcode architectures provide rich complex isa interpreted simple general purpose hardware circuits bios/uefi second stage boot loaders operating systems comprising essential always running services api exposed system libraries user applications interfaces kernel address space obviously kernel utilities system administration device drivers loaders dynamic linkers contrast application languages system programming languages typically offer more-direct access physical hardware machine archetypical system programming language sense bcpl system programming languages often lack built-in input/output i/o facilities system-software project usually develops i/o mechanisms builds top basic monitor i/o screen management facilities distinction languages used system programming application programming became blurred time widespread popularity pl/i c pascal earliest system software written assembly language primarily alternative also reasons including efficiency object code compilation time ease debugging application languages fortran used system programming although usually still required routines written assembly language mid-level languages much syntax facilities higher level language also provide direct access language well providing assembly language machine features earliest espol burroughs mainframes 1960 followed niklaus wirth pl360 initially written burroughs system cross compiler general syntax algol 60 whose statements directly manipulated cpu registers memory languages category include mol-360 pl/s example typical pl360 statement codice_1 signifying registers 8 7 and'ed together result shifted left 8 bits result or'ed contents register 6 final result placed register 9 pl360 semantic level assembly language another kind system programming language operates higher semantic level specific extensions designed make language suitable system programming early example kind language lrltran extended fortran features character bit manipulation pointers directly addressed jump tables subsequently languages c developed combination features sufficient write system software compiler could developed generated efficient object programs modest hardware language generally omits features implemented efficiently adds small number machine-dependent features needed access specific hardware capabilities inline assembly code c asm statement often used purpose although many languages developed c c++ ones survived system programming language spl also name specific language hp 3000 computer series used operating system hp multi-programming executive parts system software
[ 3930, 5012, 5983, 6249, 6256, 6798, 13, 6428, 5999, 2740, 304, 5571, 6441, 1191, 5932, 7457, 35, 1015, 7096, 586, 931, 7382, 6921, 5948, 7474, 5506, 3990, 851, 1875, 336, 5424, 4361, 4544, 7036, 1052, 3747, 3751, 5091, 1435, 879 ]
Test
3,510
5
RadSec:radsec radsec protocol transporting radius datagrams tcp tls radius protocol widely deployed authentication authorization protocol supplementary radius accounting specification also provides accounting mechanisms thus delivering full aaa protocol solution however radius experiencing two major shortcomings time passes since initial design dependency unreliable transport protocol udp lack security large parts packet payload specifically latter radius security based md5 algorithm proven insecure main focus radsec provide means secure communication radius/tcp peers transport layer important use radsec lies roaming environments radius packets need transferred different administrative domains untrusted potentially hostile networks example world-wide roaming environment uses radsec secure communication eduroam radius extensions working group internet engineering task force ietf specified radsec rfc 6614
[ 7637 ]
Test
3,511
2
Reboot:reboot computing rebooting process running computer system restarted either intentionally unintentionally reboots either cold alternatively known hard power system physically turned back causing initial boot machine warm alternatively known soft system restarts without need interrupt power term restart used refer reboot operating system closes programs finalizes pending input output operations initiating soft reboot early electronic computers like ibm 1401 operating system little internal memory input often stack punch cards computer initiated pressing start button performed single command read card first card instructed machine read cards eventually loaded user program process likened old saying picking bootstraps referring horseman lifts ground pulling straps boots set initiating punch cards called bootstrap cards thus cold start called booting computer computer crashed rebooted boot reference carried subsequent types computers see bootstrapping technical sources describe two contrasting forms reboot known cold reboot also cold boot hard reboot hard boot warm reboot also soft reboot soft boot although definition forms vary slightly sources according jones landes tittel 2002 cooper 2002 tulloch 2002 soper 2004 ibm pc compatible platform cold boot boot process computer starts powerless state except tulloch 2002 also mention cold boot system performs power-on self-test post addition power switch cooper 2002 soper 2004 also state reset button present may commence cold reboot jones landes tittel 2002 contradicts assertion states reset button may commence either cold warm reboot depending system microsoft support article 102228 also confers although reset button designed perform cold reboot may disconnect power motherboard – state correspond cold boot definition given according jones landes tittel 2002 operating system third-party software initiate cold boot restart command windows 9x initiates cold reboot unless shift key held finding definition warm boot however challenge aforementioned sources indicate warm boot initiated pressing ctrl alt delete key combination except tulloch 2002 mention warm reboot perform post jones landes tittel 2002 specifies warm reboot occur bios must recipient key combination microsoft support article 102228 takes technical approach defines warm boot result invoking int 19h bios interrupt call ctrl alt delete key combination one way achieving according grimes 2001 malware may prevent subvert warm boot intercepting ctrl alt delete key combination prevent reaching bios windows nt family operating systems also reserves key combination use soper 2004 asserts windows restart command initiates warm boot thus contradicting jones landes tittel 2002 believe action performs cold boot linux family operating systems supports alternative warm boot linux kernel optional support kexec system call transfers execution new kernel skips hardware firmware reset entire process occurs independently system firmware kernel executed linux kernel outside domain ibm compatible pcs types boot may disambiguous according sue loh windows ce base team windows ce devices support three types boots warm cold clean warm boot discards program memory cold boot additionally discards storage memory also known object store clean boot erases forms memory storage device however since areas exist windows ce devices users concerned two forms reboot one resets volatile memory one wipes device clean restores factory settings example windows mobile 5.0 device former cold boot latter clean boot hard reboot means system shut orderly manner skipping file system synchronisation activities would occur orderly shutdown achieved either applying reset cycling power issuing command unix-like systems triggering kernel panic term restart used microsoft windows linux family operating systems denote operating system-assisted reboot restart operating system ensures pending i/o operations gracefully ended commencing reboot users may deliberately initiate reboot rationale action may include means performing deliberate reboot also vary may include unexpected loss power reason including power outage power supply failure depletion battery mobile device forces system user perform cold boot power restored bioses option automatically boot system power failure uninterruptible power supply ups backup battery redundant power supply prevent circumstances random reboot non-technical term referring unintended often undesired reboot following system crash whose root cause may immediately evident user crashes may occur due multitude software hardware problems triple faults generally symptomatic error ring 0 trapped error handler operating system hardware-triggered non-maskable interrupt systems may configured reboot automatically power failure fatal system error kernel panic method done varies depending whether reboot handled software must handled firmware hardware level operating systems windows nt family windows nt 3.1 windows 7 option modify behavior error handler computer immediately restarts rather displaying blue screen death bsod error message option enabled default editions introduction advanced power management allowed operating systems greater control hardware power management features advanced configuration power interface acpi newer operating systems able manage different power states thereby sleep and/or hibernate hibernation also involves turning system subsequently back operating system start scratch thereby differentiating process rebooting reboot may simulated software running operating system example sysinternals bluescreen utility used pranking modes bsod xscreensaver hack entertainment albeit possibly concerning first glance malware may also simulate reboot thereby deceive computer user nefarious purpose microsoft app-v sequencing tool captures file system operations installer order create virtualized software package users part sequencing process detect installer requires reboot interrupt triggered reboot instead simulate required reboot restarting services loading/unloading libraries windows 8 10 enable default hibernation-like fast startup a.k.a fast boot cause problems including confusion users accustomed turning computers cold reboot
[ 5890, 7790, 4759, 6256, 7064, 2204, 6272, 5571, 578, 5401, 2857, 224, 6646, 1670, 6658, 2693, 4447, 5869, 3407, 1052, 2254, 1325, 3586, 4277, 1992, 1150, 5358, 447 ]
Train
3,512
2
Syskey:syskey sam lock tool better known syskey name executable file discontinued component windows nt encrypts security account manager sam database using 128-bit rc4 encryption key first introduced windows nt 4.0 sp3 removed windows 10 windows server 2016 due use cryptography considered insecure modern standards use part scams form ransomware microsoft officially recommended use bitlocker disk encryption alternative first introduced windows nt 4.0 sp3 syskey intended protect offline password cracking attacks preventing possessor unauthorized copy sam file extracting useful information syskey optionally configured require user enter key boot startup password load key onto removable storage media e.g. floppy disk usb flash drive october 2 2018 microsoft removed syskey.exe future versions windows microsoft recommends use bitlocker similar technologies instead syskey.exe utility december 1999 security team bindview found security hole syskey indicated certain form offline cryptanalytic attack possible making brute force attack appear possible microsoft later issued fix problem dubbed syskey bug bug affected windows nt 4.0 pre-rc3 versions windows 2000 syskey commonly abused tech support scammers lock victims computers order coerce paying ransom
[ 7879, 3937, 3263, 378, 2198, 6096, 2566, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5440, 5442, 4377, 5090, 3340, 7602, 1156, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, ...
Test
3,513
3
Enterprise_interoperability_framework:enterprise interoperability framework enterprise interoperability framework used guideline collecting structuring knowledge/solution enterprise interoperability framework defines domain sub-domains interoperability research development order identify set pieces knowledge solving enterprise interoperability problems removing barriers interoperability existing works interoperability carried define interoperability framework reference models particular lisi reference model european interoperability framework eif ideas interoperability framework athena interoperability framework e-health interoperability framework existing approaches constitute basis enterprise interoperability framework necessity elaborate enterprise interoperability framework discussed existing interoperability frameworks explicitly address barriers interoperability basic assumption research aimed structuring interoperability knowledge respect ability remove various barriers enterprise interoperability framework three basic dimensions framework three basic dimensions shown enterprise interoperability framework allows enterprise interoperability framework aims structuring concepts defining research domain capturing knowledge also helping industries solve interoperability problems carrying interoperability project involving two particular enterprises interoperability concerns interoperability barriers two enterprises identified first mapped enterprise interoperability framework using framework existing interoperability degree characterised targeted interoperability degree defined objective meet knowledge/solutions associated barriers concerns searched framework solutions found proposed users possible adaptation and/or combination solutions remove identified barriers required interoperability established
[ 5328, 2087, 7940 ]
Test
3,514
2
Linux_Technology_Center:linux technology center ibm linux technology center ltc organization focused development linux kernel related open-source software projects 1999 ibm created ltc combine software developers interested linux open-source software single organization much ltc early effort focused making server platforms linux friendly ltc collaborated linux community make linux run optimally processor architectures x86 mainframe powerpc power isa recent years focus ltc expanded include several open source initiatives developers ltc contribute various open-source projects ltc worldwide team main locations australia brazil china germany india israel united states
[ 7512, 4299, 3268, 3005, 4408, 3633, 6543, 578, 7003, 4798, 3807, 6130, 602, 6586, 352, 5884, 2803, 2807 ]
Test
3,515
2
Boehm_garbage_collector:boehm garbage collector computer science boehm–demers–weiser garbage collector often simply known boehm gc conservative garbage collector c c++ boehm gc free software distributed permissive free software licence similar x11 license developer describes operation collector follows boehm gc also run leak detection mode memory management still done manually boehm gc check done properly way programmer find memory leaks double deallocations boehm gc also distributed c string handling library called cords similar ropes c++ strings trees small arrays never change instead using reference counting proper deallocation relies garbage collection free objects cords good handling large texts modifications middle slicing concatenating keeping history changes undo/redo functionality garbage collector works unmodified c programs simply replacing malloc gc_malloc calls replacing realloc gc_realloc calls removing free calls code piece shows one use boehm instead traditional malloc free c. boehm gc used many projects implemented c c++ like inkscape well runtime environments number languages including crystal gnu compiler java runtime environment portable.net project embeddable common lisp gnu guile mono implementation microsoft .net platform also using precise compacting gc since version 2.8 libgc-d binding libgc programming language used primarily mci supports numerous operating systems including many unix variants macos microsoft windows provides number advanced features including incremental collection parallel collection variety finalizer semantics
[ 1616, 3351, 4759, 8066, 6981, 379, 2736, 1363, 572, 5571, 5583, 1855, 1019, 1208, 4347, 3566, 4810, 7848, 56, 858, 2619, 1435, 4920 ]
Test
3,516
3
Yamaha_CX5M:yamaha cx5m yamaha cx5m msx-system compatible computer expands upon normal features expected systems built-in eight-voice fm synthesizer module introduced 1984 yamaha corporation fm synth stereo audio outputs input purpose-built four-octave keyboard pair midi input/output ports could used normal midi second revision cx5m management data yamaha dx7 first model cx5m built msx standard included slots inserting programmed cartridges extended machine capability accepting range games office applications yamaha produced range cartridges including programmer yamaha dx range fm keyboards real-time sequencer two voice editor music composer allowed user program bank 48 sounds cx5 built synthesizer sequence eight channels music controlling built-in module external instruments via midi step-time using musical-stave input screen three versions cx5m released first contained fm module sfg-01 could receive external midi note information required proprietary keyboard used midi port output send data yamaha then-flagship dx7 second version cx5m ii cx7m/128 japan ref name= cx7/128 /ref upgraded fm system sfg-05 supported midi input thus allowed internal fm synth played external midi keyboard also later cx5m ii smaller differences later 1986 yamaha released yamaha fb-01 midi module effectively sfg-05 standalone portable case
[ 3689, 6237, 5970 ]
Validation
3,517
4
Global_Information_Assurance_Certification:global information assurance certification global information assurance certification giac information security certification entity specialises technical practical certification well new research form giac gold program sans institute founded certification entity 1999 term giac trademarked escal institute advanced technologies giac provides set vendor-neutral computer security certifications linked training courses provided sans giac specific leading edge technological advancement security order keep ahead black hat techniques papers written individuals pursuing giac certifications presented sans reading room giac website initially sans giac certifications required written paper practical specific area certification order achieve certification april 2005 sans organization changed format certification breaking two separate levels silver level certification achieved upon completion multiple choice exam gold level certification obtained completing research paper silver level prerequisite january 21 2017 giac granted 89,827 certifications worldwide
[ 1715, 6694, 3517, 5561, 3700, 6004, 7825, 4783, 6020, 221, 1756, 7192, 4523, 7111, 1034, 7486, 3823, 5254, 6488, 1805 ]
Test
3,518
3
After_Burner:burner game allows player control f-14 tomcat jet airplane player mission destroy enemy jets 18 stages start game player takes aircraft carrier called sega enterprise shares similar name one used 1986 film top gun also reference company name time sega enterprises ltd. arcade version jet employs machine gun limited number heat-seeking missiles master system version player unlimited missiles weapons replenished another aircraft beating stages aircraft cannon missile buttons controlled integrated flight stick game released two variations us standard upright cabinet rotating cockpit version cockpit version seat rotated horizontally cockpit rotated vertically featured two speakers head-level stereo sound seatbelt hold player cockpit rotated cabinets contained grey monitor frame flashing lights top indicated enemy lock player craft japan also got commander cabinet moves left right game ported amiga dos based pcs amstrad cpc atari st sharp x68000 fm towns commodore 64 master system pc engine sega saturn pc msx zx spectrum c64 two versions european version u.s. gold u.s. version activision weebee games port burner 32x done rutubo games known burner complete japan europe unlicensed nes port game developed tengen also exists reworked sunsoft japanese-exclusive port console port burner game boy advance included arcade 4 pack named sega arcade gallery computer gaming world reviewed burner master system citing aircraft depicted remarkable detail spectacular scenery excellent explosions later review pc much critical giving game one star five stating inferior arcade version zx spectrum 1988 conversion burner activision well-received sinclair user describing top-class coin-op conversion destined top charts giving 90 whilst crash magazine gave 86 overall reviewing 32x version gamepro commented graphics sound gameplay great difference genesis version burner ii minor graphical audio enhancements making worthwhile gamers never played burner game burner followed burner ii released year consider game revision predecessor rather entirely new game practice later repeated sega galaxy force galaxy force 2 although burner brand long dormant sega created number aerial combat games centered f-14 tomcat many similar features frequently regarded part series include sequel strike fighter later rebranded burner iii home release later games associated series include sky target retained similar gameplay presentation original addition 3d graphics sega strike fighter arcade flight combat game featured free-roaming movement boasting similar music f/a-18 hornet main plane 2006 sega released new sequel sega lindbergh hardware burner climax first arcade game bear brand since burner ii burner climax later ported xbox live arcade psn followed spinoff psp 2007 burner climax de-listed december 2014 leaving game longer available purchase march 2019 burner climax brought back digital platforms free ads sega ’ “ sega forever ” brand name emulated version burner playable in-game arcade shenmue 2 burner stage hazard final stage madworld shown replica jet spewing flames immediately incinerate enemy thrown plane burner makes cameo fighters megamix accessed cheat code music burner appears remix chapter 8 entitled route 666 bayonetta 2009 developed platinumgames published sega remix reused super smash bros. wii u super smash bros ultimate bayonetta stage umbra clock tower level based burner appears 2012 racing game sonic all-stars racing transformed f-14 tomcat also appears air vehicle unlockable character ages song burner ii appears 2010 rhythm game playable level sung character meiko arcade game appears 1990 hbo film dawn early light flight ready room b-52 bomber pilots lead character seen playing game tomcat crashing arcade version appears 1991 movie suburban commando starring hulk hogan shep ramsey plays game arcade scene however child playing acted space shooter game instead deluxe cabinet appears played john connor t-1000 searches galleria
[ 3332, 6380, 440, 7991, 683, 7994, 7854 ]
Test
3,519
6
Bcachefs:bcachefs bcachefs copy-on-write cow file system linux-based operating systems primary developer kent overstreet first announced 2015 efforts ongoing included mainline linux kernel intended compete modern features zfs btrfs speed performance ext4 xfs bcachefs copy-on-write cow file system linux-based operating systems planned existing features bcachefs include caching full file-system encryption using chacha20 poly1305 algorithms native compression via zlib lz4 zstandard snapshots crc-32c 64-bit checksumming use multiple block devices including raid configurations bcachefs provides functionality bcache block-layer cache system linux bcachefs shares 80 code primary development kent overstreet developer bcache describes prototype ideas became bcachefs overstreet intends bcachefs replace bcache overstreet stated development bcachefs began bcache developers realized codebase evolving ... full blown general-purpose posix filesystem really clean elegant design within took direction time bcache merged 2013 mainline linux kernel overstreet left job google work full-time bcachefs years unfunded development overstreet announced bcachefs 2015 point called code less feature complete called testers contributors intended advanced file system modern features like zfs btrfs speed performance file systems ext4 xfs 2017 overstreet receiving financial support development bcachefs via patreon mid-2018 on-disk format settled patches submitted review bcachefs included mainline linux kernel yet accepted
[ 3599, 1438, 2547, 7161, 4672, 3626, 2566, 6117, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 5900, 4480, 4855, 7...
Test
3,520
3
Sakhr_Computers:sakhr computers sakhr computers developed kuwaiti company al alamiah produced arabic-language version msx computers 1980s products included msx2 msx2+ yamaha ax100 models latter known sakhr msx ax170 company also first convert basic computer language arabic
[]
Test
3,521
7
ASCI_White:asci white asci white supercomputer lawrence livermore national laboratory california briefly fastest supercomputer world computer cluster based ibm commercial rs/6000 sp computer 512 nodes interconnected asci white node containing sixteen 375mhz ibm power3-ii processors total asci white 8,192 processors 6terabytes tb memory 160tb disk storage almost exclusively used large-scale computations requiring dozens hundreds thousands processors computer weighed 106tons consumed 3mw electricity 3mw needed cooling theoretical processing speed 12.3teraflops tflops system ran ibm aix operating system asci white made three individual systems 512-node white 28-node ice 68-node frost system built poughkeepsie new york completed june 2000 transported specially built facilities california officially dedicated august 15 2001 peak performance 12.3tflops achieved widely accepted linpack tests system cost us 110 million built stage three accelerated strategic computing initiative asci started u.s. department energy national nuclear security administration build simulator replace live wmd testing following moratorium testing started president george h. w. bush 1992 extended bill clinton 1993 machine decommissioned beginning july 27 2006
[ 1023, 2818, 1346, 1494, 1199 ]
Validation
3,522
7
ServiceMax:servicemax servicemax global market-leader service execution management software category includes field service management asset service management servicemax provides cloud-based software platform improves productivity complex equipment-centric service execution oems operators 3rd-party service providers servicemax platform saas software service software running salesforce force.com cloud technology servicemax cloud-based mobile-ready field service software solution supports companies across industries manage work orders plan schedule work assignments provide mobile technician enablement contracts entitlements proactive maintenance parts inventory management servicemax platform designed optimize service execution processes used service technicians dispatchers service planners managers customers include medical device manufacturing industrial manufacturing food beverage equipment buildings construction technology oil gas power utilities industries servicemax software primarily used enterprise size customers october 2018 servicemax introduced asset service management solution equipment operators augmenting existing field service management software typically used original equipment manufacturers service organizations commercial service operations february 2019 servicemax acquired zinc adding secure real-time communications solution portfolio zinc mode communications offering provides 1:1 group messaging voice video content sharing top-down broadcasts hotlines communications analytics recent areas innovation include capabilities complex jobs functionality crew management shift planning maxplore technologies founded athani krishnaprasad hari subramanian consulting company focusing customer relationship management client requested maxplore build field service module salesforce platform project took 2 weeks 2007 entered “ appexchange challenge ” dreamforce conference project 2 million funding emergence capital went win force million dollar challenge 2008 company changed name servicemax february 2019 servicemax acquired zinc company providing frictionless way service workers get share knowledge real-time 2016 servicemax received 204 million funding company completed 82 million series f round august 2015 led premjiinvest ge march 2014 company received 71 million series e funding led meritech capital partners november 2012 servicemax received 27 million series funding round june 2011 company received 14 million series c funding led mayfield fund april 2010 servicemax received 8 million series b funding led trinity ventures november 14 2016 general electric co. ge digital unit announced deal buy servicemax 915 million acquisition completed january 10 2017 december 13 2018 ge digital silverlake announced agreement ge digital sell majority stake servicemax ge retained 10 equity ownership company
[ 7037, 330 ]
Test
3,523
4
Reboot_to_restore_software:reboot restore software ‘ reboot restore ’ system restore technology enables restoring user-defined system configuration computing device every restart technology helps maintain systems optimum working conditions useful especially multi-user computing environments deploying solutions based reboot restore technology enables users define particular system configuration desired state baseline point would restored reboot baseline set reboot restore software continues restore particular configuration every time device restarted switched shutdown reboot restore software helps maintaining optimal system configuration quite effective multi-user computing environment technology prevents types alterations baseline configuration whether user inflicted automatic alterations end-users primarily changes system settings installing uninstalling software applications enabling disabling specific functionalities automatic alterations include cookies add-ons browser extensions several types temporary files often get downloaded background online session also rolls back malicious alterations made malware elusively penetrate system attempts corrupt reboot restore software solutions built simplify process maintaining optimal system configuration devices multi-user computing environment public libraries computer labs educational institutes k-12 colleges universities training centers public access kiosks due constant use multiple people wide range purposes devices become susceptible performance deterioration malware infiltration events system malfunction failure takes considerably longer time troubleshoot issue using conventional practices like resetting reimaging may lead prolonged downtime causing poor user experience potential loss business opportunity higher maintenance costs restore reboot functionality ensures best system configuration pristine state maintained every public-access computer without long-drawn troubleshooting steps instant restoration technology empowers end-users resolve system issues simply restarting device significantly reduces intervention end-users experience optimum system performance pristine configuration restored every reboot technology helps deliver maximum system uptime improves operational efficiency resource utilization system administrators corporates deploy reboot restore solutions create prestige environments without need constant troubleshooting use software protect system drive allocate separate data partition user application data stored redirected initially named shared computer toolkit windows steadystate freeware reboot restore solution offered microsoft compatible windows xp windows vista operating systems windows steadystate discontinued december 2010 software primarily used educational institutes public libraries steadystate features windows disk protection wdp functionality enabled redirects user-generated changes cache software three modes discard persist commit discard mode clears cache reboot restores original configuration persist mode retains cache specific time admins could opt discard commit changes commit mode changes permanently written hard disk usual deep freeze faronics one first rollback software solutions leverage reboot restore technology releasing first windows solution 1999 followed mac os solution 2005 deep freeze uses patented technology redirects information written hard drive partition allocation table leaving original data intact redirected information allocation table longer referenced computer restarted therefore restoring computer back original state disk sector level last byte extending functionalities reboot restore technology software provision thawspaces thawed partitions permanently saving user-generated data without altering baseline configuration thawspace virtual space system administrators create within deep freeze ecosystem hard disk partition content stored thawspace retained across reboots thawed partitions parts hard disk exempted effects reboot restore technology microsoft apple inc. offer restoration tools though based reboot restore technology embedded respective operating systems system restore inbuilt feature windows available latest versions os reverts system files settings previous point time without affecting personal files enabled software automatically creates restore points regular intervals every major instance configuration alteration like driver update new application installation device malfunctions running system restore rolls back configuration restore point particular issue exist reset option introduced windows 8 used restoring systems factory defaults re-installs windows os permanently discards files system settings pre-installed applications time machine macos functions backup utility restoration program creates incremental snapshots system configuration periodically requires external storage device backing macos backup later used restore previous configuration required software also used restore specific items like deleted emails older versions files rather entire configuration also introduced windows 8 refresh re-installs windows os retains user files pre-installed applications installed users running reset option advised refresh fails resolve issue
[ 5159 ]
Test
3,524
2
Nokia_N810:nokia n810 nokia n810 internet tablet internet appliance nokia announced 17 october 2007 web 2.0 summit san francisco despite nokia strong association cellular products n810 like preceding tablets produced nokia phone instead allowed user browse internet communicate using wi-fi networks mobile phone via bluetooth built hardware software nokia n800 features added removed nokia n810 featured maemo linux distribution operating system based maemo 4.0 featured microb mozilla-based mobile browser gps navigation application new media player refreshed interface nokia n810 much common n800 internet tablet os 2008 operated significant differences two new features nokia n810 1 april 2008 nokia announced wimax equipped version n810 called n810 wimax edition device identical specifications original n810 included wimax radio use initially sprint xohm network featured color change light gray dark blue black well larger case-back bulge accommodate antenna efficient required bands production wimax edition nokia n810 ended january 2009 n810 like nokia internet tablets ran maemo similar many handheld operating systems provided home screen — central point applications settings accessed home screen divided areas launching applications menu bar large customisable area could display information rss reader internet radio player google search box example maemo modified version debian gnu/linux n810 bundled several applications including mozilla-based microb browser adobe flash gizmo skype mobile firefox fennec also made available n810 promised make users forget clunky stripped-down mobile web 're used installation added mozilla repository application manager allowing automatic notification updates
[ 1066, 2538, 372, 7521, 3615, 1453, 3952, 4317, 2922, 23, 2564, 6443, 7545, 5044, 4343, 7919, 6465, 5062, 3653, 5068, 3657, 4726, 1129, 76, 1522, 2271, 6517, 1167, 3694, 472, 4407, 118, 3703, 7261, 5493, 1202, 3029, 499, 5499, 139, 3039,...
Validation
3,525
5
LAPB:lapb link access procedure balanced lapb implements data link layer defined x.25 protocol suite lapb bit-oriented protocol derived hdlc ensures frames error free correct sequence lapb specified itu-t recommendation x.25 iso/iec 7776 implements connection-mode data link service osi reference model defined itu-t recommendation x.222 lapb used manage communication packet framing data terminal equipment dte data circuit-terminating equipment dce devices x.25 protocol stack lapb essentially hdlc asynchronous balanced mode abm lapb sessions established either dte dce station initiating call determined primary responding station secondary lapb mainly used transfer data upper layer frame flag – value flag always 0x7e order ensure bit pattern frame delimiter flag appear data field frame therefore cause frame misalignment technique known bit stuffing used transmitter receiver address field – lapb field meaning since protocol works point point mode dte network address represented layer 3 packets byte therefore put different use separates link commands responses two values 0x01 0x03 01 identifies frames containing commands dte dce responses commands dce dte 03 used frames containing commands dce dte responses dte dce therefore one side must configured layer 2 dte layer 2 dce must confuse familiar layer 1 dce dte designations control field – serves identify type frame addition includes sequence numbers control features error tracking according frame type modes operation – lapb works asynchronous balanced mode abm mode balanced i.e. master/slave relationship signified sabm e /sm frame station may initialize supervise recover errors send frames time dte dce treated equals fcs – frame check sequence enables high level physical error control allowing integrity transmitted frame data checked window size – lapb supports extended window size modulo 128 modulo 32768 maximum number outstanding frames acknowledgment raised 7 modulo 8 127 modulo 128 32767 modulo 32768 lapb master/slave node relationships sender uses poll bit command frames insist immediate response response frame bit becomes receivers final bit receiver always turns final bit response command sender poll bit set p/f bit generally used either end becomes unsure proper frame sequencing possible missing acknowledgment necessary re-establish point reference also used trigger acknowledgment outstanding i-frames following table shows addresses placed lapb frame issuing commands responses dte dce dce dte using single link operation multilink operation
[ 5142, 6871, 7916, 772, 3207, 4580, 5880, 4101, 3597, 7433, 5492, 1543, 1709 ]
Test
3,526
2
Xerox_Operating_System:xerox operating system xerox operating system xos operating system xds sigma series computers optimized direct replacement ibm dos/360 installations provide real-time timesharing support system developed beginning 1969 xerox french firm bull xos successful europe us unable compete ibm 1972 35 xos installations europe compared 2 us
[ 1522, 7325, 7605, 280, 785, 2818, 4759, 190, 4670, 5021, 8066, 8167, 4397, 13, 5644, 3271, 5116, 6984, 299, 3626, 7142, 5571, 2300, 5041, 7827, 4786, 578, 7550, 4244, 5232, 1992, 405, 6367, 839, 6922, 8115, 5161, 5865, 7396, 65, 861, ...
Test
3,527
9
Scilab_Image_Processing:scilab image processing sip toolbox processing images scilab sip meant free complete useful image toolbox scilab goals include tasks filtering blurring edge detection thresholding histogram manipulation segmentation mathematical morphology color image processing though sip still early development currently import output image files many formats including bmp jpeg gif png tiff xpm pcx sip uses imagemagick accomplish sip licensed gpl
[ 4759, 5571, 578, 1435 ]
Test
3,528
4
Hacking_Team:hacking team hackingteam milan-based information technology company sells offensive intrusion surveillance capabilities governments law enforcement agencies corporations remote control systems enable governments corporations monitor communications internet users decipher encrypted files emails record skype voice ip communications remotely activate microphones camera target computers company criticized providing capabilities governments poor human rights records though hackingteam states ability disable software used unethically italian government restricted license business countries outside europe hackingteam employs around 40 people italian office subsidiary branches annapolis washington d.c. singapore products use dozens countries across six continents hackingteam founded 2003 two italian entrepreneurs david vincenzetti valeriano bedeschi 2007 company invested two italian vc fondo next innogest milan police department learned company hoping use tool spy italian citizens listen skype calls police contacted vincenzetti asked help hackingteam became first sellers commercial hacking software police ” according former employee alberto pelliccione company began security services provider offering penetration testing auditing defensive capabilities clients pelliccione states malware offensive capabilities developed accounted larger percentage revenues organization pivoted offensive direction became increasingly compartmentalized pelliccione claims fellow employees working aspects platform – example android exploits payloads – would communicate one another possibly leading tensions strife within organization february 2014 report citizen lab identified organisation using hosting services linode telecom italia rackspace noc4hosts notorious bullet proof hosting company santrex july 5 2015 company suffered major data breach customer data software code internal documents e-mails see § 2015 data breach april 2nd 2019 hackingteam acquired inthecyber create memento labs hackingteam enables clients perform remote monitoring functions citizens via rcs remote control systems including da vinci galileo platforms hackingteam uses advanced techniques avoid draining cell phone batteries could potentially raise suspicions methods avoid detection malware payloads android blackberry apple ios linux mac os x symbian well microsoft windows windows mobile windows phone class operating systems rcs management platform allows operators remotely deploy exploits payloads targeted systems remotely manage devices compromised exfiltrate data remote analysis hackingteam criticized selling products services governments poor human rights records including sudan bahrain venezuela saudi arabia june 2014 united nations panel monitoring implementation sanctions sudan requested information hackingteam alleged sales software country contravention united nations weapons export bans sudan documents leaked 2015 data breach hackingteam revealed organization sold sudanese national intelligence security service access remote control system software 2012 960,000 euros response united nations panel company responded january 2015 currently selling sudan follow-up exchange hackingteam asserted product controlled weapon request beyond scope panel need disclose previous sales considered confidential business information u.n. disagreed view panel software ideally suited support military electronic intelligence elint operations may potentially fall category 'military ... equipment 'assistance related prohibited items secretary wrote march thus potential use targeting belligerents darfur conflict interest panel fall 2014 italian government abruptly froze hackingteam exports citing human rights concerns lobbying italian officials company temporarily back right sell products abroad july 5 2015 twitter account company compromised unknown individual published announcement data breach hackingteam computer systems initial message read since nothing hide 're publishing e-mails files source code ... provided links 400 gigabytes data including alleged internal e-mails invoices source code leaked via bittorrent mega announcement data breach including link bittorrent seed retweeted wikileaks many others social media material voluminous early analysis appeared reveal hackingteam invoiced lebanese army sudan spy tools also sold bahrain kazakhstan hackingteam previously claimed never done business sudan leaked data revealed zero-day cross-platform flash exploit cve number cve-2015-5119 dump included demo exploit opening calculator test webpage adobe patched hole july 8 2015 another vulnerability involving adobe revealed dumps took advantage buffer overflow attack adobe open type manager dll included microsoft windows dll run kernel mode attack could perform privilege escalation bypass sandbox also revealed leaked data hackingteam employees use weak passwords including 'p4ssword 'wolverine 'universo hours without response hackingteam member christian pozzi tweeted company working closely police attackers claiming regarding company true also claimed leaked archive contains virus constituted false info shortly tweets pozzi twitter account apparently compromised responsibility attack claimed hacker known phineas fisher phisher twitter phineas previously attacked spyware firm gamma international produce malware finfisher governments corporations 2016 phineas published details attack spanish english how-to others explained motivations behind attack internal documents revealed details hackingteam contracts repressive governments 2016 italian government revoked company license sell spyware outside europe without special permission hackingteam clientele include governments also corporate clients barclay bank british telecom bt united kingdom well deutsche bank germany full list hackingteam customers leaked 2015 breach disclosed documents show hackingteam 70 current customers mostly military police federal provincial governments total company revenues disclosed exceeded 40 million euros
[ 704, 3932, 2190, 2912, 376, 3277, 2923, 744, 6823, 2587, 1863, 3323, 5779, 7600, 5452, 88, 4025, 1528, 4759, 2991, 803, 1173, 6526, 1544, 1939, 6904, 6541, 6194, 2678, 3038, 3047, 6569, 2693, 860, 862, 2700, 7307, 6589, 5187, 1996, 7328...
Test
3,529
4
Festi:festi festi rootkit botnet created basis works operating systems windows family autumn 2009 first time festi came view companies engaged development sale antivirus software time estimated botnet consisted roughly 25.000 infected machines spam volume capacity roughly 2.5 billion spam emails day festi showed greatest activity 2011-2012 recent estimates dated august 2012 display botnet sending spam 250,000 unique ip addresses quarter total amount one million detected ip sending spam mails main functionality botnet festi spam sending implementation cyberattacks like distributed denial service distribution carried scheme ppi pay-per-install use preventing detection antiviruses loader extends ciphered complicates signature based detection represented data architecture botnet gathered research eset antivirus company loader downloads sets bot represents kernel-mode driver adds list drivers launching together operating system hard disk drive part bot stored responsible communication command center loading modules starting bot periodically asks command center receiving configuration loading modules jobs necessary execution researches carried specialists antivirus company eset known festi least two modules one intends spam sending botspam.dll another implementation cyberattacks like distributed denial service botdos.dll module implementation cyberattacks like distributed denial service supports following types cyberattacks namely tcp-flood udp-flood dns-flood http -flood also flood packets random number issue used protocol expert kaspersky lab researching botnet drew output modules used list includes module socks-server implementation botsocks.dll tcp udp protocols module remote viewing control computer user botremote.dll module implementing search disk remote computer local area network botsearch.dll remote computer connected grabber-modules browsers known present time botgrabber.dll modules never saved hard disk drive almost impossible detection bot uses client-server model functioning implements protocol network interaction command center used receiving configuration botnet loading modules also obtaining jobs command center notification command center execution data encoded interferes determination contents network traffic case installation bot switches system firewall hides kernel-mode driver keys system registry necessary loading operation protects registry keys deleting operation network occurs low level allows bypass network filters antivirus software easily use network filters observed prevent installation bot checks whether launched virtual machine case positive result check stops activities festi periodically checks existence debugger able remove breakpoints festi created use object-oriented technology software development strongly complicates researches method reverse engineering bot easily ported operating systems control botnet festi implemented means web interface carried via browser according specialists antivirus company eset american journalist blogger brian krebs expert information security field according american journalist new york times newspaper andrew kramer also sources close russian intelligence services architect developer botnet festi — russian hacker igor artimovich conclusion possible tell botnet festi one powerful botnets sending spam carrying attacks like distributed denial service principles festi botnet constructed increase bot lifetime system much possible hinder bot detection antivirus software network filters mechanism modules allows expand functionality botnet side means creation loading necessary modules achievement different purposes object-oriented approach development complicates botnet researching use methods reverse engineering gives chance bot porting operating systems accurate demarcation specific concrete operating system functionality remaining logic bot powerful systems counteraction detection debugging make festi bot almost invisible stealthy system bindings use reserve command centers gives chance restoration control botnet change command center festi atypical example malicious software authors approached process development extremely seriously
[ 5452, 91, 1554, 6756, 7093, 6823 ]
Test
3,530
2
OPOS:opos opos full name ole retail pos platform specific implementation unifiedpos point sale device standard microsoft windows operating systems initiated microsoft ncr epson fujitsu-icl managed association retail technology standards opos api first published january 1996 standard uses component object model languages support com controls i.e visual c++ visual basic c used write applications opos standard specifies two levels opos control control object presents abstract hardware interface family devices receipt printer service object handles interface control object actual physical device specific model receipt printer division functionality provides way application development write abstract hardware interface allowing application work variety different hardware requirement hardware vendor supplies opos compatible service object particular hardware offering typically manufacturer point sale terminals provide along terminal operating system opos control object package software utility used configure opos settings utility specify settings opos control object indicate service object used particular opos profile point sale application starts loads opos control object opos control object turn loads service object specified current opos profile windows registry typically used persistent store device settings hardware device manufacturer normally provide utility device specific settings used service object opos deployed following operating systems
[]
Test
3,531
7
Message_passing:message passing computer science message passing technique invoking behavior i.e. running program computer invoking program sends message process may actor object relies process supporting infrastructure select invoke actual code run message passing differs conventional programming process subroutine function directly invoked name message passing key models concurrency object-oriented programming message passing used ubiquitously modern computer software used way objects make program work means objects systems running different computers e.g. internet interact message passing may implemented various mechanisms including channels message passing technique invoking behavior i.e. running program computer contrast traditional technique calling program name message passing uses object model distinguish general function specific implementations invoking program sends message relies object select execute appropriate code justifications using intermediate layer essentially falls two categories encapsulation distribution encapsulation idea software objects able invoke services objects without knowing caring services implemented encapsulation reduce amount coding logic make systems maintainable e.g. rather if-then statements determine subroutine function call developer send message object object select appropriate code based type one first examples used domain computer graphics various complexities involved manipulating graphic objects example simply using right formula compute area enclosed shape vary depending shape triangle rectangle ellipse circle traditional computer programming would result long if-then statements testing sort object shape calling appropriate code object-oriented way handle define class called codice_1 subclasses codice_2 codice_3 turn subclasses codice_4 codice_5 simply send message codice_1 asking compute area codice_1 object invoke subclass method formula appropriate kind object distributed message passing provides developers layer architecture provides common services build systems made sub-systems run disparate computers different locations different times distributed object sending message messaging layer take care issues synchronous message passing occurs objects running time used object-oriented programming languages java smalltalk synchronous messaging analogous synchronous function call function caller waits function completes sending process waits receiving process completes make synchronous communication unworkable applications example large distributed systems may perform well enough usable large distributed systems may need operate subsystems maintenance etc imagine busy business office 100 desktop computers send emails using synchronous message passing exclusively one worker turning computer cause 99 computers freeze worker turns computer back process single email asynchronous message passing receiving object busy requesting object sends message continuing function call analogy like function call returns immediately without waiting called function complete messages sent queue stored receiving process requests receiving process processes messages sends results queue pickup original process designated next process asynchronous messaging requires additional capabilities storing retransmitting data systems may run concurrently generally handled intermediary level software often called middleware common type message-oriented middleware mom buffer required asynchronous communication cause problems full decision made whether block sender whether discard future messages blocked sender may lead deadlock messages dropped communication longer reliable synchronous communication built top asynchronous communication using synchronizer example α-synchronizer works ensuring sender always waits acknowledgement message receiver sender sends next message acknowledgement received hand asynchronous communication also built top synchronous communication example modern microkernels generally provide synchronous messaging primitive asynchronous messaging implemented top using helper threads message-passing systems use either distributed local objects distributed objects sender receiver may different computers running different operating systems using different programming languages etc case bus layer takes care details converting data one system another sending receiving data across network etc remote procedure call rpc protocol unix early example note type message passing requirement sender receiver use object-oriented programming procedural language systems wrapped treated large grained objects capable sending receiving messages examples systems support distributed objects onc rpc corba java rmi dcom soap .net remoting ctos qnx neutrino rtos openbinder d-bus distributed object systems called shared nothing systems message passing abstraction hides underlying state changes may used implementation sending messages distributed asynchronous message-passing additional overhead compared calling procedure message-passing arguments must copied new message arguments contain megabytes data must copied transmitted receiving object traditional procedure calls differ message-passing terms memory usage transfer time locality arguments passed receiver typically general purpose registers requiring additional storage transfer time parameter list containing arguments addresses bits address-passing possible distributed systems since systems use separate address spaces web browsers web servers examples processes communicate message-passing url example referencing resource without exposing process internals subroutine call method invocation exit invoked computation terminated asynchronous message-passing contrast result response arriving significant time request message sent message-handler general process messages one sender means state change reasons unrelated behavior single sender client process contrast typical behavior object upon methods invoked latter expected remain state method invocations words message-handler behaves analogously volatile object prominent mathematical models message passing actor model pi calculus mathematical terms message single means pass control object object responds message method message alan kay argued message passing important objects oop objects often over-emphasized live distributed objects programming model builds upon observation uses concept distributed data flow characterize behavior complex distributed system terms message patterns using high-level functional-style specifications
[ 6415, 3262, 5021, 5371, 6085, 6430, 382, 5735, 4685, 35, 6823, 5787, 2619, 790, 5109, 1554, 5501, 1584, 5861, 6224, 3062, 3751, 1989, 7315, 180, 7712, 1270, 5217, 6989, 5931, 3120, 7010, 5593, 4175, 3820, 1313, 8130, 7775, 1710, 2086, 7...
Test
3,532
9
Expect:expect expect extension tcl scripting language written libes program automates interactions programs expose text terminal interface expect originally written 1990 unix platform since become available microsoft windows systems expect used automate control interactive applications telnet ftp passwd fsck rlogin tip ssh others expect uses pseudo terminals unix emulates console windows starts target program communicates human would via terminal console interface tk another tcl extension used provide gui expect serves glue link existing utilities together general idea figure make expect use system existing tools rather figure solve problem inside expect key usage expect involves commercial software products many products provide type command-line interface usually lack power needed write scripts built service users administering product company often spend resources fully implement robust scripting language expect script spawn shell look environmental variables perform unix commands retrieve information enter product command-line interface armed necessary information achieve user goal retrieving information interacting product via command-line interface script make intelligent decisions action take every time expect operation completed results stored local variable called expect_out allows script harvest information feedback user also allows conditional behavior send next based circumstances common use expect set testing suite whether programs utilities embedded systems dejagnu testing suite written using expect use testing used extensively testing gcc well suited testing remote targets embedded development one automate generation expect script using tool called 'autoexpect tool observes actions generates expect script using heuristics though generated code may large somewhat cryptic one always tweak generated script get exact code spawn telnet remote_server expect username send my_user_id\r expect password send my_password\r expect send my_command\r expect set results expect_out buffer send exit\r expect eof another example script automates ftp set timeout -1 spawn ftp remote_server expect username send my_user_id\r expect password send my_password\r expect ftp send bin\r expect ftp send prompt\r expect ftp send mget *\r expect ftp send bye\r expect eof example automates sftp password proc connect passw set user lindex argv 0 set passw lindex argv 1 set host lindex argv 2 set location lindex argv 3 set file1 lindex argv 4 set file2 lindex argv 5 user == || passw == || host == || location == || file1 == || file2 == spawn sftp user host set rez connect passw rez == 0 puts \nerror connecting server host user user password passw \n exit 1 using passwords command-line arguments like example huge security hole user machine read password running ps however add code prompt password rather giving password argument secure see example stty -echo send_user -- enter password expect_user -re \n send_user \n stty echo set pass expect_out 1 string another example automated ssh login user machine set timeout 60 spawn ssh user machine 1 wait close spawn_id various projects implement expect-like functionality languages c java scala groovy perl python ruby shell go generally exact clones original expect concepts tend similar
[ 1975, 7214, 5983, 7765, 5965, 7498, 4759, 5129, 5571, 3587, 486, 5933, 6428 ]
Validation
3,533
2
LUnix:lunix lunix short little unix unix-like multi-tasking operating system designed run natively commodore 64 commodore 128 home computer systems supports tcp/ip networking slip ppp using rs232 interface unlike unix-like systems lunix written 6502 assembly language instead c. first version lunix released 1993 current version 0.21 dates 2004 amongst others supports preemptive multitasking unix pipes variety protocols like tcp/ip slip ppp rs232 dynamic memory management virtual consoles contains web server clients telnet pop3 ftp act terminal terminal server rs232 lunix developed daniel dallmann contributed ilker ficicilar stefan haubenthal paul gardner-stephen late 1990s first generation lunix support faster rs232 via clever software tricks 80 column vic vdc screen support ps/2 keyboard support small set standard unix commands possible first distribution attach two keyboards two monitors one rs232 terminal set three simultaneous multitasking sessions c128 lunix also supports 2 mhz mode boot disk convenience c128 platform lunix came extensive documentation time well-defined library calls relocatable code support decent memory management functions made possible develop software lunix easily
[ 4751, 7611, 4478, 900, 2467, 2294, 5571, 2300, 2118, 5931, 6360, 578, 6367, 336, 4447, 7765, 5880, 443, 1435 ]
Test
3,534
9
Sound_Object_(SndObj)_Library:sound object sndobj library sound object sndobj library c++ object-oriented programming library music audio development composed 100+ classes signal processing audio midi file i/o available cross-platform linux windows mac os x irix unix-like systems library development cooperative project hosted sourceforge new versions released twice-yearly development versions available via concurrent versions system cvs library also provides bindings python aka pysndobj java common lisp cffi
[ 1155, 4759, 1445, 5282, 4853, 578, 2592, 5420, 5266, 5965, 5260, 1989, 6245 ]
Validation
3,535
7
Widen_(company):widen company widen software company founded 1948 plate-engraving business developed digital print company eventually software company company founded 1948 eponymous emily arthur widen private plate engraving business focused newspaper presses 1985 company began focusing color printing scanning mid-1990s widen began investing digital printing services well software services internet developing image database system saas digital asset management company company changed name widen colourgraphics ltd. widen enterprises 1997 company headquartered monona wisconsin ranked comparably one top smes united states terms management widen ’ ceo matthew gonnering though company renamed position chief eudaimonia officer reflect philosophy management style appointed 2009 transitioned company largely prepress printing company software firm widen software focuses digital asset management houses corporate information helps develop digital projects like websites advertising cataloguing example widen ’ cloud software hosts corporate information companies like brooks running shoes widen provides services public services private companies
[]
Validation
3,536
2
Bare_machine:bare machine computer science bare machine bare metal refers computer executing instructions directly logic hardware without intervening operating system modern operating systems evolved various stages elementary present day complex highly sensitive systems incorporating many services development programmable computers require physical changes run different programs prior development operating systems sequential instructions executed computer hardware directly using machine language without system software layer approach termed bare machine precursor modern operating systems today mostly applicable embedded systems firmware generally time-critical latency requirements conventional programs run runtime system overlaid operating system pdp-11 machine allowed programmers load program supplied machine code ram resulting operation program could monitored lights output derived mag tape print devices storage bare machine programming remains common practice embedded systems microcontrollers microprocessors often boot directly monolithic single-purpose software without loading separate operating system embedded software vary structure simplest form may consist infinite main loop calling subroutines responsible checking inputs performing actions writing outputs
[ 5516, 5571, 5041, 8115, 5244, 3751, 2420, 7546, 5190 ]
Test
3,537
3
Gamebike:gamebike game bike interactive fitness bike requires user exercise order play video games user must pedal bike order character accelerate must turn handlebars steer game bike allows users control character game getting exercise game bike name interactive fitness device first invented patented edward h. ted parks m.d 2000 dr parks sold rights patent cateye co ltd japanese company expertise electronic bicycle accessories bike lights speedometers cateye initial embodiment parks design used traditional bicycle attached referred gb100 system front tire placed turn style platform used read direction sensors placed rear wheel mounted bicycle trainer measure speed cateye co ltd. first started production game bike gb100 form project handled group new jersey redesigned product single package incorporated stand-alone indoor exercise bike gb200 born immediate need commercial version soon covered introduction popular gb-300 game bike late 2008 cateye co ltd. stopped international distribution fitness line game bike production done source distributors inc. dallas texas source distributors produced bike made modifications unit improve controller serviceability game bike popular product within school ymca markets thousands bikes sold since start 2003 game bike owned hudson fitness llc game bike currently available hudson fitness llc continues supporting game bike service compatible titles include speed-based video game ps2/ps3/game cube/xbox
[]
Test
3,538
2
MK-DOS:mk-dos mk-dos one widespread operating systems elektronika bk personal computers developed mikhail korolev dmitriy butyrskiy 1in like andos system provided full compatibility models emulating bk-0010 environments modern bk-0011 bk-0011m machines program requests magnetic tape made proper rom functions redirected disk system supported 4 physical disk drives actual number limited disk rom installed many hard disk partitions number letters latin alphabet could used separate logical drives volume 32 mb see also drive letter assignment starting version 3.0 system also supported mounting disk images logical drives booted bk-0011 bk-0011m system automatically created ram disk computer memory widespread file system along mk-dos users microdos support file fragmentation like file system used rt-11 required frequent spatial reallocation maintain optimum contiguous free space rt-11 users would use 'squeeze command worked way *compact command acorn dfs bbc micro although mk-dos incompatible rt-11 file system shared many principles microdos file system read-only support andos filename length limited 14 symbols filename extension recognized separately considered part filename minimal installation system took little 8 kb computer memory functional norton commander-like file manager called mcommander also shipped number utilities including drivers rt-11 fat12 csi-dos file systems add-ons file manager
[ 1522, 861, 5571, 7718, 1288, 5140 ]
Test
3,539
2
STXIT:stxit stxit macro instruction dos/360 operating system ibm system/360 series mainframe computers successors later mainframe series also available univac series 90 mainframes running tos/dos operating system later vs/9 operating system macro abbreviation term set exit used programs written assembly language used create recovery routine event program errors similar signal handlers c try/finally blocks c++ java object oriented languages stxit macro would provide error recovery address several major types errors certain operator signals errors covered depended upon operating system general errors provided recovery included timer interrupt stxit provided mechanism sampling program execution used various legacy performance analyzers essentially psw gathered time interval used later analysis determine hot spots program check stxit provided mechanism program animation via deliberate introduction invalid opcodes fly locations target programs exit recovery entered original opcode would restored ready later resumption new location set format macro call depended upon system used upon dos/vse one two forms either macro call establish create stxit routine handle appropriate event macro call de-establish longer handle event establish stxit routine would code stxit routine completes returns point invoked via exit macro return appropriate point called unless ab routine case permitted return must issue termination macro eoj cancel detach dump de-establish cancel stxit routine would code cancel routine event everything beginning one space parameter comment z/system vse stxit functions provided previously ibm dos/vse still supported addition new stxit macro function 'disabled timer appendage die available use supervisor mode key 0 psw privilege bit =1 format die means routine handle disabled interval timer event rtnaddr address handle expiration interval timer set tod event coded address may instead specified 1 meaning address stored register 1 routine subject strict restrictions including changing register contents using svcs univac vs/9 stxit macro vs/9 parameter based missing entries entered commas e.g third item handled format would remove one handlers stxit macro re-invoked blank entry handlers removed one stxit macro call effect time class event handled omitted would two commas row indicate unhandled class event causes error handled operating system default handler events representing critical errors abend progcheck program terminated eo79 error user option request pdump non-critical events event ignored later error recovery systems would provide specifying errors explicitly opposed position parameter stxit macro univac vs/9 continued support stxit also added crtn contingency routine macro provide even powerful error recovery well recovery errors stxit capture originally crtn stxit could used together later releases operating system provided crtn stxit macro used crtn handled events covered stxit used cover event stxit routine handled event crtn routine invoked
[ 839, 861, 7331, 5571, 7142, 336 ]
Train
3,540
4
Mausezahn:mausezahn typical applications mausezahn include mausezahn allows sending arbitrary sequence bytes directly network interface card integrated packet builder provides simple command line interface complicated packets since version 0.38 mausezahn offers multi-threaded mode cisco-style command line interface version 0.38 mausezahn supports following features mausezahn sends exactly packet user specified therefore rather less suited vulnerability audits additional algorithms required detect open ports behind firewall automatically evade intrusion detection systems ids however network administrator could implement audit routines via script utilizes mausezahn creating actual packets mausezahn currently runs linux systems plans port windows operating system
[ 4382, 96, 3088, 3775, 7637, 5571, 1942, 578, 3797, 2043, 5513, 8023, 3821, 1435 ]
Test
3,541
2
AOS/VS_II:aos/vs ii aos/vs ii discontinued operating system data general 32-bit mv/eclipse computers aos/vs ii operating system released 1988 originally simply rev 8.00 aos/vs operating system however introduced new file system compatible original aos aos/vs file system also contained new features like access control list acl groups since customers want upgrade new file system invest new hardware data general agreed continue bug-fix support “ immortal ” revision aos/vs became known colloquially aos/vs “ classic ” new development would proceed aos/vs ii revision numbers rolled back 1.00 vs-classic rev 7.7x vs-ii rev 3.2x updated survive year 2000 problem although time obsolescent among new features part aos/vs ii full tcp/ip stack nfs support expanded kernel address space using ring-1 logical disk-level user data cache /vs classic file system metadata cache user data cache
[ 64, 6206, 5571, 5932 ]
Test
3,542
1
Apache_Cassandra:apache cassandra apache cassandra free open-source distributed wide column store nosql database management system designed handle large amounts data across many commodity servers providing high availability single point failure cassandra offers robust support clusters spanning multiple datacenters asynchronous masterless replication allowing low latency operations clients avinash lakshman one authors amazon dynamo prashant malik initially developed cassandra facebook power facebook inbox search feature facebook released cassandra open-source project google code july 2008 march 2009 became apache incubator project february 17 2010 graduated top-level project facebook developers named database trojan mythological prophet cassandra classical allusions curse oracle releases graduation include cassandra introduced cassandra query language cql cql simple interface accessing cassandra alternative traditional structured query language sql cql adds abstraction layer hides implementation details structure provides native syntaxes collections common encodings language drivers available java jdbc python dbapi2 node.js helenus go gocql c++ example keyspace creation including column family cql 3.0 gives cassandra 1.0 cassandra row level consistent meaning inserts updates table affect row processed approximately time may affect non-key columns inconsistent ways one update may affect one column another affects resulting sets values within row never specified intended cassandra 1.1 solved issue introducing row-level isolation tombstones known cause performance degradation severe consequence levels cassandra wide column store essentially hybrid key-value tabular database management system data model partitioned row store tunable consistency rows organized tables first component table primary key partition key within partition rows clustered remaining columns key columns may indexed separately primary key tables may created dropped altered run-time without blocking updates queries cassandra joins subqueries rather cassandra emphasizes denormalization features like collections column family called table since cql 3 resembles table rdbms relational database management system column families contain rows columns row uniquely identified row key row multiple columns name value timestamp unlike table rdbms different rows column family share set columns column may added one multiple rows time key cassandra corresponds value object key values columns columns grouped together sets called column families thus key identifies row variable number elements column families could considered tables table cassandra distributed multi dimensional map indexed key furthermore applications specify sort order columns within super column simple column family cassandra java-based system managed monitored via java management extensions jmx jmx-compliant nodetool utility instance used manage cassandra cluster adding nodes ring draining nodes decommissioning nodes nodetool also offers number commands return cassandra metrics pertaining disk usage latency compaction garbage collection since cassandra 2.0.2 2013 measures several metrics produced via dropwizard metrics framework may queried via jmx using tools jconsole passed external monitoring systems via dropwizard-compatible reporter plugins according db-engines ranking cassandra popular wide column store september 2014 became 9th popular database
[ 4303, 5728, 7896, 6821, 5054, 6461, 5408, 7924, 1491, 5075, 6137, 5780, 1511, 4742, 5455, 7238, 1564, 5141, 840, 3031, 4439, 5863, 5874, 2700, 8062, 894, 901, 2741, 6628, 917, 5571, 5228, 3463, 1286, 2760, 7379, 5239, 3479, 2054, 2776, ...
Test
3,543
9
Adobe_ColdFusion:adobe coldfusion adobe coldfusion commercial rapid web-application development platform created j. j. allaire 1995 programming language used platform also commonly called coldfusion though accurately known cfml coldfusion originally designed make easier connect simple html pages database version 2 1996 became full platform included ide addition full scripting language one distinguishing features coldfusion associated scripting language coldfusion markup language cfml cfml compares scripting components asp jsp php purpose features tag syntax closely resembles html script syntax resembles javascript coldfusion often used synonymously cfml additional cfml application servers besides coldfusion coldfusion supports programming languages cfml server-side actionscript embedded scripts written javascript-like language known cfscript originally product allaire released july 2 1995 coldfusion developed brothers joseph j. allaire jeremy allaire 2001 allaire acquired macromedia turn acquired adobe systems inc 2005 coldfusion often used data-driven websites intranets also used generate remote services rest services websockets soap web services flash remoting especially well-suited server-side technology client-side ajax coldfusion also handle asynchronous events sms instant messaging via gateway interface available coldfusion mx 7 enterprise edition coldfusion provides number additional features box main features include implementations cfml offer similar enhanced functionality running .net environment image manipulation engine written c featured among things built-in scripting language cfscript plugin modules written java syntax similar html equivalent html element coldfusion tag begins letters cf followed name indicative tag interpreted html e.g cfoutput begin output variables content addition cfscript plugins described cfstudio provided design platform wysiwyg display addition coldfusion cfstudio also supports syntax languages popular backend programming perl addition making backend functionality easily available non-programmer version 4.0 forward particular integrated easily apache web server internet information services versions coldfusion prior 6.0 written using microsoft visual c++ meant coldfusion largely limited running microsoft windows although allaire successfully port coldfusion sun solaris starting version 3.1 allaire company sold macromedia macromedia sold adobe earlier versions robust versions available version 4.0 forward release coldfusion mx 6.0 engine re-written java supported runtime environment easily replaced configuration options runtime environment sun version 6.1 included ability code debug shockwave flash version 3.1 brought port sun solaris operating system cold fusion studio gained live page preview html syntax checker cold fusion moniker renamed simply coldfusion possibly distinguish cold fusion theory version 4.5 brought ability natively invoke java objects execute system commands talk directly java ee server first release macromedia allaire corporation acquisition last legacy coded specific platform january 16 2001 allaire announced pending merger macromedia macromedia continued development released product name coldfusion 5.0 retained name coldfusion remainder version 5 releases prior 2000 edwin smith allaire architect jrun later flash player initiated project codenamed neo project later revealed coldfusion server re-written completely using java made portability easier provided layer security server ran inside java runtime environment june 2002 macromedia released version 6.0 product slightly different name coldfusion mx allowing product associated macromedia brand original branding coldfusion mx completely rebuilt ground based java ee platform coldfusion mx also designed integrate well macromedia flash using flash remoting release coldfusion mx cfml language api released oop interface release coldfusion 7.0 february 7 2005 naming convention amended rendering product name macromedia coldfusion mx 7 codename cfmx7 blackstone cfmx 7 added flash-based xforms-based web forms report builder output adobe pdf well flashpaper rtf excel adobe pdf output also available wrapper html page converting page quality printable document enterprise edition also added gateways provide interaction non-http request services im services sms directory watchers asynchronous execution xml support boosted version include native schema checking coldfusion mx 7.0.1 codename merrimack added support mac os x improvements flash forms rtf support cfreport new cfcproxy feature java/cfc integration coldfusion mx 7.0.2 codenamed mystic included advanced features working adobe flex 2 well improvements cf report builder july 30 2007 adobe systems released coldfusion 8 dropping mx name beta testing codename used scorpio eighth sign zodiac eighth iteration coldfusion commercial product 14,000 developers worldwide active beta process many testers 5,000 adobe systems originally expected coldfusion development team consisted developers based newton/boston massachusetts offshore bangalore india new features cfpdfform tag enables integration adobe acrobat forms image manipulation functions microsoft .net integration cfpresentation tag allows creation dynamic presentations using adobe acrobat connect web-based collaboration solution formerly known macromedia breeze addition coldfusion administrator enterprise version ships built-in server monitoring coldfusion 8 available several operating systems including linux mac os x windows server 2003 additions coldfusion 8 built-in ajax widgets file archive manipulation cfzip microsoft exchange server integration cfexchange image manipulation including automatic captcha generation cfimage multi-threading per-application settings atom rss feeds reporting enhancements stronger encryption libraries array structure improvements improved database interaction extensive performance improvements pdf manipulation merging capabilities cfpdf interactive debugging embedded database support apache derby ecmascript compliant cfscript development coldfusion applications several tools available primarily adobe dreamweaver cs4 macromedia homesite 5.x cfeclipse eclipse others tag updaters available applications update support new coldfusion 8 features coldfusion 9 codenamed centaur released october 5 2009 new features cf9 include coldfusion 10 codenamed zeus released may 15 2012 new improved features available editions standard enterprise developer include limited additional new improved features coldfusion enterprise developer editions include limited lists obtained adobe web site pages describing new features listed first links following list cf10 originally referred codename zeus first confirmed coming adobe adobe max 2010 much prerelease period also commonly referred coldfusion next coldfusion x blogs twitter etc. adobe finally confirmed would coldfusion 10 much 2010 coldfusion product manager adam lehman toured us setting countless meetings customers developers user groups formulate master blueprint next feature set september 2010 presented plans adobe given full support approval upper management first public beta coldfusion 10 released via adobe labs 17 february 2012 coldfusion 11 codenamed splendor released april 29 2014 new improved features available editions standard enterprise developer include coldfusion 11 also removed many features previously identified simply deprecated longer supported earlier releases example cflog tag long offered date time attributes deprecated redundant date time always logged cf11 use would cause cflog tag fail adobe coldfusion 2016 release codenamed raijin also known generically coldfusion 2016 released february 16 2016 new improved features available editions standard enterprise developer include adobe coldfusion 2018 release known generically coldfusion 2018 released july 12 2018 coldfusion 2018 codenamed aether prerelease new improved features available editions standard enterprise developer include august 13 2012 adobe announced new roadmap coldfusion including code names splendor thunder dazzle next two release versions adobe announced new features coldfusion including limited mobile streamlined mobile application development revamped new pdf functionalities enabling enterprise easily integrate social media streams enterprise mobility support responsive multi screen content digital marketing – web mobile social analytics customizable enterprise video portal adobe also announced roadmap upcoming cloud enhancements roadmap projects coldfusion development year 2021 coldfusion generate pdf documents using standard html i.e additional coding needed generate documents print cfml authors place html css within pair cfdocument tags new coldfusion 11 cfhtmltopdf tags generated document either saved disk sent client browser coldfusion 8 introduced also cfpdf tag allow control pdf documents including pdf forms merging pdfs tags however use adobe pdf engine cfdocument uses combination commercial jpedal java pdf library free open source java library itext cfhtmltopdf uses embedded webkit implementation coldfusion originally object-oriented programming language like php versions 3 coldfusion falls category oo languages support multiple inheritance along java smalltalk etc. mx release 6+ coldfusion introduced basic oo functionality component language construct resembles classes oo languages component may contain number properties methods one component may also extend another inheritance components support single inheritance object handling feature set performance enhancing occurred subsequent releases release coldfusion 8 java-style interfaces supported coldfusion components use file extension cfc differentiate coldfusion templates .cfm component methods may made available web services additional coding configuration required method access declared 'remote coldfusion automatically generates wsdl url component manner nowiki http //path/to/components/component.cfc wsdl /nowiki aside soap services offered flash remoting binary format methods declared remote may also invoked via http get post request consider get request shown br invoke component search function passing query strict arguments type invocation well-suited ajax-enabled applications coldfusion 8 introduced ability serialize coldfusion data structures json consumption client coldfusion server automatically generate documentation component navigate url insert appropriate code within component declarations application component introspection available developers coldfusion components access component documentation requires password developer view documentation components known coldfusion server navigating coldfusion url interface resembles javadoc html documentation java classes coldfusion provides several ways implement custom markup language tags i.e included core coldfusion language especially useful providing familiar interface web designers content authors familiar html imperative programming traditional common way using cfml standard cfml page interpreted tag tag name corresponding file name prefixed cf_ example file imap.cfm used tag cf_imap attributes used within tag available attributes scope tag implementation page cfml pages accessible directory calling page via special directory coldfusion web application via cfimport tag calling page latter method necessarily require cf_ prefix tag name second way developments cfx tags using java c++ cfx tags prefixed cfx_ example cfx_imap tags added coldfusion runtime environment using coldfusion administrator jar dll files registered custom tags finally coldfusion supports jsp tag libraries jsp 2.0 language specification jsp tags included cfml pages using cfimport tag standard coldfusion installation allows deployment coldfusion war file ear file deployment standalone application servers macromedia jrun ibm websphere coldfusion also deployed servlet containers apache tomcat mortbay jetty platforms officially support coldfusion leave many features inaccessible coldfusion 10 macromedia jrun replaced apache tomcat coldfusion java ee application coldfusion code mixed java classes create variety applications use existing java libraries coldfusion access underlying java classes supports jsp custom tag libraries access jsp functions retrieving jsp page context getpagecontext prior coldfusion 7.0.1 coldfusion components could used java .net declaring web services however beginning coldfusion mx 7.0.1 coldfusion components used directly within java classes using cfcproxy class recently much interest java development using alternate languages jython groovy jruby coldfusion one first scripting platforms allow style java development coldfusion 8 natively supports .net within cfml syntax coldfusion developers simply call .net assembly without needing recompile alter assemblies way data types automatically translated coldfusion .net example .net datatable → coldfusion query unique feature java ee vendor coldfusion 8 offers ability access .net assemblies remotely proxy without use .net remoting allows coldfusion users leverage .net without installed windows operating system acronym coldfusion markup language cfml coldfusion templates saved disk traditionally given extension .cfm .cfml .cfc extension used coldfusion components original extension dbm dbml stood database markup language talking coldfusion users use acronym cf used numerous coldfusion resources user groups cfugs sites cfmx common abbreviation coldfusion versions 6 7 a.k.a coldfusion mx coldfusion originated proprietary technology based web technology industry standards however becoming less closed technology availability competing products alternative products include alphabetical order argument made coldfusion even less platform-bound raw java ee .net simply coldfusion run top .net app server new atlanta top servlet container java ee application server jrun websphere jboss geronimo tomcat resin server jetty web server etc. theory coldfusion application could moved unchanged java ee application server .net application server march 2013 known issue affecting coldfusion 8 9 10 left national vulnerability database open attack vulnerability identified patch released adobe cf9 cf10 january april 2013 coldfusion vulnerability blamed linode intrusion linode manager control panel website security bulletin hotfix issued adobe week earlier may 2013 adobe identified another critical vulnerability reportedly already exploited wild targets recent versions coldfusion servers web-based administrator api locked vulnerability allows unauthorized users upload malicious scripts potentially gain full control server security bulletin hotfix issued adobe 6 days later april 2015 reported cross-site scripting xss vulnerability adobe coldfusion 10 update 16 coldfusion 11 update 5 allowed remote attackers inject arbitrary web script html however exploitable users authenticated administration panel
[ 6412, 1819, 7892, 6095, 3290, 404, 417, 54, 7582, 7943, 439, 3684, 4759, 103, 6172, 4773, 6191, 6908, 5490, 5863, 7689, 7315, 6594, 7333, 3772, 7347, 6270, 6986, 5571, 5575, 578, 2752, 2040, 933, 2054, 3135, 4535, 2807, 3168, 2451, 5631...
Validation
3,544
3
Adaptive_Domain_Environment_for_Operating_Systems:adaptive domain environment operating systems adeos adaptive domain environment operating systems nanokernel hardware abstraction layer hal hypervisor operates computer hardware operating system runs distinct nanokernels low level layer outer kernel instead intended run several kernels together makes similar virtualization technologies adeos provides flexible environment sharing hardware resources among multiple operating systems among multiple instances single os thereby enabling multiple prioritized domains exist simultaneously hardware adeos successfully inserted beneath linux kernel opening range possibilities smp clustering efficient virtualization patchless kernel debugging real-time systems linux unusually among hals adeos loaded linux loadable kernel module allow another os run along fact adeos developed context rtai real-time application interface modularize separate hal real-time kernel two categories existing solutions enable multiple operating systems run system first simulation-based provides virtual environment run additional operating systems second suggests usage nanokernel layer enable hardware sharing simulation category tools vmware plex86 virtualpc simos also kvm similar adeos rt requires specific virtualization hardware support solutions used users desire run applications foreign base os provide control whatsoever base os user simulation never meant used production environment nanokernel category tools space cache kernel exokernel suggest building miniature hardware management facilities thereafter used build production operating systems problem approach address issue currently existing operating systems user base adeos addresses requirements categories application providing simple layer inserted unmodified running os thereafter provides required primitives mechanisms allow multiple oses share hardware environment adeos attempt impose restrictions hardware ’ usage different oses necessary adeos ’ operation instead actual restriction imposed system administrator system programmer exposes system mismanagement idea behind adeos give back control system administrators programmers adeos implements queue signals time peripheral sends signal different operating systems running machine awakened turn must decide accept handle ignore discard terminate signal signals handled discarded os passed next os chain signals terminated propagated latter stages adeos ensure equal trusted access hardware takes control hardware commands issued different oses also must intrude much different oses ’ normal behavior os encompassed domain total control domain may include private address space software abstractions process virtual memory file-systems etc adeos attempt impose policy usage hardware except needed survival task determining policy left system architect adeos uses interrupt pipe propagate interrupts different domains running hardware domains may prefer first receive hardware interrupts adeos provides mechanism domains access priority interrupt dispatching effect adeos places requesting domain interrupt handler accompanying tables may called interrupt mechanism space terminology first stages interrupt pipeline domains control whether accept ignore discard terminate interrupts different effect controlled differently accepting interrupts normal state domain interrupt mechanism adeos encounters domain accepting interrupts summons interrupt handler set required cpu environment stack content interrupt handler operate correctly os may decide operate number operations including task scheduling os done pipeline proceeds planned propagating interrupts pipeline os domain want interrupted reason asks adeos stall stage domain occupies interrupt pipeline interrupts go pipeline stalled stage occupied domain os done wanting uninterrupted asks adeos install pipeline thereafter interrupts stalled corresponding stage follow route stages pipeline domain discarding interrupts interrupt passes stage occupied domain continues onto stages domain terminates interrupts interrupts terminated propagated latter stages interrupt discarding termination possible os domain recognizes adeos since oses recognize adeos possible create domain serves handler os hence interrupt pipeline stage always precedes handled domain stage may take actions domain adeos order provide handled domain os illusion normal system operation adeos done traversing pipeline checks domains dormant case calls idle task task remains active occurrence next interrupt domains n't dormant restores processor state prior interrupt entering pipeline execution continues left since adeos much hardware dependent many details specific one particular implementations general-purpose operating system resource sharing one main objectives adeos provide environment enables multiple general purpose oses share hardware developing oses usually complicated process sometimes requires extra hardware in-circuit emulators probe hardware os running using adeos os development eased since undesired behavior may controlled appropriate domain handler also provide default domain handler os development developers may controlled direct access hardware meant control adeos kernel-module development domain handlers may developed independently adeos adeos provides way kernel debuggers probers take control linux without modifying linux adeos domains facilities would load normal kernel modules would thereafter request ring-zero domain adeos done may request priority interrupt dispatching interrupt pipeline hence linux gets handle interrupts able intercept interrupts carry requested debugging tasks also extended performance profilers development tools
[ 3761, 4293, 4295, 2182, 5275, 5904, 5021, 4399, 1547, 4498, 7357, 7823, 5571, 5396, 578, 6634, 6731, 7550, 7554, 3978, 1959, 6921, 5064, 5244, 4175, 6385, 1050, 7312, 3751, 7775, 5884 ]
Test
3,545
4
NeDi:nedi nedi open source software tool discovers maps inventories network devices tracks connected end-nodes contains lot features user-friendly gui managing enterprise networks example mac address mapping/tracking traffic error graphing uptime monitoring correlate collected syslog trap messages customizable notification drawing network maps extensive reporting features device software poe usage disabled interfaces link errors switch usage many modular architecture allows simple integration tools example cacti graphs created purely based discovered information due nedi versatility things like printer resources monitored well development started 2001 paul scherrer institute remo rickli released public gpl2 2003 next decade nedi grew reasonable network management suite help community partners 2014 remo rickli founded nedi consulting providing commercial support development around nedi since major update released every year e.g 1.5 2015 access latest version bought support yearly subscription basis last year version released public gpl3 premium modules included free community edition
[ 5983, 2451 ]
Test
3,546
4
Dialed_Number_Identification_Service:dialed number identification service dialed number identification service dnis service sold telecommunications companies corporate clients identifies originally dialed telephone number inbound call client may use information call routing internal destinations activation special call handling dnis service telephone company sends sequence typically four ten digits call setup direct inward dial service also provides dnis example company may different toll-free telephone number product line sells multilingual customer support call center handling calls multiple product lines corporate telephone system receives call analyzes dnis signaling may play appropriate recorded greeting interactive voice response ivr systems dnis used routing information dispatching purposes determine script service activated based number dialed reach ivr platform dnis commonly provided 800 900 services
[ 5714, 7813 ]
Test
3,547
9
Domain-specific_entertainment_language:domain-specific entertainment language domain-specific entertainment languages group domain-specific languages used describe computer games environments potentially used entertainment video music
[ 4995, 7853 ]
Test
3,548
5
Firefox_3.6:firefox 3.6 mozilla firefox 3.6 version firefox web browser released january 2010 release main improvement firefox 3.5 improved performance due speed improvements tracemonkey javascript engine uses gecko 1.9.2 engine compared 1.9.1 ff 3.5 improves compliance web standards codenamed namoroka version support x bitmap images dropped release marked beginning new development cycle firefox well receiving major updates browser also received minor updates new features allow users receive new features quickly dawn new roadmap reflected changes superseded firefox 4 released next year although ff 3.6 prolonged period use version 4 noted user interface changes firefox 3.6 last major version official firefox release run powerpc-based macintoshes see tenfourfox much-more-recent version firefox powerpc-based computers running mac os x soon 4 much less weight given major version numbers 6 numbers used september year 4 5 6 7 8 9 compared 3 nearly decade firefox development 1 2 3 firefox versions 4 9 reached end-of-life status mozilla continued supporting firefox 3.6 security updates coinciding proposal cater enterprise users optional extended support releases beginning 2012 based upon firefox 10 mozilla discontinued support firefox 3.6 april 24 2012 automatic update firefox 12 pushed compatible devices june 2012 development version started december 1 2008 first alpha version 3.6 released august 7 2009 first beta version released october 30 followed beta 2 november 10 beta 3 november 17 beta 4 november 26 beta 5 december 17 release candidate 1 released january 8 2010 followed release candidate 2 january 17 final version released january 21 2010 firefox 3.6.2 released march 23 2010 followed version 3.6.3 april 1 closed bugs aslr dep handling found pwn2own contest 2010 firefox developers created new feature called lorentz named lorentz national park preview version lorentz firefox 3.6.3plugin1 made available april 8 2010 betas firefox 3.6.4 made available starting april 20 2010 firefox 3.6.4 released june 22 2010 windows linux versions incorporate out-of-process plug-ins oopp isolates execution plug-ins adobe flash apple quicktime microsoft silverlight default separate process significantly reduces number firefox crashes experienced users watching online videos playing games user simply refresh page continue mozilla states 30 browser crashes caused third-party plugins support plug-ins default oopp mac os x platform become available firefox 4 firefox 3.6.6 lengthens amount time plug-in allowed unresponsive point plug-in quits firefox 3.6.7 security stability update fixed several issues firefox 3.6.8 security update released mere three days 3.6.7 fix another security fault firefox 3.6.9 addition fixing security stability issues introduced support codice_1 http response header help prevent clickjacking firefox 3.6.10 security stability update fixed several issues firefox 3.6.11 security stability update fixed several issues firefox 3.6.12 security update fixed critical security issue firefox 3.6.13 security stability update fixed several issues firefox 3.6.14 security stability update fixed several issues firefox 3.6.15 stability update fixed java applets issue firefox 3.6.16 security update blacklisted invalid https certificates firefox 3.6.17 security stability update fixed several issues firefox 3.6.18 security stability update fixed several issues firefox 3.6.19 stability update fixed several issues firefox 3.6.20 security stability update fixed several issues firefox 3.6.21 security update blacklisted compromised https certificate firefox 3.6.22 security update revoked ssl certificates staten der nederlanden due fraudulent ssl certificate issuance well fixing error .gov.uk domain names firefox 3.6.23 security stability update fixed several issues firefox 3.6.24 security stability update fixed several issues firefox 3.6.25 security stability update fixed several issues firefox 3.6.26 security stability update fixed several issues firefox 3.6.27 security update fixed several issues firefox 3.6.28 security stability update fixed several issues new features firefox 3.6 include mozilla discontinued support firefox 3.6 april 24 2012 27 months support made longest supported version firefox even longer firefox 2 26 months total support underlying gecko 1.9.2 engine continued used updates camino
[ 4655, 6802, 5378, 2205, 7537, 6809, 393, 1471, 3291, 2574, 3635, 6452, 6458, 4352, 4725, 1136, 7587, 2261, 84, 445, 1152, 4755, 4759, 7975, 7628, 5821, 5127, 1190, 3383, 8006, 5506, 3043, 1970, 6221, 520, 3057, 3060, 3412, 5887, 5542, 8...
Test
3,549
4
Generally_Accepted_Privacy_Principles:generally accepted privacy principles generally accepted privacy principles gapp framework intended assist chartered accountants certified public accountants creating effective privacy program managing preventing privacy risks framework developed joint consultation canadian institute chartered accountants cica american institute certified public accountants aicpa aicpa/cica privacy task force gapp framework previously known aicpa/cica privacy framework founded single privacy principle personally identifiable information must collected used retained disclosed compliance commitments entity privacy notice criteria set gapp issued aicpa/cica privacy objective supported ten main principles seventy objectives associated measurable criteria privacy defined generally accepted privacy principles rights obligations individuals organizations respect collection use retention disclosure disposal personal information
[]
Test
3,550
3
National_Interop:national interop national interop systems integration company earliest experience radio ip technologies deployed public safety communications company founded public safety personnel one principals company testified u.s. senate 2007 applicability radio ip roip alternative expensive statewide interoperable radio systems proposed funding federal government costs us 1b per state company designed implemented roip-powered system air evac lifeteam spanning 14 states 80+ radio towers 24x7 9-1-1 type dispatch center well numerous smaller roip systems national interop works roip technologies may best suited particular public safety application
[]
Validation
3,551
4
Windows_Live_OneCare:windows live onecare windows live onecare previously windows onecare live codenamed a1 computer security performance enhancement service developed microsoft windows core technology onecare multi-platform rav reliable anti-virus microsoft purchased gecad software srl 2003 subsequently discontinued software available annual paid subscription could used three computers 18 november 2008 microsoft announced windows live onecare would discontinued 30 june 2009 instead offering users new free anti-malware suite called microsoft security essentials available however virus definitions support onecare would continue subscription expires end-of-life announcement microsoft noted windows live onecare would upgraded work windows 7 would also work windows xp mode windows live onecare entered beta state summer 2005 managed beta program launched public beta located betaplace microsoft former beta delivery system 31 may 2006 windows live onecare made official debut retail stores united states beta version windows live onecare 1.5 released early october 2006 microsoft version 1.5 released manufacturing 3 january 2007 made available public 30 january 2007 4 july 2007 beta testing started version 2.0 final version released 16 november 2007 microsoft acquired komoku 20 march 2008 merged computer security software windows live onecare windows live onecare 2.5 build 2.5.2900.28 final released 3 july 2008 day microsoft also released windows live onecare server 2.5 windows live onecare features integrated anti-virus personal firewall backup utilities tune-up utility integrated functionality windows defender malware protection future addition registry cleaner considered added significant customer advantages functionality version 2 added features multi-pc home network management printer sharing support start-time optimizer proactive fixes recommendations monthly reports centralized backup online photo backup windows live onecare built ease-of-use designed home users onecare also attempts minimal interface lessen user confusion resource use adds icon notification area tells user glance status system health using three alert colors green good yellow fair red risk version 1.5 onecare compatible 32 bit versions windows xp windows vista version 2 onecare supports 64 bit compatibility vista version 2.5 microsoft released windows live onecare server supports windows server 2008 standard 64-bit windows small business server 2008 standard premium editions edition onecare operates safe mode windows live onecare support windows 7 development discontinued replaced microsoft security essentials windows live onecare requires users activate product wish continue using free trial period 90 days valid windows live id product activated grey message bar top program disappears subscription remains active 1 year date activation windows live onecare require operating system checked windows genuine advantage windows live onecare protection plus security component onecare suite consists three parts windows live onecare 1.5 onwards also monitors internet explorer 7 8 security settings ensures automatic website checking feature phishing filter enabled windows live onecare performance plus component performs monthly pc tune-up related tasks windows live onecare backup restore component aids backing important files files backed various recordable media external hard disks cds dvds restoring files entirety subset also restored networked computer long running onecare well backup restore component supports backup software features incremental backups scheduling windows live onecare criticized users competing security software companies microsoft acquisition gecad rav core technology onecare subsequent discontinuation product deprived gnu/linux platform others one leading virus scanning tools e-mail servers bringing microsoft ultimate intentions question 26 january 2006 windows live onecare criticized foundstone division competing mcafee anti-virus integrated firewall default white lists allow java applications digitally signed software bypass user warnings since neither applications carry assurances security flaws written malicious intent microsoft since responded criticism justifying decision java applications widely used third party applications popular trusted program among users highly unusual malware signed windows live onecare also criticized lack adherence industry firewall standards concerning intrusion detection tests conducted agnitum developers outpost firewall shown onecare failing detect trojans malware hijack applications already resident infected machine february 2007 first windows vista anti-virus product testing virus bulletin magazine sister company sophos developers sophos anti-virus found windows live onecare failed detect 18.6 viruses fifteen anti-virus products tested pass virus bulletin vb100 test anti-virus product detect 100 viruses av-comparatives also released results placed windows live onecare last testing seventeen anti-virus products response jimmy kuo microsoft security research response msrr team pledged add truly important actively spread malware soon possible test detection numbers get better better malware par majors arena also expressed confidence improvements soon majors need catch us april 2008 windows live onecare passed vb100 test windows vista sp1 business edition august 2008 windows live onecare placed 14th 16 anti-virus products on-demand virus detection rates hand may 2009 windows live onecare placed 2nd proactive/retrospective performance test conducted av-comparatives av-comparatives.org test issuer denotes false alarms good achievement publisher also points false positives cause much harm genuine infections furthermore anti-virus scanners prone false alarms essentially achieve higher detection scores
[ 1809, 5378, 385, 7536, 3962, 6107, 3637, 6456, 7564, 6149, 7597, 4759, 806, 2296, 496, 7275, 1571, 3394, 6560, 7289, 4091, 7682, 7683, 6235, 6951, 875, 179, 6962, 1249, 1620, 4492, 7351, 4138, 2746, 5571, 5227, 578, 8100, 6289, 1291, 77...
Train
3,552
4
Non-interference_(security):non-interference security non-interference strict multilevel security policy model first described goguen meseguer 1982 amplified 1984 simple terms computer modeled machine inputs outputs inputs outputs classified either low low sensitivity highly classified high sensitive viewed uncleared individuals computer non-interference property sequence low inputs produce low outputs regardless high level inputs low uncleared user working machine respond exactly manner low outputs whether high cleared user working sensitive data low user able acquire information activities high user let formula_1 memory configuration let formula_2 formula_3 projection memory formula_1 low high parts respectively let formula_5 function compares low parts memory configurations i.e. formula_6 iff formula_7 let formula_8 execution program formula_9 starting memory configuration formula_1 terminating memory configuration formula_11 definition non-interference deterministic program formula_9 following formula_13 strict policy computer system covert channels may comply say bell–lapadula model comply non-interference reverse could true reasonable conditions system labelled files etc except classified information startup exceptions noted however non-interference shown stronger non-deducibility strictness comes price difficult make computer system property may one two commercially available products verified comply policy would essentially simple switches one-way information filters although could arranged provide useful behaviour computer time=0 high i.e. classified information within low users create high information subsequent time=0 so-called write-up allowed many computer security policies computer legally leak high information low user still said comply non-interference policy low user able learn anything high user activities learn high information created means actions high users von oheimb 2004 computer systems comply bell-lapadula model suffer problem since explicitly forbid read-up consequently computer system complies non-interference necessarily comply bell-lapadula model thus bell–lapadula model non-interference model incomparable bell-lapadula model stricter regarding read-up non-interference model stricter respect covert channels legitimate multilevel security activities treat individual data records e.g. personal details sensitive allow statistical functions data e.g. mean total number released widely achieved non-interference machine
[ 2557, 3122, 6310, 2774, 7090 ]
Test
3,553
1
Recursive_join:recursive join recursive join operation used relational databases also sometimes called fixed-point join compound operation involves repeating join operation typically accumulating records time repetition makes change results compared results previous iteration example database family relationships searched record person mother father fields recursive join would one way retrieve person known ancestors first person direct parents records would retrieved parents information would used retrieve grandparents records new records found example many real cases repetition involves single database table specifically recursive self-join recursive joins time-consuming unless optimized indexing addition extra key fields techniques recursive joins highly characteristic hierarchical data therefore become serious issue xml data xml operations determining whether one element contains another extremely common recursive join perhaps obvious way implement xml data stored relational database standard way define recursive joins standard way recursive common table expressions database management systems support recursive ctes include microsoft sql server oracle postgresql others
[ 7213, 7715, 7067, 5956 ]
Test
3,554
6
Romeo_file_system:romeo file system romeo extension iso 9660 file system optical media cd-roms developed adaptec allows use long filenames 128 characters however romeo backwards compatible iso 9660 discs authored using file system read windows 9x windows nt platforms thus allowing exchange files operating systems non-roman characters involved arabic japanese cyrillic example ü becomes ³
[ 5384, 1254, 3672, 5128, 5656, 6256, 3903 ]
Test
3,555
5
Gordano_Messaging_Suite:gordano messaging suite gms gms commercial mail groupware server developed gordano ltd runs windows linux solaris aix originally called ntmail first commercially available mail windows platform products rebranded gordano messaging suite august 2002 reflect support additional hardware platforms operating systems features gms include encrypted access using ssl anti-virus anti-spam protection over-the-air handheld synchronization web based webmail calendaring interfaces plugin microsoft outlook allowing microsoft exchange style functionality administration performed web browser using http native support full groupware features exists clients reviews version 15
[ 1544, 333, 1950, 7154, 46, 4759, 5571, 8034, 352, 4101, 6908, 578, 293, 3135, 971 ]
Test
3,556
9
Matt_Kaufmann:matt kaufmann matt kaufmann senior research scientist department computer sciences university texas austin united states recipient 2005 acm software system award along robert s. boyer j strother moore work boyer-moore theorem prover
[ 8025, 7750, 6611 ]
Test
3,557
2
Position-independent_code:position-independent code computing position-independent code pic position-independent executable pie body machine code placed somewhere primary memory executes properly regardless absolute address pic commonly used shared libraries library code loaded location program address space overlap uses memory example shared libraries pic also used older computer systems lacking mmu operating system could keep applications away even within single address space mmu-less system position-independent code executed memory address without modification differs absolute code must loaded specific location function correctly load-time locatable ltl code linker program loader modifies program execution run particular memory location generating position-independent code often default behavior compilers may place restrictions use language features disallowing use absolute addresses position-independent code use relative addressing instructions refer directly specific memory addresses sometimes execute faster replacing equivalent relative-addressing instructions may result slightly slower execution although modern processors make difference practically negligible early computers ibm 701 april 29 1952 ibm system/360 april 7 1964 code position-dependent program built loaded run particular address multitasking operating system allowed multiple jobs run using separate programs time operations scheduled two concurrent jobs would run programs required load addresses example payroll program accounts receivable program built run address 32k could run time ibm dos/360 1966 ability relocate programs loading sometimes multiple versions program maintained built different load address special class programs called self-relocating programs coded relocate loading ibm os/360 1966 relocated executable programs loaded memory one copy program required loaded program could moved way comparison early segmented systems burroughs mcp burroughs b5000 1961 multics 1964 paging systems ibm tss/360 1967 base bounds systems gecos ge 625 exec univac 1107 code inherently position-independent since addresses program relative current segment rather absolute position-independent code developed eliminate restrictions non-segmented systems position-independent program could loaded address memory invention dynamic address translation function provided mmu originally reduced need position-independent code every process could independent address space range addresses however multiple simultaneous jobs using code created waste physical memory two jobs run entirely identical programs dynamic address translation provides solution allowing system simply map two different jobs address 32k bytes real memory containing single copy program different programs may share common code example payroll program accounts receivable program may contain identical sort subroutine shared module shared library form shared module gets loaded mapped two address spaces procedure calls inside shared library typically made small procedure linkage table stubs call definitive function notably allows shared library inherit certain function calls previously loaded libraries rather using versions data references position-independent code usually made indirectly global offset tables gots store addresses accessed global variables one got per compilation unit object module located fixed offset code although offset known library linked linker links modules create shared library merges gots sets final offsets code necessary adjust offsets loading shared library later position independent functions accessing global data start determining absolute address got given current program counter value often takes form fake function call order obtain return value stack x86 special register powerpc sparc mips probably least risc processors esa/390 stored predefined standard register processor architectures motorola 68000 motorola 6809 wdc 65c816 knuth mmix arm x86-64 allow referencing data offset program counter specifically targeted making position-independent code smaller less register demanding hence efficient dynamic-link libraries dlls microsoft windows use variant e8 call instruction call near relative displacement relative next instruction instructions need fixed dll loaded global variables e.g arrays string literals virtual function tables expected contain address object data section resp code section dynamic library therefore stored address global variable needs updated reflect address dll loaded dynamic loader calculates address referred global variable stores value global variable triggers copy-on-write memory page containing global variable pages code pages global variables contain pointers code global data remain shared processes operation needs done os load dynamic library arbitrary address windows vista later versions windows relocation dlls executables done kernel memory manager shares relocated binaries across multiple processes images always relocated preferred base addresses achieving address space layout randomization aslr versions windows prior vista require system dlls prelinked non-conflicting fixed addresses link time order avoid runtime relocation images runtime relocation older versions windows performed dll loader within context process resulting relocated portions image longer shared processes handing dlls windows differs earlier os/2 procedure derives os/2 presents third alternative attempts load dlls position-independent dedicated shared arena memory maps loaded users dll able use in-memory copy multics procedure conceptually code segment linkage segment code segment contains code linkage section serves template new linkage segment pointer register 4 pr4 points linkage segment procedure call procedure saves pr4 stack loading pointer callee linkage segment procedure call uses indirect pointer pair flag cause trap first call dynamic linkage mechanism add new procedure linkage segment known segment table kst construct new linkage segment put segment numbers caller linkage section reset flag indirect pointer pair ibm s/360 time sharing system tss/360 tss/370 procedure may read-only public csect writable private prototype section psect caller loads v-constant routine general register 15 gr15 copies r-constant routine psect 19th word save area pointed gr13 dynamic loader load program pages resolve address constants first page fault position-independent executables pie executable binaries made entirely position-independent code systems run pic executables reasons used pie binaries used security-focused linux distributions allow pax exec shield use address space layout randomization prevent attackers knowing existing executable code security attack using exploits rely knowing offset executable code binary return-to-libc attacks apple macos ios fully support pie executables versions 10.7 4.3 respectively warning issued non-pie ios executables submitted approval apple app store hard requirement yet non-pie applications rejected openbsd pie enabled default architectures since openbsd 5.3 released support pie statically linked binaries executables codice_1 codice_2 directories added near end 2014 beginning fedora 23 fedora maintainers decided build packages pie enabled default ubuntu 17.10 pie enabled default across architectures gentoo new profiles support pie default android enabled support pies jelly bean removed non-pie linker support lollipop
[ 790, 1339, 5627, 6249, 4662, 4843, 6697, 6969, 4759, 7331, 7800, 3442, 5373, 4942, 1361, 1180, 5302, 4779, 6725, 5225, 1556, 5571, 578, 3635, 2403, 1198, 7096, 839, 4611, 5055, 3214, 3557, 757, 3220, 3990, 3905, 607, 5079, 5606, 6849, 1...
Test
3,558
7
Apache_Drill:apache drill apache drill open-source software framework supports data-intensive distributed applications interactive analysis large-scale datasets drill open source version google dremel system available infrastructure service called google bigquery one explicitly stated design goal drill able scale 10,000 servers able process petabytes data trillions records seconds drill apache top-level project drill supports variety nosql databases file systems including alluxio hbase mongodb mapr-db hdfs mapr-fs amazon s3 azure blob storage google cloud storage swift nas local files single query join data multiple datastores example join user profile collection mongodb directory event logs hadoop drill datastore-aware optimizer automatically restructures query plan leverage datastore internal processing capabilities addition drill supports data locality drill datastore nodes apache drill 1.9 added dynamic user defined functions apache drill 1.11 added cryptographic-related functions pcap file format support drill primarily focused non-relational datastores including apache hadoop text files nosql cloud storage following datastores supported new datastore added developing storage plugin drill schema-free json data model enables query non-relational datastores in-situ papers influenced birth design partial list
[ 7238, 894, 4303, 5728, 7805, 2741, 7444, 7896, 917, 5571, 3463, 3542, 3204, 1286, 4511, 6821, 5054, 7838, 2317, 840, 1392, 3031, 5408, 5677, 3479, 5863, 6387, 5075, 6137, 7488, 2961, 7857, 5874, 3915, 1511, 4742, 5007, 1333, 702 ]
Test
3,559
2
Package_manager:package manager package manager package-management system collection software tools automates process installing upgrading configuring removing computer programs computer operating system consistent manner package manager deals packages distributions software data archive files packages contain metadata software name description purpose version number vendor checksum list dependencies necessary software run properly upon installation metadata stored local package database package managers typically maintain database software dependencies version information prevent software mismatches missing prerequisites work closely software repositories binary repository managers app stores package managers designed eliminate need manual installs updates particularly useful large enterprises whose operating systems based linux unix-like systems typically consisting hundreds even tens thousands distinct software packages software package archive file containing computer program well necessary metadata deployment computer program source code compiled built first package metadata include package description package version dependencies packages need installed beforehand package managers charged task finding installing maintaining uninstalling software packages upon user command typical functions package management system include computer systems rely dynamic library linking instead static library linking share executable libraries machine instructions across packages applications systems complex relationships different packages requiring different versions libraries results challenge colloquially known dependency hell microsoft windows systems also called dll hell working dynamically linked libraries good package management vital systems framework system openstep attempt solving issue allowing multiple versions libraries installed simultaneously software packages specify version linked system administrators may install maintain software using tools package management software example local administrator may download unpackaged source code compile install may cause state local system fall synchronization state package manager database local administrator required take additional measures manually managing dependencies integrating changes package manager tools available ensure locally compiled packages integrated package management distributions based .deb .rpm files well slackware linux checkinstall recipe-based systems gentoo linux hybrid systems arch linux possible write recipe first ensures package fits local package database particularly troublesome software upgrades upgrades configuration files since package managers least unix systems originated extensions file archiving utilities usually either overwrite retain configuration files rather applying rules exceptions usually apply kernel configuration broken render computer unusable restart problems caused format configuration files changes instance old configuration file explicitly disable new options disabled package managers debian dpkg allow configuration installation situations desirable install packages default configuration overwrite configuration instance headless installations large number computers kind pre-configured installation also supported dpkg give users control kinds software allowing installed system sometimes due legal convenience reasons distributors side software often downloaded number software repositories user interacts package management software bring upgrade customary present user list actions executed usually list packages upgraded possibly giving old new version numbers allow user either accept upgrade bulk select individual packages upgrades many package managers configured never upgrade certain packages upgrade critical vulnerabilities instabilities found previous version defined packager software process sometimes called version pinning instance advanced package management features offer cascading package removal packages depend target package packages target package depends also removed although commands specific every particular package manager large extent translatable package managers offer similar functions arch linux pacman/rosetta wiki offers extensive overview package managers like dpkg existed early 1994 linux distributions oriented binary packages rely heavily package management systems primary means managing maintaining software mobile operating systems android linux-based ios unix-like windows phone rely almost exclusively respective vendors app stores thus use dedicated package management systems package manager often called install manager lead confusion package managers installers differences include software configuration management systems treat building software deploying software separate independent steps build automation utility typically takes human-readable source code files already computer automates process converting binary executable package computer later package manager typically running computer downloads pre-built binary executable packages internet installs however kinds tools many commonalities example dependency graph topological sorting used package manager handle dependencies binary components also used build manager handle dependency source components example many makefiles support building executables also installing codice_1 example every package manager portage sorcery homebrew etc supports converting human-readable source code binary executables installing tools maak a-a-p designed handle building deployment used either build automation utility package manager also known binary repository manager software tool designed optimize download storage binary files artifacts packages used produced software development process package managers aim standardize way enterprises treat package types give users ability apply security compliance metrics across artifact types universal package managers referred center devops toolchain common universal package managers sonatype nexus repository manager jfrog artifactory inedo proget package manager relies format metadata packages manage package managers need groups files bundled specific package manager along appropriate metadata dependencies often core set utilities manages basic installation packages multiple package managers use utilities provide additional functionality example yum relies rpm backend yum extends functionality backend adding features simple configuration maintaining network systems another example synaptic package manager provides graphical user interface using advanced packaging tool apt library turn relies dpkg core functionality alien program converts different linux package formats supporting conversion linux standard base lsb compliant .rpm packages .deb stampede .slp solaris .pkg slackware .tgz .txz .tbz .tlz packages mobile operating systems google play consumes android application package apk package format windows store uses appx xap formats google play windows store eponymous package managers nature free open source software packages similar compatible licenses available use number operating systems packages combined distributed using configurable internally complex packaging systems handle many permutations software manage version-specific dependencies conflicts packaging systems free open source software also released free open source software one typical difference package management proprietary operating systems mac os x windows free open source software linux free open source software systems permit third-party packages also installed upgraded mechanism whereas package managers mac os x windows upgrade software provided apple microsoft respectively exception third party drivers windows ability continuously upgrade third party software typically added adding url corresponding repository package management configuration file beside system-level application managers add-on package managers operating systems limited capabilities programming languages developers need latest libraries contrast system-level package managers application-level package managers focus small part software system typically reside within directory tree maintained system-level package manager however might case package managers deal programming libraries leading possible conflict package managers may claim file might break upgrades ian murdock commented package management single biggest advancement linux brought industry blurs boundaries operating system applications makes easier push new innovations ... marketplace ... evolve os
[ 4296, 4300, 5724, 5726, 7169, 1471, 2932, 58, 5797, 7232, 1521, 5803, 7242, 1535, 7251, 5817, 4400, 3023, 7275, 1572, 3036, 4435, 1582, 7289, 3042, 4441, 160, 163, 1598, 1621, 1629, 5912, 5923, 1668, 237, 3133, 4534, 1684, 5965, 4549, 1...
Validation
3,560
3
Diamond_Mine_(video_game):diamond mine video game diamond mine video game first published mrm software acorn electron bbc micro home computers 1984 reissued blue ribbon 1985 ported systems 1985 1986 blue ribbon also released sequel diamond mine ii time games similar 1982 arcade game anteater maze design limited pipe length non-stop movement make first game original diamond mine ii could considered anteater clone aim game guide pipe maze-like mine collect diamonds avoiding hitting walls patrolling monsters player set length pipe level pipe started moving stop retracted section pipe lost pipe hit monster hits wall twice amount pipe lost diamonds placed sporadically maze way kill monsters sequel similar fundamental changes game play pipe pause retracted time without penalty walls hit monsters killed touching end pipe move pipe retracted maze also populated regular diamonds resemble dots pac-man maze
[ 2148 ]
Test
3,561
4
Dr._Web:dr web dr.web software suite developed russian anti-malware company doctor web first released 1992 became first anti-virus service russia company also offers anti-spam solutions used yandex scan e-mail attachments also features add-on major browsers checks links online version dr web dr.web withdrawn av tests virus bulletin vb100 around 2008 stating believe virus scans viruses different subject real world malware attacks staunch anti-adware policy led software developers complaints dr web treated virus free applications virus receive responds dr web try contact dr web resolve issue dr.web discovered trojan backdoor.flashback variant affected 600,000 macs dr.web discovered trojan.skimer.18 trojan works like atm software skimmer trojan intercept transmit bank card information processed atms well data stored card pin code dr.web discovered ransomware linux.encoder.1 affected 2,000 linux users linux.encoder.2 discovered later turned earlier version ransomware doctor web received threat supposedly trojan writers criminal organization sponsoring malware development promotion march 31 two arson attacks carried igor daniloff anti-virus laboratory st. petersburg company received second threat doctor web released statement company considers duty provide users ultimate protection encroachments cybercriminals consequently efforts aimed identifying studying atm threats atm shield
[ 5452, 91, 4115, 1340, 4759, 7425, 3089, 4492, 1544, 1931, 4138, 385, 910, 1838, 6005, 2296, 2842, 4689, 5571, 6006, 4783, 3111, 7087, 578, 496, 6644, 5144, 7193, 3123, 142, 935, 1395, 7478, 5601, 6043, 6305, 8134, 4456, 6777, 4645, 7597...
Validation
3,562
2
ProGet:proget proget package management system designed inedo software company allows users host manage personal enterprise-wide packages applications components originally designed private nuget package manager microsoft development platform manager symbol source server enterprises utilize proget “ package applications components ” aim ensuring software built deployed consistently across environments gartner lists proget tool aligned “ preprod ” section devops toolchain used “ hold/stage software ready release ” proget currently supports growing list package managers including nuget chocolatey bower npm maven powershell rubygems helm debian python visual studio extensions .vsix proget also supports docker containers jenkins build artifacts plugin vulnerability scanning possible monitor feeds proget interface features also available managed number clients interfaces proget main features include originally proget designed run microsoft windows beginning version 4.4 also run linux via docker proget used asos.com cellenza abanca webmd health services sitecore infragistics among others
[ 5629, 4759, 6609, 1260, 5726, 7619, 5912, 3366, 4778, 5571, 578, 4059, 7838, 6743, 3889, 3559, 2771, 326, 2594, 4441, 1406, 1684, 952, 523, 163, 6312, 5092 ]
Test
3,563
5
Acknowledgement_(data_networks):acknowledgement data networks data networking telecommunications computer buses acknowledgement ack signal passed communicating processes computers devices signify acknowledgement receipt message part communications protocol negative-acknowledgement nak nack signal sent reject previously received message indicate kind error acknowledgements negative acknowledgements inform sender receiver state adjust state accordingly oftentimes data messages telecommunications contain checksums verify integrity payload header checksums work way single bit data corrupted checksum would different value provide inexpensive way check probable signal integrity message received invalid checksum data received would different checksum message receiver know information corrupted often checksums employed corrupted message received either served ack signal served nak signal ascii code used communicate computer terminals terminal send enquiry character request condition receiver character respond ack 0000110 6 indicate operating normally nak 0010101 15 indicate error condition unicode provides visible symbols characters u+2406 ␆ u+2415 ␕ many protocols acknowledgement-based meaning positively acknowledge receipt messages internet transmission control protocol tcp example acknowledgement-based protocol computers communicate via tcp received packets acknowledged sending back packet ack bit set tcp protocol allows acknowledgements included data sent opposite direction protocols send single acknowledgement per packet information protocols tcp zmodem allow many packets transmitted receiving acknowledgement procedure necessary fill high bandwidth-delay product links large number bytes flight protocols nak-based meaning respond messages problem examples include reliable multicast protocols send nak receiver detects missing packets still protocols make use naks acks binary synchronous communications bisync adaptive link rate energy-efficient ethernet examples still protocols rc-5 user datagram protocol udp x10 protocols perform blind transmission acknowledgement often transmitting message multiple times hopes least one copy message gets acknowledgement function used automatic repeat request arq function acknowledgement frames numbered coordination frames received sent transmitter allows transmitter avoid overflow underrun receiver become aware missed frames binary synchronous communications nak used indicate transmission error detected previously received block receiver ready accept retransmission block bisync use single ack character two control sequences alternate even/odd block acknowledgement computer buses dedicated acknowledge wire control bus used acknowledge bus operations dack used isa dma datack used stebus data transfer acknowledge pin motorola 68000 inspired title dtack grounded etc computer buses always acknowledge every write writes use posted write i²c serial bus time slot acknowledgment bit byte
[ 791, 1540, 7637, 827, 5485, 3462, 3799, 1952, 1019, 1869, 5079, 533, 3338, 975 ]
Test
3,564
5
Twitterrific:twitterrific twitterrific mac os x ios client social networking site twitter created iconfactory first twitter desktop client come mac os x lets users view tweets micro-blog posts twitter website real time well publish twitterrific closed source software program main window uses translucent black theme similar certain palettes used aperture iphoto apple inc. software users may choose view full public timeline friends feed users also click links view poster profile mark tweet favorite twitterrific also provides functionality upload images videos posting twitter version 2.1 twitterrific supports growl notifications enhanced applescript capabilities used sites services use twitter api version 3 changed twitterrific advertising supported shareware every hour ad refreshed top list users buy program receive ads changes version 3 mostly added compatibility mac os x 10.5 incorporated newer twitter features like direct messaging ios version twitterrific 2008 apple design award best iphone social networking application april 1 2010 iconfactory released twitterrific ipad version 1.0 ready ipad us launch april 3 june 24 version twitterrific launched version 3.0 universally compatible iphone ipod touch ipad february 14 2017 kickstarter project launched iconfactory try revive twitterrific mac application october 10 2017 mac application received 5.0 update added mac app store
[ 405, 6788, 1367, 7404, 4575, 5571, 352, 5141 ]
Test
3,565
3
Sandy_Bridge:sandy bridge sandy bridge codename microarchitecture used second generation intel core processors core i7 i5 i3 sandy bridge microarchitecture successor nehalem microarchitecture intel demonstrated sandy bridge processor 2009 released first products based architecture january 2011 core brand sandy bridge manufactured 32 nanometer process intel subsequent generation ivy bridge announced 2011 uses 22 nanometer die shrink known tick–tock model core i7 2600 sandy bridge cpu 3.4 ghz 1333 mhz ddr3 memory reaches 83 gflops performance whetstone benchmark 118,000 mips dhrystone benchmark last intel microarchitecture windows vista driver support officially exists intel demonstrated sandy bridge processor a1 stepping 2 ghz intel developer forum september 2009 upgraded features nehalem include sandy bridge processors one two four cores report cpuid model 0206a7h closely related stepping number seen cpuid pci configuration space later sandy bridge-e processors eight cores graphics using cpuids 0206d6h 0206d7h ivy bridge cpus cpuid 0306a9h date built four different configurations differing number cores l3 cache gpu execution units processors featuring intel hd 3000 graphics set bold processors feature hd 2000 graphics hd graphics pentium celeron models graphics core graphics clock rate indicated n/a suffixes denote note 3970x 3960x 3930k 3820 actually sandy bridge-e edition suffixes denote 31 january 2011 intel issued recall 67-series motherboards due flaw cougar point chipset hardware problem exists chipset sata ii ports may fail time causing failure connection sata devices though data risk intel claims problem affect 5 users 3 years however heavier i/o workloads exacerbate problem intel stopped production flawed b2 stepping chipsets began producing b3 stepping chipsets silicon fix shipping new chipsets started 14 february 2011 intel estimated full recovery volume april 2011 motherboard manufacturers asus gigabyte technology computer manufacturers dell hewlett-packard stopped selling products involved flawed chipset offered support affected customers options ranged swapping b3 motherboards product refunds sandy bridge processor sales temporarily hold one use cpu without motherboard however processor release dates affected two weeks intel continued shipping chipsets manufacturers agree set terms prevent customers encountering bug motherboard manufacturer websites instruction identify chipset stepping version using bios lshw produces partial output output says 'version 05 intel 6 series chipset intel c200 series chipset specification update google intel h61 revision 05 result 1 'pch device revision identification page 13 says '05h located 'b3 rev id 'b3 chipset stepping version suffix h means hexadecimal '05h means 5 sandy bridge intel tied speed every bus usb sata pci pci-e cpu cores uncore memory etc single internal clock generator issuing basic base clock bclk cpus multiplier locked way overclock increase bclk raised 5–7 without hardware components failing work around intel made available k/x-series processors feature unlocked multipliers multiplier cap 57 sandy bridge sandy bridge e platform alternative method known bclk ratio overclock idf intel developer forum 2010 intel demonstrated unknown sandy bridge cpu running stably overclocked 4.9 ghz air cooling non-k edition cpus overclock four bins turbo multiplier refer chipset support sandy ivy bridge processors vpro capability security features remotely disable pc erase information hard drives useful case lost stolen pc commands received 3g signals ethernet internet connections aes encryption acceleration available useful video conferencing voip applications sandy ivy bridge processors contain drm technology video streaming web sites rely restrict use content web sites offer 1080p streaming users cpus downgrade quality users introduction sandy bridge microarchitecture intel also introduced intel data plane development kit intel dpdk help developers communications applications take advantage platform packet processing applications network processors intel demonstrated haswell architecture september 2011 released 2013 successor sandy bridge ivy bridge
[ 2539, 6793, 3942, 5737, 1465, 1867, 418, 766, 5431, 6152, 2977, 5802, 6170, 4765, 6173, 811, 3020, 3717, 5853, 4077, 4810, 6935, 7669, 4098, 1237, 2351, 4108, 3764, 4847, 3443, 1645, 7364, 578, 4514, 584, 3803, 6647, 6675, 972, 2448, 24...
Validation
3,566
2
Region-based_memory_management:region-based memory management computer science region-based memory management type memory management allocated object assigned region region also called zone arena area memory context collection allocated objects efficiently deallocated like stack allocation regions facilitate allocation deallocation memory low overhead flexible allowing objects live longer stack frame allocated typical implementations objects region allocated single contiguous range memory addresses similarly stack frames typically allocated simple example consider following c code allocates deallocates linked list data structure region *r createregion listnode *head null int 1 1000 i++ // ... // use list destroyregion r although required many operations construct linked list destroyed quickly single operation destroying region nodes allocated need traverse list simple explicit regions straightforward implement following description based hanson region implemented linked list large blocks memory block large enough serve many allocations current block maintains pointer next free position block block filled new one allocated added list region deallocated next-free-position pointer reset beginning first block list blocks reused next region created alternatively region deallocated list blocks appended global freelist regions may later allocate new blocks simple scheme possible deallocate individual objects regions overall cost per allocated byte scheme low almost allocations involve comparison update next-free-position pointer deallocating region constant-time operation done rarely unlike typical garbage collection systems need tag data type basic concept regions old first appearing early 1967 douglas t. ross aed free storage package memory partitioned hierarchy zones zone allocator zone could freed all-at-once making zones usable regions 1976 pl/i standard included area data type 1990 hanson demonstrated explicit regions c called arenas could achieve time performance per allocated byte superior even fastest-known heap allocation mechanism explicit regions instrumental design number early c-based software projects including apache http server calls pools postgresql database management system calls memory contexts like traditional heap allocation schemes provide memory safety possible programmer access region deallocated dangling pointer forget deallocate region causing memory leak 1988 researchers began investigating use regions safe memory allocation introducing concept region inference creation deallocation regions well assignment individual static allocation expressions particular regions inserted compiler compile-time compiler able way guarantee dangling pointers leaks occur early work ruggieri murtagh region created beginning function deallocated end use data flow analysis determine lifetime static allocation expression assign youngest region contains entire lifetime 1994 work generalized seminal work tofte talpin support type polymorphism higher-order functions standard ml functional programming language using different algorithm based type inference theoretical concepts polymorphic region types region calculus work introduced extension lambda calculus including regions adding two constructs due syntactic structure regions nested meaning r created r must also deallocated r result stack regions moreover regions must deallocated function created restrictions relaxed aiken et al extended lambda calculus intended serve provably memory-safe intermediate representation compiling standard ml programs machine code building translator would produce good results large programs faced number practical limitations resolved new analyses including dealing recursive calls tail recursive calls eliminating regions contained single value work completed 1995 integrated ml kit version ml based region allocation place garbage collection permitted direct comparison two medium-sized test programs yielding widely varying results 10 times faster four times slower depending region-friendly program compile times however order minutes ml kit eventually scaled large applications two additions scheme separate compilation modules hybrid technique combining region inference tracing garbage collection following development ml kit regions began generalized language environments systems using regions may experience issues regions become large deallocated contain large proportion dead data commonly called leaks even though eventually freed eliminating leaks may involve restructuring program typically introducing new shorter-lifetime regions debugging type problem especially difficult systems using region inference programmer must understand underlying inference algorithm examine verbose intermediate representation diagnose issue tracing garbage collectors effective deallocating type data timely manner without program changes one justification hybrid region/gc systems hand tracing garbage collectors also exhibit subtle leaks references retained data never used region-based memory management works best number regions relatively small contains many objects programs contain many sparse regions exhibit internal fragmentation leading wasted memory time overhead region management presence region inference problem difficult diagnose mentioned rc uses hybrid regions reference counting limiting overhead reference counting since references internal regions n't require counts updated 're modified similarly mark-region hybrid methods combine tracing garbage collection regions function dividing heap regions performing mark-sweep pass regions containing live objects marked freeing unmarked regions require continual defragmentation remain effective
[ 1616, 3351, 3515, 8066, 379, 2736, 1363, 304, 572, 310, 5932, 8097, 3298, 1855, 1019, 1208, 4347, 7474, 4810, 56, 6659, 5956, 858, 1435, 4920 ]
Test
3,567
3
SGI_Octane:sgi octane octane similar octane2 irix workstations marketed sgi two-way multiprocessing-capable workstations originally based mips technologies r10000 microprocessor newer octanes based r12000 r14000 octane2 four improvements compared octane revised power supply system board xbow octane2 also shipped vpro graphics supports vpro cards later revisions octane also included improvements introduced octane2 codenames octane octane2 racer speedracer respectively octane direct successor indigo2 succeeded tezro immediate sibling o2 sgi withdrew octane2 price book may 26 2004 ceased octane2 production june 25 2004 support octane2 ceased june 2009 new system named octane iii introduced early 2010 octane iii intel xeon-based desk-side cluster system confused octane octane2 octane system-board designated ip30 system based sgi xtalk architecture means use system bus instead crossbow application specific integrated circuit asic referred xbow dynamic crossbar switch connects xio ports hub one ports used processor memory subsystem one available pci-x expansion four xio slots packet-based high-bandwidth bus somewhat similar hypertransport makes similar single node origin 200 system xio could bridged pci-x using chip named bridge bridging included system board ioc3 multi-i/o chip two isp1040b scsi controllers rad1 audio menet cards four ioc3s pci cage used pci cards octane octane uses arcs boot firmware like contemporary sgi computer systems processors octane series computers octane series single dual cpu modules second cpu added option replace whole cpu module octane supports 256 mb 8 gb system memory using proprietary 200-pin dimms two system board revisions first revision part number 030-0887-003 supports 2 gb ram second part number 030-1467-001 allows 8 gb memory subsystem vast reserves bandwidth directly served xbow router xio card octane memory controller named heart acts bridge processor memory sdram xio bus graphics octane provided series cards si si+t ssi mxi updated xio versions solid impact si high impact si+t maximum impact mxi sgi indigo2 internally designated sgi 'mardigras boards accelerated reengineered faster geometry engine texture modules create new versions se se+t sse mxe si/se provides 13.5 mb framebuffer memory sse mxe 27 mb framebuffer '+t indicates additional high speed rambus rdram-based texture board gives 4 mb texture memory practically indispensable though quite expensive fragile si/se+t one texture board mxi/mxe 2 texture boards however 2 boards mxi/mxe double available texture memory system doubles texture performance later octanes octane2 support sgi vpro graphics board series designated 'odyssey first vpro series cards v6 v8 main differentiator v6 32 mb ram unlike mardigras option framebuffer memory texture memory come pool v8 128 mb later v10 32 mb v12 128 mb introduced main difference new vpro v10/v12 series double geometry performance older v6/v8 v6 v10 8 mb ram allocated textures 2x textured-enabled mardigras options v8 v12 108 mb ram used textures vpro graphics subsystem consists sgi proprietary chip set associated software chip set consists buzz asic pixel blaster jammer pb j asic associated sdram buzz asic single-chip graphics pipeline operates 251 mhz contains on-chip sram buzz asic three interfaces mardigras boards vpro boards support opengl mardigras opengl 1.1 sgi extensions vpro upgraded support opengl 1.2 opengl arb imaging extensions allowing hardware acceleration numerous imaging operations real-time rates note cards texture memory offer hardware accelerated texturing however add hardware texturing tramless card adding tram modules audio hardware standard even without extensions support low-latency 3 ms input-to-output audio streams alesis adat 8-channel 24-bit optical ports built-in along s/pdif aes/ebu optical coaxial ports makes octane respectable digital audio workstation octane cases large wxhxd 30x40x35 cm heavy 25 kg yet internal 5.25 drive bays external cd-rom drives must connected desired extensions include video i/o audio i/o networking realtime video compression boards external storage options scsi fibre-channel firewire octanes use standard pci cards optional pci cardcage provides 2-full length 1 half-length 5v pci-64 slots pci xio adapter known 'shoehorn provides single 3.3/5v 64-bit pci slot older octanes upgraded vpro graphics however v10 v12 graphics board require xbow revision 1.4 cherokee power supply vpro v6 v8 require xbow revision 1.3 cherokee power supply distinct difference cherokee 747 watt older lucent 623 watt power supplies mounting handle silver cherokee international manufactured power supplies original lucent manufactured ones black handles octane skins come three types original octane green skins original sgi 'cube logo later model octanes skins colour original octane2-style lettering logos octane2 systems blue skins modern lowercase letter-only sgi logo octane series two scsi controllers supports ultra wide scsi devices systems maximum three internal 3.5 scsi sca devices using proprietary mounting sleds also compatible origin 2000 origin 200 onyx2 external ultra wide scsi port used connecting external devices sgi octane impact-class graphics first supported irix version 6.4 vpro-class graphics supported since irix version 6.5.10 v6 v8 v10 v12 graphics supported 6.5.11 6.5.10 special driver patch linux runs octane series although patch experimental impact vpro graphics supported x window system available impactsr series openbsd port runs octane series well
[ 4121, 5104, 3849, 1727, 3692, 4859, 4959, 578, 7990, 5055, 7010, 4802, 6922, 156, 4362, 4365, 970, 787 ]
Test
3,568
4
Distributed_Access_Control_System:distributed access control system distributed access control system dacs light-weight single sign-on attribute-based access control system web servers server-based software dacs primarily used apache web servers provide enhanced access control web pages cgi programs servlets web-based assets federate apache servers released open-source license dacs provides modular authentication framework supports array common authentication methods rule-based authorization engine grant deny access resources named urls based identity requestor contextual information administrators configure dacs identify users employing authentication methods user accounts already available within organization resulting dacs identities recognized dacs jurisdictions federated addition simple web-based apis command-line interfaces also provided much functionality web-based apis return xml json documents development dacs began 2001 first open source release made available 2005 dacs use following authentication methods account types extensible architecture allows new methods introduced dacs distribution includes various cryptographic functionality message digests hmacs symmetric public key encryption ciphers chacha20 openssl digital signatures password-based key derivation functions hkdf pbkdf2 memory-hard key derivation functions scrypt argon2 much available simple scripting language dacs also act identity provider infocards function relying party although functionality deprecated dacs performs access control evaluating access control rules specified administrator expressed set xml documents rules consulted run-time determine whether access given resource granted denied access control rules arbitrary computations combines attribute-based access control role-based access control policy-based access control delegated access control approaches architecture provides many possibilities administrators
[ 2566, 5571, 578, 3794, 3383, 3884, 5149, 2346, 1805 ]
Validation
3,569
9
Albatross_(programming_language):albatross programming language albatross general purpose programming language verified statically
[ 6507, 8137, 3915, 5571 ]
Test
3,570
9
Function-level_programming:function-level programming computer science function-level programming refers one two contrasting programming paradigms identified john backus work programs mathematical objects value-level programming 1977 turing award lecture backus set forth considered need switch different philosophy programming language design programming languages appear trouble successive language incorporates little cleaning features predecessors plus ... new language claims new fashionable features ... plain fact languages make programming sufficiently cheaper reliable justify cost producing learning use designed fp first programming language specifically support function-level programming style function-level program variable-free cf point-free programming since program variables essential value-level definitions needed function-level programs function-level style programming program built directly programs given outset combining program-forming operations functionals thus contrast value-level approach applies given programs values form succession values culminating desired result value function-level approach applies program-forming operations given programs form succession programs culminating desired result program result function-level approach programming invites study space programs program-forming operations looking derive useful algebraic properties program-forming operations function-level approach offers possibility making set programs mathematical space emphasizing algebraic properties program-forming operations space programs another potential advantage function-level view ability use strict functions thereby bottom-up semantics simplest kind yet another existence function-level definitions lifted lifted lower value-level higher function-level image existing value-level one often terse function-level definitions represent powerful style programming available value-level backus studied publicized function-level style programming message mostly misunderstood supporting traditional functional programming style languages instead fp successor fl backus calls functional programming applicative programming function-level programming particular constrained type key distinction functional languages backus language following hierarchy types ... way generate new functions use one functional forms fixed build functional form least within fp within ffp formal fp restriction means functions fp module generated built-in functions algebra functional forms thus algebraically tractable instance general question equality two functions equivalent halting problem undecidable equality two functions fp equality algebra thus backus imagines easier even today many users lambda style languages often misinterpret backus function-level approach restrictive variant lambda style de facto value-level style fact backus would disagreed 'restrictive accusation argued precisely due restrictions well-formed mathematical space could arise manner analogous way structured programming limits programming restricted version control-flow possibilities available plain unrestricted unstructured programs value-free style fp closely related equational logic cartesian-closed category canonical function-level programming language fp others include fl j
[ 6507, 718, 1549, 5482, 3630, 1102, 1381, 7557, 3895, 960, 1892, 5878, 1901 ]
Validation
3,571
7
INSANE_(software):insane software insane proprietary interactive streaming animation engine developed lucasarts primarily programmer/game designer vincent lee using custom video compression technology greatly compresses moving images high quality full-screen videos displayed even hi-res graphics modes pc early version first developed followed much enhanced version full throttle outlaws dig also used 1998 games mortimer riddles medallion compression technology incorporated star wars episode insider guide jar jar journey adventure book use full throttle caused problems since insane intended photorealistic contrasting general cartoony feeling rendered environment scaled match rest game world later enhancements made compression technology optimize cartoon style imagery used outlaws
[ 5666, 5294, 5897, 2002, 2275, 7898, 4833, 1606, 8195, 4130, 6759 ]
Test
3,572
2
OpenIKED:openiked openiked free permissively licensed internet key exchange ikev2 daemon developed part openbsd operating system
[ 6414, 2001, 2453, 191, 5373, 7806, 7626, 2644, 5571, 6630, 5488, 1559, 1572, 4162, 1394, 8008, 7752, 7567, 5157, 7122, 4990, 1133, 6487, 2883, 6242, 7867, 4014, 1245, 2356, 1435 ]
Test
3,573
7
Darknet:darknet dark net darknet umbrella term describing portions internet purposefully open public view hidden networks whose architecture superimposed internet darknet often associated encrypted part internet called tor network illicit trading takes place infamous online drug bazaar called silk road also considered part deep web.. anonymous communication whistle-blowers journalists news organisations facilitated darknet tor network use applications including securedrop term originally described computers arpanet hidden programmed receive messages respond acknowledge anything thus remaining invisible dark.an account detailed first online transaction related drugs transpired 1971 students massachusetts institute technology stanford university traded marijuana using arpanet accounts former artificial intelligence laboratory term later usage incorporated services dark web overlay network accessed specific software configurations authorization often using non-standard communication protocols ports types dark webs include friend-to-friend networks usually used file sharing peer-to-peer connection privacy networks tor reciprocal term encrypted darknet clearnet surface web referring content indexable search engines term darknet often used interchangeably dark web due quantity hidden services tor darknet term often inaccurately used interchangeably deep web due tor history platform could search-indexed mixing uses terms described inaccurate commentators recommending terms used distinct fashions darknet coined 1970s designate networks isolated arpanet government-founded military/academical network evolved internet security purposes darknet addresses could receive data arpanet appear network lists would answer pings inquiries term gained public acceptance following publication darknet future content distribution 2002 paper peter biddle paul england marcus peinado bryan willman four employees microsoft argued presence darknet primary hindrance development workable digital rights management drm technologies made copyright infringement inevitable paper described darknet generally type parallel network encrypted requires specific protocol allow user connect journalist j. d. lasica 2005 book darknet hollywood war digital generation described darknet reach encompassing file sharing networks subsequently 2014 journalist jamie bartlett book dark net used term describe range underground emergent subcultures including camgirls cryptoanarchists darknet drug markets self harm communities social media racists transhumanists telegram features encryption ban territory different countries also belongs darknet anonymity contains encrypted channels sale prohibited substances recruiting various organizations coordinating anti-government actions darknets general may used various reasons darknets require specific software installed network configurations made access tor accessed via customised browser vidalia aka tor browser bundle alternatively via proxy configured perform function
[ 2984, 3172, 803, 7714, 7343, 1175, 2390, 6450, 2664, 4706, 6025, 7744, 5847, 499, 4434, 2681, 3480, 4891, 5414, 2430, 2696, 7493, 5531, 2893, 1329, 3338, 4014, 6062, 6499 ]
Test
3,574
6
Linux_Userland_Filesystem:linux userland filesystem linux userland filesystem lufs file system linux similar fuse file system driver provides bridge kernel mode user mode lufs possible among things mount remote directories via ssh ftp gnutella fuse lufs filesystem developed little effort comparable normal application addition fuse linux kernel lufs lost relevance longer developed
[ 2984, 7214, 8092, 578, 1680 ]
Validation
3,575
4
Titan_Rain:titan rain titan rain designation given federal government united states series coordinated attacks american computer systems since 2003 known ongoing least three years attacks originated guangdong china activity known titan rain believed associated state-sponsored advanced persistent threat titan rain hackers gained access many united states defense contractor computer networks targeted sensitive information including lockheed martin sandia national laboratories redstone arsenal nasa series attacks believed actions people ’ liberation army pla unit 61398 hackers attacked american defense intelligence agency – dod british government departments ministry defence – mod british government incident 2006 part house commons computer system shut “ organised chinese hacking group. ” chinese government denied responsibility ‘ titan rain ’ caused friction u.s. chinese governments u.s. government blamed chinese government attacks 2004 unclassified although potentially fatal information alan paller sans institute research director stated attacks came individuals “ intense discipline ” “ organisation could military ” sophistication evidence pointed toward chinese military people ’ liberation army attackers ‘ titan rain ’ reportedly attacked multiple high-end political systems nasa fbi although sensitive classified information reported stolen hackers however able steal unclassified information e.g information home computer fact information classified somewhat irrelevant comes together could reveal strengths weaknesses u.s. making attack damaging ‘ titan rain ’ caused distrust countries united kingdom russia – superpowers china distrust occurred countries likely attacked either detect attack released statements attacked united kingdom stated officially governmental offices attacked hackers chinese source events ‘ titan rain ’ caused rest world cautious attacks china countries well thereby causing however small slight distrust countries distrust may affect future agreements dealings affect relationship china
[ 2173, 3932, 2724, 5205, 104, 6715, 129, 7186, 7833, 2618, 6756, 2876, 1500, 954, 862, 5611, 3154, 6589, 5444 ]
Test
3,576
3
Vortex86:vortex86 vortex86 computing system-on-a-chip soc based core compatible x86 microprocessor family produced dm p electronics originated rise technology vortex86 previously belonged sis got basic design rise technology sis sold dm p electronics taiwan adopting vortex86 series dm p manufactured m6117d intel 386sx compatible 25–40 mhz soc vortex86 cpus implement i586 architecture early versions vortex86 original vortex86sx floating point unit fpu code runs i486sx cpu without 487 run vortex86 code runs i586 use floating point instructions i586 code run vortex86dx later linux kernels build-time option emulate fpu cpu missing one program uses i586-level floating point instructions work vortex86 family cpu kernel albeit slowly model fpu advanced models fpus i686-level instructions fucomi code intended i686 may fail cpu lacks conditional move cmov instruction instruction combines effect conditional branch move instruction compilers asked optimize code advanced cpu example gnu compiler -march=i686 option generate code uses cmov linux systems intended run i686 generally runnable vortex86 gnu c library built i686 uses cmov instruction assembly language strcmp function dynamic loader ld.so uses hence program uses shared libraries even start technically cmov optional i686 architecture intel i686 product pentium pro consequently things generate code typically consider cmov available ask generate code i686 devices vortex86dx3 run fedora 17 i686 live cd successfully unlike use versions vortex86 implies vortex86dx3 implements i686 features others properties vortex86 original cpu reported linux kernel tool codice_1 note cpu later version fpu dm p provides embedded linux distribution customized use socs features netbsd/i386 able boot least dx3 sis55x/rise mp6 simply vortex86 – developed sis three integer mmx pipelines branch prediction 300 mhz 16 kb data 16 kb instruction l1 cache fpu l2 cache use sd ddr2 ram 600 mhz 1 ghz 2.02 w 800 mhz 16 kb data 16 kb instruction l1 cache fpu 256 kb l2 cache 6-staged pipeline address 1 gib ddr2 ram pdx-600 version vortex86dx differs number rs-232 ports 3 instead 5 i²c servo controllers thus targeting embedded industrial market netbooks similar belco 450r use chip package single 581-pin bga package 1 ghz cpu core hardly differs vortex86dx according several sources processor appear implemented simd multi-media instructions mmx version drops conformance isa integrates gpu hd audio controller also integrates udma/100 ide controller consumer grade version known pmx-1000 current models gecko edubook use xcore86 rebadge vortex86mx 32kb write 2-way l1 cache 256kb write through/write back 4-way l2 cache pci rev 2.1 32-bit bus interface 33 mhz ddr2 rom controller ipc internal peripheral controllers dma interrupt timer/counter included fast ethernet fifo uart usb2.0 host ata controller mx+ adds vga controller chip shared memory package single 720-pin bga package 32kb write 4-way l1 cache 16k instruction 16k data 256kb write through/write back 4-way l2 cache pci rev 2.1 32-bit bus interface 33 mhz ddr2 rom controller ipc internal peripheral controllers dma interrupt timer/counter included vga 100 mbps ethernet fifo uart usb2.0 host ata controller enhancements dx include com ports 9 2gb ram hd audio codec well gpio pins package single 720-pin bga package 32kb write 2-way l1 cache 128kb write through/write back 2-way l2 cache pci-e bus interface 300 mhz ddr3 rom controller ipc internal peripheral controllers dma interrupt timer/counter included fast ethernet fifo uart usb2.0 host ata controller package single 288-pin tfbga-package 1.0 ghz dual-core cpu i686-compatible vortex86 eight-way 32k i-cache eight-way 32k d-cache four-way 512 kb l2 cache write-through write-back policy support 2gb ddr3 ram pci-e bus interface 100 mbps ethernet fifo uart usb 2.0 host ata controller ide controller pata 100 2x hdd 2x sd primary channel sata 1.5gbit/s 1 port secondary channel package single 720-pin bga-package ex2 model two asymmetrical master/slave cpu cores master core runs 600mhz 16k i-cache 16k d-cache four-way 128 kb l2 cache write-through write-back policy slave core operates 400 mhz also 16kb i-cache 16kb d-cache l2 cache built-in fpu maximum ddr3 ram capacity 2gb produced using 65nm manufacturing process uses 19x19mm lfbga-441 package
[ 4900, 7442, 2248, 5947, 4845, 7499, 1670, 352, 578, 3755, 2263, 5669 ]
Test
3,577
4
Alan_Woodward_(computer_scientist):alan woodward computer scientist alan woodward british computer scientist visiting professor university surrey specialist computer security fellow institute physics chartered physicist chartered practitioner chartered engineer fellow british computer society eur ing fellow royal statistical society
[ 1805 ]
Test
3,578
3
Dataflow_architecture:dataflow architecture dataflow architecture computer architecture directly contrasts traditional von neumann architecture control flow architecture dataflow architectures program counter concept executability execution instructions solely determined based availability input arguments instructions order instruction execution unpredictable i.e behavior nondeterministic although commercially successful general-purpose computer hardware used dataflow architecture successfully implemented specialized hardware digital signal processing network routing graphics processing telemetry recently data warehousing also relevant many software architectures today including database engine designs parallel computing frameworks synchronous dataflow architectures tune match workload presented real-time data path applications wire speed packet forwarding dataflow architectures deterministic nature enable programmers manage complex tasks processor load balancing synchronization accesses common resources meanwhile clash terminology since term dataflow used subarea parallel programming dataflow programming hardware architectures dataflow major topic computer architecture research 1970s early 1980s jack dennis mit pioneered field static dataflow architectures manchester dataflow machine mit tagged token architecture major projects dynamic dataflow research however never overcame problems related instructions data dependencies proved fine-grained effectively distributed large network time instructions tagged results travel large connection network longer time actually computations nonetheless out-of-order execution ooe become dominant computing paradigm since 1990s form restricted dataflow paradigm introduced idea execution window execution window follows sequential order von neumann architecture however within window instructions allowed completed data dependency order accomplished cpus dynamically tag data dependencies code execution window logical complexity dynamically keeping track data dependencies restricts ooe cpus small number execution units 2-6 limits execution window sizes range 32 200 instructions much smaller envisioned full dataflow machines designs use conventional memory addresses data dependency tags called static dataflow machines machines allow multiple instances routines executed simultaneously simple tags could differentiate designs use content-addressable memory cam called dynamic dataflow machines use tags memory facilitate parallelism normally control flow architecture compilers analyze program source code data dependencies instructions order better organize instruction sequences binary output files instructions organized sequentially dependency information recorded binaries binaries compiled dataflow machine contain dependency information dataflow compiler records dependencies creating unique tags dependency instead using variable names giving dependency unique tag allows non-dependent code segments binary executed order parallel compiler detects loops break statements various programming control syntax data flow programs loaded cam dynamic dataflow computer tagged operands instruction become available output previous instructions and/or user input instruction marked ready execution execution unit known activating firing instruction instruction completed execution unit output data sent tag cam instructions dependent upon particular datum identified tag value marked ready execution way subsequent instructions executed proper order avoiding race conditions order may differ sequential order envisioned human programmer programmed order instruction along required data operands transmitted execution unit packet also called instruction token similarly output data transmitted back cam data token packetization instructions results allows parallel execution ready instructions large scale dataflow networks deliver instruction tokens execution units return data tokens cam contrast conventional von neumann architecture data tokens permanently stored memory rather transient messages exist transit instruction storage
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 4318, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2961, 2248, 3667, 2969, 6148, 441, 4742, 5447, 2266, 4047, 1546, 4049, 5483, 1556, 5487, 6198, 1568, 1570, 3391, 6922, 3041, 7666, 1586, 515, 8024, ...
Test
3,579
3
Byte_addressing:byte addressing byte addressing refers hardware architectures support accessing individual bytes data rather larger units called words would word-addressable computers sometimes called byte machines contrast word machines basic unit digital storage called bit storing single 0 1 many common architectures address 8 bits data time example intel 386sx processor handle 16-bit two-byte data since data transferred 16-bit bus however data memory may various lengths 64-bit architecture machine might still need access 8-bit data 64-bit address line data returned bottom 8 bits longer data line byte addressable memory refers architectures data accessed addressed units narrower bus eight-bit processor like intel 8008 addresses eight bits full width bus regarded word-addressable 386sx addresses memory 8-bit units fetch store 16 bits time termed byte-addressable bytes always meant 8 bits fact depending platform byte sizes 1 48 bits used past therefore term octet used context makes byte-length ambiguous example 1980s honeywell mainframes 36-bit words byte-addressable 9-bit bytes nonets used 7- 8-bit character codes either stored one 9-bit byte making characters individually addressable illustrate byte addressing useful consider ibm 7094 word-addressable concept byte 36-bit words stores six-bit character codes six word change 16th character string program determine fourth character third word string fetch third word mask old value fourth character value held register new one store back amended word least six machine instructions usually relegated subroutine every store fetch single character involves overhead calling subroutine returning byte addressing achieved one instruction store character code byte address text programs easier write smaller run faster advantage word addressing memory addressed number bits ibm 7094 15-bit addresses could address 32,768 words 36 bits machines often built full complement addressable memory addressing 32,768 bytes 6 bits would much less useful scientific engineering users consider 32-bit pentium processor 32-bit address bus address 4 billion different items using word addressing 32-bit address bus could address 4 gigawords 16 gigabytes using modern 8-bit byte 386sx successors used word addressing scientists engineers gamers could enjoyed programs 4x larger 32-bit machines word processing rendering html text applications would run slowly computers costly mainly used science engineering word addressing obvious mode became cost-effective use computers handling text hardware designers moved byte addressing systems pdp-10 use word addressing facilitate access individual bytes using special instructions access memory using byte pointer contains word address index specific byte within word
[ 5911, 1015, 4942 ]
Test
3,580
9
Gunther_Schmidt:gunther schmidt gunther schmidt born 1939 rüdersdorf german mathematician works also informatics schmidt began studying mathematics 1957 göttingen university studying carl ludwig siegel returned göttingen spending time united states wwii 1960 transferred ludwig-maximilians-universität münchen studied functions several complex variables karl stein schmidt wrote thesis analytic continuation functions 1962 schmidt began work tu münchen students robert sauer beginning labs tutorials later mentoring administration schmidt interests turned toward programming collaborated hans langmaack rewriting braid group 1969 friedrich l. bauer klaus samelson establishing software engineering university schmidt joined group 1974 1977 submitted habilitation programs partial graphs became professor 1980 shortly appointed hold chair late klaus samelson one half years 1988 retirement 2004 held professorship faculty computer science universität der bundeswehr münchen classroom instructor beginners courses well special courses mathematical logic semantics programming languages construction compilers algorithmic languages working thomas strohlein authored textbook relations graphs published german 1989 english 1993 2012 2001 became involved large project 17 nations european cooperation science technology schmidt chairman project cost 274 tarski theory application relational structures knowledge instruments 2014 festschrift organized celebrate 75th year calculus relations relatively low profile among mathematical topics twentieth century schmidt others raised profile partial order binary relations organized grouping closure 2018 schmidt michael winter published relational topology reviews classical mathematical structures binary operations topological space lens calculus relations 1981 participated international summer school marktoberdorf edited lecture notes theoretical foundations programming methodology manfred broy gunther schmidt mainly known work relational mathematics co-founder ramics conference series 1994 textbooks calculus relations exhibit applications potential algebraic logic
[ 1361, 964, 1243 ]
Test
3,581
0
Paper_generator:paper generator paper generator computer software composes scholarly papers style appear academic journals conference proceedings typically generator uses technical jargon field compose sentences grammatically correct seem erudite actually nonsensical prose supported tables figures references may valid randomly inserted rather relevant examples include postmodernism generator snarxiv scigen latter used generate many computer science papers accepted publication
[ 1144, 7397 ]
Test
3,582
1
Malta_Maritime_Authority:malta maritime authority malta maritime authority mma awtorità marittima ta malta used independent state corporation government agency responsible governance operation regulation promotion ports mediterranean archipelago nation malta operation principal cargo port malta freeport done conjunction malta freeport terminals company established 1988 malta smaller ports provide service pleasure craft yacht marinas ferry services fishing industry local trade mma ports directorate port authority ports malta malta international ship register department mma 2010 mma longer exists separate entity forms part transport malta governmental institution encompasses transport control islands sea land air malta rich maritime heritage principal ports include
[ 4513 ]
Validation
3,583
2
Android_Oreo:android oreo android oreo codenamed android development eighth major release 15th version android mobile operating system first released alpha quality developer preview march 2017 released public august 21 2017 contains number major features including notification grouping picture-in-picture support video performance improvements battery usage optimization support autofillers bluetooth 5 system-level integration voip apps wide color gamuts wi-fi aware android oreo also introduces two major platform features android go – software distribution operating system low-end devices – support implementing hardware abstraction layer 28.3 android devices run oreo 12.9 8.0 15.4 8.1 making oreo major release commonly used version android android oreo internally codenamed oatmeal cookie march 21 2017 google released first developer preview android available nexus 5x nexus 6p nexus player pixel c pixel smartphones second considered beta quality released may 17 2017 third developer preview released june 8 2017 offered finalized version api dp3 finalized release api api level 26 changed camera ui reverted wi-fi cellular connectivity levels status bar back wi-fi left added themed notifications added battery animation settings battery new icon darker background clock app teardrop icon shape apps july 24 2017 fourth developer preview released included final system behaviors latest bug fixes optimizations android officially released august 21 2017 name oreo lawn statue unveiled promotional event across chelsea market new york city—a building formerly housed nabisco factory oreo cookies first produced factory images made available compatible pixel nexus devices later day sony xperia xz1 sony xperia xz1 compact first devices available oreo pre-installed android 8.1 released december 2017 pixel nexus devices features minor bug fixes user interface changes notifications snoozed batched topic-based groups known channels 'major ongoing feature orders alerts priority pinning important application top slot android oreo contains integrated support picture-in-picture modes supported youtube app youtube premium subscribers settings app features new design white theme deeper categorization different settings ringtone alarm notification sound settings contain option adding custom sounds list android 8.1 update supports display battery percentages connected bluetooth devices makes notification shade slightly translucent dims on-screen navigation keys order reduce possibility burn-in android oreo adds support neighborhood aware networking nan wi-fi based wi-fi aware bluetooth 5 wide color gamuts apps api autofillers multiprocess google browsing support webviews api allow system-level integration voip apps launching activities remote displays android runtime art features performance improvements android oreo contains additional limits apps background activities order improve battery life apps specify adaptive icons differently-shaped containers specified themes circles squares squircles android oreo supports new emoji included unicode 10 standard new emoji font also introduced notably redesigns face figures use traditional circular shape opposed blob design introduced kitkat underlying architecture android revised low-level vendor-specific code supporting device hardware separated android os framework using hardware abstraction layer known vendor interface vendor interfaces must made forward compatible future versions android new architecture called project treble allows quicker development deployment android updates devices vendors would need make necessary modifications bundled software devices shipping oreo must support vendor interface feature optional devices updated oreo earlier version seamless updates system introduced android 7.0 also modified download update files directly system partition rather requiring downloaded user partition first reduces storage space requirements system updates android oreo introduces new automatic repair system known rescue party operating system detects core system components persistently crashing startup automatically perform series escalating repair steps automatic repair steps exhausted device reboot recovery mode offer perform factory reset android 8.1 update also introduces neural network api designed provide apps hardware acceleration on-device machine learning operations api designed use machine learning platforms tensorflow lite specialized co-processors pixel visual core featured google pixel 2 smartphones dormant 8.1 installed also provides cpu fallback mode tailored distribution low-end devices known android go unveiled oreo intended devices 1 gb ram less mode platform optimizations designed reduce mobile data usage including enabling data saver mode default special suite google mobile services designed less resource- bandwidth-intensive google play store also highlight lightweight apps suited devices operating system interface also modified quick settings panel providing greater prominence information regarding battery mobile data limit available storage recent apps menu using modified layout limited four apps order reduce ram consumption api allowing mobile carriers implement data tracking top-ups within android settings menu google play services also modularized reduce memory footprint android go made available oems android 8.1 android oreo re-brands automatic scanning google play store sideloaded apps google play protect gives feature well find device formerly android device manager higher prominence security menu settings app opposed single system-wide setting enabling installation apps sources outside google play store function implemented permission granted individual apps i.e clients third-party app repositories amazon appstore f-droid verified boot includes rollback protection feature enforces restriction rolling back device previous version android aimed preventing potential thief bypassing security measures installing previous version operating system n't place
[ 3933, 5372, 6427, 1095, 5386, 7183, 740, 4340, 42, 3309, 3310, 7924, 2591, 5771, 5775, 6153, 7956, 5455, 6176, 5473, 474, 6183, 822, 831, 5141, 136, 2317, 2673, 6209, 1582, 2683, 855, 6937, 168, 6232, 6950, 2712, 4116, 5195, 2003, 195, ...
Validation
3,584
9
Comparison_of_JavaScript_engines_(DOM_support):comparison javascript engines dom support following tables compare document object model dom compatibility support number javascript engines used web browsers features fully supported based dom level 2 dom level 3 modules w3c recommendation exact version number given certain feature added version dom level 0 dom level 3 modules still development included see list ecmascript engines full list interfaces within section considered fundamental must fully implemented conforming implementations dom including html dom implementations interfaces defined form part dom core specification objects expose interfaces never encountered dom implementation deals html interfaces found within section mandatory section extends dom core api describe objects methods specific html documents xhtml documents general functionality needed manipulate hierarchical document structures elements attributes found core section functionality depends specific elements defined html found section elements deprecated since html 4.01 listed elements attributes listed deprecated xhtml 1.1 example presentation attributes image maps frames targets interfaces found within section mandatory interfaces section base interfaces used represent type style sheet interfaces within section considered fundamental css interfaces must supported conforming implementations css module interfaces represent css style sheets specifically interfaces found within section mandatory interfaces found within section mandatory first goal design generic event system allows registration event handlers describes event flow tree structure provides basic contextual information event second goal event model provide common subset current event systems used dom level 0 browsers see also dom events details interfaces found within section mandatory document may one views associated e.g. computed view document applying css stylesheet multiple presentations e.g html frame document client view alternate representation presentation associated source document interfaces found within section mandatory interfaces provide easy-to-use robust selective traversal document contents interfaces found within section mandatory includes methods creating moving range methods manipulating content ranges interfaces within section considered fundamental must fully implemented conforming implementations dom load save module interfaces found within section mandatory module provides interfaces guide construction editing xml documents examples guided editing queries like combine questions like schema allow insert/delete insert/delete document still valid
[ 5629, 2451, 4755, 4296, 5998, 4315, 1177, 831, 313, 1016, 3719, 3559, 2415, 237, 7850, 2870, 6660, 6221, 340, 6400, 7687, 7505 ]
Validation