node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
3,685 | 6 | Chattr:chattr bsd-like systems including macos always analogous command set attributes command specifically meant display specific options command used instead solaris commands specifically meant manipulate used instead unices general analogous commands similar-sounding commands hp-ux aix exist unrelated functions among things command useful make files immutable password files certain system files erased software upgrades attributes manipulate originally specific second extended filesystem family ext2 ext3 ext4 available part e2fsprogs package however functionality since extended fully partially many systems including xfs reiserfs jfs ocfs2 btrfs file system includes attribute functionality including codice_1 flag turns built-in copy-on-write cow feature btrfs due slower performance associated cow form command form command gnu 1.41.3 attributes include command specific particular file systems ufs bsd systems apfs hfs+ smb afp fat macos support least flags form command bsd-like systems general default user-level command specifically meant display flags file command either codice_13 codice_14 depending system flags passed traditional attributes set cleared super-user also set cleared owner file attributes include bsd systems offer additional flags like offline snapshot sparse uarchive see references | [
2361,
361,
6789,
2817,
3685,
1537,
4494,
1835,
3626,
5480,
3106,
7827,
576,
7000,
578,
923,
5138,
6367,
6117,
667,
5946,
2589,
5859,
4536,
4987,
4183,
6050,
1047,
3417,
6404,
174,
6500,
4283,
4020
] | Test |
3,686 | 9 | Circuit_breaker_design_pattern:circuit breaker design pattern circuit breaker design pattern used modern software development used detect failures encapsulates logic preventing failure constantly recurring maintenance temporary external system failure unexpected system difficulties assume application connects database 100 times per second database fails application designer want error reoccur constantly also want handle error quickly gracefully without waiting tcp connection timeout generally circuit breaker used check availability external service external service database server web service used application circuit breaker detects failures prevents application trying perform action doomed fail safe retry implementations circuit breaker design pattern need retain state connection series requests must offload logic detect failures actual requests therefore state machine within circuit breaker needs operate sense concurrently requests passing one way achieved asynchronously multi-node clustered server state upstream service need reflected across nodes cluster therefore implementations may need use persistent storage layer e.g network cache memcached redis local cache disk memory based record availability application external service circuit breaker records state external service given interval external service used application storage layer queried retrieve current state safe say benefits outweigh consequences implementing circuit breaker negatively affect performance much depends storage layer used generally available resources largest factors regard type cache example disk-based vs. memory-based local vs. network following sample implementation php proof concept stores status mysql server shared memory cache apc following script could run set interval crontab | [
5014,
2720,
6415,
7637,
231,
235,
2054,
2827,
1407
] | Test |
3,687 | 2 | D3DX:d3dx computing d3dx direct3d extension deprecated high level api library written supplement microsoft direct3d graphics api d3dx library introduced direct3d 7 subsequently improved direct3d 9 provides classes common calculations vectors matrices colors calculating look-at projection matrices spline interpolations several complicated tasks compiling assembling shaders used 3d graphic programming compressed skeletal animation storage matrix stacks several functions provide complex operations 3d meshes like tangent-space computation mesh simplification precomputed radiance transfer optimizing vertex cache friendliness strip reordering generators 3d text meshes 2d features include classes drawing screen-space lines text sprite based particle systems spatial functions include various intersection routines conversion from/to barycentric coordinates bounding box sphere generators d3dx library contains pre-written routines things common 2d/3d applications games since direct3d api relatively low-level using d3dx library usually much simpler 2012 microsoft announced d3dx would deprecated windows 8 sdk along development frameworks xna shader effects texture management geometry optimizations mesh models available separate sources published codeplex mathematical constructs d3dx like vectors matrices would consolidated xnamath directxmath spherical harmonics math provided separate source d3dx library follows com object oriented programming model functionality accessed using c++-like interfaces id3dxeffect interface used compiling binding fx shaders .fx supports automatic mapping named shader parameters hardware constant registers parameter pools mapping textures available samplers specifying 'techniques modifying render states id3dxfont interface used draw 2d text see also d3dxcreatetext creates 3d meshes text id3dxline interface used drawing anti-aliased screen-space lines pattern id3dxmesh interface used storage meshes mesh optimization vertex cache friendliness strip reordering functions d3dx operate interface example d3dxcomputetangentframe creating tangent-space frame effects like normal parallax mapping descendant class id3dxpmesh geometry simplification used precomputed radiance transfer technique similar spherical harmonics lighting used precomputed global illumination soft ambient lighting id3dxsprite interface c++ class used drawing 2d image screen known sprite computer graphics directx 7 typically done using directdraw api deprecated programmer typically needs call id3dxsprite object begin method set render state world transform 2d drawing call draw method add textures list drawn finally call end method draw images screen restore original graphics state common criticism d3dxsprite slow issue addressed direct3d 9 computes tangent-space frame mesh used effects like normal/bump mapping parallax mapping anisotropic lighting models handles vertices tangent-space discontinuities making duplicates thus solving hairy ball problem n't handle reversed uv winding faces models mirrored texture mapping may run lighting troubles | [
7149,
6420,
714,
720,
1460,
2928,
7907,
5747,
2953,
6840,
422,
4017,
6504,
4022,
4026,
7607,
1526,
2283,
5479,
7263,
5850,
150,
6933,
519,
3052,
4448,
3407,
1232,
2702,
7687,
1989,
4848,
4129,
8073,
2018,
8085,
6989,
6991,
8094,
4156,
9... | Train |
3,688 | 3 | UAE_(emulator):uae emulator uae computer emulator emulates hardware commodore international amiga range computers released gnu general public license uae free software uae released 1995 originally called unusable amiga emulator due inability boot early stages known unix amiga emulator later names well since none popular expansions fit abbreviation longer stands anything software simply known uae — occasionally gets backronymed universal amiga emulator ultimate amiga emulator ubiquitous amiga emulator uae almost full-featured amiga emulator emulates functions software uae may use disk images made original amiga floppy disks images file extension adf amiga disk file actual amiga disks used limitations floppy controllers used computers images amiga formatted hard drives also made uae also supports mapping host operating system directories amiga hard drives uae include original amiga operating system rom files required running amiga system included license packages like amiga forever original kickstart 3.1 rom images also included amigaos4 powerpc since version 4.1 update 4 uae also supports alternative system roms derived aros project however provide degree software compatibility original roms uae ported many host operating systems including linux macos freebsd dos microsoft windows risc os beos palm os android xbox console psp psvita gp2x handhelds ios wii dreamcast consoles even amigaos morphos aros many threads past usenet public forums people argued possibility writing amiga emulator considered uae attempting impossible demanding system read process output 100 mb/s data fastest pc 66 mhz 486 keeping various emulated chips amiga chipset sync appearing supposed appear software uae almost entirely unusable first releases slowly step step fleshed support amiga chipset end 1997 able emulate amiga 500 quality speed sufficient productivity use many games since uae usable thanks partly effort taken develop partly big improvements technology brought computers many times faster uae initially running many amiga games applications run smoothly pentium ii-era system realization useful amiga emulator could written contributed increase enthusiasm emulation started sped-up efforts write emulators often less popular computer electronic game architectures major improvement made 2000 bernd meyer use just-in-time compilation significantly improved emulation speed extent average pcs could emulate amiga software faster real amiga could run uae use much host power native mode possible balance requirements host os accurately reflect original speed depending user choice uae also provides rtg-compatible video card amiga side emulation tailored display host hardware limited emulation original amiga video hardware five main forks original program active fork winuae current versions still contain bugs compatibility issues specific versions | [
2451,
5100,
97,
4759,
1534,
2379,
1454,
6002,
6431,
6009,
5571,
307,
5833,
5661,
578,
4244,
7746,
6121,
7384,
1214,
594,
3222,
4354,
5865,
5079,
4006,
7942,
7133,
7775,
1060
] | Validation |
3,689 | 3 | Yamaha_YM2413:yamaha ym2413 ym2413 a.k.a opll cost-reduced fm synthesis sound chip manufactured yamaha corporation based ym3812 opl2 make chip cheaper manufacture many internal registers removed result ym2413 play one user-defined instrument time 15 instrument settings hard-coded altered user cost-cutting modifications number waveforms reduced two channels mixed using adder instead chip dac uses time-division multiplexing play short segments channel sequence also done ym2612 ym2413 used | [
6943,
2023,
3516,
5970,
6237
] | Test |
3,690 | 3 | DNA-OS:dna-os dna-os french-made operating system supersede muteka obsolete operating system still providing posix thread api said soclib website kernel-mode lightweight operating system multiprocessor system chip build top thin hal ease porting new platforms processor architecture dna/os support virtual memory dna-os layered microkernel operating system written c99 released gnu gplv3 license | [
5405,
1522,
2864,
6076,
7794,
2887,
7079,
5462,
1100,
5021,
971,
5048,
2443,
1288
] | Train |
3,691 | 4 | Virtual_private_database:virtual private database virtual private database vpd masks data larger database subset data appears exist without actually segregating data different tables schemas databases typical application constraining sites departments individuals etc operate records time allowing privileged users operations e.g reports data warehousing etc access whole table term typical oracle dbms implementation general tables associated sql functions return predicate sql expression whenever query executed relevant predicates involved tables transparently collected used filter rows select insert update delete different rules | [
906,
7213,
2054
] | Test |
3,692 | 3 | NUMAlink:numalink numalink system interconnect developed silicon graphics sgi use distributed shared memory ccnuma computer systems numalink originally developed sgi origin 2000 onyx2 systems time systems introduction branded craylink sgi brief ownership cray research hewlett packard enterprise entered original equipment manufacturer oem arrangement silicon graphics international sgi use numalink foundation mission critical servers numalink 1 sgi engineers deemed system interconnect used stanford dash first generation numalink interconnect numalink 2 branded craylink second generation interconnect announced october 1996 used onyx2 visualization systems origin 200 origin 2000 servers supercomputers numalink 2 interface hub asic numalink 2 capable 1.6 gb/s peak bandwidth two 800 mb/s pecl 400 mhz 16-bit unidirectional links numalink 3 third generation interconnect introduced 2000 used origin 3000 altix 3000 numalink 3 capable 3.2 gb/s peak bandwidth two 1.6 gb/s unidirectional links name numaflex used modular design approach around time numalink 4 fourth generation interconnect introduced 2004 used altix 4000 numalink 4 capable 6.4 gb/s peak bandwidth two 3.2 gb/s unidirectional links numalink 5 fifth generation interconnect introduced 2009 used altix uv series numalink 5 capable 15 gb/s peak bandwidth two 7.5 gb/s unidirectional links numalink 6 sixth generation interconnect introduced 2012 used sgi uv 2000 sgi uv 3000 sgi uv 30 numalink 6 capable 6.7 gb/s bidirectional peak bandwidth 256 socket system 64tb coherent shared memory numalink 7 seventh generation interconnect introduced 2014 used hpe integrity mc990 x/sgi uv 300 sgi uv 30ex sgi uv 300h sgi uv 300rl numalink 7 capable 14.94 gb/s bidirectional peak bandwidth 64 socket system 64tb coherent shared memory numalink 8 eighth generation interconnect introduced 2017 used hpe superdome flex numalink 8 capable 853.33 gb/s bisection peak bandwidth 64 links cut 32 socket system 48tb coherent shared memory | [
5541,
4121,
5104,
3849,
3624,
7990,
5055,
7010,
4802,
6922,
3567,
1586,
156,
4362,
1134,
970,
787
] | Test |
3,693 | 7 | IBM_Intelligent_Cluster:ibm intelligent cluster ibm intelligent cluster cluster solution high-performance computing composed primarily ibm system x ibm bladecenter ibm system storage components integrated network switches various vendors optional high-performance infiniband interconnects solution previously known ibm system cluster 1350 eserver cluster 1350 simply e1350 roughly twice year solution components updated include then-current products ibm vendors solution predated eserver cluster 1300 e1300 based then-current pentium iii processors introduced november 2001 replaced e1350 october 2002 introduction pentium 4-based intel xeon processors operating system choices officially limited enterprise linux distributions red hat suse microsoft windows hpc server 2008 systems management ibm offered xcat additional software gpfs loadleveler could also ordered ibm intelligent cluster systems integrated factory-built tested cluster solutions comprehensive warranty service components including third-party options system could comprise traditional rack-optimized nodes well ibm bladecenter idataplex nodes processor choices intel xeon amd opteron processors along integrated storage switches provide turnkey linux microsoft cluster environment | [
4612,
2680,
6586,
4672,
763,
5313
] | Test |
3,694 | 2 | Nokia_N85:nokia n85 nokia n85 high-end smartphone produced nokia announced 27 august 2008 part nseries line n85 runs symbian os v9.3 s60 3rd edition platform feature pack 2 released october retailing 450 euros taxes major feature n85 introduced amoled display giving brighter sharper colours n85 dual-slider like nokia n95 access either media playback buttons numeric keypad 25 slimmer size upper sliding keys illuminate four multimedia keys music video playback two gaming keys playing n-gage 2.0 games also navi wheel like nokia n81 replaced bases design well gps receiver 5-megapixel camera dual led flash fm transmitter n85 well received decent upgrade n95 well better actual flagship nokia n96 costed 100 euros additions somewhat critically negative compared n96 n85 thinner lighter camera lens cover larger battery capacity usb charging via microusb port amoled screen although without large internal memory dvb-h receiver two-way slider spring assistance mechanism optional dvb-h nokia mobile tv receiver su-33w possible watch television screen phone | [
1066,
5979,
2271,
6517,
372,
1724,
7521,
3615,
1453,
4935,
5909,
3524,
3952,
472,
8072,
2922,
4407,
118,
23,
2564,
3703,
7261,
6440,
7545,
5044,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
6465,
5062,
3039,
3653,
1582,
4894,
5068,
597... | Test |
3,695 | 3 | Ceva_(semiconductor_company):ceva semiconductor company ceva publicly listed semiconductor intellectual property ip company headquartered mountain view california specializes digital signal processor dsp technology company main development facility located herzliya israel sophia antipolis france ceva recently named israeli 100 companies list technologies changed world ceva created november 2002 combination dsp ip licensing division dsp group parthus technologies plc irish company founded 1993 company develops semiconductor intellectual property core technologies multimedia wireless communications technology ceva claimed largest number baseband processors 2010 90 dsp ip market share 2011 july 2014 acquired rivierawaves sas private company based france | [
7492
] | Test |
3,696 | 2 | Immunix:immunix immunix discontinued commercial operating system provided host-based application security solutions last release immunix gnu/linux distribution version 7.3 november 27 2003 immunix inc. creator apparmor application security system may 10 2005 novell acquired immunix inc. long-time partner novell apparmor one novell primary interests result adopted company renamed novell apparmor powered immunix september 2007 novell laid apparmor team | [
5200,
1629,
3444,
7251,
474,
7075,
5571,
6725,
1941,
578,
314,
5232,
2758,
1663,
2864,
6209,
6761,
4632,
2063,
4729,
343,
4824,
5523,
7587,
5259,
1893,
5530,
5704,
6317,
3751,
7954,
6244,
1805
] | Test |
3,697 | 2 | Trusted_Solaris:trusted solaris trusted solaris discontinued security-evaluated operating system based solaris sun microsystems featuring mandatory access control model trusted solaris 8 common criteria certified evaluation assurance level eal4+ capp rbacpp lspp protection profiles basis dodiis trusted workstation program features previously available trusted solaris fine-grained privileges part standard solaris release solaris 10 11/06 update new component called solaris trusted extensions introduced making longer necessary different release modified kernel labeled security environments solaris trusted extensions opensolaris project solaris trusted extensions enabled enforces mandatory access control policy aspects operating system including device access file networking print window management services achieved adding sensitivity labels objects thereby establishing explicit relationships objects appropriate explicit authorization allows applications users read and/or write access objects component also provides labeled security features desktop environment apart extending support common desktop environment trusted solaris 8 release delivered first labeled environment based gnome solaris trusted extensions facilitates access data multiple classification levels single desktop environment solaris trusted extensions also implements labeled device access labeled network communication commercial internet protocol security option cipso standard cipso used pass security information within labeled zones solaris trusted extensions complies federal information processing standards fips | [
1522,
2990,
2098,
4229,
6725,
5571,
7000,
6208,
8037,
3678,
3423,
6505
] | Validation |
3,698 | 4 | Dialer:dialer dialer american english dialler british english electronic device connected telephone line monitor dialed numbers alter seamlessly provide services otherwise require lengthy national international access codes dialed dialer automatically inserts modifies numbers depending time day country area code dialed allowing user subscribe service providers offer best rates example dialer could programmed use one service provider international calls another cellular calls process known prefix insertion least cost routing line powered dialer need external power instead takes power needs telephone line another type dialer computer program creates connection internet another computer network analog telephone integrated services digital network isdn many operating systems already contain program connections point-to-point protocol ppp wvdial many internet service providers offer installation cds simplify process setting proper internet connection either create entry os dialer install separate dialer aol software recent years term dialer often refers specifically dialers connect without user full knowledge cost creator dialer intending commit fraud call centers several dialling modes depending call placed 'manual dialing refers calls placed manually agent 4 different dialing modes depending software dialers selects contacts going called starts making calls automated dialers sold noble systems avaya convoso formerly safesoft solutions place calls using *preview* *power* auto dialing predictive dialing dialing modes defined according campaign type business preview dialing enables agents first view available information customer decide place call addition information customer agents may also view history customer contact center viewing information customer agent requests system make call example preview dialing useful debt collection campaigns allow agents view information customer define strategy starting talk customer system delivers preview calls agents automatically taking account priority call skills agent handle call preview dialing keeps agents dialing calls manually power dialer similar autodialer software enables telemarketers sales teams call centers dial list phone numbers automatically completely hands-free thus saving valuable time energy would otherwise wasted dialing hand predictive dialing state-of-the-art pacing mode used call large number customers within short period time predictive dialing optimizes time agents reducing idle times connected calls freeing agents dialing calls predictive dialing gathers statistics concerning duration calls long takes calls answered often calls answered agent become idle system places several calls predictive dialing campaigns achieve agent productivity 50 minutes per hour nuisance ratios 3 less system continually updating predictive dialing probabilities monitoring nuisance ratios performance compliance legislation example predictive dialing useful sales campaigns call large number contacts maximizing working time agents performance predictive dialing takes consideration accuracy contact lists policies nuisance calls contact list poor performance predictive dialing campaign risk agents connected live contacts able business power ivr used deliver pre-recorded message large call list call answered power ivr play audio file collect touch tone key responses speech command end message transfer call agent remove caller call list words ivr technology allows computer interact humans use voice dtmf tones input via keypad voice drop power ivr except wait touch tone key responses speech command end message playing message call dropped mostly used payment reminders similar dialers necessary connect internet least non-broadband connections dialers designed connect premium-rate numbers providers dialers often search security holes operating system installed user computer use set computer dial number make money calls alternatively dialers inform user promise special content accessible via special number examples content include software download usually illegal trojans posing mp3s trojans posing pornography 'underground programs cracks keygens cost setting service relatively low amounting thousand dollars telecommunications equipment whereupon unscrupulous operator typically take 90 cost premium rate call overheads users dsls similar broadband connections usually affected dialer downloaded installed dialing possible regular phone numbers dsl network users typically dial-up modem connected phone line however isdn adapter additional analog modem installed dialer might still able get connection malicious dialers identified following characteristics computers running microsoft windows without anti-virus software proper updates could vulnerable visual basic-scripts install trojan horse changes values windows registry sets internet explorer security settings way activex controls downloaded internet without warning change made user accesses malicious page email message start installing dialer script also disables modem speaker messages normally come dialing network users microsoft office outlook outlook express internet explorer especially affected running activex controls javascript allowed latest security patches microsoft installed march 2004 malicious dialers could installed fake anti-virus software e-mail spam so-called antivirus team example contained download links programs named downloadtool.exe antivirus.exe malicious dialers ways transmission include electronic greeting cards link pages tricks user install activex controls turn install dialers background therefore links spam emails never opened automatically started downloads canceled soon discovered one check dial-up internet see whether displayed phone number unchanged another way protect oneself disable premium numbers one phone services course disables services one never run foreign code privileged environment unless source trustworthy also advisable protect oneself anti-malware programs 15 august 2003 new law came effect germany called gesetz zur bekämpfung des missbrauchs von 0 190er/ 0 900er mehrwertdiensterufnummern law combat misuse 0 190/ 0 900 value added service numbers law contains following regulations 4 march 2004 german federal supreme court karlsruhe decided fees usage dialers paid used without user knowledge december 2016 ofcom office communications announced changes call centre regulations focused persistent use dialers make call residential telephone numbers also added extra clarity call centres approach issue silent abandoned calls ofcom also regulate abandoned call messages work message state company name reason calling importantly used opportunity market business | [
2173,
4025,
2451,
7151,
6417,
6515,
3426,
2996,
6419,
2733,
4140,
6991,
210,
5571,
1376,
1847,
2850,
4699,
7186,
2577,
5401,
6823,
5848,
1766,
3047,
3071,
768,
8133,
74,
4456,
7685,
5880,
82,
6682,
2354,
3680,
880
] | Test |
3,699 | 4 | Dave_Aitel:dave aitel dave aitel computer security professional joined nsa research scientist aged 18 worked six years employed consultant stake three years 2002 founded security software company immunity cto aitel co-authored several books also well known writing several security tools dave aitel infrequent guest fox news channel provides commentary information security news | [
3842,
1584,
1805
] | Test |
3,700 | 4 | List_of_digital_forensics_tools:list digital forensics tools 1980s digital forensic investigations consisted live analysis examining digital media directly using non-specialist tools 1990s several freeware proprietary tools hardware software created allow investigations take place without modifying media first set tools mainly focused computer forensics although recent years similar tools evolved field mobile device forensics list includes notable examples digital forensic tools memory forensics tools used acquire analyze computer volatile memory ram often used incident response situations preserve evidence memory would lost system shut quickly detect stealthy malware directly examining operating system running software memory mobile forensics tools tend consist hardware software component mobile phones come diverse range connectors hardware devices support number different cables perform role write blocker computer devices software forensics science analyzing software source code binary code determine whether intellectual property infringement theft occurred centerpiece lawsuits trials settlements companies dispute issues involving software patents copyrights trade secrets software forensics tools compare code determine correlation measure used guide software forensics expert | [
5194,
3932,
452,
1715,
3517,
3179,
2195,
5561,
4316,
6528,
4501,
7825,
7181,
5308,
578,
5664,
6020,
1756,
5316,
4520,
5150,
4523,
7105,
3486,
2961,
1594,
3823,
5254,
6488,
1893,
8148,
1805
] | Test |
3,701 | 3 | Wavefront_Technologies:wavefront technologies wavefront technologies computer graphics company developed sold animation software used hollywood motion pictures industries founded 1984 santa barbara california bill kovacs larry barels mark sylvester started company produce computer graphics movies television commercials market software off-the-shelf computer animation tools available time 1995 wavefront technologies purchased kroyer films silicon graphics rhythm hues merged alias research form alias|wavefront wavefront developed first product preview first year business company production department helped tune software using commercial projects creating opening graphics television programs one first customers purchase preview universal studios television program knight rider early customers included nbc electronic arts nasa wavefront early animation software created bill kovacs jim keating john grower left robert abel associates roy hall others developed company flagship product wavefront advanced visualizer 1988 wavefront released personal visualizer desktop workstation interface high-end rendering software wavefront software developed silicon graphics computers later ported sun ibm hewlett-packard tektronix dec sony systems wavefront purchased silicon graphics first production workstation offer buy prototype given demo knocked back 1989 company released data visualizer early commercial tool scientific visualization 1991 wavefront introduced composer image manipulation product composer became standard 2d 3d compositing special effects feature films television 1992 wavefront released two new animation tools worked advanced visualizer kinemation character animation system used inverse kinematics natural motion dynamation tool interactively creating modifying particle systems realistic natural motion dream quest images used dynamation composer create 90 visual effects sequences film crimson tide 1994 year rival alias made deal nintendo wavefront partnered atari develop gameware game development software gameware exclusive graphics animation development system atari jaguar wavefront software used numerous major films including luxo jr. great mouse detective akira tin toy technological threat knick knack dogs go heaven rock-a-doodle outbreak aladdin true lies stargate electronic arts richard taylor said wavefront software beautifully designed even non-technical person could learn wavefront major reason cg took leap forward wavefront involved several mergers major computer graphics software companies 1980s 1990s 1988 wavefront acquired abel image research division robert abel associates founder bill kovacs previously worked acquisition partially financed belgian government following wavefront establishment office ghent association barco graphics kortrijk acquiring abel image research increased wavefront presence japan japanese conglomerate csk became part owner wavefront japan 1990 helping expand company asia wavefront acquired rival computer graphics company thomson digital images france 1993 tdi software featured innovations nurbs modeling interactive rendering company also extensive distribution channels europe asia february 7 1995 silicon graphics announced would purchase wavefront technologies alias research deal totaling approximately 500 million sgi merged two companies create alias|wavefront goal creating advanced digital tools combining companies strengths reducing duplication time merger wavefront market value 119 million 1994 revenues 28 million partially motivated merger microsoft purchase alias wavefront competitor softimage sgi saw microsoft entrance market threat merged alias wavefront compete microsoft alias owned autodesk softimage october 2008 1997 whilst working wavefront jim hourihan received academy award technical achievement creation dynamation bill kovacs roy hall received scientific engineering academy award 1998 work advanced visualizer 2003 alias|wavefront awarded academy award scientific technical achievement maya software created combination earlier software wavefront alias tdi | [
7010,
3764,
638
] | Test |
3,702 | 9 | FastTrack_Scripting_Host:fasttrack scripting host fasttrack automation studio formerly known fasttrack scripting host – often referred fasttrack – scripting language windows system administrators product ’ goal handle kind scripting might required automate processes microsoft windows networks web site product located www.fasttrackscript.com fasttrack produced fasttrack software headquartered aalborg denmark product promoted manufacturer one-stop shop windows script writers development paradigm “ one operation one script line ” script writers use purpose-built editor create scripts inserting script lines via menus drag ’ n drop simply typing scripts may used box created scratch imported forums users customized product documentation simple scripts include advanced scripts include hood scripts comprise commands functions collections conditions script executed components converted many lines c code sometimes hundreds lines depending particular script operation scripts compiled exe files msi packages treated standalone windows applications fasttrack scripting host fasttrack first developed around 2006 ease administration burden system administrators windows networks idea product came founder president fasttrack software lars pedersen background systems administration previously telenor denmark ’ major telephone company pedersen performed various roles systems administration programming web development also worked consultant developer several major projects various companies europe dissatisfied experiences frustrations administering windows networks pederson looked way make life easier system administrators particular wanted something could minimize amount time needed day perform routine mundane tasks waste time expertise committed projects leading small team developers pedersen developed fasttrack scripting host simplify automate routine tasks system administrators resulting product definitely scripting language used intuitively like programming language without requiring users learn syntax concepts typically associated programming languages april 2010 fasttrack software entered agreement binary research international based city milwaukee united states market sell product globally fsh received windows pro community choice award 2012 first version produced june 2006 contained 51 components commands functions conditions collections making fasttrack following table summarizes dates components major releases companies organizations noaa kawasaki goodyear used implemented fasttrack scripting host | [
644,
8183,
2390,
4759,
7341,
3795
] | Validation |
3,703 | 2 | Nokia_X7-00:nokia x7-00 nokia x7-00 symbian^3 smartphone nokia xseries first xseries phone nokia symbian^3 platform shipped anna update also successor x6 previous multimedia touchscreen phone similar features specifications series x7-00 announced 12 april 2011 alongside nokia e6 16 october 2018 hmd global announced new android smartphone china nokia x7 well known nokia 8.1 globally | [
1066,
5979,
2271,
6517,
372,
1724,
463,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
8072,
2922,
4407,
118,
23,
2564,
7261,
7545,
5044,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
6465,
5062,
3039,
3653,
1582,
4894,
5068,
597,... | Test |
3,704 | 9 | Squeezebox_(network_music_player):squeezebox network music player squeezebox network music player logitech squeezebox originally discontinued favor visually similar simplified logitech ue smart radio 2013 logitech added official menu option install squeezebox software smart radio effectively turning squeezebox radio slim devices established 2000 first known slimserver used streaming music launched hardware player named slimp3 able play streams 2001 although first player fairly simple supporting wired ethernet mp3 natively followed two years later slightly advanced player renamed squeezebox versions followed gradually adding native support additional file formats wi-fi-support gradually adding larger advanced displays well version targeting audiophile users support playing music external streaming platforms pandora napster last.fm sirius also added devices general two operating modes either standalone device connects internet streaming service directly local computer running logitech media server network-attached storage device server software large parts firmware recent players released open source licenses 2006 slim devices acquired logitech 20 million usd logitech continued development player announced august 2012 would discontinued online service mysqueezebox.com needed use squeezebox without private server still maintained logitech given cross-platform nature server software client users ensured continued use platform utilizing raspberry pi dedicated squeezebox device client server first-generation hardware requires logitech media server formerly slimserver squeezecenter squeezebox server run free open source software wired-ethernet natively supports one audio format mp3 logitech media server transcode audio formats mp3 fly using lame mp3 encoder second generation hardware also called sb1 avoid confusing squeezebox product range sb1 originally used display slimp3 main feature additions included optional 802.11b wi-fi support uncompressed pcm/wav/aiff audio streams headphone coaxial optical s/pdif outputs successor models required server may slimserver ended rev 6.5.4 squeezecenter rev 7.x logitech media server slim devices offered bitmap display upgrade hardware longer available units 40×2 noritake character display others 280×16 pixel noritake bitmap display third generation hardware features included optional 802.11g wi-fi native support audio formats flac wma ogg upgraded 320×32 pixel greyscale bitmap vfd display visualizers bitmapped fonts model infrared remote control analog outputs volume control headphone jack coaxial optical digital outputs squeezebox2 supports numerous audio formats including mp3 windows media audio musepack monkey audio apple lossless flac shorten wav aiff ogg vorbis unencrypted aac mp3 windows media flac wav aiff ogg vorbis natively supported player firmware remainder automatically transcoded logitech media server host software one player-supported formats drm-crippled aac apple itunes music store supported squeezebox classic aka squeezebox3 aka sb3 aka squeezebox 3rd generation fourth generation hardware features technical specifications identical squeezebox2 new board chassis design used well new remote internal wi-fi antennas introduction duet squeezebox3 renamed squeezebox classic transition logitech production sb3 available slim devices logitech housing dimensions 7.6 w × 3.7 h × 3.1 192 mm × 93 mm × 80 mm including stand fifth generation hardware features similar squeezebox v3 geared towards audiophiles additional features squeezebox v3 include dual 320×32 pixel displays front panel buttons tactile feedback knob redesigned backlit remote control balanced xlr unbalanced audio outputs balanced unbalanced digital inputs outputs aes/ebu s/pdif inputs operation standalone dac rs-232 serial connection external control infrared input output new design consists sophisticated remote called squeezebox controller aka sbc display like sonos separate simplified network music player box called squeezebox receiver aka sbr connecting stereo sbr operate without sbc although supported logitech recommended advanced users sbc also operate audio player integrated speaker integrated headphone jack additional sbrs could bought separately differences squeezebox classic squeezebox duet include squeezebox controller first unit squeezebox line runs squeezeos embedded linux distribution devices less slim previous squeezeboxes squeezebox radio squeezebox touch also squeezeos based squeezebox controller largely rendered obsolete smartphone tablet pc apps squeezebox touch surpasses squeezebox receiver respects squeezebox duet discontinued early 2011 departure previous models boom combines squeezebox functionality dsp 30 w integrated amplifier bi-amped stereo two-way speakers produce self-contained device requires network connection either wired wireless power without network connection boom still amplify play line level signal external player 3.5mm mini-jack plug squeezebox boom discontinued early 2011 replacement model squeezebox radio adds color screen 2.4 all-in-one design older sibling squeezebox boom mono configuration squeezebox radio powered optional proprietary battery pack made available march 2010 running logitech media server two squeezebox radios synchronized set play one stereo channel thus working stereo device also using headphones one use one single squeezebox radio stereo device squeezebox touch functional successor sb3 couple new features simplified interface limited functionality visually similar squeezebox radio interface option switch squeezebox firmware discontinued 2014 | [
7654,
3304,
4970,
6378,
532,
4011,
1379,
1284,
7169
] | Validation |
3,705 | 2 | Shelf_(computing):shelf computing shelf interface feature nextstep openstep used repository store links commonly used files directories programs temporary holding place move/copy files directories around file system hierarchy macos items may dragged onto sidebar area finder behave placeholders manipulated manner dynamics shelf file system operations illustrated comparison metaphor used microsoft windows operating systems order move file following steps may taken next operating systems addition moving files dragging window window following method used note file dragged shelf moved anywhere changed way shelf icon merely placeholder file moving placeholder shelf actual action occurs next functionality builds upon concept allowing destination directory put shelf well file merely dragged destination directory icon process similar microsoft windows functionality copying cutting file system objects file files folder folders combination clipboard objects copied removed original location paste operation new location completed shelf concept though older powerful file system objects sources destinations persistent available long shelf windows cut copy paste metaphor objects locations persist one copy/move operation complete something else placed clipboard since shelf icons 'placeholders sorts icons put shelf representing commonly used directories commonly used programs put shelf well nextstep openstep file management application called fileviewer run workspace manager also allowed users different shelves associated particular directories users simply opened new browser rooted particular subdirectory browser window would show corresponding shelf allowing users many different shelves based whatever folder hierarchy happened using organize files | [
5101,
4759,
5450
] | Train |
3,706 | 7 | Alibaba_Cloud:alibaba cloud alibaba cloud also known aliyun chinese cloud computing company subsidiary alibaba group alibaba cloud provides cloud computing services online businesses alibaba e-commerce ecosystem alibaba cloud international operations registered headquartered singapore alibaba cloud offers cloud services services available pay-as-you-go basis include elastic compute data storage relational databases big-data processing anti-ddos protection content delivery networks cdn outside status largest cloud computing company china alibaba cloud operates 19 data center regions 56 availability zones around globe june 2017 alibaba cloud placed visionaries quadrant gartner magic quadrant cloud infrastructure service worldwide alibaba cloud 19 regional data centres globally including china north china south china east us west us east europe united kingdom middle east japan hong kong singapore australia malaysia india indonesia data center germany operated vodafone germany frankfurt certified c5 alibaba cloud provides cloud computing iaas paas saas including services e-commerce big data iot object storage oos kubernetes data customization managed alibaba web page using codice_1 command line tool 2017 alibaba cloud singapore university social sciences suss jointly launched university-accredited entrepreneurship program tertiary students | [
7957,
8058,
6986,
1183,
2395,
4511,
230,
5064,
6214,
330,
6219,
249,
2961,
1691,
2700,
7037
] | Test |
3,707 | 2 | Departmental_boot_image:departmental boot image departmental boot image boot image computer enhanced adding applications passwords specific task group department organization many advantages thin client strategy done operating system base long boot device large enough accommodate boot applications together typical departmental windows xp boot image usually large requires dvd store may large network booting accordingly usually installed fixed removable hard drive kept inside machine rather installed network rom boot image control complexity total cost operations advantages using departmental boot image instead common boot image entire organization thin client disadvantages include complexity creating managing several large boot images determining department needs upgrade applications user allowed discipline soon degrades shop easier manage one consists one-off computers quirks frequently requiring re-imaging whose issues really diagnosable comparable experts believe departmental boot image regime degrades rather quickly state without extraordinary discipline controls advocate thin clients ensure control however increasingly possible restrict users installing applications standard boot image automatically re-install variant boot image detected would draconian large organization one boot image often quite acceptable boot image maintained departmental level users request upgraded minimum bureaucracy waiting | [
5571
] | Validation |
3,708 | 3 | PowerPC_e6500:powerpc e6500 powerpc e6500 multithreaded 64-bit power isa-based microprocessor core freescale semiconductor part nxp e6500 power entire range qoriq amp series system chip soc processors share common naming scheme txxxx hard samples manufactured 28 nm process available early 2012 full production later 2012 revised memory subsystem compared previous e5500 core four cores combined cpu cluster sharing large l2 cache e6500 cores supports eight cpu clusters large multiprocessing implementations core first multithreaded core designed freescale reintroduces enhanced version altivec products multithreading allows two virtual cores per hard core organized 2x2-way superscalar one virtual core e6500 often perform better entire e5500 core since freescale essentially duplicated lot logic instead virtualizing addition enhancements core core five integer units four simple one complex two load-store units one 128-bit altivec unit 32+32 kb instruction data l1 caches speeds range 2.5 ghz core designed highly configurable via corenet fabric meet specific needs embedded applications features like multi-core operation interface auxiliary application processing units apu e6501 core revision introduced 2013 enhanced virtualization interrupt support | [
5097,
2719,
3348,
4661,
3936,
1075,
1346,
4479,
2458,
3440,
5100,
1454,
1083,
4408,
5652,
912,
7361,
2845,
7905,
7990,
5665,
6111,
4702,
1199,
1386,
1388,
7654,
7099,
2133,
234,
2501,
239,
6474,
515,
2781,
8125,
4815,
2785,
7327,
1131,
... | Test |
3,709 | 7 | The_Linkup:linkup linkup formerly mediamax spin-off streamload nirvanix social network file sharing service let users send receive store large amounts data via web one first internet based storage services winning numerous awards one largest failures resulting user data loss june 15 2007 system administrator script accidentally misidentified deleted good data along dead data 3.5 million former user accounts files took october 2007 complete partial restore data much irretrievably lost linkup finally experienced meltdown july 10 2008 left 20,000 paying subscribers without digital music video photo files august 8 2008 site place message saying 're sorry mediamax linkup closed affiliate link competitor box.net | [
5571
] | Test |
3,710 | 5 | Cn3D:cn3d cn3d windows macintosh unix-based software united states national library medicine acts helper application web browsers view three-dimensional structures national center biotechnology information entrez retrieval service simultaneously displays structure sequence alignment powerful annotation alignment editing features according official site cn3d public domain source code available | [
405,
4759
] | Test |
3,711 | 4 | Backup_and_Restore:backup restore backup restore formerly windows backup restore center component microsoft windows introduced windows vista included later versions allow users create backups restore backups created earlier replacement ntbackup included previous windows versions became deprecated feature windows 8 completely removed windows 8.1 favor file history however windows 10 re-incorporated operating system backup restore supports two different types backup file backup system image backup windows uses volume shadow copy service ensure files changed backed vss ensures file system-level consistency application-level consistency applications registered vss writers newer backup media cd dvd blu-ray discs supported backup restore windows backup service windows service responsible backup restore operation backup restore application however way interfacing service wbadmin command-line utility may also used entire disk individual files restored utility addition vhd file attached mounted separate disk regardless latest backup incremental full attached disk reflect state disk latest backup previous version feature exposing older backup sets image-based full-system backup option called complete pc backup windows vista system image windows 7 allows imaging entire system including operating system data volumes backed-up image later restored windows recovery environment either computer new computer different brand type file format used image-based backup vhd vhd image also mounted extracting individual files booted using windows 7 enterprise ultimate full-system image backup done beginning windows vista sp1 system images restored machine different motherboard may different disk controller machine must number disks volume shadow copy service also creates maintains periodic copies system user data local volume part system restore operation stores previous versions files incremental block-level changes automatically volume restored using system restore previous versions shell extension windows backup support tape drives also support backing restoring subfolder disk instead creates subfolders backup restore make system image disks ntfs file system system image saved usb flash drive must formatted ntfs file system version windows backup supplied windows server 2008 support hard disk drives large sector sizes 4096 bytes unless support 512 byte emulation features included backup restore may differ depending edition windows windows vista home premium business enterprise ultimate editions schedule automatic backups back files folders network location windows vista business enterprise ultimate editions support complete pc backup windows vista business edition support writing pc backup images dynamic drives e.g flash drives another notable limitation backup restore center windows vista allow users specify individual files folders backed skipped allows users choose file type categories based mime type application association file extension documents music videos etc limitation removed windows 7 windows vista complete pc backup could performed network location windows 7 allows performing full system image backup network location however subsequent incremental system image backups performed network image-based backups network must full backups full system image backups local removable storage incremental windows 7 file backup network share available windows 7 professional enterprise ultimate editions whereas included windows vista home premium manual image-based full system backup including incremental backup done local removable media windows 7 home premium full system backup network also requires windows 7 professional editions backup restore removed windows 8 windows server 2012 microsoft said program underused touting file history feature replace file-based backup access points removed except control panel applet called windows 7 file recovery windows 8.1 control panel applet removed functionality still available system image backup file history windows 8.1 system image backup function allow backing individual files folders libraries also users longer schedule backups gui although wbadmin tool still available used execute scheduled backups using task scheduler windows 10 backup restore control panel returned operating system known backup restore windows 7 part interface scheduling backups lost completely windows 8.1 made available non-system image file backups however program deprecated longer actively developed microsoft since windows 10 fall creators update | [
7879,
3937,
3263,
378,
2198,
6096,
1475,
5401,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
435,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
5134,
7272,
1571,
5850,
140,
6558,
6575,
... | Test |
3,712 | 1 | KeyBase:keybase keybase database web application managing deploying interactive taxonomic keys plants animals developed royal botanic gardens victoria keybase provides medium pathway keys traditionally developed print classical types media used effectively internet environment platform uses concept called keys easily linked together joined keys merged larger seamless keys groups still available browsed independently keys keybase database filtered displayed variety ways filters formats examples keybase database | [] | Test |
3,713 | 4 | Natalya_Kaspersky:natalya kaspersky natalya ivanovna kasperskaya born 5 february 1966 moscow soviet union -- west uses surname masculine form kaspersky —is russian entrepreneur president 'infowatch group companies co-founder former ceo antivirus security software company 'kaspersky lab addition one wealthiest women russia one influential figures russian industry natalya kasperskaya maiden name stutser born 5 february 1966 moscow family engineers soviet defense research institute employees natalya elected member school pioneer council later member district pioneer headquarters also komsomol member organizer alongside main education natalya also played basketball children youth sports school seriously intended become veterinarian giving dream difficulties studying chemistry eighth year education natalya moved ordinary secondary school physics-mathematical school run moscow aviation institute finishing school natalya took entrance exams lomonosov moscow state university enrolled missing half point however results good enough gain entry moscow institute electronics mathematics 1984 1989 natalya studied applied mathematics moscow institute electronics mathematics topic diploma mathematical model nuclear reactor cooling system later earned bachelor degree open university uk studies moscow institute met first husband eugene kaspersky married 1986 graduating institute natalya assigned central scientific construction bureau moscow worked half year research scientist going maternity leave natalya started career age 28 took job january 1994 salesperson computer accessories software firm 50-dollar monthly salary job based newly opened store kami information technologies center created former professor natalya ex-husband eugene kaspersky higher school kgb soviet epoch believes personal data search history geolocation contacts correspondence photo video materials belong state september 1994 natalya became head distribution department antiviral toolkit pro avp development eugene kaspersky team since 1991 two three years natalya successfully built distribution channels technical support network entered international markets sales growing rapidly initial 100–200 per month 1994 130,000 year 600,000 1996 1 million 1997 revenue divided team mother company 1997 future founders 'kaspersky lab decided start business natalya launched kaspersky lab foundation june 1997 key naming new company worked ceo 10 years shares 'kaspersky lab initially split eugene kaspersky 50 two teammate programmers alexey de-monderik vadim bogdanov 20 natalya kasperskaya 10 1997 kaspersky lab sales started double yearly turnover reaching around 7 million 2001 exceeding 67 million 2006 august 2007 natalya unseated suspended key management functions eugene kaspersky due couple divorce deepening ideological divide two eventually natalya agreed stay chairperson newly established board 'kaspersky lab finally breaking ties previously family driven business 2011 kaspersky lab buying natalya stake company 2007 2011 around 30 shares 2007 natalya supervision kaspersky lab turned leading antivirus corporation network regional offices worldwide moment power change 2007 annual sales revenue reached 126 million company estimated capitalization 1.3 billion yearly revenue 700 million 2011 natalya sold remaining stake departed change management company rate growth dropped visibly global revenue growing 40 2009 13.7 2011 3 2012 6 2013 'kaspersky lab bought antispam technology developed 'ashmanov partners head latter igor ashmanov gave buyer idea use antispam engine backwards protection data leaks 2001—2002 'kaspersky lab programmers developed solution later became known infowatch traffic monitor enterprise offers protection corporate users internal threats dlp system december 2013 subsidiary called 'infowatch established develop distribute new software natalya kasperskaya ceo majority owner 'infowatch since october 2007 stake company linked business separation deal ex-husband natalya made main investments 'infowatch 'kribrum 'nanosemantics co-owned igor ashmanov g data software ag german antivirus company 'infowatch software vague prospects time spin-off albatross around 'kaspersky lab neck unlike 'kaspersky lab technological solutions product line new company initially targeted large medium enterprises starting 300 workstations rather small businesses retailers required fundamentally different skill set approach natalya previous experience management turning particularly relevant nevertheless 2012 infowatch previously unprofitable recorded first earnings went growing annual rate 60—70 according 'forbes infowatch annual revenue reached around 12 million 2015 independent experts polled russian daily newspaper 'kommersant spring 2015 estimating business worth 40–50 million today infowatch group companies working two main business areas — corporate protection internal threats external targeted attacks — company holding almost 50 share russian confidential data protection market dlp systems among longstanding clients russian governmental organizations well 'sberbank 'beeline lukoil 'tatneft 'surgutneftegas 'sukhoi 'magnitogorsk iron steel works etc addition infowatch actively developing german middle east south-east asian markets current infowatch shareholders natalya kasperskaya company deputy ceo rustem khairetdinov according forbes natalya kasperskaya fortune around 220 million march 2013 – estimate increased 230 million 2014 270 million 2015 march 2015 russian news portal 'lenta.ru agreed forbes ’ 2014 estimation july 2015 german magazine 'der spiegel published estimation €207 million finally august year women magazine 'cosmopolitan published estimate 270 million according 'der spiegel majority natalya kasperskaya fortune form funds derived asset sales kaspersky october 2015 response question whether 'forbes calculations accurate emphasized company non-public thus need reveal level capitalization adding “ nevertheless good see people seem appreciate value 'infowatch ” natalya kasperskaya member board russian union industrialists entrepreneurs association software developers 'domestic software also member expert russian software council affiliated ministry telecom mass communications russia grant committee skolkovo foundation supervisory board skolkovo institute science technology skoltech furthermore natalya kasperskaya member russian mechanical engineering union association information protection business information security association bisa april 2008 march 2012 natalya member board addition 2009 2011 head working party information computer technologies federal target program ministry education science russia referred “ research inventions priority scientific technology development areas russia 2014—2020 ” natalya kasperskaya enjoyed participating social activities ever since school remembers singing children choir taking part school performances concerts even leading pioneer team agitators addition formed school placard newspaper wrote poetry also interested sports like basketball skiing swimming well phaleristics collecting stamps soviet coins student natalya fascinated moscow theatre life knew repertoires main youth theatres time mossovet theatre taganka theatre sovremennik etc. sometimes queued overnight buy tickets popular performances furthermore also passion guitar poetry often sang played guitar parties natalya interest trekking skiing travelling friends children reading professional literature came later considers good great written american business consultant jim collins favorite books saying influenced outlook addition also speaks english german fluently kasperskaya admits little interest cooking although cook family maternity leave similarly also particular interest fashion clothing brands waste much time shopping instead buying whatever clothes finds suit style addition natalya fan designer brands since knows clothes actually produced natalya perceives gadgets social networks somewhat negatively understands provide capabilities increased surveillance regularly use work sony xperia phone natalya typically allows pr team manage social network presence uses media rarely natalya met first husband eugene kaspersky health resort january 1987 twenty couple marrying six months later 1989 fifth year institute natalya gave birth first son maxim second son ivan following 1991 couple split 1997 divorced 1998 eugene instigation however due joint rapidly growing business divorce covered couple years order demotivate employees panic market natalya met second husband igor ashmanov 1996 cebit computer expo hannover working neighboring stands year later natalya igor renewed acquaintance started communicating one another regularly professional basis natalya kasperskaya remembers started dating two three years later divorce eugene couple deciding marry 2001 2005 igor natalya daughter alexandra followed second daughter maria 2009 third daughter varvara 2012 natalya sons first marriage studied lomonosov moscow state university maxim graduating faculty geography ivan faculty computational mathematics cybernetics april 2011 natalya 20-year-old son ivan kidnapped strogino district moscow way work perpetrators holding one villages sergievo-posadsky subregion moscow oblast suburb demanding ransom €3 million parents however five days later ivan freed thanks actions russian intelligence services five kidnappers including two repeat offenders sentenced prison terms ranging 4.5 11 years | [
5452,
7151,
3162,
4492
] | Test |
3,714 | 4 | The_Rootkit_Arsenal:rootkit arsenal rootkit arsenal escape evasion dark corners system book written bill blunden published jones bartlett publishers may 2009 book takes reader depth rootkit technology uses covers topics ia-32 assembly windows system architecture kernel debugging advanced rootkit development much concerning rootkit technology applied onto e.g white hat hacking book also provides many source code examples rootkit development properly use required recommended fair understanding computer programming operating systems order fully comprehend contents book back cover states advanced book topic book divided four parts 14 chapters goes detail specific technology information required advanced rootkit development use also provides information network file system analysises kernel objects drivers much related rootkit technology reader create fully working rootkit using source codes appendix product description states book sheds light material traditionally poorly documented partially documented intentionally undocumented book received mostly positive reviews websites specializing computer reviews computing reviews writes book book addresses controversial timely issue field network security rootkits notoriously used black hat hacking community rootkit allows attacker subvert compromised system subversion take place application level case early rootkits replaced set common administrative tools dangerous occurs kernel level rootkit hides network traffic processes files attacker decides keep invisible administrators system management tools… work defensive solutions—anti-virus malware detection tools—or interested low-level system programming must read book fact intended audience one best books 2009 richard austin ieee computer society technical committee security privacy also published review book second edition 2014 | [
4759,
5571,
336,
1708,
6823
] | Train |
3,715 | 7 | EMBRACE:embrace embrace european model bioinformatics research community education project year 2005 2010 objective drawing together wide group experts throughout europe involved use information technology biomolecular sciences embrace network worked integrate major databases software tools bioinformatics using existing methods emerging grid service technologies integration efforts driven set test problems representing key issues bioinformatics service providers end-user biologists result groups throughout europe able use embrace service interfaces local proprietary data tools embrace made many bioinformatics web services available international research community project run ebi hinxton england fred marcus eu project coordinator embrace project funded european commission within fp6 programme thematic area life sciences genomics biotechnology health contract number lhsg-ct-2004-512092 | [] | Test |
3,716 | 4 | Samuel_C._Phillips:samuel c. phillips general samuel cochran phillips february 19 1921 – january 31 1990 united states air force four-star general served director nasa apollo manned lunar landing program 1964 1969 seventh director national security agency 1972 1973 commander air force systems command 1973 1975 phillips born springerville arizona february 19 1921 attended public schools cheyenne wyoming graduating cheyenne high school 1938 earned bachelor science degree electrical engineering university wyoming 1942 master science degree electrical engineering university michigan 1950 member kappa sigma fraternity summer break 1940 earned private pilot license phillips commissioned second lieutenant infantry completion reserve officers training corps training graduation university wyoming entered active military service transferred army air corps attended flying school earned pilot wings world war ii phillips served combat pilot 364th fighter group eighth air force based england completed two combat tours duty european theater operations awarded distinguished flying cross oak leaf clusters air medal seven oak leaf clusters french croix de guerre war assigned european theater headquarters frankfurt germany july 1947 phillips transferred langley air force base virginia phillips research development assignments included six years engineering division wright-patterson air force base ohio duty electronics officer nuclear weapons experiments eniwetok atoll operation greenhouse project officer assignments b-52 stratofortress heavy bomber aim-4 falcon air-to-air missile bomarc surface-to-air missile programs phillips returned england 1956 served 7th air division strategic air command participation negotiating completing international agreement united kingdom deployment use american thor nuclear-armed intermediate-range ballistic missile irbm latter assignment earned phillips legion merit medal phillips returned united states 1959 assigned air force ballistic missile division air research development command los angeles california director minuteman intercontinental ballistic missile program icbm 1963 nasa associate administrator manned space flight george e. mueller admired phillips skill managing minuteman air force projects proposed bringing nasa detached military duty program controller manned space flight phillips air force superior agreed condition phillips hired instead director apollo manned lunar landing program december accomplished phillips assigned nasa time achieved rank major two-star general phillips aggressively took job constant daily meetings phone contact visits contractor sites kept road 75 per cent time described job new york times reporter john noble wilford way november 1965 phillips took team north american aviation downey california prime contractor command/service module also saturn v launch vehicle s-ii second stage investigate problems delays quality shortfalls cost overruns december 19 wrote memo naa president lee atwood copy report findings recommended fixes also sent mueller mueller also sent atwood follow-on letter strongly expressing disappointment csm s-ii problems requiring response end january 1966 follow-on visit phillips team march apollo 1 fire killed three astronauts ground test january 27 1967 first manned apollo mission congressional investigation uncovered existence came known phillips report nasa administrator james e. webb called congress testified unaware existence report ignited congressmen senators criticism nasa selection north american contractor however political support president lyndon b. johnson controversy blew next eighteen months apollo got back track toward manned missions goal first lunar landing 1970 small dinner party launch apollo 10 may 1969 dr. wernher von braun director marshall space flight center huntsville ala. praised general phillips one responsible pulling many pieces apollo program together making work time apollo 11 mission july 1969 achieved program manned landing goal phillips announced intention leave nasa return air force duty nasa service promoted lieutenant general september 1969 phillips placed command space missile systems organization samso air force systems command afsc los angeles august 1972 phillips appointed director national security agency dirnsa also chief central security service two years positions phillips assigned commander air force systems command august 1973 andrews air force base maryland retired air force 1975 general phillips fellow institute electrical electronics engineers member american institute aeronautics astronautics selected fellowship organization october 1969 notable valuable contributions sciences technology addition phillips fellow american astronautical society honorary member national business fraternity alpha kappa psi member board governors national space club member board directors united services automobile association president military benefit association phillips awarded air force distinguished service medal september 1969 service nasa july 1972 service commander samso phillips also awarded two nasa distinguished service medals agency 1968 1969 distinguished contributions apollo program phillips held honorary doctor laws degree university wyoming september 26 1971 phillips awarded smithsonian institution langley gold medal aviation space exploration contributions apollo program 1964 1969 14th recipient langley medal since award first presented wright brothers 1909 april 1971 gen. phillips elected member national academy engineering leadership direction minuteman missile program apollo program phillips received general thomas d. white u.s. air force space trophy september 11 1972 also flying tiger pilot trophy awarded american volunteer group july 7 1973 phillips married betty anne phillips three daughters phillips initiated scottish rite freemasonry till 33rd highest degree becoming past master four scottish rite bodies dallas active member supreme council office sovereign grand inspector general scottish rite masons texas.. phillips died cancer palos verdes california january 31 1990 aged 68 | [
4210,
820,
6627,
1278,
4429,
7917,
5412,
5767,
5509,
4988,
2343,
4996,
1701,
4201
] | Test |
3,717 | 3 | Goldmont:goldmont goldmont microarchitecture low-power atom celeron pentium branded processors used systems chip socs made intel apollo lake platform 14 nm goldmont core unveiled intel developer forum idf shenzhen china april 2016 goldmont architecture borrows heavily skylake core processors offers 30 percent performance boost compared previous braswell platform used implement power-efficient low-end devices including cloudbooks 2-in-1 netbooks small pcs ip cameras in-car entertainment systems goldmont 2nd generation out-of-order low-power atom microarchitecture designed entry level desktop notebook computers goldmont built 14 nm manufacturing process supports four cores consumer devices includes intel gen9 graphics architecture introduced skylake goldmont microarchitecture builds success silvermont microarchitecture provides following enhancements similar previous silvermont generation design flaws found processor circutry resulting cease operation processors actively used several years errata named apl46 system may experience inability boot may cease operation added documentation june 2017 stating low pin count real time clock sd card gpio interfaces may stop functioning mitigations found limit impact systems firmware update lpc bus called lpc_clkrun reduces utilization lpc interface turn decreases eliminates lpc bus degradation systems however compatible new firmware recommended use sd card boot device remove card system use possible solution using uhs-i cards operating 1.8v congatec also states issues impact usb buses emmc although mentioned intel public documentation usb maximum 12 active time 60tb transmit traffic life expectancy lifetime port emmc maximum 33 active time set d3 device low power state operating system use newer designs atom c3000 denverton seem affected list desktop processors follows list mobile processors follows list embedded processors follows also atom a3900 series exclusively automotive customers aec-q100 qualification willow trail platform canceled apollo lake offered instead | [
2449,
2814,
5802,
6332,
6698,
6793,
4847,
3942,
3849,
4765,
6170,
3443,
6344,
4108,
1465,
7449,
7453,
3020,
7364,
5669,
5670,
3803,
6647,
1867,
3565,
4077,
6133,
3139,
4985,
766,
691,
5343,
6057,
4098,
6675,
7499,
352,
6152,
2351,
2977,
... | Test |
3,718 | 4 | Solomon_Kullback:solomon kullback solomon kullback april 3 1907august 5 1994 american cryptanalyst mathematician one first three employees hired william f. friedman us army signal intelligence service sis 1930s along frank rowlett abraham sinkov went long distinguished career sis eventual successor national security agency nsa kullback chief scientist nsa retirement 1962 whereupon took position george washington university kullback–leibler divergence named kullback richard leibler kullback born jewish parents brooklyn new york attended boys high school went city college new york graduating ba 1927 math 1929 completed doctorate math george washington university 1934 intention teach returned boy high school found taste discovered real interest using mathematics teaching suggestion abraham sinkov showed civil service flyer junior mathematicians us 2,000 per year took examination passed assigned washington junior cryptanalysts upon arrival washington kullback assigned william f. friedman friedman begun intensive program training cryptology new civilian employees several summers running sis cryptanalysts attended training camps fort meade received commissions reserve officers army kullback sinkov took friedman admonitions education seriously spent next several years attending night classes received doctorates mathematics afterward kullback rediscovered love teaching began offering evening classes mathematics george washington university 1939 completed training three put work actually hired compilations cipher code material u.s. army another task test commercial cipher devices vendors wished sell u.s. government kullback worked partnership frank rowlett red cipher machine messages almost overnight unravelled keying system machine pattern – nothing intercepted messages hand using talents linguist john hurt translate text sis started issuing current intelligence military decision-makers may 1942 five months pearl harbor kullback major sent britain learned bletchley park british producing intelligence high quality exploiting enigma machine also cooperated british solution conventional german codebook-based systems shortly return states kullback moved japanese section chief national security agency nsa formed 1952 rowlett became chief cryptanalysis primary problem facing research development post-war period development high-speed processing equipment kullback supervised staff 60 including innovative thinkers automated data processing development leo rosen sam snyder staff pioneered new forms input memory magnetic tape drum memory compilers make machines truly multi-purpose kullback gave priority using computers generate communications security comsec materials kullback book information theory statistics published john wiley sons 1959 book republished additions corrections dover publications 1968 solomon kullback retired nsa 1962 focused teaching george washington university publishing new papers 1963 elected fellow american statistical association reached rank colonel inducted military intelligence hall fame kullback remembered colleagues nsa straightforward one described totally guileless always knew stood one former nsa senior recalled man unlimited energy enthusiasm man whose judgment usually sound right | [
7961,
122,
1353,
1243
] | Test |
3,719 | 9 | John_Resig:john resig john resig american software engineer entrepreneur best known creator lead developer jquery javascript library resig graduated undergraduate degree computer science rochester institute technology 2005 time worked ankur teredesai data mining instant messaging networks jon schull exploring new ways encouraging real-time online collaboration currently works application developer khan academy previously javascript tool developer mozilla corporation work jquery inducted rochester institute technology innovation hall fame april 30 2010 resig started contributed many javascript libraries including resig frequent guest speaker companies like google yahoo presented many conferences related web technology including sxsw webstock mix tech4africa resig author widely read blog author book pro javascript techniques published apress 2006 secrets javascript ninja bear bibeault published manning publications december 2012 several papers | [
183,
5629,
2451,
4755,
4296,
6172,
3092,
5998,
6092,
1177,
562,
2658,
831,
7734,
313,
1016,
2040,
6368,
237,
54,
2870,
6660,
422,
340,
3663,
5172,
6400,
3584,
7687,
7505,
4287
] | Test |
3,720 | 4 | Back_in_Time_(Linux_software):back time linux software back time backup application linux versions integrate favorably gnome kde sc 4 available directly repositories many linux distributions released terms gnu general public license gpl free software back time uses rsync backend characteristic feature using hard links files identical snapshots different times thus using disk space files remained unchanged possible use several backup profiles e.g backups different hard disks also create schedules symbolic links backed absolute relative ones hard links treated due used backup method back time also supports encryption backups backup ssh advantages hard link method easy look snapshots system different times also easy remove old snapshots compared incremental backup methods save difference information consecutive backup times however drawback back time allow compression requires file systems support hard links backup location graphical interface written qt | [
6289,
4386,
3827,
5965,
5571,
1281,
578
] | Test |
3,721 | 0 | Kaldi_(software):kaldi software kaldi speech recognition toolkit freely available apache license kaldi aims provide software flexible extensible supports linear transforms mmi boosted mmi mce discriminative training feature-space discriminative training deep neural networks kaldi incorporated part chime speech separation recognition challenge several successive events software initially developed part 2009 workshop johns hopkins university | [
1314,
4759,
5571,
7848,
578,
7372,
6367
] | Test |
3,722 | 9 | Visual_IRC:visual irc visual irc virc open-source internet relay chat client windows operating system unlike many irc clients nearly functionality virc driven included irc script result program behavior extended changed without altering source code much source code birc virc 2 related utilities released gpl project web site sourceforge versus scripting language originally developed irc client bisual irc currently used visual irc similar many ways scripting languages used ircii mirc well tcl c. name versus chosen could shortened vs common abbreviation vircscript language used visual irc '96 '98 versus remained mostly backward compatible vircscript existing documentation commentary mentioned vs remained mostly accurate applied versus name also alluded birc origins replacement virc object versus ovs refers object-oriented features versus scripts define classes work objects methods instead textual data aliases however practice ovs mostly used manipulate vcl objects make virc interface scripts stored files usually .vsc file extension though .lib extension sometimes used versus script file simply contains statements interpreted script loaded blocks defined script see replace blocks defined name previous scripts aliases methods including constructors destructors events menu items toolbar items referred routines code blocks hello world code example example count ten example make everyone current channel operator | [
4021,
4759,
5571,
486,
5312,
1674,
2142,
5510,
5162,
1691,
3915,
1989,
1803,
1435
] | Train |
3,723 | 8 | Wolfram_Alpha:wolfram alpha wolfram|alpha also styled wolframalpha wolfram alpha computational knowledge engine answer engine developed wolfram alpha llc subsidiary wolfram research online service answers factual queries directly computing answer externally sourced curated data rather providing list documents web pages might contain answer search engine might wolfram|alpha released may 18 2009 based wolfram earlier flagship product wolfram mathematica computational platform toolkit encompasses computer algebra symbolic numerical computation visualization statistics capabilities additional data gathered academic commercial websites cia world factbook united states geological survey cornell university library publication called birds chambers biographical dictionary dow jones catalogue life crunchbase best buy faa optionally user facebook account users submit queries computation requests via text field wolfram|alpha computes answers relevant visualizations knowledge base curated structured data come sites books site use portfolio automated manual methods including statistics visualization source cross-checking expert review curated data makes alpha different semantic search engines index large number answers try match question one wolfram|alpha provide robust query results based computational facts queries social sciences cultural studies even many questions history responses require subtlety complexity able respond particularly-phrased natural language fact-based questions mary robinson born complex questions old queen elizabeth ii 1974 displays input interpretation question using standardized phrases age queen elizabeth ii royalty 1974 answer age start 1974 47 years biography link wolfram|alpha answer queries require narrative response difference julian gregorian calendars answer factual computational questions june 1 julian calendar mathematical symbolism parsed engine typically responds numerical results example lim x- 0 sin x /x yields correct limiting value 1 well plot 235 terms taylor series registered users possible derivation using l'hôpital rule also able perform calculations data using one source example fifty-second smallest country gdp per capita yields nicaragua 1160 per year wolfram|alpha written 15 million lines wolfram language code runs 10,000 cpus database currently includes hundreds datasets current historical weather datasets accumulated several years curated distinct auto-generated datasets checked quality either scientist expert relevant field someone acting clerical capacity simply verifies datasets acceptable one example live dataset wolfram|alpha use profile facebook user inputting facebook report query user authorizes facebook share account details wolfram site alpha generate personal analytics report containing age distribution friends frequency words used status updates detailed information within two weeks launching facebook analytics service september 2012 400,000 users used downloadable query results behind pay wall summaries accessible free accounts wolfram|alpha short answers api wolfram|alpha simple api wolfram|alpha spoken results api wolfram|alpha full results api wolfram|alpha conversational api wolfram|alpha fast query recognizer api wolfram|alpha summary box api wolfram|alpha instant calculators api wolfram|alpha show steps api wolfram|alpha used power searches microsoft bing duckduckgo search engines first release july 21 2017 brave web browser features wolfram|alpha one default search engines factual question answering also queried apple siri amazon alexa samsung voice dexetra iris voice control software blackberry 10 launch preparations began may 15 2009 7 pm cdt broadcast live justin.tv plan publicly launch service hours later expected issues due extreme load service officially launched may 18 2009 wolfram|alpha received mixed reviews wolfram|alpha advocates point potential even stating determines results important current usefulness december 3 2009 iphone app introduced users considered initial 50 price ios app unnecessarily high since features could freely accessed using web browser instead also complained simultaneous removal mobile formatting option site wolfram responded lowering price 2 offering refund existing customers re-instating mobile site october 6 2010 android version app released available kindle fire nook nook version available outside u.s. 71 apps available use wolfram|alpha engine specialized tasks june 18 2018 japanese version wolfram|alpha released february 8 2012 wolfram|alpha pro released offering users additional features monthly subscription fee key feature ability upload automatic analysis many common file types data including raw tabular data images audio xml dozens specialized scientific medical mathematical formats features include extended keyboard interactivity cdf data downloads in-depth step-by-step solution ability customize save graphical tabular results extra computation time changes free version site time wolfram|alpha pro launched wolfram alpha enterprise business-focused analytics tool released 2016 program combines data supplied corporation algorithms wolfram|alpha answer questions related corporation infoworld published article warning readers potential implications giving automated website proprietary rights data generates free software advocate richard stallman also opposes idea recognizing site copyright holder suspects wolfram would able make case existing copyright law | [
3507,
6788,
4474,
3263,
8065,
5641,
4940,
8082,
4067,
7290,
518,
5612,
2524,
2614
] | Test |
3,724 | 5 | Wavelength-division_multiplexing:wavelength-division multiplexing fiber-optic communications wavelength-division multiplexing wdm technology multiplexes number optical carrier signals onto single optical fiber using different wavelengths i.e. colors laser light technique enables bidirectional communications one strand fiber well multiplication capacity term wdm commonly applied optical carrier typically described wavelength whereas frequency-division multiplexing typically applies radio carrier often described frequency purely conventional wavelength frequency communicate information specifically frequency hertz cycles per second multiplied wavelength physical length one cycle equals velocity carrier wave vacuum velocity light usually denoted lower case letter c. glass fiber substantially slower usually 0.7 times c. data rate ideally might carrier frequency practical systems always fraction carrier frequency wdm system uses multiplexer transmitter join several signals together demultiplexer receiver split apart right type fiber possible device simultaneously function optical add-drop multiplexer optical filtering devices used conventionally etalons stable solid-state single-frequency fabry–pérot interferometers form thin-film-coated optical glass three different wdm types whereof one called wdm notation xwdm normally used discussing technology concept first published 1978 1980 wdm systems realized laboratory first wdm systems combined two signals modern systems handle 160 signals thus expand basic 100 gbit/s system single fiber pair 16 tbit/s system 320 channels also present 12.5 ghz channel spacing see wdm systems popular telecommunications companies allow expand capacity network without laying fiber using wdm optical amplifiers accommodate several generations technology development optical infrastructure without overhaul backbone network capacity given link expanded simply upgrading multiplexers demultiplexers end often done use optical-to-electrical-to-optical o/e/o translation edge transport network thus permitting interoperation existing equipment optical interfaces wdm systems operate single-mode fiber optical cables core diameter 9 µm certain forms wdm also used multi-mode fiber cables also known premises cables core diameters 50 62.5 µm early wdm systems expensive complicated run however recent standardization better understanding dynamics wdm systems made wdm less expensive deploy optical receivers contrast laser sources tend wideband devices therefore demultiplexer must provide wavelength selectivity receiver wdm system wdm systems divided three different wavelength patterns normal wdm coarse cwdm dense dwdm normal wdm sometimes called bwdm uses two normal wavelengths 1310 1550 one fiber coarse wdm provides 16 channels across multiple transmission windows silica fibers dense wdm dwdm uses c-band 1530 nm-1565 nm transmission window denser channel spacing channel plans vary typical dwdm system would use 40 channels 100 ghz spacing 80 channels 50 ghz spacing technologies capable 12.5 ghz spacing sometimes called ultra dense wdm new amplification options raman amplification enable extension usable wavelengths l-band 1565 nm-1625 nm less doubling numbers coarse wavelength division multiplexing cwdm contrast dwdm uses increased channel spacing allow less-sophisticated thus cheaper transceiver designs provide 16 channels single fiber cwdm uses entire frequency band spanning second third transmission windows 1310/1550 nm respectively including critical frequencies oh scattering may occur oh-free silica fibers recommended wavelengths second third transmission windows used avoiding region channels 47 49 51 53 55 57 59 61 remain commonly used os2 fibers water peak problem overcome possible 18 channels used wdm cwdm dwdm based concept using multiple wavelengths light single fiber differ spacing wavelengths number channels ability amplify multiplexed signals optical space edfa provide efficient wideband amplification c-band raman amplification adds mechanism amplification l-band cwdm wideband optical amplification available limiting optical spans several tens kilometres originally term coarse wavelength division multiplexing cwdm fairly generic described number different channel configurations general choice channel spacings frequency configurations precluded use erbium doped fiber amplifiers edfas prior relatively recent itu standardization term one common definition cwdm two signals multiplexed onto single fiber one signal 1550 nm band 1310 nm band 2002 itu standardized channel spacing grid cwdm itu-t g.694.2 using wavelengths 1270 nm 1610 nm channel spacing 20 nm itu g.694.2 revised 2003 shift channel centers 1 nm strictly speaking center wavelengths 1271 1611 nm many cwdm wavelengths 1470 nm considered unusable older g.652 specification fibers due increased attenuation 1270–1470 nm bands newer fibers conform g.652.c g.652.d standards corning smf-28e samsung widepass nearly eliminate water peak attenuation peak allow full operation 18 itu cwdm channels metropolitan networks main characteristic recent itu cwdm standard signals spaced appropriately amplification edfas limits total cwdm optical span somewhere near 60 km 2.5 gbit/s signal suitable use metropolitan applications relaxed optical frequency stabilization requirements allow associated costs cwdm approach non-wdm optical components cwdm used cable television networks different wavelengths used downstream upstream signals systems wavelengths used often widely separated example downstream signal might 1310 nm upstream signal 1550 nm gbic small form factor pluggable sfp transceivers utilize standardized cwdm wavelengths gbic sfp cwdm optics allow legacy switch system converted enable wavelength multiplexed transport fiber selecting compatible transceiver wavelengths use inexpensive passive optical multiplexing device 10gbase-lx4 10 gbit/s physical layer standard example cwdm system four wavelengths near 1310 nm carrying 3.125 gigabit-per-second gbit/s data stream used carry 10 gbit/s aggregate data passive cwdm implementation cwdm uses electrical power separates wavelengths using passive optical components bandpass filters prisms many manufacturers promoting passive cwdm deploy fiber home dense wavelength division multiplexing dwdm refers originally optical signals multiplexed within 1550 nm band leverage capabilities cost erbium doped fiber amplifiers edfas effective wavelengths approximately 1525–1565 nm c band 1570–1610 nm l band edfas originally developed replace sonet/sdh optical-electrical-optical oeo regenerators made practically obsolete edfas amplify optical signal operating range regardless modulated bit rate terms multi-wavelength signals long edfa enough pump energy available amplify many optical signals multiplexed amplification band though signal densities limited choice modulation format edfas therefore allow single-channel optical link upgraded bit rate replacing equipment ends link retaining existing edfa series edfas long haul route furthermore single-wavelength links using edfas similarly upgraded wdm links reasonable cost edfa cost thus leveraged across many channels multiplexed 1550 nm band stage basic dwdm system contains several main components introduction itu-t g.694.1 frequency grid 2002 made easier integrate wdm older standard sonet/sdh systems wdm wavelengths positioned grid exactly 100 ghz 0.8 nm spacing optical frequency reference frequency fixed 193.10 thz 1,552.52 nm main grid placed inside optical fiber amplifier bandwidth extended wider bandwidths first commercial deployment dwdm made ciena corporation sprint network june 1996 today dwdm systems use 50 ghz even 25 ghz channel spacing 160 channel operation dwdm systems maintain stable wavelength frequency needed cwdm closer spacing wavelengths precision temperature control laser transmitter required dwdm systems prevent drift narrow frequency window order ghz addition since dwdm provides greater maximum capacity tends used higher level communications hierarchy cwdm example internet backbone therefore associated higher modulation rates thus creating smaller market dwdm devices high performance factors smaller volume higher performance result dwdm systems typically expensive cwdm recent innovations dwdm transport systems include pluggable software-tunable transceiver modules capable operating 40 80 channels dramatically reduces need discrete spare pluggable modules handful pluggable devices handle full range wavelengths stage details concerning wavelength-converting transponders discussed clarify role played current dwdm technology additional optical transport layer also serve outline evolution systems last 10 years stated wavelength-converting transponders served originally translate transmit wavelength client-layer signal one dwdm system internal wavelengths 1,550 nm band note even external wavelengths 1,550 nm likely need translated almost certainly required frequency stability tolerances optical power necessary system edfa mid-1990s however wavelength converting transponders rapidly took additional function signal regeneration signal regeneration transponders quickly evolved 1r 2r 3r overhead-monitoring multi-bitrate 3r regenerators differences outlined mentioned intermediate optical amplification sites dwdm systems may allow dropping adding certain wavelength channels systems deployed august 2006 done infrequently adding dropping wavelengths requires manually inserting replacing wavelength-selective cards costly systems requires active traffic removed dwdm system inserting removing wavelength-specific cards interrupts multi-wavelength optical signal roadm network operators remotely reconfigure multiplexer sending soft commands architecture roadm dropping adding wavelengths interrupt pass-through channels numerous technological approaches utilized various commercial roadms tradeoff cost optical power flexibility network topology mesh nodes interconnected fibers form arbitrary graph additional fiber interconnection device needed route signals input port desired output port devices called optical crossconnectors oxcs various categories oxcs include electronic opaque optical transparent wavelength selective devices cisco enhanced wdm system combines 1 gb coarse wave division multiplexing cwdm connections using sfps gbics 10 gb dense wave division multiplexing dwdm connections using xenpak x2 xfp dwdm modules dwdm connections either passive boosted allow longer range connection addition cfp modules deliver 100 gbit/s ethernet suitable high speed internet backbone connections shortwave wdm uses vertical-cavity surface-emitting laser vcsel transceivers four wavelengths 846 953 nm range single om5 fiber 2-fiber connectivity om3/om4 fiber see also transponders optical communications different functional views meaning optical transponders several simulation tools used design wdm systems | [
7052,
1618,
6071,
1443,
3956,
823,
911,
2652,
5387,
7824,
1374,
7543,
1375,
2117,
4783,
6825,
8108,
5332,
2061,
1592,
1974,
4093,
5175,
1988,
4378
] | Test |
3,725 | 9 | Swing_Application_Framework:swing application framework swing application framework jsr 296 java specification simple application framework swing applications graphical user interface gui computer software defines infrastructure common desktop applications making swing applications easier create withdrawn jsr 296 specification defines basic structure swing application defines framework small set extensible classes define infrastructure common desktop applications development open-source reference implementation called appframework began 2006 originally expected implementation would means integrating jsr 296 upcoming java se 7 dolphin version java project scheduled included milestone 5 java development kit jdk7 development however august 2009 announced project would included due inability reconcile design flaws achieve consensus among jsr 296 team milestone 5 deadline original swing application framework implementation put hold indefinitely later withdrawn spec lead request june 2011 last public release appframework project version 1.03 several forks original implementation started open-source communities several application framework libraries created achieve goals similar jsr 296 last release bsaf 1.9.1 2012 bsaf still available sourceforge button says project found takes defunct project kenai | [
7848
] | Test |
3,726 | 4 | Security_bug:security bug security bug security defect software bug exploited gain unauthorized access privileges computer system security bugs introduce security vulnerabilities compromising one security bugs need identified exploited qualify security bugs like software bugs stem root causes generally traced either absent inadequate security bugs generally fall fairly small number broad categories include see software security assurance | [
3932,
6515,
1173,
3681,
3448,
2105,
2736,
1363,
4318,
651,
3864,
2566,
6725,
5485,
6904,
1376,
3794,
5401,
2310,
6823,
1019,
2491,
5149,
6376,
1122,
1584,
6756,
2513,
429,
2789,
774,
74,
7865,
5449,
3680,
1805,
1996
] | Test |
3,727 | 4 | Security_Vision:security vision security vision – software meant automation information security management system isms organisation software kind representative security operations center soc functionality security vision renders information security processes comprising information security management system organization automatic compliance international information security management standards next security vision modules allow make automatic performance standard requirements following sections moment creation security vision software till creator system sticks three-level architecture – core level collection level management level core level – made collection analysis correlation events generated different sources events corporate network collection level – meant management level – made rendering information security management process automatic basically russian-speaking system management portal security vision software collects events generated process following information security information technology functioning regulatory requirements associated necessity system kind found mandatory legislation norms russian federation law well recommended international prescriptions economic sectors area regulatory security requirements industry standards international standards software core level comprises functionality stocktaking integrity control certified means 4 level control absence non-declared capabilities listed national catalog certified information security means federal office technical export control also used 2013 2012 2011 2010 | [
363,
7151,
4759,
906,
2390,
5571,
8109,
3143,
2961,
6391,
7125,
2885,
3338,
3680
] | Train |
3,728 | 2 | On-line_Debugging_Tool:on-line debugging tool on-line debugging tool odt used describe several debugger programs developed digital equipment corporation dec hardware various operating systems including os/8 rt-11 rsx-11 rsts/e implemented odt firmware console lsi-11-family processors including 11/03 11/23/24 11/53 11/73 11/83/84 debugger allowed access memory using octal addresses data within software systems debugger accessed process address space dec line pdp-11 processors implement virtual memory operating system perspective instead worked fixed address space mapped unified view program address space using active page register apr apr could map program ram increments 4k 16-bit words maximum 32k words apr could map 8 segments ram limited 4k structure maximum ram apr able map 32k 16-bit words case rsts/e usually meant runtime system rts mapped upper portion address space user program resided lower portion address space rts provided code support access operating system behalf user program rts stored non-static data address space user program rts typically read-only operating system loaded single copy rts mapped user program required rts apr would set map rts upper portion program address space 4k increments basic plus rts basic+ programming language typically mapped 16k user program mapped 4k increments lower 16k rt11 rts occupied 4k user program like rt11-based peripheral interchange program pip could expand maximum 28k odt could used patch binary modules like rts without requiring re-compilation binary source firmware console implementation accessed physical memory odt non-symbolic debugger implements similar functionality advanced debugger adb unix systems console odt replaced lights switches console many earlier processors access console odt obtained either power appropriate power mode selected execution halt instruction kernel mode use front panel halt switch button 1000/ xxxxxx 112737 lf deposits program deposit pc program counter sets pc start program deposit psw program status word locks interrupts effect write stream console check transmitter ready highly probable large number garbage characters displayed rsx-11m-plus odt essentially superset odt implementations odt implemented code linked task using task builder /da switch task built odt run odt invoked entry underscore standard odt prompt addresses odt debugger 16 bit addresses mode odt operating physical addresses used console odt pdp-8 os/8 operating system odt command invoked octal debugging technique tool subsequent pdp-11 odt programs non-symbolic could examine modify memory also set breakpoints | [
861,
5571,
2280,
8066,
4786,
7396
] | Validation |
3,729 | 9 | C3_linearization:c3 linearization computing c3 superclass linearization algorithm used primarily obtain order methods inherited presence multiple inheritance words output c3 superclass linearization deterministic method resolution order mro c3 superclass linearization results three important properties first published 1996 oopsla conference paper entitled monotonic superclass linearization dylan adapted open dylan implementation january 2012 following enhancement proposal chosen default algorithm method resolution python 2.3 newer perl 6 parrot solidity pgf/tikz object-oriented programming module also available alternative non-default mro core perl 5 starting version 5.10.0 extension implementation earlier versions perl 5 named codice_1 exists cpan python guido van rossum summarizes c3 superclass linearization thusly c3 superclass linearization class sum class plus unique merge linearizations parents list parents list parents last argument merge process preserves local precedence order direct parent classes merge parents linearizations parents list done selecting first head lists appear tail elements list except first lists note good head may appear first element multiple lists time forbidden appear anywhere else selected element removed lists appears head appended output list process selecting removing good head extend output list repeated remaining lists exhausted point good head selected heads remaining lists appear one tail lists merge impossible compute due inconsistent orderings dependencies inheritance hierarchy linearization original class exists naive divide conquer approach computing linearization class may invoke algorithm recursively find linearizations parent classes merge-subroutine however result infinitely looping recursion presence cyclic class hierarchy detect cycle break infinite recursion reuse results previous computations optimization recursive invocation shielded re-entrance previous argument means cache memoization given linearization z computed first metaclass enable short representation objects name instead example class '__main__.a class type type class object metaclass=type pass construct inheritance tree class pass class b pass class c pass class pass class e pass class k1 b c pass class k2 b e pass class k3 pass class z k1 k2 k3 pass » z.mro z k1 k2 k3 b c e type 'object perl 6 uses c3 linearization classes default say z.^mro output z k1 k2 k3 b c e mu | [
8132,
5983,
1598,
5965,
2156,
5510,
8122,
538
] | Test |
3,730 | 3 | Bokosuka_Wars:bokosuka wars game responsible laying foundations tactical role-playing game genre simulation rpg genre known japan blend role-playing strategy game elements game also variously described early example action role-playing game early prototype real-time strategy game unique reverse tower defense game time game considered major success japan originally developed 1983 sharp x1 computer ascii entertainment first software contest sold boxed year msx port released 1984 followed 1985 versions s1 pc-6000mkii pc-8801 pc-9801 fm-7 family computer latter released december 14 1985 login magazine november 1984 issue featured sequel x1 entitled new bokosuka wars source code included all-new enemy characters redesigned items traps level difficulty became balanced also included tape login magazine november 1984 issue never sold form pc-8801 version used sold download enterbrain ported i-mode service 2004 famicom version released wii virtual console april 8 2008 sequel bokosuka wars ii released japan november 10 2016 later famicom version king suren forces captured turned trees rocks king ogereth king suren release warriors trees rocks defeat king ogereth forces allies coming trees rocks appear famicom version earlier x1 msx pc computer versions however player starts complete army may gain extra knights freeing prison cells trees rocks soldiers turned objects original computer versions player control three chess-like units king knight pawn pressing d-pad move king suren army desired direction captive soldiers freed using knight break gates front famicom version player starts game king suren 597m acquires allies bumping trees cacti rocks walls using king suren restore normal form throughout world bokosuka obstacles certain characters pass gates soldiers locked broken knights death tiles kill characters except soldiers remove step walls 500m 400m 300m 200m broken king suren one unit collides another battle takes place tile change icon crossed swords b battle victory automatically calculated computer based difference offensive strengths units king suren dies game ends announcing wow lose king suren succeeds defeating king ogreth game ends bravo win japanese instruction manual contains lyrics onward bokosuka すすめボコスカ peculiar game music written programmer | [
4023
] | Test |
3,731 | 4 | MIMEDefang:mimedefang mimedefang gpl licensed framework filtering e-mail uses sendmail milter api c glue code perl code let user write high-performance mail filters perl mimedefang used mimedefang originally developed dianne skoll contracted royal college physicians surgeons canada 2000 help stop flood email viruses college network software written filter attachments originally called mimesweeper mimedefanger currently mimedefang skoll announced software public august 28 2000 december 21 2001 version incorporating support spamassassin released making mimedefang filter spam viruses skoll company roaring penguin software currently markets commercial anti-spam product known canit based open-source version mimedefang milter library included sendmail uses posix threads allow multiple concurrent filters mimedefang perl filter uses pre-forked process model similar traditional apache web server multi-processing model mimedefang therefore consists three components mimedefang users code filtering policies perl using infrastructure provided mimedefang.pl n't need worry thread synchronizations perl filter separate single-threaded process infrastructure provided mimedefang.pl follows milter api reasonably closely exactly includes convenience routines parsing rebuilding mime messages filter authors concentrate high-level policy rather worry low-level api details convenience comes small loss flexibility loss performance | [
2086,
3031,
5983,
1374,
5401,
515,
1435
] | Validation |
3,732 | 2 | Comparison_of_OpenSolaris_distributions:comparison opensolaris distributions technical variations solaris distributions include support different hardware devices systems software package configurations organizational differences may motivated historical reasons criteria include security including quickly security upgrades available ease package management number packages available tables compare noteworthy distribution latest stable release wide-ranging objective criteria cover operating system subjective merits branches marked unstable beta compare solaris distributions operating systems basic general information distributions creator producer release date latest version forth information features distributions package numbers approximate | [
2810,
2098,
5644,
4229,
2026,
7827,
6743,
3559,
753,
6211,
326,
7669,
7581,
6489,
3747,
8037,
352,
971,
3678,
3423,
6505
] | Test |
3,733 | 4 | BlackEnergy:blackenergy blackenergy malware first reported 2007 http-based toolkit generated bots execute distributed denial service attacks 2010 blackenergy 2 emerged capabilities beyond ddos 2014 blackenergy 3 came equipped variety plug-ins russian-based cybergang known sandworm attributed using blackenergy targeted attacks attack distributed via word document powerpoint attachment email luring victims clicking seemingly legitimate file blackenergy code facilitates different attack types infect target machines also equipped server-side scripts perpetrators develop command control c c server cybercriminals use blackenergy bot builder toolkit generate customized bot client executable files distributed targets via email spam phishing e-mail campaigns be1 lacks exploit functionalities relies external tools load bot blackenergy detected using yara signatures provided united states department homeland security dhs • target one ip address per hostname • runtime encrypter evade detection antivirus software • hides processes system driver syssrv.sys • ddos attack commands e.g icmp flood tcp syn flood udp flood http get flood dns flood etc • download commands retrieve launch new updated executables server • control commands e.g stop wait die blackenergy 2 uses sophisticated rootkit/process-injection techniques robust encryption modular architecture known dropper decrypts decompresses rootkit driver binary installs victim machine server randomly generated name update blackenergy 1 combines older rootkit source code new functions unpacking injecting modules user processes packed content compressed using lz77 algorithm encrypted using modified version rc4 cipher hard-coded 128-bit key decrypts embedded content decrypting network traffic cipher uses bot unique identification string key second variation encryption/compression scheme adds initialization vector modified rc4 cipher additional protection dropper rootkit unpacking stub used inner rootkit userspace modules primary modification rc4 implementation blackenergy 2 lies key-scheduling algorithm • execute local files • download execute remote files • updates plugins command control servers • execute die destroy commands latest full version blackenergy emerged 2014 changes simplified malware code version installer drops main dynamically linked library dll component directly local application data folder variant malware involved december 2015 ukraine power grid cyberattack • fs.dll — file system operations • si.dll — system information “ blackenergy lite ” • jn.dll — parasitic infector • ki.dll — keystroke logging • ps.dll — password stealer • ss.dll — screenshots • vs.dll — network discovery remote execution • tv.dll — team viewer • rd.dll — simple pseudo “ remote desktop ” • up.dll — update malware • dc.dll — list windows accounts • bs.dll — query system hardware bios windows info • dstr.dll — destroy system • scan.dll — network scan | [
3957,
8164,
2480,
6756,
6823
] | Test |
3,734 | 3 | Buffalo_network-attached_storage_series:buffalo network-attached storage series buffalo network-attached storage series network-attached storage devices modified miniature general purpose linux-based computers linkstation terastation intended general public kuro box intended expert hackers cheap platform linux development devices undergone various improvements since first produced example first generation device 100base-tx network adapter using parallel ata hard drive current version 1000base-t-capable connection uses serial ata interface older generations device used powerpc mips processors latest version device uses arm architecture processor linkstation powerpc mips arm based network attached storage appliance sold north america europe japan significantly notable among linux community japan us/europe hackable generic linux appliance made tasks file storage task designed linkstation ethernet usb serial ports video output made buffalo technology division melco produced japan 2006 also available american retailers best buy compusa well europe kuro box name series powerpc arm processor based computers intended use network-attached storage device original kuro box made spare hardware components manufacturer linkstation recent versions kuro box use later linkstation hardware hardware similar linkstation kuro box versions provided without hard drive case physical dimensions shape corresponding linkstation black color japanese symbols kuro box 玄箱 meaning box operated expert esoteric knowledge silver lettering side panel name also pun kuro different kanji 黒 also means 'black since january 2012 terastation uses lio iscsi target device runs linux included changes linux source code buffalo required release modified versions source code per terms gnu general public license due availability source code relatively low cost device several community projects centered around two main replacement firmware releases available device first openlink based official buffalo firmware improvements features added freelink debian distribution product designed manufacturer accept user-supplied linux distribution several including kurobox-specific distribution called sylver debian gentoo linux fedora core ported various user groups us/europe japan like linkstation device runs version linux debian gentoo linux distributions netbsd reported ported device various iterations ships universal plug play protocol distribution multimedia stored device also configured variety different media servers twonkyvision media server slimserver/squeezecenter server itunes server using digital audio access protocol samba server lio iscsi target mldonkey client well network file system server posix-based systems use backup server modified use rsync back synchronize data one many computers network pushing data even linkstation pulling data remote servers—beside use buffalo-provided backup software windows also found use number ways notably usb interface comes configured print server also use common unix printing system act usb printer users managed get use number usb devices version 2.6 linux kernel enhanced usb support additionally apache http server software already installed purpose providing buffalo configuration screens device easily converted lightweight web server buffalo content deleted serve content operator choice | [
1066,
2538,
4759,
1167,
289,
3524,
1833,
1933,
4317,
5571,
6443,
578,
1284,
1202,
5055,
6204,
5236,
7919,
6378,
4627,
1973,
2338,
3827,
2157,
1237,
1702,
7049
] | Train |
3,735 | 3 | Gauntlet_(1985_video_game):gauntlet 1985 video game gauntlet fantasy-themed hack slash 1985 arcade game atari games noted one first multi-player dungeon crawl arcade games core design gauntlet comes dandy 1983 atari 8-bit family title resulted lawsuit arcade version gauntlet released november 1985 initially available dedicated 4-player cabinet total 7,848 units distributed atari later released 2-player cabinet variant june 1986 aimed operators could afford sufficient space 4-player version game set within series top-down third-person perspective mazes object find touch designated exit every level assortment special items located level increase player character health unlock doors gain points magical potions destroy enemies screen player controls one four playable fantasy-based characters thor warrior merlin wizard thyra valkyrie questor elf characters named cabinet artwork in-game 're referred title classes character unique strength weaknesses example warrior strongest hand-to-hand combat wizard powerful magic valkyrie best armor elf fastest movement characters assigned control panel 4-player version whereas 2-player version player selects character start game joining middle play enemies assortment fantasy-based monsters including ghosts grunts demons lobbers sorcerers thieves enters level specific generators destroyed bosses game dangerous enemy death destroyed using magic potion otherwise death vanish automatically drained certain amount health player game progresses higher levels skill needed reach exit success often depending willingness players cooperate sharing food luring monsters places engaged slaughtered conveniently contact enemies reduces player health health also slowly drains thus creating time limit character health reaches zero character dies character revived place full health spending game credit — inserting coin arcade — within certain short time window died allows even least proficient players keep playing indefinitely willing keep inserting coins however player final score divided amount credits used play resulting average aside ability four players game also noted narrator voice produced texas instruments tms5220c speech chip tms5220c speech encoded earl vickers narrator voiced ernie fosselius frequently makes statements repeating game rules including shots hurt players yet remember n't shoot food elf shot food warrior needs food badly narrator occasionally comments battle saying 've seen bravery let see get player life force points fall 200 narrator states life force running elf needs food valkyrie die control panel 4-player cabinet wider standard uprights order accommodate four people time player 8-way joystick two buttons one fire ranged attack one magic magic button also starts game gauntlet release games started using design popular conversion target newer games run originally called dungeons game conceived atari game designer ed logg claimed inspiration son interest paper-based game dungeons dragons interest 1983 atari 800 home computer game dandy game development spanned 1983 1985 team led designers ed logg roger zeigler working title became legally unavailable april 1985 renamed gauntlet may based upon elaborate hardware design atari history date company first coin-operated game features voice synthesizer chip gauntlet ported ms-dos apple ii apple macintosh msx nes apple iigs master system genesis gauntlet 4 atari st commodore 64 amstrad cpc zx spectrum genesis port released gauntlet 4 spelled gauntlet iv packaging manual outside japan adds three modes addition arcade mode quest action rpg battle deathmatch game record single-player variant arcade mode progress kept track via passcode emulated instance original gauntlet arcade series included midway arcade treasures 2003 compilation arcade games available nintendo gamecube playstation 2 xbox windows gauntlet deeper dungeons expansion pack original ports gauntlet 512 new levels required original program released 1987 british company u.s. gold uk europe mindscape united states released amstrad cpc msx atari st commodore 64 zx spectrum developed gremlin graphics many levels entries competition throughout europe ten winners awarded prizes gauntlet t-shirt copy program computers contest announced instructions many ported games early 1987 u.s. gold release expansion cassette gauntlet containing hundreds new levels treasure rooms chance maze included tape levels presented randomly artwork side panel artwork arcade cabinet main characters shown enemies removed image replaced pink background many reviewers noted levels much harder original game although consensus quite good first game newly released arcade sequel game highly profitable upon october 1985 launch reportedly earning one san mateo california arcade operator sixteen weeks another canadian operator nine days atari ultimately sold total 7,848 gauntlet video game arcade cabinets 1986 golden joystick awards london gauntlet game year runner-up category arcade-style game year entertainment weekly picked game 14 greatest game available 1991 saying sequels game nothing matches original gauntlet innovative fast-playing mix mazes monsters magic spells macintosh version game reviewed 1989 dragon 150 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars compute praised macintosh version sound effects computer video games praised accuracy amstrad version said great graphics good sounds perfect playability crash praised smooth fast scrolling longevity avenger listed alternative master system review ace said people ages could quickly master controls tasks spectrum version biggest selling game 1986 voted number 38 sinclair readers top 100 games time mega drive release 1993 megatech said action flawless stood test time well continued brilliant game one warrants immediate attention mega praised longevity game saying huge fun must-buy placing game 19 list best mega drive games time decade release official uk playstation magazine noted spent many night hunched fag-stained gauntlet machine said limitations become apparent late 1990s next generation including game top 100 games time noted intro record gauntlet number 101 controversy arose release game arcade subsequent port nintendo entertainment system ed logg co-creator asteroids centipede credited original game design gauntlet arcade version well 1987 nes release version release john palevich threatened lawsuit asserting original concept game dandy game atari 8-bit family written palevich published 1983 conflict settled without suit filed atari games business tengen allegedly awarding palevich gauntlet game machine credited special thanks 1986 logg entirely removed credits later releases 2007 logg claims involvement nes game dandy later reworked atari corporation published atari 2600 atari 7800 atari 8-bit family dark chambers 1988 world record holder gauntlet russ cool score 5.1 million points set december 6 2013 | [
4759,
1508,
1237,
6380,
1454,
4060,
423
] | Test |
3,736 | 4 | MySecureCyberspace:mysecurecyberspace mysecurecyberspace began 2003 initiative carnegie mellon cylab information networking institute educate public computer security network security internet safety inspired national strategy secure cyberspace initiative empowers users secure part cyberspace initiative created web portal www.mysecurecyberspace.com customized information users cybersecurity threats addition tactical countermeasures legal ethical privacy issues example using secure cyberspace tool web portal user could enter online activity email receive explanation common threats issues associated activity spam phishing scams receive advice resolve problems web portal mysecurecyberspace served people ages roles certain areas web portal contained articles resources specifically parents educators children 2005 2012 mysecurecyberspace provided flash-based interactive game designed elementary school children www.carnegiecyberacademy.com called carnegie cadets reinforced principles safe responsible computing enriched content classroom material complied national educational technology standards game could integrated fourth fifth grade curricula carnegie cyber academy website supporting materials remain available game compatible current operating systems grant national science foundation cylab information networking institute launched web portal april 2005 included prototype online carnegie cadets game carnegie cadets mysecurecyberspace game companion website officially launched october 26 2007 demonstration j.h brooks elementary school pittsburgh pa attorney general tom corbett attended kickoff event endorsed game | [
1736,
651,
7641,
1805
] | Validation |
3,737 | 9 | Lispkit_Lisp:lispkit lisp lispkit lisp lexically scoped purely functional subset lisp pure lisp developed testbed functional programming concepts first used early experimentation lazy evaluation secd machine-based implementation written algol variant published developer peter henderson 1980 compiler virtual machine highly portable result implemented many machines base language provides following functions extensions discussed henderson book explicit support lazy evaluation non-deterministic programming functions lambda let letrec similar subtle differences way treat named variables make useful different ways lambda defines returns function let binds expressions variable names letrec essentially similar let except allows definition recursive functions values e.g. infinite series | [
7256,
4573,
1361
] | Test |
3,738 | 2 | Emmabuntüs:emmabuntüs emmabuntüs linux distribution derived ubuntu/debian designed facilitate repacking computers donated humanitarian organizations like emmaüs communities name emmabuntüs portmanteau emmaüs ubuntu desktop environment xfce cairo-dock lxde also included optionally installed multiple applications installed perform task order provide choice user uses system examples | [
5197,
2728,
8169,
7975,
642,
6984,
2297,
6011,
5658,
314,
5232,
745,
2581,
499,
2585,
3559,
1670,
3042,
2511,
1128,
4187,
5523,
5704,
2074,
352,
968,
3751,
6951,
7873
] | Test |
3,739 | 7 | Proactive_network_provider_participation_for_P2P:proactive network provider participation p2p p4p proactive network provider participation p2p method internet service providers isps peer-to-peer p2p software optimize peer-to-peer connections p4p proponents say save isp significant costs using local connections also speeds download times p2p downloaders 45 critics say favor downloaders isps come expense others established 2007 p4p working group p4pwg participants isp movie/content p2p industries focused helping isps handle demands large media files enabling legal distribution – building believe effective model transmitting movies large files customers current p2p model shares data equally peers regardless whether nearby results several nearby peers sending receiving data across world possible – working group members say currently pattern traffic poses problem p4p works isp use new itracker provides information isp network configured p2p client software p2p torrent servers called trackers query itracker identify data routes isp prefers connections avoid changing depending time day p2p software co-operatively connect peers closer cheaper isp selectively favoring peers instead choosing peers randomly provides three methods finding local peers note p4p replace control p2p networks p4p allows isps provides additional information regarding network topology p2p networks may choose utilize optimize network data delivery information used combination information p2p networks collect observed peer data transfer rates example p2p network selecting nearby peer slow far peer fast decision entirely control p2p network implementation p4p entirely voluntary part isps p2p networks adopted mutually beneficial concern existing p2p trackers p4p may used prevent piracy future p4p working group includes prominent members entertainment industry well known anti-piracy lobbyists anti-piracy measures could added future p2p industry also says p4p may slow transfers users bittorrent example designed favor fastest peers available – changed favor closest peers instead must affect speed equality balance peers would lost – clients networks good backbone slow upload speeds would download slower clients using isps support p4p would benefit using local peers p4p work software supports yet protocols currently dominate network keep blind locality liteload shay horovitz danny dolev hebrew university jerusalem presents solution leads p2p locality isps existing protocols future ones | [
6025,
7714
] | Train |
3,740 | 9 | BennuGD:bennugd bennugd also referred bennu game development bennu high-level open-source video game development suite originally created fenix project fork argentinian hacker splitergu officially supported windows linux gp2x wiz gp2x caanoo dingux also run multiple platforms extent including freebsd mac os x ios consoles gp2x dingoo a320 wii recently bennugd ported sega dreamcast playstation 2 bennugd focuses modularity portability makes easy beginners experienced users create games bennugd console application several integrated development environments ide available none officially supported package includes compiler run-time code different shared libraries extend core functionality bennugd created fenix project fork argentinian hacker splintergu disagreements fenix project community january 2010 first part two-part series articles bennugd published spanish todolinux magazine february 2010 second part published | [
1361,
5571,
578,
1435
] | Test |
3,741 | 3 | Programmable_interval_timer:programmable interval timer computing embedded systems programmable interval timer pit counter generates output signal reaches programmed count output signal may trigger interrupt pits may one-shot periodic one-shot timers signal stop counting periodic timers signal every time reach specific value restart thus producing signal periodic intervals periodic timers typically used invoke activities must performed regular intervals counters usually programmed fixed intervals determine long counter count signals interval determines long counter count output signal intel 8253 pit original timing device used ibm pc compatibles used 1.193182 mhz clock signal one third color burst frequency used ntsc one twelfth system clock crystal oscillator contains three timers timer 0 used microsoft windows uniprocessor linux system timer timer 1 historically used dynamic random access memory refreshes timer 2 pc speaker lapic newer intel systems offers higher-resolution one microsecond timer used preference pit timer linux kernels starting 2.6.18 | [
3365,
6872,
1761,
4759,
2868,
2141,
4277,
5261,
6658,
578,
1778
] | Test |
3,742 | 0 | Computational_humor:computational humor computational humor branch computational linguistics artificial intelligence uses computers humor research relatively new area first dedicated conference organized 1996 first computer model sense humor suggested suslov early 1992 investigation general scheme information processing shows possibility specific malfunction conditioned necessity quick deletion consciousness false version specific malfunction identified humorous effect psychological grounds exactly corresponds incongruity-resolution theory however essentially new ingredient role timing added well-known role ambiguity biological systems sense humor inevitably develops course evolution biological function consists quickening transmission processed information consciousness effective use brain resources realization algorithm neural networks justifies naturally spencer hypothesis mechanism laughter deletion false version corresponds zeroing part neural network excessive energy neurons thrown motor cortex arousing muscular contractions practical realization algorithm needs extensive databases whose creation automatic regime suggested recently result magistral direction developed properly subsequent investigations accepted somewhat specialized colouring approach analysis humor classification jokes step attempt generate jokes basing rules underlie classification simple prototypes computer pun generation reported early 1990s based natural language generator program vinci graeme ritchie kim binsted 1994 research paper described computer program jape designed generate question-answer-type puns general i.e. non-humorous lexicon program name acronym joke analysis production engine examples produced jape since approach improved latest report dated 2007 describes standup joke generator implemented java programming language standup generator tested children within framework analyzing usability language skills development children communication disabilities e.g. cerebral palsy project name acronym system augment non-speakers dialog using puns allusion standup comedy children responded language playground enthusiasm showed marked improvement certain types language tests two young people used system ten-week period regaled peers staff family neighbors jokes call spicy missile hot shot joy enthusiasm entertaining others inspirational stock strapparava described program generate funny acronyms askthebrain 2002 used clustering bayesian analysis associate concepts comical way statistical machine learning algorithm detect whether sentence contained said double entendre developed kiddon brun 2011 open-source python implementation kiddon brun twss system program recognize knock-knock jokes reported taylor mazlack kind research important analysis human-computer interaction application machine learning techniques distinguishing joke texts non-jokes described mihalcea strapparava 2006 takizawa et al 1996 reported heuristic program detecting puns japanese language possible application assistance language acquisition described section pun generation another envisioned use joke generators cases steady supply jokes quantity important quality another obvious yet remote direction automated joke appreciation known humans interact computers ways similar interacting humans may described terms personality politeness flattery in-group favoritism therefore role humor human-computer interaction investigated particular humor generation user interface ease communications computers suggested craig mcdonough implemented mnemonic sentence generator converts passwords humorous sentences basing incongruity theory humor suggested resulting meaningless funny sentences easier remember example password ajqa3jtv converted arafat joined quayle ant tarar jeopardized thurmond vase john allen paulos known interest mathematical foundations humor book mathematics humor study logic humor demonstrates structures common humor formal sciences mathematics linguistics develops mathematical model jokes based catastrophe theory | [
1718,
1314,
2493
] | Test |
3,743 | 4 | Veriato:veriato veriato formerly known spectorsoft software company develops sells user behavior analytics employee monitoring software based palm beach gardens located palm beach county florida united states founded 1998 company early entrant internet monitoring software 2008 private equity firms harbourvest partners westview capital partners invested company taking majority ownership position spectorsoft originally serviced consumer business customers longer sells software consumer home use opened west palm beach office london office 2011 2012 spectorsoft acquired assets corner bowl software completely exited consumer market march 31st 2015 moved larger office palm beach gardens 2017 2016 company renamed veriato inc company provider employee monitoring user behavior analytics ransomware detection log management solutions enterprise mid-market small business veriato recon — user behavior analytics solution software detects alerts anomalies related insider threat behaviors also enables review online activity employees high risk exit period veriato 360 — user activity monitoring solution enabling companies retain review report alert employee activity used monitoring higher risk employees incident response provides visibility contextual information veriato investigator — employee investigation solution temporary focused investigations records detailed information employee activity enables exploration playback recorded data veriato log manager — provides event security log management centrally monitors windows unix linux switches routers hubs veriato server manager — adds application resource disk monitoring event log management features found spectorsoft log manager veriato ransomsafe — veriato ransomsafe™ acts vital layer ransomware defense combining just-in-time data protection multiple mechanisms detect shut attacks hold business hostage veriato cerebral — cerebral fully integrated insider threat intelligence platform powered artificial intelligence spector pro given pc magazine editors choice award 2002 review six computer activity monitoring tools 2004 version 5.0 spector pro given editors choice award field four programs 2008 spector 360 sr3 pc magazine editors choice award 2004 spectorsoft listed first time one inc. magazine top 500 fastest-growing private companies america position 224 company achieved position list 2005 number 497 2009 spectorsoft made list inc. 5000 companies number 3340 2010 2011 spectorsoft made inc. magazine 500/5000 list spectorsoft−veriato products mentioned zdnet pc/computing time cnn nbc nightly news new york times wall street journal 2014 spectorsoft sc magazine europe best fraude prevention award best interop 2014 security award spector 360 recon product target audiences spectorsoft−veriato products employers want record activities employees company-owned workstations mobile devices laptops employers may choose monitor employees using spectorsoft−veriato software however still privacy concerns things like personal email spectorsoft addresses privacy issues regularly paper authorized leading privacy attorney available website educators school administrators school districts required protect students online predators cipa ferpa schools use blocking filtering solutions may block sites needed research block new sites yet included filtering solution spector 360 works filters provide additional layer protection also helps keep students on-task providing teachers technology coordinators reports charts show web sites students visit long spent keyword alerts let lab instructors administrators see may violating school acceptable use policy aup spectorsoft−veriato tools especially eblaster used criminal activities several convictions misuse spectorsoft software contains eula specifying installation must machines owned licensee also indicating spectorsoft cooperate law enforcement compelled since spectorsoft−veriato software specifically designed difficult detect remove tools especially eblaster used thieves wish steal credit card information banking information passwords installation software occur without user knowledge permission spectorsoft openly advertise tools record user passwords recorded cases happening parents use spectorsoft−veriato software monitor children internet use spectorsoft marketed spy software people wanting catch spouses cheating however face criminal charges negative publicity spectorsoft longer markets products spouses however nothing stop spouse using products illegally example man michigan installed eblaster partner personal computer charged four felony counts facing five years prison 19,000 fines 2013 texas woman filed criminal complaint estranged husband using eblaster spy facebook e-mail communications patent infringement case helios software llc et al v. spectorsoft corporation concluded september 2014 court granted summary judgment non-infringement ‘ 571 ‘ 237 patents june 2015 five-day trial jury returned verdict direct indirect infringement spectorsoft ‘ 304 patent also found several asserted claims patent invalid anticipated rendered obvious prior art see docket entry 615 civ 12-081-lps | [
2434,
6419,
1504
] | Train |
3,744 | 9 | CDR_coding:cdr coding computer science cdr coding compressed data representation lisp linked lists developed patented mit artificial intelligence laboratory implemented computer hardware number lisp machines derived mit cadr cdr coding fact fairly general idea whenever data object ends reference another data structure b instead place structure b overlapping running end free space required reference add done many times also improve locality reference enhancing performance modern machines transformation especially effective cons-based lists created free half space node perform transformation always possible perform substitution might large enough chunk free space beyond end thus objects end real reference referenced object machine must able tell reading final cell one accomplished inefficiency software use tagged pointers allow pointer final position specifically tagged best done hardware presence mutable objects cdr coding becomes complex reference updated point another object currently object stored field object must relocated along pointers moves typically expensive impossible time cause fragmentation store problem typically avoided using cdr coding immutable data structures unrolled linked lists simpler often higher-performance cdr coding tagged pointers typically less fragmentation short lists cdr coding uses least amount space | [] | Test |
3,745 | 4 | IT_Baseline_Protection_Catalogs:baseline protection catalogs baseline protection catalogs it-grundschutz-kataloge baseline protection manual 2005 collection documents german federal office security information technology bsi provide useful information detecting weaknesses combating attacks information technology environment cluster collection encompasses 3000 pages including introduction catalogs serves basis baseline protection certification enterprise baseline protection protection encompasses standard security measures typical systems normal protection needs detection assessment weak points systems often occurs way risk assessment wherein threat potential assessed costs damage system group similar systems investigated individually approach time-intensive expensive protection may rather proceed typical threat applies 80 cases recommend adequate countermeasures way security level achieved viewed adequate cases consequently replace expensive risk assessment cases security needs greater protection used basis action familiarize user manual contains introduction explanations approach baseline protection series concept role definitions glossary component catalogs threat catalogs measures catalogs follow introductory sections forms cross-reference tables supplement collection available federal office security information technology bsi internet platform also find baseline protection guide containing support functions implementing baseline protection procedural detail catalog element identified individual mnemonic laid according following scheme catalog groups named first c stands component measure threat followed layer number affected element finally serial number within layer identifies element component catalog central element contains following five layers overall aspects infrastructure systems networks applications partitioning layers clearly isolates personnel groups impacted given layer layer question first layer addressed management including personnel outsourcing second addressed in-house technicians regarding structural aspects infrastructure layer system administrators cover third layer looking characteristics systems including clients servers private branch exchanges fax machines fourth layer falls within network administrators task area fifth within applications administrator user concerning software like database management systems e-mail web servers individual component follows layout component number composed layer number component located unique number within layer given threat situation depicted short description component examining facts itemization individual threat sources ultimately follows present supplementary information necessary work establish baseline protection necessary measures presented text short illustrations text follows facts life cycle question includes planning design acquisition necessary realization operation selection necessary preventive measures complete depiction individual measures collected list arranged according measures catalog structure rather life cycle process classification measures categories b c z undertaken category measures entry point subject b measures expand category c ultimately necessary baseline protection certification category z measures additional measures proven practice keep component compact possible global aspects collected one component specific information collected second example apache web server general b 5.4 web server component measures threats web server depicted would apply well b5.11 component deals specifically apache web server components must successfully implemented guarantee system security respective measures threats introduced component also relevant components way network individual components arises baseline protection catalogs threat catalogs connection component catalogs offer detail potential threats systems threat catalogs follow general layout layers force majeure organizational deficiencies spurious human action technical failure premeditated acts distinguished according bsi knowledge collected catalogs necessary establish baseline protection baseline protection however demand understanding measures well vigilance management individual threat sources described briefly finally examples damages triggered threat sources given measures catalogs summarize actions necessary achieve baseline protection measures appropriate several system components described centrally process layers used structuring individual measures groups following layers formed infrastructure organization personnel hardware software communication preventive measures managers initially named initiate realize measures respective measures description detailed description measures follows finally control questions regarding correct realization given realization measures personnel verify whether adaptation operation question necessary deviations initial measures documented future reference besides information summarized baseline protection manual federal office data security provides material internet forms provided serve remedy protection needs certain system components table summarizes measures applied individual components regard measure named degree realization determined degrees realization considerable yes partial distinguished finally realization terminated manager named measures realization possible reasons entered adjacent field later traceability conclusion consists cost assessment besides forms cross-reference tables another useful supplement summarize measures important threats individual components measures well threats cited mnemonics measures cited priority classification table contains correlations measures threats address however cross-reference tables cite important threats measure cited given threat applicable individual system superfluous baseline protection ensured measures realized | [
6022,
7402,
3172,
8091,
4440,
3093,
271
] | Test |
3,746 | 9 | Threaded_code:threaded code computer science term threaded code refers programming technique code form essentially consists entirely calls subroutines often found compiler implementations generate code form and/or implemented form code may processed interpreter may simply sequence machine code call instructions threaded code better code density code generated alternative code generation techniques alternative calling conventions sometimes expense slightly slower execution speed however program small enough fit fully computer processor cache may run faster larger program suffers many cache misses small programs may also run faster programs fill cache switching threads threaded code best known implementation technique commonly used programming languages forth many implementations basic implementations cobol early versions b languages small minicomputers amateur radio satellites common way make computer programs 'translate computer program written symbolic language machine code using compiler code typically fast nonportable since binary code designed specific computer hardware platform different approach uses virtual machine instruction set particular target hardware interpreter executes new target hardware early computers relatively little memory example data general nova ibm 1130 many first apple ii computers 4 kb ram installed consequently lot time spent trying find ways reduce size programs would fit memory available time computers relatively slow simple interpretation noticeably slower executing machine code instead writing every step operation every part program needed programmers saved memory writing step operations see n't repeat placing subroutine processcode refactoringis used today although different reasons top-level application programs may consist nothing subroutine calls many subroutines turn also consist nothing lower level subroutine calls mainframes early microprocessors rca 1802 required several instructions call subroutine top-level application many subroutines sequence constantly repeated subroutine address changing one call next using memory store instructions repeatedly wasteful save space programmers squeezed series subroutine calls list containing contiguous addresses sub-routines used tiny interpreter call subroutine turn identical way programmers squeezed series jumps branch table dispatch table virtual method table list containing destination addresses used small selector branch selected destination threaded code techniques program becomes list entry points actual code executed years programmers created many variations interpreter small selector particular address list addresses may extracted using index general purpose register pointer addresses may direct indirect contiguous non-contiguous linked pointers relative absolute resolved compile time dynamically built one variation best situations save space programmers squeezed lists subroutine calls simple lists subroutine addresses used small loop call subroutine turn example following pseudocode uses technique add two numbers b example list labeled thread variable ip instruction pointer tracks place within list another variable sp stack pointer contains address elsewhere memory available hold value temporarily calling loop codice_1 simple repeated inline end subroutine control jumps end subroutine start another instead jumping twice via codice_1 example called direct threaded code dtc although technique older first widely circulated use term threaded code probably bell article threaded code 1973 charles h. moore invented compact notation 1970 forth virtual machine indirect threaded code itc originally moore invented easy fast nova minicomputers indirection bit every address said published remarks byte magazine forth issue found convenient propagated later forth designs forth compilers compile forth programs direct-threaded code others make indirect-threaded code programs act either way practically executable threaded code uses one another methods invoking subroutines method called threading model addresses thread addresses machine language form simple may overheads thread consists machine addresses parameters must loaded indirectly memory forth systems produce direct-threaded code many machines direct-threading faster subroutine threading see reference example stack machine might execute sequence push push b add might translated following thread routines codice_3 initialized address labeled codice_4 i.e. address codice_5 stored alternatively operands may included thread remove indirection needed makes thread larger indirect threading uses pointers locations turn point machine code indirect pointer may followed operands stored indirect block rather storing repeatedly thread thus indirect code often compact direct-threaded code indirection also typically makes slower though still usually faster bytecode interpreters handler operands include values types space savings direct-threaded code may significant older forth systems typically produce indirect-threaded code example goal execute push push b add following might used codice_3 initialized address codice_7 code fragment codice_8 codice_9 found double-indirecting codice_3 indirect block operands fragment found indirect block following fragment address requires keeping current subroutine codice_3 unlike previous examples contained next subroutine called so-called subroutine-threaded code also call-threaded code consists series machine-language call instructions addresses functions call opposed direct threading use jump early compilers algol fortran cobol forth systems often produced subroutine-threaded code code many systems operated last-in-first-out lifo stack operands well-developed compiler theory modern processors special hardware support subroutine call return instructions overhead one extra machine instruction per dispatch somewhat diminished anton ertl stated contrast popular myths subroutine threading usually slower direct threading however ertl recent tests show subroutine threading faster direct threading 15 25 test cases ertl recent tests show direct threading fastest threading model xeon opteron athlon processors indirect threading fastest threading model pentium processors subroutine threading fastest threading model pentium 4 pentium iii ppc processors example call threading push push b add token threaded code uses lists 8 12-bit indexes table pointers token threaded code notably compact without much special effort programmer usually half three-fourths size threaded-codes quarter eighth size compiled code table pointers either indirect direct forth compilers produce token threaded code programmers consider p-code generated pascal compilers well bytecodes used .net java basic c compilers token-threading common approach historically bytecode uses 8-bit opcodes often stack-based virtual machine typical interpreter known decode dispatch interpreter follows form virtual machine uses byte-size instructions codice_12 simply fetch codice_13 often commonly used 1-byte instructions plus less-common multibyte instructions case codice_12 complex decoding single byte opcodes simply efficiently handled branch table using opcode directly index instructions individual operations simple push add overhead involved deciding execute larger cost actually executing interpreters often much slower machine code however complex compound instructions overhead percentage proportionally less significant huffman threaded code consists lists tokens stored huffman codes huffman code variable length bit string used identify unique token huffman-threaded interpreter locates subroutines using index table tree pointers navigated huffman code huffman threaded code one compact representations known computer program basically index codes organized measuring frequency subroutine occurs code frequent calls given shortest codes operations approximately equal frequencies given codes nearly equal bit-lengths huffman-threaded systems implemented direct-threaded forth systems used pack large amounts slow-running code small cheap microcontrollers published uses smart cards toys calculators watches bit-oriented tokenized code used pbasic seen kind huffman threaded code example string threading operations identified strings usually looked-up hash table used charles h. moore earliest forth implementations university illinois experimental hardware-interpreted computer language also used bashforth examples show branches interpreters branch changes thread pointer codice_3 example conditional branch top-of-stack value zero might encoded follows note codice_16 location jump address handler must skipped codice_17 whether branch taken separating data return stacks machine eliminates great deal stack management code substantially reducing size threaded code dual-stack principle originated three times independently burroughs large systems forth postscript used java virtual machines three registers often present threaded virtual machine another one exists passing data subroutines 'words often threaded virtual machines implementations forth simple virtual machine heart consisting three primitives indirect-threaded virtual machine one given operations perhaps simplest fastest interpreter virtual machine | [
1361,
6002,
6181,
1180,
1435,
6016,
5314,
5948,
1867,
755,
949,
7499,
6778,
2530,
5190
] | Validation |
3,747 | 3 | Instruction_set_architecture:instruction set architecture instruction set architecture isa abstract model computer also referred architecture computer architecture realization isa called implementation isa permits multiple implementations may vary performance physical size monetary cost among things isa serves interface software hardware software written isa run different implementations isa enabled binary compatibility different generations computers easily achieved development computer families developments helped lower cost computers increase applicability reasons isa one important abstractions computing today isa defines everything machine language programmer needs know order program computer isa defines differs isas general isas define supported data types state main memory registers semantics memory consistency addressing modes instruction set set machine instructions comprises computer machine language input/output model instruction set architecture distinguished microarchitecture set processor design techniques used particular processor implement instruction set processors different microarchitectures share common instruction set example intel pentium advanced micro devices athlon implement nearly identical versions x86 instruction set radically different internal designs concept architecture distinct design specific machine developed fred brooks ibm design phase system/360 virtual machines support bytecode isa smalltalk java virtual machine microsoft common language runtime implement translating bytecode commonly used code paths native machine code addition virtual machines execute less frequently used code paths interpretation see just-in-time compilation transmeta implemented x86 instruction set atop vliw processors fashion isa may classified number different ways common classification architectural complexity complex instruction set computer cisc many specialized instructions may rarely used practical programs reduced instruction set computer risc simplifies processor efficiently implementing instructions frequently used programs less common operations implemented subroutines resulting additional processor execution time offset infrequent use types include long instruction word vliw architectures closely related long instruction word liw explicitly parallel instruction computing epic architectures architectures seek exploit instruction-level parallelism less hardware risc cisc making compiler responsible instruction issue scheduling architectures even less complexity studied minimal instruction set computer misc one instruction set computer oisc theoretically important types commercialized machine language built discrete statements instructions processing architecture given instruction may specify complex operations built combining simple instructions executed sequentially otherwise directed control flow instructions examples operations common many instruction sets include processors may include complex instructions instruction set single complex instruction something may take many instructions computers instructions typified instructions take multiple steps control multiple functional units otherwise appear larger scale bulk simple instructions implemented given processor examples complex instructions include complex instructions common cisc instruction sets risc instruction sets risc instruction sets may include well risc instruction sets generally include alu operations memory operands instructions move large blocks memory risc instruction sets include simd vector instructions perform arithmetic operation multiple pieces data time simd instructions ability manipulating large vectors matrices minimal time simd instructions allow easy parallelization algorithms commonly involved sound image video processing various simd implementations brought market trade names mmx 3dnow altivec traditional architectures instruction includes opcode specifies operation perform add contents memory register —and zero operand specifiers may specify registers memory locations literal data operand specifiers may addressing modes determining meaning may fixed fields long instruction word vliw architectures include many microcode architectures multiple simultaneous opcodes operands specified single instruction exotic instruction sets opcode field transport triggered architectures tta operand forth virtual machine 0-operand instruction sets lack operand specifier fields stack machines including nosc conditional instructions often predicate field—a bits encode specific condition cause operation performed rather performed example conditional branch instruction executed branch taken condition true execution proceeds different part program executed branch taken condition false execution continues sequentially instruction sets also conditional moves move executed data stored target location condition true executed target location modified condition false similarly ibm z/architecture conditional store instruction instruction sets include predicate field every instruction called branch predication instruction sets may categorized maximum number operands explicitly specified instructions due large number bits needed encode three registers 3-operand instruction risc architectures 16-bit instructions invariably 2-operand designs atmel avr ti msp430 versions arm thumb risc architectures 32-bit instructions usually 3-operand designs arm avr32 mips power isa sparc architectures instruction specifies number operands registers memory locations immediate values explicitly instructions give one operands implicitly stored top stack implicit register operands given implicitly fewer operands need specified instruction destination operand explicitly specifies destination additional operand must supplied consequently number operands encoded instruction may differ mathematically necessary number arguments logical arithmetic operation arity operands either encoded opcode representation instruction else given values addresses following instruction register pressure measures availability free registers point time program execution register pressure high large number available registers use thus higher register pressure often register contents must spilled memory increasing number registers architecture decreases register pressure increases cost embedded instruction sets thumb suffer extremely high register pressure small register sets general-purpose risc isas like mips alpha enjoy low register pressure cisc isas like x86-64 offer low register pressure despite smaller register sets due many addressing modes optimizations sub-register addressing memory operands alu instructions absolute addressing pc-relative addressing register-to-register spills cisc isas offer size length instruction varies widely little four bits microcontrollers many hundreds bits vliw systems processors used personal computers mainframes supercomputers instruction sizes 8 64 bits longest possible instruction x86 15 bytes 120 bits within instruction set different instructions may different lengths architectures notably reduced instruction set computers risc typically corresponding architecture word size architectures instructions variable length typically integral multiples byte halfword arm thumb-extension mixed variable encoding two fixed usually 32-bit 16-bit encodings instructions mixed freely must switched branch exception boundary armv8 risc instruction set normally fixed instruction length often 4 bytes 32 bits whereas typical cisc instruction set may instructions widely varying length 1 15 bytes x86 fixed-length instructions less complicated handle variable-length instructions several reasons check whether instruction straddles cache line virtual memory page boundary instance therefore somewhat easier optimize speed early computers memory expensive minimizing size program make sure would fit limited memory often central thus combined size instructions needed perform particular task code density important characteristic instruction set computers high code density often complex instructions procedure entry parameterized returns loops etc therefore retroactively named complex instruction set computers cisc however typical frequent cisc instructions merely combine basic alu operation add access one operands memory using addressing modes direct indirect indexed etc. certain architectures may allow two three operands including result directly memory may able perform functions automatic pointer increment etc software-implemented instruction sets may even complex powerful instructions reduced instruction-set computers risc first widely implemented period rapidly growing memory subsystems sacrifice code density simplify implementation circuitry try increase performance via higher clock frequencies registers single risc instruction typically performs single operation add registers load memory location register risc instruction set normally fixed instruction length whereas typical cisc instruction set instructions widely varying length however risc computers normally require often longer instructions implement given task inherently make less optimal use bus bandwidth cache memories certain embedded risc isas like thumb avr32 typically exhibit high density owing technique called code compression technique packs two 16-bit instructions one 32-bit instruction unpacked decode stage executed two instructions minimal instruction set computers misc form stack machine separate instructions 16-64 multiple instructions fit single machine word types cores often take little silicon implement easily realized fpga multi-core form code density misc similar code density risc increased instruction density offset requiring primitive instructions task research executable compression mechanism improving code density mathematics kolmogorov complexity describes challenges limits instructions constituting program rarely specified using internal numeric form machine code may specified programmers using assembly language commonly may generated programming languages compilers design instruction sets complex issue two stages history microprocessor first cisc complex instruction set computer many different instructions 1970s however places like ibm research found many instructions set could eliminated result risc reduced instruction set computer architecture uses smaller set instructions simpler instruction set may offer potential higher speeds reduced processor size reduced power consumption however complex set may optimize common operations improve memory cache efficiency simplify programming instruction set designers reserve one opcodes kind system call software interrupt example mos technology 6502 uses 00 zilog z80 uses eight codes c7 cf d7 df e7 ef f7 ff motorola 68000 use codes range a000..afff fast virtual machines much easier implement instruction set meets popek goldberg virtualization requirements nop slide used immunity-aware programming much easier implement unprogrammed state memory interpreted nop systems multiple processors non-blocking synchronization algorithms much easier implement instruction set includes support something fetch-and-add load-link/store-conditional ll/sc atomic compare-and-swap given instruction set implemented variety ways ways implementing particular instruction set provide programming model implementations instruction set able run executables various ways implementing instruction set give different tradeoffs cost performance power consumption size etc designing microarchitecture processor engineers use blocks hard-wired electronic circuitry often designed separately adders multiplexers counters registers alus etc kind register transfer language often used describe decoding sequencing instruction isa using physical microarchitecture two basic ways build control unit implement description although many designs use middle ways compromises designs use combination hardwired design microcode control unit cpu designs use writable control store—they compile instruction set writable ram flash inside cpu rekursiv processor imsys cjip fpga reconfigurable computing isa also emulated software interpreter naturally due interpretation overhead slower directly running programs emulated hardware unless hardware running emulator order magnitude faster today common practice vendors new isas microarchitectures make software emulators available software developers hardware implementation ready often details implementation strong influence particular instructions selected instruction set example many implementations instruction pipeline allow single memory load memory store per instruction leading load-store architecture risc another example early ways implementing instruction pipeline led delay slot demands high-speed digital signal processing pushed opposite direction—forcing instructions implemented particular way example perform digital filters fast enough mac instruction typical digital signal processor dsp must use kind harvard architecture fetch instruction two data words simultaneously requires single-cycle multiply–accumulate multiplier | [
2903,
4657,
708,
5012,
5364,
6074,
6078,
6079,
713,
1447,
5371,
3948,
7527,
7529,
7533,
5737,
1465,
7541,
2567,
1473,
4694,
5042,
2938,
742,
1481,
5055,
2226,
2950,
1867,
6133,
6480,
1881,
67,
5079,
2248,
4365,
5431,
4368,
4370,
6148,
4... | Test |
3,748 | 2 | List_of_disk_operating_systems:list disk operating systems list disk operating systems acronym dos used form names many simply referred dos within respective communities | [
4291,
6076,
7331,
5462,
5555,
3359,
204,
483,
126,
5833,
6907,
7454,
1288,
5140,
6113,
7556,
7378,
6119,
6206,
6380,
3664,
5784,
1604,
2076
] | Test |
3,749 | 9 | Maclisp:maclisp maclisp maclisp sometimes styled maclisp maclisp programming language dialect language lisp originated massachusetts institute technology mit project mac derived prefix late 1960s based lisp 1.5 richard greenblatt main developer original codebase pdp-6 jon l. white responsible later maintenance development name maclisp began used early 1970s distinguish forks pdp-6 lisp notably bbn lisp maclisp descendant lisp 1.5 maclisp departs lisp 1.5 using value cell access store dynamic values variables lisp 1.5 used linear search association list determine variable value maclisp variable evaluation faster different variable semantics maclisp also employed reader macros make readable input output termed input/output i/o instead entering codice_1 one could enter codice_2 get s-expression although implementations put functions property list maclisp uses different syntax define functions maclisp also load-on-demand feature maclisp began digital equipment corporation pdp-6 pdp-10 computers running incompatible timesharing system later ported pdp-10 operating systems example timesharing total operating system tops-10 tops-20 original implementation assembly language later implementation multics used pl/i maclisp developed considerably lifetime major features added language systems would typically correspond major release numbers maclisp used implement macsyma computer algebra system cas symbolic algebra program macsyma development also drove several features maclisp shrdlu blocks-world program written maclisp language widespread use artificial intelligence ai research community early 1980s also used implement programming languages planner scheme multics maclisp used implement first lisp-based emacs maclisp influential lisp implementation longer maintained actively runs pdp-10 emulators used experimenting early ai programs maclisp began small fixed number data types cons cell atom later termed symbol integer floating-point number later additions included arrays never first-class data types arbitrary-precision integers bignums strings tuples objects except inums implemented pointers data type determined block memory pointed special case small numbers inums programs could interpreted compiled compiled behavior interpreted except local variables lexical default compiled code unless declared special error checking done inline operations car cdr ncomplr compiler mid-1970s introduced fast numeric support lisp languages generating machine code instructions arithmetic rather calling interpretive routines dispatched data type made lisp arithmetic comparable speed fortran scalar operations though fortran array loop implementation remained much faster original version limited 18-bit word memory address pdp-10 considerable effort expended keeping implementation lean simple multics maclisp far larger address space costly use memory processing power pdp-10 exceeded lisp machine invented lisp machine lisp direct descendant maclisp several lisp dialects also use need unify community resulted modern common lisp language maclisp named project mac unrelated apple macintosh mac computer predates decades various lisp systems macintosh particular similarity maclisp | [
7878,
1445,
5019,
1820,
6796,
6087,
2915,
5734,
1478,
2218,
4704,
5757,
6116,
1116,
6471,
7573,
2600,
5077,
1885,
1889,
785,
6507,
795,
6876,
6888,
1557,
4789,
5494,
5501,
6210,
144,
4074,
4085,
7298,
5515,
8025,
6949,
5883,
6955,
1990,
... | Test |
3,750 | 0 | Eloquens_(software):eloquens software eloquens™ text-to-speech software whose first version released 1993 cselt first commercial speech synthesis software able speak italian first commercial product research center cselt field voice technology built diphone-technology aimed reach high computational efficiency result produced voice still robotic natural previous generation voice implemented musa cselt past eloquens applied automatically read timetables italian train stations telephone services provided telecom italia e.g automated address book service nowadays released freeware nowadays typically used spoken comments many youtube videos | [
4759,
5571
] | Validation |
3,751 | 3 | Kernel_(operating_system):kernel operating system kernel computer program core computer operating system complete control everything system systems one first programs loaded start-up bootloader handles rest start-up well input/output requests software translating data-processing instructions central processing unit handles memory peripherals like keyboards monitors printers speakers critical code kernel usually loaded separate area memory protected access application programs less critical parts operating system kernel performs tasks running processes managing hardware devices hard disk handling interrupts protected kernel space contrast application programs like browsers word processors audio video players use separate area memory user space separation prevents user data kernel data interfering causing instability slowness well preventing malfunctioning application programs crashing entire operating system kernel interface low-level abstraction layer process makes requests kernel called system call kernel designs differ manage system calls resources monolithic kernel runs operating system instructions address space speed microkernel runs processes user space modularity kernel primary function mediate access computer resources including key aspects necessary resource management definition execution domain address space protection mechanism used mediate access resources within domain kernels also provide methods synchronization inter-process communication ipc implementations may within kernel kernel also rely processes running although kernel must provide inter-process communication order provide access facilities provided kernels must also provide running programs method make requests access facilities kernel full access system memory must allow processes safely access memory require often first step virtual addressing usually achieved paging and/or segmentation virtual addressing allows kernel make given physical address appear another address virtual address virtual address spaces may different different processes memory one process accesses particular virtual address may different memory another process accesses address allows every program behave one apart kernel running thus prevents applications crashing many systems program virtual address may refer data currently memory layer indirection provided virtual addressing allows operating system use data stores like hard drive store would otherwise remain main memory ram result operating systems allow programs use memory system physically available program needs data currently ram cpu signals kernel happened kernel responds writing contents inactive memory block disk necessary replacing data requested program program resumed point stopped scheme generally known demand paging virtual addressing also allows creation virtual partitions memory two disjointed areas one reserved kernel kernel space applications user space applications permitted processor address kernel memory thus preventing application damaging running kernel fundamental partition memory space contributed much current designs actual general-purpose kernels almost universal systems although research kernels e.g singularity take approaches perform useful functions processes need access peripherals connected computer controlled kernel device drivers device driver computer program enables operating system interact hardware device provides operating system information control communicate certain piece hardware driver important vital piece program application design goal driver abstraction function driver translate os-mandated abstract function calls programming calls device-specific calls theory device work correctly suitable driver device drivers used things video cards sound cards printers scanners modems lan cards common levels abstraction device drivers 1 hardware side 2 software side example show user something screen application would make request kernel would forward request display driver responsible actually plotting character/pixel kernel must maintain list available devices list may known advance e.g embedded system kernel rewritten available hardware changes configured user typical older pcs systems designed personal use detected operating system run time normally called plug play plug play system device manager first performs scan different hardware buses peripheral component interconnect pci universal serial bus usb detect installed devices searches appropriate drivers device management os-specific topic drivers handled differently kind kernel design every case kernel provide i/o allow drivers physically access devices port memory location important decisions made designing device management system designs accesses may involve context switches making operation cpu-intensive easily causing significant performance overhead computing system call process requests service operating system kernel normally permission run system calls provide interface process operating system operations interacting system require permissions available user level process e.g i/o performed device present system form communication processes requires use system calls system call mechanism used application program request service operating system use machine-code instruction causes processor change mode example would supervisor mode protected mode operating system performs actions like accessing hardware devices memory management unit generally operating system provides library sits operating system normal programs usually c library glibc windows api library handles low-level details passing information kernel switching supervisor mode system calls include close open read wait write actually perform useful work process must able access services provided kernel implemented differently kernel provide c library api turn invokes related kernel functions method invoking kernel function varies kernel kernel memory isolation use impossible user process call kernel directly would violation processor access control rules possibilities important consideration design kernel support provides protection faults fault tolerance malicious behaviours security two aspects usually clearly distinguished adoption distinction kernel design leads rejection hierarchical structure protection mechanisms policies provided kernel classified according several criteria including static enforced compile time dynamic enforced run time pre-emptive post-detection according protection principles satisfy e.g denning whether hardware supported language based whether open mechanism binding policy many support hierarchical protection domains typically implemented using cpu modes many kernels provide implementation capabilities i.e objects provided user code allow limited access underlying object managed kernel common example occurs file handling file representation information stored permanent storage device kernel may able perform many different operations e.g read write delete execute file contents user level application may permitted perform operations e.g may allowed read file common implementation kernel provide object application typically called file handle application may invoke operations validity kernel checks time operation requested system may extended cover objects kernel manages indeed objects provided user applications efficient simple way provide hardware support capabilities delegate mmu responsibility checking access-rights every memory access mechanism called capability-based addressing commercial computer architectures lack mmu support capabilities alternative approach simulate capabilities using commonly supported hierarchical domains approach protected object must reside address space application access kernel also maintains list capabilities memory application needs access object protected capability performs system call kernel checks whether application capability grants permission perform requested action permitted performs access either directly delegating request another user-level process performance cost address space switching limits practicality approach systems complex interactions objects used current operating systems objects accessed frequently expected perform quickly approaches protection mechanism firmware supported instead simulated higher levels e.g simulating capabilities manipulating page tables hardware direct support possible performance implications lack hardware support may issue however systems choose use language-based protection important kernel design decision choice abstraction levels security mechanisms policies implemented kernel security mechanisms play critical role supporting security higher levels one approach use firmware kernel support fault tolerance see build security policy malicious behavior top adding features cryptography mechanisms necessary delegating responsibility compiler approaches delegate enforcement security policy compiler and/or application level often called language-based security lack many critical security mechanisms current mainstream operating systems impedes implementation adequate security policies application abstraction level fact common misconception computer security security policy implemented application regardless kernel support typical computer systems today use hardware-enforced rules programs allowed access data processor monitors execution stops program violates rule e.g. user process read write kernel memory systems lack support capabilities processes isolated using separate address spaces calls user processes kernel regulated requiring use one above-described system call methods alternative approach use language-based protection language-based protection system kernel allow code execute produced trusted language compiler language may designed impossible programmer instruct something violate security requirement advantages approach include disadvantages include examples systems language-based protection include jx microsoft singularity edsger dijkstra proved logical point view atomic lock unlock operations operating binary semaphores sufficient primitives express functionality process cooperation however approach generally held lacking terms safety efficiency whereas message passing approach flexible number approaches either lower- higher-level available well many modern kernels providing support systems shared memory remote procedure calls idea kernel i/o devices handled uniformly processes parallel co-operating processes first proposed implemented brinch hansen although similar ideas suggested 1967 hansen description common processes called internal processes i/o devices called external processes similar physical memory allowing applications direct access controller ports registers cause controller malfunction system crash depending complexity device devices get surprisingly complex program use several different controllers providing abstract interface manage device important interface normally done device driver hardware abstraction layer frequently applications require access devices kernel must maintain list devices querying system way done bios one various system buses pci/pcie usb application requests operation device displaying character kernel needs send request current active video driver video driver turn needs carry request example inter process communication ipc naturally listed tasks features provided many ways differ design implementation principle separation mechanism policy substantial difference philosophy micro monolithic kernels mechanism support allows implementation many different policies policy particular mode operation instance mechanism may provide user log-in attempts call authorization server determine whether access granted policy may authorization server request password check encrypted password stored database mechanism generic policy could easily changed e.g requiring use security token mechanism policy integrated module minimal microkernel basic policies included mechanisms allows running top kernel remaining part operating system applications decide policies adopt memory management high level process scheduling file system management etc. monolithic kernel instead tends include many policies therefore restricting rest system rely per brinch hansen presented arguments favour separation mechanism policy failure properly fulfill separation one major causes lack substantial innovation existing operating systems problem common computer architecture monolithic design induced kernel mode user mode architectural approach protection technically called hierarchical protection domains common conventional commercial systems fact every module needing protection therefore preferably included kernel link monolithic design privileged mode reconducted key issue mechanism-policy separation fact privileged mode architectural approach melds together protection mechanism security policies major alternative architectural approach capability-based addressing clearly distinguishes two leading naturally microkernel design see separation protection security monolithic kernels execute code address space kernel space microkernels try run services user space aiming improve maintainability modularity codebase kernels fit exactly one categories rather found two designs called hybrid kernels exotic designs nanokernels exokernels available seldom used production systems xen hypervisor example exokernel monolithic kernel os services run along main kernel thread thus also residing memory area approach provides rich powerful hardware access developers unix developer ken thompson maintain easier implement monolithic kernel microkernels main disadvantages monolithic kernels dependencies system components bug device driver might crash entire system fact large kernels become difficult maintain monolithic kernels traditionally used unix-like operating systems contain operating system core functions device drivers traditional design unix systems monolithic kernel one single program contains code necessary perform every kernel-related task every part accessed programs put library kernel space device drivers scheduler memory handling file systems network stacks many system calls provided applications allow access services monolithic kernel initially loaded subsystems may needed tuned point fast faster one specifically designed hardware although relevant general sense modern monolithic kernels linux freebsd fall category unix-like operating systems feature ability load modules runtime thereby allowing easy extension kernel capabilities required helping minimize amount code running kernel space monolithic kernel advantages hinge points work monolithic kernel done via system calls interfaces usually kept tabular structure access subsystem within kernel disk operations essentially calls made within programs checked copy request passed system call hence far travel monolithic linux kernel made extremely small ability dynamically load modules also ease customization fact versions small enough fit together large number utilities programs single floppy disk still provide fully functional operating system one popular mulinux ability miniaturize kernel also led rapid growth use linux embedded systems types kernels consist core functions operating system device drivers ability load modules runtime provide rich powerful abstractions underlying hardware provide small set simple hardware abstractions use applications called servers provide functionality particular approach defines high-level virtual interface hardware set system calls implement operating system services process management concurrency memory management several modules run supervisor mode design several flaws limitations microkernel also abbreviated μk uk term describing approach operating system design functionality system moved traditional kernel set servers communicate minimal kernel leaving little possible system space much possible user space microkernel designed specific platform device ever going needs operate microkernel approach consists defining simple abstraction hardware set primitives system calls implement minimal os services memory management multitasking inter-process communication services including normally provided kernel networking implemented user-space programs referred servers microkernels easier maintain monolithic kernels large number system calls context switches might slow system typically generate overhead plain function calls parts really require privileged mode kernel space ipc inter-process communication basic scheduler scheduling primitives basic memory handling basic i/o primitives many critical parts running user space complete scheduler memory handling file systems network stacks micro kernels invented reaction traditional monolithic kernel design whereby system functionality put one static program running special system mode processor microkernel fundamental tasks performed able access necessarily hardware manage memory coordinate message passing processes systems use micro kernels qnx hurd case qnx hurd user sessions entire snapshots system views referred essence microkernel architecture illustrates advantages micro kernels use message passing system sort handle requests one server another message passing system generally operates port basis microkernel example request memory sent port opened microkernel request sent within microkernel steps similar system calls rationale would bring modularity system architecture would entail cleaner system easier debug dynamically modify customizable users needs performing part operating systems like gnu hurd minix mklinux qnx redox os although micro kernels small combination required auxiliary code fact often larger monolithic kernels advocates monolithic kernels also point two-tiered structure microkernel systems operating system interact directly hardware creates not-insignificant cost terms system efficiency types kernels normally provide minimal services defining memory address spaces inter-process communication ipc process management functions running hardware processes handled directly micro kernels proponents micro kernels point monolithic kernels disadvantage error kernel cause entire system crash however microkernel kernel process crashes still possible prevent crash system whole merely restarting service caused error services provided kernel networking implemented user-space programs referred servers servers allow operating system modified simply starting stopping programs machine without networking support instance networking server started task moving kernel move data various applications servers creates overhead detrimental efficiency micro kernels comparison monolithic kernels disadvantages microkernel exist however disadvantages micro kernels extremely context based example work well small single purpose critical systems many processes need run complications process management effectively mitigated microkernel allows implementation remaining part operating system normal application program written high-level language use different operating systems top unchanged kernel also possible dynamically switch among operating systems one active simultaneously computer kernel grows grows size vulnerability trusted computing base besides reducing security problem enlarging memory footprint mitigated degree perfecting virtual memory system computer architectures virtual memory support reduce kernel footprint extensive editing performed carefully remove unneeded code difficult non-obvious interdependencies parts kernel millions lines code early 1990s due various shortcomings monolithic kernels versus microkernels monolithic kernels considered obsolete virtually operating system researchers result design linux monolithic kernel rather microkernel topic famous debate linus torvalds andrew tanenbaum merit sides argument presented tanenbaum–torvalds debate monolithic kernels designed code address space kernel space developers argue necessary increase performance system developers also maintain monolithic systems extremely efficient well written monolithic model tends efficient use shared kernel memory rather slower ipc system microkernel designs typically based message passing performance microkernels poor 1980s early 1990s however studies empirically measured performance microkernels analyze reasons inefficiency explanations data left folklore assumption due increased frequency switches kernel-mode user-mode increased frequency inter-process communication increased frequency context switches fact guessed 1995 reasons poor performance microkernels might well 1 actual inefficiency whole microkernel approach 2 particular concepts implemented microkernels 3 particular implementation concepts therefore remained studied solution build efficient microkernel unlike previous attempts apply correct construction techniques end hierarchical protection domains architecture leads design monolithic kernel significant performance drawback time interaction different levels protection i.e process manipulate data structure 'user mode 'supervisor mode since requires message copying value mid-1990s researchers abandoned belief careful tuning could reduce overhead dramatically recently newer microkernels optimized performance l4 k42 addressed problems hybrid kernels used commercial operating systems microsoft windows nt 3.1 nt 3.5 nt 3.51 nt 4.0 2000 xp vista 7 8 8.1 10 apple inc macos uses hybrid kernel called xnu based upon code osf/1 mach kernel osfmk 7.3 freebsd monolithic kernel similar micro kernels except include additional code kernel-space increase performance kernels represent compromise implemented developers demonstrated pure micro kernels provide high performance types kernels extensions micro kernels properties monolithic kernels unlike monolithic kernels types kernels unable load modules runtime hybrid kernels micro kernels non-essential code kernel-space order code run quickly would user-space hybrid kernels compromise monolithic microkernel designs implies running services network stack filesystem kernel space reduce performance overhead traditional microkernel still running kernel code device drivers servers user space many traditionally monolithic kernels least adding actively exploiting module capability well known kernels linux kernel modular kernel essentially parts built core kernel binary binaries load memory demand important note code tainted module potential destabilize running kernel many people become confused point discussing micro kernels possible write driver microkernel completely separate memory space test going live kernel module loaded accesses monolithic portion memory space adding needs therefore opening doorway possible pollution advantages modular hybrid kernel modules generally communicate kernel using module interface sort interface generalized although particular given operating system always possible use modules often device drivers may need flexibility module interface affords essentially two system calls often safety checks done monolithic kernel may done twice disadvantages modular approach nanokernel delegates virtually services including even basic ones like interrupt controllers timer device drivers make kernel memory requirement even smaller traditional microkernel exokernels still-experimental approach operating system design differ types kernels functionality limited protection multiplexing raw hardware providing hardware abstractions top develop applications separation hardware protection hardware management enables application developers determine make efficient use available hardware specific program exokernels extremely small however accompanied library operating systems see also unikernel providing application developers functionalities conventional operating system major advantage exokernel-based systems incorporate multiple library operating systems exporting different api example one high level ui development one real-time control strictly speaking operating system thus kernel required run computer programs directly loaded executed bare metal machine provided authors programs willing work without hardware abstraction operating system support early computers operated way 1950s early 1960s reset reloaded execution different programs eventually small ancillary programs program loaders debuggers left memory runs loaded rom developed formed basis became early operating system kernels bare metal approach still used today video game consoles embedded systems general newer computers use modern operating systems kernels 1969 rc 4000 multiprogramming system introduced system design philosophy small nucleus upon operating systems different purposes could built orderly manner would called microkernel approach decade preceding unix computers grown enormously power point computer operators looking new ways get people use spare time machines one major developments era time-sharing whereby number users would get small slices computer time rate appeared connected slower machine development time-sharing systems led number problems one users particularly universities systems developed seemed want hack system get cpu time reason security access control became major focus multics project 1965 another ongoing issue properly handling computing resources users spent time staring terminal thinking input instead actually using resources computer time-sharing system give cpu time active user periods finally systems typically offered memory hierarchy several layers deep partitioning expensive resource led major developments virtual memory systems commodore amiga released 1985 among first certainly successful home computers feature advanced kernel architecture amigaos kernel executive component exec.library uses microkernel message-passing design kernel components like graphics.library direct access hardware memory protection kernel almost always running user mode special actions executed kernel mode user-mode applications ask operating system execute code kernel mode design phase unix programmers decided model every high-level device file believed purpose computation data transformation instance printers represented file known location data copied file printed systems provide similar functionality tended virtualize devices lower level devices files would instances lower level concept virtualizing system file level allowed users manipulate entire system using existing file management utilities concepts dramatically simplifying operation extension paradigm unix allows programmers manipulate files using series small programs using concept pipes allowed users complete operations stages feeding file chain single-purpose tools although end result using smaller programs way dramatically increased flexibility well ease development use allowing user modify workflow adding removing program chain unix model operating system consists two parts first huge collection utility programs drive operations second kernel runs programs unix programming standpoint distinction two fairly thin kernel program running supervisor mode acts program loader supervisor small utility programs making rest system provide locking i/o services programs beyond kernel n't intervene user space years computing model changed unix treatment everything file byte stream longer universally applicable although terminal could treated file byte stream printed read seem true graphical user interface networking posed another problem even network communication compared file access low-level packet-oriented architecture dealt discrete chunks data whole files capability computers grew unix became increasingly cluttered code also modularity unix kernel extensively scalable kernels might 100,000 lines code seventies eighties kernels modern unix successors like linux 13 million lines modern unix-derivatives generally based module-loading monolithic kernels examples linux kernel many distributions well berkeley software distribution variant kernels freebsd dragonflybsd openbsd netbsd macos apart alternatives amateur developers maintain active operating system development community populated self-written hobby kernels mostly end sharing many features linux freebsd dragonflybsd openbsd netbsd kernels and/or compatible apple first launched classic mac os 1984 bundled macintosh personal computer apple moved nanokernel design mac os 8.6 modern macos originally named mac os x based darwin uses hybrid kernel called xnu created combining 4.3bsd kernel mach kernel microsoft windows first released 1985 add-on ms-dos dependence another operating system initial releases windows prior windows 95 considered operating environment confused operating system product line continued evolve 1980s 1990s windows 9x series adding 32-bit addressing pre-emptive multitasking ended release windows 2000 microsoft also developed windows nt operating system similar interface intended high-end business users line started release windows nt 3.1 1993 introduced general users release windows xp october 2001—replacing windows 9x completely different much sophisticated operating system line continues windows 10 architecture windows nt kernel considered hybrid kernel kernel contains tasks window manager ipc managers client/server layered subsystem model supervisory program supervisor computer program usually part operating system controls execution routines regulates work scheduling input/output operations error actions similar functions regulates flow work data processing system historically term essentially associated ibm line mainframe operating systems starting os/360 operating systems supervisor generally called kernel 1970s ibm abstracted supervisor state hardware resulting hypervisor enabled full virtualization i.e capacity run multiple operating systems machine totally independently hence first system called virtual machine vm although mach developed carnegie mellon university 1985 1994 best-known general-purpose microkernel microkernels developed specific aims l4 microkernel family mainly l3 l4 kernel created demonstrate microkernels necessarily slow newer implementations fiasco pistachio able run linux next l4 processes separate address spaces additionally qnx microkernel principally used embedded systems open-source software minix originally created educational purposes focussed highly reliable self-healing microkernel os | [
4291,
4297,
4300,
2909,
1447,
5724,
13,
7172,
4320,
2933,
2935,
42,
5762,
4347,
56,
58,
65,
2961,
5783,
1521,
1522,
7237,
7242,
101,
1536,
4397,
7251,
4399,
4400,
7253,
1556,
126,
4421,
3023,
4423,
7275,
5847,
1574,
4435,
4441,
5865,
... | Test |
3,752 | 1 | NuoDB:nuodb nuodb database company based cambridge massachusetts founded 2008 nuodb recognized gartner magic quadrant technology used dassault systèmes kodiak uae exchange alfa systems firm founded 2008 nimbusdb changed name nuodb 2011 company co-founders barry s. morris became company ceo jim starkey nuodb based cambridge massachusetts nuodb patented elastically scalable database patent filed march 8 2011 approved july 17 2012 u.s. patent 8,224,860 states inventor jim starkey 2012 firm received 12 million total venture capital 2013 gartner listed nuodb niche player magic quadrant operational database management systems boston business journal mass high tech named nuodb one 2014 innovation stars february 2014 nuodb announced extension series b funding round led dassault systèmes round added 14.2 million company funding morgenthaler ventures hummer winblad venture partners longworth venture partners participated round 2015 gartner listed nuodb time visionary magic quadrant operational database management systems morris company founding ceo became executive chairman july 2015 bob walmsley previously executive vice president sales services promoted ceo nuodb raised 17 million financing round 2016 existing investors including dassault systèmes hummer winblad venture partners longworth venture partners morgenthaler ventures time company raised total 59.7 million funding causesquare announced partnership nuodb 2017 nuodb became official database social engagement platform connects causes organizations donors volunteers nuodb elastic sql database cloud applications nuodb database sql compliant called newsql distributed object architecture works cloud means new server added order scale-out database database runs faster database scales without sharding database distributes tasks amongst several processors avoid bottlenecks data uses peer-to-peer messaging route tasks nodes acid compliant database uses tiered approach — comprising multiple redundant tiers transaction engines te storage managers sm approach helps scale data predictably cloud nuodb domains consist several redundant tes sms run platform adding database capacity done adding tes sms nuodb 2.6 release added support active-active database deployments across multiple amazon web services aws availability zones unlike database systems nuodb makes possible expand databases adding servers rather simply replacing hardware system designed align – expand upon – ibm computer scientist edgar f. codd ’ 12 rules relational databases adds ability run anywhere elastic scalability nonstop availability single logical database distributed security system process 1 million transactions per second available free developer version community edition professional paid version enterprise version community edition expanded january 31 2017 enable scale-out across multiple hosts | [
6025,
2109,
4864,
7248,
5447,
3776
] | Test |
3,753 | 9 | ATS_(programming_language):ats programming language ats applied type system programming language designed unify programming formal specification ats support combining theorem proving practical programming use advanced type systems past version computer language benchmarks game demonstrated performance ats comparable c c++ programming languages using theorem proving strict type checking compiler detect prove implemented functions susceptible bugs division zero memory leaks buffer overflow forms memory corruption verifying pointer arithmetic reference counting program compiles additionally using integrated theorem-proving system ats ats/lf programmer may make use static constructs intertwined operative code prove function attains specification ats derived mostly ml ocaml programming languages earlier language dependent ml author incorporated language latest version ats1 anairiats released v0.2.12 2015-01-20 first version ats2 postiats released september 2013 primary focus ats support theorem proving combination practical programming theorem proving one prove instance implemented function produce memory leaks also prevents bugs might otherwise found testing incorporates system similar proof assistants usually aim verify mathematical proofs—except ats uses ability prove implementations functions operate correctly produce expected output simple example function using division programmer may prove divisor never equal zero preventing division zero error let say divisor x computed 5 times length list one prove case non-empty list x non-zero since x product two non-zero numbers 5 length practical example would proving reference counting retain count allocated block memory counted correctly pointer one know quite literally prove object deallocated prematurely memory leaks occur benefit ats system since theorem proving occurs strictly within compiler effect speed executable program ats code often harder compile standard c code compiles programmer certain running correctly degree specified proofs assuming compiler runtime system correct ats proofs separate implementation possible implement function without proving programmer desires according author hongwei xi ats efficiency largely due way data represented language tail-call optimizations generally important efficiency functional programming languages data stored flat unboxed representation rather boxed representation codice_1 expresses predicates algebraic types predicates pseudo‑code somewhat similar ats source see valid ats source ats code fact int int proof type non tail-recursive factorial proposition theorem proving construction dataprop evaluation fact1 n-1 returns pair proof_n_minus_1 result_of_n_minus_1 used calculation fact1 n proofs express predicates proposition fact n r implies fact n r remember dataprop fact int int note int x also int x monovalued type int x value fun fact n nat n n int n r int fact n r int r implement main0 argc argv added single file compiled follows compilation work various back end c compilers e.g gcc garbage collection used unless explicitly stated -d_ats_gcats compiles gives expected result val x int char 15 c // x.0 15 x.1 c' '| separator functions return wrapped result value evaluation predicates ... universal quantification sortdef nat int 0 // prelude ∀ ∈ int ... // .. ∀ b ∈ type ... fun ype ptr_get0 l addr pf l p ptr l l case+ val+ type+ viewtype+ ... dataviews often declared encode recursively defined relations linear resources nowiki dataview array_v viewt ype+ int addr /nowiki datatypes lists dataviewtype similar datatype linear dataviewtype programmer allowed explicitly free deallocate safe manner memory used storing constructors associated dataviewtype local variables stack array allocation see val var declarations | [
1616,
6507,
1019,
5235,
260,
6567,
5164,
1435,
4359
] | Test |
3,754 | 4 | Cyber_Security_Agency_(Singapore):cyber security agency singapore cyber security agency singapore csa singaporean government agency prime minister office administratively managed ministry communications information provides centralised oversight national cyber security functions works public private sector leads protect singapore ’ critical services energy banking sectors formed 1 april 2015 agency also engages various industries stakeholders heighten cyber security awareness well ensure development singapore ’ cyber security headed ministry defence deputy secretary technology david koh minister-in-charge s. iswaran ministry communications information cyber security agency took functions previously carried singapore infocomm technology security authority sitsa ministry home affairs sitsa set 2009 national specialist authority overseeing operational security csa also took roles undertaken then-infocomm development authority ida singapore computer emergency response team facilitates detection resolution prevention security-related incidents internet agency builds upon government ’ cyber security capabilities include strategy policy development cyber security operations industry development outreach well public communications engagement organised events singapore international cyber week sicw 2016 5,000 attendees close 50 countries sicw also saw launch singapore ’ cybersecurity strategy second edition sicw held 18 21 september 2017 singapore also host 2nd asean ministerial conference cybersecurity year october 2016 prime minister launched singapore ’ cybersecurity strategy aim create resilient trusted cyber environment singapore four pillars underpin strategy part singapore cybersecurity strategy internet access civil servants work station cut-off david koh chief executive newly formed cyber security agency said officials realised much data secure way secure attack surface like building zillion windows doors fire escapes security experts commented move may raise defense cyber attack slightly risk damaging productivity civil servants working four dozen statutory boards cutting people serve | [
7106
] | Test |
3,755 | 3 | Industry_Standard_Architecture:industry standard architecture industry standard architecture isa 16-bit internal bus ibm pc/at similar computers based intel 80286 immediate successors 1980s bus largely backward compatible 8-bit bus 8088-based ibm pc including ibm pc/xt well ibm pc compatibles originally referred pc/at-bus also termed i/o channel ibm isa term coined retronym competing pc-clone manufacturers late 1980s early 1990s reaction ibm attempts replace at-bus new incompatible micro channel architecture 16-bit isa bus also used 32-bit processors several years attempt extend 32 bits called extended industry standard architecture eisa successful however later buses vesa local bus pci used instead often along isa slots mainboard derivatives bus structure still used ata/ide pcmcia standard compact flash pc/104 bus internally within super i/o chips isa bus developed team led mark dean ibm part ibm pc project 1981 compaq created term industry standard architecture isa replace pc compatible isa originated 8-bit system 16-bit version ibm bus introduced release ibm pc/at 1984 1988 32-bit extended industry standard architecture eisa standard proposed gang nine group pc-compatible manufacturers included compaq process retroactively renamed bus isa avoid infringing ibm trademark pc/at computer ibm designed 8-bit version buffered interface motherboard buses intel 8088 16/8 bit cpu ibm pc pc/xt 16-bit version upgrade motherboard buses intel 80286 cpu used ibm isa bus therefore synchronous cpu clock sophisticated buffering methods implemented chipsets interface isa much faster cpus isa designed connect peripheral cards motherboard allows bus mastering first 16 mb main memory addressable original 8-bit bus ran 4.77 mhz clock 8088 cpu ibm pc pc/xt original 16-bit bus ran cpu clock 80286 ibm pc/at computers 6 mhz first models 8 mhz later models ibm rt pc also used 16-bit bus isa also used non-ibm compatible machines motorola 68k-based apollo 68020 amiga 3000 68030 workstations short-lived hobbit later powerpc-based bebox companies like dell improved bus performance 1987 ibm replaced bus proprietary micro channel architecture mca mca overcame many limitations apparent isa also effort ibm regain control pc architecture pc market mca far advanced isa many features would later appear pci however mca also closed standard whereas ibm released full specifications circuit schematics isa computer manufacturers responded mca developing extended industry standard architecture eisa later vesa local bus vlb vlb used electronic parts originally intended mca component manufacturers already equipped manufacture eisa vlb backwards-compatible expansions isa bus users isa-based machines know special information hardware adding system handful devices essentially plug-n-play rare users frequently configure parameters adding new device irq line i/o address dma channel mca done away complication pci actually incorporated many ideas first explored mca though directly descended eisa trouble configuration eventually led creation isa pnp plug-n-play system used combination modifications hardware system bios operating system software automatically manage resource allocations reality isa pnp could troublesome become well-supported architecture final days pci slots first physically-incompatible expansion ports directly squeeze isa motherboard first motherboards largely isa including pci slots mid-1990s two slot types roughly balanced isa slots soon minority consumer systems microsoft pc 99 specification recommended isa slots removed entirely though system architecture still required isa present vestigial way internally handle floppy drive serial ports etc. software compatible lpc bus created isa slots remained years towards turn century common see systems accelerated graphics port agp sitting near central processing unit array pci slots one two isa slots near end late 2008 even floppy disk drives serial ports disappearing extinction vestigial isa lpc bus chipsets horizon pci slots rotated compared isa counterparts—pci cards essentially inserted upside-down allowing isa pci connectors squeeze together motherboard one two connectors used slot time allowed greater flexibility attachment ata hard disk interface directly descended 16-bit isa pc/at ata origins hardcards integrated hard disk drive hdd hard disk controller hdc onto one card best awkward worst damaging motherboard isa slots designed support heavy devices hdds next generation integrated drive electronics drives moved drive controller drive bay used ribbon cable simple interface board connect isa slot ata basically standardization arrangement plus uniform command structure software interface hdc within drive ata since separated isa bus connected directly local bus usually integration chipset much higher clock rates data throughput isa could support ata clear characteristics 16-bit isa 16-bit transfer size signal timing pio modes interrupt dma mechanisms pc/xt-bus eight-bit isa bus used intel 8086 intel 8088 systems ibm pc ibm pc xt 1980s among 62 pins demultiplexed electrically buffered versions 8 data 20 address lines 8088 processor along power lines clocks read/write strobes interrupt lines etc power lines included −5 v ±12 v order directly support pmos enhancement mode nmos circuits dynamic rams among things xt bus architecture uses single intel 8259 pic giving eight vectorized prioritized interrupt lines four dma channels originally provided intel 8237 3 dma channels brought xt bus expansion slots 2 normally already allocated machine functions diskette drive hard disk controller pc/at-bus 16-bit 80286- version pc/xt bus introduced ibm pc/at bus officially termed i/o channel ibm extends xt-bus adding second shorter edge connector in-line eight-bit xt-bus connector unchanged retaining compatibility 8-bit cards second connector adds four additional address lines total 24 8 additional data lines total 16 also adds new interrupt lines connected second 8259 pic connected one lines first 4 × 16-bit dma channels well control lines select 8- 16-bit transfers 16-bit bus slot originally used two standard edge connector sockets early ibm pc/at machines however popularity at-architecture 16-bit isa bus manufacturers introduced specialized 98-pin connectors integrated two sockets one unit found almost every at-class pc manufactured mid-1980s isa slot connector typically black distinguishing brown eisa connectors white pci connectors motherboard devices dedicated irqs present slots 16-bit devices use either pc-bus pc/at-bus irqs therefore possible connect 6 devices use one 8-bit irq 5 devices use one 16-bit irq time 4 devices may use one 8-bit dma channel 3 devices use one 16-bit dma channel originally bus clock synchronous cpu clock resulting varying bus clock frequencies among many different ibm clones market sometimes high 16 20 mhz leading software electrical timing problems certain isa cards bus speeds designed later motherboards integrated chipsets used separate clock generator clock divider either fixed isa bus frequency 4 6 8 mhz allowed user adjust frequency via bios setup used higher bus frequency isa cards certain hercules-compatible video cards instance could show significant performance improvements memory address decoding selection 8 16-bit transfer mode limited 128 kib sections leading problems mixing 8- 16-bit cards could co-exist 128 kib area memcs16 line required set based value la17-23 isa still used today specialized industrial purposes 2008 iei technologies released modern motherboard intel core 2 duo processors addition special i/o features equipped two isa slots marketed industrial military users invested expensive specialized isa bus adaptors available pci bus versions similarly adek industrial computers releasing motherboard early 2013 intel core i3/i5/i7 processors contains one non-dma isa slot pc/104 bus used industrial embedded applications derivative isa bus utilizing signal lines different connectors lpc bus replaced isa bus connection legacy i/o devices recent motherboards physically quite different lpc looks like isa software peculiarities isa 16 mib dma limit corresponds full address space intel 80286 cpu used original ibm likely stick around explained history section isa basis development ata interface used ata a.k.a ide recently serial ata sata hard disks physically ata essentially simple subset isa 16 data bits support exactly one irq one dma channel 3 address bits isa subset ata adds two ide address select chip select lines unique signal lines specific ata/ide hard disks cable select/spindle sync line addition physical interface channel ata goes beyond far outside scope isa also specifying set physical device registers implemented every ata ide drive full set protocols device commands controlling fixed disk drives using registers ata device registers accessed using address bits address select signals ata physical interface channel operations ata hard disks performed using ata-specified protocols ata command set earliest versions ata standard featured simple protocols basic command set comparable command sets mfm rll controllers preceded ata controllers latest ata standards much complex protocols instruction sets include optional commands protocols providing advanced optional-use features sizable hidden system storage areas password security locking programmable geometry translation deviation isa ata isa bus remained locked single standard clock rate backward hardware compatibility ata interface offered many different speed modes could select among match maximum speed supported attached drives kept adding faster speeds later versions ata standard 133 mb/s ata-6 latest forms ata ran much faster isa provided connected directly local bus faster isa bus 16-bit ata/ide interface 8-bit xt-ide also known xta interface hard disks nearly popular ata become xt-ide hardware fairly hard find xt-ide adapters available 8-bit isa cards xta sockets also present motherboards amstrad later xt clones well short-lived line philips units xta pinout similar ata eight data lines two address lines used physical device registers completely different meanings hard drives seagate st351a/x could support either type interface selected jumper many later successor motherboards integrated hard drive interface relied separate hard drive interface plugged isa/eisa/vlb slot even 80486 based units shipped mfm/rll interfaces drives instead increasingly common at-ide commodore built xt-ide based peripheral hard drive memory expansion unit a590 amiga 500 500+ computers also supported scsi drive at-ide type interfaces entered keyboard-cased amiga line upon introduction a600 a1200 integrated interface 44 pin connector many owners removed 2,5 inch bracket installed 3,5 inch drive adapter cable pcmcia specification seen superset ata standard pcmcia hard disk interfaces included pcmcia flash drives allows mutual configuration port drive ata mode de facto extension pcmcia flash drives additionally allow simple ata mode enabled pulling single pin low pcmcia hardware firmware unnecessary use ata drive connected ata port pcmcia flash drive ata adapters thus simple inexpensive guaranteed work every standard pcmcia flash drive adapters used generic pcmcia ports pcmcia interface much complex ata although modern computers physical isa buses ibm compatible computers — x86 x86-64 non-mainframe non-embedded — isa buses allocated physical address space embedded controller chips southbridge cpus provide services temperature monitoring voltage readings buses isa devices ieee started standardization isa bus 1985 called p996 specification however despite even books published p996 specification never officially progressed past draft status still existing user base old computers isa cards still manufactured e.g usb ports complete single board computers based modern processors usb 3.0 sata | [
3755,
2268,
6070,
2983,
8139,
4293,
191,
4482,
2995,
4767,
6784,
5211,
3274,
1833,
1933,
3275,
5920,
7812,
4321,
914,
5571,
6014,
2117,
6211,
7569,
6754,
3319,
7759,
3576,
768,
7212,
2337,
1052,
5784,
3747,
1508,
1237,
352,
4277,
4551,
... | Test |
3,756 | 7 | Citrix_Systems:citrix systems citrix systems inc. american multinational software company provides server application desktop virtualization networking software service saas cloud computing technologies citrix solutions claimed use 400,000 clients worldwide including 99 fortune 100 98 fortune 500 company founded richardson texas 1989 ed iacobucci served chairman departure 2000 began developing remote access products microsoft operating systems licensing source code microsoft partnership company throughout history 1990s citrix came prominence industry leader thin client technology enabling purpose-built devices access remote servers resources company launched first initial public offering 1995 competitors experienced large revenue increases 1995 1999 citrix acquired sequoia software corp. 2001 expertcity provider remote desktop products 2003 followed dozen acquisitions 2005 2012 allowed citrix expand server desktop virtualization cloud computing infrastructure service software service offerings 2014 citrix acquired framehawk used technology improve delivery virtual desktops applications wireless networks 2016 part us 1.8 billion product deal logmein citrix spun goto product line new business entity entitled getgo 2017 citrix completed merger getgo logmein products citrix corporate headquarters fort lauderdale florida santa clara california subsidiary operations california massachusetts additional development centers australia canada denmark germany india united kingdom citrix january 2018 reported revenue continuing operations 2.82 billion fiscal year 2017 compared 2.74 billion fiscal year 2016 3 increase april 2017 company employed approximately 8,100 employees worldwide citrix founded richardson texas 1989 former ibm developer ed iacobucci 3 million funding following initial setup development iacobucci moved company former home coral springs florida company first employees five engineers ibm iacobucci convinced join team iacobucci served chairman company roger roberts became ceo citrix 1990 citrix originally named citrus changed name existing company claimed trademark rights citrix name portmanteau citrus unix company first product citrix multiuser extension os/2 developed two years citrix licensed os/2 source code microsoft developed independent computing architecture ica protocol citrix multiuser multiuser allowed multiple users working separate computers remote access software server even computers built run os/2 three days product launched 1991 microsoft announced would switching os/2 windows switch made multiuser nearly unusable without significant changes make compatible windows dos company discussed closing 1991 investments intel microsoft kleiner perkins caufield byers among others allowed company work new version multiuser multi-win version 2.0 released 1992 compatible dos applications allowed five users 1993 citrix released new remote applications server winview ability run dos windows applications 1994 company yearly revenue equaled us 10 million company launched winframe multi-user operating system based microsoft windows nt 1995 new product allowed 15 users first thin client windows citrix initial public offering december 1995 company share price doubled 15 30 mid-1990s citrix became leader growing industry competitors company revenues doubled year year 1995 1999 following weeks discussions iacobucci able persuade microsoft agree license citrix technology windows nt server 4.0 resulted windows terminal server edition 1998 agreement allowed citrix keep position marketplace nt 4.0 compatible citrix also earned 75 million agreement along royalty arrangement valued approximately 100 million citrix released metaframe 1.0 conjunction terminal server edition due weaknesses microsoft remote desktop protocol rdp terminal server edition worked best using ica protocol developed citrix found metaframe meant citrix technology purchased installed machines running terminal server edition 1997 company opened new headquarters fort lauderdale florida also opened offices sydney london paris year 1998 mark templeton became ceo citrix serving vice president marketing also 1998 licensed ica protocol ibm key tronics citrix licensed ica protocol motorola use digital wireless handsets 1999 1999 thin-client model citrix used became software trend company customers increased 15 million major clients included sears chevron sudden drop stocks 2000 led iacobucci leaving company ceo mark templeton demoted president senior executive officer templeton later reinstated 2001 2001 citrix acquired sequoia software corp. 185 million year released metaframe xp new platform using metaframe technology later rebranded citrix presentation server 2005 july 9 2002 citrix announced 10 job cut time company employed 1,900 workers announcement stock hit five-year low citrix acquired expertcity provider remote desktop products december 2003 225 million cash stock acquisition largest company date acquisition citrix gained expertcity existing products gotomypc gotoassist expertcity became citrix online division company 2004 company introduced citrix gotomeeting 2005 2012 company acquired dozen companies allowed expand new markets citrix acquired acceleration hardware maker netscaler 2005 allowed company offer optimized application delivery company entered server desktop virtualization market purchase xensource august 2007 citrix expanded cloud infrastructure service iaas offerings august 2010 acquisition vmlogix february 2011 citrix entered european software service saas market acquisition netviewer 2007 company opened headquarters silicon valley 2008 company changed name presentation server product line xenapp also 2008 citrix announced expanded alliance microsoft desktop virtualization solutions january 29 2009 citrix announced 460 employee positions would cut comprising 10 workforce august 2010 citrix announced partnership google bring company products chrome os devices july 14 2015 citrix added full support windows 10 desktop virtualization products company became leader iaas acquisition cloud.com provider cloud infrastructure companies july 2011 citrix began offering vdi-in-a-box small medium businesses acquisition kaviza may 2011 company acquired technology cloud-based file sharing storage purchase sharefile october 2011 may 2012 citrix acquired virtual computer maker intelligent desktop virtualization technology used company xenclient enterprise edition citrix entered mobile video telecom markets june 2012 company acquired bytemobile also 2012 company acquired zenprise zenprise mobile application management mam technology released xenmobile february 2013 citrix acquired framehawk january 2014 order use company technology improve delivery virtual desktops applications wireless networks including cellular speed quality may poor may 2014 citrix acquired scalextreme bolster cloud capabilities core business unit xendesktop xenapp auto scaling patching automation complex deployments cloud january 29 2015 citrix announced 700 full-time 200 contractor positions would eliminated constituted 10 workforce cuts expected save 90 100 million year two hundred layoffs occurred fort lauderdale florida company headquartered company 10,081 employees february 2015 december 2015 citrix employed approximately 9,500 people noted november restructure due eliminate nearly 700 full-time jobs december 31 2018 citrix approximately 8,200 employees citrix reported net income 251.7 million 2014 339.5 million 2013 july 2015 company announced several changes board directors including robert calderoni becoming executive chairman adding jesse cohn senior partner activist hedge fund elliott management month company announced president ceo mark templeton would retire replacement found october 21 company named executive chairman robert calderoni interim president ceo january 2016 kirill tatarinov former microsoft executive named president ceo citrix joined company board calderoni remained executive chairman board july 2016 part deal boston-based saas company logmein citrix announced spun goto product line included gotomeeting gotowebinar gotowebcast gototraining gotoassist gotomypc wholly owned subsidiary called getgo february 2017 citrix completed merger getgo became subsidiary logmein transaction valued approximately 1.8 billion david henshall became company ceo july 2017 also 2017 citrix expanded partnership google may google announced would add support run citrix xenapp chrome web browser including graphics processing unit acceleration july companies announced working allow citrix cloud deploy virtualized apps desktops google cloud october 2017 citrix told regulators plans lay staff across functions consolidate offices fall 2017 2018 company carried layoffs raleigh north carolina office closures santa barbara california tempe arizona citrix unveiled citrix analytics security software 2017 citrix synergy conference orlando florida may 2017 software detects responds security threats relying artificial intelligence 2018 citrix changed names products represent shift cloud operating model company stated made name changes present unified product line end users create manage deploy workspaces apps data single console company dropped xen netscaler brand names xenapp xendesktop became citrix virtual apps desktops xenmobile became citrix endpoint management sharefile integration became citrix content collaboration xenserver became citrix hypervisor cedexis became citrix intelligent traffic management netscaler products kept identities yet netscaler brand name replaced citrix citrix governed ten member board directors citrix headquarters fort lauderdale florida santa clara california united states offices california north carolina citrix research development centers located u.s. australia india japan greece united kingdom citrix organized three units workspace services delivery network mobility apps citrix licenses services products directly clients including professionals smes companies called value-added resellers resell products services adding additional features citrix publicly traded ticker symbol ctxs 2014 company ranked 741 fortune 1000 1,793 forbes global 2000 citrix revenue 2015 equaled us 3.28 billion increase 3.14 billion 2014 2.91 billion 2013 citrix expanded added new technologies services number mergers acquisitions first acquisition datapac 1997 citrix purchased order utilize datapac technology position asia-pacific region major acquisitions include expertcity 2004 netscaler 2005 xensource 2007 sharefile 2011 2015 citrix acquired nearly 50 companies november 2018 citrix paid 200m acquire sapho software startup develops micro apps workers citrix creates software allows individuals enterprise work collaborate remotely regardless device network main areas company works desktop apps desktop service daas networking cloud software service saas citrix offers number products related desktop application virtualization tools allow access windows desktops applications independently machine actually device operating system citrix xenapp provides application virtualization integrated part xendesktop citrix xendesktop citrix vdi-in-a-box xenclient provide desktop virtualization desktopplayer mac allows online offline access windows virtual desktops macs citrix workspace cloud platform building delivering desktops applications cloud sharefile allows companies organizations sync share files xenmobile offers mobile app device management citrix receiver client software allows universal access virtual applications desktops appdna software provides application migration management citrix technology enables service providers provide desktop service daas offerings customers including business apps desktops products include worx mobile apps secure email browser document sharing citrix workspace suite mobile workspaces citrix products related cloud computing networking include citrix xenserver server virtualization netscaler brand network appliances including wan optimization devices software-defined wan delivery equipment application delivery controllers adc gateways appfirewall web application firewall managed cloud management software citrix cloud company also bytemobile adaptive traffic management aims optimize mobile video services traffic management policy control caching bytemobile insight provides mobile data subscriber analytics citrix software service saas products focused collaboration communications offerings include podio cloud-based collaboration service openvoice provides audio conferencing company philanthropic activities include corporate giving—such corporate donations in-kind gifts—and employee match programs addition citrix employees allowed take two paid volunteer days year participate company annual global day impact —an event encourages citrix employees volunteer local communities near fort lauderdale headquarters citrix provided business training non-profit teams particular company helped local non-profit organization launch computer wheels offer training low-income neighborhoods 2007 company connected broward county florida neighborhood agogo ghana donated technology training furthermore company raleigh office began program called project code 2014 leads youth local boys girls clubs coding exercises teaches computer science addition philanthropic activities citrix donated open-source technology non-profit software organizations continue development gain contributors citrix gave cloudstack apache foundation 2012 xen hypervisor linux foundation 2013 | [
6874,
3172,
5276,
5459,
1530,
4759,
3756,
6256,
3771,
5904,
1357,
6179,
1640,
2290,
4414,
5571,
7639,
1376,
4783,
1559,
6731,
7508,
7550,
3637,
3797,
5940,
8004,
6920,
230,
1217,
330,
511,
5161,
854,
6219,
7756,
6043,
1682,
7762,
2961,
... | Test |
3,757 | 9 | Clip_(compiler):clip compiler clip compiler compiler clipper programming language additional features libraries gtk fivewin netto mysql odbc cti tcp gzip interbase oracle postgres quite fast support hyper-six foxpro rdd compile existing clipper source code minor changes support features original compiler access multiple types databases oracle informix interbase mysql postgres xbase dialects tables foxpro visual foxpro comix indexes ndx ntx cdx supports object-oriented programming preprocessor dynamic static libraries several functions math string management arrays vectors clip licensed gpl type license uses gnu cc compiler | [
1361,
4798,
3255,
5571,
2056
] | Test |
3,758 | 3 | Network_Computer:network computer network computer nc diskless desktop computer device made oracle corporation 1996 2000 devices designed manufactured alliance included sun microsystems ibm others devices designed minimum specifications based network computer reference profile brand also employed marketing term try popularize design computer within enterprise among consumers nc brand mainly intended inspire range desktop computers various suppliers virtue diskless design use inexpensive components software cheaper easier manage standard fat client desktops however due commoditization standard desktop components due increasing availability popularity various software options using full desktops diskless nodes thin clients hybrid clients network computer brand never achieved popularity hoped oracle eventually mothballed term network computer used diskless desktop computer thin client failure nc impact scale predicted larry ellison may caused number factors firstly prices pcs quickly fell 1000 making competition hard secondly software available ncs neither mature open thirdly idea could simply ahead time nc launch 1996 typical home internet connection 28.8 kbit/s modem dialup simply insufficient delivery executable content world wide web considered mainstream breakout year 1998 prior internet service providers advertised mainstream press least outside us knowledge internet limited could held back uptake would seen niche device obvious appeal ncs ended used 'dumb terminals intended replace proprietary backend infrastructure readily available 1990s era ncs often network-booted minimal unix x serve x terminals nc purists may consider suboptimal use nc hardware ncs work well terminals considerably cheaper purpose-built terminal hardware initial network computing standard network computer reference profile ncref required 'nc appliances supported html java http jpeg key standards many ncs use intel cpus microsoft software microsoft intel developed competing standard called netpc alternatives ncref webref motorola hds network systems odin national semiconductor hds workstation stated ship end june 1996 acorn network computer oracle initial reference implementation nc development subcontracted british company acorn computers adapted create ncos acorn made use local partner companies ant icon technology design edge fulfil contract 1997 apple announced mac nc attempt develop pippin network computer platform end 1997 steve jobs discontinued macintosh clone efforts effectively killing pippin although key components mac nc technology inherited original imac first generation netstation design netstation trademark licensed nchannel provided consumer equipment internet service associated infrastructure uk market months nchannel split two entities netchannel provided internet service netproducts provided consumer hardware netproducts started working acorn develop next-generation product netstation ii started developing email-only set-top-box tvemail netproducts went voluntary liquidation 1998 either project completed sun microsystems developed javastation javaos-based nc based sparc hardware initially similar sun range unix workstations ibm launched network station september 1996 later reference design network station used netbsd-based ncos booted lan as/400 ibm pc server network station supported local execution basic applications web browser console addition x capability also implemented allow locally remotely run applications used machine practice lack real applications meant little hardware x terminal ibm network station originally based powerpc architecture final models used intel pentium processors see idea behind nc existing contemporary times system cloud computing particular google chrome os wired magazine daniel roth claims failure network computer eventually led development cloud computing large contribution transition attributed eric schmidt cto sun microsystems proponent network computer eventually became ceo google google large purveyor cloud technology notably google docs spreadsheets | [
2961,
3306,
5461,
7639,
1237,
4418,
7311,
971,
2243
] | Test |
3,759 | 4 | PrivacyStar:privacystar privacystar service identifies calling provides call complaint filing reports federal trade commission privacystar service available web mobile applications android ios several applications powered privacystar call text blocking available applications along privacystar ’ iphone lookup+ application enable users file potential debt collector telemarketer violations directly ftc application captures detailed information possible fair debt collection practices act violations including date time number identity allows users easily provide information regulatory agencies may take action privacystar 1.2 million users blocked 120 million calls filed 300,000 complaints directly federal trade commission september 2012 fact privacystar leading source call complaint data reported ftc 2015 users filed 31 call complaints february 13 2013 privacystar launched free sms spam complaint filing feature android smartphones application allows users file text message spam complaints addition existing ability file call complaints directly federal trade commission android phones founded 2008 jeff stalnaker josh smith privacystar based little rock arkansas jeff stalnaker president ceo company prior privacystar stalnaker held position division president financial services division acxiom marketing company josh smith coo privacystar charles morgan executive chairman board first orion corp. private company developed markets privacystar | [
6788,
1358
] | Test |
3,760 | 3 | Multimedia_PC:multimedia pc multimedia pc mpc recommended configuration personal computer pc cd-rom drive standard set named multimedia pc marketing council working group software publishers association spa software information industry association mpmc comprised companies including microsoft creative labs dell gateway fujitsu pc required standards could called mpc licensing use logo spa cd-rom drives coming market 1990 difficult concisely communicate consumer hardware requirements using multimedia software mostly meant displaying video synced audio pc via cd-rom drive mpc standard supposed communicate concisely consumer buying hardware software could simply look mpc logo assured compatibility mpc program mixed results primarily vast number pcs sold different brands windows became ubiquitous pcs specifying minimum recommended windows versions features often clearer consumers mpc nomenclature standardized term failed catch software publishers association turned away consumer software late 1990s interest mpc standard vanished problem software labeling continues especially field computer games multitude 3d video cards manufactured extremely wide range capabilities common industry labeling standard let consumers know whether card powerful enough let play particular game first mpc minimum standard set 1991 1993 mpc level 2 minimum standard announced 1996 mpc level 3 announced | [
4759,
5784,
4277,
5970,
972,
3319
] | Test |
3,761 | 2 | System_virtual_machine:system virtual machine computing system virtual machine virtual machine provides complete system platform supports execution complete operating system os usually emulate existing architecture built purpose either providing platform run programs real hardware available use example executing otherwise obsolete platforms multiple instances virtual machines leading efficient use computing resources terms energy consumption cost effectiveness known hardware virtualization key cloud computing environment vm originally defined popek goldberg efficient isolated duplicate real machine system virtual machine advantages main disadvantages vms multiple vms running guest operating system frequently engaged server consolidation order avoid interference separate vms actual machine platform desire run multiple operating systems initial motivation virtual machines allow time-sharing among several single-tasking operating systems respects system virtual machine considered generalization concept virtual memory historically preceded ibm cp/cms first systems allow full virtualization implemented time sharing providing user single-user operating system cms unlike virtual memory system virtual machine entitled user write privileged instructions code approach certain advantages adding input/output devices allowed standard system technology evolves virtual memory purposes virtualization new systems memory overcommitment may applied manage memory sharing among multiple virtual machines one actual computer operating system may possible share memory pages identical contents among multiple virtual machines run physical machine may result mapping physical page technique known kernel samepage merging particularly useful read-only pages contain code segments particular would case multiple virtual machines running similar software software libraries web servers middleware components etc guest operating systems need compliant host hardware thereby making possible run different operating systems computer e.g. microsoft windows linux previous versions operating system support future software use virtual machines support separate guest operating systems popular regard embedded systems typical use would run real-time operating system simultaneously preferred complex operating system linux windows another use would novel unproven software still developmental stage runs inside sandbox virtual machines advantages operating system development may include improved debugging access faster reboots different virtualization techniques used based desired usage native execution based direct virtualization underlying raw hardware thus provides multiple instances architecture real machine based capable running complete operating systems virtual machines also emulate different architectures allow execution software applications operating systems written another cpu architecture operating-system-level virtualization allows resources computer partitioned via kernel support multiple isolated user space instances usually called containers may look feel like real machines end users computer architectures capable hardware-assisted virtualization enables efficient full virtualization using virtualization-specific hardware capabilities primarily host cpus approach described full virtualization hardware implemented using type 1 type 2 hypervisor type 1 hypervisor runs directly hardware type 2 hypervisor runs another operating system linux windows virtual machine run operating system supported underlying hardware users thus run two different guest operating systems simultaneously separate private virtual computers pioneer system using concept ibm cp-40 first 1967 version ibm cp/cms 1967–1972 precursor ibm vm family 1972–present vm architecture users run relatively simple interactive computing single-user operating system cms guest top vm control program vm-cp approach kept cms design simple running alone control program quietly provides multitasking resource management services behind scenes addition cms communication system tasks performed multitasking vms rscs gcs tcp/ip unix users run ibm operating systems mvs even new cp z/os even simple cms could run threaded environment listserv trickle z/vm current version vm used support hundreds thousands virtual machines given mainframe installations use linux z systems run web servers linux runs operating system within many virtual machines full virtualization particularly helpful operating system development experimental new code run time older stable versions separate virtual machine process even recursive ibm debugged new versions virtual machine operating system vm virtual machine running older version vm even used technique simulate new hardware standard x86 instruction set architecture used modern pcs actually meet popek goldberg virtualization requirements notably execution mode sensitive machine instructions always trap would allow per-instruction virtualization despite limitations several software packages managed provide virtualization x86 architecture even though dynamic recompilation privileged code first implemented vmware incurs performance overhead compared vm running natively virtualizable architecture ibm system/370 motorola mc68020 several software packages virtual pc virtualbox parallels workstation virtual iron manage implement virtualization x86 hardware intel amd introduced features x86 processors enable virtualization hardware well virtualization resources single machine multiple independent nodes cluster combined accessed single virtual numa machine virtual machines also perform role emulator allowing software applications operating systems written another computer processor architecture run operating-system-level virtualization server virtualization technology virtualizes servers operating system kernel layer thought partitioning single physical server sliced multiple small partitions otherwise called virtual environments virtual private servers vps guests zones etc partition looks feels like real server point view users example solaris zones supports multiple guest operating systems running operating system solaris 10 guest operating systems use kernel level operating system version separate copy operating system different kernel version using solaris kernel zones solaris native zones also requires host operating system version solaris operating systems manufacturers supported however solaris branded zones would need used operating systems zones another example system workload partitions wpars introduced version 6.1 ibm aix operating system system wpars software partitions running one instance global aix os environment operating system level architecture low overhead helps maximize efficient use server resources virtualization introduces negligible overhead allows running hundreds virtual private servers single physical server contrast approaches full virtualization like vmware paravirtualization like xen uml achieve level density due overhead running multiple kernels side operating system-level virtualization allow running different operating systems i.e. different kernels although different libraries distributions etc possible.different virtualization techniques used based desired usage native execution based direct virtualization underlying raw hardware thus provides multiple instances architecture real machine based capable running complete operating systems virtual machines also emulate different architectures allow execution software applications operating systems written another cpu architecture operating-system-level virtualization allows resources computer partitioned via kernel support multiple isolated user space instances usually called containers may look feel like real machines end users computer architectures capable hardware-assisted virtualization enables efficient full virtualization using virtualization-specific hardware capabilities primarily host cpus examples virtualization-enabled hardware include following | [
6329,
4293,
3764,
4295,
4759,
5904,
8066,
1638,
6984,
6002,
1547,
4498,
7357,
1937,
5571,
5041,
3634,
578,
3294,
3544,
5396,
6634,
6731,
3978,
6922,
5064,
5244,
1873,
7756,
5884,
1590,
2961,
1050,
3747,
352,
971
] | Test |
3,762 | 7 | FireChat:firechat firechat proprietary mobile app developed open garden uses wireless mesh networking enable smartphones connect via bluetooth wi-fi apple ’ multipeer connectivity framework without internet connection connecting peer-to-peer though designed purpose mind firechat used communication tool civil protests app first introduced march 2014 iphones followed april 3 version android devices july 2015 firechat introduced private messaging possible post messages public chatrooms may 2016 firechat introduced firechat alerts allow users send push alerts specific time place feature aimed aid workers disaster relief developed partnership marikina city philippines firechat first became popular 2014 iraq following government restrictions internet use thereafter hong kong protests 2015 firechat also promoted protesters 2015 ecuadorian protests september 11 2015 pro-independence demonstration called free way catalan republic firechat used 131,000 times january 2016 students protested university hyderabad india following suicide phd student named rohith vemula students reported used firechat university shut wi-fi current version oct 2018 seems fork riot.im june 2014 firechat developers told wired p eople need understand tool communicate anything would put harmful situation discovered somebody hostile ... meant secure private communications july 2015 firechat claims use end-to-end encryption protect one-to-one private messages | [
7148,
2450,
6335,
2004,
7967,
2555,
2284,
7170,
2201,
6987,
6624,
6629,
1014,
740,
6025,
4887,
1958,
1210,
2048,
3050,
427,
2880,
4634,
6668,
5535
] | Test |
3,763 | 9 | Leaning_toothpick_syndrome:leaning toothpick syndrome computer programming leaning toothpick syndrome lts situation quoted expression becomes unreadable contains large number escape characters usually backslashes avoid delimiter collision official perl documentation introduced term wider usage phrase used describe regular expressions match unix-style paths elements separated slashes codice_1 slash also used default regular expression delimiter must escaped back slash codice_2 leading frequent escaped slashes represented codice_3 doubled urls yields codice_4 escaped codice_5 similar phenomenon occurs dos/windows paths backslash used path separator requiring doubled backslash codice_6 – -escaped regular expression inside escaped string requiring codice_7 match single backslash extreme cases regular expression escaped string matching uniform naming convention path begins codice_6 requires 8 backslashes codice_9 due 2 backslashes double-escaped lts appears many programming languages many situations including patterns match uniform resource identifiers uris programs output quoted text many quines fall latter category consider following perl regular expression intended match uris identify files codice_10 directory ftp site perl like sed solves problem allowing many characters delimiters regular expression example following three examples equivalent expression given -- use wikipedia syntax highlighter handle perl color misleadingly -- pre /pre common translation convert backslashes forward slashes pre /pre may easier understand written like pre /pre perl program print html link tag url link text stored variables codice_11 codice_12 respectively might look like notice use backslashes escape quoted double-quote characters syntaxhighlight lang= html using single quotes delimit string feasible perl expand variables inside single-quoted strings code example would work intended using codice_13 function viable solution many languages perl c php codice_14 operator perl allows delimiter documents especially well suited multi-line strings however documents n't allowed proper indentation 5.26 example shows perl syntax print « here_it_ends href= url text /a here_it_ends c programming language handles lts use codice_15 symbol start string literals initial quotation marks e.g rather otherwise requiring c++11 standard adds raw strings string contains characters codice_16 optional delimiter used codice_17 following example go indicates string raw using backtick delimiter c \foo\bar.txt raw strings may contain character except backticks escape code backtick raw string raw strings may also span multiple lines example strings codice_18 codice_19 equivalent string spans multiple lines. string that\nspans multiple\nlines python similar construct using codice_20 one also use together triple quotes ruby uses single quote indicate raw string filepath c \foo\bar.txt' also allows change delimiter like perl r ftp // ^/ */pub/ r ftp // ^/ */pub/ scala allows usage triple quotes order prevent escaping confusion triple quotes also allow multiline strings shown sed regular expressions particularly using operator much similar perl sed predecessor perl default delimiter delimiter used default s/regexp/replacement/ regexp replacement also valid form example match pub directory perl example replace foo default escaping slashes using exclamation point delimiter instead yields | [
6029,
5983,
6789,
5965,
6428,
2528,
2619,
993,
1435
] | Test |
3,764 | 7 | Hewlett-Packard:hewlett-packard hewlett-packard company commonly referred hp stylized hp hewlett-packard american multinational information technology company headquartered palo alto california developed provided wide variety hardware components well software related services consumers small- medium-sized businesses smbs large enterprises including customers government health education sectors company founded one-car garage palo alto bill hewlett david packard initially produced line electronic test equipment hp world leading pc manufacturer 2007 q2 2013 time lenovo ranked ahead hp hp specialized developing manufacturing computing data storage networking hardware designing software delivering services major product lines included personal computing devices enterprise industry standard servers related storage devices networking products software diverse range printers imaging products hp directly marketed products households small- medium-sized businesses enterprises well via online distribution consumer-electronics office-supply retailers software partners major technology vendors hp also services consulting business around products partner products hewlett-packard company events included spin-off electronic bio-analytical measurement instruments part business agilent technologies 1999 merger compaq 2002 acquisition eds 2008 led combined revenues 118.4 billion 2008 fortune 500 ranking 9 2009 november 2009 hp announced acquisition 3com deal closing april 12 2010 april 28 2010 hp announced buyout palm inc. 1.2 billion september 2 2010 hp bidding war 3par 33 share offer 2.07 billion dell declined match hewlett-packard spun enterprise products services business hewlett packard enterprise november 1 2015 hewlett-packard held onto pc printer businesses renamed hp inc. bill hewlett david packard graduated degrees electrical engineering stanford university 1935 company originated garage nearby palo alto fellowship past professor frederick terman stanford great depression considered terman mentor forming hewlett-packard 1938 packard hewlett began part-time work rented garage initial capital investment us 538 1939 hewlett packard decided formalize partnership tossed coin decide whether company founded would called hewlett-packard hp packard-hewlett hp incorporated august 18 1947 went public november 6 1957 many projects worked first financially successful product precision audio oscillator model hp200a innovation use small incandescent light bulb known pilot light temperature dependent resistor critical portion circuit negative feedback loop stabilized amplitude output sinusoidal waveform allowed sell model 200a 89.40 competitors selling less stable oscillators 200 model 200 series generators continued production least 1972 200ab still tube-based improved design years one company earliest customers walt disney productions bought eight model 200b oscillators 71.50 use certifying fantasound surround sound systems installed theaters movie fantasia worked counter-radar technology artillery shell fuses world war ii allowed packard hewlett exempt draft hp recognized symbolic founder silicon valley although actively investigate semiconductor devices years traitorous eight abandoned william shockley create fairchild semiconductor 1957 hewlett-packard hp associates division established around 1960 developed semiconductor devices primarily internal use hp associates co-founded another former bell labs researcher mosfet mos transistor inventor mohamed atalla served director semiconductor research instruments calculators products using semiconductor devices hp associates 1960s hp partnered sony yokogawa electric companies japan develop several high-quality products products huge success high costs building hp-looking products japan hp yokogawa formed joint venture yokogawa-hewlett-packard 1963 market hp products japan hp bought yokogawa electric share hewlett-packard japan 1999 hp spun small company dynac specialize digital equipment name picked hp logo hp could turned upside reverse reflect image logo dy new company eventually dynac changed dymec folded back hp 1959 hp experimented using digital equipment corporation dec minicomputers instruments deciding would easier build another small design team deal dec hp entered computer market 1966 hp 2100 hp 1000 series minicomputers simple accumulator-based design two accumulator registers hp 1000 models two index registers series produced 20 years spite several attempts replace forerunner hp 9800 hp 250 series desktop business computers hp 3000 advanced stack-based design business computing server later redesigned risc technology hp 2640 series smart intelligent terminals introduced forms-based interfaces ascii terminals also introduced screen labeled function keys commonly used gas pumps bank atms hp 2640 series included one first bit mapped graphics displays combined hp 2100 21mx f-series microcoded scientific instruction set enabled first commercial wysiwyg presentation program bruno later became program hp-draw hp 3000 although scoffed formative days computing hp would eventually surpass even ibm world largest technology vendor terms sales although programma 101 first commercial desktop computer hp identified wired magazine producer world first device called personal computer hewlett-packard 9100a introduced 1968 programma 101 called computer personale italian fiera di milano 1966 hp called desktop calculator bill hewlett said called computer would rejected customers computer gurus n't look like ibm therefore decided call calculator nonsense disappeared engineering triumph time logic circuit produced without integrated circuits assembly cpu entirely executed discrete components crt display magnetic-card storage printer price around 5,000 machine keyboard cross scientific calculator adding machine alphabetic keyboard steve wozniak co-founder apple originally designed apple computer working hp offered right first refusal work take company wanted stay scientific business industrial markets wozniak said hp turned 5 times loyalty hp made hesitant start apple steve jobs company earned global respect variety products introduced world first handheld scientific electronic calculator 1972 hp-35 first handheld programmable 1974 hp-65 first alphanumeric programmable expandable 1979 hp-41c first symbolic graphing calculator hp-28c like scientific business calculators oscilloscopes logic analyzers measurement instruments reputation sturdiness usability latter products part spin-off agilent product line later spun agilent keysight technologies company design philosophy period summarized design guy next bench 98x5 series technical desktop computers started 1975 9815 cheaper 80 series technical computers started 1979 85 machines used version basic programming language available immediately switched used proprietary magnetic tape storage hp computers similar capabilities much later ibm personal computer although limitations available technology forced prices high 1984 hp introduced inkjet laser printers desktop along scanner product line later developed successful multifunction products significant single-unit printer/scanner/copier/fax machines print mechanisms hp tremendously popular laserjet line laser printers depend almost entirely canon inc. components print engines turn use technology developed xerox hp develops hardware firmware software convert data dots printing march 3 1986 hp registered hp.com domain name making ninth internet .com domain ever registered 1987 palo alto garage hewlett packard started business designated california state historical landmark 1990s hp expanded computer product line initially targeted university research business users reach consumers hp also grew acquisitions bought apollo computer 1989 convex computer 1995 later decade hp opened hpshopping.com independent subsidiary sell online direct consumers 2005 store renamed hp home home office store 1995 1998 hewlett-packard sponsors english football team tottenham hotspur 1999 businesses related computers storage imaging spun hp form agilent technologies agilent spin-off largest initial public offering history silicon valley spin-off created 8 billion company 30,000 employees manufacturing scientific instruments semiconductors optical networking devices electronic test equipment telecom wireless r production july 1999 hp appointed carly fiorina formerly lucent first female ceo fortune-20 company dow jones industrial average fiorina received larger signing offer predecessors fiorina served ceo technology downturn early 2000s led merger compaq disastrous according cnn led firing 30,000 u.s. employees leadership company doubled size tenure ceo beset damaging leaks hp board directors asked fiorina step 2005 following boardroom disagreement resigned february 9 2005 1997 hp sold 120 million worth printers computer products iran european subsidiary dubai-based east distributor despite u.s. export sanctions prohibiting deals imposed bill clinton executive orders issued 1995 story initially reported boston globe triggered inquiry sec hp responded products worth 120 million sold fiscal year 2008 distribution way redington gulf company based netherlands sales took place foreign subsidiary hp violated sanctions hp named redington gulf wholesaler year 2003 turn published press release stating seeds redington-hewlett-packard relationship sowed six years ago one market — iran time redington gulf three employees whose sole purpose sell hp products iran market according former officials worked sanctions hp using loophole routing sales foreign subsidiary hp ended relationship redington gulf sec inquiry september 3 2001 hp announced agreement reached compaq merge two companies may 2002 passing shareholder vote hp officially merged compaq prior plans place consolidate companies product teams product lines compaq already taken digital equipment corporation 1998 hp therefore still offers support former digital equipment products pdp-11 vax alphaserver merger occurred proxy fight bill hewlett son walter objected merger compaq bought tandem computers 1997 started ex-hp employees digital equipment corporation 1998 following strategy hp became major player desktops laptops servers many different markets merger compaq new ticker symbol became hpq combination two previous symbols hwp cpq show significance alliance also key letters two companies hewlett-packard compaq latter company famous q logo products 2004 hp released dv 1000 series including hp pavilion dv 1658 1040 two years later may 2006 hp began campaign computer personal campaign designed bring back fact pc personal product campaign utilized viral marketing sophisticated visuals website www.hp.com/personal ads featured pharrell petra nemcova mark burnett mark cuban alicia keys jay-z gwen stefani shaun white january 2005 following years performance included hp compaq merger fell short disappointing earning reports board asked fiorina resign chair chief executive officer company following news fiorina departure hp stock jumped 6.9 percent robert wayman chief financial officer hp served interim ceo board undertook formal search replacement mark hurd ncr corporation hired take ceo president effective 1 april 2005 hurd board top choice given revival ncr took place leadership 2006 hp unveiled several new products including desktops enhanced notebooks workstation software manage openview client configuration manager 2.0 year hp share price skyrocketed due consistent results last couple quarters year hurd plan cutback hp workforce lower costs july 2007 hp signed definitive agreement acquire opsware cash tender deal values company 14.25 per share combined opsware software oracle enterprise management software first years hurd new role hp stock price doubled end fiscal 2007 hp hit 100 billion mark first time company annual revenue reached 104 billion allowing hp overtake competitor ibm may 13 2008 hp electronic data systems eds announced signed definitive agreement hp would purchase eds june 30 hp announced waiting period hart-scott-rodino antitrust improvements act 1976 expired transaction still requires eds stockholder approval regulatory clearance european commission non-u.s. jurisdictions subject satisfaction waiver closing conditions specified merger agreement agreement finalized august 26 2008 13 billion publicly announced eds would re-branded eds hp company first targeted layoff 24,600 former eds workers announced september 15 2008 company 2008 annual report gave number 24,700 completed end 2009 round factored purchase price 19.5 billion liability goodwill september 23 2009 eds known hp enterprise services november 11 2009 3com hewlett-packard announced hewlett-packard would acquiring 3com 2.7 billion cash acquisition one biggest size among series takeovers acquisitions technology giants push way become one-stop shops since beginning financial crisis 2007 tech giants constantly felt pressure expand beyond current market niches dell purchased perot systems recently invade technology consulting business area previously dominated ibm hewlett-packard latest move marked incursion enterprise networking gear market dominated cisco april 28 2010 palm inc. hewlett-packard announced hp would buy palm 1.2 billion cash debt announcement rumored either htc dell research motion hp would buy palm adding palm handsets hp product line created overlap ipaq series mobile devices thought significantly improve hp mobile presence ipaqdevices selling well buying palm gave hp library valuable patents well mobile operating platform known webos july 1 2010 acquisition palm final purchase palm webos began big gamble – build hp ecosystem july 1 2011 hp launched first tablet named hp touchpad bringing webos tablet devices september 2 2010 hp bidding war 3par 33 share offer 2.07 billion dell declined match hp acquisition palm phased compaq brand august 6 2010 ceo mark hurd resigned amid controversy cfo cathie lesjak assumed role interim ceo hurd turned hp around widely regarded one silicon valley star ceos leadership hp became largest computer company world measured total revenue accused sexual harassment colleague allegations deemed baseless investigation led questions concerning 1000 20000 private expenses lack disclosure related friendship observers argued hurd innocent board asked resignation avoid negative pr public analysis divided saw commendable tough action hp handling expenses irregularities saw ill-advised hasty expensive reaction ousting remarkably capable leader turned business around hp hurd oversaw series acquisitions worth 20 billion allowed company expand services networking equipment smartphones shares hp dropped 8.4 after-hours trading hitting 52-week low 9 billion market capitalization shaved larry ellison publicly attacked hp board ousting stating hp board made worst personnel decision since idiots apple board fired steve jobs many years ago september 30 2010 léo apotheker named hp new ceo president apotheker appointment sparked strong reaction oracle chief executive larry ellison complained apotheker charge sap one subsidiaries systematically stealing software oracle sap accepted subsidiary closed illegally accessed oracle intellectual property following hurd departure hp seen market problematic margins falling failed redirect establish major new markets cloud mobile services apotheker strategy broadly aim disposing hardware moving profitable software services sector august 18 2011 hp announced would strategically exit smartphone tablet computer business focusing higher-margin strategic priorities cloud solutions software emphasis enterprise commercial government markets also contemplated selling personal computer division spinning separate company quitting 'pc business continuing sell servers equipment business customers strategy already undertaken ibm 2005 hp stock continued drop 40 including 25 one day august 19 2011 company abruptly announced number decisions discontinue webos device business mobile phones tablet computers intent sell personal computer division time hp largest personal computer manufacturer world acquire british big data software firm autonomy 79 premium seen externally absurdly high price business known concerns accounts media analysts described hp actions botched strategy shift chaotic attempt rapidly reposition hp enhance earnings ultimately cost apotheker job autonomy acquisition objected even hp cfo september 22 2011 hp board directors fired apotheker chief executive effective immediately replaced fellow board member former ebay chief meg whitman raymond j lane executive chairman though apotheker served barely ten months received 13 million compensation hp lost 30 billion market capitalization tenure weeks later hp announced review concluded pc division integrated critical business operations company reaffirmed commitment personal systems group year later november 2012 wrote-down almost 9 billion related autonomy acquisition see takeover autonomy became subject intense litigation hp accused autonomy previous management fraudulently exaggerating autonomy financial position called law enforcement regulators countries autonomy previous management accused hp textbook obfuscation finger pointing protect hp executives criticism conceal hp culpability prior knowledge autonomy financial position gross mismanagement autonomy acquisition march 21 2012 hp said printing pc divisions would become one unit headed todd bradley pc division printing chief vyomesh joshi leaving company may 23 2012 hp announced plans lay approximately 27,000 employees posting profit decline 31 second quarter 2012 profit decline account growing popularity smart phones tablets mobile devices slowed sale personal computers may 30 2012 hp unveiled first net zero energy data center hp data center plans use solar energy renewable sources instead traditional power grids july 10 2012 hp server monitoring software discovered previously unknown security vulnerability security warning given customers two vulnerabilities patch released one month later hp official site training center hacked defaced pakistani hacker known 'hitcher demonstrate web vulnerability september 10 2012 hp revised restructuring figures cutting 29,000 jobs hp already cut 3,800 jobs – around 7 percent revised 29,000 figure – july 2012 december 31 2013 hp revised number jobs cut 29,000 34,000 october 2014 current number jobs cut end 2013 24,600 end 2013 company 317,500 employees may 22 2014 hp announced would cut 11,000 16,000 jobs addition 34,000 announced 2013 gradually shaping hp nimble lower-cost customer partner-centric company successfully compete across rapidly changing landscape ceo meg whitman said time june 2014 hp discover customer event las vegas meg whitman martin fink announced project radically new computer architecture called machine based memristors silicon photonics machine supposed come commercialization end decade meanwhile representing 75 research activity hp labs october 6 2014 hewlett-packard announced planning split two separate companies separating personal computer printer businesses technology services split first reported wall street journal confirmed media would result two publicly traded companies hewlett packard enterprise hp inc. meg whitman would serve chairman hp inc. ceo hewlett packard enterprise patricia russo would chairman enterprise business dion weisler would ceo hp inc. october 29 2014 hewlett-packard announced new sprout personal computer may 2015 company announced would selling controlling 51 percent stake chinese data-networking business tsinghua unigroup fee least 2.4 billion november 1 2015 previously announced hewlett-packard changed name hp inc. spun hewlett packard enterprise new publicly traded company hp inc. retains hewlett-packard stock price history stock ticker symbol hewlett packard enterprise trades symbol hp global operations directed headquarters palo alto california usa u.s. operations directed facility unincorporated harris county texas near houston latin america offices unincorporated miami-dade county florida u.s. near miami europe offices meyrin switzerland near geneva also research center paris-saclay cluster 20 km south paris france asia-pacific offices singapore also large operations leixlip ireland austin texas boise idaho corvallis oregon fort collins colorado roseville california saint petersburg florida san diego california tulsa oklahoma vancouver washington conway arkansas plano texas former headquarters eds hp acquired uk hp based large site bracknell berkshire offices various uk locations including landmark office tower london 88 wood street recent acquisition 3com expand employee base marlborough massachusetts company also large workforce numerous offices bucharest romania bangalore india address back end operations mphasis headquartered bangalore also enabled hp increase footprint city subsidiary eds company acquired hp produces lines printers scanners digital cameras calculators pdas servers workstation computers computers home small-business use many computers came 2002 merger compaq hp promotes supplying hardware software also full range services design implement support infrastructure hp imaging printing group ipg described company 2005 leading imaging printing systems provider world printer hardware printing supplies scanning devices providing solutions across customer segments individual consumers small medium businesses large enterprises products technology associated ipg include december 23 2008 hp released iprint photo iphone free downloadable software application allows printing 4 x 6 photos hp personal systems group psg claims one leading vendors personal computers pcs world based unit volume shipped annual revenue psg deals hp resold apple ipod november 2005 hp enterprise business eb incorporates hp technology services enterprise services amalgamation former eds known hp services hp enterprise security services oversees professional services network security information security information assurance/ compliancy hp software division enterprise servers storage networking group essn enterprise servers storage networking group essn oversees back end products like storage servers hp networking former procurve responsible nw family products business unit essn hp software division company enterprise software unit years hp produced marketed brand enterprise-management software hp openview september 2005 hp purchased several software companies part publicized deliberate strategy augment software offerings large business customers hp software sells several categories software including hp software also provides software service saas cloud computing solutions software services including consulting education professional services support hp office strategy technology four main functions office strategy technology comes hp labs research arm hp founded 1966 hp labs aims deliver new technologies create business opportunities go beyond hp current strategies examples recent hp labs technology includes memory spot chip 2006 hp idealab provides web forum early-state innovations encourage open feedback consumers development community hp also offers managed services provide complete it-support solutions companies organizations examples include founders developed management style came known hp way hewlett words hp way core ideology ... includes deep respect individual dedication affordable quality reliability commitment community responsibility view company exists make technical contributions advancement welfare humanity following tenets hp way july 2007 company announced met target set 2004 recycle one billion pounds electronics toner ink cartridges set new goal recycling two billion pounds hardware end 2010 2006 company recovered 187 million pounds electronics 73 percent closest competitor 2008 hp released supply chain emissions data — industry first september 2009 newsweek ranked hp 1 2009 green rankings america 500 largest corporations according environmentalleader.com hewlett-packard earned number one position due greenhouse gas ghg emission reduction programs first major company report ghg emissions associated supply chain according ranking addition hp made effort remove toxic substances products though greenpeace targeted company better hp took top spot corporate responsibility magazine 100 best corporate citizens list 2010 list cited pr week one america important business rankings hp beat russell 1000 index companies leadership seven categories including environment climate changes corporate philanthropy 2009 hp ranked fifth fortune magazine named hp one world admired companies 2010 placing 2 computer industry 32 overall list top 50 year computer industry hp ranked 1 social responsibility long-term investment global competitiveness use corporate assets may 2011 hp released global responsibility report covering accomplishments 2010 report company tenth provides comprehensive view hp global citizenship programs performance goals describes hp uses technology influence expertise make positive impact world company 2009 report best corporate responsibility report year 2009 reports claims hp decreased total energy use 9 percent compared 2008 hp recovered total 118,000 tonnes electronic products supplies recycling 2009 including 61 million print cartridges april 2010 san francisco chronicle article hp one 12 companies commended designing products safe start following principles green chemistry commendations came environment california environmental advocacy group praised select companies golden state bay area efforts keep planet clean green may 2010 hp named one world ethical companies ethisphere institute second year row hp made list ethisphere reviewed researched analyzed thousands nominations 100 countries 35 industries create 2010 list hp one 100 companies earn distinction top winner computer hardware vendor recognized ethisphere honors firms promote ethical business standards practices going beyond legal minimums introducing innovative ideas benefit public hp listed greenpeace guide greener electronics ranks electronics manufacturers according policies sustainability energy climate green products november 2011 hp secured 1st place 15 ranking climbing 3 places increased score 5.9 5.5 scored points new sustainable operations criteria best program measuring reducing emissions greenhouse gases suppliers scoring maximum points thorough paper procurement policy november 2012 report hp ranked second score 5.7 hp especially well disclosure externally verified greenhouse gas emissions setting targets reducing however greenpeace reports hp risks penalty point future editions due fact member trade associations commented energy efficiency standards hp earned recognition work area data privacy security 2010 company ranked 4 ponemon institute annual study trusted companies privacy since 2006 hp worked directly u.s. congress federal trade commission ftc department commerce establish new strategy federal legislation hp played key role work toward december 2010 ftc report protecting consumer privacy era rapid change winning nine straight annual respected company china awards economic observer peking university hp china added 10 year contribution award list accolades award aims identify companies business china outstanding sustained performance business operations development corporate social responsibility 2012 rankings consumer electronics companies progress relating conflict minerals enough project rated hp second 24 companies calling pioneer progress according businessweek study hp world 11th valuable brand 2009 hp many sponsorships one well known sponsorship epcot walt disney world resort 1995 1999 2013 hp shirt sponsor premier league club tottenham hotspur f.c 1997 1999 sponsors australian football league club north melbourne football club also sponsored bmw williams formula 1 team 2005 sponsorship formerly held compaq 2010 sponsor renault f1 hewlett-packard also naming rights arrangement hp pavilion san jose home san jose sharks nhl hockey team 2013 arena naming rights acquired sap ag renaming arena sap center san jose company also maintains number corporate sponsorships business sector including sponsorships trade organisations including fespa print trade exhibitions o'reilly media velocity web development conference acquisition compaq 2002 hp maintained compaq presario brand low-end home desktops laptops hp compaq brand business desktops laptops hp proliant brand intel-architecture servers hp pavilion brand used home entertainment laptops home desktops tandem nonstop servers branded hp integrity nonstop march 2003 hp restated first-quarter cash flow operations reducing 18 percent accounting error actual cash flow operations 647 million 791 million reported earlier hp shifted 144 million net cash used investing activities september 5 2006 shawn cabalfin david o'neil newsweek wrote hp general counsel behest chairwoman patricia dunn contracted team independent security experts investigate board members several journalists order identify source information leak turn security experts recruited private investigators used spying technique known pretexting pretexting involved investigators impersonating hp board members nine journalists including reporters cnet new york times wall street journal order obtain phone records information leaked related hp long-term strategy published part cnet article january 2006 hp employees accused criminal acts since acquitted november 2007 hewlett-packard released bios update covering wide range laptops intent speed computer fan well run constantly whether computer reason prevent overheating defective nvidia graphics processing units gpus shipped many original equipment manufacturers including hewlett-packard dell apple defect concerned new packaging material used nvidia 2007 onwards joining graphics chip onto motherboard perform well thermal cycling prone develop stress cracks – effectively severing connection gpu motherboard leading blank screen july 2008 hp issued extension initial one-year warranty replace motherboards selected models however option extended models defective nvidia chipsets despite research showing computers also affected fault furthermore replacement motherboard temporary fix since fault inherent units affected models point manufacture including replacement motherboards offered hp free 'repair since point several websites documenting issue notably www.hplies.com forum dedicated refer hewlett-packard multi-million dollar cover issue www.nvidiadefect.com details specifics fault offers advice owners affected computers several small-claims lawsuits filed several states well suits filed countries hewlett-packard also faced class-action lawsuit 2009 i7 processor computers complainants stated systems locked within 30 minutes powering consistently even replaced newer i7 systems lockups continued june 15 2011 hp filed lawsuit california superior court santa clara claiming oracle corporation breached agreement support itanium microprocessor used hp high-end enterprise servers june 15 2011 hp sent formal legal demand letter oracle attempt force world 3 software maker reverse decision discontinue software development intel itanium microprocessor build servers hp lawsuit 2012 requiring oracle continue produce software compatible itanium processor hp awarded 3 billion damages oracle june 30 2016 hp argued oracle canceling support damaged hp itanium server brand oracle announced appeal decision damages november 2012 hp recorded writedown around 8.8 billion related acquisition year earlier uk based autonomy corporation plc hp accused autonomy deliberately inflating value company prior takeover former management team autonomy flatly rejected charge autonomy specialized analysis large scale unstructured big data 2010 uk largest successful software business maintained aggressively entrepreneurial marketing approach controls described rod iron said include zero tolerance firing weakest 5 sales force quarter compensating best sales staff like rock stars time hp fired previous ceo expenses irregularities year appointed léo apotheker ceo president hp seen problematic market margins falling failed redirect establish major new markets cloud mobile services apotheker strategy aim disposing hardware moving profitable software services sector part strategy autonomy acquired hp october 2011 hp paid 10.3 billion 87.3 shares valuing autonomy around 11.7 billion £7.4 billion overall premium around 79 market price deal widely criticized absurdly high botched strategy shift chaotic attempt rapidly reposition hp enhance earnings objected even hp cfo within year apotheker fired major culture clashes became apparent hp written 8.8 billion autonomy value hp claim resulted accounting improprieties misrepresentations disclosure failures previous management turn accuse hp textbook example defensive stalling conceal evidence prior knowledge gross mismanagement undermining company noting public awareness since 2009 financial reporting issues even hp cfo disagreed price paid external observers generally state small part write-off appears due accounting mis-statements hp overpaid businesses previously serious fraud office united kingdom u.s. securities exchange commission joined fbi investigating potential anomalies hp incurred much damage stock falling decades low three lawsuits brought shareholders hp fall value hp shares august 2014 united states district court judge threw proposed settlement autonomy previous management argued would collusive intended divert scrutiny hp responsibility knowledge essentially engaging plaintiff attorneys existing cases redirecting previous autonomy vendors management fee 48 million plaintiffs agreeing end claims hp management similarly redirect claims previous autonomy vendors management january 2015 sfo closed investigation likelihood successful prosecution low dispute still litigated us investigated uk ireland financial reporting council june 9 2015 hp agreed pay 100 million investors bought hp shares august 19 2011 november 20 2012 settle suite autonomy purchase october 25 2012 richard falk human rights council special rapporteur situation human rights palestinian territories occupied since 1967 called boycotting hp together businesses profiting israeli settlements occupied palestinian lands brought operations line international human rights humanitarian law 2014 presbyterian church voted move forward divestment hp protest israeli policies toward palestinians 2015 city portland human rights commission requested place caterpillar g4s hewlett-packard motorola solutions city buy list april 9 2014 administrative proceeding securities exchange commission settled hp consenting order acknowledging hp violated foreign corrupt practices act fcpa hp subsidiaries russia poland mexico made improper payments government officials obtain retain lucrative public contracts sec order finds hp subsidiary russia paid 2 million agents various shell companies russian government official retain multimillion-dollar contract federal prosecutor office poland hp subsidiary provided gifts cash bribes worth 600,000 polish government official obtain contracts national police agency part bid win software sale mexico state-owned petroleum company hp subsidiary mexico paid 1 million inflated commissions consultant close ties company officials money funneled one officials hp agreed pay 108 million settle sec charges parallel criminal case | [
6788,
708,
4659,
710,
3262,
1077,
2549,
2550,
3267,
1452,
3616,
3617,
6085,
6091,
1457,
5029,
721,
6801,
4317,
7171,
1090,
724,
5735,
6436,
5042,
5392,
6109,
3973,
35,
740,
6826,
1112,
2226,
2945,
5060,
7919,
6130,
2961,
5077,
1502,
113... | Test |
3,765 | 4 | Lauri_Love:lauri love lauri love born 14 december 1984 united kingdom british activist charged stealing data united states government computers including united states army missile defense agency nasa via computer intrusion love stradishall suffolk parents alexander love prison chaplain hm prison highpoint north sirkka-liisa love finnish citizen also works prison live stradishall dual citizenship united kingdom finland dropping sixth form college working turkey plant love applied finnish passport served finnish army six months became conscientious objector finished another six months obligation alternative civilian service applied university nottingham england dropped second term physical mental collapse university glasgow scotland dropped second year health reasons part 2011 hetherington house occupation student protest glasgow university love indictment united states 2013 district new jersey 2014 southern district new york eastern district virginia allegedly breaching thousands computer systems united states elsewhere – including computer networks federal agencies – steal massive quantities confidential data united states attempted extradite face charges love american attorney tor ekeland love two day extradition hearing 28 29 june 2016 westminster magistrates court london father testified lauri love asperger syndrome extradited also hearing simon baron-cohen psychologist testified love extradited diagnosed disorders also include eczema psychosis depression love lives home parents baron-cohen stated love told would commit suicide extradited love father testified son diagnosed autism adult serving finnish army baron-cohen diagnosed love asperger syndrome 2012 love end 20s love testified extradition hearing 29 june 2016 suggested court love family crafted media strategy garner public support extradition love supported courage foundation love barrister extradition hearing ben cooper doughty street chambers case adjourned 16 september 2016 westminster magistrates court judge ruled love could extradited united states love solicitor karen todner said would appeal 5 february 2018 lord chief justice lord burnett mr justice ouseley high court upheld appeal extradition ruling would oppressive prosecute mr love england offences national crime agency nca arrested love 2013 february 2015 bbc news revealed love taking legal action return computers seized nca arrested may 2016 judge nina tempia westminster magistrates court ruled love tell nca passwords encryption keys january 2018 announced novelist frederick forsyth would publish novel inspired lauri love gary mckinnon stories | [
6424,
3791
] | Validation |
3,766 | 5 | MAC_filtering:mac filtering computer networking mac filtering refers security access control method whereby mac address assigned network card used determine access network mac addresses uniquely assigned card using mac filtering network permits denies network access specific devices use blacklists whitelists restriction network access use lists straightforward individual person identified mac address rather device authorized person need whitelist entry device would use access network giving network additional protection mac filtering circumvented using packet analyzer find valid mac using mac spoofing access network using address mac address filtering considered security obscurity effectiveness based secrecy implementation components many devices support mac filtering device basis whitelisted mac addresses allowed port device blacklisted mac addresses blocked ports devices cisco catalyst switches support mac filtering port-by-port basis referred port security port security may configured statically list dynamically based first given number addresses detected combination two methods port security configured default settings allow one mac address per port shut port allowed number addresses exceeded mac filtering also used enterprise wireless networks multiple access points prevent clients communicating access point configured allows clients talk default gateway wireless clients | [
6574,
5847,
7282,
5181,
1261,
5492,
1708
] | Test |
3,767 | 4 | Hardware_security:hardware security hardware security discipline originated cryptographic engineering involves hardware design access control secure multi-party computation secure key storage ensuring code authenticity measures ensure supply chain built product secure among things hardware security module hsm physical computing device safeguards manages digital keys strong authentication provides cryptoprocessing modules traditionally come form plug-in card external device attaches directly computer network server hardware backdoors backdoors hardware conceptionally related hardware trojan ht malicious modification electronic system particularly context integrated circuit physical unclonable function puf physical entity embodied physical structure easy evaluate hard predict individual puf device must easy make practically impossible duplicate even given exact manufacturing process produced respect hardware analog one-way function name physical unclonable function might little misleading pufs clonable pufs noisy therefore achieve requirements function today pufs usually implemented integrated circuits typically used applications high security requirements many attacks sensitive data resources reported organizations occur within organization | [
7581,
4212,
3490,
2251,
74,
1186,
4908,
5813,
60,
2310,
1805
] | Test |
3,768 | 3 | SLOB:slob slob simple list blocks allocator one three available memory allocators linux kernel two slab slub slob allocator designed require little memory implementation housekeeping use small systems embedded systems unfortunately major limitation slob allocator suffers greatly internal fragmentation slob currently uses first-fit algorithm uses first available space memory 2008 reply linus torvalds linux mailing list made suggested use best-fit algorithm tries find memory block suits needs best best fit finds smallest space fits required amount available avoiding loss performance fragmentation consolidation memory default linux kernel used slab allocation system version 2.6.23 slub allocation became default config_slab flag disabled kernel falls back using slob allocator slob allocator used dslinux nintendo ds handheld console | [
1596,
3432,
4435,
578
] | Test |
3,769 | 6 | BestCrypt:bestcrypt bestcrypt commercial disk encryption app windows linux os x developed jetico inc oy bestcrypt comes two editions volume encryption edition encrypts entire disk volumes container encryption edition encrypts virtual disks stored computer files also provides complimentary data erasure utility bcwipe bestcrypt supports wide variety block cipher algorithms including aes serpent blowfish twofish des triple des gost 28147-89 ciphers support cbc lrw modes operation aes twofish serpent also support xts mode | [
3350,
5808,
1534,
5571,
5661,
2399,
578,
6025,
6458,
5773,
6049,
4990,
2529,
4014
] | Test |
3,770 | 4 | Sean_Hastings:sean hastings sean hastings born 1969 entrepreneur cypherpunk author security expert best known founding ceo havenco world first formal data 1997 hastings worked cryptographic protocols tools free u.s. cryptographic export restrictions vincent cate started international conference financial cryptography anguilla year hastings founded havenco 2000 originally incorporating country residence anguilla second incorporation channel islands hastings ceo co-founders included ryan lackey sameer parekh immediately following public launch havenco subject great deal press coverage including hastings appearance along several cofounders royal family sealand cover wired july 2000 issue company entirely nationalised government sealand 2002 commercial failure mounting tensions 2002 hastings began work seasteading patri friedman project aimed building floating communities free restrictions current governments collaboration continued 2009 including talk hastings seasteading institute annual conference hastings cofounder eric s. raymond green-span open source infrastructure trust reputation management begun march 2009 hastings also author paul rosenberg book god wants dead vera verba 2007 takes look lighter side atheism anarchy | [
6546
] | Validation |
3,771 | 7 | Polestar_Xeus:polestar xeus polestar xeus cloud computing software manufactured nkia corporation south korea used manage iaas solutions provides various functions required management cloud systems reporting sla usage amount particular users times management construction performance events statistics virtual machines storage networks resource use policy management features gui-based drag-and-drop workflow api connection cloud systems polestar xeus compatible iaas solutions including vmware vsphere microsoft hyper-v citrix xen red hat enterprise virtualization nkia provides polestar xeus south korea | [
6731,
2961,
3756,
6586
] | Test |
3,772 | 9 | Interpreted_language:interpreted language interpreted language type programming language implementations execute instructions directly freely without previously compiling program machine-language instructions interpreter executes program directly translating statement sequence one subroutines another language often machine code terms interpreted language compiled language well defined theory programming language either interpreted compiled modern programming language implementation increasingly popular platform provide options interpreted languages also contrasted machine languages functionally execution interpretation mean thing — fetching next instruction/statement program executing although interpreted byte code additionally identical machine code form assembler representation term interpreted sometimes reserved software processed languages virtual machine emulator top native i.e hardware processor principle programs many languages may compiled interpreted emulated executed natively designation applied solely based common implementation practice rather representing essential property language many languages implemented using compilers interpreters including basic c lisp pascal java c compiled bytecode virtual-machine-friendly interpreted language lisp implementations freely mix interpreted compiled code distinction compiler interpreter always well defined many language processors combination early days computing language design heavily influenced decision use compiling interpreting mode execution example smalltalk 1980 designed interpreted run-time allows generic objects dynamically interact initially interpreted languages compiled line-by-line line compiled executed loop subroutine caused certain lines executed multiple times would recompiled every time become much less common so-called interpreted languages use intermediate representation combines compiling interpreting examples include intermediate representation compiled java time execution ruby time change source detected execution python interpreting language gives implementations additional flexibility compiled implementations features often easier implement interpreters compilers include furthermore source code read copied giving users freedom disadvantages interpreted languages several criteria used determine whether particular language likely called compiled interpreted users definitive compiled languages interpreter-like properties vice versa many languages first compiled bytecode ѕometimes bytecode also compiled native binary using aot compiler executed natively hardware processor | [
1445,
3266,
3944,
6428,
3966,
5043,
1102,
40,
3303,
7557,
3981,
4728,
1892,
6497,
6498,
2619,
6507,
1908,
4039,
5117,
3368,
486,
4070,
8025,
5171,
6585,
7687,
3749,
4837,
5190,
4469,
7333,
3772,
3782,
564,
3784,
5234,
5948,
1673,
2420,
... | Validation |
3,773 | 8 | MulticoreWare:multicoreware multicoreware inc software development company offering products services related hevc video compression ii machine learning specifically convolutional neural networks iii compilers heterogeneous computing iv software performance optimization multicoreware customers include amazon amd arm microsoft google telestream bbright technologies multicoreware founded 2009 today offices 3 countries – usa china india multicoreware placed 110 inc. 5000 list fastest growing private companies america year 2014 st. louis missouri based technology start-up accelerator iten listed company list top ten tech startups st. louis area three consecutive years 2012–2014 multicoreware ranked 22nd fastest growing private company silicon valley silicon valley business journal october 2014 july 2014 multicoreware named ee times silicon 60 list hot startups watch multicoreware inc. tie50 awards finalist tiecon2014 multicoreware leads development x265 hevc encoder x265 based x264 h.264/mpeg-4 avc encoder similar command-line syntax feature set x265 offered either gnu general public license gpl 2 license commercial license february 2014 telestream vantage transcode multiscreen became first commercial product introduce x265 encoding technology october 2015 video group moscow state university identified x265 highest overall efficiency i.e lowest bit rate target quality level first comparison hevc encoders lipsync tool automatically detects audio-video synchronization errors video using machine learning deep learning technologies errors detected without digital fingerprinting watermarking multicoreware offers uhdcode hevc video decoder api available x86 arm xbox 360 ps3 opencl accelerated supports hevc main/ main10 profiles march 2015 multicoreware launched x265 hevc upgrade includes x265 encoder application uhdcode directshow filter allowing hevc video playback 64-bit windows media player multicore cross platform architecture mxpa heterogeneous computing stack based llvm framework capable supporting opencl renderscript cuda c++ amp hcc open source parallel c++ compiler hsa opencl 1.2 hcc provides compiler frontends c++amp c++ source parallel stl openmp multicoreware one world ’ largest heterogeneous computing teams across globe offers accelerated software development services multicoreware contributor member khronos group active several standards full range services include | [
1361,
3052,
1095,
352,
6219
] | Validation |
3,774 | 3 | RoboCop_(1988_video_game):robocop 1988 video game robocop beat 'em up/run gun arcade game developed published data east 1988 based 1987 film name sub-licensed data east ocean software obtained rights orion pictures script stage robocop hybrid game featuring elements beat 'em well run gun titles despite arcade game numerous versions appeared home computers video game consoles first group released 1988 apple ii pc compatibles amiga atari st apple pc ports developed quicksilver software amiga st versions developed directly ocean data east published game north america nes port followed 1989 developed sakata sas co version trs-80 coco 3 ocean developed published version game boy 1990 1989 ocean released different robocop game bore loose resemblance arcade version produced commodore 64 msx zx spectrum tandy color computer 3 amstrad cpc well pc compatibles meaning pcs ended two entirely different robocop games north american european audiences many ocean c64 titles cassette disk versions released north american release also published data east based disk version c64 robocop versions notorious high numbers bugs 2015 cracker group nostalgia released completely bug-fixed robocop compatible pal ntsc machines port game atari jaguar planned never released zx spectrum version robocop achieved particular critical success receiving crash smash award crash 94 sinclair user sinclair gave 8.8 10 also placing number 94 sinclair official top 100 overall opinion game better original arcade game capture original material smooth scrolling animation sampled speech sound effects highlighted addition zx spectrum robocop one biggest selling games time platform number one sales charts year half entered charts april 1989 still top five february 1991 readers ys voted 9th best game time title theme ocean software versions composed jonathan dunn become well known serene calm tune heavily contrasted tone actual game source material version theme heard game boy port later licensed european kitchen appliance company ariston use series tv adverts song also used theme song charlie brooker documentary videogames changed world well music internet short dilbert 3 song sampled lil b song bad mixtape white flame | [
5079,
1508,
1237,
4277,
6380,
4532
] | Test |
3,775 | 5 | Internet_Control_Message_Protocol:internet control message protocol internet control message protocol icmp supporting protocol internet protocol suite used network devices including routers send error messages operational information indicating example requested service available host router could reached icmp differs transport protocols tcp udp typically used exchange data systems regularly employed end-user network applications exception diagnostic tools like ping traceroute icmp ipv4 defined rfc 792 icmp part internet protocol suite defined rfc 792 icmp messages typically used diagnostic control purposes generated response errors ip operations specified rfc 1122 icmp errors directed source ip address originating packet example every device intermediate router forwarding ip datagram first decrements time live ttl field ip header one resulting ttl 0 packet discarded icmp time exceeded transit message sent datagram source address many commonly used network utilities based icmp messages traceroute command implemented transmitting ip datagrams specially set ip ttl header fields looking icmp time exceeded transit destination unreachable messages generated response related ping utility implemented using icmp echo request echo reply messages icmp uses basic support ip higher level protocol however icmp actually integral part ip although icmp messages contained within standard ip packets icmp messages usually processed special case distinguished normal ip processing many cases necessary inspect contents icmp message deliver appropriate error message application responsible transmission ip packet prompted sending icmp message icmp network layer protocol tcp udp port number associated icmp packets numbers associated transport layer icmp packet encapsulated ipv4 packet packet consists header data sections icmp header starts ipv4 header identified ip protocol number 1 icmp packets 8-byte header variable-sized data section first 4 bytes header fixed format last 4 bytes depend type/code icmp packet icmp error messages contain data section includes copy entire ipv4 header plus least first eight bytes data ipv4 packet caused error message maximum length icmp error messages 576 bytes data used host match message appropriate process higher level protocol uses port numbers assumed first eight bytes original datagram data variable size icmp packet data section exploited ping death large fragmented ping packets used denial-of-service attacks icmp data also used create covert channels communication channels known icmp tunnels control messages identified value type field code field gives additional context information message control messages deprecated since protocol first introduced source quench requests sender decrease rate messages sent router host message may generated router host sufficient buffer space process request may occur router host buffer approaching limit data sent high speed host several hosts time particular router network although router buffering capabilities buffering limited within specified range router queue data capacity limited buffering space thus queue gets filled incoming data discarded queue longer full acknowledgement mechanism present network layer client know whether data reached destination successfully hence remedial measures taken network layer avoid kind situations measures referred source quench source quench mechanism router sees incoming data rate much faster outgoing data rate sends icmp message clients informing slow data transfer speeds wait certain amount time attempting send data client receives message automatically slow outgoing data rate wait sufficient amount time enables router empty queue thus source quench icmp message acts flow control network layer since research suggested icmp source quench ineffective unfair antidote congestion routers creation source quench messages deprecated 1995 rfc 1812 furthermore forwarding kind reaction flow control actions source quench messages deprecated 2012 rfc 6633 redirect requests data packets sent alternative route icmp redirect mechanism routers convey routing information hosts message informs host update routing information send packets alternative route host tries send data router r1 r1 sends data another router r2 direct path host r2 available host r2 ethernet segment r1 send redirect message inform host best route destination via r2 host send packets destination directly r2 router still send original datagram intended destination however datagram contains routing information message sent even better route available rfc 1122 states redirects sent gateways sent internet hosts time exceeded generated gateway inform source discarded datagram due time live field reaching zero time exceeded message may also sent host fails reassemble fragmented datagram within time limit time exceeded messages used traceroute utility identify gateways path two hosts timestamp used time synchronization originating timestamp set time milliseconds since midnight sender last touched packet receive transmit timestamps used timestamp reply replies timestamp message consists originating timestamp sent sender timestamp well receive timestamp indicating timestamp received transmit timestamp indicating timestamp reply sent address mask request normally sent host router order obtain appropriate subnet mask recipients reply message address mask reply message icmp address mask request may used part reconnaissance attack gather information target network therefore icmp address mask reply disabled default cisco ios address mask reply used reply address mask request message appropriate subnet mask destination unreachable generated host inbound gateway inform client destination unreachable reason reasons message may include physical connection host exist distance infinite indicated protocol port active data must fragmented 'do n't fragment flag unreachable tcp ports notably respond tcp rst rather destination unreachable type 3 might expected destination unreachable never reported ip multicast transmissions | [
7148,
1068,
709,
8,
4676,
4677,
7170,
4683,
6432,
1462,
5039,
6446,
7910,
2219,
3640,
4709,
7916,
407,
5760,
3312,
4716,
7214,
6487,
7217,
2612,
3337,
1900,
4022,
6871,
456,
5456,
6879,
2281,
6521,
106,
4040,
1543,
2644,
5119,
6531,
265... | Test |
3,776 | 1 | Stored_procedure:stored procedure stored procedure also termed proc storp sproc stopro storedproc storeproc sp sp subroutine available applications access relational database management system rdbms procedures stored database data dictionary uses stored procedures include data-validation integrated database access-control mechanisms furthermore stored procedures consolidate centralize logic originally implemented applications save time memory extensive complex processing requires execution several sql statements saved stored procedures applications call procedures one use nested stored procedures executing one stored procedure within another stored procedures may return result sets i.e. results codice_1 statement result sets processed using cursors stored procedures associating result-set locator applications stored procedures may also contain declared variables processing data cursors allow loop multiple rows table stored-procedure flow-control statements typically include codice_2 codice_3 codice_4 codice_5 codice_6 statements stored procedures receive variables return results modify variables return depending variable declared stored procedures similar user-defined functions udfs major difference udfs used like expression within sql statements whereas stored procedures must invoked using codice_7 statement exact correct implementation stored procedures varies one database system major database vendors support form depending database system stored procedures implemented variety programming languages example sql java c c++ stored procedures written non-sql languages may may execute sql statements increasing adoption stored procedures led introduction procedural elements sql language standards part sql/psm made sql imperative programming language database systems offer proprietary vendor-specific extensions exceeding sql/psm standard specification java stored procedures exists well sql/jrt systems stored procedures used control transaction management others stored procedures run inside transaction transactions effectively transparent stored procedures also invoked database trigger condition handler example stored procedure may triggered insert specific table update specific field table code inside stored procedure would executed writing stored procedures condition handlers also allows database administrators track errors system greater detail using stored procedures catch errors record audit information database external resource like file prepared statements take ordinary statement query parameterize different literal values used later time like stored procedures stored server efficiency provide protection sql injection attacks although simpler declarative prepared statements ordinarily written use procedural logic operate variables simple interface client-side implementations prepared statements widely reusable dbms | [
3935,
367,
1449,
3951,
6430,
3961,
4697,
3975,
6462,
1861,
4345,
7921,
6128,
7205,
5419,
7580,
7213,
6144,
1891,
784,
2265,
2624,
7248,
3005,
3011,
6538,
6543,
2304,
4798,
4064,
4070,
517,
519,
7303,
4457,
3752,
187,
5209,
7715,
8079,
5... | Validation |
3,777 | 5 | SOCKS:socks socks internet protocol exchanges network packets client server proxy server socks5 additionally provides authentication authorized users may access server practically socks server proxies tcp connections arbitrary ip address provides means udp packets forwarded socks performs layer 5 osi model session layer intermediate layer presentation layer transport layer socks server accepts incoming client connection tcp port 1080 protocol originally developed/designed david koblas system administrator mips computer systems mips taken silicon graphics 1992 koblas presented paper socks year usenix security symposium making socks publicly available protocol extended version 4 ying-da lee nec socks reference architecture client owned permeo technologies spin-off nec blue coat systems bought permeo technologies socks5 protocol originally security protocol made firewalls security products easier administer approved ietf 1996 protocol developed collaboration aventail corporation markets technology outside asia socks de facto standard circuit-level gateways another use socks circumvention tool allowing traffic bypass internet filtering access content otherwise blocked e.g. governments workplaces schools country-specific web services ssh suites openssh support dynamic port forwarding allows user create local socks proxy free user limitations connecting predefined remote port server tor onion proxy software presents socks interface clients hacked computers may configured socks proxy software obscuring control botnet optimise credit card fraud socks operates lower level http proxying socks uses handshake protocol inform proxy software connection client trying make acts transparently possible whereas regular proxy may interpret rewrite headers say employ another underlying protocol ftp however http proxy simply forwards http request desired http server though http proxying different usage model mind connect method allows forwarding tcp connections however socks proxies also forward udp traffic work reverse http proxies http proxies traditionally aware http protocol performing higher-level filtering though usually applies get post methods connect method bill wishes communicate jane internet firewall exists network bill authorized communicate jane directly bill connects socks proxy network informing connection wishes make jane socks proxy opens connection firewall facilitates communication bill jane information technical specifics socks protocol see sections bill wishes download web page jane runs web server bill directly connect jane server firewall put place network order communicate server bill connects network http proxy web browser communicates proxy exactly way would directly jane server possible sends standard http request header http proxy connects jane server transmits back bill data jane server returns typical socks4 connection request looks like socks client socks server socks server socks client example socks4 request connect fred 66.102.7.99:80 server replies ok point onwards data sent socks client socks server relayed 66.102.7.99 vice versa command field may 0x01 connect 0x02 bind bind command allows incoming connections protocols active ftp socks4a extends socks4 protocol allow client specify destination domain name rather ip address useful client resolve destination host domain name ip address client set first three bytes dstip null last byte non-zero value corresponds ip address 0.0.0.x x nonzero inadmissible destination address thus never occur client resolve domain name following null byte terminating userid client must send destination domain name terminate another null byte used connect bind requests client socks server server socks client server using protocol socks4a must check dstip request packet represents address 0.0.0.x nonzero x server must read domain name client sends packet server resolve domain name make connection destination host socks5 protocol defined rfc 1928 extension socks4 protocol offers choices authentication adds support ipv6 udp latter used dns lookups initial handshake consists following authentication methods supported numbered follows initial greeting client server choice communicated subsequent authentication method-dependent username password authentication method 0x02 described rfc 1929 username/password authentication client authentication request server response username/password authentication client connection request server response client software must native socks support order connect socks programs allow users circumvent limitations | [
7148,
7170,
1462,
1470,
2219,
3640,
7916,
3312,
7214,
7217,
3338,
6871,
2984,
456,
4759,
6879,
2281,
6521,
1543,
2644,
5822,
6531,
2650,
7637,
6908,
835,
5492,
3383,
5495,
2681,
5880,
4101,
6976,
3775,
3794,
3797,
7010,
2043,
2057,
3819,
... | Test |
3,778 | 4 | Mass_assignment_vulnerability:mass assignment vulnerability mass assignment computer vulnerability active record pattern web application abused modify data items user normally allowed access password granted permissions administrator status many web application frameworks offer active record object-relational mapping features external data serialization formats automatically converted input internal objects turn database record fields framework interface conversion permissive application designer n't mark specific fields immutable possible overwrite fields never intended modified outside e.g admin permissions flag vulnerabilities found applications written ruby rails asp.net mvc java play framework 2012 mass assignment ruby rails allowed bypassing mapping restrictions resulted proof concept injection unauthorized ssh public keys user accounts github vulnerabilities ruby rails allowed creation internal objects specially crafted json structure asp.net core mapping restriction declared using codice_1 attribute | [
7848,
6594,
3932,
7214
] | Validation |
3,779 | 9 | F-Script_(programming_language):f-script programming language f-script object-oriented scripting programming language apple macos operating system developed philippe mougin f-script interactive language based smalltalk using macos native cocoa api f-script based pure object paradigm every entity manipulated within language object base syntax concepts identical language smalltalk canonical example object-oriented language specific extensions support array programming language apl f-script provides interpreted interactive environment support workspaces provide rich set functions including object persistence distributed objects graphical user interface gui framework database access among things like smalltalk f-script syntax simple without requiring specific notation control structures provided unified manner codice_1 operation unlike smalltalk f-script provides specific notational extensions support codice_2 class using curly brackets describe literal arrays may contain f-script expressions example codice_3 valid array literal empty array denoted codice_4 arrays arrays supported transparently since array another object message expressions f-script similar smalltalk specify object receiver message operation called message argument objects needed operation f-script supports unary binary keyword messages f-script message semantics extended support array programming recognizing array operation adding numerical vectors must viewed generating number messages relating elements vectors involved thus codice_5 codice_6 f-script allows codice_7 f-script chiefly used lightweight scripting layer top macos cocoa application programming interface api embedded applications using f-script framework interface builder palettes also used interactively f-script interpreter prototype applications finally used explore applications object hierarchies using injector f-script anywhere | [
6507,
2109,
7259,
5571,
1287,
3478,
2054,
7848,
1774,
761,
604,
8137,
5786,
6778,
352,
360
] | Test |
3,780 | 2 | Mark_Shuttleworth:mark shuttleworth mark richard shuttleworth born 18 september 1973 south african british entrepreneur founder ceo canonical ltd. company behind development linux-based ubuntu operating system 2002 became first south african travel space space tourist lives isle man holds dual citizenship south africa united kingdom born welkom south africa orange free state surgeon nursery-school teacher shuttleworth attended school western province preparatory school eventually became head boy 1986 followed one term rondebosch boys high school bishops/diocesan college head boy 1991 shuttleworth obtained bachelor business science degree finance information systems university cape town lived smuts hall student became involved installation first residential internet connections university 1995 shuttleworth founded still-extant thawte consulting company specialized digital certificates internet security december 1999 thawte acquired verisign earning shuttleworth r3.5 billion million equivalent million september 2000 shuttleworth formed hbd venture capital dragons business incubator venture capital provider march 2004 formed canonical ltd. promotion commercial support free software projects especially ubuntu operating system december 2009 shuttleworth stepped ceo canonical ltd jane silber took canonical ceo position shuttleworth resumed position ceo canonical july 2017 end silber tenure 1990s shuttleworth participated one developers debian operating system 2001 formed shuttleworth foundation nonprofit organisation dedicated social innovation also funds educational free open source software projects south africa freedom toaster 2004 returned free software world funding development ubuntu linux distribution based debian company canonical ltd 2005 founded ubuntu foundation made initial investment 10 million dollars ubuntu project shuttleworth often referred tongue-in-cheek title self-appointed benevolent dictator life sabdfl come list names people hire project shuttleworth took six months debian mailing list archives travelling antarctica aboard icebreaker kapitan khlebnikov early 2004 september 2005 purchased 65 stake impi linux 15 october 2006 announced mark shuttleworth became first patron kde highest level sponsorship available relationship ended 2012 together financial support kubuntu ubuntu variant kde main desktop 17 december 2009 mark announced effective march 2010 would step ceo canonical focus energy product design partnership customers jane silber coo canonical since 2004 took job ceo canonical september 2010 received honorary degree open university work 9 november 2012 shuttleworth kenneth rogoff took part debate opposite garry kasparov peter thiel oxford union entitled innovation enigma 25 october 2013 shuttleworth ubuntu awarded austrian anti-privacy big brother award sending local ubuntu unity dash searches canonical servers default year earlier 2012 shuttleworth defended anonymisation method used shuttleworth gained worldwide fame 25 april 2002 second self-funded space tourist first-ever south african space flying space adventures launched aboard russian soyuz tm-34 mission spaceflight participant paying approximately voyage two days later soyuz spacecraft arrived international space station spent eight days participating experiments related aids genome research 5 may 2002 returned earth soyuz tm-33 order participate flight shuttleworth undergo one year training preparation including seven months spent star city russia space radio conversation nelson mandela 14-year-old south african girl michelle foster asked marry politely dodged question stating honoured question changing subject terminally ill foster provided opportunity conversation mark shuttleworth nelson mandela reach dream foundation private jet bombardier global express often referred canonical one fact owned hbd venture capital company dragon depicted side plane norman hbd venture capital mascot upon moving r2.5 billion capital south africa isle man south african reserve bank imposed r250 million levy order release assets shuttleworth appealed lengthy legal battle reserve bank ordered repay r250 million plus interest shuttleworth announced would donating entire amount trust established help others take cases constitutional court 18 june 2015 constitutional court south africa reversed set aside findings lower courts ruling dominant purpose exit charge regulate conduct rather raise revenue | [
3938,
1822,
2916,
7528,
2559,
7555,
2585,
5759,
7559,
412,
2260,
5453,
5803,
462,
1535,
1176,
4401,
5829,
2297,
1192,
4435,
2689,
3404,
1227,
5523,
6951,
5540,
3084,
1260,
5571,
578,
7740,
589,
3133,
2789,
4187,
966,
2074,
968,
8149,
31... | Test |
3,781 | 4 | Shade_sandbox:shade sandbox shade sandbox sandbox-based isolation program developed eugene balabanov shade distributed consumers shareware solution creates isolated virtual environment within computer rather running software browsing internet directly instead perform actions fenced-off safe area mechanism creates highly controlled environment running untested untrustworthy apps without threatening host operating system shade sandbox basically plugin security toolkit engine platform enables developers build security-related solutions file monitors api spy utilities course virtual environments platform available corporate customers vendor site suggests capabilities platform provides plugins findmysoft rated shade sandbox 5 5 stars naming essential softpedia describes shade simple yet reliable anti-virus protection | [
3495,
5571,
5904,
5159,
2465
] | Test |
3,782 | 9 | SWEET16:sweet16 sweet16 interpreted byte-code language invented steve wozniak implemented part integer basic rom apple ii series computers created wozniak needed manipulate 16-bit pointer data implementation basic apple ii 8-bit computer sweet16 code executed running 16-bit processor sixteen internal 16-bit little-endian registers named registers well-defined functions 16 virtual registers 32 bytes total located zero page apple ii real physical memory map – values stored low byte followed high byte sweet16 interpreter located integer basic rom according wozniak sweet16 implementation model frugal coding taking 300 bytes memory sweet16 runs one-tenth speed equivalent native 6502 code | [
6181,
708,
4003,
7541,
2567,
1237,
3772,
263,
5114
] | Validation |
3,783 | 7 | UNICORE:unicore unicore uniform interface computing resources grid computing technology resources supercomputers cluster systems information stored databases unicore developed two projects funded german ministry education research bmbf european-funded projects unicore evolved middleware system used several supercomputer centers unicore served basis research projects unicore technology open source bsd licence available sourceforge concept grid computing first introduced book grid blueprint new computing infrastructure end 1998 1997 development unicore initiated german supercomputer centers alternative globus toolkit first prototype developed german unicore project foundations production version laid follow-up project unicore plus ended 2002 follow-up european projects extended functionality worked towards providing implementations open grid forum standards resulted release unicore 6 28 august 2007 unicore consists three layers user server target system tier user tier represented various clients primary clients unicore rich client graphical user interface based eclipse framework unicore commandline client ucc clients use soap web services communicate server tier xml documents used transmit platform site independent descriptions computational data related tasks resource information workflow specifications client server servers accessible via secure socket layer protocol single secure entry point unicore site gateway accepts authenticates requests forwards target service server unicore/x used access particular set grid resources site unicore supports many different system architectures ensures organization full control resources unicore/x servers may used access supercomputer linux cluster single pc unicore/x server creates concrete target system specific actions xml job description abstract job objects ajo received client available unicore services include job submission job management file access file transfer client-server server-server storage operations mkdir ls etc workflow submission management target system tier consists target system interface tsi directly interfaces underlying local operating system resource management system security within unicore relies usage permanent x.509 certificates issued trusted certification authority ca certificates used provide single sign-on unicore client i.e password requests handed user addition certificates used authentication authorization including mapping unicore user certificates local accounts e.g unix uid/gid signing xml requests sent ssl based communication channels across 'insecure internet links using x.509 certificates one example consideration well-known standards e.g released global grid forum ggf within unicore architecture trust delegation unicore uses signed saml assertions local authorisation controlled xacml policies components unicore technology open source software bsd license downloaded sourceforge repository many european international research projects base grid software implementations unicore e.g eurogrid grip openmolgrid viola japanese naregi project projects extended extending set core unicore functions including new features specific research project focus goals projects limited computer science community scientific domains bioengineering computational chemistry also using unicore basis work research like openmolgrid chemomentum projects within european deisa project leading hpc centers europe joined deploy operate pervasive distributed heterogeneous multi-tera-scale supercomputing platform unicore used grid middleware access deisa resources unicore deployed distributed computing infrastructures europe prace european grid infrastructure egi foreseen deployed upcoming extreme science engineering discovery environment xsede infrastructure united states unicore successfully used production environments e.g within john von neumann-institute computing nic access 294912 core jugene ibm bluegene/p supercomputer 26304 core juropa cluster users resources come broad field scientific domains including e.g astrophysics quantum physics medicine biology computational chemistry climatology | [
7930,
4159,
138,
2441,
2721,
4905,
8160,
5834,
1878,
6068,
5539
] | Test |
3,784 | 9 | Language_primitive:language primitive computing language primitives simplest elements available programming language primitive smallest 'unit processing available programmer given machine atomic element expression language primitives units meaning i.e. semantic value language thus different tokens parser minimal elements syntax machine instruction usually generated assembler program often considered smallest unit processing although always case typically performs perceived one operation copying byte string bytes one computer memory location another adding one processor register another many today computers however actually embody even lower unit processing known microcode interprets machine code microcode instructions would genuine primitives instructions would typically available modification hardware vendor programmers high-level programming language hll program composed discrete statements primitive data types may also perceived perform single operation represent single data item higher semantic level provided machine copying data item one location another may actually involve many machine instructions instance finally hll statements particularly involving loops generate thousands even millions primitives low-level programming language lll comprise genuine instruction path length processor execute lowest level perception referred abstraction penalty interpreted language statement similarities hll primitives added layer statement executed manner similar hll statement must first processed interpreter process may involve many primitives target machine language fourth-generation programming languages 4gl fifth-generation programming languages 5gl simple one-to-many correspondence high-to-low level primitives elements interpreted language primitives embodied 4gl 5gl specifications approach original problem less procedural language construct oriented toward problem solving systems engineering | [
1908,
5012,
5983,
6882,
3772,
7071,
6015,
5312,
2866,
5680,
1782,
6497,
6498
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.