node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
3,785 | 4 | Sproxil:sproxil sproxil american venture capital-backed for-profit company based cambridge massachusetts provides consumer product verification service called mobile authentication service mas help consumers avoid purchasing counterfeit products service first mobile authentication service mas launch nigeria iso 27001 iso 9001 certified company also offers supply chain protection solutions including track trace mobile-based loyalty marketing programs advisory services sproxil operations nigeria mali ghana serving west africa tanzania kenya serving east africa india pakistan asia sproxil ’ service places security label scratch-off panel protected products consumers scratch panel point purchase reveal unique one-time use code form mass serialization code sent via sms mobile app country-specific short code consumer receives reply almost instantly indicating product genuine suspicious company also 24/7 call center provide support verification process take anonymous reports suspicious counterfeiting activity sproxil ’ services currently used several pharmaceutical companies fight counterfeit drugs fake drug market according world customs organization estimated 200 billion year industry problem counterfeit drugs particularly acute emerging markets world health organization estimates 30 drugs markets fake may harmful consumers date sproxil protects products across multiple industries including pharmaceuticals agribusiness automotive parts beauty personal care etc 2010 nafdac nigerian government agency overseeing food drugs endorsed sproxil platform service widely deployed throughout nigeria april 2011 cnn published video discussing role sproxil played fight counterfeit drugs nigeria sproxil along pfizer vodafone waterhealth international committed business call action bcta global leadership initiative made companies apply core business expertise achievement eight internationally agreed millennium development goals mdgs sproxil ceo ashifi gogo praised former united states president bill clinton described gogo ’ work “ genuinely remarkable achievement. ” february 2011 sproxil announced received 1.8 million funding acumen fund funding used help company expand india johnson johnson gsk glaxosmithkline using sproxil services africa nigerian distributor merck kgaa named biofem june 2011 sproxil launched operations india july 2011 kenya pharmacy poisons board ppb also adopted similar text message-based anti-counterfeiting systems early 2012 sproxil announced one million people africa checked medicines using text-message based verification service developed sproxil august 2012 sproxil bharti airtel global telecommunications company announced partnership combat counterfeit drug market africa using mpa airtel offer service absolutely free users charge sms based verification february 2013 sproxil signed east african cables protect electric cables zinduka initiative initiative utilizes mpa solution help consumers verify electrical cables genuine purchase partnership marked sproxil expansion non-pharmaceutical markets industries uses sproxil solution textile clothing underwear also around time prashant yadav senior research fellow director healthcare research initiative joined sproxil board advisors yadav expert pharmaceutical healthcare supply chain management emerging markets formerly professor supply chain management mit-zaragoza international logistics program currently serves advisor multiple organizations area pharmaceutical supply chains ceo ashifi gogo recently named white house immigrant innovator champion change schwab foundation social entrepreneur year 2014 work sproxil 2014 company expanded mobile authentication services originally available consumers sms call center adding mobile apps web app solution suite year sproxil became iso-27001 information security controls iso-9001 quality management systems certified comprehensive review internal processes soon kenya-based agribusiness company juanco sps officially launched consumer-facing project protects pesticide bestox 100ec mpa technology date company processed 75 million verifications consumers highest recorded number verifications kind 2017 unilever global development award 2016 innovative healthcare service provider year 2015 interface health excellence ihx challenge 2015 frost sullivan enabling technology leadership award 2014 schwab foundation social entrepreneur year award 2013 uspto patents humanity award 2013 1 health care 7 overall fast company magazine world 50 innovative companies 2012 ismp cheers award george didomizio industry award 2012 icc world business development award 2010 honorable mention global finals ibm entrepreneur smartcamp competition 2010 masschallenge finalist 2010 mobile infrastructure award mitx 2010 people ’ choice award accelerate michigan 2010 prize winner african diaspora marketplace 2010 audience choice award life sciences xconomy xsite 2009 outstanding commitment award global health clinton global initiative university | [] | Test |
3,786 | 3 | ARM_Cortex-A12:arm cortex-a12 arm cortex-a12 32-bit processor core licensed arm holdings implementing armv7-a architecture provides 4 cache-coherent cores cortex-a12 successor cortex-a9 arm renamed a12 variant cortex-a17 since second revision core early 2014 indistinguishable performance arm claims cortex-a12 core 40 percent powerful cortex-a9 core new features found cortex-a9 include hardware virtualization 40-bit large physical address extensions lpae addressing announced supporting big.little however shortly afterwards arm cortex-a17 announced upgraded version capability key features cortex-a12 core | [
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
67,
6148,
446,
451,
6165,
463,
5472,
469,
4041,
3008,
3365,
6910,
5845,
7654,
3397,
1977,
2339,
2711,
1995,
550,
4847,
568,
2024,
5576,
4879,
7376,
5585,
4166,
4537,
950,
... | Test |
3,787 | 1 | Ship_registration_in_Hong_Kong:ship registration hong kong hong kong shipping register set 1990 hong kong merchant shipping registration ordinance administered marine department hong kong since transfer sovereignty united kingdom 1997 hong kong authorised basic law government people ’ republic china using name “ hong kong china ” maintain separate ship registration system april 1999 hong kong government launched new measures improve ship registration system hong kong cooperation government shipping industry total tonnage ship registry hong kong reached 100 millions gross tonnes 2,440 vessels registered january 2016 hong kong ship register world ’ fourth largest ship register world ’ largest national flag register first time registration fee ship determined according gross tonnage gt annual tonnage charge ship determined referring net tonnage nt minimum annual tonnage charge hk 1,500 every tonne 1000 nt costing extra hk 3.5 15,000 nt whereby rate lowers hk 3 per tonne thereafter charge would exceed hk 77,500 annual tonnage charge atc reduction scheme since february 2006 annual tonnage charge atc reduction scheme enacted reduce long term cost ship owners whereby every two years qualifying period satisfying registered ship owner would right enjoy six months atc reduction following year general ship eligible registration ship 3 types registration full registration provisional registration bare boat charter registration registration procedures requires submission ship hong kong shipping register full provisional registration mortgages ship registered agents hk flag registration include hong kong registered ships enjoy 30 preferential port dues mainland china ports since january 2000 order reduce port light dues hong kong registered ships hksar expects sign agreements countries two-tier charging system income derived international trade hong kong registered ships exempted profits tax hksar also entered bilateral double taxation relief agreements 40 countries include agreement avoidance double taxation dta denmark germany netherlands norway singapore sri lanka united kingdom united states reciprocal tax exemption rte chile korea new zealand comprehensive dta cdta austria belgium brunei canada czech france guernsey hungary indonesia ireland italy japan jersey korea kuwait liechtenstein luxembourg mainland china malaysia malta mexico netherlands new zealand portugal qatar romania south africa spain switzerland thailand united arab emirates united kingdom vietnam flag state quality control fsqc system based information system monitor quality hong kong registered ships analyzing collecting information unqualified conditions ship identified flag state inspection pre-registration quality control prqc system involves marine department inspect ship ’ condition registered hong kong ship meet safety pollution prevention standards announced international maritime organization | [
7025,
477
] | Test |
3,788 | 9 | Gregor_Kiczales:gregor kiczales gregor kiczales american computer scientist currently full time professor computer science university british columbia vancouver british columbia canada best known developing concept aspect-oriented programming aspectj extension java programming language designed working xerox parc also one co-authors specification common lisp object system author book art metaobject protocol along jim des rivières daniel g. bobrow kiczales work throughout years focused allowing software engineers create programs look much possible like design reduce complexity make code maintenance easier ultimately improving software quality pursuing undergraduate studies mit kiczales started research career 1980 mit lab computer science stayed 1983 1984 joined xerox palo alto research center software research lab member research staff becoming principal scientist 1996 throughout time parc kiczales developed important research works including aspect-oriented programming aspectj left parc 1999 focus computer science education 2000 moved canada joined department computer science university british columbia tenured professor ubc kiczales started software practices lab designed number courses related software engineering programming languages importantly designed cpsc 110 introductory programming course ubc curriculum students take first year undergraduate studies course focuses systematic program design means design recipes 2002 co-founded intentional software charles simonyi left company 2003 order return ubc 2012 senior aito dahl-nygaard prize work common lisp object system named acm fellow contributions aspect-oriented programming july 2017 appointed executive director ubc extended learning | [
8027,
1716,
5701,
1445,
3895,
6949,
6888
] | Test |
3,789 | 3 | King's_Knight:king knight game became square first north american release redmond subsidiary squaresoft first release independent company 1986 release title screen credits workss programming king knight saw second release 1987 nec pc-8801mkii sr sharp x1 versions game retitled king knight special released exclusively japan first game designed hironobu sakaguchi famicom nobuo uematsu provided musical score king knight uematsu third work video game music composition king knight follows basic storyline many nes-era role-playing video games displayed princess claire olthea kidnapped kingdom izander player must choose one four heroes knight/warrior ray jack wizard kaliva monster/gigant barusa kid thief toby train set forth attack gargatua castle defeat evil dragon tolfida rescue princess king knight vertically scrolling shooter main objective dodge destroy onscreen enemies obstacles various items however add depth game character player collect various power-ups increase character level maximum twenty levels per character many seven jump increases seven speed increases three weapon increases three shield increases also life ups collected increase character life meter also life downs avoided onscreen icons affect stage hidden cave entrances/exits secret revealer reveals hidden stones block progress finally four types elements collected level vital completion last stage elements simply elements b c d. stage various power-ups element type cave caves given level always house least one element type mention various powerups vital player finds caves always hidden generally found middle stage caves also statues shoot fireballs end cave dragon fight dragon defeated player exit cave continue level differences present famicom msx versions king knight japanese north american versions well japanese famicom version american nes version king knight differed little title screen disparity title screen reflected copyright publisher msx version king knight differed famicom version variety ways opening modified prior intro screen players could specify type controller would like use either keyboard joystick in-game dynamics similar although differences exist msx version flanks screen closed stage maps moved slightly items appear original locations finally msx version may seem easier characters sustain damage attacks developers also took advantage technological capabilities available msx upgrade msx port featured sound channels famicom many music tracks sound effects altered improved msx version also boasts wider range colors updated graphics new monster boss designs dragons end caves example replaced lizard-like monsters new sidebar displayed player life meter allocated power-ups allocated elements msx could smoothly render vertical scrolling – unlike famicom – movement graphics choppy comparison changes similar changes took place square final fantasy ported msx2 september 18 2016 square enix announced remake titled king knight wrath dark dragon ios android produced daisuke motohashi developed flame hearts developed mobile spin-off associated final fantasy xv game borrows original version scrolling action role-playing game style adds new camera perspective orchestral version former chiptune soundtrack game free-to-play four-player multiplayer mode square enix announced game september 2016 tokyo game show promotional material placed game final fantasy xv universe alongside justice monsters five another mobile companion game series square enix announced earlier 2016 king knight wrath dark dragon planned release android ios platforms japan 2016 announcement north american release game release postponed 2017 released worldwide september 13 2017 end service subsequently announced game take place june 26 2018 less year worldwide release king knight one video games adapted manga titled published gamest comics collection april 1999 drawn kouta hirano king knight given 3/10 ign 3/10 well nintendo life | [
3796
] | Test |
3,790 | 4 | Mollom:mollom mollom web service analyzed quality content posted websites included comments contact-form messages blogs forum posts mollom screened contributions posted participating websites mollom originally developed dries buytaert also founder lead developer drupal cms used three specific technologies detect spam malicious content machine learning text analytics captcha according acquia mollom launch march 2008 acquisition acquia august 2012 mollom blocked one billion spam messages customers including sony music stanford university twitter mollom acquired acquia august 2012 april 27 2017 company announced would stop sale mollom service may 1 2017 service shut completely april 2 2018 blocked 13.5 billion spam comments since inception | [] | Test |
3,791 | 4 | Karen_Todner:karen todner karen elizabeth todner born april 1962 nuneaton england british solicitor clients include hacker ryan cleary linked lulzsec gary mckinnon known pentagon hacker lauri love todner qualified solicitor 1987 20s became founding member kaim todner llp law firm london kaim todner solicitors formed 1990 specialising criminal law particular expertise extradition beginning march 2016 todner practise acquired one legal alternative business structure originally set 2013 came shortly todner announced intention close practice due legal aid cuts since acquisition one legal todner firm kaim todner continued operating name part one legal alternative business structure todner commented delighted secured way firm continue working present format umbrella one legal karen left kaim todner one legal september 2017 found www.karentodner.com todner appeared number extradition cases early case successful defence gary mckinnon set new legal precedent british law mckinnon legal team applied judicial review home secretary rejection medical evidence stated could easily tried uk unnecessary cruel inhumane inflict stress removing homeland family medical support network starting winter 2013 todner started representing lauri love british student arrested suspicion hacking us military computers love accused committing cyber attacks part hacktivist campaign 2012 2013 protest death aaron swartz computer programmer committed suicide facing 35 years us prison charges computer misuse september 2016 decision made extradite love us todner said confident appeal 100 mps showed support love campaign extradition order overturned health grounds october 2016 announced mp barry sheerman chair parliamentary commission autism write president obama asking throw extradition request leaves office january 2017 wednesday 12 october 2016 house commons prime ministers questions david burrowes mp raised case lauri love issues difficulties faced various forms autism come contact justice system others including national autistic society liberty courage foundation showed support love appeal 24 october 105 cross-party backbenchers signed letter president obama raising deep concern safety lauri love pointing long history serious mental health issues depression episodes psychosis november 2016 home secretary amber rudd backed decision extradite love america todner stated fears driven suicide extradited lodging appeal home office decision letter home office opposing love extradition risk suicide wrote we.. urge recognise seriousness mr love mental illness withdraw request extradition permit prosecution proceed england mr love would able stand trial bail support close family medical support network love said home secretary refused send us trial called home secretary decision extradite ‘ aberration justice ’ legal team kaim todner solicitors pointed uk citizen accused hacking extradited us todner also stated home secretary refused extradite love uk–us extradition treaty 2003 unfair repealed 25 april 2017 high court accepted love appeal extradition lodged todner behalf hearing date yet set however todner commented reason permission granted high court acknowledge grounds raised issues great importance delighted news lauri continue everything ensure prevention extradition united states america starting 2012 todner represented david mcintyre queen lancashire regiment soldier war veteran served afghanistan bosnia northern ireland iraq mclntyre accused overcharging us peace group security contract running firm employed team 20 provide security american clients including iraqi ambassador us overcharging us government security services baghdad iraq mcintyre left army 2002 set security company called quantum risk eight counts fraud mcintyre charged relate claims overcharged us peace group security contract running quantum risk december 2008 july 2009 mcintyre business closed 2009 followed enrolment royal military police served afghanistan july 2012 mcintyre arrested uniform operational setting afghanistan flown country 45 minutes later appeared westminster magistrates court london 36 hours later mcintyre faced eight counts fraud concerning contract united states institute peace usip alleged overcharged organisation 100,000 us dollars £65,000 us extradition request approved home secretary theresa may mcintyre appealed submitting report british army consultant psychiatrist confirming suffered ptsd todner commented firm consider detail secretary state conclusion see whether seek judicial review decision | [
6424,
3765,
8161
] | Test |
3,792 | 4 | Ekoparty:ekoparty ekoparty annual computer security conference brings together variety people interested information security briefings take place regularly buenos aires argentina ekoparty founded 2001 juan pablo daniel borgna leonardo pigner federico kirschbaum jerónimo basaldúa francisco amato addition talks ekoparty different activities like workshops wargames wardriving lockpicking challenges forensics challenges | [
1594,
6488,
5046,
2620,
1805
] | Test |
3,793 | 2 | VDSO:vdso vdso virtual dynamic shared object kernel mechanism exporting carefully selected set kernel space routines user space applications applications call kernel space routines in-process without incurring performance penalty context switch inherent calling kernel space routines means system call interface vdso developed offer vsyscall features overcoming limitations small amount statically allocated memory allows 4 system calls addresses abi process compromises security security issue mitigated emulating virtual system call emulation introduces additional latency vdso uses standard mechanisms linking loading i.e standard executable linkable format elf format vdso memory area allocated user space exposes kernel functionalities vdso dynamically allocated offers improved safety memory space randomization supports 4 system calls vdso links provided via glibc library kernel vdso support traditional syscall made vdso helps reduce calling overhead simple kernel routines also work way select best system-call method computer architectures ia-32 advantage methods exported routines provide proper dwarf debug attributed record format debugging information implementation generally implies hooks dynamic linker find vdsos | [
6984,
449,
6249,
4662,
578
] | Test |
3,794 | 4 | Authentication:authentication authentication authentikos real genuine αὐθέντης authentes author act proving assertion identity computer system user contrast identification act indicating person thing identity authentication process verifying identity might involve validating personal identity documents verifying authenticity website digital certificate determining age artifact carbon dating ensuring product document counterfeit authentication relevant multiple fields art antiques anthropology common problem verifying given artifact produced certain person certain place period history computer science verifying user identity often required allow access confidential data systems authentication considered three types first type authentication accepting proof identity given credible person first-hand evidence identity genuine authentication required art physical objects proof could friend family member colleague attesting item provenance perhaps witnessed item creator possession autographed sports memorabilia could involve someone attesting witnessed object signed vendor selling branded items implies authenticity may evidence every step supply chain authenticated centralized authority-based trust relationships back secure internet communication known public certificate authorities decentralized peer-based trust also known web trust used personal services email files pretty good privacy gnu privacy guard trust established known individuals signing cryptographic key key signing parties instance second type authentication comparing attributes object known objects origin example art expert might look similarities style painting check location form signature compare object old photograph archaeologist hand might use carbon dating verify age artifact chemical spectroscopic analysis materials used compare style construction decoration artifacts similar origin physics sound light comparison known physical environment used examine authenticity audio recordings photographs videos documents verified created ink paper readily available time item implied creation attribute comparison may vulnerable forgery general relies facts creating forgery indistinguishable genuine artifact requires expert knowledge mistakes easily made amount effort required considerably greater amount profit gained forgery art antiques certificates great importance authenticating object interest value certificates however also forged authentication poses problem instance son han van meegeren well-known art-forger forged work father provided certificate provenance well see article jacques van meegeren criminal civil penalties fraud forgery counterfeiting reduce incentive falsification depending risk getting caught currency financial instruments commonly use second type authentication method bills coins cheques incorporate hard-to-duplicate physical features fine printing engraving distinctive feel watermarks holographic imagery easy trained receivers verify third type authentication relies documentation external affirmations criminal courts rules evidence often require establishing chain custody evidence presented accomplished written evidence log testimony police detectives forensics staff handled antiques accompanied certificates attesting authenticity signed sports memorabilia usually accompanied certificate authenticity external records problems forgery perjury also vulnerable separated artifact lost computer science user given access secure systems based user credentials imply authenticity network administrator give user password provide user key card access device allow system access case authenticity implied guaranteed consumer goods pharmaceuticals perfume fashion clothing use three forms authentication prevent counterfeit goods taking advantage popular brand reputation damaging brand owner sales reputation mentioned item sale reputable store implicitly attests genuine first type authentication second type authentication might involve comparing quality craftsmanship item expensive handbag genuine articles third type authentication could presence trademark item legally protected marking identifying feature aids consumers identification genuine brand-name goods software companies taken great steps protect counterfeiters including adding holograms security rings security threads color shifting ink ways someone may authenticated fall three categories based known factors authentication something user knows something user something user authentication factor covers range elements used authenticate verify person identity prior granted access approving transaction request signing document work product granting authority others establishing chain authority security research determined positive authentication elements least two preferably three factors verified three factors classes elements factor weakest level authentication single component one three categories factors used authenticate individual ’ identity use one factor offer much protection misuse malicious intrusion type authentication recommended financial personally relevant transactions warrant higher level security multi-factor authentication involves two authentication factors something know something something two-factor authentication special case multi-factor authentication involving exactly two factors example using bankcard something user along pin something user knows provides two-factor authentication business networks may require users provide password knowledge factor pseudorandom number security token ownership factor access very-high-security system might require mantrap screening height weight facial fingerprint checks several inherence factor elements plus pin day code knowledge factor elements still two-factor authentication frequent types authentication available use authenticating online users differ level security provided combining factors one three categories factors authentication u.s. government national information assurance glossary defines strong authentication layered authentication approach relying two authenticators establish identity originator receiver information european central bank ecb defined strong authentication procedure based two three authentication factors factors used must mutually independent least one factor must non-reusable non-replicable except case inherence factor must also incapable stolen internet european well us-american understanding strong authentication similar multi-factor authentication 2fa exceeding rigorous requirements fast identity online fido alliance striving establish technical specifications strong authentication conventional computer systems authenticate users initial log-in session cause critical security flaw resolve problem systems need continuous user authentication methods continuously monitor authenticate users based biometric trait study used behavioural biometrics based writing styles continuous authentication method recent research shown possibility using smartphones ’ sensors accessories extract behavioral attributes touch dynamics keystroke dynamics gait recognition attributes known behavioral biometrics could used verify identify users implicitly continuously smartphones authentication systems built based behavioral biometric traits known active continuous authentication systems term digital authentication also known electronic authentication refers group processes confidence user identities established presented via electronic methods information system also referred e-authentication digital authentication process creates technical challenges need authenticate individuals entities remotely network american national institute standards technology nist created generic model digital authentication describes processes used accomplish secure authentication authentication information pose special problems electronic communication vulnerability man-in-the-middle attacks whereby third party taps communication stream poses two communicating parties order intercept information extra identity factors required authenticate party identity counterfeit products often offered consumers authentic counterfeit consumer goods electronics music apparel counterfeit medications sold legitimate efforts control supply chain educate consumers help ensure authentic products sold used even security printing packages labels nameplates however subject counterfeiting secure key storage device used authentication consumer electronics network authentication license management supply chain management etc generally device authenticated needs sort wireless wired digital connection either host system network nonetheless component authenticated need electronic nature authentication chip mechanically attached read connector host e.g authenticated ink tank use printer products services secure coprocessors applied offer solution much difficult counterfeit options time easily verified packaging labeling engineered help reduce risks counterfeit consumer goods theft resale products package constructions difficult copy pilfer-indicating seals counterfeit goods unauthorized sales diversion material substitution tampering reduced anti-counterfeiting technologies packages may include authentication seals use security printing help indicate package contents counterfeit subject counterfeiting packages also include anti-theft devices dye-packs rfid tags electronic article surveillance tags activated detected devices exit points require specialized tools deactivate anti-counterfeiting technologies used packaging include literary forgery involve imitating style famous author original manuscript typewritten text recording available medium packaging – anything box e-mail headers help prove disprove authenticity document however text audio video copied new media possibly leaving informational content use authentication various systems invented allow authors provide means readers reliably authenticate given message originated relayed involve authentication factors like opposite problem detection plagiarism information different author passed person work common technique proving plagiarism discovery another copy similar text different attribution cases excessively high quality style mismatch may raise suspicion plagiarism literacy authentication readers ’ process questioning veracity aspect literature verifying questions via research fundamental question authentication literature – one believe related authentication project therefore reading writing activity students documents relevant research process builds students critical literacy documentation materials literature go beyond narrative texts likely include informational texts primary sources multimedia process typically involves internet hands-on library research authenticating historical fiction particular readers consider extent major historical events well culture portrayed e.g. language clothing food gender roles believable period historically fingerprints used authoritative method authentication court cases us elsewhere raised fundamental doubts fingerprint reliability outside legal system well fingerprints shown easily spoofable british telecom top computer-security official noting fingerprint readers already tricked one spoof another hybrid two-tiered authentication methods offer compelling solution private keys encrypted fingerprint inside usb device computer data context cryptographic methods developed see digital signature challenge-response authentication currently spoofable originator key compromised originator anyone attacker knows n't know compromise irrelevant known whether cryptographically based authentication methods provably secure since unanticipated mathematical developments may make vulnerable attack future occur may call question much authentication past particular digitally signed contract may questioned new attack cryptography underlying signature discovered process authorization distinct authentication whereas authentication process verifying say authorization process verifying permitted trying mean authorization presupposes authentication anonymous agent could authorized limited action set one familiar use authentication authorization access control computer system supposed used authorized must attempt detect exclude unauthorized access therefore usually controlled insisting authentication procedure establish degree confidence identity user granting privileges established identity | [
3932,
3,
5722,
4301,
6795,
374,
1078,
6430,
7173,
1460,
1461,
7536,
1464,
4318,
730,
5392,
3293,
3637,
4333,
2219,
6823,
2944,
4346,
7567,
3314,
5773,
5074,
6483,
5078,
7214,
5780,
74,
5440,
3338,
4014,
6501,
2979,
3680,
3681,
5795,
760... | Validation |
3,795 | 4 | Login:login computer security logging logging signing signing process individual gains access computer system identifying authenticating user credentials typically form username matching password credentials sometimes referred login logon sign-in sign-on practice modern secure systems also often require second factor extra security access longer needed user log log sign sign logging usually used enter specific page trespassers see user logged login token may used track actions user taken connected site logging may performed explicitly user taking actions entering appropriate command clicking website link labeled also done implicitly user powering workstation closing web browser window leaving website refreshing webpage within defined period case websites use cookies track sessions user logs session-only cookies site usually deleted user computer addition server invalidates associations session making session-handle user cookie store useless feature comes handy user using public computer computer using public wireless connection security precaution one rely implicit means logging system especially public computer instead one explicitly log wait confirmation request taken place logging computer leaving common security practice preventing unauthorized users tampering also people choose password-protected screensaver set activate period inactivity requiring user re-enter login credentials unlock screensaver gain access system different methods logging may via image fingerprints eye scan password oral textual input etc terms became common time sharing systems 1960s bulletin board systems bbs 1970s early home computers personal computers generally require windows nt os/2 linux 1990s noun login comes verb log analogy verb clock computer systems keep log users access system term log comes chip log historically used record distance travelled sea recorded ship log log book sign connotes idea based analogy manually signing log visitors book agreed difference meaning three terms login logon sign different technical communities tend prefer one another – unix novell linux apple typically using login apple style guide saying users log file server log ... contrast microsoft style guides traditionally suggested opposite prescribed log logon past microsoft reserved sign accessing internet windows 8 onwards moved sign terminology local authentication | [
5719,
2372,
6256,
190,
13,
3180,
2733,
8180,
644,
2386,
3702,
2839,
730,
1554,
7451,
4786,
578,
5933,
3794,
5582,
5401,
3033,
5509,
1122,
57,
7398,
2150,
5869,
6764,
7214,
74,
7685,
5000,
1987,
3417,
3589,
445,
1805
] | Train |
3,796 | 3 | Final_Fantasy_(video_game):final fantasy video game final fantasy fantasy role-playing video game developed published square 1987 first game square final fantasy series created hironobu sakaguchi originally released nes final fantasy remade several video game consoles frequently packaged final fantasy ii video game collections story follows four youths called light warriors carry one world four elemental orbs darkened four elemental fiends together quest defeat evil forces restore light orbs save world final fantasy originally conceived working title fighting fantasy trademark issues dire circumstances surrounding square well sakaguchi prompted name changed game great commercial success received generally positive reviews spawned many successful sequels supplementary titles form final fantasy series original regarded one influential successful role-playing games nintendo entertainment system playing major role popularizing genre critical praise focused game graphics criticism targeted time spent wandering search random battle encounters raise player experience level march 2003 versions final fantasy sold combined total two million copies worldwide final fantasy four basic game modes overworld map town dungeon maps battle screen menu screen overworld map scaled-down version game fictional world player uses direct characters various locations primary means travel across overworld foot ship canoe airship become available player progresses exception battles preset locations bosses enemies randomly encountered field maps overworld map traveling foot canoe ship must either fought fled game plot develops player progresses towns dungeons town citizens offer helpful information others shops sell items equipment dungeons appear areas include forests caves mountains swamps underwater caverns buildings dungeons often treasure chests containing rare items available stores game menu screen allows player keep track experience points levels choose equipment characters wield use items magic character basic attribute level range one fifty determined character amount experience gaining level increases character attributes maximum hit points hp represents character remaining health character dies reach zero hp characters gain experience points winning battles combat final fantasy menu-based player selects action list options attack magic item battles turn-based continue either side flees defeated player party wins character gain experience gil flees returned map screen every character party dies game unsaved progress lost final fantasy first game show player characters right side screen enemies left side screen opposed first-person view player begins game choosing four characters form party locked choice duration game character occupation character class different attributes abilities either innate acquired six classes fighter thief black belt red mage white mage black mage later game player option character undergo class upgrade whereby sprite portraits mature classes gain ability use weapons magic previously could use game contains variety weapons armor items bought found make characters powerful combat character eight inventory slots four hold weapons four hold armor character class restrictions weapons armor may use weapons armor magical used combat cast spells magical artifacts provide protection certain spells shops characters buy items help recover traveling items available include potions heal characters remove ailments like poison petrification tents cabins used world map heal player optionally save game houses also recovers party magic saving special items may gained quests magic common ability game several character classes use spells divided two groups white defensive healing black debilitating destructive magic bought white black magic shops assigned characters whose occupation allows use spells classified level one eight four white four black spells per level character may learn three spells per level white black mages potentially learn respective spells red mages ninja knight use high-level magic final fantasy takes place fantasy world three large continents elemental powers world determined state four crystals governing one four classical elements earth fire water wind world final fantasy inhabited numerous races including humans elves dwarves mermaids dragons robots non-human races one town game although individuals sometimes found human towns areas well four hundred years prior start game lefeinish people used power wind craft airships giant space station called floating castle game watched country decline wind crystal went dark two hundred years later violent storms sank massive shrine served center ocean-based civilization water crystal went dark earth crystal fire crystal followed plaguing earth raging wildfires devastating agricultural town melmond plains vegetation decayed time later sage lukahn tells prophecy four light warriors come save world time darkness game begins appearance four youthful light warriors heroes story carry one darkened orbs initially light warriors access kingdom coneria ruined temple fiends warriors rescue princess sara evil knight garland king coneria builds bridge enables light warriors passage east town pravoka light warriors liberate town bikke band pirates acquire pirates ship use warriors embark chain delivery quests shores aldi sea first retrieve stolen crown marsh cave king ruined castle turns dark elf astos defeating gains crystal eye return blind witch matoya exchange herb needed awaken elf prince cursed astos elf prince gives light warriors mystic key capable unlocking door key unlocks storage room coneria castle holds tnt nerrick one dwarves cave dwarf/dwarf village destroys small isthmus using tnt connecting aldi sea outside world visiting near-ruined town melmond light warriors go earth cave defeat vampire retrieve star ruby gains passage sage sadda cave sadda rod warriors venture deeper earth cave destroy earth fiend lich light warriors obtain canoe enter gurgu volcano defeat fire fiend kary levistone nearby ice cave allows raise airship reach northern continents prove courage retrieving rat tail castle ordeal king dragons bahamut promotes light warrior kind gesture repaid fairy receiving special liquid produces oxygen warriors use help defeat water fiend kraken sunken shrine also recover slab allows linguist named dr. unne teach lefeinish language lefeinish give light warriors access floating castle tiamat wind fiend taken four fiends defeated orbs restored portal opens temple fiends takes 2000 years past warriors discover four fiends sent garland archdemon chaos back time sent fiends future creating time loop could live forever light warriors defeat chaos thus ending paradox return home ending paradox however light warriors changed future one heroic deeds remain unknown outside legend hironobu sakaguchi intended make role-playing game rpg long time employer square refused give permission expected low sales product however rpg dragon quest released proved hit japan company reconsidered stance genre approved sakaguchi vision rpg inspired three colleagues volunteered join project headed thought rough boss spite unsuccessful creations eventually final fantasy developed team seven core staff members within square referred a-team sakaguchi convinced fellow game designers koichi ishii akitoshi kawazu join project kawazu mainly responsible battle system sequences based heavily tabletop game dungeons dragons rpg wizardry example enemies weaknesses elements fire ice included japanese rpgs point kawazu grown fond aspects western rpgs decided incorporate final fantasy also advocated player option freely choose party member classes beginning game feels fun rpg begins create character scenario written freelance writer kenji terada based story sakaguchi ishii heavily influenced game setting idea crystals also suggested illustrator yoshitaka amano character designer sakaguchi declined first never heard artist name sakaguchi showed ishii drawings magazine clippings told art style looking ishii revealed actually created amano hence leading involvement game music final fantasy composed nobuo uematsu marked 16th video game music composition iranian-american programmer nasir gebelli hired code game initially tried understand aspects gameplay soon advised sakaguchi program design concepts explain everything gebelli detail gebelli also responsible creating considered first rpg minigame sliding puzzle added game despite part original game design among developers graphic designer kazuko shibuya programmers kiyoshi yoshii ken narita well debugger hiroyuki ito project started show promise designer hiromichi tanaka b-team joined aid development lack faith sakaguchi team well unpopularity within company motivated staff members give best sakaguchi took in-development rom game japanese magazine famicom tsushin would review however famitsu gave game extensive coverage initially 200,000 copies shipped sakaguchi pleaded company make 400,000 help spawn sequel management agreed original nes version successfully shipped 520,000 copies japan following successful north american localization dragon quest nintendo america translated final fantasy english published north america 1990 north american version final fantasy met modest success partly due nintendo then-aggressive marketing tactics version game marketed pal region final fantasy origins 2003 years several theories emerged game called final fantasy 2015 sakaguchi stated beginning team wished name could shortened way game title could abbreviated latin script pronounced four syllables japanese language original working title sakaguchi rpg concept fighting fantasy changed avoid issues tabletop game name already released reason choosing word final form eventual title final fantasy explained twofold uematsu one thing stemmed sakaguchi personal situation would quit game industry gone back university game sold well another square threat bankruptcy time meant game could company last although sakaguchi confirmed theories later downplayed rationale choosing word final saying definitely back-to-the-wall type situation back word starts f would fine final fantasy remade several times different platforms frequently packaged final fantasy ii various collections remakes retain basic story battle mechanics various changes made different areas including graphics sound specific game elements final fantasy first re-released msx2 system published microcabin japan june 1989 access almost three times much storage space famicom version suffered problems present nintendo cartridge media including noticeable loading times also minor graphical upgrades much-improved music tracks sound effects 1994 final fantasy i・ii compilation final fantasy final fantasy ii launched famicom version released japan graphical updates wonderswan color remake released japan december 9 2000 featured many new graphical changes 8-bit graphics original famicom game updated battle scenes incorporated full background images character enemy sprites redrawn look like ones super famicom final fantasy games japan final fantasy final fantasy ii re-released separately combined game playstation collection released japan 2002 final fantasy ii premium package europe north america 2003 final fantasy origins version similar wonderswan color remake featured several changes detailed graphics remixed soundtrack added full motion video sequences art galleries yoshitaka amano illustrations memo save function december 18 2012 port re-released part final fantasy 25th anniversary ultimate box release final fantasy ii dawn souls like final fantasy origins port first two games series released game boy advance 2004 dawn souls version incorporates various new elements including four additional dungeons updated bestiary minor changes square enix released version final fantasy two japanese mobile phone networks 2004 version ntt docomo foma 900i series launched march title final fantasy subsequent release cdma 1x win-compatible phones launched august another titular version released softbank yahoo keitai phones july 3 2006 games refined graphics compared original 8-bit game advanced many later console handheld ports square enix planned release version north american mobile phones 2006 delayed 2010 released collaboration namco retains game difficulty mp system original famicom version elements updated graphics spell names monster names bosses items areas borrowed game boy advance wonderswan color versions including additional areas monsters present gba version game data saved original famicom version using tent sleeping bag cottage going inn however three save game slots temporary save option available game 20th anniversary final fantasy square enix remade final fantasy final fantasy ii playstation portable games released japan north america 2007 european territories 2008 psp version features higher-resolution 2d graphics full motion video sequences remixed soundtrack new dungeon well bonus dungeons dawn souls script dawn souls version aside new dungeon square enix released original nes version game wii virtual console service japan may 26 2009 north america october 5 2009 pal region import may 7 2010 february 25 2010 square enix released ios version final fantasy based psp port touch controls worldwide june 13 2012 square enix released windows phone version based ios version july 27 2012 square enix released android port largely based ios version though lacking new dungeons 20th-anniversary edition november 11 2016 game alongside 29 games included nes classic edition nintendo classic mini nintendo entertainment system released nintendo final fantasy well received critics commercially successful original nes version shipped 520,000 copies japan according square publicity department japanese famicom msx releases sold combined 600,000 copies north american nes release sold 700,000 copies march 31 2003 game including re-releases remakes time shipped 1.99 million copies worldwide 1.21 million copies shipped japan 780,000 abroad november 19 2007 another playstation portable version shipped 140,000 copies editors ign ranked final fantasy 11th best game nes calling game class system diverse praising convenient use vehicles means traveling across world map gamesradar ranked eighth best nes game ever made staff felt dragon warrior introduced gamers genre final fantasy popularized 2004 readers retro gamer voted final fantasy 93rd top retro game staff noting despite poor visuals relatively simple quest many still consider original best exception ffvii 2006 final fantasy appeared japanese magazine famitsu top 100 games list readers voted 63rd best game time gamefaqs users made similar list 2005 ranked final fantasy 76th rated 49th best game made nintendo system nintendo power top 200 games list 2008 nintendo power ranked 19th best nintendo entertainment system video game praising setting basics console role-playing games along dragon warrior citing examples epic stories leveling random battles character classes final fantasy one influential early console role-playing games played major role legitimizing popularizing genre according ign matt casamassina final fantasy storyline deeper engaging story original dragon quest known dragon warrior north america modern critics pointed game poorly paced contemporary standards involves much time wandering search random battle encounters raise experience levels money exploring solving puzzles reviewers find level-building exploration portions game amusing ones 1987 famitsu initially described original final fantasy one many imitated dragon quest formula game considered weakest difficult installment series subsequent versions final fantasy garnered mostly favorable reviews media peer schneider ign enjoyed wonderswan color version praising graphical improvements especially environments characters monsters famitsu scored version 30 40 final fantasy origins generally well-received gamepro said music fantastic graphics suitably retro cuteness reviews generally positive jeremy dunham ign giving particular praise improved english translation saying better previous version game playstation portable version critically successful previous releases gamespot kevin vanord cited visuals strongest enhancement stated additional random enemy encounters updated graphics add much value dawn souls package rated 76th nintendo power top 200 games list soundtrack album released together score final fantasy ii 1989 game tracks became mainstays final fantasy series prelude arpeggio played title screen opening theme played party crosses bridge early game later referred final fantasy theme victory fanfare played every victorious battle opening motif battle theme also reused number times series theme song plays player characters first cross bridge coneria become recurring theme music series featured numbered final fantasy titles final fantasy also basis series finale video game-themed cartoon series entitled fractured fantasy captain n 8-bit theater sprite-based webcomic created brian clevinger parodies game become popular gaming community since started march 2001 elements video game also appeared series fighting games dissidia final fantasy dissidia 012 final fantasy dissidia final fantasy nt warrior light based yoshitaka amano design lead character garland respective hero villain representing final fantasy warrior light voiced toshihiko seki japanese version grant george english version garland voiced kenji utsumi dissidia final fantasy 012 dissidia final fantasy kōji ishii dissidia final fantasy nt japanese versions christopher sabat english versions games add background information world final fantasy instance dissidia 012 final fantasy names world final fantasy world order distinguish world b world dissidia characters music final fantasy also appeared theatrhythm final fantasy series | [
4023,
6745,
3789,
4907,
3197,
6092
] | Test |
3,797 | 5 | Address_Resolution_Protocol:address resolution protocol address resolution protocol arp communication protocol used discovering link layer address mac address associated given internet layer address typically ipv4 address mapping critical function internet protocol suite arp defined 1982 internet standard std 37 arp implemented many combinations network data link layer technologies ipv4 chaosnet decnet xerox parc universal packet pup using ieee 802 standards fddi x.25 frame relay asynchronous transfer mode atm ipv4 ieee 802.3 ieee 802.11 common usage internet protocol version 6 ipv6 networks functionality arp provided neighbor discovery protocol ndp address resolution protocol request-response protocol whose messages encapsulated link layer protocol communicated within boundaries single network never routed across internetworking nodes property places arp link layer internet protocol suite address resolution protocol uses simple message format containing one address resolution request response size arp message depends link layer network layer address sizes message header specifies types network use layer well size addresses message header completed operation code request 1 reply 2 payload packet consists four addresses hardware protocol address sender receiver hosts principal packet structure arp packets shown following table illustrates case ipv4 networks running ethernet scenario packet 48-bit fields sender hardware address sha target hardware address tha 32-bit fields corresponding sender target protocol addresses spa tpa arp packet size case 28 bytes arp protocol parameter values standardized maintained internet assigned numbers authority iana ethertype arp 0x0806 appears ethernet frame header payload arp packet confused ptype appears within encapsulated arp packet two computers office computer 1 computer 2 connected local area network ethernet cables network switches intervening gateways routers computer 1 packet send computer 2 dns determines computer 2 ip address 192.168.0.55 send message also requires computer 2 mac address first computer 1 uses cached arp table look 192.168.0.55 existing records computer 2 mac address 00 eb:24 b2:05 ac mac address found sends ethernet frame destination address 00 eb:24 b2:05 ac containing ip packet onto link cache produce result 192.168.0.55 computer 1 send broadcast arp request message destination ff ff ff ff ff ff mac address accepted computers local network requesting answer 192.168.0.55 computer 2 responds arp response message containing mac ip addresses part fielding request computer 2 may insert entry computer 1 arp table future use computer 1 receives caches response information arp table send packet arp probe arp request constructed all-zero sender ip address spa term used ipv4 address conflict detection specification beginning use ipv4 address whether received manual configuration dhcp means host implementing specification must test see address already use broadcasting arp probe packets arp may also used simple announcement protocol useful updating hosts mappings hardware address sender ip address mac address changed announcement also called gratuitous arp message usually broadcast arp request containing sender protocol address spa target field tpa=spa target hardware address tha set zero alternative way broadcast arp reply sender hardware protocol addresses sha spa duplicated target fields tpa=spa tha=sha gratuitous arp request message gratuitous arp reply messages standards-based methods arp request preferred devices may configured use either two types garp arp announcement intended solicit reply instead updates cached entries arp tables hosts receive packet operation code may indicate request reply arp standard specifies opcode processed arp table updated address fields many operating systems perform gratuitous arp startup helps resolve problems would otherwise occur example network card recently changed changing ip-address-to-mac-address mapping hosts still old mapping arp caches gratuitous arp also used interface drivers provide load balancing incoming traffic team network cards used announce different mac address within team receive incoming packets arp announcements used defend link-local ip addresses zeroconf protocol ip address takeover within high-availability clusters arp mediation refers process resolving layer 2 addresses virtual private wire service vpws different resolution protocols used connected circuits e.g. ethernet one end frame relay ipv4 provider edge pe device discovers ip address locally attached customer edge ce device distributes ip address corresponding remote pe device pe device responds local arp requests using ip address remote ce device hardware address local pe device ipv6 pe device discovers ip address local remote ce devices intercepts local neighbor discovery nd inverse neighbor discovery ind packets forwards remote pe device inverse address resolution protocol inverse arp inarp used obtain network layer addresses example ip addresses nodes data link layer layer 2 addresses primarily used frame relay dlci atm networks layer 2 addresses virtual circuits sometimes obtained layer 2 signaling corresponding layer 3 addresses must available virtual circuits used since arp translates layer 3 addresses layer 2 addresses inarp may described inverse addition inarp implemented protocol extension arp uses packet format arp different operation codes reverse address resolution protocol reverse arp rarp like inarp translates layer 2 addresses layer 3 addresses however inarp requesting station queries layer 3 address another node whereas rarp used obtain layer 3 address requesting station address configuration purposes rarp obsolete replaced bootp later superseded dynamic host configuration protocol dhcp arp provide methods authenticating arp replies network arp replies come systems one required layer 2 address arp proxy system answers arp request behalf another system forward traffic normally part network design dialup internet service contrast arp spoofing answering system spoofer replies request another system address aim intercepting data bound system malicious user may use arp spoofing perform man-in-the-middle denial-of-service attack users network various software exists detect perform arp spoofing attacks though arp provide methods protection attacks ipv6 uses neighbor discovery protocol extensions secure neighbor discovery rather arp computers also maintain lists known addresses rather using active protocol model computer maintains database mapping layer 3 addresses e.g. ip addresses layer 2 addresses e.g. ethernet mac addresses data maintained primarily interpreting arp packets local network link thus often called arp cache traditionally methods also used maintain mapping addresses static configuration files centrally maintained lists since least 1980s networked computers utility called 'arp interrogating manipulating table embedded systems networked cameras networked power distribution devices lack user interface use so-called arp stuffing make initial network connection although misnomer arp involved solution issue network management consumer devices specifically allocation ip addresses ethernet devices solution adopted follows devices typically method disable process device operating normally vulnerable attack | [
7148,
709,
1812,
4676,
4677,
6088,
7170,
4683,
6432,
1462,
5039,
6446,
2219,
3640,
4709,
7916,
4342,
44,
3312,
7207,
7209,
7214,
7217,
1140,
2612,
3337,
1900,
6871,
456,
4387,
6879,
4759,
2281,
6521,
4396,
106,
2999,
1543,
2644,
6531,
2... | Test |
3,798 | 7 | Bootstrapping_node:bootstrapping node bootstrapping node also known rendezvous host node overlay network provides initial configuration information newly joining nodes may successfully join overlay network bootstrapping nodes predominantly found decentralized peer-to-peer p2p networks dynamically changing identities configurations member nodes networks attempting join p2p network specific discovery membership protocols configuration information may required newly joining node unaware protocols newly established joining node able communicate nodes ultimately join network furthermore protocols configuration requirements may dynamically change infrastructure membership p2p network evolves therefore need able dynamically inform newly joining node required protocols configurations several methods may used joining node identify bootstrapping nodes objective bootstrapping node provide newly joining nodes sufficient configuration information new node may successfully join network access resources shared content discovery protocol information instruct new node discover peers network membership protocol information instruct new node request-to-join subsequently join peer groups network configuration information overlay network dependent instructions may provided example overlay dependent instructions instructing new node obtain zone configuration information may designed p2p network admission control used joining network supports trust management include things encryption/signature protocols admission policies | [
6025,
2043,
7538,
2566,
744
] | Validation |
3,799 | 5 | IEEE_802.2:ieee 802.2 ieee 802.2 original name iso/iec 8802-2 standard defines logical link control llc upper portion data link layer osi model original standard developed institute electrical electronics engineers ieee collaboration american national standards institute ansi adopted international organization standardization iso 1998 still remains integral part family ieee 802 standards local metropolitan networks llc software component provides uniform interface user data link service usually network layer llc may offer three types services conversely llc uses services media access control mac dependent specific transmission medium ethernet token ring fddi 802.11 etc. using llc compulsory ieee 802 networks exception ethernet also used fiber distributed data interface fddi part ieee 802 family ieee 802.2 sublayer adds control information message created upper layer passed llc transmission another node data link resulting packet generally referred llc protocol data unit pdu additional information added llc sublayer llc header llc header consist dsap destination service access point ssap source service access point control field two 8-bit fields dsap ssap allow multiplex various upper layer protocols llc however many protocols use subnetwork access protocol snap extension allows using ethertype values specify protocol transported atop ieee 802.2 also allows vendors define protocol value spaces 8 16 bit hdlc-style control field serves distinguish communication mode specify specific operation facilitate connection control flow control connection mode acknowledgements acknowledged connectionless mode ieee 802.2 provides two connectionless one connection-oriented operational modes use multicasts broadcasts reduce network traffic information needs propagated stations network however type 1 service provides guarantees regarding order received frames compared order sent sender even get acknowledgment frames received device conforming ieee 802.2 standard must support service type 1 network node assigned llc class according service types supports 802.2 llc pdu following format subnetwork access protocol snap extension used located start information field 802.2 header includes two eight-bit address fields called service access points sap collectively lsap osi terminology although lsap fields 8 bits long low-order bit reserved special purposes leaving 128 values available purposes low-order bit dsap indicates whether contains individual group address low-order bit ssap indicates whether packet command response packet remaining 7 bits ssap specify lsap always individual address packet transmitted lsap numbers globally assigned ieee uniquely identify well established international standards protocols families protocols assigned one saps may operate directly top 802.2 llc protocols may use subnetwork access protocol snap ieee 802.2 indicated hexadecimal value 0xaa 0xab source response ssap dsap snap extension allows using ethertype values private protocol id spaces ieee 802 networks used datagram connection-oriented network services ethernet ieee 802.3 networks exception ieee 802.3x-1997 standard explicitly allowed using ethernet ii framing 16-bit field mac addresses carry length frame followed ieee 802.2 llc header ethertype value followed upper layer data framing datagram services supported data link layer although ipv4 assigned lsap value 6 0x6 arp assigned lsap value 152 0x98 ipv4 almost never directly encapsulated 802.2 llc frames without snap headers instead internet standard rfc 1042 usually used encapsulating ipv4 traffic 802.2 llc frames snap headers fddi ieee 802 networks ethernet ethernet networks typically use ethernet ii framing ethertype 0x800 ip 0x806 arp ipx protocol used novell netware networks supports additional ethernet frame type 802.3 raw ultimately supporting four frame types ethernet 802.3 raw 802.2 llc 802.2 snap ethernet ii two frame types fddi non-ethernet ieee 802 networks 802.2 llc 802.2 snap possible use diverse framings single network possible even upper layer protocol case nodes using unlike framings directly communicate following destination source sap fields control field ieee 802.2 conceptually derived hdlc three types pdus carry data most-often used unacknowledged connectionless mode u-format used identified value '11 lower two bits single-byte control field | [
6071,
6871,
4926,
1916,
3597,
1543,
4321,
3105,
309,
2659,
3462,
2400,
5492,
3797,
3207,
3209,
2672,
7916,
3563,
2057,
7209,
3819,
3821,
3230,
4093,
4101,
7777,
4836,
2714,
1709
] | Test |
3,800 | 4 | InterWorking_Labs:interworking labs interworking labs privately owned company scotts valley california business optimizing application performance applications embedded systems founded 1993 chris wellens marshall rose first company formed specifically test network protocol compliance products tests allow computer devices many different companies communicate networks interworking labs products diagnose replicate re-mediate application performance problems company first product silvercreek tests simple network management protocol snmp agent implementation switch server phone hundreds thousands individual tests including conformance stress robustness negative testing tests detect diagnose implementation errors private standard mibs well snmpv1 v2c v3 stacks implementations maxwell family products emulate real world networks problems delays rerouting corruption impaired packets protocols domain name system delays limited bandwidth new impairments added maxwell using c c++ python extensions controlled via graphical command line script interfaces supports set protocol impairments tcp/ip dhcp icmp tls sip testing maxwell products named maxwell demon thought experiment 19th century physicist james clerk maxwell maxwell ’ demon demonstrated second law thermodynamics—which says entropy increases—is true average thought experiment maxwell imagined double chamber uniform mixture hot cold gas molecules demon intelligent sits two chambers operating trap door every time cold low-energy molecule comes demon opens door lets molecule side eventually cold gas molecules one side chamber hot ones although molecules continue move randomly introduction intelligence system reduces entropy instead increasing maxwell product sits middle network conversation opens closes figurative door basis specific criteria maxwell intelligently modifies packet based pre-selected criteria sends packet way interworking labs advised internet engineering task force ietf maxwell network emulations reproduce real conditions lab products deployed interworking labs co-founded 1993 chris wellens marshall rose two met 1992 interop company mountain view california wellens director technology rose interop program committee also working group chair ietf simple network management protocol snmp wellens—who overseeing trade fair 5000-node interopnet well array interoperability demonstrations network protocols— noticed engineers different companies often interpreted network protocols differently ended struggling make products send receive data one another—sometimes minutes showcase demonstrations engineers asked interop create interoperability lab network communication issues could worked private less stressful environment interop founder ceo dan lynch concluded industry needed interoperability testing lab lynch asked wellens write business plan permanent interoperability lab rose proposed lab first task create try set tests snmp protocol since snmp area familiar one engineers particular problems interop wellens volunteered organize group developers interoperability test summit rose would create set tests assist developing initial plan time however ziff-davis acquired interop chose proceed interoperability lab wellens lynch agreed pursue idea 1993 wellens established interworking labs january 1994 organized first snmp interoperability test summit using 50 snmp tests written rose first test summit large number implementations failed rose tests.. results persuaded several major corporations interoperability testing would critical component functioning networks participants second 1994 snmp test summit included cabletron systems cisco systems eicon technology empirical tools technologies epilogue technology corp. fujitisu ossi ibm ibm research network general corp. peer networks snmp research synoptics communications tgv inc. wellfleet communications 2000 wellens asked karl auerbach join interworking labs board directors 2002 wellens hired auerbach part cisco advanced internet architecture group serve chief technology officer interworking labs advisory board consisted several members ietf expertise networking protocols andy bierman jeff case dave perkins randy presuhn steve waldbusser wireless networks used hospitals police military turned computer networks essential lifeline utilities computer networks keep economies transportation energy food supplies flowing commonly belong critical infrastructure region performance networks adverse conditions significant concern militaries industry local regional governments according wellens ucita significantly protected software publishers liability failure products software publishers may become increasingly liable consequences network failures—especially comprehensive networking testing existed used online retailers example demonstrate multimillion-dollar losses due network problems security flaws network collapse denial service attack video links | [
2043,
5965,
1435,
4783,
3775,
2219,
7170
] | Test |
3,801 | 1 | Two-phase_locking:two-phase locking databases transaction processing two-phase locking 2pl concurrency control method guarantees serializability also name resulting set database transaction schedules histories protocol utilizes locks applied transaction data may block interpreted signals stop transactions accessing data transaction life 2pl protocol locks applied removed two phases two types locks utilized basic protocol shared exclusive locks refinements basic protocol may utilize lock types using locks block processes 2pl may subject deadlocks result mutual blocking two transactions lock system object associated shared resource data item elementary type row database page memory database lock database object data-access lock may need acquired transaction accessing object correct use locks prevents undesired incorrect inconsistent operations shared resources concurrent transactions database object existing lock acquired one transaction needs accessed another transaction existing lock object type intended access checked system existing lock type allow specific attempted concurrent access type transaction attempting access blocked according predefined agreement/scheme practice lock object directly block transaction operation upon object rather blocks transaction acquiring another lock object needed held/owned transaction performing operation thus locking mechanism needed operation blocking controlled proper lock blocking scheme indicates lock type blocks lock type two major types locks utilized common interactions lock types defined blocking behavior follows several variations refinements major lock types exist respective variations blocking behavior first lock blocks another lock two locks called incompatible otherwise locks compatible often lock types blocking interactions presented technical literature lock compatibility table following example common major lock types according two-phase locking protocol transaction handles locks two distinct consecutive phases transaction execution two phase locking rule summarized never acquire lock lock released serializability property guaranteed schedule transactions obey rule typically without explicit knowledge transaction end phase 1 safely determined transaction completed processing requested commit case locks released phase 2 difference 2pl c2pl c2pl transactions obtain locks need transactions begin ensure transaction already holds locks block waiting locks conservative 2pl prevents deadlocks comply s2pl protocol transaction needs comply 2pl release write exclusive locks ended i.e. either committed aborted hand read shared locks released regularly phase 2 protocol appropriate b-trees causes bottleneck b-trees always starts searching parent root rigorousness rigorous scheduling rigorous two-phase locking comply strong strict two-phase locking ss2pl locking protocol releases write exclusive read shared locks applied transaction transaction ended i.e. completing executing ready becoming either committed aborted protocol also complies s2pl rules transaction obeying ss2pl viewed phase 1 lasts transaction entire execution duration phase 2 degenerate phase 2 thus one phase actually left two-phase name seems still utilized due historical development concept 2pl 2pl super-class ss2pl property schedule also called rigorousness also name class schedules property ss2pl schedule also called rigorous schedule term rigorousness free unnecessary legacy two-phase well independent locking mechanism principle blocking mechanisms utilized property respective locking mechanism sometimes referred rigorous 2pl ss2pl special case s2pl i.e. ss2pl class schedules proper subclass s2pl every ss2pl schedule also s2pl schedule s2pl schedules exist ss2pl ss2pl concurrency control protocol choice database systems utilized since early days 1970s proven effective mechanism many situations provides besides serializability also strictness special case cascadeless recoverability instrumental efficient database recovery also commitment ordering co participating distributed environments co based distributed serializability global serializability solutions employed subset co efficient implementation distributed ss2pl exists without distributed lock manager dlm distributed deadlocks see resolved automatically fact ss2pl employed multi database systems ensures global serializability known years discovery co co came understanding role atomic commitment protocol maintaining global serializability well observation automatic distributed deadlock resolution see detailed example distributed ss2pl matter fact ss2pl inheriting properties recoverability co significant subset 2pl general form besides comprising simple serializability mechanism however serializability also implied co known provide ss2pl significant qualities 2pl general form well combined strictness i.e. strict 2pl s2pl known utilized practice popular ss2pl require marking end phase 1 2pl s2pl thus simpler implement also unlike general 2pl ss2pl provides mentioned useful strictness commitment ordering properties many variants ss2pl exist utilize various lock types various semantics different situations including cases lock-type change transaction notable variants use multiple granularity locking comments two schedule classes define schedules respective properties common schedules either one contains strictly contains equal incomparable containment relationships among 2pl classes major schedule classes summarized following diagram 2pl subclasses inherently blocking means optimistic implementations exist whenever optimistic 2pl mentioned refers different mechanism class includes also schedules 2pl class locks block data-access operations mutual blocking transactions results deadlock execution transactions stalled completion reached thus deadlocks need resolved complete transactions executions release related computing resources deadlock reflection potential cycle precedence graph would occur without blocking deadlock resolved aborting transaction involved potential cycle breaking cycle often detected using wait-for graph graph conflicts blocked locks materialized conflicts materialized database due blocked operations reflected precedence graph affect serializability indicates transaction waiting lock release transaction cycle means deadlock aborting one transaction per cycle sufficient break cycle transaction aborted due deadlock resolution application decide next usually application restart transaction beginning may delay action give transactions sufficient time finish order avoid causing another deadlock distributed environment atomic commitment protocol typically two-phase commit 2pc protocol utilized atomicity recoverable data data transaction control partitioned among 2pc participants i.e. data object controlled single 2pc participant distributed global deadlocks deadlocks involving two participants 2pc resolved automatically follows ss2pl effectively utilized distributed environment global deadlocks due locking generate voting-deadlocks 2pc resolved automatically 2pc see commitment ordering co exact characterization voting-deadlocks global cycles reference except co articles known notice general case 2pl global deadlocks similarly resolved automatically synchronization point protocol phase-1 end distributed transaction synchronization point achieved voting notifying local phase-1 end propagated participants distributed transaction way decision point atomic commitment analogy decision point co conflicting operation 2pl happen phase-1 end synchronization point resulting voting-deadlock case global data-access deadlock voting-deadlock also locking based global deadlock automatically resolved protocol aborting transaction involved missing vote typically using timeout comment | [
1905,
6604,
7330,
5209,
7341,
6345,
3951,
5289,
5561,
906,
5217,
6098,
4054,
6636,
2663,
2124,
6737,
6739,
3119,
7999,
2411,
5943,
2054,
6932,
6386,
684,
6390,
7937,
7303,
6144,
6315,
4457,
4010,
6320,
1902,
6594,
2359
] | Test |
3,802 | 7 | M2Mi_Corporation:m2mi corporation machine-to-machine intelligence m2mi corp founded nasa research park moffett federal airfield provides authentic platform m2m internet things economy m2mi founded 2006 geoffrey barnard m2mi founding member oasis mqtt standards group geoffrey barnard served chair security sub-committee m2mi m2m intelligence® application provides m2m iot application globally connect manage secure perform in-stream analysis quickly monetize organization connected assets strong focus cybersecurity privacy m2mi also provides iot security suite professional edition™ designed securing industrial applications enforcing specific industry compliance allows organizations quickly generate deploy iot device code comply industry ’ regulations professional edition includes means device owners monitor devices health using intuitive dashboards alerts group commands insight analytics includes set optimized ciphers resource limited devices iot security suite professional edition™ designed handle security across devices iot gateways network infrastructures | [
2961,
3498
] | Test |
3,803 | 3 | Silvermont:silvermont silvermont microarchitecture low-power atom celeron pentium branded processors used systems chip socs made intel silvermont forms basis total four soc families silvermont announced news media may 6 2013 intel headquarters santa clara california intel repeatedly said first bay trail devices would available holiday 2013 timeframe leaked slides showed release window bay trail-t august 28 – september 13 2013 avoton rangeley announced available second half 2013 first merrifield devices announced 1h14 airmont 14 nm die shrink silvermont launched early 2015 first seen atom x7-z8700 used microsoft surface 3 airmont microarchitecture includes following soc families silvermont based cores also used modified knight landing iteration intel xeon phi hpc chips silvermont first atom processor feature out-of-order architecture intel revealed q4 2016 quarterly report quality issues c2000 product family effect financial performance company data center group quarter erratum named avr54 published intel state defect chip lpc clock affected systems may experience inability boot may cease operation workaround available requiring platform hardware changes soc failures thought led failures cisco synology products though discussion c2000 root cause failure reported non-disclosure agreement many vendors intel released new c0 stepping c2000 series april 2017 corrected bug july 2017 intel published similar quality issue affects also atom e3800 series embedded processors erratum named vli89 published intel state similar issue atom c2000 defect chip lpc clock affected systems may experience inability boot may cease operation issues extend also usb bus sd card circuitry happen certain conditions activity high several years april 2018 intel announced releasing new d1 stepping fix issue lpc usb sd card buses circuitry degradation issues also apply bay trail processors intel celeron j1900 n2800/n2900 series also pentium n3500 j2850 j2900 series celeron j1800 j1750 series based affected silicon cisco stated failures atom c2000 processors occur early 18 months use higher failure rates occurring 36 months mitigations found limit impact systems firmware update lpc bus called lpc_clkrun reduces utilization lpc interface turn decreases eliminates lpc bus degradation systems however compatible new firmware usb maximum 10 active time 50tb transmit traffic life expectancy lifetime port recommended use sd card boot device remove card system use 14nm airmont architecture processors also affected design flaws noted braswell specification update chp49 errata addition lpc sd card circuitry degradation issues 14nm designs also issues real time clock rtc circuitry degradation usb buses however affected unspecified firmware changes required mitigate rtc circuitry degradation intel plan release new stepping braswell intel admitted issue stating impact consumers depends use condition list desktop processors follows found bug blueprint c2000 cpus family may cause failure embedded ethernet ports list server processors follows list upcoming communications processors follows list embedded processors follows list mobile processors follows list tablet hybrid processors follows list smartphone processors follows list smartphone processors follows list desktop processors follows list mobile processors follows list smartphone tablet processors follows silvermont based processor cores used knights landing versions intel xeon phi multiprocessor hpc chips changes hpc including avx-512 vector units | [
2449,
2000,
2814,
5802,
6332,
6698,
6793,
4847,
3942,
3849,
4765,
6170,
3443,
6344,
4108,
5737,
1465,
7449,
7453,
3020,
7364,
740,
3717,
5669,
5670,
3803,
6647,
7280,
1867,
3565,
4077,
6569,
4985,
766,
5431,
691,
5343,
866,
4098,
6057,
... | Test |
3,804 | 1 | Multilingual_Multiscript_Plant_Name_Database:multilingual multiscript plant name database multilingual multiscript plant name database mmpnd multilingual database names taxa plants located university melbourne managed maintained michel h. porcher database includes names taxa 900 genera higher plants counting mushrooms addition scientific name synonyms contains names taxa 82 major languages website says includes 70 languages 40 languages dialects included mmpnd mentioned many taxa grin-global germplasm resources information network references porcher m. h. et al searchable world wide web multilingual multiscript plant name database mmpnd on-line resource pl names international plant names index ipni mentions multilingual multiscript plant name database searchable language script holds lot information including index medicinal plants regarding aims mmpnd following said ... intention cover many useful plants possible useful one part world however weed even noxious weed another political stand whether selection species declared useful people provided get minimum information handle data basically foresee 8 categories plants order decreasing importance consider vegetables cereals fruits mushrooms fungi herbs pasture fodder crops medicinal plants may termed utilitarian crops fibre oil crops stimulants etc feel last fifty years first 3 categories attracting far little attention taxonomists especially species level three groups edible plants include world staple foods related cultivars selections bred improved centuries basic ingredients world ethnic cuisines ... first objective focus useful plants cultivated ones database currently contains names plants economic importance well names savage plants genus last updating indicated multilingual names presented genera follows indexes plant names various languages en abutilon allium chinense amaranthus tricolor banana beetroot orange beta vulgaris black-eyed pea blood banana ... 95 citations ca 11 citations de ... 34 citations es ... 27 citations fr ... 28 citations | [] | Test |
3,805 | 4 | Illinois_Security_Lab:illinois security lab illinois security lab research laboratory university illinois urbana–champaign established 2004 support research education computer network security lab part computer science department information trust institute current research projects concern health information technology critical infrastructure protection past projects addressed messaging networking privacy lab performing work strategic healthcare advanced research projects security sharps project developing security privacy technologies help remove key barriers prevent use health information systems implementing electronic health records health information exchanges telemedicine networked control systems electric power grid use computers tasks like protecting substations overloads digital protective relays metering facilities advanced meters lab developed attested meter provide security privacy advanced meters worked security building automation systems substation automation advances networking distributed computing medical devices combining changes way health care financed growing number elderly people produce strong prospects widespread use assisted living health care approach benefit transferring medical information collected homes dedicated facilities clinicians data networks lab explored security engineering systems prototypes field trials formal methods based architecture uses partially trusted assisted living service provider alsp third party intermediary assisted persons clinicians scalable distributed systems demand ability express adapt diverse policies numerous distinct administrative domains lab introduced technologies messaging systems adaptive security policies based wsemail internet messaging implemented web service attribute-based messaging abm addressing based attributes recipients although significant progress formal analysis security integrity confidentiality relatively less progress treating denial-of-service attacks lab explored techniques based shared channel model envisions bandwidth limiting factor attacks focuses host-based counter-measures selective verification exploits adversary bandwidth limitations favor valid parties also developing new formal methods reasoning dynamic configuration vpns many new information technologies profound impact privacy threats provoked legislation calls deeper regulation lab developed ways treat privacy rules formally including better ways reason using formal methods conformance implications regulations quantify classify privacy attitudes control risks new technologies lab showed formally encode hipaa consent regulations using privacy apis analyzed model checking | [
6986,
1691,
4688,
651,
1805
] | Validation |
3,806 | 9 | Craig_Chambers:craig chambers craig chambers computer scientist google since 2007 prior professor department computer science engineering university washington received b.s degree computer science mit 1986 ph.d. computer science stanford 1992 best known influential research language self introduced prototypes alternative classes code-splitting compilation technique generates separate code paths fast general cases speed execution dynamically-typed programs | [] | Test |
3,807 | 9 | SPSS:spss spss statistics software package used interactive batched statistical analysis long produced spss inc. acquired ibm 2009 current versions 2015 named ibm spss statistics software name originally stood statistical package social sciences spss reflecting original market although software popular fields well including health sciences marketing research hub published full-length freely accessible spss video tutorial playlist spss widely used program statistical analysis social science also used market researchers health researchers survey companies government education researchers marketing organizations data miners others original spss manual nie bent hull 1970 described one sociology influential books allowing ordinary researchers statistical analysis addition statistical analysis data management case selection file reshaping creating derived data data documentation metadata dictionary stored datafile features base software statistics included base software many features spss statistics accessible via pull-down menus programmed proprietary 4gl command syntax language command syntax programming benefits reproducible output simplifying repetitive tasks handling complex data manipulations analyses additionally complex applications programmed syntax accessible menu structure pull-down menu interface also generates command syntax displayed output although default settings changed make syntax visible user also pasted syntax file using paste button present menu programs run interactively unattended using supplied production job facility additionally macro language used write command language subroutines python programmability extension access information data dictionary data dynamically build command syntax programs python programmability extension introduced spss 14 replaced less functional sax basic scripts purposes although saxbasic remains available addition python extension allows spss run statistics free software package r. version 14 onwards spss driven externally python vb.net program using supplied plug-ins version 20 onwards two scripting facilities well many scripts included installation media normally installed default spss statistics places constraints internal file structure data types data processing matching files together considerably simplify programming spss datasets two-dimensional table structure rows typically represent cases individuals households columns represent measurements age sex household income two data types defined numeric text string data processing occurs sequentially case-by-case file dataset files matched one-to-one one-to-many many-to-many addition cases-by-variables structure processing separate matrix session one process data matrices using matrix linear algebra operations graphical user interface two views toggled clicking one two tabs bottom left spss statistics window 'data view shows spreadsheet view cases rows variables columns unlike spreadsheets data cells contain numbers text formulas stored cells 'variable view displays metadata dictionary row represents variable shows variable name variable label value label print width measurement type variety characteristics cells views manually edited defining file structure allowing data entry without using command syntax may sufficient small datasets larger datasets statistical surveys often created data entry software entered computer-assisted personal interviewing scanning using optical character recognition optical mark recognition software direct capture online questionnaires datasets read spss spss statistics read write data ascii text files including hierarchical files statistics packages spreadsheets databases spss statistics read write external relational database tables via odbc sql statistical output proprietary file format *.spv file supporting pivot tables addition in-package viewer stand-alone reader downloaded proprietary output exported text microsoft word pdf excel formats alternatively output captured data using oms command text tab-delimited text pdf xls html xml spss dataset variety graphic image formats jpeg png bmp emf several variants spss statistics exist spss statistics gradpacks highly discounted versions sold students spss statistics server version spss statistics client/server architecture add-on packages enhance base software additional features examples include complex samples adjust clustered stratified samples custom tables create publication-ready tables spss statistics available either annual monthly subscription license spss statistics launched version 25 aug 08 2017 spss v25 adds new advanced statistics random effects solution results genlinmixed robust standard errors glm/unianova profile plots error bars within advanced statistics custom tables add-on v25 also includes new bayesian statistics capabilities method statistical inference publication ready charts powerful new charting capabilities including new default templates ability share microsoft office applications software released first version 1968 statistical package social sciences spss developed norman h. nie dale h. bent c. hadlai hull principals incorporated spss inc. 1975 early versions spss statistics written fortran designed batch processing mainframes including example ibm icl versions originally using punched cards data program input processing run read command file spss commands either raw input file fixed format data single record type 'getfile data saved previous run save precious computer time 'edit run could done check command syntax without analysing data version 10 spss-x 1983 data files could contain multiple record types prior spss 16.0 different versions spss available windows mac os x unix spss statistics version 13.0 mac os x compatible intel-based macintosh computers due rosetta emulation software causing errors calculations spss statistics 15.0 windows needed downloadable hotfix installed order compatible windows vista version 16.0 version runs windows mac linux graphical user interface written java mac os version provided universal binary making fully compatible powerpc intel-based mac hardware spss inc announced july 28 2009 acquired ibm us 1.2 billion dispute ownership name spss 2009 2010 product referred pasw predictive analytics software january 2010 became spss ibm company complete transfer business ibm done october 1 2010 date spss ibm company ceased exist ibm spss fully integrated ibm corporation one brands ibm software group business analytics portfolio together ibm algorithmics ibm cognos ibm openpages companion software ibm spss family used data mining text analytics ibm spss modeler realtime credit scoring services ibm spss collaboration deployment services spss data collection spss dimensions sold 2015 unicom systems inc. division unicom global merged integrated software suite unicom intelligence survey design survey deployment data collection data management reporting ida interactive data analysis software package originated formerly national opinion research center norc university chicago initially offered hp-2000 somewhat later ownership spss also available dec decsystem-20 scss software product intended online use ibm mainframes although c conversational also represented distinction regarding data stored used column-oriented rather row-oriented internal database gave good interactive response time spss conversational statistical system scss whose strong point spss cross-tabulation | [
7512,
3606,
2820,
1626,
3514,
4299,
4759,
5548,
713,
3268,
1731,
5288,
5117,
3005,
5999,
4408,
4865,
1554,
5571,
5041,
4872,
6015,
3633,
6543,
578,
7003,
4705,
4798,
4067,
3981,
3388,
4070,
2866,
1398,
5419,
6130,
6934,
602,
1879,
4089,
... | Test |
3,808 | 4 | Cruise_ship_ID_card:cruise ship id card cruise ship id card plastic card size credit card serves several functions passengers cruise ship cruise ship id cards scanned entrances ship various points throughout ship either via magnetic strip rfid readers bar code order identify passenger allow entry exit ship allow entry certain areas ship including passenger cabin bill purchases passenger various functions information printed ship card may include rare picture passenger displayed card frequently scanned presence computer display picture passenger screen functions ship card may include | [] | Validation |
3,809 | 2 | Media_Transfer_Protocol:media transfer protocol media transfer protocol mtp extension picture transfer protocol ptp communications protocol allows media files transferred atomically portable devices whereas ptp designed downloading photographs digital cameras media transfer protocol allows transfer music files digital audio players media files portable media players well personal information personal digital assistants mtp key part wmdrm10-pd digital rights management drm service windows media platform mtp part windows media framework thus closely related windows media player versions microsoft windows operating system windows xp sp2 support mtp windows xp requires windows media player 10 higher later windows versions built-in support microsoft also made available mtp porting kit older versions windows back windows 98 usb implementers forum device working group standardised mtp full-fledged universal serial bus usb device class may 2008 since mtp official extension ptp shares class code main purpose protocol allow transfer media files associated metadata portable devices one transfer function time support operations open edit modify workaround copy hosting system operations copy back protocol originally implemented use across usb extended use across tcp/ip bluetooth windows vista supports mtp tcp/ip windows 7 windows vista platform update windows vista also support mtp bluetooth host connecting mtp device called mtp initiator whereas device mtp responder main reason using mtp rather example usb mass-storage device class msc latter operates granularity mass storage device block usually practice fat block rather logical file level words usb mass storage class designed give host computer undifferentiated access bulk mass storage compact flash rather file system might safely shared target device except specific files host might modifying/accessing practice therefore usb host computer mounted msc partition assumes absolute control storage may safely modified device without risk data corruption host computer severed connection furthermore host computer full control connected storage device risk host computer may corrupt file system reformat file system supported usb device otherwise modify way usb device completely understand mtp ptp specifically overcome issue making unit managed storage local file rather entire possibly large unit mass storage block level way mtp works like transactional file system either entire file written/read nothing storage media affected failed transfers device maintains database/index content disk mtp saves cost re-scanning entire disk every time content modified additionally mtp allows mtp initiators identify specific capabilities device respect file formats functionality particular mtp initiators may provide passwords information unlock files otherwise enable digital rights management nothing specific nature core standard features available via vendor extensions mtpz zune extension mtp specifically denies access files authentication processed possible using windows media player 10 higher mtp advantages marked “ ” disadvantages marked “ ” exposing filesystem metadata index integrity full control device unless operating system exposes mtp devices virtual file systems occur natively windows thus mtp devices assigned drive letters mtp-unaware software able make use devices limiting user mtp-specific programs one specific concern antivirus software host computer may aware mtp devices making potentially less secure mass storage devices although files mtp devices copied moved host use mtp-unaware antivirus software chance scan antivirus scanning might also impractical due blocking regular use device despite identifiability ptp/mtp usb device class libmtp documentation indicates vendor product id combination plays functional role identifying mtp device also windows drivers libmtp includes vast listings vendor product id numbers devices supports along workarounds bugs non-generic methodology hinders mtp drivers forward compatibility new devices mtp specification includes enumeration file formats called object format use enumeration communicating supported file formats formats transferred files apart uncategorized formats beginning list formats grouped categories image audio video document formats category one undefined format followed specific formats also super-generic undefined object format jolla cited lack webm support mtp one reason support video format mobile operating system sailfish os unclear limitation tools spec webm defined mtp 1.1 spec features used efficient alternatives whole-file transfers re-uploads mtp 1.1 spec according go-mtpfs mtp supported windows xp windows media player 10 later versions installed windows vista later mtp support built older versions windows specifically windows 2000 windows 98 windows microsoft released mtp porting kit contains mtp device driver manufacturers creative technology also provide legacy mtp drivers players usually consist mtp porting kit files customized inf file describing specific players mtp-compatible devices assigned drive letters instead appear devices applications windows explorer compared devices implement usb mass storage devices accessed programmatically scripts normal windows programs depend drive letters instead files must manipulated using windows explorer applications specially written mtp support windows mtp-compatible devices support feature called auto sync lets users configure windows media player automatically transfer copied newly acquired content devices whenever connected provided content compatible windows media player auto sync customizable player transfer content meets certain criteria songs rated four stars higher instance changes made file properties user rating file playback counts device propagated back computer device reconnected copies files accessed mtp may remain host computer even reboot accessible user account accessed well user accounts able read user account files including administrative users windows 7 sensor platform supports sensors built mtp-compatible devices free open-source implementation media transfer protocol available libmtp library incorporates product device ids many sources commonly used software mtp support gnome applications like gnome files formerly called nautilus archive manager formerly called file-roller use gio-based gvfs access files mtp devices proper mtp support added gvfs version 1.15.2 2013-01-15 philip langdale early patches gvfs enable google direct i/o extensions available kde project develops mtp kio slave similar level integration gvfs related gnome kde *nix graphical mtp-capable media player gmtp several tools provide fuse based file system mounting mtp devices within unix filesystem hierarchy making accessible program operates files directories examples include mtpfs jmtpfs go-mtpfs simple-mtpfs macos built-in support mtp application digital images third-party drivers mount mtp devices drives also several third-party file transfer applications available mac os x v10.5 later later versions several operating systems including amigaos android aros morphos symbian os support mtp sometimes additional drivers software disadvantage mtp devices android compared usb mass storage although file timestamps preserved copying files android device one computer copying direction file modification timestamps replaced time copy done companies including creative technology intel iriver samsung electronics manufacture devices based microsoft portable media center specification widely adopted mtp supporting devices introduced 2004 consumer electronics show initial period uncertain reactions several large media player producers creative technology iriver adopted mtp protocol place protocols many devices audio software applications support mtp | [
1710,
3152,
4759,
3585,
5571,
5637,
7827,
2773,
7136,
5747,
578,
5865,
740
] | Train |
3,810 | 9 | Christopher_Strachey:christopher strachey christopher s. strachey 16 november 1916 – 18 may 1975 british computer scientist one founders denotational semantics pioneer programming language design member strachey family prominent government arts administration academia christopher strachey born 16 november 1916 oliver strachey rachel ray costelloe hampstead england oliver strachey son richard strachey great grandson sir henry strachey 1st baronet elder sister writer barbara strachey 1919 family moved 51 gordon square stracheys belonged bloomsbury group whose members included virginia woolf john maynard keynes christopher uncle lytton strachey 13 christopher went gresham school holt showed signs brilliance general performed poorly admitted king college cambridge college alan turing 1935 continued neglect studies strachey studied mathematics transferred physics end third year cambridge strachey suffered nervous breakdown possibly related coming terms homosexuality returned cambridge managed lower second natural sciences tripos unable continue education christopher joined standard telephones cables stc research physicist first job providing mathematical analysis design electron tubes used radar complexity calculations required use differential analyser initial experience computing machine sparked strachey interest began research topic application research degree university cambridge rejected strachey continued work stc throughout second world war war fulfilled long-standing ambition becoming schoolmaster st edmund school canterbury teaching mathematics physics three years later able move prestigious harrow school 1949 stayed three years january 1951 friend introduced mike woodger national physical laboratory npl lab successfully built reduced version alan turing automatic computing engine ace concept dated 1945 pilot ace spare time strachey developed program game draughts also known checkers finished preliminary version may 1951 game completely exhausted pilot ace memory draughts program tried run first time 30 july 1951 npl unsuccessful due program errors strachey heard manchester mark 1 much bigger memory asked former fellow-student alan turing manual transcribed program operation codes machine around october 1951 summer 1952 program could play complete game draughts reasonable speed strachey programmed first ever music performed computer rendition british national anthem mark ii manchester electronic computer manchester 1951 later year short extracts three pieces recorded bbc outside broadcasting unit national anthem ba ba black sheep mood researchers university canterbury christchurch restored acetate master disc 2016 results may heard soundcloud may 1952 strachey gave two-part talk study control animals machines cybernetics bbc home service science survey programme strachey worked national research development corporation nrdc 1952 1959 working st. lawrence seaway project able visit several computer centres united states catalogue instruction sets later worked programming elliott 401 computer ferranti pegasus computer together donald b. gillies filed 3 patents computing design including design base registers program relocation also worked analysis vibration aircraft working briefly roger penrose developed concept time-sharing 1959 strachey left nrdc become computer consultant working nrdc emi ferranti organisations number wide-ranging projects work included logical design computers providing autocode later design high-level programming languages contract produce autocode ferranti orion computer strachey hired peter landin became one assistant duration strachey consulting period 1962 remaining consultant accepted position cambridge university 1965 strachey accepted position oxford university first director programming research group later university first professor computer science fellow wolfson college oxford collaborated dana scott strachey elected distinguished fellow british computer society 1971 pioneering work computer science 1973 strachey along robert milne began write essay submitted adams prize competition continued work revising book form strachey seen heard recorded lighthill debate ai see lighthill report strachey contracted illness diagnosed jaundice period seeming recovery returned died infectious hepatitis 18 may 1975 developed combined programming language cpl influential set lecture notes fundamental concepts programming languages formalised distinction l- r- values seen c programming language strachey also coined term currying although invent underlying concept instrumental design ferranti pegasus computer macro language m4 derives much strachey gpm general purpose macrogenerator one earliest macro expansion languages department computer science university oxford christopher strachey professorship computing currently held samson abramsky frs november 2016 strachey 100 event held oxford university celebrate centenary strachey birth including viewing weston library oxford christopher strachey archive held bodleian library collection | [
7707,
4039,
6614,
2641,
1825,
8097,
2662,
3895,
1600,
6497,
263,
1243,
1435
] | Test |
3,811 | 3 | World_Cup_Soccer:_Italia_'90:world cup soccer italia '90 world cup soccer italia '90 football video game released various home computers 1990 virgin mastertronic officially licensed game tournament known simply italia '90 tronix budget reissues different games also released virgin mastertronic sega consoles world cup italia '90 second licensed game based fifa world cup featuring official logo mascot first ill-fated world cup carnival 1986 fifa world cup game based 1989 game world trophy soccer originally arcade game mastertronic amiga-based arcadia machines virgin games bought mastertronic 1988 game released amiga atari st commodore 64 published virgin mastertronic virgin mastertronic obtained official licence world cup sponsor olivetti adapted world trophy soccer game renaming world cup soccer italia '90 also porting amstrad cpc dos zx spectrum attempts made change set tournament teams available match actual 1990 world cup game presented bird's-eye view player gets near goal switches 3d view penalty area player must try score defender arrives screen player choose play england belgium italy spain teams correct coloured strips tournament actual world cup game received mixed reviews amiga action gave overall score 62 reviewers split reviewer alex said graphics well implemented impressed use first-person perspective shooting saving goal reviewer doug concluded 've played fair share soccer games world cup tie-in certainly best game quite hard get hang even get used controls game still n't play well zzap gave scores 44 amiga version 42 commodore 64 praise given graphics review overwhelmingly negative complaints focusing 3d goalmouth section said n't really work unfair anyway mostly despite officially licensed game accurately reflect tournament someone tell world cup may official licence lacks official fixtures teams game became best seller number one selling spectrum game august september 1990 also unofficial italia '90 games including italy 1990 published u.s. gold released official games 1986 1994 tournaments italy '90 soccer released italy 1988 italia 1990 budget publisher codemasters | [] | Validation |
3,812 | 5 | John_Romkey:john romkey john romkey donald w. gillies developed first industry tcp/ip stack ibm pc 1983 founding ftp software commercial tcp/ip stack provider 1986 romkey authored first network analyzer netwatch predating network general sniffer served iab simon hackett connected first appliance toaster internet romkey currently owner blue forest research consulting company mit john romkey authored first tcp/ip stack ms-dos founder ftp software company provided commercial package ms-dos ms windows advent microsoft tcp/ip stacks starting windows 95 ftp software well commercial tcp/ip stacks providers driven business | [
6380
] | Test |
3,813 | 9 | Service_Data_Objects:service data objects service data objects technology allows heterogeneous data accessed uniform way sdo specification originally developed 2004 joint collaboration oracle bea ibm approved java community process jsr 235 version 2.0 specification introduced november 2005 key part service component architecture originally technology known web data objects wdo shipped ibm websphere application server 5.1 ibm websphere studio application developer 5.1.2 similar technologies jdo emf jaxb ado.net service data objects denote use language-agnostic data structures facilitate communication structural tiers various service-providing entities require use tree structure root node provide traversal mechanisms breadth/depth-first allow client programs navigate elements objects static fixed number fields dynamic map-like structure allowing unlimited fields specification defines meta-data fields object graph also provided change summaries allow receiving programs act efficiently specification developed ibm rogue wave oracle sap siebel sybase xcalia software ag within oasis member section open csa since april 2007 collaborative work materials remain collaboration platform open soa informal group actors industry following sdo products available open source implementations sdo specification versions history found | [
2623,
7921,
2725,
6594,
7109,
3498,
2807
] | Test |
3,814 | 8 | Klout:klout klout website mobile app used social media analytics rate users according online social influence via klout score numerical value 1 100 determining user score klout measured size user social media network correlated content created measure users interact content klout launched 2008 lithium technologies acquired site march 2014 closed service may 25 2018 klout used bing facebook foursquare google+ instagram linkedin twitter youtube wikipedia data create klout user profiles assigned unique klout score klout scores ranged 1 100 higher scores corresponding higher ranking breadth strength one online social influence twitter users assigned score users registered klout could link multiple social networks network data aggregated influence user klout score klout measured influence using data points twitter following count follower count retweets list memberships many spam/dead accounts following influential people retweet unique mentions information combined data number social network followings interactions come klout score social networks influenced user klout score twitter facebook google+ linkedin individuals pages corporate/business youtube instagram klout well wikipedia accounts flickr blogger tumblr last.fm wordpress bing also linked users however weigh klout score microsoft announced strategic investment klout september 2012 whereby bing would access klout influence technology klout would access bing search data scoring algorithm klout scores supplemented three nominally specific measures klout calls true reach amplification network impact true reach based size user engaged audience actively engage user messages amplification score relates likelihood one messages generate actions retweets mentions likes comments network impact reflects computed influence value person engaged audience primary business model klout involved companies paying klout perks campaigns company offers free services products klout users match pre-defined set criteria including scores topics geographic locations klout users receive perks obligation write hope effectively advertise products social media klout offered perks program since 2010 according klout ceo joe fernandez 50 partnerships established november 2011 may 2013 klout announced users claimed 1 million perks across 400 campaigns march 2013 klout announced intention begin displaying business analytics aimed helping business brand users learn online audiences september 2012 klout announced information-sharing partnership bing search engine showing klout scores bing searches allowing klout users post items selected bing social media several objections klout methodology raised regarding process scores generated overall societal effect critics pointed klout scores representative influence person really highlighted barack obama president united states lower influence score number bloggers social critics argued klout score devalued authentic online communication promoted social ranking stratification trying quantify human interaction klout attempted address criticisms updated algorithms barack obama importance better reflected site criticized violating privacy minors exploiting users profit john scalzi described principle behind klout operation socially evil exploitation users status anxiety charles stross described service internet equivalent herpes blogging analysis klout terms conditions revealed company business model illegal united kingdom conflicted data protection act 1998 stross advised readers delete klout accounts opt klout services ben rothke concluded klout work cut seems like need beta longer klout applauded trying measure monstrosity called social influence results influence truth carry little influence klout criticised opacity methodology claimed advanced machine learning techniques used leveraging network theory sean golliher analysed klout scores twitter users found simple logarithm number followers sufficient explain 95 variance november 2015 klout released academic paper discussing methodology ieee bigdata 2015 conference spite controversy employers made hiring decisions based klout scores reported article wired man recruited vp position fifteen years experience consulting companies including america online ford kraft eliminated candidate specifically klout score time 34 favour candidate score 67 | [
7419,
3609,
2484,
518
] | Test |
3,815 | 7 | Death_Star_(ILM):death star ilm death star name render farm owned industrial light magic ilm cluster computer originally built sgi since converted linux system built racksaver verari systems amd processors system originally 1,500 processors 750 nodes figure doubled ilm tends quiet supercomputer current configuration known | [
7010,
578
] | Test |
3,816 | 9 | Monica_S._Lam:monica s. lam monica sin-ling lam professor computer science department stanford founder moka5 omlet monica lam received b.sc university british columbia 1980 ph.d. computer science carnegie mellon university 1987 lam joined faculty computer science stanford university 1988 contributed research wide range computer systems topics including compilers program analysis operating systems security computer architecture high-performance computing currently directs mobisocial laboratory stanford lam cofounder ceo omlet first mobisocial product launched 2014 omlet open decentralized social networking tool based extensible chat platform collective project research group developed concept livepc subscribers livepc automatically run latest published pc virtual images reboot approach allows computers managed scalably securely 2005 group started company called mokafive transfer technology industry another research project program analysis group developed collection tools improving software security reliability developed first scalable context-sensitive inclusion-based pointer analysis freely available tool called bddbddb allows programmers express context-sensitive analyses simply writing datalog queries tools developed include griffin static dynamic analysis finding security vulnerabilities web applications sql injection static dynamic program query language called pql static memory leak detector called clouseau dynamic buffer overrun detector called cred dynamic error diagnosis tool called diduce previously lam led suif stanford university intermediate format compiler project produced widely used compiler infrastructure known locality optimizations interprocedural parallelization many compiler techniques developed adopted industry research projects included architecture compiler cmu warp machine systolic array vliw processors stanford dash distributed shared memory machine 1998 took sabbatical leave stanford help start tensilica inc. company specializes configurable processor cores lam chaired acm sigplan programming languages design implementation conference 2000 served editorial board acm transactions computer systems numerous program committees conferences languages compilers pldi popl operating systems sosp computer architecture asplos isca lam received following awards honors | [
1361,
623,
5195,
5541,
6275,
2455,
6922,
1243,
1586,
1805
] | Test |
3,817 | 9 | Manifest_expression:manifest expression manifest expression programming language construct compiler analyse deduce values take without execute program information enable compiler optimizations particular loop nest optimization parallelization data dependency analysis expression called manifest computed outer loop counters constants formal definition given control flow loop condition regulated manifest expressions called manifest loop resp condition practical applications manifest expressions also require expression integral affine stepwise affine variables manifest expression compile time computable function depends manifest variable reference defined variable reference single unambiguous definition particularly relevant procedural languages pointer analysis and/or data flow analysis required find expression defines variable value several defining expressions possible e.g variable assigned condition variable reference manifest | [
1361,
4302,
6982
] | Test |
3,818 | 5 | Ucspi-tcp:ucspi-tcp ucspi-tcp public domain unix tcp command-line tool building tcp client-server applications consists super-server tcpserver tcpclient application life qmail dave sill 2 january 2006 appendix b.3 ucspi-tcp acronym unix client-server program interface tcp pronounced ooks-pie tee see pee tcpserver features built-in tcp wrapper-like access control | [
1390,
7637,
3085,
3073
] | Test |
3,819 | 5 | IPv4:ipv4 internet protocol version 4 ipv4 fourth version internet protocol ip one core protocols standards-based internetworking methods internet packet-switched networks ipv4 first version deployed production arpanet 1983 still routes internet traffic today despite ongoing deployment successor protocol ipv6 ipv4 described ietf publication rfc 791 september 1981 replacing earlier definition rfc 760 january 1980 ipv4 uses 32-bit address space limits number unique hosts 4,294,967,296 2 large blocks reserved special networking methods internet protocol protocol defines enables internetworking internet layer internet protocol suite essence forms internet uses logical addressing system performs routing forwarding packets source host next router one hop closer intended destination host another network ipv4 connectionless protocol operates best effort delivery model guarantee delivery assure proper sequencing avoidance duplicate delivery aspects including data integrity addressed upper layer transport protocol transmission control protocol tcp ipv4 uses 32-bit addresses limits address space 2 addresses ipv4 reserves special address blocks private networks ~18 million addresses multicast addresses ~270 million addresses ipv4 addresses may represented notation expressing 32-bit integer value often written dot-decimal notation consists four octets address expressed individually decimal numbers separated periods example quad-dotted ip address 192.0.2.235 represents 32-bit decimal number 3221226219 hexadecimal format 0xc00002eb may also expressed dotted hex format 0xc0.0x00.0x02.0xeb octal byte values 0300.0000.0002.0353 cidr notation combines address routing prefix compact format address followed slash character count consecutive 1 bits routing prefix subnet mask address format common use classful networking practiced example loopback address host 127.0.0.1 commonly written 127.1 given belonged class-a network eight bits network mask 24 bits host number original design ipv4 ip address divided two parts network identifier significant octet address host identifier rest address latter also called rest field structure permitted maximum 256 network identifiers quickly found inadequate overcome limit most-significant address octet redefined 1981 create network classes system later became known classful networking revised system defined five classes classes b c different bit lengths network identification rest address used previously identify host within network different sizes fields different classes network class different capacity addressing hosts addition three classes addressing hosts class defined multicast addressing class e reserved future applications dividing existing classful networks subnets began 1985 publication division made flexible introduction variable-length subnet masks vlsm 1987 1993 based work introduced classless inter-domain routing cidr expressed number bits significant instance /24 class-based scheme dubbed classful contrast cidr designed permit repartitioning address space smaller larger blocks addresses could allocated users hierarchical structure created cidr managed internet assigned numbers authority iana regional internet registries rirs rir maintains publicly searchable whois database provides information ip address assignments internet engineering task force ietf internet assigned numbers authority iana restricted general use various reserved ip addresses special purposes notably addresses used multicast traffic provide addressing space unrestricted uses private networks section begin=ipv4-special-address-blocks/ approximately four billion addresses defined ipv4 18 million addresses three ranges reserved use private networks packets addresses ranges routable public internet ignored public routers therefore private hosts directly communicate public networks require network address translation routing gateway purpose section begin=ipv4-private-networks/ since two private networks e.g. two branch offices directly interoperate via public internet two networks must bridged across internet via virtual private network vpn ip tunnel encapsulates packets including headers containing private addresses protocol layer transmission across public network additionally encapsulated packets may encrypted transmission across public networks secure data rfc 3927 defines special address block 169.254.0.0/16 link-local addressing addresses valid link local network segment point-to-point connection directly connected host uses addresses routable like private addresses addresses source destination packets traversing internet addresses primarily used address autoconfiguration zeroconf host obtain ip address dhcp server internal configuration methods address block reserved standards existed address autoconfiguration microsoft created implementation called automatic private ip addressing apipa deployed millions machines became de facto standard many years later may 2005 ietf defined formal standard rfc 3927 entitled dynamic configuration ipv4 link-local addresses class network 127.0.0.0 classless network 127.0.0.0/8 reserved loopback ip packets whose source addresses belong network never appear outside host modus operandi network expands upon loopback interface networks subnet masks least 24 bits i.e class c networks classful networking networks cidr suffixes /24 /30 255.255.255.0–255.255.255.252 may address ending 0 255 classful addressing prescribed three possible subnet masks class 255.0.0.0 /8 class b 255.255.0.0 /16 class c 255.255.255.0 /24 example subnet 192.168.5.0/255.255.255.0 192.168.5.0/24 identifier 192.168.5.0 commonly used refer entire subnet avoid ambiguity representation address ending octet 0 reserved broadcast address address allows information sent interfaces given subnet rather specific machine generally broadcast address found obtaining bit complement subnet mask performing bitwise operation network identifier words broadcast address last address address range subnet example broadcast address network 192.168.5.0 192.168.5.255 networks size /24 larger broadcast address always ends 255 however mean every address ending 0 255 used host address example /16 subnet 192.168.0.0/255.255.0.0 equivalent address range 192.168.0.0–192.168.255.255 broadcast address 192.168.255.255 one use following addresses hosts even though end 255 192.168.1.255 192.168.2.255 etc also 192.168.0.0 network identifier must assigned interface addresses 192.168.1.0 192.168.2.0 etc. may assigned despite ending 0 past conflict network addresses broadcast addresses arose software used non-standard broadcast addresses zeros instead ones networks smaller /24 broadcast addresses necessarily end 255 example cidr subnet 203.0.113.16/28 broadcast address 203.0.113.31 hosts internet usually known names e.g. www.example.com primarily ip address used routing network interface identification use domain names requires translating called resolving addresses vice versa analogous looking phone number phone book using recipient name translation addresses domain names performed domain name system dns hierarchical distributed naming system allows subdelegation name spaces dns servers since 1980s apparent pool available ipv4 addresses depleted rate initially anticipated original design network address system main market forces accelerated ipv4 address depletion included threat exhaustion motivated introduction number remedial technologies classful networks classless inter-domain routing cidr methods network address translation nat strict usage-based allocation policies provide long-term solution pending address exhaustion ipv6 created 1990s made many addresses available increasing address size 128 bits ipv6 commercial deployment since 2006 primary address pool internet maintained iana exhausted 3 february 2011 last 5 blocks allocated 5 rirs apnic first rir exhaust regional pool 15 april 2011 except small amount address space reserved transition ipv6 allocated much restricted policy accepted standard long term solution use ipv6 increased address size 128 bits providing vastly increased address space also allows improved route aggregation across internet offers large subnetwork allocations minimum 2 host addresses end-users however ipv4-only hosts directly communicate ipv6-only hosts ipv6 alone provide immediate solution ipv4 exhaustion problem migration ipv6 progress completion expected take considerable time ip packet consists header section data section ip packet data checksum footer data section typically link layer encapsulates ip packets frames crc footer detects errors typically end-to-end tcp layer checksum detects errors ipv4 packet header consists 14 fields 13 required 14th field optional aptly named options fields header packed significant byte first big endian diagram discussion significant bits considered come first msb 0 bit numbering significant bit numbered 0 version field actually found four significant bits first byte example internet header length ihl field 4 bits number 32-bit words since ipv4 header may contain variable number options field specifies size header also coincides offset data minimum value field 5 indicates length 5 × 32 bits 160 bits 20 bytes 4-bit field maximum value 15 words 15 × 32 bits 480 bits 60 bytes fragment offset field measured units eight-byte blocks 13 bits long specifies offset particular fragment relative beginning original unfragmented ip datagram first fragment offset zero allows maximum offset 2 – 1 × 8 65,528 bytes would exceed maximum ip packet length 65,535 bytes header length included 65,528 20 65,548 bytes options field often used note value ihl field must include enough extra 32-bit words hold options plus padding needed ensure header contains integer number 32-bit words list options may terminated eol end options list 0x00 option necessary end options would otherwise coincide end header possible options put header follows packets containing options may considered dangerous routers blocked packet payload included checksum contents interpreted based value protocol header field common payload protocols see list ip protocol numbers complete list internet protocol enables traffic networks design accommodates networks diverse physical nature independent underlying transmission technology used link layer networks different hardware usually vary transmission speed also maximum transmission unit mtu one network wants transmit datagrams network smaller mtu may fragment datagrams ipv4 function placed internet layer performed ipv4 routers thus require implementation higher layers function routing ip packets contrast ipv6 next generation internet protocol allow routers perform fragmentation hosts must determine path mtu sending datagrams router receives packet examines destination address determines outgoing interface use interface mtu packet size bigger mtu fragment df bit packet header set 0 router may fragment packet router divides packet fragments max size fragment mtu minus ip header size 20 bytes minimum 60 bytes maximum router puts fragment packet fragment packet following changes example mtu 1,500 bytes header size 20 bytes fragment offsets would multiples formula_1 multiples 0 185 370 555 740 ... possible packet fragmented one router fragments fragmented another router example packet 4,520 bytes including 20 bytes ip header without options fragmented two packets link mtu 2,500 bytes total data size preserved 2480 bytes 2020 bytes 4500 bytes offsets formula_2 formula_3 link mtu 1,500 bytes fragment results two fragments data size preserved 1480 1000 2480 1480 540 2020 also case fragments bit remains 1 fragments came 1 last fragment arrives works usual mf bit set 0 last one course identification field continues value re-fragmented fragments way even fragments re-fragmented receiver knows initially started packet last offset last data size used calculate total data size formula_4 receiver knows packet fragment least one following conditions true receiver identifies matching fragments using foreign local address protocol id identification field receiver reassembles data fragments id using fragment offset fragments flag receiver receives last fragment fragments flag set 0 calculate size original data payload multiplying last fragment offset eight adding last fragment data size given example calculation 495*8 540 4500 bytes receiver fragments reassembled correct sequence according offsets form original datagram ip addresses tied permanent manner hardware identifications indeed network interface multiple ip addresses modern operating systems hosts routers need additional mechanisms identify relationship device interfaces ip addresses order properly deliver ip packet destination host link address resolution protocol arp performs ip-address-to-hardware-address translation ipv4 hardware address also called mac address addition reverse correlation often necessary example ip host booted connected network needs determine ip address unless address preconfigured administrator protocols inverse correlations exist internet protocol suite currently used methods dynamic host configuration protocol dhcp bootstrap protocol bootp infrequently reverse arp | [
7148,
3932,
1068,
709,
4676,
4677,
4311,
7170,
4683,
6432,
1462,
5039,
4693,
6446,
7910,
739,
2219,
3640,
4709,
7916,
5760,
3312,
4716,
3314,
7214,
7217,
2612,
3337,
4014,
1900,
3679,
6503,
7953,
3681,
3683,
6871,
1527,
456,
5456,
6879,
... | Test |
3,820 | 5 | Open_Network_Computing_Remote_Procedure_Call:open network computing remote procedure call open network computing onc remote procedure call rpc remote procedure call system onc originally developed sun microsystems 1980s part network file system project sometimes referred sun rpc onc based calling conventions used unix c programming language serializes data using external data representation xdr also found use encode decode data files accessed one platform onc delivers xdr payload using either udp tcp access rpc services machine provided via port mapper listens queries well-known port number 111 udp tcp onc rpc described rfc 1831 published 1995 rfc 5531 published 2009 current version authentication mechanisms used onc rpc described rfc 2695 rfc 2203 rfc 2623 implementations onc rpc exist unix-like systems microsoft supplies implementation windows microsoft windows services unix product addition number third-party implementation onc rpc windows exist including versions c/c++ java .net see external links 2009 sun relicensed onc rpc code standard 3-clause bsd license reconfirmed oracle corporation 2010 following confusion scope relicensing onc considered lean mean limited appeal generalized rpc system wans heterogeneous environments systems dce corba soap generally used wider role | [
7148,
709,
4676,
4677,
7893,
7170,
4683,
6432,
1462,
4685,
7535,
5039,
6446,
2219,
3640,
4709,
7916,
3312,
418,
6840,
7214,
7217,
2612,
3337,
1900,
6505,
456,
6879,
4759,
2281,
6521,
1923,
106,
2644,
6531,
2650,
1185,
121,
7637,
1554,
2... | Test |
3,821 | 5 | Internet_Protocol:internet protocol internet protocol ip principal communications protocol internet protocol suite relaying datagrams across network boundaries routing function enables internetworking essentially establishes internet ip task delivering packets source host destination host solely based ip addresses packet headers purpose ip defines packet structures encapsulate data delivered also defines addressing methods used label datagram source destination information historically ip connectionless datagram service original transmission control program introduced vint cerf bob kahn 1974 complemented connection-oriented service became basis transmission control protocol tcp internet protocol suite therefore often referred tcp/ip first major version ip internet protocol version 4 ipv4 dominant protocol internet successor internet protocol version 6 ipv6 growing adoption reaching almost 25 internet traffic october 2018 internet protocol responsible addressing host interfaces encapsulating data datagrams including fragmentation reassembly routing datagrams source host interface destination host interface across one ip networks purposes internet protocol defines format packets provides addressing system datagram two components header payload ip header includes source ip address destination ip address metadata needed route deliver datagram payload data transported method nesting data payload packet header called encapsulation ip addressing entails assignment ip addresses associated parameters host interfaces address space divided subnetworks involving designation network prefixes ip routing performed hosts well routers whose main function transport packets across network boundaries routers communicate one another via specially designed routing protocols either interior gateway protocols exterior gateway protocols needed topology network may 1974 institute electrical electronics engineers ieee published paper entitled protocol packet network intercommunication paper authors vint cerf bob kahn described internetworking protocol sharing resources using packet switching among network nodes central control component model transmission control program incorporated connection-oriented links datagram services hosts monolithic transmission control program later divided modular architecture consisting transmission control protocol user datagram protocol transport layer internet protocol internet layer model became known department defense dod internet model internet protocol suite informally tcp/ip ip versions 0 3 experimental versions used 1977 1979 following internet experiment note ien documents describe versions internet protocol prior modern version ipv4 dominant internetworking protocol internet layer use today ipv4 number 4 protocol version number carried every ip datagram ipv4 described 1981 version number 5 used internet stream protocol experimental streaming protocol successor ipv4 ipv6 ipv6 result several years experimentation dialog various protocol models proposed tp/ix pip tuba tcp udp bigger addresses prominent difference version 4 size addresses ipv4 uses 32 bits addressing yielding c. 4.3 billion addresses ipv6 uses 128-bit addresses providing ca 340 undecillion addresses although adoption ipv6 slow united states government systems demonstrated basic infrastructure support ipv6 assignment new protocol ipv6 uncertain due diligence revealed ipv6 yet used previously internet protocols assigned numbers according iana ipv7 ipv8 ipv9 ipv9 aka tcp udp big addresses resurfaced mid-2004 purportedly researched adopted china china disowns april 1 1994 ietf published april fools day joke ipv9 design internet protocol suite adheres end-to-end principle concept adapted cyclades project end-to-end principle network infrastructure considered inherently unreliable single network element transmission medium dynamic terms availability links nodes central monitoring performance measurement facility exists tracks maintains state network benefit reducing network complexity intelligence network purposely located end nodes consequence design internet protocol provides best-effort delivery service characterized unreliable network architectural language connectionless protocol contrast connection-oriented communication various error conditions may occur data corruption packet loss duplication routing dynamic meaning every packet treated independently network maintains state based path prior packets different packets may routed destination via different paths resulting out-of-order delivery receiver error conditions network must detected compensated participating end nodes upper layer protocols internet protocol suite responsible resolving reliability issues example host may buffer network data ensure correct ordering data delivered application ipv4 provides safeguards ensure header ip packet error-free routing node discards packets fail header checksum test although internet control message protocol icmp provides notification errors routing node required notify either end node errors ipv6 contrast operates without header checksums since current link layer technology assumed provide sufficient error detection dynamic nature internet diversity components provide guarantee particular path actually capable suitable performing data transmission requested one technical constraints size data packets allowed given link facilities exist examine maximum transmission unit mtu size local link path mtu discovery used entire intended path destination ipv4 internetworking layer ability automatically fragment original datagram smaller units transmission case ip provides re-ordering fragments delivered order ipv6 network perform fragmentation reassembly per end-to-end principle requires end stations higher-layer protocols avoid exceeding network mtu transmission control protocol tcp example protocol adjusts segment size smaller mtu user datagram protocol udp icmp disregard mtu size thereby forcing ip fragment oversized datagrams design phase arpanet early internet security aspects needs public international network could adequately anticipated consequently many internet protocols exhibited vulnerabilities highlighted network attacks later security assessments 2008 thorough security assessment proposed mitigation problems published ietf pursuing studies | [
5361,
7148,
7876,
1068,
709,
7878,
366,
6419,
3945,
2554,
4676,
4677,
7169,
7170,
4683,
6432,
1462,
5039,
1844,
6815,
6446,
739,
7550,
3638,
2219,
3640,
4709,
4710,
7916,
3982,
4343,
3312,
4716,
3990,
7214,
7217,
2612,
7590,
1142,
3337,
... | Test |
3,822 | 4 | Jim_Christy:jim christy jim christy born 1951 retired government 2013 director futures exploration fx department defense cyber crime center dc3 fx charge establishing strategic relationships us government private agencies academia christy director defense cyber crime institute 2003–2006 director operations defense computer forensics laboratory 2001-2003 christy chief air force office special investigations afosi computer crime investigations unit 1989-1996 founder world largest digital forensics shop notable involvement high priority government computer security christy joined air force 19 later became computer operator pentagon got job computer crime investigator afosi 1986 1986 christy investigated notorious hanover hackers band west german digital delinquents stole information united states defense department computers sold soviet kgb first hacker case afosi agent 1991 christy founded pentagon first digital forensics lab air force 1998 air force lab became department defense computer forensics laboratory supporting investigative agencies department defense 2016 jim christy asked tom colbert join db cooper cold case team christy put together team go undercover online help colbert team prove real identity db cooper identified history channel documentary aired july 2016 | [
7181,
1805
] | Test |
3,823 | 4 | Mobile_device_forensics:mobile device forensics mobile device forensics branch digital forensics relating recovery digital evidence data mobile device forensically sound conditions phrase mobile device usually refers mobile phones however also relate digital device internal memory communication ability including pda devices gps devices tablet computers use mobile phones/devices crime widely recognised years forensic study mobile devices relatively new field dating early 2000s late 1990s proliferation phones particularly smartphones digital devices consumer market caused demand forensic examination devices could met existing computer forensics techniques mobile devices used save several types personal information contacts photos calendars notes sms mms messages smartphones may additionally contain video email web browsing information location information social networking messages contacts growing need mobile forensics due several reasons prominent reasons mobile device forensics particularly challenging number levels evidential technical challenges exist example cell site analysis following use mobile phone usage coverage exact science consequently whilst possible determine roughly cell site zone call made received yet possible say degree certainty mobile phone call emanated specific location e.g residential address result challenges wide variety tools exist extract evidence mobile devices one tool method acquire evidence devices therefore recommended forensic examiners especially wishing qualify expert witnesses court undergo extensive training order understand tool method acquires evidence maintains standards forensic soundness meets legal requirements daubert standard frye standard field study forensic examination mobile devices dates late 1990s early 2000s role mobile phones crime long recognized law enforcement increased availability devices consumer market wider array communication platforms support e.g email web browsing demand forensic examination grew early efforts examine mobile devices used similar techniques first computer forensics investigations analysing phone contents directly via screen photographing important content however proved time-consuming process number mobile devices began increase investigators called efficient means extracting data enterprising mobile forensic examiners sometimes used cell phone pda synchronization software back device data forensic computer imaging sometimes simply performed computer forensics hard drive suspect computer data synchronized however type software could write phone well reading could retrieve deleted data forensic examiners found could retrieve even deleted data using flasher twister boxes tools developed oems flash phone memory debugging updating however flasher boxes invasive change data complicated use developed forensic tools perform neither hash verifications cases audit trails physical forensic examinations therefore better alternatives remained necessary meet demands commercial tools appeared allowed examiners recover phone memory minimal disruption analyse separately time commercial techniques developed recovery deleted data proprietary mobile devices become possible specialist tools moreover commercial tools even automated much extraction process rendering possible even minimally trained first responders—who currently much likely encounter suspects mobile devices possession compared computers—to perform basic extractions triage data preview purposes mobile device forensics best known application law enforcement investigations also useful military intelligence corporate investigations private investigations criminal civil defense electronic discovery mobile device technology advances amount types data found mobile device constantly increasing evidence potentially recovered mobile phone may come several different sources including handset memory sim card attached memory cards sd cards traditionally mobile phone forensics associated recovering sms mms messaging well call logs contact lists phone imei/esn information however newer generations smartphones also include wider varieties information web browsing wireless network settings geolocation information including geotags contained within image metadata e-mail forms rich internet media including important data—such social networking service posts contacts—now retained smartphone 'apps nowadays mostly flash memory consisting nand types used mobile devices external memory devices sim cards sd cards commonly found within gps devices well mobile phones mmc cards cf cards memory stick although technically part mobile device forensics call detail records occasionally text messages wireless carriers often serve back evidence obtained mobile phone seized useful call history and/or text messages deleted phone location-based services turned call detail records cell site tower dumps show phone owner location whether stationary moving i.e. whether phone signal bounced side single tower different sides multiple towers along particular path travel carrier data device data together used corroborate information sources instance video surveillance footage eyewitness accounts determine general location non-geotagged image video taken european union requires member countries retain certain telecommunications data use investigations includes data calls made retrieved location mobile phone determined geographical data must also retained united states however requirement exists standards govern long carriers retain data even must retain example text messages may retained week two call logs may retained anywhere weeks several months reduce risk evidence lost law enforcement agents must submit preservation letter carrier must back search warrant forensics process mobile devices broadly matches branches digital forensics however particular concerns apply generally process broken three main categories seizure acquisition examination/analysis aspects computer forensic process intake validation documentation/reporting archiving still apply seizing mobile devices covered legal considerations digital media mobiles often recovered switched aim seizure preserve evidence device often transported state avoid shutdown would change files addition investigator first responder would risk user lock activation however leaving phone carries another risk device still make network/cellular connection may bring new data overwriting evidence prevent connection mobile devices often transported examined within faraday cage bag even two disadvantages method first renders device unusable touch screen keypad used second device search network connection drain battery quickly devices batteries often recharged investigator risks phone user lock activated therefore network isolation advisable either placing device airplane mode cloning sim card technique also useful device missing sim card entirely second step forensic process acquisition case usually referring retrieval material device compared bit-copy imaging used computer forensics due proprietary nature mobiles often possible acquire data powered mobile device acquisition performed live advanced smartphones using advanced memory management connecting recharger putting faraday cage may good practice mobile device would recognize network disconnection therefore would change status information trigger memory manager write data acquisition tools mobile devices commercial nature consist hardware software component often automated increasing number mobile devices use high-level file systems similar file systems computers methods tools taken hard disk forensics need slight changes fat file system generally used nand memory difference block size used larger 512 bytes hard disks depends used memory type e.g. type 64 128 256 nand memory 16 128 256 512 kilobyte different software tools extract data memory image one could use specialized automated forensic software products generic file viewers hex editor search characteristics file headers advantage hex editor deeper insight memory management working hex editor means lot handwork file system well file header knowledge contrast specialized forensic software simplifies search extracts data may find everything accessdata sleuthkit encase mention forensic software products analyze memory images since tool extracts possible information advisable use two tools examination currently february 2010 software solution get evidences flash memories mobile device data extraction classified according continuum along methods become technical “ forensically sound ” tools become expensive analysis takes longer examiners need training methods even become invasive examiner utilizes user interface investigate content phone memory therefore device used normal examiner taking pictures screen contents method advantage operating system makes unnecessary use specialized tools equipment transform raw data human interpretable information practice method applied cell phones pdas navigation systems disadvantages data visible operating system recovered data available form pictures process time-consuming logical acquisition implies bit-by-bit copy logical storage objects e.g. directories files reside logical storage e.g. file system partition logical acquisition advantage system data structures easier tool extract organize logical extraction acquires information device using original equipment manufacturer application programming interface synchronizing phone contents personal computer logical extraction generally easier work produce large binary blob however skilled forensic examiner able extract far information physical extraction logical extraction usually produce deleted information due normally removed phone file system however cases—particularly platforms built sqlite ios android—the phone may keep database file information overwrite information simply marks deleted available later overwriting cases device allows file system access synchronization interface possible recover deleted information file system extraction useful understanding file structure web browsing history app usage well providing examiner ability perform analysis traditional computer forensic tools physical acquisition implies bit-for-bit copy entire physical store e.g flash memory therefore method similar examination personal computer physical acquisition advantage allowing deleted files data remnants examined physical extraction acquires information device direct access flash memories generally harder achieve device original equipment manufacturer needs secure arbitrary reading memory therefore device may locked certain operator get around security mobile forensics tool vendors often develop boot loaders enabling forensic tool access memory often also bypass user passcodes pattern locks generally physical extraction split two steps dumping phase decoding phase brute force acquisition performed 3rd party passcode brute force tools send series passcodes passwords mobile device time consuming method effective nonetheless technique uses trial error attempt create correct combination password pin authenticate access mobile device despite process taking extensive amount time still one best methods employ forensic professional unable obtain passcode current available software hardware become quite easy break encryption mobile devices password file obtain passcode two manufacturers become public since release iphone5 cellebrite grayshift manufacturers intended law enforcement agencies police departments cellbrite ufed ultimate unit costs 40,000 us dollars grashifts system costs 15,000 brute forcing tools connected device physically send codes ios devices starting 0000 9999 sequence correct code successfully entered code entry successful full access device given data extraction commence early investigations consisted live manual analysis mobile devices examiners photographing writing useful material use evidence without forensic photography equipment fernico zrt edec eclipse project-a-phone disadvantage risking modification device content well leaving many parts proprietary operating system inaccessible recent years number hardware/software tools emerged recover logical physical evidence mobile devices tools consist hardware software portions hardware includes number cables connect mobile device acquisition machine software exists extract evidence occasionally even analyse recently mobile device forensic tools developed field response military units demand fast accurate anti-terrorism intelligence law enforcement demand forensic previewing capabilities crime scene search warrant execution exigent circumstances mobile forensic tools often ruggedized harsh environments e.g battlefield rough treatment e.g dropped submerged water generally impossible one tool capture evidence mobile devices mobile forensic professionals recommend examiners establish entire toolkits consisting mix commercial open source broad support narrow support forensic tools together accessories battery chargers faraday bags signal disruption equipment forth current tools include cellebrite ufed oxygen forensic detective susteen secure view micro systemation xry tools additionally developed address increasing criminal usage phones manufactured chinese chipsets include mediatek mtk spreadtrum mstar tools include cellebrite chinex xry pinpoint open source mobile forensics tools platform-specific geared toward smartphone analysis though originally designed forensics tool bitpim widely used cdma phones well lg vx4400/vx6000 many sanyo sprint cell phones commonly referred chip-off technique within industry last intrusive method get memory image desolder non-volatile memory chip connect memory chip reader method contains potential danger total data destruction possible destroy chip content heat required desoldering invention bga technology possible attach probes pins memory chip recover memory probes bga technique bonds chips directly onto pcb molten solder balls longer possible attach probes desoldering chips done carefully slowly heat destroy chip data chip desoldered pcb baked oven eliminate remaining water prevents so-called popcorn effect remaining water would blow chip package desoldering mainly three methods melt solder hot air infrared light steam-phasing infrared light technology works focused infrared light beam onto specific integrated circuit used small chips hot air steam methods focus much infrared technique desoldering chip re-balling process cleans chip adds new tin balls chip re-balling done two different ways third method makes entire re-balling process unnecessary chip connected adapter y-shaped springs spring-loaded pogo pins y-shaped springs need ball onto pin establish electric connection pogo pins used directly pads chip without balls advantage forensic desoldering device need functional copy without changes original data made disadvantage re-balling devices expensive process costly risks total data loss hence forensic desoldering done experienced laboratories existing standardized interfaces reading data built several mobile devices e.g. get position data gps equipment nmea get deceleration information airbag units mobile devices provide standardized interface exist standard interface mobile devices manufacturers one problem common miniaturizing device parts opens question automatically test functionality quality soldered integrated components problem industry group joint test action group jtag developed test technology called boundary scan despite standardization four tasks jtag device interface used recover memory find correct bits boundary scan register one must know processor memory circuits used connected system bus accessible outside one must find test points jtag interface printed circuit board determine test point used signal jtag port always soldered connectors sometimes necessary open device re-solder access port protocol reading memory must known finally correct voltage must determined prevent damage circuit boundary scan produces complete forensic image volatile non-volatile memory risk data change minimized memory chip n't desoldered generating image slow mobile devices jtag enabled also difficult find test access port mobile devices provide possibility run boot cd connecting network share another device clean tools therefore system commands could way save volatile memory mobile device risk modified system commands must estimated volatile memory really important similar problem arises network connection available secondary memory connected mobile device volatile memory image must saved internal non-volatile memory user data stored likely deleted important data lost system commands cheapest method imply risks data loss every command usage options output must documented commands old modem commands e.g. hayes command set motorola phone commands therefore used device modem support using commands one obtain information operating system deleted data extracted external memory usb flash drive appropriate software e.g. unix command dd needed make bit-level copy furthermore usb flash drives memory protection need special hardware connected computer many usb drives memory cards write-lock switch used prevent data changes making copy usb drive protection switch blocker used mount drive read-only mode exceptional case memory chip desoldered sim memory cards need card reader make copy sim card soundly analyzed possible recover deleted data like contacts text messages android operating system includes dd command blog post android forensic techniques method live image android device using dd command demonstrated flasher tool programming hardware and/or software used program flash device memory e.g. eeprom flash memory tools mainly originate manufacturer service centers debugging repair upgrade services overwrite non-volatile memory depending manufacturer device also read memory make copy originally intended backup memory protected reading e.g. software command destruction fuses read circuit note would prevent writing using memory internally cpu flasher tools easy connect use change data dangerous options make complete copy general exists standard constitutes supported device specific product led situation different vendors define supported device differently situation makes much harder compare products based vendor provided lists supported devices instance device logical extraction using one product produces list calls made device may listed supported vendor another vendor produce much information furthermore different products extract different amounts information different devices leads complex landscape trying overview products general leads situation testing product extensively purchase strongly recommended quite common use least two products complement mobile phone technology evolving rapid pace digital forensics relating mobile devices seems stand still evolving slowly mobile phone forensics catch release cycles mobile phones comprehensive depth framework evaluating mobile forensic toolkits developed data appropriate tools techniques type phone made available timely manner anti-computer forensics difficult small size devices user restricted data accessibility nevertheless developments secure memory hardware security circuits cpu memory chip memory chip read even desoldering | [
1715,
5274,
3517,
6421,
3179,
2195,
5561,
4316,
3700,
3863,
5740,
7825,
5571,
7181,
740,
6020,
1756,
2865,
5150,
4523,
7105,
2054,
768,
5254,
6488,
1237,
8148
] | Test |
3,824 | 7 | Federated_content:federated content federated content digital media content designed self-managing support reporting rights management peer-to-peer p2p network ex audio stored digital rights management drm file format | [
6025
] | Test |
3,825 | 4 | Xetron:xetron xetron corporation northrop grumman corporation subsidiary government contractor developing software communications systems xetron used produce popular xetron spl-60 low noise audio amplifier tunable comb notch filter 9 july 1992 first iboc transmission sent xetron offices cincinnati since company contracted usadr work project 2000 company awarded 2.1 million contract viasat develop mids-lvt radio system 2011 revealed company worked hbgary palantir attribution deanonymizing internet activists anonymous according documents leaked edward snowden sharing hacking techniques intelligence agencies since least 2010 year developed malicious windows software named orca preventing malware detection antivirus software wikileaks vault 7 disclosures 2017 revealed xetron developed tools allowing unauthorized access cisco routers cia well cinnamon − implant cisco devices according documents also developed software control compromised computers via command servers agency march 2017 company name shows nearly 400 leak documents intercept revealed 2017 employees xetron suddenly subjected polygraph unclear whether due active investigation source leaks simply stepped-up security requirement | [
208,
5509
] | Test |
3,826 | 3 | ThinkPad_UltraBay:thinkpad ultrabay ultrabay originally ibm name swappable drive bay thinkpad range laptop computers thinkpad product line sold lenovo concept name stayed furthermore used lenovo ideapad series laptops introduced thinkpad 750 series 1995 technology gone redesigns almost every new generation thinkpad may lead confusion following table gives overview different ultrabay types models occurred drives available note optical drive bay g series r40e series thinkpads ultrabay drives fixed removable however mechanically ultrabay 2000-device without surrounding caddy media side different ultrabays relate form factor drives accept machines accept ultrabay devices 12.5 mm thick whereas others limited devices 9.5 mm thick ideapad y400 y500 laptops ultrabay slot swapped another hard drive another fan another nvidia gt650m gt750m gpu work sli system primary video card increased graphics performance existing orders ultrabay y500 dvd burner built optical drive cancelled early june 2013 starting 2014 lenovo changed design thinkpad bay adapter dropped ultrabay terminology use remained thinkpad w540 product option removable serial ata sata caddy accessory screw driver allowed optical drive replaced second 2.5 inch sata storage device battery expansion caddy bay longer offered earlier hot-swap functionality essentially rendered difficult impossible | [
3009,
2342,
188
] | Train |
3,827 | 4 | Rsync:rsync rsync utility efficiently transferring synchronizing files computer external hard drive across networked computers comparing modification times sizes files commonly found unix-like operating systems rsync algorithm type delta encoding used minimizing network usage zlib may used additional data compression ssh stunnel used security rsync typically used synchronizing files directories two different systems example command codice_1 run rsync use ssh connect codice_2 codice_3 connected invoke remote host rsync two programs determine parts local file need transferred remote file matches local one rsync also operate daemon mode serving receiving files native rsync protocol using rsync // syntax licensed gnu general public license andrew tridgell paul mackerras wrote original rsync first announced 19 june 1996 tridgell discusses design implementation performance rsync chapters 3 5 ph.d. thesis 1999 currently maintained wayne davison flexibility speed scriptability codice_4 become standard linux utility included popular linux distributions ported windows via cygwin grsync sfu freebsd netbsd openbsd macos similar codice_5 codice_6 codice_7 codice_4 requires specification source destination local either may remote generic syntax src file directory list multiple files directories copy dest file directory copy square brackets indicate optional parameters codice_4 synchronize unix clients central unix server using codice_4/codice_11 standard unix accounts used desktop environments example efficiently synchronize files backup copy external hard drive scheduling utility codice_12 carry tasks automated encrypted codice_4-based mirroring multiple hosts central server command line mirror freebsd might look like apache http server supports rsync updating mirrors preferred simplest way mirror putty website current directory use rsync way mimic capabilities time machine macos see also tym make full backup system root directory rsync process operates communicating another rsync process sender receiver startup rsync client connects peer process transfer local file systems mounted host peer created fork setting suitable pipes connection remote host involved rsync starts process handle connection typically secure shell upon connection command issued start rsync process remote host uses connection thus established alternative remote host runs rsync daemon rsync clients connect opening socket tcp port 873 possibly using proxy rsync numerous command line options configuration files specify alternative shells options commands possibly full path port numbers besides using remote shells tunnelling used remote ports appear local server rsync daemon runs possibilities allow adjusting security levels state art naive rsync daemon enough local network default rsync determines files differ sending receiving systems checking modification time size file time size different systems transfers file sending receiving system requires reading file directory information quick miss unusual modifications change neither rsync performs slower comprehensive check invoked codice_14 forces full checksum comparison every file present systems barring rare checksum collisions avoids risk missing changed files cost reading every file present systems rsync utility uses algorithm invented australian computer programmer andrew tridgell efficiently transmitting structure file across communications link receiving computer already similar identical version structure recipient splits copy file chunks computes two checksums chunk md5 hash weaker easier compute 'rolling checksum sends checksums sender sender quickly computes rolling checksum chunk version file differ must sent 're sender uses computationally expensive md5 hash verify chunks sender sends recipient parts file match along information merge blocks recipient version makes copies identical small probability differences chunks sender recipient detected thus remain uncorrected 128 bits md5 plus 32 bits rolling checksum probability order rolling checksum used rsync based mark adler adler-32 checksum used zlib based fletcher checksum sender recipient versions file many sections common utility needs transfer relatively little data synchronize files typical data compression algorithms used files similar uncompressed may different compressed thus entire file need transferred compression programs gzip provide special rsyncable mode allows files efficiently rsynced ensuring local changes uncompressed file yield local changes compressed file rsync supports key features aid significantly data transfers backup include compression decompression data block block using zlib support protocols ssh stunnel utility uses rsync algorithm generate delta files difference file file b like utility diff different delta format delta file applied file turning file b similar patch utility rdiff works well binary files rdiff-backup maintained since 2009 maintains backup mirror file directory either locally remotely network another server rdiff-backup stores incremental rdiff deltas backup possible recreate backup point librsync library used rdiff independent implementation rsync algorithm use rsync network protocol share code rsync application used dropbox rdiff-backup duplicity utilities acrosync library independent cross-platform implementation rsync network protocol unlike librsync wire-compatible rsync protocol version 29 30 released reciprocal public license used commercial rsync software acrosync duplicity variation rdiff-backup allows backups without cooperation storage server simple storage services like amazon s3 works generating hashes block advance encrypting storing server retrieves incremental backup rest data also stored encrypted security purposes macos 10.5 later special codice_15 codice_16 switch allows retaining much hfs file metadata syncing two machines supporting feature achieved transmitting resource fork along data fork zsync rsync-like tool optimized many downloads per file version zsync used linux distributions ubuntu distributing fast changing beta iso image files zsync uses http protocol .zsync files pre-calculated rolling hash minimize server load yet permit diff transfer network optimization rclone open-source tool inspired rsync focuses exclusively cloud storage system providers supports 10 different providers provides rsync-like interface backup local data providers | [
1710,
7148,
1812,
4386,
6606,
2281,
1537,
2379,
639,
6711,
7168,
20,
4594,
2390,
7258,
4415,
5571,
2749,
5660,
660,
3383,
3878,
3720,
7838,
2043,
6381,
3219,
2682,
3734,
8029,
7214,
7494,
7765,
3915,
2528,
6860,
7046,
8039,
2261,
2082,
... | Test |
3,828 | 5 | Proxy_ARP:proxy arp proxy arp technique proxy device given network answers arp queries ip address network proxy aware location traffic destination offers mac address ostensibly final destination traffic directed proxy address typically routed proxy intended destination via another interface via tunnel process results node responding mac address arp request different ip address proxying purposes sometimes referred publishing typical uses proxy arp arp manipulation techniques basis protocols providing redundancy broadcast networks e.g. ethernet notably common address redundancy protocol virtual router redundancy protocol disadvantage proxy arp include scalability arp resolution proxy required every device routed manner reliability fallback mechanism present masquerading confusing environments proxy arp create dos attacks networks misconfigured example misconfigured router proxy arp ability receive packets destined hosts gives mac address response arp requests hosts/routers may ability correctly forward packets final destination thus blackholing traffic proxy arp hide device misconfigurations missing incorrect default gateway openbsd implements proxy arp | [
5058,
456,
4295,
5634,
6879,
4208,
414,
7427,
7569,
5181,
4014,
3797
] | Test |
3,829 | 4 | Kasiski_examination:kasiski examination cryptanalysis kasiski examination also referred kasiski test kasiski method method attacking polyalphabetic substitution ciphers vigenère cipher first published friedrich kasiski 1863 seems independently discovered charles babbage early 1846 polyalphabetic substitution ciphers substitution alphabets chosen use keyword kasiski examination allows cryptanalyst deduce length keyword length keyword discovered cryptanalyst lines ciphertext n columns n length keyword column treated ciphertext monoalphabetic substitution cipher column attacked frequency analysis similarly rotor stream cipher machine used method may allow deduction length individual rotors kasiski examination involves looking strings characters repeated ciphertext strings three characters long examination successful distances consecutive occurrences strings likely multiples length keyword thus finding repeated strings narrows possible lengths keyword since take greatest common divisor distances reason test works repeated string occurs plaintext distance corresponding characters multiple keyword length keyword letters line way occurrences string example consider plaintext crypto repeated string distance occurrences 20 characters line plaintext 6-character keyword abcdef 6 divide 20 first instance crypto lines abcdef second instance lines cdefab two instances encrypt different ciphertexts kasiski examination reveal nothing however 5-character keyword abcde 5 divides 20 occurrences crypto line abcdea two instances encrypt ciphertext kasiski examination effective difficulty using kasiski examination lies finding repeated strings hard task perform manually computers make much easier however care still required since repeated strings may coincidence repeat distances misleading cryptanalyst rule coincidences find correct length course monoalphabetic ciphertexts result must cryptanalyzed kasiski actually used superimposition solve vigenère cipher started finding key length took multiple copies message laid one-above-another one shifted left length key kasiski observed column made letters encrypted single alphabet method equivalent one described perhaps easier picture modern attacks polyalphabetic ciphers essentially identical described one improvement coincidence counting instead looking repeating groups modern analyst would take two copies message lay one another modern analysts use computers description illustrates principle computer algorithms implement generalized method br br | [
6049,
6702,
1353
] | Test |
3,830 | 8 | Cozi:cozi cozi website mobile app intended help families stay organized features include allowing multiple family members manage schedules one account well organize update shopping to-do lists website founded robbie cape jan miksovsky two left microsoft company first product cozi central released september 25 2006 included family calendar shopping lists family messaging photo collage screensaver company based seattle washington cozi freemium version paid version called cozi gold cozi gold additional features include cozi contacts birthday tracker reminders mobile month view change notifications cozi acquired time inc. 2014 meredith corporation acquired time 2018 cozi moved parents network division june 5 2011 cozi set guinness world record longest line ducks row line stretched one mile made 17,782 rubber ducks | [] | Test |
3,831 | 2 | Simplenote:simplenote simplenote note-taking application markdown support addition cross-platform apps accessed via web browsers simplenote externally accessible api allowing clients written macos dashboard widget dashnote nvpy cross-platform simplenote client amongst others addition macos program notational velocity windows utility resophnotes also sync simplenote simplenote originally developed simperium 2008 simplenote premium introduced november 23 2009 removed ads added extra features syncing simplenote dropbox automattic acquired simperium simplenote january 24 2013 september automattic released android version later relaunched simplenote suspending premium service removing ads users may 2016 official client linux simplenote released automattic open sourced code ios android macos simplenote apps august 2016 making client apps open source application reviewed mac life reviewed book lifehacker guide working smarter faster better covered book business iphone ipad app development | [
4759,
5571,
84,
7848,
578
] | Test |
3,832 | 9 | OBJ_(programming_language):obj programming language obj programming language family introduced joseph goguen 1976 family declarative ultra high-level languages features abstract types generic modules subsorts subtypes multiple inheritance pattern-matching modulo equations e-strategies user control laziness module expressions combining modules theories views describing module interfaces massively parallel rrm rewrite rule machine members obj family languages include cafeobj eqlog foops kumo maude obj3 obj3 version obj based order-sorted rewriting obj3 agent-oriented runs kyoto common lisp akcl | [
4573,
4332,
6016
] | Validation |
3,833 | 4 | Open_Threat_Exchange:open threat exchange open threat exchange otx world largest crowd-sourced computer-security platform 80,000 participants 140 countries share 19 million potential threats daily free use founded 2012 otx created run alienvault cybersecurity developer commercial open source solutions manage cyber attacks collaborative threat exchange created partly counterweight criminal hackers successfully working together sharing information viruses malware cyber attacks otx cloud-hosted information sharing covers wide range issues related security including viruses malware intrusion detection firewalls automated tools cleanse aggregate validate publish data shared participants data validated otx platform stripped information identifying participating contributor 2015 otx 2.0 added social network enables members share discuss research security threats including via real-time threat feed users share ip addresses websites attacks originated look specific threats see anyone already left information users subscribe “ pulse ” analysis specific threat including data ioc impact targeted software pulses exported stix json openloc maec csv used automatically update local security products users up-vote comment specific pulses assist others identifying important threats otx combines social contributions automated machine-to-machine tools integrates major security products firewalls perimeter security hardware platform read security report .pdf .csv .json open formats relevant information extracted automatically assisting professionals readily analyze data specific otx components include dashboard details top malicious ips around world check status specific ips notifications organization ip domain found hacker forum blacklist listed otx feature review log files determine communication known malicious ips 2016 alienvault released new version otx allowing participants create private communities discussions groups share information threats within group feature intended facilitate in-depth discussions specific threats particular industries different regions world threat data groups also distributed subscribers managed service providers using otx otx big data platform integrates natural language processing machine learning facilitate collection correlation data many sources including third-party threat feeds websites external api local agents 2015 alienvault partnered intel coordinate real-time threat information otx similar deal hewlett packard announced year facebook ibm threat exchange platforms facebook threatexchange beta requires application invitation join ibm launched ibm-force exchange april 2015 | [
7585,
1805
] | Test |
3,834 | 5 | Guard_interval:guard interval telecommunications guard intervals used ensure distinct transmissions interfere one another otherwise cause overlapping transmissions transmissions may belong different users tdma user ofdm purpose guard interval introduce immunity propagation delays echoes reflections digital data normally sensitive ofdm beginning symbol preceded guard interval long echoes fall within interval affect receiver ability safely decode actual data data interpreted outside guard interval tdma user timeslot ends guard period avoid data loss reduce interference following user caused propagation delay thus user timeslot protected interference preceding user guard interval guard period end preceding user timeslot common misconception tdma timeslot begins guard interval however itu technical specifications gsm 05.05 clearly define guard period end timeslot thus providing protection data loss within timeslot protection interference following timeslot longer guard periods allow distant echoes tolerated however longer guard intervals reduce channel efficiency example dvb-t four guard intervals available given fractions symbol period hence 1/32 gives lowest protection highest data rate 1/4 results best protection lowest data rate radio waves propagate speed light per 1000 meter 5 μs/mile ideally guard interval longer delay spread channel standard symbol guard interval used 802.11 ofdm increase data rate 802.11n added optional support guard interval provides 11 increase data rate shorter guard interval results higher packet error rate delay spread channel exceed guard interval and/or timing synchronization transmitter receiver precise scheme could developed work whether short guard interval would benefit particular link reduce complexity manufacturers typically implement short guard interval final rate adaptation step device running highest data rate | [
2062,
5693,
7824
] | Test |
3,835 | 2 | Safe_mode:safe mode safe mode diagnostic mode computer operating system os also refer mode operation application software windows safe mode allows essential system programs services start boot safe mode intended help fix problems within operating system also widely used removing rogue security software microsoft windows macos android linux distributions ubuntu linux mint examples contemporary operating systems implement safe mode called safe boot macos well complex electronic devices safe mode operating system reduced functionality task isolating problems easier since many non-core components disabled sound installation boot safe mode typically major problem disk corruption installation poorly-configured software prevents operating system successfully booting normal operating mode though varies operating system safe mode typically loads essential executable modules disables devices except necessary display information accept input also take form parallel miniature operating system configuration information shared normal operating system example microsoft windows user also choose boot recovery console small text-based troubleshooting mode kept separate main operating system also accessed booting install cd various safe mode options run dysfunctional os features video drivers audio networking disabled safe mode typically provides access utility diagnostic programs user troubleshoot preventing operating system working normally safe mode intended maintenance functionality provides minimal access features microsoft windows safe mode 7/vista /xp /2000/me/98/95 accessed pressing f8 key operating system boots also multi-boot environment multiple versions windows installed side side f8 key pressed os selector prompt get safe mode however windows 8 released 2012 traditional press-f8-for-safe-mode-options ui convention longer works either shift-f8 special gui-based workaround necessary equivalently minimal setting unix-like operating systems single-user mode daemons x window system started root user log emergency repairs maintenance including resetting users passwords machine without need know old one macos holding shift key powering activates safe boot background maintenance features besides mode selection runs file system repair mac os 10.4 disables fonts /system/library/fonts moves trash font caches normally stored /library/caches/com.apple.ats/ uid uid user id number 501 disables startup items login items reset administrative account password unlike windows safe mode networking disabled default requires using safe mode networking enabled macos safe boot always includes networking classic mac os versions 6 7 8 9 similar mode unix root achieved holding shift key booting starts system without extensions application software sometimes offers safe mode well php interpreter prior version 5.4 safe mode offers stricter security measures glasgow haskell compiler version 7.2 offers safe haskell mode restricting usage functions unsafeperformio mozilla firefox safe mode allows user remove extensions may preventing browser loading internet explorer run add-ons mode protected mode cydia mobilesubstrate also safe mode allows user uninstall tweaks extensions may crash springboard | [
4759,
5571,
578,
5401,
7835,
405,
6029,
140,
4183,
1418,
6773,
6778,
1992,
6158
] | Test |
3,836 | 3 | Tagged_architecture:tagged architecture computer science tagged architecture particular type computer architecture every word memory constitutes tagged union divided number bits data tag section describes type data interpreted reference type object points notable examples american tagged architectures lisp machines tagged pointer support hardware opcode level burroughs large systems data-driven tagged descriptor-based architecture non-commercial rice computer burroughs lisp machine examples high-level language computer architectures tagging used support types high-level language hardware level addition original xerox smalltalk implementation used least-significant bit 16-bit word tag bit clear hardware would accept aligned memory address set treated shifted 15-bit integer current intel documentation mentions lower bits memory address might similarly used interpreter-based systems soviet union elbrus series supercomputers pioneered use tagged architectures 1973 | [
4729,
7256,
1180,
6922,
263,
971,
1265,
4942
] | Test |
3,837 | 4 | CloudBerry_Lab:cloudberry lab cloudberry lab software company develops online backup file management solutions integrated 20 cloud storage providers cloudberry backup cloudberry explorer offered personal use “ freemium ” model products including advanced cloudberry backup solutions sold per license free trials available cloudberry managed backup backup-as-a-service solution managed service providers businesses provides centralized management monitoring backup restore desktops servers cloudberry managed backup cloudberry backup support windows windows server macos linux operating systems work microsoft sql server exchange applications vmware microsoft hyper-v virtualization solutions cloudberry lab incorporated 2011 initially releasing cloudberry explorer amazon s3 followed versions microsoft azure google cloud openstack swift 2011 company released cloudberry backup followed releases support windows server imaging microsoft sql server exchange applications bare metal restore windows server desktop operating systems cloudberry backup added support linux mac operating systems 2015 followed editions synology qnap 2012 company introduced cloudberry managed backup saas backup disaster recovery solution managed service providers businesses require centralized administration management larger environments 2018 company introduced cloudberry remote assistant free remote control desktop sharing solution designed secure access control remote desktops servers internet cloudberry lab develops software help managed service providers businesses consumers manage backup disaster recovery perform cloud file management synchronization company main products include cloudberry managed backup cloudberry backup cloudberry explorer cloudberry drive cloudberry backup managed backup solutions automate backup recovery files folders system images cloudberry backup standalone solution managed backup subscription saas offering managed service providers businesses adds centralized administration management reporting products designed backup cloud support backups local disk network shares latest product versions back data 20 different cloud storage providers including amazon s3 amazon glacier azure blob storage google cloud storage backblaze b2 wasabi openstack s3 compatible others cloudberry backup managed backup employ storage-agnostic model customers license software cloudberry contract directly cloud providers choice backup storage customers get choose cloud storage provider offers features pricing best suits needs customers change storage vendors time without change backup vendors way cloudberry lab support customers varying size need products provide end-to-end encryption data cloudberry explorer windows solution free paid licensing options managing files local storage remote online storage versions available amazon s3 microsoft azure google cloud openstack cloudberry drive solution mounts cloud storage windows desktop server product allows customers work cloud storage though local storage cloudberry remote assistant solution remote control desktop sharing software currently beta available microsoft windows free remote assistant encrypts connections includes text voice chat cloudberry lab amazon advanced technology partner company also established partnerships microsoft azure google cloud platform backblaze b2 wasabi autotask connectwise others | [
5516,
2961,
6731,
7838,
4594,
2390,
4295,
7821,
2566,
4759,
330,
7715,
578,
2687
] | Test |
3,838 | 2 | BSD/OS:bsd/os bsd/os originally called bsd/386 sometimes known bsdi discontinued proprietary version bsd operating system developed berkeley software design inc. bsdi bsd/os reputation reliability server roles renowned unix programmer author w. richard stevens used personal web server reason bsdi formed 1991 members computer systems research group csrg uc berkeley develop sell proprietary version bsd unix pc compatible systems intel 386 later processors made use work previously done bill jolitz port bsd pc platform bsd/386 1.0 released march 1993 company sold licenses support taking advantage terms bsd license permitted use bsd software proprietary systems long credit given author company turn contributed code resources development non-proprietary bsd operating systems meantime jolitz left bsdi independently released open source bsd pcs called 386bsd one advantages bsdi system complete thorough manpage documentation entire system including complete syntax argument explanations examples file usage authors cross-references commands manpage documentation far poorer modern linux systems bsd/386 licenses including source code priced 995 much less unix system v source licenses fact highlighted advertisements part settlement usl v. bsdi bsdi substituted code written university 4.4 bsd-lite release disputed code os effective release 2.0 time release 386 designation become dated bsd/386 renamed bsd/os later releases bsd/os also supported sun sparc-based systems marketing bsd/os became increasingly focused internet server applications however increasingly tight market unix-compatible software late 1990s early 2000s hurt sales bsd/os one end market lacked certification open group bear unix trademark sales force hardware support larger unix vendors simultaneously lacked negligible acquisition cost open source bsds linux bsd/os acquired wind river systems april 2001 wind river discontinued sales bsd/os end 2003 support terminated end 2004 | [
5268,
4751,
1341,
7514,
4478,
3503,
6794,
4670,
6085,
900,
1824,
3856,
2467,
2737,
908,
2294,
481,
3457,
1279,
2300,
5571,
2118,
6360,
1193,
578,
738,
6367,
6369,
2583,
6205,
6743,
6918,
4257,
414,
594,
4441,
6477,
5956,
6842,
424,
2512... | Validation |
3,839 | 1 | National_Location_Code:national location code national location code nlc four-digit number allocated every railway station ticket issuing point great britain use ticketing system british railway network used issue tickets accounting purposes subset nlcs created british rail based four main digits plus two supplementary digits nlcs introduced method accounting attributing costs revenue railway assets quotation taken 14th edition january 1987 national location code listing book published british railways board widespread use computers within british railways advent national computer systems dealing payroll compilation stores recording accounting wagon control traffic data revenue expenditure accounting market traffic surveys etc. need standard location code became increasingly important order meet need asked november 1966 revise update publication known terminals mileage gazetteer code time opportunity taken include sidings yards depots offices administrative centres etc. 'railway activity ... file developed based six-digit code known british railways national location code first published 1 january 1968 six-digit code split two parts first four digits identify location asset cost centre final two give information specific asset base location including stations ticket-issuing locations 00 first four digits two-digit combinations signify types asset first four digits indicating base location relate ticket issuing first four digits used examples 1960s 1970s various ticket issuing systems use quite localised simple numerical code structures covering limited number stations relevant area universal coding system identify stations nlc introduced nlcs began appear certain types ticket southern region mainstay ncr21 almost immediately introduction fully computerised intis intermediate ticket issuing system early 1980s four-digit version nlc became fully established intis tickets partly pre-printed station name printed ticket nlc next machine printed codes origin destination stations top line ticket intis superseded aptis 1986 latter became universal ticket office system next 15–20 years last aptis machines removed march 2007 aptis tickets nlc station issue printed second line irrespective whether journey started example ticket issued brighton nlc 5268 journey gatwick airport london victoria 5268 nlc covered station associated accounting activities everything tickets issued self-service ticket machines ticket office staff wage slips stations site needed treated separate entities allocated different codes london waterloo east serving south eastern division destinations began late 1980s considered separate station main london waterloo nlc 5598 self-service machines got code 5158 revenue could apportioned correctly relevant division privatisation correct train operating company toc railway network privatised mid-1990s need additional nlcs created 1998 brighton supplied two wall-mounted touch-screen machines cubic transportation systems inc. issuing limited range tickets credit card code 8882 given subsequently erstwhile quickfare machines replaced six fastticket touch-screen machines manufactured shere ltd. bore nlc 8882 well whereas ticket office machines smart terminal supplied shere used station original code 5268 location railway revenue expenditure attributed coded 1960s later came existence subsequently codes allocated location fixed mobile issue tickets location ticket issued journey national rail station examples british railways created 1948 split six operating regions became five 1960s eastern london midland western southern scottish distribution nlcs broadly followed pattern southern region divided three divisions south eastern central south western based three pre-grouping companies nlcs allocated approximately following boundaries follows since privatisation need new codes grown much largely stopped allocated geographical basis especially additional codes given station new station given geographically correct code usually station planned time gap left appropriate section codes example lea green nlc 2339 proposed many years name marshalls cross opened 2000 sometimes chandler ford station reopened original code closed coleshill parkway birmingham nuneaton opened 2007 allocated 9882 relates geographically scotland quirks always existed however | [
3839
] | Test |
3,840 | 1 | Object_Data_Management_Group:object data management group object data management group odmg conceived summer 1991 breakfast object database vendors organized rick cattell sun microsystems 1998 odmg changed name object database management group reflect expansion efforts include specifications object database object-relational mapping products primary goal odmg put forward set specifications allowed developer write portable applications object database object-relational mapping products order data schema programming language bindings data manipulation query languages needed portable 1993 2001 odmg published five revisions specification last revision odmg version 3.0 group disbanded odmg 3.0 published book form 2000 2001 major object database object-relational mapping vendors claimed conformance odmg java language binding compliance components specification mixed 2001 odmg java language binding submitted java community process basis java data objects specification odmg member companies decided concentrate efforts java data objects specification result odmg disbanded 2001 2004 object management group omg granted right revise odmg 3.0 specification omg specification copyright holder morgan kaufmann publishers february 2006 omg announced formation object database technology working group odbt wg plans work 4th generation object database standard | [
479,
6594,
2054,
684
] | Test |
3,841 | 9 | Benoît_Minisini:benoît minisini benoît minisini french programmer best known programming gambas graphical development environment starting programming twelve became interested writing languages compilers assemblers interpreters interest respect basic programming language caused create gambas inspired visual basic benoît said intended gambas best features visual basic without numerous bugs flaws sees program language benoît part-time software job studied école pour l'informatique et les techniques avancées currently lives paris france | [] | Test |
3,842 | 4 | @stake:stake atstake inc. computer security professional services company cambridge massachusetts united states founded 1999 battery ventures tom crotty sunil dhaliwal scott tobin ted julian initial core team technologists included dan geer chief technical officer east coast security team cambridge technology partners including dave goldsmith january 2000 stake acquired l0pht heavy industries known many hacker employees bringing mudge vice president research development domain name atstake.com july 2000 stake acquired cerberus information security limited london england david mark litchfield robert stein-rostaing launchpad europe middle east africa stake subsequently acquired symantec 2004 addition dan geer mudge stake employed many famous security experts including dildog window snyder dave aitel katie moussouris david litchfield mark kriegsman mike schiffman chris wysopal cris thomas joe grand september 2000 stake recruiter contacted mark abene recruit security consultant position recruiter apparently unaware past felony conviction since stake policy hiring convicted hackers mark informed company representative stake could hire saying ran background check caused debate regarding role convicted hackers working security business stake primarily consulting company also offered information security training stake academy created number software security tools symantec later stopped selling lc5 new customers citing us government export regulations discontinued support december 2006 january 2009 l0phtcrack acquired original authors symantec l0phtcrack 6 announced source boston conference march 11 2009 technology underlying smartrisk analyzer extended eventually brought market symantec spinoff veracode symantec announced acquisition stake september 16 2004 completed transaction october 9 2004 several members stake left form computer security company isec partners 2004 former stake academy instructors rob cheyne paul hinkle later formed information security training company safelight security advisors 2007 remaining portion stake consulting group continues operate security advisory services team within symantec security business practice | [
6412,
4663,
5552,
6411,
4398,
3699,
4231,
4138,
1091,
7597,
7738,
1756,
2488,
3211,
409,
1666,
5856,
3486,
4645,
3592,
1332,
6157,
1805,
6962
] | Test |
3,843 | 3 | Close_(system_call):close system call close system call system call used close file descriptor kernel file systems program terminates access file filesystem using close system call flushes file buffers updates file metadata may include end-of-file indicator data de-allocates resources associated file including file descriptor updates system wide table files use programming languages maintain data structure files opened runtime library may close program terminates practice known resource acquisition initialization raii operating systems invoke codice_1 files held program terminates operating systems invoke codice_1 syscall part operating system recovery result system failure close call standardized posix specification function returns zero indicate file closed successfully error occurs value -1 returned errno appropriately set errors occur include | [
3256,
2182,
7532,
3623,
3626,
5744,
2942,
6117,
4341,
5762,
412,
415,
3666,
2970,
6857,
7956,
5460,
7242,
1924,
6892,
4771,
1176,
1933,
7260,
5829,
1208,
4435,
4438,
3404,
1596,
165,
7312,
3751,
5884,
1991,
2361,
890,
3084,
6264,
6984,
... | Test |
3,844 | 9 | HTML_scripting:html scripting w3c html standard includes support client-side scripting defines locally executable scripts may used web page particular client-side application web browser may support several script languages script code may executed document loads later time script code written directly html document inside events occur different elements web-page script code may associated event element writing code html attribute name attribute must supported intrinsic event element example onload script executed whenever event occurs element scripts mostly javascript html intrinsic event model consist following events browsers support additional event attributes outside standard netscape navigator supported feature called javascript entities script macros script code could included html attribute values using syntax similar character entity references example code codice_1 calls javascript prompt function ask user wide image html 4.01 specification reserves syntax future support script macros html attributes incorporated later standards supported current browser polyfill entities.js created order allow script macros browsers natively support feature | [
2451,
84,
6221,
87
] | Validation |
3,845 | 4 | Distributed_firewall:distributed firewall firewall system group systems router proxy gateway implements set security rules enforce access control two networks protect inside network outside network may hardware device software program running secure host computer either case must least two network interfaces one network intended protect one network exposed firewall sits junction point gateway two networks usually private network public network internet conventional firewalls rely notions restricted topology control entry points function precisely rely assumption everyone one side entry point—the firewall—is trusted anyone side least potentially enemy distributed firewalls host-resident security software applications protect enterprise network servers end-user machines unwanted intrusion offer advantage filtering traffic internet internal network enables prevent hacking attacks originate internet internal network important costly destructive attacks still originate within organization like personal firewalls except offer several important advantages like central management logging cases access-control granularity features necessary implement corporate security policies larger enterprises policies defined pushed enterprise-wide basis feature distributed firewalls centralized management ability populate servers end-users machines configure push consistent security policies helps maximize limited resources ability gather reports maintain updates centrally makes distributed security practical distributed firewalls help two ways remote end-user machines secured secondly secure critical servers network preventing intrusion malicious code jailing code letting protected server used launch pad expanded attacks usually deployed behind traditional firewall provide second layer defense work enabling essential traffic machine protect prohibiting types traffic prevent unwanted intrusions whereas perimeter firewall must take generalist common denominator approach protecting servers network distributed firewalls act specialists problems conventional firewalls lead distributed firewalls follows due increasing line speeds computation intensive protocols firewall must support firewalls tend become congestion points gap processing networking speeds likely increase least foreseeable future computers hence firewalls getting faster combination complex protocols tremendous increase amount data must passed firewall likely continue pace moore law exist protocols new protocols designed difficult process firewall latter lacks certain knowledge readily available endpoints ftp realaudio two protocols although exist application-level proxies handle protocols solutions viewed architecturally “ unclean ” cases invasive likewise dependence network topology pf enforce policy traffic traverses thus traffic exchanged among nodes protected network controlled gives attacker already insider somehow bypass firewall complete freedom act worse yet become trivial anyone establish new unauthorized entry point network without administrator knowledge consent various forms tunnels wireless dial-up access methods allow individuals establish backdoor access bypasses security mechanisms provided traditional firewalls firewalls general intended guard misbehavior insiders tension internal needs connectivity difficulty satisfying needs centralized firewall ipsec protocol suite recently standardized ietf provides network-layer security services packet confidentiality authentication data integrity replay protection automated key management artifact firewall deployment internal traffic seen firewall filtered result internal users mount attacks users networks without firewall able intervene large networks today tend large number entry points performance failover reasons furthermore many sites employ internal firewalls provide form compartmentalization makes administration particularly difficult practical point view regard policy consistency since unified comprehensive management mechanism exists end-to-end encryption also threat firewalls prevents looking packet fields necessary filtering allowing end-to-end encryption firewall implies considerable trust users behalf administrators finally increasing need finer-grained access control standard firewalls readily accommodate without greatly increasing complexity processing requirements distributed firewalls host-resident security software applications protect enterprise network critical endpoints unwanted intrusion servers end-user machines concept security policy defined centrally enforcement policy takes place endpoint hosts routers etc. usually deployed behind traditional firewall provide second layer protection since hosts inside trusted equally machines subverted used launch attacks hosts especially trusted hosts protocols like rlogin thus faithful effort industry security organizations move towards system aspects desktop firewall centralized management like distributed firewalls distributed host-resident firewalls prevent hacking pc use entry point enterprise network compromised pc make whole network vulnerable attacks hacker penetrate enterprise network uncontested steal corrupt corporate assets distributed firewalls often kernel-mode applications sit bottom osi stack operating system filter traffic regardless origin—the internet internal network treat internet internal network unfriendly guard individual machine way perimeter firewall guards overall network distributed firewalls rest three notions basic idea simple compiler translates policy language internal format system management software distributes policy file hosts protected firewall incoming packets accepted rejected inside host according policy cryptographically-verified identity sender one often used term case network security particular distributed firewall policy essential know policies “ security policy ” defines security rules system without defined security policy way know access allowed disallowed simple example firewall distribution policy different varies implementation either directly pushed end systems pulled necessary hosts booting pings central management server check whether central management server active registers central management server requests policies implement central management server provides host security policies example license server security clearance server asked certain communication permitted conventional firewall could lacks important knowledge context request end systems may know things like files involved security levels might information could carried network protocol adding complexity push technique employed policies updated central management side network administrator hosts updated immediately push technology ensures hosts always updated policies time policy language defines inbound outbound connections component network policy domain allowed affect policy decisions layer network rejecting passing certain packets enforcing policies application layer central management component distributed firewalls makes practical secure enterprise-wide servers desktops laptops workstations central management provides greater control efficiency decreases maintenance costs managing global security installations feature addresses need maximize network security resources enabling policies centrally configured deployed monitored updated single workstation distributed firewalls scanned understand current operating policy determine updating required policy distribution scheme guarantee integrity policy transfer distribution policy different varies implementation either directly pushed end systems pulled necessary security policies transmitted central management server implemented host host end part distributed firewall provide administrative control network administrator control implementation policies host allows traffic based security rules implemented distributed firewalls strengths weaknesses compared conventional firewalls far biggest difference course reliance topology network topology permit reliance traditional firewall techniques little choice interesting question two types compare closed single-entry network either work reason choose one types firewalls excellent rejecting connection requests inappropriate services conventional firewalls drop requests border distributed firewalls host interesting question noticed host attempting connect today packets typically discarded notification distributed firewall may choose discard packet assumption legal peers know use ipsec alternatively may instead send back response requesting connection authenticated turn gives notice existence host firewalls built pure packet filters reject stealth scans well one technique example uses fragmented packets pass unexamined port numbers n't present first fragment distributed firewall reassemble packet reject balance sort threat two firewall types least comparable network addresses favored concept using cryptographic mechanisms likely prevents attacks based forged source addresses assumption trusted repository containing necessary credentials subject compromise problems solved conventional firewalls corresponding rules discarding packets network perimeter prevent attacks originating inside network policy domain spread use distributed object-oriented systems like corba client-side use java weaknesses mail readers like wide variety threats residing application intermediate level communication traffic firewall mechanisms perimeter come useful inspecting incoming e-mails known malicious code fingerprints confronted complex thus resource-consuming situations making decisions code like java using framework distributed firewall especially considering policy language allows policy decision application level circumvent problems condition contents communication packets interpreted semantically policy verifying mechanisms stateful inspection packets shows easily adapted requirements allows finer granularity decision making furthermore malicious code contents may completely disguised screening unit network perimeter given use virtual private networks enciphered communication traffic general completely disable policy enforcement conventional firewalls many firewalls detect attempted intrusions functionality provided distributed firewall individual host notice probes forward central location processing correlation former problem hard many hosts already log attempts one make good case detection done event collection problematic especially times poor connectivity central site also risk coordinated attacks effect causing denial-of-service attack central machine given natural view conventional firewall network topology consisting inside outside problems arise one members policy network domain compromised perimeter firewalls enforce policies distinct networks show option circumvent problems arise situation discussed given distributed firewalls independence topological constraints supports enforcement policies whether hosts members outsiders overall policy domain base decisions authenticating mechanisms inherent characteristics networks layout moreover compromise endpoint either legitimate user intruder weaken overall network way leads directly compromise machines given fact deployment virtual private networks prevents sniffing communication traffic attacked machine involved side end-point nearly problems arise conventional firewalls assuming machine taken adversary must lead conclusion policy enforcement mechanisms self may broken installation backdoors machine done quite easily security mechanisms flawed lack perimeter firewall trusted entity anymore might prevent arbitrary traffic entering leaving compromised host additionally use tools like ssh like allow tunneling applications communication prevented without proper knowledge decrypting credentials moreover given fact case attack shown successfully verifying mechanisms self may trusted anymore first glance biggest weakness distributed firewalls greater susceptibility lack cooperation users happens someone changes policy files distributed firewalls reduce threat actual attacks insiders simply making easier set smaller groups users thus one restrict access file server users need rather letting anyone inside company pound also worth expending effort prevent casual subversion policies policies stored simple ascii file user wishing example play game could easily turn protection requiring would-be uncooperative user go trouble probably worthwhile even mechanism theoretically insufficient example policies could digitally signed verified frequently-changing key awkward-to-replace location stringent protections policy enforcement incorporated tamper-resistant network card | [
1592,
1691,
74,
651,
6879,
3338,
4014,
5933,
3486,
2644
] | Test |
3,846 | 4 | Paramount_Defenses:paramount defenses paramount defenses privately held american cyber security company develops cyber security solutions help organizations secure foundational microsoft active directory deployments company founded 2006 sanjay tandon former microsoft program manager active directory security company headquartered newport beach california led founder operates guidance advisory board amongst others includes karen worstell former microsoft chief information security officer ciso donald codling former unit chief liaison federal bureau investigation fbi cyber division department homeland security national cyber security division company also known paramount brief executive summary declassified 2016 describes serious cyber security risk potentially impacts foundational cyber security 85 organizations worldwide paramount defenses founded 2006 2013 united states patent office awarded founder cyber security patent governing accurate determination effective access information systems | [
644
] | Test |
3,847 | 7 | Fabric_computing:fabric computing fabric computing unified computing involves constructing computing fabric consisting interconnected nodes look like weave fabric viewed/envisaged collectively distance usually phrase refers consolidated high-performance computing system consisting loosely coupled storage networking parallel processing functions linked high bandwidth interconnects 10 gigabit ethernet infiniband term also used describe platforms azure services platform grid computing general common theme interconnected nodes appear single logical unit fundamental components fabrics nodes processor memory and/or peripherals links functional connections nodes term fabric also used association storage area networks switched fabric networking introduction compute resources provides complete unified computing system terms used describe fabrics include unified fabric data center fabric unified data center fabric ian foster director computation institute argonne national laboratory university chicago suggested 2007 grid computing 'fabrics poised become underpinning next-generation enterprise architectures used much greater part many organizations term use since mid late 1990s growth cloud computing cisco evangelism unified data center fabrics followed unified computing evolutionary data center architecture whereby blade servers integrated unified supporting network storage infrastructure starting march 2009 renewed interest technology companies offering unified fabric computing systems include liquid computing corporation egenera mixed reactions cisco architecture particularly rivals claim proprietary systems lock vendors analysts claim ambitious new direction big risk companies ibm hp previously partnered cisco data center projects accounting 2–3bn cisco annual revenue competing 2007 wombat financial software launched wombat data fabric first commercial off-the-shelf software platform providing high performance low-latency rdma-based messaging across infiniband switch main advantages fabrics massive concurrent processing combined huge tightly coupled address space makes possible solve huge computing problems presented delivery cloud computing services scalable able dynamically reconfigured challenges include non-linearly degrading performance curve whereby adding resources linearly increase performance common problem parallel computing maintaining security | [
5012,
5371,
3948,
7529,
5737,
5042,
1481,
5055,
2226,
1867,
2961,
2248,
6148,
441,
5447,
4047,
5483,
5487,
6198,
1568,
1570,
7666,
515,
5521,
3747,
1237,
6236,
534,
7314,
1252,
3764,
1254,
4847,
4479,
895,
4864,
7358,
216,
4154,
5939,
4... | Validation |
3,848 | 2 | Android_Froyo:android froyo android froyo sixth version android codename android mobile operating system developed google spanning versions 2.2 2.2.3 versions longer supported unveiled may 20 2010 google i/o 2010 conference one prominent changes froyo release usb tethering wi-fi hotspot functionality changes include support android cloud device messaging c2dm service enabling push notifications additional application speed improvements implemented jit compilation displayed within applications top-of-the-screen banners new features introduced froyo include following | [
3933,
5372,
6427,
7897,
1095,
740,
4340,
42,
3309,
3310,
7924,
2591,
5771,
5775,
6153,
7956,
5455,
6176,
5473,
474,
6183,
822,
831,
5141,
136,
2317,
2673,
6209,
1582,
2683,
855,
6937,
168,
6232,
6950,
2712,
4116,
5195,
2003,
195,
6978,
... | Test |
3,849 | 3 | Itanium:itanium itanium family 64-bit intel microprocessors implement intel itanium architecture formerly called ia-64 intel markets processors enterprise servers high-performance computing systems itanium architecture originated hewlett-packard hp later jointly developed hp intel itanium-based systems produced hp hp integrity servers line several manufacturers 2008 itanium fourth-most deployed microprocessor architecture enterprise-class systems behind x86-64 power isa sparc february 2017 intel released current generation test customers may began shipping volume last processor itanium family intel officially announced end life product discontinuance itanium cpu family january 30th 2019 1989 hp determined reduced instruction set computing risc architectures approaching processing limit one instruction per cycle hp researchers investigated new architecture later named explicitly parallel instruction computing epic allows processor execute multiple instructions clock cycle epic implements form long instruction word vliw architecture single instruction word contains multiple instructions epic compiler determines advance instructions executed time microprocessor simply executes instructions need elaborate mechanisms determine instructions execute parallel goal approach twofold enable deeper inspection code compile time identify additional opportunities parallel execution simplify processor design reduce energy consumption eliminating need runtime scheduling circuitry hp believed longer cost-effective individual enterprise systems companies develop proprietary microprocessors partnered intel 1994 develop ia-64 architecture derived epic intel willing undertake large development effort ia-64 expectation resulting microprocessor would used majority enterprise systems manufacturers hp intel initiated large joint development effort goal delivering first product merced 1998 development intel hp industry analysts predicted ia-64 would dominate servers workstations high-end desktops eventually supplant risc complex instruction set computing cisc architectures general-purpose applications compaq silicon graphics decided abandon development alpha mips architectures respectively favor migrating ia-64 several groups ported operating systems architecture including microsoft windows openvms linux hp-ux solaris tru64 unix monterey/64 latter three canceled reaching market 1997 apparent ia-64 architecture compiler much difficult implement originally thought delivery timeframe merced began slipping intel announced official name processor itanium october 4 1999 within hours name itanic coined usenet newsgroup reference rms titanic unsinkable ocean liner sank maiden voyage 1912 itanic since often used register others imply multibillion-dollar investment itanium—and early hype associated it—would followed relatively quick demise time itanium released june 2001 performance superior competing risc cisc processors itanium competed low-end primarily four-cpu smaller systems servers based x86 processors high-end ibm power sun microsystems sparc processors intel repositioned itanium focus high-end business hpc computing attempting duplicate x86 successful horizontal market i.e. single architecture multiple systems vendors success initial processor version limited replacing pa-risc hp systems alpha compaq systems mips sgi systems though ibm also delivered supercomputer based processor power sparc remained strong 32-bit x86 architecture continued grow enterprise space building economies scale fueled enormous installed base thousand systems using original merced itanium processor sold due relatively poor performance high cost limited software availability recognizing lack software could serious problem future intel made thousands early systems available independent software vendors isvs stimulate development hp intel brought next-generation itanium 2 processor market year later itanium 2 processor released 2002 marketed enterprise servers rather whole gamut high-end computing first itanium 2 code-named mckinley jointly developed hp intel relieved many performance problems original itanium processor mostly caused inefficient memory subsystem mckinley contains 221 million transistors 25 million logic measured 19.5 mm 21.6 mm 421 mm fabricated 180 nm bulk cmos process six layers aluminium metallization 2003 amd released opteron cpu implements 64-bit architecture called amd64 opteron gained rapid acceptance enterprise server space provided easy upgrade x86 influence microsoft intel responded implementing amd x86-64 instruction set architecture instead ia-64 xeon microprocessors 2004 resulting new industry-wide de facto standard intel released new itanium 2 family member codenamed madison 2003 madison used 130 nm process basis new itanium processors montecito released june 2006 march 2005 intel announced working new itanium processor codenamed tukwila released 2007 tukwila would four processor cores would replace itanium bus new common system interface would also used new xeon processor later year intel revised tukwila delivery date late 2008 november 2005 major itanium server manufacturers joined intel number software vendors form itanium solutions alliance promote architecture accelerate software porting alliance announced members would invest 10 billion itanium solutions end decade 2006 intel delivered montecito marketed itanium 2 9000 series dual-core processor roughly doubled performance decreased energy consumption 20 percent intel released itanium 2 9100 series codenamed montvale november 2007 may 2009 schedule tukwila follow-on revised release oems planned first quarter 2010 itanium 9300 series processor codenamed tukwila released february 8 2010 greater performance memory capacity device uses 65 nm process includes two four cores 24 mb on-die caches hyper-threading technology integrated memory controllers implements double-device data correction helps fix memory errors tukwila also implements intel quickpath interconnect qpi replace itanium bus-based architecture peak interprocessor bandwidth 96 gb/s peak memory bandwidth 34 gb/s quickpath processor integrated memory controllers interfaces memory directly using qpi interfaces directly connect processors i/o hubs quickpath also used intel processors using nehalem microarchitecture possibly enabled tukwila nehalem use chipsets tukwila incorporates four memory controllers supports multiple ddr3 dimms via separate memory controller much like nehalem-based xeon processor code-named beckton itanium 9500 series processor codenamed poulson follow-on processor tukwila released november 8 2012 according intel skips 45 nm process technology uses 32 nm process technology features eight cores 12-wide issue architecture multithreading enhancements new instructions take advantage parallelism especially virtualization poulson l3 cache size 32 mb l2 cache size 6 mb 512 kb 256 kb per core die size 544 mm² less predecessor tukwila 698.75 mm² isscc 2011 intel presented paper called 32nm 3.1 billion transistor 12-wide-issue itanium processor mission critical servers given intel history disclosing details itanium microprocessors isscc paper likely referred poulson analyst david kanter speculated poulson would use new microarchitecture advanced form multithreading uses two threads improve performance single threaded multithreaded workloads information also released hot chips conference information presented improvements multithreading resiliency improvements intel instruction replay ras new instructions thread priority integer instruction cache prefetching data access hints intel product change notification pcn 111456-01 lists four models itanium 9500 series cpu later removed revised document parts later listed intel material declaration data sheets mdds database intel later posted itanium 9500 reference manual models following 2012 hewlett-packard co. v. oracle corp. support lawsuit court documents unsealed santa clara county court judge revealed 2008 hewlett-packard paid intel around 440 million keep producing updating itanium microprocessors 2009 2014 2010 two companies signed another 250 million deal obliged intel continue making itanium cpus hp machines 2017 terms agreements hp pay chips gets intel intel launches tukwila poulson kittson kittson+ chips bid gradually boost performance platform rumors successor poulson code named kittson began circulate 2012–2013 first associated forthcoming 22 nm process shrink later revised face declining itanium sales less-ambitious 32 nm node april 2015 intel although yet confirmed formal specifications confirm continued work project meanwhile aggressively multicore xeon e7 platform displaced itanium-based solutions intel roadmap july 2016 hp spin-off hewlett packard enterprise hpe announced computer world kittson would released mid-2017 february 2017 intel reported shipping kittson test customers plans ship volume later year intel officially launched itanium 9700 series processor family may 11 2017 notably kittson microarchitecture improvements poulson higher clock speeds intel announced 9700 series last itanium chips produced models comparison xeon family server processors itanium never high-volume product intel intel release production numbers one industry analyst estimated production rate 200,000 processors per year 2007 according gartner inc. total number itanium servers processors sold vendors 2007 55,000 unclear whether clustered servers counted single server compares 417,000 risc servers spread across risc vendors 8.4 million x86 servers idc reports total 184,000 itanium-based systems sold 2001 2007 combined power/sparc/itanium systems market idc reports power captured 42 revenue sparc captured 32 itanium-based system revenue reached 26 second quarter 2008 according idc analyst 2007 hp accounted perhaps 80 itanium systems revenue according gartner 2008 hp accounted 95 itanium sales hp itanium system sales annual rate 4.4bn end 2008 declined 3.5bn end 2009 compared 35 decline unix system revenue sun 11 drop ibm x86-64 server revenue increase 14 period december 2012 idc released research report stating itanium server shipments would remain flat 2016 annual shipment 26,000 systems decline 50 compared shipments 2008 2006 hp manufactured least 80 itanium systems sold 7,200 first quarter 2006 bulk systems sold enterprise servers machines large-scale technical computing average selling price per system excess us 200,000 typical system uses eight itanium processors 2012 manufacturers offered itanium systems including hp bull nec inspur huawei addition intel offered chassis could used system integrators build itanium systems 2015 hp supplied itanium-based systems hp split late 2015 itanium systems branded integrity handled hewlett-packard enterprise hpe recent major update 2017 integrity i6 hp-ux 11i v3 update 16 hpe also supports operating systems including windows server 2008 r2 linux openvms nonstop itanium affected spectre meltdown itanium bus interfaces rest system via chipset enterprise server manufacturers differentiate systems designing developing chipsets interface processor memory interconnections peripheral controllers chipset heart system-level architecture system design development chipset costs tens millions dollars represents major commitment use itanium ibm created chipset 2003 intel 2002 neither developed chipsets support newer technologies ddr2 pci express tukwila moved away fsb chipsets supporting technologies manufactured itanium server vendors hp fujitsu sgi nec hitachi tukwila itanium processor model designed share common chipset intel xeon processor ex intel xeon processor designed four processor larger servers goal streamline system development reduce costs server oems many develop itanium- xeon-based servers however 2013 goal pushed back evaluated future implementation opportunities itanium supported i.e windows version longer bought following operating systems microsoft announced windows server 2008 r2 would last version windows server support itanium support started xp would also discontinue development itanium versions visual studio sql server likewise red hat enterprise linux 5 first released march 2007 last itanium edition red hat enterprise linux debian longer supports itanium officially last release official support debian 7 wheezy covered long term support lts unofficial support newer debian still available limited form via debian ports last available kernel wheezy-backports linux 3.14.0 released march 30 2014 possible manually update latest 3.14.x version recent kernel versions like 4.17.17 september 2018 addition canonical ltd. chose support itanium ubuntu 10.04 lts released april 2010 discontinued hp supporting certifying linux itanium 9300 tukwila servers late september 2012 nec announced return ia-64 previous noah line proprietary mainframe processors produced quad-core variant 40 nm called noah-6 hp sells virtualization technology itanium called integrity virtual machines allow software run itanium intel supported development compilers optimized platform especially suite compilers starting november 2010 introduction new product suites intel itanium compilers longer bundled intel x86 compilers single product intel offers itanium tools intel x86 tools including compilers independently different product bundles gcc open64 microsoft visual studio 2005 later also able produce machine code itanium according itanium solutions alliance 13,000 applications available itanium-based systems early 2008 though sun contested itanium application counts past isa also supported gelato itanium hpc user group developer community ported supported open-source software itanium emulation technique allows computer execute binary code compiled different type computer ibm acquisition quicktransit 2009 application binary software irix/mips solaris/sparc could run via type emulation called dynamic binary translation linux/itanium similarly hp implemented method execute pa-risc/hp-ux itanium/hp-ux via emulation simplify migration pa-risc customers radically different itanium instruction set itanium processors also run mainframe environment gcos groupe bull several x86 operating systems via instruction set simulators itanium aimed enterprise server high-performance computing hpc markets enterprise- hpc-focused processor lines include oracle fujitsu sparc processors ibm power microprocessors measured quantity sold itanium serious competition comes x86-64 processors including intel xeon line amd opteron line since 2009 servers shipped x86-64 processors 2005 itanium systems accounted 14 hpc systems revenue percentage declined industry shifted x86-64 clusters application october 2008 gartner report tukwila processor stated ... future roadmap itanium looks strong risc peer like power sparc itanium-based computer first appeared list top500 supercomputers november 2001 best position ever achieved itanium 2 based system list 2 achieved june 2004 thunder lawrence livermore national laboratory entered list rmax 19.94 teraflops november 2004 columbia entered list 2 51.8 teraflops least one itanium-based computer top 10 june 2007 peak number itanium-based machines list occurred november 2004 list 84 systems 16.8 june 2012 dropped one system 0.2 itanium system remained list november 2012 itanium processors show progression capability merced proof concept mckinley dramatically improved memory hierarchy allowed itanium become reasonably competitive madison shift 130 nm process allowed enough cache space overcome major performance bottlenecks montecito 90 nm process allowed dual-core implementation major improvement performance per watt montvale added three new features core-level lockstep demand-based switching front-side bus frequency 667 mhz first released 2001 itanium performance disappointing compared better-established risc cisc processors emulation run existing x86 applications operating systems particularly poor one benchmark 2001 reporting equivalent best 100 mhz pentium mode 1.1 ghz pentiums market time itanium failed make significant inroads ia-32 risc suffered following arrival x86-64 systems offered greater compatibility older x86 applications 2009 article history processor — itanium killed computer industry — journalist john c. dvorak reported continues one great fiascos last 50 years tech columnist ashlee vance commented delays underperformance turned product joke chip industry interview donald knuth said itanium approach ... supposed terrific—until turned wished-for compilers basically impossible write red hat microsoft announced plans drop itanium support operating systems due lack market interest however linux distributions gentoo debian remain available itanium march 22 2011 oracle corporation announced would longer develop new products hp-ux itanium although would continue provide support existing products following announcement hp sued oracle breach contract arguing oracle violated conditions imposed settlement oracle hiring former hp ceo mark hurd co-ceo requiring vendor support itanium software time hp discontinues sales itanium-based servers breach harmed business 2012 court ruled favor hp ordered oracle resume support itanium june 2016 hewlett-packard enterprise corporate successor hp server business awarded 3 billion damages lawsuit former intel official reported itanium business become profitable intel late 2009 2009 chip almost entirely deployed servers made hp 95 itanium server market share making main operating system itanium hp-ux march 22 2011 intel reaffirmed commitment itanium multiple generations chips development schedule although itanium attain limited success niche market high-end computing intel originally hoped would find broader acceptance replacement original x86 architecture amd chose different direction designing less radical x86-64 64-bit extension existing x86 architecture microsoft supported forcing intel introduce extensions x86-based processors designs run existing 32-bit applications native hardware speed offering support 64-bit memory addressing enhancements new applications architecture become predominant 64-bit architecture desktop portable market although itanium-based workstations initially introduced companies sgi longer available 1989 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2009 2010 2011 2012 2013 2014 2017 2019 | [
5012,
6079,
6793,
3942,
1447,
5371,
3948,
7527,
7529,
4314,
5378,
5379,
5735,
5737,
5738,
1841,
2567,
4694,
5042,
7554,
7189,
1481,
5055,
1112,
2226,
1867,
1494,
766,
1882,
4362,
7213,
1134,
2248,
3333,
6148,
6152,
441,
2977,
4017,
2266,
... | Test |
3,850 | 8 | Google_Analytics:google analytics google analytics web analytics service offered google tracks reports website traffic currently platform inside google marketing platform brand google launched service november 2005 acquiring developer urchin google analytics widely used web analytics service web google analytics provides sdk allows gathering usage data ios android app known google analytics mobile apps google analytics used track website activity users session duration pages per session bounce rate etc along information source traffic integrated google ads users review online campaigns tracking landing page quality conversions goals goals might include sales lead generation viewing specific page downloading particular file google analytics approach show high-level dashboard-type data casual user in-depth data report set google analytics analysis identify poorly performing pages techniques funnel visualization visitors came referrers long stayed website geographical position also provides advanced features including custom visitor segmentation google analytics e-commerce reporting track sales activity performance e-commerce reports shows site transactions revenue many commerce-related metrics september 29 2011 google analytics launched real time analytics enabling user insight visitors currently site user 100 site profiles profile generally corresponds one website limited sites traffic fewer 5 million pageviews per month roughly 2 pageviews per second unless site linked google ads campaign google analytics includes google website optimizer rebranded google analytics content experiments google analytics cohort analysis helps understanding behaviour component groups users apart user population beneficial marketers analysts successful implementation marketing strategy google acquired urchin software corp. april 2005 google service developed urchin demand system also brings ideas adaptive path whose product measure map acquired used redesign google analytics 2006 google continued sell standalone installable urchin webanalytics software network value-added resellers discontinuation march 28 2012 google-branded version rolled november 2005 anyone wished sign however due extremely high demand service new sign-ups suspended week later capacity added system google began using lottery-type invitation-code model august 2006 google sending batches invitation codes server availability permitted since mid-august 2006 service fully available users – whether use google advertising newer version google analytics tracking code known asynchronous tracking code google claims significantly sensitive accurate able track even short activities website previous version delayed page loading performance reasons generally placed codice_1 body close html tag new code placed codice_2 html head tags triggered runs parallel page loading april 2011 google announced availability new version google analytics featuring multiple dashboards custom report options new interface design version later updated features real-time analytics goal flow charts october 2012 another new version google analytics announced called 'universal analytics key differences previous versions cross-platform tracking flexible tracking code collect data device introduction custom dimensions custom metrics march 2016 google released google analytics 360 software suite provides analytics return investment marketing indicators google analytics 360 includes five main products analytics tag manager optimize data studio surveys attribution audience center october 2017 new version google analytics announced called global site tag stated purpose unify tagging system simplify implementation june 2018 google introduced google marketing platform online advertisement analytics brand consists two former brands google doubleclick digital marketing google analytics 360 google analytics implemented page tags case called google analytics tracking code snippet javascript code website owner adds every page website tracking code runs client browser client browses page javascript enabled browser collects visitor data sends google data collection server part request web beacon tracking code loads larger javascript file google web server sets variables user account number larger file currently known ga.js typically 18 kb date file size unknown however recent size 40kbytes may 2018 c dir ga.js /s command pc shows following file sizes 2009 2018 2009/10/07 23,536 ga.js 2014/05/27 40,155 ga.js 2014/10/10 40,924 ga.js 2015/09/13 41,100 ga.js 2017/08/06 43,082 ga.js 2018/04/08 46,275 ga.js file usually loaded however due browser caching assuming caching enabled browser downloads ga.js start visit furthermore websites implement google analytics ga.js code use master file google browser previously visited website running google analytics already file cached machine addition transmitting information google server tracking code sets first party cookie cookies enabled browser visitor computer cookie stores anonymous information called clientid launch universal analytics several cookies storing information whether visitor site new returning visitor timestamp current visit referrer site campaign directed visitor page e.g. search engine keywords banner email visitor arrived site clicking link tagged utm parameters urchin traffic monitor tag values passed database addition google analytics mobile package allows google analytics applied mobile websites mobile package contains server-side tracking codes use php javaserver pages asp.net perl server-side language however many ad filtering programs extensions firefox adblock noscript mobile phone app disconnect mobile block google analytics tracking code prevents traffic users tracked leads holes collected data also privacy networks like tor mask user actual location present inaccurate geographical data small fraction users javascript-enabled/capable browsers turn feature limitations mainly ad filtering program allow significant amount visitor avoid tracker sometimes majority one potential impact data accuracy comes users deleting blocking google analytics cookies without cookies set google analytics collect data individual web user block delete cookies resulting data loss visits google analytics users website owners encourage users disable cookies example making visitors comfortable using site posting privacy policy limitations affect majority web analytics tools use page tags usually javascript programs embedded web pages collect visitor data store cookies visitor computer transmit remote database pretending load tiny graphic beacon another limitation google analytics large websites use sampling generation many reports reduce load servers provide users relatively quick response query google analytics limits reports 500,000 randomly sampled sessions profile level calculations margins error indicated visits metric margins error provided metrics google analytics reports small segments data margin error large several online discussions impact google analytics site performance however google introduced asynchronous javascript code december 2009 reduce risk slowing loading pages tagged ga.js script due ubiquity google analytics raises privacy concerns whenever someone visits website uses google analytics google tracks visit via users ip address order determine user approximate geographic location meet german legal requirements google analytics anonymize ip address google also released browser plugin turns data page visit sent google however browser extension available mobile browsers since plug-in produced distributed google met much discussion criticism furthermore realisation google scripts tracking user behaviours spawned production multiple often open-source browser plug-ins reject tracking cookies plug-ins allow users block google analytics similar sites tracking activities however partially new european privacy laws modern browsers allow users reject tracking cookies though flash cookies separate problem anecdotally reported errors occur behind proxy servers multiple firewalls changing timestamps registering invalid searches webmasters seek mitigate google analytics specific privacy issues employ number alternatives backends hosted machines discontinuation example product urchin webanalytics software google january 20 2015 associated press reported healthcare.gov providing access enrollees personal data private companies specialized advertising mentioning google analytics specifically google offers free google analytics iq lessons google analytics certification test free help center faq google groups forum official google analytics product support new product features announced google analytics blog enterprise support provided google analytics certified partners google academy ads google analytics api used third parties build custom applications reporting tools many applications exist one built run ios apple devices featured apple app store third party products also provide google analytics-based tracking management api core reporting api mcf reporting api real time reporting api subject limits quotas google analytics widely used website statistics service may 2008 pingdom released survey stating 161 500 32 biggest sites globally according alexa rank using google analytics later piece market share analysis claimed google analytics used around 49.95 top 1,000,000 websites ranked 2010 alexa 2012 use around 55 10,000 popular websites august 2013 google analytics used 66.2 10,000 popular websites ordered popularity reported builtwith | [
2902,
5372,
6427,
2569,
2570,
2577,
3641,
750,
4714,
3309,
7924,
2591,
5775,
6153,
5455,
4762,
7967,
6176,
5476,
831,
5141,
136,
2317,
2673,
7285,
2683,
855,
6937,
518,
168,
6950,
5534,
2712,
4111,
4116,
6978,
3092,
561,
7346,
201,
3460... | Test |
3,851 | 2 | OS-tan:os-tan os- tan internet meme originated within japanese futaba channel os- tan moe anthropomorphism/personification several operating systems various amateur japanese artists os- tan typically depicted women os- tan representative microsoft windows operating systems usually depicted sisters varying ages -tan element term hypocoristic suffix japanese though initially appearing fan work os- tan proved popular enough microsoft branches singapore taiwan used os- tan concept basis ad campaigns internet explorer microsoft silverlight respectively concept os- tan reported begun personification common perception windows released 2000 microsoft 9x counterpart windows 2000 unstable prone frequent crashes discussions futaba channel likened stereotype fickle troublesome girl personification expanded me- tan created followed characters one early works predominantly feature os- tan interactive flash animation showing possible intro imaginary anime show known trouble windows fansub eventually created partly responsible spread os- tan english language imageboards os- tan original concept pre-dated toy imac girl featured series desktops released august 1998 march 1999 ohzora publishing produced one book based os- tan characters titled includes illustrations 25 contributors also includes 95- tan me- tan xp- tan figures titled os girl 95 os girl os girl xp respectively include molded space 2k- tan named os girl 2k me- tan 2k- tan xp- tan designed guhico stranger workshop 95- tan designed fujisaki shiro h.b.company parthenon production limited company commercialized pink company os- tan products malino deja vu artworks produced document shared folder trilogy sold digital format japanese version windows 7 ultimate dsp edition includes unofficial nanami madobe mascot inspired microsoft taiwan launch official mascot microsoft silverlight hikaru followed giving hikaru sisters lei aoi yu special package japanese windows 7 ultimate dsp edition called touch mouse artist edition touch mouse limited edition artist series came animated tutorial windows theme custom sounds three desktop backgrounds featuring madobe nanami 2009 ubuntu-based comic titled ubunchu serialized kantan ubuntu spinoff weekly ascii magazine authored hiroshi seo english version translated fumihito yoshida hajime mizuno martin owens arturo silva anton ekblad japanese suffix mispronunciation informal intimate diminutive honorific suffix person used friends family pets case mispronunciation used intentionally achieve contrived cute charming effect commonly associated use young children also sometimes added names non-mascot characters personifications whole commonly simply called mascots mascot characters -tan suffix means nothing outside role honorific implications cuteness normal suffixes including -san -chan -kun also used name os- tan depending character speaker preference suffix may omitted entirely name windows 10 mascot officially introduced tōko touko madobe 31 july 2015 confirmed character official facebook page name homonym one readings japanese word 'ten name chosen fans online poll according fictional profile origins madobe family set 100 years future likes online gaming supporting others personal traits excellent student expanding knowledge technology manager often worries since ’ bit spontaneous also enjoys cheering people working hard best part-time job akibano custom computer company rookie level back story rather unusual os- tan japanese windows 8.1 pro dsp edition madobe family version windows navi+ techno-alliance corp. limited 1000 units version windows 8.1 pro 32/64-bit edition three types madobe family picture password wallpapers madobe character voices nanami yū ai claudia madobe family complete edition windows theme pack previously unpublished madobe family designs final pasocom data hikkoshi 9+ licence key skype three-month free trial historical windows logo stickers xp vista 7 8 editions include memorial pack version without voice theme pack stickers 6191 units 64-bit windows memorial pack version sculpt mobile mouse nanami decor 810 units editions available preorder 2013-10-04 release date 2013-10-18 part market launch facebook draw 8 followers took place follower count reaches 80001 total twitter follower count yū ai reach 8001 winners receive yū- ai-themed prizes additional types windows 8.1 pro dsp edition madobe family theme packs also sold ark towerhill zoa corporation tsukumo project white dospara buy unit.com big camera sofmap pc one versions include two types wallpapers christmas new year theme pack system voices japanese windows 8 pro dsp editions released madobe yū yuu madobe ai editions windows navi+ techno-alliance corp. versions 4,000 units per character thus 8,000 total include microsoft wedge touch mouse windows 8 logo character-specific windows theme three theme pack wallpapers event sounds respective character voice picture password images addition limited akihabara editions 444 units per character 888 total sold tokyo akihabara shopping district include madobe ai/yū edition microsoft wedge touch mouse alternate character-specific event sound samples theme pack alternate wallpaper respective character nipponbashi versions 500 units per character sold nipponbashi osaka include microsoft wedge touch mouse ai yū decal three theme pack wall papers two common one character-specific yū ai event sounds nipponbashi packages include different art 32/64-bit version availability depends retailer asuka nishi voices short-haired yū nao tamura voices long-haired ai windows 8 edition unitcom available first 2,888 copies included notepad t-shirt two-way mouse pad pocket media case smart phone stand cleaning two-way pc cleaner yū ai badges freeze blanket extended fictional madobe family tree detailed yū older sister parents eiichi netsu 根津 family shii madobe family yū ai said birthdate 18 november 1996 windows ce release date age 15 height 152 cm conflicts back-story materials suggesting ai younger sister masatakap electrocutica produced windows 8 music video titled window featuring madobe characters nanami yū silhouette claudia video presented opening microsoft keynote second day windows developer days japan 2012 2013 windows navi+ techno-alliance corp. also created separate twitter accounts ai yū respectively two theme songs yū ai – mir8cle days donna mirai demo unveiled 15 june 2013 sold cd bundled windows 8 pro dsp edition sold twinbox akihabara akiba pc reported first 7777 copies japanese windows 7 ultimate dsp editions include special wallpaper sound sets character called voiced nana mizuki character designed wakaba premium set includes windows 7 theme featuring 3 nanami wallpapers 19 event sound sets cd 5 extra nanami sounds regular dsp edition includes digest windows 7 theme including nanami wallpaper event sound set preorder users also download extra nanami wallpaper 6 event sound sets makes first os- tan marketed company producing operating system addition character also got twitter account initial sales event windows 7 dsp edition official profile character also revealed shows madobe nanami born 1992-04-06 release date windows 3.1 17 years age time release lives chiyoda tokyo nanami among extended family 16 members elder brother named goichi 吾一 elder sister named mutsumi むつみ mother named mikaho 美佳穗 madobe 窓辺 family father named kyuuachi 究八 shirato 白戸 family nanami cousin claudia madobe クロード 蔵人 later appeared microsoft cloud girl comic strip windows vista distinguishing characteristic usually horn-shaped pigtails variants four pigtails heterochromatic eyes silver white hair appears frequent although light blue black also seen common costume design white red sailor fuku stockings since release details vista interface look changed slightly black maid outfit emerging popularity matches new default vista color scheme well circular windows logo hair clip identical new start menu button vista also seems finalized version hair colour similar vista wallpapers range light blue yellow green also wears type long coat covers left right sides transparent imitate aero glass effect xp- tan dark-haired girl ribbons hair xp hair ornament typically worn left side windows xp criticized bloating system pretty without useful xp- tan commonly depicted wearing tight clothing big breasts additionally reference memory usage windows xp often seen eating holding empty rice bowl labeled memory variants include version xp home known homeko green hair wears short ponytail two large xp-shaped hairclips cover ears well less common variation representing windows xp media center edition outfits worn two main variants based loading lines windows splash screen startup although variants exist common operating system represented windows 2000 professional typically drawn intelligent professional reserved looking woman short blue hair glasses hair clips resemble cat ears flanking small white bonnet ruffle similar maid bonnet shows windows logo outfit resembles swimsuit suggesting windows logo colors worn long blue coat alluding popular opinion windows 2000 stable dependable windows operating systems due greater stability win2k compared winme released near 2000 2k- tan often described guardian me- tan particular shade blue used drawings similar default windows 2000 desktop color design me- tan personification windows much line japanese concept kawaii cuteness design changed little artist original designs depicted green hair long pigtails wearing maid outfit badge front reminiscent windows active desktop recovery screen often shown rebooting system crash considered hard worker webcomics often depict failing anything tries often literally crashing irritating sisters frozen control tends things showing lack common sense knowledge putting soda microwave oven defending swinging welsh onion many variations exist common depiction windows 98 operating systems pair young girls os- tan representative original release windows 98 shown white blue uniform includes windows logo part neck tie navy blue hair 98 hair clip windows 98 second edition os- tan similar appearance wears green sailor school uniform letters se front two early representations also seen pair stick-limbed pocky boxes face version number drawn crayon reference vulcan 300 character zatch bell anime series early representations still used mecha piloted girls dolls carried girls sometimes even hiding places windows 95 considered oldest modern 32-bit windows operating systems usually represented traditional lady early modern era japan typically depicted gentle-looking brown haired woman kimono hair ribbon showing four windows colors outfit traditional kimono hakama japan wears thick sandals geta feet woman college student typical clothes seen earliest period course modernization japan meiji period taishō period reference modernization windows comparison modernization japan additionally pattern kimono based file hana256.bmp used desktop wallpaper pattern japanese version windows typically depicted engaged drinking tea serving meals housework one recurring theme stories unfamiliarity newer post win-95 technologies usb devices even though osr 2.x supported broadband internet connections also occasionally depicted wielding katana aggressive manner symbolizing generation operating systems microsoft finally achieved full dominance personal computer market windows 3.1 short girl long silver hair long light purple dress large purple bow head often seen carrying small black cat head well acts servant maid sort serves tends dos- tan reference fact windows 3.1 full operating system rather gui ms-dos mac os x girl often portrayed catgirl following apple wild cat naming tradition every mac os x release os x mavericks codename like jaguar panther tiger snow leopard etc. otherwise shown older variation mac os 9 girl wearing white coat wearing airport wireless hub fashioned hat occasionally shown holding publication sort macs often used desktop publishing originally seen bearded penguin reference tux penguin mascot linux kernel image girl helmet flippers chosen human alternative helmet likely metaphor linux kernel oft-claimed excellent security usually horns likely reference gnu software comprises common system programs present nearly linux distributions gear teeth helmet reference kde common desktop environment used gnu/linux shirt reference gnome another common desktop environment often seen spear flags attached representing grub lilo gcc tools linux artist drew konqi tyson tan submitted mascot libreoffice contest run document foundation late 2017 mascot officially accepted foundation developed fandom 8chan reddit msx-dos girl often portrayed young grey-haired girl carrying large cartridge-shaped bag msx-dos logo even short game featuring os- tan player character bag os- tan often shown holding cartridge-shaped likely msxdos2 required cartridge extra 64 kb rom order work americanized versions windows related os- tan named xp-usa me-usa 2k-usa published ohzora fanbook comic strip named trouble windows usa saint muscle heavy associations operating systems supporting programs anti-virus clients web browsers many supporting characters created personify applications examples wired news rated os- tan among lamest technology mascots ever yet strangely compelling | [
496,
224,
3057,
8085,
2472,
5984,
2885,
4759,
6380,
5571,
52,
578,
7597,
5644
] | Validation |
3,852 | 9 | Cryptol:cryptol cryptol domain specific programming language cryptography developed portland oregon based software development firm galois inc.. language originally developed use united states national security agency language also used private firms provide information technology systems american company rockwell collins provides aerospace defense contractors united states programming language used aspects developing using cryptography design implementation new ciphers verification existing cryptographic algorithms cryptol designed allow cryptographer watch stream processing functions program manipulate ciphers encryption algorithms | [
6507,
1908,
3772,
6712,
2740,
2566,
3966,
1102,
2866,
4078,
336,
5171,
1231,
6497,
6498,
5190
] | Test |
3,853 | 7 | Monjin:monjin monjin digital interviewing assessment platform powered artificial intelligence described portmanteau skype linkedin monjin founded 2014 industry veterans abhijit kashyape ashutosh kulkarni aniruddha fansalkar prafulla paraskar company led abhijit 100 employees across globe 2016 monjin set operations uk usa sweden 2017 monjin partnered microsoft create first azure-based aggregator platform using interviewers create global assessment standard | [] | Test |
3,854 | 9 | Quantum_(statistical_programming_language):quantum statistical programming language quantum software package programming language statistical survey data validation manipulation tabulation originally developed quantime run unix systems incorporated spss inc. spss mr product line acquisition quantime september 1997 | [
367
] | Test |
3,855 | 5 | Internet_protocol_suite:internet protocol suite internet protocol suite conceptual model set communications protocols used internet similar computer networks commonly known tcp/ip foundational protocols suite transmission control protocol tcp internet protocol ip occasionally known department defense dod model development networking method funded united states department defense darpa internet protocol suite provides end-to-end data communication specifying data packetized addressed transmitted routed received functionality organized four abstraction layers classify related protocols according scope networking involved lowest highest layers link layer containing communication methods data remains within single network segment link internet layer providing internetworking independent networks transport layer handling host-to-host communication application layer providing process-to-process data exchange applications technical standards underlying internet protocol suite constituent protocols maintained internet engineering task force ietf internet protocol suite predates osi model comprehensive reference framework general networking systems internet protocol suite resulted research development conducted defense advanced research projects agency darpa late 1960s initiating pioneering arpanet 1969 darpa started work number data transmission technologies 1972 robert e. kahn joined darpa information processing technology office worked satellite packet networks ground-based radio packet networks recognized value able communicate across spring 1973 vinton cerf helped develop existing arpanet network control program ncp protocol joined kahn work open-architecture interconnection models goal designing next protocol generation arpanet summer 1973 kahn cerf worked fundamental reformulation differences local network protocols hidden using common internetwork protocol instead network responsible reliability arpanet function delegated hosts cerf credits hubert zimmermann louis pouzin designer cyclades network important influences design protocol implemented transmission control program first published 1974 initially tcp managed datagram transmissions routing protocol grew researchers recommended division functionality protocol layers advocates included jonathan postel university southern california information sciences institute edited request comments rfcs technical strategic document series documented catalyzed internet development postel stated screwing design internet protocols violating principle layering encapsulation different mechanisms intended create environment upper layers could access needed lower layers monolithic design would inflexible lead scalability issues transmission control program split two distinct protocols transmission control protocol internet protocol design network included recognition provide functions efficiently transmitting routing traffic end nodes intelligence located edge network end nodes design known end-to-end principle using design became possible connect almost network arpanet irrespective local characteristics thereby solving kahn initial internetworking problem one popular expression tcp/ip eventual product cerf kahn work run two tin cans string years later joke ip avian carriers formal protocol specification created successfully tested computer called router provided interface network forwards network packets back forth originally router called gateway term changed avoid confusion types gateways 1973 1974 cerf networking research group stanford worked details idea resulting first tcp specification significant technical influence early networking work xerox parc produced parc universal packet protocol suite much existed around time darpa contracted bbn technologies stanford university university college london develop operational versions protocol different hardware platforms four versions developed tcp v1 tcp v2 tcp v3 ip v3 tcp/ip v4 last protocol still use today 1975 two-network tcp/ip communications test performed stanford university college london november 1977 three-network tcp/ip test conducted sites us uk norway several tcp/ip prototypes developed multiple research centers 1978 1983 march 1982 us department defense declared tcp/ip standard military computer networking year peter t. kirstein research group university college london adopted protocol migration arpanet tcp/ip officially completed flag day january 1 1983 new protocols permanently activated 1985 internet advisory board later internet architecture board held three-day tcp/ip workshop computer industry attended 250 vendor representatives promoting protocol leading increasing commercial use 1985 first interop conference focused network interoperability broader adoption tcp/ip conference founded dan lynch early internet activist beginning large corporations ibm dec attended meeting ibm dec first major corporations adopt tcp/ip despite competing proprietary protocols ibm 1984 barry appelman group tcp/ip development navigated corporate politics get stream tcp/ip products various ibm systems including mvs vm os/2 time several smaller companies ftp software wollongong group began offering tcp/ip stacks dos microsoft windows first vm/cms tcp/ip stack came university wisconsin early tcp/ip stacks written single-handedly programmers jay elinsky ibm research wrote tcp/ip stacks vm/cms os/2 respectively 1984 donald gillies mit wrote ntcp multi-connection tcp ran atop ip/packetdriver layer maintained john romkey mit 1983-4 romkey leveraged tcp 1986 ftp software founded starting 1985 phil karn created multi-connection tcp application ham radio systems ka9q tcp spread tcp/ip fueled june 1989 university california berkeley agreed place tcp/ip code developed bsd unix public domain various corporate vendors including ibm included code commercial tcp/ip software releases microsoft released native tcp/ip stack windows 95 event helped cement tcp/ip dominance protocols microsoft-based networks included ibm systems network architecture sna platforms digital equipment corporation decnet open systems interconnection osi xerox network systems xns british academic network janet converted tcp/ip 1991 end-to-end principle evolved time original expression put maintenance state overall intelligence edges assumed internet connected edges retained state concentrated speed simplicity real-world needs firewalls network address translators web content caches like forced changes principle robustness principle states general implementation must conservative sending behavior liberal receiving behavior must careful send well-formed datagrams must accept datagram interpret e.g. object technical errors meaning still clear second part principle almost important software hosts may contain deficiencies make unwise exploit legal obscure protocol features encapsulation used provide abstraction protocols services encapsulation usually aligned division protocol suite layers general functionality general application highest level model uses set protocols send data layers data encapsulated level early architectural document emphasizes architectural principles layering rfc 1122 titled host requirements structured paragraphs referring layers document refers many architectural principles emphasize layering loosely defines four-layer model layers names numbers follows link layer networking scope local network connection host attached regime called link tcp/ip literature lowest component layer internet protocols tcp/ip designed hardware independent result tcp/ip may implemented top virtually hardware networking technology link layer used move packets internet layer interfaces two different hosts link processes transmitting receiving packets given link controlled software device driver network card well firmware specialized chipsets perform data link functions adding packet header prepare transmission actually transmit frame physical medium tcp/ip model includes specifications translating network addressing methods used internet protocol link layer addresses media access control mac addresses aspects level however implicitly assumed exist link layer explicitly defined tcp/ip model link layer also layer packets may selected sent virtual private network networking tunnels scenario link layer data may considered application data traverses another instantiation ip stack transmission reception another ip connection connection virtual link may established transport protocol even application scope protocol serves tunnel link layer protocol stack thus tcp/ip model dictate strict hierarchical encapsulation sequence link layer tcp/ip model corresponding functions layer 2 open systems interconnection osi model internet layer responsibility sending packets across potentially multiple networks internetworking requires sending data source network destination network process called routing internet protocol performs two basic functions internet layer agnostic data structures transport layer also distinguish operation various transport layer protocols ip carries data variety different upper layer protocols protocols identified unique protocol number example internet control message protocol icmp internet group management protocol igmp protocols 1 2 respectively protocols carried ip icmp used transmit diagnostic information igmp used manage ip multicast data layered top ip perform internetworking functions illustrates differences architecture tcp/ip stack internet osi model tcp/ip model internet layer corresponds layer three open systems interconnection osi model referred network layer internet layer provides unreliable datagram transmission facility hosts located potentially different ip networks forwarding transport layer datagrams appropriate next-hop router relaying destination functionality internet layer makes possible internetworking interworking different ip networks essentially establishes internet internet protocol principal component internet layer defines two addressing systems identify network hosts computers locate network original address system arpanet successor internet internet protocol version 4 ipv4 uses 32-bit ip address therefore capable identifying approximately four billion hosts limitation eliminated 1998 standardization internet protocol version 6 ipv6 uses 128-bit addresses ipv6 production implementations emerged approximately 2006 transport layer establishes basic data channels applications use task-specific data exchange layer establishes host-to-host connectivity meaning provides end-to-end message transfer services independent structure user data logistics exchanging information particular specific purpose independent underlying network protocols layer may provide error control segmentation flow control congestion control application addressing port numbers end-to-end message transmission connecting applications transport layer categorized either connection-oriented implemented tcp connectionless implemented udp purpose providing process-specific transmission channels applications layer establishes concept network port numbered logical construct allocated specifically communication channels application needs many types services port numbers standardized client computers may address specific services server computer without involvement service announcements directory services ip provides best effort delivery transport layer protocols offer reliability however ip run reliable data link protocol high-level data link control hdlc example tcp connection-oriented protocol addresses numerous reliability issues providing reliable byte stream newer stream control transmission protocol sctp also reliable connection-oriented transport mechanism message-stream-oriented—not byte-stream-oriented like tcp—and provides multiple streams multiplexed single connection also provides multi-homing support connection end represented multiple ip addresses representing multiple physical interfaces one fails connection interrupted developed initially telephony applications transport ss7 ip also used applications user datagram protocol connectionless datagram protocol like ip best effort unreliable protocol reliability addressed error detection using weak checksum algorithm udp typically used applications streaming media audio video voice ip etc on-time arrival important reliability simple query/response applications like dns lookups overhead setting reliable connection disproportionately large real-time transport protocol rtp datagram protocol designed real-time data streaming audio video applications given network address distinguished tcp udp port convention certain well known ports associated specific applications tcp/ip model transport host-to-host layer corresponds roughly fourth layer open systems interconnection osi model also called transport layer application layer includes protocols used applications providing user services exchanging application data network connections established lower level protocols may include basic network support services protocols routing host configuration examples application layer protocols include hypertext transfer protocol http file transfer protocol ftp simple mail transfer protocol smtp dynamic host configuration protocol dhcp data coded according application layer protocols encapsulated transport layer protocol units tcp udp messages turn use lower layer protocols effect actual data transfer tcp/ip model consider specifics formatting presenting data define additional layers application transport layers osi model presentation session layers functions realm libraries application programming interfaces application layer protocols generally treat transport layer lower protocols black boxes provide stable network connection across communicate although applications usually aware key qualities transport layer connection end point ip addresses port numbers application layer protocols often associated particular client-server applications common services well-known port numbers reserved internet assigned numbers authority iana example hypertext transfer protocol uses server port 80 telnet uses server port 23 clients connecting service usually use ephemeral ports i.e. port numbers assigned duration transaction random specific range configured application transport layer lower-level layers unconcerned specifics application layer protocols routers switches typically examine encapsulated traffic rather provide conduit however firewall bandwidth throttling applications must interpret application data example resource reservation protocol rsvp also sometimes necessary network address translator nat traversal consider application payload application layer tcp/ip model often compared equivalent combination fifth session sixth presentation seventh application layers open systems interconnection osi model furthermore tcp/ip model distinguishes user protocols support protocols support protocols provide services system network infrastructure user protocols used actual user applications example ftp user protocol dns support protocol following table shows various networking models number layers varies three seven networking models textbooks secondary sources may conflict intent rfc 1122 ietf primary sources three top layers osi model i.e application layer presentation layer session layer distinguished separately tcp/ip model application layer transport layer pure osi protocol applications x.400 also combined requirement tcp/ip protocol stack must impose monolithic architecture transport layer example nfs application protocol runs external data representation xdr presentation protocol turn runs protocol called remote procedure call rpc rpc provides reliable record transmission safely use best-effort udp transport different authors interpreted tcp/ip model differently disagree whether link layer entire tcp/ip model covers osi layer 1 physical layer issues whether hardware layer assumed link layer several authors attempted incorporate osi model layers 1 2 tcp/ip model since commonly referred modern standards example ieee itu often results model five layers link layer network access layer split osi model layers 1 2 ietf protocol development effort concerned strict layering protocols may fit cleanly osi model although rfcs sometimes refer often use old osi layer numbers ietf repeatedly stated internet protocol architecture development intended osi-compliant rfc 3439 addressing internet architecture contains section entitled layering considered harmful example session presentation layers osi suite considered included application layer tcp/ip suite functionality session layer found protocols like http smtp evident protocols like telnet session initiation protocol sip session layer functionality also realized port numbering tcp udp protocols cover transport layer tcp/ip suite functions presentation layer realized tcp/ip applications mime standard data exchange conflicts apparent also original osi model iso 7498 considering annexes model e.g. iso 7498/4 management framework iso 8648 internal organization network layer ionl ionl management framework documents considered icmp igmp defined layer management protocols network layer like manner ionl provides structure subnetwork dependent convergence facilities arp rarp ietf protocols encapsulated recursively demonstrated tunneling protocols generic routing encapsulation gre gre uses mechanism osi uses tunneling network layer internet protocol suite presume specific hardware software environment requires hardware software layer exists capable sending receiving packets computer network result suite implemented essentially every computing platform minimal implementation tcp/ip includes following internet protocol ip address resolution protocol arp internet control message protocol icmp transmission control protocol tcp user datagram protocol udp internet group management protocol igmp addition ip icmp tcp udp internet protocol version 6 requires neighbor discovery protocol ndp icmpv6 igmpv6 often accompanied integrated ipsec security layer application programmers typically concerned interfaces application layer often also transport layer layers services provided tcp/ip stack operating system ip implementations accessible programmers sockets apis unique implementations include lightweight tcp/ip open source stack designed embedded systems ka9q nos stack associated protocols amateur packet radio systems personal computers connected via serial lines microcontroller firmware network adapter typically handles link issues supported driver software operating system non-programmable analog digital electronics normally charge physical components link layer typically using application-specific integrated circuit asic chipset network interface physical standard high-performance routers large extent based fast non-programmable digital electronics carrying link level switching | [
7148,
1068,
709,
7878,
4294,
6419,
5021,
3945,
4676,
4677,
7169,
7170,
4683,
6432,
1462,
5381,
5039,
5041,
6446,
739,
2219,
743,
3640,
4709,
7916,
2231,
3312,
414,
7581,
7214,
7217,
2612,
3337,
4014,
1900,
87,
3681,
456,
6879,
1916,
475... | Test |
3,856 | 2 | Berkeley_Software_Design:berkeley software design berkeley software design inc. bsdi later bsdi corporation developed sold licenses supported bsd/os originally known bsd/386 commercial partially proprietary variant bsd unix operating system pc compatible later computer systems name chosen similarity berkeley software distribution source primary product specifically 4.3bsd networking release 2 bsdi founded rick adams members computer systems research group csrg university california berkeley including keith bostic kirk mckusick mike karels bill jolitz donn seeley jolitz seeley trent hein working rick adam uunet time became bsdi first employees company began operations 1991 december 1991 usenix secretary former head software convex computer rob kolstad university illinois hired would take company operations two years later bsd/386 released january 1992 full system including source code retailed 995 affordable equivalent source code license rival unix system v cost 20,000 late 1980s rob kolstad direction company decided pursue internet infrastructure primary customer audience mid 1990s top-10 websites world almost using bsd/386 bsd source codebase late 1991 unix system laboratories usl brought lawsuit bsdi alleging bsd/386 contained proprietary trade secrets source code usl acquired novell settlement reached january 1994 bsdi agreed base future releases product called bsd/os csrg 4.4bsd-lite release declared free usl intellectual property rob kolstad university illinois convex computer corporation president bsdi period headed company close decade 1999 bsdi employees sought initial public offering installed new president reach goal soon possible given recent success red hat ipo linux market unfortunately strategy successful soon rob kolstad exited company facing bankruptcy 2000 company merged walnut creek cdrom distributor freeware open source software cd-rom shortly acquired telenet system solutions inc. internet infrastructure server supplier 2001 severe financial pressure excessive leverage bsdi known bsdi time sold software business unit comprising bsd/os former walnut creek freebsd slackware linux open source offerings wind river systems renamed remainder ixsystems renewed focus server hardware wind river dropped sponsorship slackware soon afterwards freebsd unit divested separate entity freebsd mall inc. 2002 faced competition open-source bsd- linux-based operating systems wind river discontinued bsd/os december 2003 many technologies live community-led bsd derivatives like freebsd 2002 offmyserver acquired ixsystems hardware business reverted ixsystems name 2005 | [
5268,
3838,
1341,
7514,
6794,
462,
4670,
6085,
1824,
908,
481,
3457,
1279,
5571,
2118,
1193,
578,
738,
6367,
6369,
2583,
6918,
594,
4441,
6477,
2512,
424,
6046,
6489,
6583,
6586,
4277,
443
] | Test |
3,857 | 4 | Ad_blocking:ad blocking ad blocking ad filtering software capability removing altering online advertising web browser application popular ad blocking tools browser extensions methods also available online advertising exists variety forms including web banners pictures animations embedded audio video text pop-up windows employ audio video autoplay browsers offer ways remove alter advertisements either targeting technologies used deliver ads embedded content delivered browser plug-ins via html5 targeting urls source ads targeting behaviors characteristic ads use html5 autoplay audio video standpoint internet user various fundamental reasons one would want use ad blocking addition manipulated brands publishers representative trade bodies hand argue web ads provide revenue website owners enable website owners create otherwise purchase content website publishers claim prevalent use ad blocking software devices could adversely affect website owner revenue thus turn lower availability free content websites users benefits ad blocking software include quicker loading cleaner looking web pages fewer distractions lower resource waste bandwidth cpu memory etc privacy benefits gained exclusion tracking profiling systems ad delivery platforms blocking ads also save substantial amounts electrical energy lower users power bills additional energy savings also expected grid level fewer data packets need transmitted user machine website server ad blocking software may benefits users quality life decreases internet users exposure advertising marketing industries promote purchase numerous consumer products services potentially harmful unhealthy creating urge buy immediately unwanted advertising also harm advertisers users become annoyed ads irritated users might make conscious effort avoid goods services firms using annoying pop-up ads block web content user trying view users interested making purchases blocking ads also save time ad appears website exerts toll user attention budget since ad enters user field view must either consciously ignored closed dealt way user strongly focused reading solely content seeking likely desire diverted advertisements seek sell unneeded unwanted goods services contrast users actively seeking items purchase might appreciate advertising particular targeted ads another important aspect improving security online advertising subjects users higher risk infecting devices computer viruses surfing pornography websites high-profile case malware distributed advertisements provided youtube malicious customer google doubleclick august 2015 0-day exploit firefox browser discovered advertisement website forbes required users disable ad blocking viewing website users immediately served pop-under malware australian signals directorate recommends individuals organizations block advertisements improve information security posture mitigate potential malvertising attacks machine compromise information security firm webroot also note employing ad blockers provide effective countermeasures malvertising campaigns less technically-sophisticated computer users ad blocking also save money user user personal time worth one dollar per minute unsolicited advertising adds extra minute time user requires reading webpage i.e user must manually identify ads ads click close use techniques either deal tax user intellectual focus way user effectively lost one dollar time order deal ads might generate fractional pennies display-ad revenue website owner problem lost time rapidly spiral control malware accompanies ads ad blocking also reduces page load time saves bandwidth users users pay total transferred bandwidth capped pay-for-usage connections including mobile users worldwide direct financial benefit filtering ad loaded analysis 200 popular news sites ranked alexa 2015 showed mozilla firefox tracking protection lead 39 reduction data usage 44 median reduction page load time according research performed new york times ad blockers reduced data consumption sped load time half 50 news sites including journalists concluded visiting home page boston.com site ad data study every day month would cost equivalent 9.50 data usage ads streaming audio video even presented user interface rapidly consume gigabytes transfer especially faster 4g connection even fixed connections often subject usage limits especially faster connections 100mbit/s quickly saturate network filled streaming media known problem web browsers including firefox restoring sessions often plays multiple embedded ads however annoyance easily averted simply setting web browser clear cookies browsing-history information time browser software closed another preventive option use script blocker enables user disable scripts selectively re-enable certain scripts desired order determine role script user thus quickly learn scripts truly necessary standpoint webpage functionality consequently sources scripts undesirable insight helpful visiting websites general thus precisely controlling scripts run webpage viewed user retains full control happens his/her computer cpu computer screen use mobile desktop ad blocking software designed remove traditional advertising grew 41 worldwide 48 u.s. q2 2014 q2 2015 q2 2015 45 million americans using ad blockers survey research study released q2 2016 metafacts reported 72 million americans 12.8 million adults uk 13.2 million adults france using ad blockers pcs smartphones tablet computers march 2016 internet advertising bureau reported uk adblocking already 22 among people 18 years old one method filtering simply block prevent autoplay flash animation image loading microsoft windows audio video files done browsers easily also improves security privacy crude technological method refined numerous browser extensions every web browser handles task differently general one alters options preferences application extensions filter specific media types additional add-on usually required differentiate ads non-ads using technology wanted unwanted ads behaviors advanced ad blocking filter software allow fine-grained control advertisements features blacklists whitelists regular expression filters certain security features also effect disabling ads antivirus software act ad blocker filtering intermediaries isp providers national governments increasingly common 2015 many web browsers block unsolicited pop-up ads automatically current versions konqueror internet explorer also include content filtering support content filtering added firefox chromium-based browsers opera safari browsers extensions adblock adblock plus ublock origin number sources provide regularly updated filter lists adblock plus provided german software house eyeo gmbh included freeware browser maxthon people republic china default another method filtering advertisements uses cascading style sheets css rules hide specific html xhtml elements beginning 2018 google confirmed built-in ad blocker chrome/chromium browsers would go live 15th february ad blocker blocks certain ads specified better ads standard defined coalition better ads® google board member built-in ad blocking mechanism disputed could unfairly benefit google advertising number external software applications offer ad filtering primary additional feature traditional solution customize http proxy web proxy filter content programs work caching filtering content displayed user browser provides opportunity remove ads also content may offensive inappropriate even malicious drive-by download popular proxy software blocks content effectively include netnanny privoxy squid content-control software main advantage method freedom implementation limitations browser working techniques centralization control proxy used many users proxies good filtering ads several limitations compared browser-based solutions proxies difficult filter transport layer security ssl codice_1 traffic full webpage context available filter well proxies find difficult filter javascript-generated ad content operating systems even aware domain name system dns still offer backward compatibility locally administered list foreign hosts configuration historical reasons stored flat text file default contains hostnames associated ip addresses editing hosts file simple effective dns clients read local hosts file querying remote dns server storing black-hole entries hosts file prevents browser accessing ad server manipulating name resolution ad server local nonexistent ip address codice_2 codice_3 typically used ipv4 addresses simple implement methods circumvented advertisers either hard-coding ip address server hosts ads turn worked around changing local routing table using example iptables blocking firewalls loading advertisements server serves main content blocking name resolution server would also block useful content site using dns sinkhole manipulating hosts file exploits fact operating systems store file ip address domain name pairs consulted browsers using dns server look domain name assigning loopback address known ad server user directs traffic intended reach ad server local machine virtual black hole /dev/null bit bucket advertising blocked using dns server configured block access domains hostnames known serve ads spoofing address users choose use already modified dns server set dedicated device raspberry pi manipulating dns widely employed method manipulate end user sees internet also deployed locally personal purposes china runs root dns eu considered google required google public dns used applications android devices accordingly dns addresses domains used advertising may extremely vulnerable broad form ad substitution whereby domain serves ads entirely swapped one serving local ads subset users especially likely countries notably russia india china advertisers often refuse pay clicks page views dns-level blocking domains non-commercial reasons already common china android apps run local vpn connection host filtering ability dns address without requiring root access approach allows adblocking app download adblocking host files use filter ad networks throughout device blokada dns66 adguard popular apps accomplish adblocking without root permission adblocking active local vpn turned completely stops vpn connection disconnected convenience makes easy access content blocked anti-adblock scripts approach optimizes battery usage reduces internet slowdown caused using external dns vpn adblocking needs overall less configuration devices adtrap use hardware block internet advertising based reviews adtrap device uses linux kernel running version privproxy block ads video streaming music streaming web browser another solution provided network-level ad blocking telcos israeli startup shine internet providers especially mobile operators frequently offer proxies designed reduce network traffic even targeted specifically ad filtering proxy-based arrangements block many types advertisements large bandwidth-consuming otherwise deemed unsuited specific internet connection target device many internet operators block form advertisements time injecting ads promoting services specials content providers argued widespread ad blocking results decreased revenue website sustained advertisements e-commerce-based businesses blocking detected argued since advertisers ultimately paying ads increase revenues eliminating ad blocking would dilute value per impression drive price advertising arguing like click fraud impressions served users use ad blockers little value advertisers consequently argue eliminating ad blocking would increase overall ad revenue content providers long run websites taken countermeasures ad blocking software attempting detect presence ad blockers informing users views outright preventing users accessing content unless disable ad blocking software whitelist website buy ad-removal pass several arguments supporting opposing assertion blocking ads wrong publisher companies taken steps protect rights conduct business according prevailing law suggested european union practice websites scanning ad blocking software may run afoul e-privacy directive claim validated iab europe guidelines released june 2016 stating indeed may legal issue ad blocker detection anti-blocking stakeholders tried refute seems safe assume publishers follow guidelines provided main publisher lobby iab joint effort announced iab sweden prior iab europe guideline matter never materialized would likely found european anti-competition laws august 2017 vendor counter-measures issued demand section 1201 u.s. digital millennium copyright act demand removal domain name associated service ad-blocking filter list vendor argued domain constituted component technological protection measure designed protect copyrighted work thus made violation anti-circumvention law frustrate access 2015 advertisers marketers look involve brands directly entertainment native advertising product placement also known brand integration embedded marketing example product placement would soft drink manufacturer pay reality tv show producer show cast host appear onscreen holding cans soft drink another common product placement automotive manufacturer give free cars producers tv show return show producer depicting characters using vehicles show digital publications turned customers help example guardian asking readers donations help offset falling advertising revenue according newspaper editor-in-chief katharine viner newspaper gets amount money membership paying readers advertising newspaper considered preventing readers accessing content usage ad-blocking software becomes widespread far keeps content accessible readers employ ad-blockers | [
2086,
1525,
2451,
5099,
4759,
3850,
7169,
5733,
2469,
4320,
5571,
4600,
1847,
578,
7910,
1284,
2577,
317,
5401,
6024,
2043,
7015,
3043,
4725,
6221,
518,
1136,
6777,
3751,
3338,
5351,
7597
] | Test |
3,858 | 3 | Vampire_Killer:vampire killer vampire killer platform-adventure video game released konami msx2 computer october 30 1986 parallel version original castlevania debuted month earlier famicom disk system japanese title however msx2 version localized first europe thus published without castlevania branding franchise would start using abroad 1987 nes version released north america neither vampire killer msx2 platform released like castlevania player controls vampire hunter simon belmont ventures dracula castle armed mystical whip inherited father order slay evil count vampire killer shares premise soundtrack characters locations original castlevania structure game play mechanics differ significantly nes counterpart like castlevania vampire killer consists 18 stages boss encounter end every third stage contrast linear level designs castlevania vampire killer features labyrinth-like stages requiring player seek exit next stage also skeleton key required unlock due hardware limitations msx2 vampire killer uses flip screens instead scrolling game played keyboard game controller items weapons obtained breaking candle stands certain walls like nes version also purchasing merchants hidden throughout castle unlocking treasure chests using keys simon default whip also replaced one four weapons chain whip throwing daggers ax cross latter two function like boomerang must retrieved return path player wishes preserve also four items simon carry similar sub-weapons nes version map shows current position location exit used three times pressing f2 holy water used jumping pressing left right mid-air hourglass temporarily paralyzes enemies pressing jumping one two types shields heart points used ammunition holy water hourglass requiring five hearts per use also currency merchants items provide auxiliary effects increasing decreasing prices items sold merchants temporary invulnerability increased walking speed jumping height health recovery defeating boss simon start next stage without previously-accumulated equipment aside number hearts map used already player starts game three lives way gain extra lives continues unless game played game master cartridge second slot playing game master also enable option select stage number lives start well ability skip screens | [
6151,
7947
] | Test |
3,859 | 4 | HackTool.Win32.HackAV:hacktool.win32.hackav hacktool.win32.hackav not-a-virus keygen hacktool win32/keygen microsoft malware protection center definition kaspersky labs program designed assist hacking programs often contain signatures potential malware dangerous interfere work pc used hacker get personal information user computer according microsoft malware protection center first known detection goes back july 16 2009 riskware able create license keys illegally downloaded non-registered software kind tool may appear differently depending software tool designed create key following security threats often found pcs related tools | [
5452,
4,
1395,
1393,
6305,
3486,
88
] | Validation |
3,860 | 4 | XOFTspy_Portable_Anti-Spyware:xoftspy portable anti-spyware xoftspy portable anti-spyware proprietary application developed paretologic inc. microsoft windows computers anti-spyware program designed run usb drive protect users malicious threats software free download scan user must purchase license clean license valid clean multiple computers u3 usb drive portability useful situations computer heavily infected bogged sluggish accessing computer directly u3 device xoftspy portable removes malware items regardless computer infected unable download anti-spyware programs online xoftspy retired new product name digitalcare | [
5571,
4759,
1504
] | Test |
3,861 | 4 | Same-origin_policy:same-origin policy computing same-origin policy important concept web application security model policy web browser permits scripts contained first web page access data second web page web pages origin origin defined combination uri scheme host name port number policy prevents malicious script one page obtaining access sensitive data another web page page document object model mechanism bears particular significance modern web applications extensively depend http cookies maintain authenticated user sessions servers act based http cookie information reveal sensitive information take state-changing actions strict separation content provided unrelated sites must maintained client-side prevent loss data confidentiality integrity important remember same-origin policy applies scripts means resources images css dynamically-loaded scripts accessed across origins via corresponding html tags fonts notable exception cross site request forgery attacks take advantage fact origin policy apply html tags concept same-origin policy dates back netscape navigator 2 1995 policy originally designed protect access document object model since broadened protect sensitive parts global javascript object modern browsers implement form same-origin policy important security cornerstone policies required match exact specification often extended define roughly compatible security boundaries web technologies microsoft silverlight adobe flash adobe acrobat mechanisms direct dom manipulation xmlhttprequest algorithm used calculate origin uri specified rfc 6454 section 4 absolute uris origin triple protocol host port uri use hierarchical element naming authority see section 3.2 uri absolute uri globally unique identifier used two resources considered origin values exactly illustrate following table gives overview typical outcomes checks url nowiki http //www.example.com/dir/page.html /nowiki unlike browsers internet explorer include port calculation origin using security zone place same-origin policy helps protect sites use authenticated sessions following example illustrates potential security risk could arise without same-origin policy assume user visiting banking website n't log user goes another site malicious javascript code running background requests data banking site user still logged banking site malicious code could anything user could banking site example could get list user last transactions create new transaction etc browser send receive session cookies banking site based domain banking site user visiting malicious site would expect site visiting access banking session cookie true javascript direct access banking session cookie could still send receive requests banking site banking site session cookie script essentially user would even csrf protections banking site would effective circumstances same-origin policy restrictive posing problems large websites use multiple subdomains first number workarounds using fragment identifier codice_1 property used pass data documents residing different domains modern browsers support multiple techniques relaxing same-origin policy controlled manner two windows frames contain scripts set domain value same-origin policy relaxed two windows window interact example cooperating scripts documents loaded orders.example.com catalog.example.com might set document.domain properties “ example.com ” thereby making documents appear origin enabling document read properties setting property implicitly sets port null browsers interpret differently port 80 even unspecified port assure access allowed browser set document.domain property pages technique relaxing same-origin policy standardized name cross-origin resource sharing standard extends http new origin request header new access-control-allow-origin response header allows servers use header explicitly list origins may request file use wildcard allow file requested site browsers firefox 3.5 safari 4 internet explorer 10 use header allow cross-origin http requests xmlhttprequest would otherwise forbidden same-origin policy another technique cross-document messaging allows script one page pass textual messages script another page regardless script origins calling postmessage method window object asynchronously fires onmessage event window triggering user-defined event handlers script one page still directly access methods variables page communicate safely message-passing technique since html script elements allowed retrieve execute content domains page bypass same-origin policy receive json data different domain loading resource returns jsonp payload jsonp payloads consist internal json payload wrapped pre-defined function call script resource loaded browser designated callback function invoked process wrapped json payload modern browsers permit script connect websocket address without applying same-origin policy however recognize websocket uri used insert origin header request indicates origin script requesting connection ensure cross-site security websocket server must compare header data whitelist origins permitted receive reply behavior same-origin checks related mechanisms well-defined number corner cases pseudo-protocols clearly defined host name port associated urls file data etc. historically caused fair number security problems generally undesirable ability locally stored html file access files disk communicate site internet lastly certain types attacks dns rebinding server-side proxies permit host name check partly subverted make possible rogue web pages directly interact sites addresses true canonical origin impact attacks limited specific scenarios since browser still believes interacting attacker site therefore disclose third-party cookies sensitive information attacker even same-origin policy effect without relaxed cross-origin resource sharing certain cross-origin computer attacks performed webrtc used find internal ip address victim attempting connect cross-origin port responses read face same-origin policy javascript still make inferences whether port open closed checking onload/onerror event fires get timeout gives opportunities cross-origin portscanning javascript even fingerprint services cross-origin taking advantage default files example javascript loaded site evil.com attempts open file hxxp //127.0.0.1/images/jenkins.png onload event fires inferred victim runs jenkins computer way attacker find potentially vulnerable services example internal network even face same-origin policy service vulnerable cross-site request forgery even compromised | [
7232,
2451,
2557,
6006,
8085,
3383,
4338,
5847,
3999,
1513,
2901
] | Train |
3,862 | 3 | Trailblazer_(video_game):trailblazer video game trailblazer video game requires player direct ball along series suspended passages released originally gremlin graphics zx spectrum commodore 64 atari 8-bit family amstrad cpc c16/plus/4 1986 also enhanced version amstrad cpc 3 disc ported amiga atari st 2005 port gizmondo handheld games console released game played either time trial arcade mode music background matches gameplay electronica genre races quite brief usually last 15 45 seconds special fields track let ball jump slow speed warp speed ball invert controls holes game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 5 5 stars stating favorite disk racing cosmic causeway roads clock robot one really fun zzap 64 reviewers also enjoyed game thought excellent variation race game theme overall rating given 93 steve panak reviewing atari 8-bit version analog computing concluded game original arcade action wristbuster come pike long time one best two-player competition games 've seen | [] | Test |
3,863 | 1 | SQLite:sqlite sqlite relational database management system rdbms contained c library contrast many database management systems sqlite client–server database engine rather embedded end program sqlite acid-compliant implements sql standard generally following postgresql syntax however sqlite uses dynamically weakly typed sql syntax guarantee domain integrity means one example insert string column defined integer sqlite attempt convert data formats appropriate string 123 integer case guarantee conversions store data as-is conversion possible sqlite popular choice embedded database software local/client storage application software web browsers arguably widely deployed database engine used today several widespread browsers operating systems embedded systems mobile phones among others sqlite bindings many programming languages unlike client–server database management systems sqlite engine standalone processes application program communicates instead sqlite library linked thus becomes integral part application program linking may static dynamic application program uses sqlite functionality simple function calls reduce latency database access function calls within single process efficient inter-process communication sqlite stores entire database definitions tables indices data single cross-platform file host machine implements simple design locking entire database file writing sqlite read operations multitasked though writes performed sequentially due server-less design sqlite applications require less configuration client-server databases sqlite called zero-conf require service management startup scripts access control based grant passwords access control handled means file system permissions given database file databases client-server systems use file system permissions give access database files daemon process another implication serverless design several processes may able write database file server-based databases several writers connect daemon able handle locks internally sqlite hand rely file-system locks less knowledge processes accessing database time therefore sqlite preferred choice write-intensive deployments however simple queries little concurrency sqlite performance profits avoiding overhead passing data another process sqlite uses postgresql reference platform would postgresql used make sense sql standard one major deviation exception primary keys sqlite enforce type checking type value dynamic strictly constrained schema although schema trigger conversion storing conversion potentially reversible sqlite strives follow postel rule d. richard hipp designed sqlite spring 2000 working general dynamics contract united states navy hipp designing software used damage-control system aboard guided missile destroyers originally used hp-ux ibm informix database back-end sqlite began tcl extension design goals sqlite allow program operated without installing database management system requiring database administrator hipp based syntax semantics postgresql 6.5 august 2000 version 1.0 sqlite released storage based gdbm gnu database manager sqlite 2.0 replaced gdbm custom b-tree implementation adding transaction capability sqlite 3.0 partially funded america online added internationalization manifest typing major improvements 2011 hipp announced plans add nosql interface managing documents expressed json sqlite databases develop unqlite embeddable document-oriented database sqlite implements sql-92 standard sql lacks features example partially provides triggers write views however provides instead triggers provide functionality provides complex queries still limited alter table function modify delete columns sqlite uses unusual type system sql-compatible dbms instead assigning type column sql database systems types assigned individual values language terms dynamically typed moreover weakly typed ways perl one insert string integer column although sqlite try convert string integer first column preferred type integer adds flexibility columns especially bound dynamically typed scripting language however technique portable sql products common criticism sqlite type system lacks data integrity mechanism provided statically typed columns products sqlite web site describes strict affinity mode feature yet added however implemented constraints like codice_1 tables normally include hidden rowid index column gives faster access database includes integer primary key column sqlite typically optimize treating alias rowid causing contents stored strictly typed 64-bit signed integer changing behavior somewhat like auto-incrementing column future versions sqlite may include command introspect whether column behavior like rowid differentiate columns weakly-typed non-autoincrementing integer primary keys sqlite full unicode function optional several computer processes threads may access database concurrently several read accesses satisfied parallel write access satisfied accesses currently serviced otherwise write access fails error code automatically retried configurable timeout expires concurrent access situation would change dealing temporary tables restriction relaxed version 3.7 write-ahead logging wal turned enabling concurrent reads writes sqlite version 3.7.4 first saw addition fts4 full text search module features enhancements older fts3 module fts4 allows users perform full text searches documents similar search engines search webpages version 3.8.2 added support creating tables without rowid may provide space performance improvements common table expressions support added sqlite version 3.8.3 2015 json1 extension new subtype interfaces sqlite version 3.9 introduced json content managing sqlite code hosted fossil distributed version control system built upon sqlite database standalone command-line program provided sqlite distribution used create database define tables insert change rows run queries manage sqlite database file also serves example writing applications use sqlite library sqlite uses automated regression testing prior release 2 million tests run part release verification starting august 10 2009 release sqlite 3.6.17 sqlite releases 100 branch test coverage one components code coverage tests test harnesses partially public domain partially proprietary sqlite included default large number programming languages provide bindings sqlite including | [
6788,
3933,
7878,
2180,
4662,
1814,
1445,
6081,
5372,
6427,
6428,
3955,
1095,
4697,
1105,
3975,
4705,
4340,
42,
6462,
7920,
3310,
7567,
2591,
761,
5771,
422,
2600,
5775,
2249,
1889,
2255,
779,
6863,
5091,
445,
7956,
7957,
793,
4025,
402... | Validation |
3,864 | 4 | Cloudbleed:cloudbleed cloudbleed security bug discovered february 17 2017 affecting cloudflare reverse proxies caused edge servers run past end buffer return memory contained private information http cookies authentication tokens http post bodies sensitive data result data cloudflare customers leaked went cloudflare customers happened server memory particular moment data cached search engines discovery reported google project zero team tavis ormandy posted issue team issue tracker said informed cloudflare problem february 17 proof-of-concept attack got cloudflare server return private messages major dating sites full messages well-known chat service online password manager data frames adult video sites hotel bookings 're talking full https requests client ip addresses full responses cookies passwords keys data everything effects cloudbleed similar 2014 heartbleed bug allowing unauthorized third parties access data memory programs running web servers including data shielded tls extent cloudbleed also could impacted many users heartbleed since affected security content delivery service used close 2 million websites tavis ormandy first discover vulnerability immediately drew comparison heartbleed saying took every ounce strength call issue 'cloudbleed report thursday february 23 2017 cloudflare wrote post noting bug serious leaked memory could contain private information cached search engines also discovered evidence malicious exploits bug reports existence. br greatest period impact february 13 february 18 around 1 every 3,300,000 http requests cloudflare potentially resulting memory leakage ’ 0.00003 requests .cloudflare acknowledged memory could leaked early september 22 2016 company also stated one private keys used machine-to-machine encryption leaked turned underlying bug caused memory leak present ragel-based parser many years memory leaked way internal nginx buffers used introducing cf-html subtly changed buffering enabled leakage even though problems cf-html john graham-cumming cloudflare cto noted cloudflare clients uber okcupid n't directly informed leaks due security risks involved situation “ backdoor communication outside cloudflare — google search engines ” said graham-cumming also said unfortunately ancient piece software contained latent security problem problem showed process migrating away added team already begun testing software possible issues tavis ormandy initially stated really impressed cloudflare quick response dedicated cleaning unfortunate issue however ormandy pressed cloudflare additional information gave several excuses n't make sense sending draft severely downplays risk customers uber stated impact service limited uber spokesperson added handful session tokens involved since changed passwords exposed okcupid ceo elie seidman said cloudflare alerted us last night bug 've looking impact okcupid members initial investigation revealed minimal exposure determine users impacted promptly notify take action protect fitbit representative stated company investigating issue concerned users change passwords immediately many major news outlets advised consumers sites using cloudflare change passwords even accounts protected 2-factor authentication could risk passwords mobile apps could impacted researchers arbor networks alert suggested us truly safe response large-scale information leak update passwords web sites app-related services use every day ... pretty much inc. magazine cybersecurity columnist joseph steinberg however advised people change passwords stating current risk much smaller price paid increased 'cybersecurity fatigue leading much bigger problems future | [
704,
3932,
2912,
376,
3277,
2923,
2587,
3323,
5779,
7600,
4025,
1528,
2991,
1173,
6526,
2291,
6904,
6541,
6194,
2678,
3726,
3038,
3047,
6569,
2693,
862,
7307,
6589,
5187,
1996,
7328,
557,
1640,
208,
2021,
5922,
6628,
924,
4522,
4531,
60... | Train |
3,865 | 3 | Valis_II:valis ii sd style remake released japanese mega drive north american genesis syd valis like titles series valis ii side-scrolling platform game requires player navigate two-dimensional levels battling enemies jumping ledge ledge running player faces boss end level despite details gameplay varying versions versions share several similar features well mobile remake added new stages alternate costumes weapons time passes vecanti set rule next emperor rogles brother voiced hirotaka suzuoki wishes stamp trace former tyrant point murdering supporters rogles might furthermore bloodthirsty tendencies recognize yuko valis sword viable threats claim throne orders minions eliminate first chance thwart megas falls magical blade peace comes dream world yuko returns home resume otherwise ordinary human life telenet japan developed two main versions valis ii around time pc engine cd-rom² released first later published nec north america home computer version believed entered development earlier released pc-88 pc-98 msx sharp x68000 japan featured graphic cutscenes another port game released mega drive japan sd valis telenet genesis north america renovation products syd valis title features gameplay plot original character design changed super deformed sd style north american version game incorrectly identifies yūko syd reuses box art naritore sugoroku '92 front cover project egg released various emulated versions game windows along 2011 compilation complete plus came soundtrack cd figure pc engine also released sunsoft playstation store 2011 1993 cd valis visual collection contains cutscenes pc engine version valis ii valis ii generally positively received critics review scores pc engine turbografx-16 version included 74 games machine 76 italian edition computer video games 70 génération 4 92 joystick 75 tilt three five stars turboplay whose reviewer impressed game visuals music disappointed perceived low difficulty hand sd valis syd valis rated 36 consoles+ 56 joystick 63 joypad sega force bashed dull gameplay despite great levels enemies predicting even platform addicts play james scullion sega pro gave sd valis mediocre score 65 recommending saving money game retrospectively sebastian sponsel sega-16 scored 2 10 stating syd valis disappointment fans non-fans alike ... ’ like game created joke one producers ’ get released anyway | [
5822,
8002
] | Test |
3,866 | 6 | Encryption_layer_in_storage_stack:encryption layer storage stack a0kq 9t4x mf5y x32a rhns 0p92 aecx 5ed5 plurality terms used describe implementations disk encryption on-the-fly encryption otfe full disk encryption fde whole disk encryption filesystem-level encryption encrypted filesystem cryptographic filesystem etc refer encryption layer storage stack article describes techniques explains pros cons article reference software hardware implementing techniques see disk encryption software hardware describe cryptographic theory behind see disk encryption theory fully understand techniques listed first need consider stack software hardware computer storage subsystem let us give example stack pc hard disk hardware provides interface read write sectors using logical block addressing lba cylinder-head-sector chs address top software layer interprets partition table stored master boot record mbr represents single hard disk set logical disks top another software layer filesystem represent logical disk collection files organized directories top may software text editor interprets file list text lines layer stack provides interface using interface provided layer example lba-accessible disk logical disk allow read write sectors fixed size given sector number layers called sector-addressable filesystem allows read write data arbitrary length given name file offset inside file text editor allows delete insert characters text file similar communication protocol stack modularity provides great flexibility layer easily replaced another far provides interface example hard disk replaced flash memory rest stack stays unchanged also possible introduce additional layer provides interface layer change data along way example provide on-the-fly encryption decryption encryption layer integrated layer example encryption implemented hardware hard disk single logical disk encrypted file encrypted filesystem even text editor transparently encrypt data storing file terms listed beginning article refer encryption layer different positions unfortunately naming conventions different different speakers general every method data transparently encrypted write decrypted read called on-the-fly encryption otfe although prefer use name encryption sector-addressable layer full disk encryption fde whole disk encryption used refer encryption sector-addressable layer physical disk logical disk whereas others use denote encryption physical disk logical disk filesystem-level encryption cryptographic filesystem used refer filesystem selectively encrypt files stored whereas others distinguish terms use former denote general purpose filesystem supports encryption use latter denote filesystem specifically designed provide encryption uses filesystem store files since many cases people mistakenly assume collocutor assigns meaning terms lot arguments whether particular implementation provides particular feature example one contrasts “ full disk encryption ” “ filesystem-level encryption ” may say software package provides fde whereas opponent contrasts “ fde ” “ logical disk encryption ” “ disk partition encryption ” say package provide fde article explains getting argument important understand meaning speaker assigns terms | [
4406,
1254,
5440,
3221,
2529,
2399
] | Test |
3,867 | 4 | Cardkey:cardkey cardkey producer electronic access control products based simi valley california first company develop widely distribute electronic access control systems company original readers used cards made barium ferrite worked magnetically attracting repelling locking/unlocking cores within reader module mechanism cards primarily used fraternal organizations clubs bpoe elks others first develop wiegand cards readers magnetically based reliable require calibration used barium ferrite readers cards readers highly programmable used applications ranging adt american district telegraph government installations worldwide uk offices manchester reading sold systems companies british telecom shell bp main facility cardkey located nordhoff mason chatsworth additional location cozycroft chatsworth housed customer engineering singular engineering project pass system approximately 1978 division greer hydraulics inc. january 1999 bought johnson controls company whose founder invented electric room thermostat late 1800s | [] | Validation |
3,868 | 2 | Robert_J._Chassell:robert j. chassell robert bob chassell one founding directors free software foundation fsf 1985 board directors chassell also treasurer fsf left fsf become full-time speaker free software topics bob born 22 august 1946 bennington vt diagnosed progressive supranuclear palsy psp 2010 died result 30 june 2017 chassell authored several books including | [
707,
1523,
2985,
8158,
6876,
3174,
1351,
1637,
6981,
2559,
7823,
4872,
1563,
6365,
7463,
5757,
7559,
3981,
4070,
3219,
761,
2599,
1406,
5515,
6048,
2698,
6674,
5787,
966,
2170,
4020
] | Test |
3,869 | 3 | Match_Day_(series):match day series match day association football video game franchise created jon ritman 1984 1980s 8-bit home computer market following games part match day series games published ocean exception super match soccer | [
227
] | Test |
3,870 | 2 | GOFF:goff goff generalized object file format specification developed ibm zsystem mainframe computer supersede ibm os/360 object file format compensate weaknesses older format original ibm os/360 object file format developed 1964 new ibm system/360 mainframe computer format also used makers plug compatible workalike mainframes including univac 90/60 90/70 90/80 fujitsu b2800 format expanded add symbolic records expanded information modules plus support procedures functions names longer 8 characters helped provide enhanced information necessary today complicated programming languages advanced features objects properties methods unicode support virtual methods goff object file format developed ibm approximately 1995 means overcome problems note os/360 object file format simply superseded goff format deprecated still use assemblers language compilers language withstand limitations older format note article use term module refer name equivalent symbol used provide identifier piece code data external scope referenced module may refer subroutine function method property object class named routine identifier external particular scope referencing external name format similar os/360 object file format adds additional information use building applications similarly older os/360 format object file records divided 6 different record types added deleted altered goff records may fixed variable length minimum length using variable-length records 56 characters although records longer except module class names characters ebcdic character set unix-based systems must use fixed-length 80-byte records records fixed-length files shorter fixed length zero-filled distinguish goff records older os/360 format commands may present file first byte goff record always binary value x'03 commands must start character value least space x'40 next 2 bytes goff record indicate record type continuation version file format first 3 bytes known ptv field ptv field represents first 3 bytes every goff record hdr record required must first record esd record gives public name module main program subroutine procedure function property method object fortran common alternate entry point esd record public name must present file reference name made record case fixed-length records name requires continuation records following used adata associated data records used provide additional symbol information module replaced older sym records 360 object file format create adata record adata records appended end class order declared class names assigned adata records translated ibm programs converting binary value text appending name c_adata item numbered x'0033 would become text string c_adata0033 txt records specify machine code instructions data placed specific address location module note wherever length must specified record length value must include continuations record compression table used bytes 20-21 txt record nonzero r value used determine number times repeat string l value indicates length text repeated r times could used pre-initializing tables arrays blanks zero purpose useful express repeated data repeat count value note unlike number values stored goff file version release trans_date values numbers text characters instead binary normally compilers assemblers generate format record typically created binder text item character data binary information used rld records allow module show references address must relocated references specific locations external modules clarify module c program named basura issue call exit function terminate r_pointer address would esdid routine exit p_pointer would esdid basura len records used declare length module known time esd record created e.g one-pass compilers deferred-length element entry continued split end must last record module 'entry point used address beginning module used start point execution used either program non-executable data appearing start module common older assembly programmers older versions assembler much slower assemble data stored programs instructions specified module calls external module first run-time library initialize entry-point name specified fixed-length end record longer 54 bytes record also continued longer additional 80 bytes following continuation record used | [
1339,
4662,
4843,
5948,
7331,
1894,
2418,
2438,
1989,
5932,
2803,
2403,
1435,
2084
] | Test |
3,871 | 1 | Alexander_Street_Press:alexander street press alexander street press asp electronic academic database publisher founded may 2000 alexandria virginia stephen rhind-tutt president janice cronin cfo eileen lawrence vice president sales marketing january 2016 company grown 100 employees offices united states australia brazil china united kingdom june 2016 acquired proquest company first product north american women letters diaries collection 150,000 pages letters diaries women colonial times 1950s 2000 collaboration artfl project university chicago company began using semantic indexing techniques humanities databases created metadata elements gender age sexual orientation characters within plays author nationality birthplace deathplace well item written elements combined full-text search allow material analyzed new ways 2003 company began major partnership center historical study women gender state university new york publish women social movements united states 1600–2000 subsequently become leading site study women history november 2004 alexander street acquired principal assets classical international london new york-based publisher streaming music libraries led new range music publications including partnership smithsonian institution provide smithsonian global sound libraries african american song november 2005 alexander street acquired range religious products produced ad fontes including digital library classic protestant texts digital library catholic reformation october 2006 company acquired assets university music editions small microfilm publisher specializing publication scores journals musically oriented publications collections subsequently released part classical scores library late 2006 company began developing online collections video theatre video published april 2007 followed succession online streaming video collections using techniques semantic indexing initially developed textual databases early provider synchronized scrolling transcripts allow watcher read ahead 2010 midsummer american library association company advertised 9 streaming video collections spanning 9,000 individual video titles april 2007 alexander street acquired principal products harpweek publisher harper weekly lincoln civil war june 2009 alexander street press arcadia publishing launched research website college local history information around united states canada september 2010 alexander street acquired microtraining associates specialist producer distributor therapy counseling videos december 2010 company acquired filmakers library distributor issue based documentaries 2011 alexander street acquired documentary film distributor filmmakers library 2012 acquired principal assets asia pacific films november 2013 alexander street announced acquisition insight media new york-based vendor dvd streaming media bringing asp catalog 50,000 academic video titles one first largest independent surveys streaming video north american academic libraries deg farrelly arizona state university jane hutchison william paterson university alexander street emerged leading vendor used 60 sites insight media present 10 sites 2013 company launched series case study databases combine books audio video reports pamphlets primary sources first two engineering case studies online documented major accidents 20th century psychological experiments online documented seminal experiments humans 2015 company secured arrangement cbs publish episodes sixty minutes 1996 2014 also announced open access initiatives anthropology anthropology commons music open music library following june alexander street press acquired proquest renamed alexander street proquest company 2016 company principal products academic video online 50,000 academically oriented video titles music online collection 8.3 million tracks music together scores reference works 120 primary source collections offerings across curriculum 60,000 video titles materials made available using wide range business models including demand driven access-to-own eba pda subscriptions perpetual licenses | [
7169
] | Test |
3,872 | 5 | IP_Flow_Information_Export:ip flow information export internet protocol flow information export ipfix ietf protocol well name ietf working group defining protocol created based need common universal standard export internet protocol flow information routers probes devices used mediation systems accounting/billing systems network management systems facilitate services measurement accounting billing ipfix standard defines ip flow information formatted transferred exporter collector previously many data network operators relying cisco systems proprietary netflow technology traffic flow information export ipfix standards requirements outlined original rfc 3917 cisco netflow version 9 basis ipfix basic specifications ipfix documented rfc 7011 rfc 7015 rfc 5103 following figure shows typical architecture information flow ipfix architecture pool metering processes collects data packets one observation points optionally filters aggregates information packets exporter gathers observation points together observation domain sends information via ipfix protocol collector exporters collectors many-to-many relationship one exporter send data many collectors one collector receive data many exporters similar netflow protocol ipfix considers flowưởuoz number packets observed specific timeslot sharing number properties e.g source destination protocol using ipfix devices like routers inform central monitoring station view potentially larger network ipfix push protocol i.e sender periodically send ipfix messages configured receivers without interaction receiver actual makeup data ipfix messages great extent sender ipfix introduces makeup messages receiver help special templates sender also free use user-defined data types messages protocol freely extensible adapt different scenarios ipfix prefers stream control transmission protocol sctp transport layer protocol also allows use transmission control protocol tcp user datagram protocol udp simple information set sent via ipfix might look like information set would sent following ipfix message seen message contains ipfix header two ipfix sets one template set introduces build-up data set used well one data set contains actual data ipfix sent protocol keeps session state tcp sctp template set need retransmitted since buffered collectors since template set change time must retransmitted new session state established ipfix sent udp session-less protocol | [
3821,
7637,
4783,
5489
] | Test |
3,873 | 1 | LevelDB:leveldb leveldb open-source on-disk key-value store written google fellows jeffrey dean sanjay ghemawat inspired bigtable leveldb hosted github new bsd license ported variety unix-based systems macos windows android leveldb stores keys values arbitrary byte arrays data sorted key supports batching writes forward backward iteration compression data via google snappy compression library leveldb sql database like nosql dbm stores relational data model support sql queries also support indexes applications use leveldb library provide server command-line interface mariadb 10.0 comes storage engine allows users query leveldb tables mariadb leveldb based concepts google bigtable database system table implementation bigtable system developed starting 2004 based different google internal code base leveldb code code base relies number google code libraries open sourced directly open sourcing code would difficult jeff dean sanjay ghemawat wanted create system resembling bigtable tablet stack minimal dependencies would suitable open sourcing also would suitable use chrome indexeddb implementation wrote leveldb starting early 2011 general design bigtable tablet stack sharing code leveldb used backend database google chrome indexeddb one supported backends riak additionally bitcoin core go-ethereum stores blockchain metadata using leveldb database minecraft pocket edition uses modified version chunk entity data storage autodesk autocad 2016 also uses leveldb google provided benchmarks comparing leveldb performance sqlite kyoto cabinet different scenarios leveldb outperforms sqlite kyoto cabinet write operations sequential-order read operations leveldb also excels batch writes slower sqlite dealing large values currently published benchmarks updated sqlite configuration mistakes noted earlier version results updated benchmarks show leveldb also outperforms berkeley db tests also show openldap lightningdb much faster ~10 times scenarios read operations write types e.g batch synchronous writes see link almost equal rest test leveldb history database corruption bugs study 2014 found older file systems database could become corrupted crash power failure | [
793,
5455,
4759,
10,
2097,
1730,
3863,
7182,
6543,
1105,
1564,
7848,
2429,
6056
] | Validation |
3,874 | 2 | Time_Sharing_Option:time sharing option time sharing option tso interactive time-sharing environment ibm mainframe operating systems including os/360 mvt os/vs2 svs mvs os/390 z/os time-sharing means many people access operating system concurrently unaware others also accessing operating system appears tso user user system tso commonly used mainframe system administrators programmers provides tso interacts users either line-by-line mode full screen menu-driven mode line-by-line mode user enters commands typing keyboard turn system interprets commands displays responses terminal screen mainframe interaction actually via ispf allows customized menu-driven interaction combination called tso/ispf tso also provide unix-style environment os/390 z/os via unix system services command shell without ispf tso commands embedded rexx execs clists run interactively batch tso eliminated need punch cards keypunch machine send card decks computer room read card reading machine originally introduced 1971 ibm considered time-sharing optional feature compared standard batch processing hence offered tso option os/360 mvt introduction mvs 1974 ibm made standard component top-end mainframe operating system tso/e time sharing option/extensions set extensions original tso tso/e base element z/os z/os tso extensions tso/e element os/390 licensed program mvs mvs/esa system products since z/os installations usually tso tso/e functions installed normal refer tso tso/e tso first released tso module names always prefix ikj plus second third letters associated pre-tso functional group iea original functional group supervisor hence tso module name ikjeaxxx ieb original functional group dataset utilities hence tso module name ikjebxxx etc. common run tso batch opposed interactively usual tso line-mode interactive commands also executed via job control language jcl running programs codice_1 codice_2 codice_3 supplying line commands file pointed codice_4 primary difference three programs handling return codes executed commands batch execution tso one way allow ibm mainframe application access db2 resources | [
4566,
7605,
1524,
7331,
630,
6518,
4673,
8173,
299,
5481,
5041,
7546,
5396,
7003,
7992,
402,
1855,
3209,
839,
4428,
850,
5244,
1774,
607,
2431,
6849,
4544,
4366,
7040,
1516,
1994
] | Validation |
3,875 | 4 | FireEye:fireeye fireeye publicly traded cybersecurity company headquartered milpitas california provides hardware software services investigate cybersecurity attacks protect malicious software analyze security risks fireeye founded 2004 initially focused developing virtual machines would download test internet traffic transferring corporate government network company diversified time part acquisitions 2014 acquired mandiant provides incident response services following identification security breach fireeye went public 2013 usatoday says fireeye called investigate high-profile attacks target jp morgan chase sony pictures anthem others yahoo finance says fireeye fastest-growing cyber security firm according deloitte fireeye founded 2004 ashar aziz former sun microsystems engineer received early investment cia investment arm in-q-tel 2009 fireeye first commercial product developed sold 2010 year fireeye expanded middle-east followed opening new offices asia pacific 2010 europe 2011 africa 2013 december 2012 founder aziz stepped ceo former mcafee ceo david dewalt appointed position dewalt recruited order prepare company initial public offering ipo following year fireeye raised additional 50 million venture capital bringing total funding 85 million late 2013 fireeye went public raising 300 million time fireeye growing rapidly 175 employees 2011 grew 900 june 2012 revenues multiplied eight-fold 2010 2012 however fireeye yet profitable due high operating costs research development expenses january 2014 fireeye acquired mandiant 1 billion mandiant private company founded 2004 kevin mandia provided incident response services event data security breach mandiant known investigating high-profile hacking groups acquisition fireeye would often identify security breach partner mandiant investigate hackers mandiant became subsidiary fireeye late 2014 fireeye initiated secondary offering selling another 1.1 billion shares order fund development wider range products shortly afterward fireeye acquired another data breach investigation company npulse approximately 60 million 2015 fireeye making 100 million annual revenue still unprofitable largely due research development spending january 2016 fireeye acquired isight partners 275 million isight threat intelligence company gathered information hacker groups cybersecurity risks followed acquisition invotas security automation company dewalt stepped ceo 2016 replaced mandiant ceo former fireeye president kevin mandia afterwards downsizing restructuring response lower-than-expected sales resulting layoff 300-400 employees afterwards profit revenue increased account shifts subscription model lower costs fireeye started sandboxing company sandboxing incoming network traffic opened within virtual machine test malicious software introduced network fireeye products diversified time part acquisitions 2017 fireeye transitioned primarily selling appliances software-as-a-service model fireeye sells technology products including network email endpoint security platform managing security operations centers called helix consulting services primarily based incident response threat intelligence products central management system cms consolidates management reporting data sharing web mps malware protection system email mps file mps malware analysis system mas single network-based appliance acting distribution hub malware security intelligence fireeye cloud crowd-sources dynamic threat intelligence dti detected individual fireeye mps appliances automatically distributes time sensitive zero-day intelligence globally subscribed customers frequent updates content updates include combination dti fireeye labs generated intelligence identified research efforts fireeye known uncovering high-profile hacking groups october/november 2009 fireeye participated effort take mega-d botnet also known ozdok march 16 2011 rustock botnet taken action microsoft us federal law enforcement agents fireeye university washington july 2012 fireeye involved analysis grum botnet command control servers located netherlands panama russia 2013 mandiant acquired fireeye uncovered multi-year espionage effort chinese hacking group called apt1 2014 fireeye labs team identified two new zero-day vulnerabilities – cve-2014-4148 cve-2014-4113 – part limited targeted attacks major corporations zero-days exploit windows kernel microsoft addressed vulnerabilities october 2014 security bulletin also 2014 fireeye provided information threat group calls fin4 fin4 appears conduct intrusions focused single objective obtaining access insider information capable making breaking stock prices public companies group targeted hundreds companies specifically targets emails c-level executives legal counsel regulatory risk compliance personnel individuals would regularly discuss confidential market-moving information also 2014 fireeye released report focused threat group refers apt28 apt28 focuses collecting intelligence would useful government specifically fireeye found since least 2007 apt28 targeting privileged information related governments militaries security organizations would likely benefit russian government 2015 fireeye confirmed existence least 14 router implants spread across four different countries ukraine philippines mexico india referred synful knock implant stealthy modification router ’ firmware image used maintain persistence within victim ’ network september 2015 fireeye obtained injunction security researcher attempting report vulnerabilities fireeye malware protection system 2015 fireeye uncovered attack exploiting two previously unknown vulnerabilities one microsoft office cve-2015-2545 another windows cve-2015-2546 attackers hid exploit within microsoft word document .docx appeared résumé combination two exploits grant fully privileged remote code execution vulnerabilities patched microsoft 2015 fireeye service team singapore uncovered phishing campaign exploiting adobe flash player zero-day vulnerability cve-2015-3113 adobe released patch vulnerability out-of-band security bulletin fireeye attributed activity china-based threat group tracks apt3 2016 fireeye announced tracking pair cybercriminals referred “ vendetta brothers. ” company said enterprising duo uses various strategies compromise point-of-sale systems steal payment card information sell underground marketplace “ vendetta world. ” mid-2016 fireeye released report impact 2015 agreement former u.s. president barack obama chinese president xi jinping neither government would “ conduct knowingly support cyber-enabled theft intellectual property ” economic advantage security firm reviewed activity 72 groups suspects operating china otherwise support chinese state interests determined mid-2014 overall decrease successful network compromises china-based groups organizations u.s. 25 countries 2016 fireeye announced identified several versions ics-focused malware – dubbed irongate – crafted manipulate specific industrial process running within simulated siemens control system environment although siemens product computer emergency readiness team productcert confirmed fireeye irongate viable operational siemens control systems irongate exploit vulnerabilities siemens products security firm said irongate invokes ics attack concepts first seen stuxnet may 8 2016 fireeye detected attack exploiting previously unknown vulnerability adobe flash player cve-2016-4117 security firm reported issue adobe product security incident response team psirt adobe released patch vulnerability four days later 2016 fireeye discovered widespread vulnerability affecting android devices permits local privilege escalation built-in user “ radio ” making attacker potentially perform activities viewing victim ’ sms database phone history fireeye reached qualcomm january 2016 subsequently worked qualcomm product security team address issue 2016 fireeye provided details fin6 cyber criminal group steals payment card data monetization targets predominately hospitality retail sectors group observed aggressively targeting compromising point-of-sale pos systems making millions payment card numbers later sold underground marketplace fireeye firm mandiant hired russia alfa bank locate information connections u.s. president donald trump servers also hired equifax determine source data breach cases mandiant find anything conclusive 2017 fireeye detected malicious microsoft office rtf documents leveraging previously undisclosed vulnerability cve-2017-0199 vulnerability allows malicious actor download execute visual basic script containing powershell commands user opens document containing embedded exploit fireeye shared details vulnerability microsoft coordinated public disclosure timed release patch microsoft address vulnerability 2018 fireeye helped facebook identify 652 fake accounts | [
4025,
6873,
6874,
1632,
1363,
2290,
1467,
4110,
496,
5675,
7657,
6304,
2782,
1311,
5251,
862,
3154,
5187,
537,
1805
] | Test |
3,876 | 9 | ObjVlisp:objvlisp objvlisp 1984 object-oriented extension vlisp–vincennes lisp lisp dialect developed since 1971 university paris viii – vincennes noteworthy one earliest implementations concept metaclasses particular explicit opposed implicit metaclasses objvlisp model entity instance single class classes instances classes called metaclasses model allows extension static part ool i.e structural aspects objects considered implementation abstract data types objvlisp provided far flexible metaclass model provided earlier object-oriented languages especially smalltalk smalltalk-80 whenever new class created corresponding metaclass created automatically name independent metaclass created–metaclasses implicit rather explicit contrast objvlisp possible define named metaclasses defining class one must specify named metaclass instantiate explicit metaclass support objvlisp influenced provision capability common lisp object system objvlisp object model later implemented prolog produce objvprolog python converge implement meta-class system equivalent objvlisp | [
5965,
6888,
7481
] | Test |
3,877 | 6 | Common_filesystem_features:common filesystem features glossary common filesystem features table intention table provide at-a-glance list features specifications filesystem list names credited design filesystem specification include responsible writing implementation full non abbreviated name filesystem name operating system filesystem debuted partitioning scheme marker used identify partition formatted filesystem describe filesystem allocates isolates bad sectors describes filesystem allocates sectors in-use files describes subdirectories implemented lists characters legal within file directory names maximum number characters file directory name may contain maximum number files filesystem handle maximum size volume filesystem specification handle may differ maximum size operating system supports using given implementation filesystem type dates times filesystem support may include date file “ created ” volume change working normally file e.g opening closing saving modifying file date file last accessed access move open simple access also tripped anti-virus scanners windows system processes therefore caution used stating “ file last accessed user xxx ” “ file access ” date ntfs work date shown windows change file e.g notepad document data added would trip date modified date time related attributes modified may include acls file/directory name date time file last backed maximum year handled filesystem per specification lists basic file attributes available determines filesystems supports multiple data streams ntfs refers alternate data streams hpfs extended attributes hfs calls forks filesystem support real-time transparent compression decompression entire volume filesystem support real-time transparent encryption decryption entire volume filesystem support real-time transparent compression decompression individual files filesystem support real-time transparent encryption decryption individual files filesystem support multi-user access control lists acls | [
1534,
5660
] | Test |
3,878 | 4 | Timestamping_(computing):timestamping computing computing timestamping refers use electronic timestamp provide temporal order among set events timestamping techniques used variety computing fields network management computer security concurrency control instance heartbeat network uses timestamping monitor nodes high availability computer cluster timestamping computer files updating timestamp per-file metadata every time file modified makes possible use efficient build automation tools | [
3827,
658,
5209,
1805
] | Test |
3,879 | 9 | JRuby:jruby jruby implementation ruby programming language atop java virtual machine written largely java free software released three-way epl/gpl/lgpl license jruby tightly integrated java allow embedding interpreter java application full two-way access java ruby code similar jython python language jruby lead developers charles oliver nutter thomas enebo many current past contributors including ola bini nick sieger september 2006 sun microsystems hired enebo nutter work jruby full-time june 2007 thoughtworks hired ola bini work ruby jruby july 2009 jruby developers left sun continue jruby development engine yard may 2012 nutter enebo left engine yard work jruby red hat jruby originally created jan arne petersen 2001 time several years following code direct port ruby 1.6 c code release ruby 1.8.6 effort began update jruby 1.8.6 features semantics since 2001 several contributors assisted project leading current core team around six members jruby 1.1 added just-in-time compilation ahead-of-time compilation modes jruby already faster cases then-current ruby 1.8.7 reference implementation jruby packages available platforms fedora 9 among first include standard package jruby 1.1.1 july 2009 core jruby developers sun microsystems charles oliver nutter thomas enebo nick sieger joined engine yard continue jruby development may 2012 nutter enebo left engine yard work jruby red hat jruby supported compatibility ruby mri versions 1.6 1.9.3 jruby 1.0 supported ruby 1.8.6 jruby 1.4.0 updating compatibility ruby 1.8.7 jruby 1.6.0 added simultaneous support ruby 1.9.2 jruby 1.7.0 making ruby 1.9.3 default execution mode ruby 1.8.7 compatibility available via command-line flag jruby 9.0.0.0 added support ruby 2.2 jruby able run ruby rails web framework since version 0.9 may 2006 ability execute rubygems webrick since hiring two lead developers sun rails compatibility speed improved greatly jruby version 1.0 successfully passed nearly rails test cases since developers begun use jruby rails applications production environments february 27 2008 sun microsystems university tokyo announced joint-research project implement virtual machine capable executing one ruby jruby application one interpreter jsr 292 supporting dynamically typed languages javatm platform proposes sun open source project multi language virtual machine aims prototype jsr first working prototype developed patch openjdk announced made available end august 2008 jruby team implemented dynamic invocation codebase dynamic invocation initially shipped 1.1.5 release primitive form version 1.7.0 enabled default java 8 builds table presents releases present significant steps jruby history aside versions mainly fixed bugs improved performance performance improvements also shown table every release usually brought improvements since early 2006 current jruby core team endeavored move jruby beyond simple c port support better performance aid eventual compilation java bytecode support end team set ambitious goal able run ruby rails unmodified using jruby process achieving goal jruby test suite expanded extent team gained confidence correctness jruby result toward end 2006 beginning 2007 began commit much complicated redesigns refactorings jruby core subsystems jruby designed work mixed-mode virtual machine ruby code either interpreted directly just-in-time compiled runtime java bytecode ahead-of-time compiled java bytecode execution october 2007 interpreted mode supported ruby constructs full aot/jit compiler available since version 1.1 compiler design allows interpreted compiled code run side-by-side well decompilation reoptimize outputting generated bytecode java class files jruby built-in support rails rspec rake rubygems embeds ffi subsystem allow use c libraries bundled gems also allows launching interactive ruby shell irb ruby mri netbeans ruby pack available netbeans 6 allows ide development ruby jruby well ruby rails two implementations ruby longer included netbeans 7.0 later jruby similar standard ruby interpreter except written java jruby features concepts including object-oriented programming dynamic-typing ruby key difference jruby tightly integrated java called directly java programs java significant footing development web applications one powerful feature jruby ability invoke classes java platform one must first load jruby java support calling require 'java following example creates java jframe jlabel jruby also allows user call java code using ruby-like underscore method naming refer javabean properties attributes jruby easily called java using either jsr 223 scripting java 6 apache bean scripting framework according benchmarks jruby faster alternatives since implementations vary much code loaded execution different methods measuring speed lead biased interpretations performance advantages time takes java virtual machine load often excluded execution times calculating benchmarks jruby significant architectural advantage able leverage jvm threads without constrained global interpreter lock similarly rubinius therefore achieving full parallelism within process ruby mri achieve despite leveraging os threads real mongrel web server application tested 2007 jruby performance better ruby mri 1.8 java virtual machine instantiated 2007 benchmark ruby implementations jruby faster ruby mri 1.8 tests yarv outperformed april 2014 computer language benchmarks game jruby 1.7.4 typically performance ruby mri 2.1.0 uses memory | [
2624,
3077,
5015,
631,
1532,
5369,
8170,
6428,
7347,
6002,
5571,
397,
3021,
6280,
3543,
4151,
7459,
1287,
401,
2487,
5235,
7460,
5408,
3889,
7109,
155,
7671,
952,
4185,
2519,
2520,
4997,
3915,
8137,
6586,
6156,
4909,
6778,
1989,
7135,
3... | Test |
3,880 | 9 | Le_Lisp:le lisp le lisp also le_lisp le-lisp programming language dialect language lisp developed french institute research computer science automation inria implementation language large scale integration vlsi workstation designed direction jean vuillemin le lisp also run various incompatible platforms mostly running unix operating systems used project main goals language powerful post-maclisp version lisp would portable compatible extensible efficient jérôme chailloux led le lisp team working emmanuel st. james matthieu devin jean-marie hullot 1980 dialect historically noteworthy one first lisp implementations available apple ii ibm pc | [
7878,
1445,
5019,
1820,
6796,
6087,
2915,
5734,
1478,
2218,
4704,
405,
5055,
5757,
6116,
2226,
1116,
6471,
7573,
2600,
5077,
1885,
5079,
1889,
6507,
795,
6876,
4759,
6888,
1557,
4789,
4423,
5494,
5501,
6210,
144,
4074,
4085,
7298,
5515,
... | Test |
3,881 | 9 | PROSE_modeling_language:prose modeling language prose mathematical 4gl virtual machine established holistic modeling paradigm known synthetic calculus aka metacalculus successor slang/cue simulation optimization language developed trw systems introduced 1974 control data supercomputers first commercial language employ automatic differentiation ad optimized loop instruction-stack cdc 6600 cpu although prose rich block-structured procedural language focus blending simultaneous-variable mathematical systems kinds system models distinct operator templates automate solve added procedural syntax automated system problems considered holistic unknowns simultaneous could reduced formulation solve piecewise algebra manipulation e.g substitution solved wholes wholeness also pertained algorithmic determinacy mathematical closure made solution convergence possible certain principle corrupted numerical instability since holistic problem models could independently automated solved due closure could blended higher wholes nesting one inside another manner subroutines users could regard ordinary subroutines yet semantically mathematical blending considerably complex mechanics subroutines iterative solution engine attached problem model calling operator template program hierarchy numerical solution process engine would take control would call problem model subroutine iteratively returning calling template system problem solved maybe iterative model-subroutine calls engine would invoke automatic differentiation formulas model holarchy respect model input-unknowns arguments defined calling template additional mechanisms performed semantics accommodate ubiquitous nesting holistic models nested solution prediction e.g numerical integration solution algorithm addition model formulas would also automatically differentiated since differentiation propagated via chain rule throughout integration initial conditions boundary conditions differentiation boundary conditions respect initial conditions called fréchet derivatives would performed enabled routine solution boundary-value problems iterative shooting methods using newton-method engines course time propagated differentiation could also performed respect arbitrary parameters differential equations shape integrated functions parameters could solved unknowns nest holarchy integration process significant convenience overall problem formulation inner nested problem search outer problem also search e.g optimization partial derivatives produced respect inner-search unknowns converted partial derivatives outer search via differential-geometry coordinate transformation also iterative process involving higher order differentiation sometimes different independent variables yet extended iterative differential-arithmetic processes totally hidden user hardly significant modeling task ordinary subroutines calls involved fact iterative number kind iterations indefinite whole sub-problem solved also part higher problem natural call problem nest holon dynamic entity perfectly fitted theory arthur koestler coined term done original prose documentation years koestler theory new somewhat controversial term later used ken wilber ratified koestler holon concepts complete modeling paradigm consisted three classes holons distinguished operator templates three operator templates created dynamic holons encapsulating equations model subroutine hierarchy could contain nested holons model subroutines could contain operator templates encapsulating sub-problems holon holarchy solver algorithm engine could interchanged others holon class extended arithmetic automatic differentiation ability dynamically differentiate numerical integration gave rise unique mode holarchy modeling illustrated figure 1 example problem originally fortran application rand report algorithm used optimization boundary-value problem applications report also published textbook described quasilinearization alternative dynamic programming invented author richard bellman fortran program appendix two textbook contains five times amount code 25-line prose program entirely embedded white boxes visible syntax figure 1 significant modeling versus programming discussion fortran program contains 14 loops whereas prose program contains loops another point make program simplification dynamic memory management could taken granted user return holon calling operator template holon destroyed memory freed use application actually trivial amount code required state problem prose program small iterative solution methodology hood solver engines ellipses figure 1 models seldom need loops spreadsheets modeling tools n't even example problem provides full encapsulation holon paradigm single application three holon types employed optimization searching highest level holarchy correlation searching restricted subset optimization searching middle holon system dynamics simulation innermost holon another prose program anatomy illustrated figure 2 somewhat larger application optimization cantilevered wing structure maximize lift subject structure weight constraints case ten coordinate dimensions optimization unknowns searched outer holon solver two outer holons hidden coordinate system unknowns search engine solves engines require partial derivatives downstream variables dependent upon unknowns evaluated automatic differentiation arithmetic derivatives outer coordinate system must computed derivatives inner coordinate system inner search engine converged found local solution differential-geometry coordinate transformation applied wing problem figure 2 downstream subprograms shown including integral quadrature function subprograms include numerical integration system dynamics differential equations model automatic differentiation arithmetic includes differentiation integration algorithm simulation engine quadrature solver evaluate derivatives boundary end-point integrated curves conditions respect initial conditions calculation possible via formal symbolic differentiation feasible finite difference approximation automatic differentiation exact chain-rule propagation feasible figure 3 shows generalized architecture holon profile showing visible modeling syntax invisible semantics architecture characteristic 5-step iteration process holon calculus problem-solving unit mathematically associated coordinate system dynamically created operation template operator solver engine either numerical predictor case simulation search engine case correlation optimization operand model procedure may holarchy subordinated holons essence holon metaphoric computation container like spreadsheet allowing procedural looping like ordinary algebraic language yet purpose frame algebraic formulas represent higher mathematics e.g differential equations algebraic formulas variables rates figures 4-7 show different holon classes simulation correlation optimization reflect architecture separating modeling science equations algorithmic solver engines art numerical approximation mathematics mentioned holon computation container like spreadsheet encapsulates set input algebraic formulas unlike spreadsheet formulas parts irreducible whole solved together unit involving succession approximations iterations spreadsheet involves single pass formula calculations may therefore thought degenerate reduced holon one involves single-pass calculations holon model elevates encapsulated system algebraic formulas higher problem archetype relating simultaneous unknowns definable solution condition single pass set formulas iterative calculus hood required converge multiple-pass approximations solution condition holon automates one three system-problem archetypes emerged higher math distinct class solution methods applicable interchangeable operators methods operate input formulas calculations guide successive approximations holon solution problem archetypes easily precipitate formula collections represent modeling natural phenomena used building blocks synthesize whole computation programs holarchies sequential nested holons used together alphabet archetypal problems become topology higher math modeling within algebraic programming language containing special semantic glue methodologies propagate calculus influence collections holons holons combine form greater wholes via alphabetic combination holarchies also tend become problem archetypes often precipitate natural phenomena modeling examples boundary-value problems solved combination correlation simulation holons prose introduced pantheon interchangeable solvers named mythical gods three engine categories solvers applied different numerical methods three engine categories depending upon nesting context applied simulation solvers janus mercury minerva merlin pegasus could nested automatic differentiation contexts correlation optimization overloaded automatic-differentiation arithmetic thus hybrid versions janisis isis janus gemini merlin neptune introduced would work efficiently automatic differentiation mode ordinary arithmetic mode differentiation internally turned greatly speeded iterative searches solvers like ajax mars jove zeus jupiter iteratively called models many times non-differentation mode various modes non-derivative search sub-steps applied | [] | Test |
3,882 | 7 | HP_Autonomy:hp autonomy hp autonomy previously autonomy corporation plc multinational enterprise software company founded cambridge united kingdom 1996 originally autonomy specialised analysis large scale unstructured big data becoming uk largest successful software business 2010 used combination technologies born research university cambridge developed variety enterprise search knowledge management applications using adaptive pattern recognition techniques centered bayesian inference conjunction traditional methods maintained aggressively entrepreneurial marketing approach controls described rod iron said include zero tolerance firing weakest 5 sales force quarter cosseting best sales staff like rock stars autonomy acquired hewlett-packard hp october 2011 deal valued autonomy 11.7 billion £7.4 billion premium around 79 market price widely criticized absurdly high botched strategy shift chaotic attempt rapidly reposition hp enhance earnings expanding high-margin software services sector within year major culture clashes became apparent hp written 8.8 billion autonomy value hp claims resulted accounting improprieties misrepresentations disclosure failures previous management successful fraud case brought cfo sushovan hussain previous management turn accused hp textbook example defensive stalling conceal evidence prior knowledge gross mismanagement undermining company noting public awareness since 2009 financial reporting issues even hp cfo disagreed price paid external observers generally state small part write-off appears due accounting mis-statements hp overpaid businesses previously hp recruited robert youngjohns ex-microsoft president north america take hp autonomy september 2012 worked towards turnaround expanding information management analytics software business though company integrating hp software autonomy remains singular operational business 2017 hp sold autonomy assets part wider deal british software company micro focus autonomy founded cambridge england michael lynch david tabizel richard gaunt 1996 spin-off cambridge neurodynamics firm specializing computer-based finger print recognition autonomy floated 1998 nasdaq exchange share price approximately £0.30 height dot-com bubble peak share price £30 december 2005 autonomy acquired verity inc. one main competitors approximately us 500 million 2005 autonomy also acquired neurodynamics may 2007 exercising option buy stake technology start blinkx inc combining consumer division autonomy floated blinkx valuation 250 million july 2007 autonomy acquired zantaz email archiving litigation support company 375 million october 2007 autonomy acquired meridio holdings ltd uk company based northern ireland specialised records management software £20 million 28 may 2008 kainos extended partnership autonomy high-end information processing information risk management irm deliver information governance solutions customer base january 2009 autonomy acquired interwoven niche provider enterprise content management software 775 million interwoven became autonomy interwoven autonomy imanage 2009 paul morland leading analyst started raising concerns autonomy exaggerated performance claims june 2010 autonomy announced acquire information governance business ca technologies terms sale disclosed 5 may 2011 mercedes formula one team announced 8 million sponsorship deal autonomy 8 july 2010 tottenham hotspur fc announced two-year sponsorship deal autonomy premier league kit 2011–12 season spurs premier league shirt featured autonomy augmented reality technology aurasma 16 may 2011 autonomy acquired iron mountain digital pioneer e-discovery online backup solutions provider 380 million iron mountain incorporated 18 august 2011 hewlett-packard announced would purchase autonomy us 42.11 per share transaction unanimously approved boards directors hp autonomy autonomy board recommended shareholders accept offer 3 october 2011 hp closed deal announcing acquired around 87.3 shares around 10.2 billion valuing company around 11.7 billion total may 2012 mike lynch left role autonomy ceo significant drop revenue previous quarter september 2012 robert youngjohns appointed svp gm autonomy/information management business unit november 2012 hewlett-packard announced taking 8.8 billion accounting charge claiming serious accounting improprieties outright misrepresentations autonomy share price fell decades low news however mike lynch counter-alleged problems due hp running autonomy citing internecine warfare within organization serious fraud office united kingdom u.s. securities exchange commission joined fbi investigating potential anomalies however january 2015 sfo closed investigation chance successful prosecution low three lawsuits brought shareholders hp fall value hp shares august 2014 united states district court judge threw proposed settlement autonomy previous management argued would collusive intended divert scrutiny hp executives responsibility knowledge fee 48 million april 2018 autonomy ex-cfo sushovan hussain charged us found guilty accounting fraud evidence lynch charged fraud november 30 january 2014 company announced one partners kainos integrated hp idol 10.5 new version hp autonomy ’ information analytics engine kainos electronic medical record platform evolve 31 october 2015 autonomy software products divided hp inc hpq hewlett packard enterprise hpe result hewlett-packard co separation hp inc assigned ownership largely consisting autonomy content management software components including teamsite qfiniti qfiniti managed services mediabin optimost explore hewlett packard enterprise retains ownership remaining software 2 may 2016 opentext acquires hp teamsite hp mediabin hp qfiniti hp explore hp aurasma hp optimost hp inc 170 million 1 september 2017 merged micro focus hp autonomy products include intelligent data operating layer idol allows search processing text taken structured data unstructured human information—including e-mail mobile data—whether originates database audio video text files streams processing information idol referred autonomy meaning-based computing hp autonomy offerings include api platform building data rich applications ease use quick deploy enterprise search solution built onto ondemand api platform june 2013 hp announced platform analyzing finding meaning big data petabytes structured unstructured information also aims identify information needed placed low cost storage even dumped components platform include january 2014 hp released new version hp idol strengthens integration several key components platform expanding upon idol ’ analytics reliability ease use cmswire reported new release lot hood catapult idol firmly center big data fray autonomy business primary offices cambridge sunnyvale california well major offices uk us canada france japan australia singapore germany smaller offices india throughout europe latin america | [
3427,
5735,
1134,
3764,
7759,
8005,
4736,
2278,
1581,
900,
4018
] | Test |
3,883 | 5 | Reverse_telnet:reverse telnet reverse telnet specialized application telnet server side connection reads writes data computer terminal line rs-232 serial port rather providing command shell host device typically reverse telnet implemented embedded device e.g terminal/console server ethernet network interface serial port use reverse telnet device ip-networked users use telnet access serially-connected devices past reverse telnet typically used connect modems external asynchronous devices today reverse telnet used mostly connecting console port router switch device client command line initiating reverse telnet connection might look like telnet 172.16.1.254 2002 example 172.16.1.254 ip address console device 2002 tcp port associated terminal line server | [
7765,
768
] | Validation |
3,884 | 4 | Attribute-based_access_control:attribute-based access control attribute-based access control abac also known policy-based access control defines access control paradigm whereby access rights granted users use policies combine attributes together policies use type attributes user attributes resource attributes object environment attributes etc. model supports boolean logic rules contain statements making request resource action example requestor manager allow read/write access sensitive data unlike role-based access control rbac employs pre-defined roles carry specific set privileges associated subjects assigned key difference abac concept policies express complex boolean rule set evaluate many different attributes attribute values set-valued atomic-valued set-valued attributes contain one atomic value examples role project atomic-valued attributes contain one atomic value examples clearance sensitivity attributes compared static values one another thus enabling relation-based access control although concept existed many years abac considered next generation authorization model provides dynamic context-aware risk-intelligent access control resources allowing access control policies include specific attributes many different information systems defined resolve authorization achieve efficient regulatory compliance allowing enterprises flexibility implementations based existing infrastructures attribute-based access control sometimes referred policy-based access control pbac claims-based access control cbac microsoft-specific term key standards implement abac xacml alfa xacml abac seen abac comes recommended architecture follows attributes anything anyone tend fall 4 different categories functions grammatical function policies statements bring together attributes express happen allowed policies abac granting denying policies policies also local global written way override policies examples include abac many policies like cater many different scenarios technologies historically access control models included mandatory access control mac discretionary access control dac recently role-based access control rbac access control models user-centric take account additional parameters resource information relationship user requesting entity resource dynamic information e.g time day user ip abac tries address defining access control based attributes describe requesting entity user targeted object resource desired action view edit delete ... environmental contextual information access control said attribute-based one standard implements attribute- policy-based access control xacml extensible access control markup language xacml defines architecture policy language request response scheme handle attribute management user attribute assignment object attribute assignment environment attribute assignment left traditional iam tools databases directories companies including every branch united states military started using abac basic level abac uses ‘ if/then/and ’ model protect data rather assigning data user take information anywhere please give hacker ability swipe file us department commerce made mandatory practice adoption spreading throughout several governmental military agencies concept abac applied level technology stack enterprise infrastructure example abac used firewall server application database data layer use attributes bring additional context evaluate legitimacy request access inform decision grant deny access important consideration evaluating abac solutions understand potential overhead performance impact user experience expected granular controls higher overhead abac used apply attribute-based fine-grained authorization api methods functions instance banking api may expose approvetransaction transid method abac used secure call abac policy author write following flow would follows one key benefits abac authorization policies attributes defined technology neutral way means policies defined apis databases reused application space common applications benefit abac process flow one described api section applies security databases long specific database vendors oracle vpd ibm fgac microsoft rls means achieve fine-grained abac-like security using abac possible define policies apply across multiple databases called dynamic data masking example would data security typically goes one step database security applies control directly data element often referred data-centric security traditional relational databases abac policies control access data table column field cell sub-cell using logical controls filtering conditions masking based attributes attributes data user session tools based deliver greatest level flexibility dynamically granting/denying access specific data element big data distributed file systems hadoop abac applied data layer control access folder sub-folder file sub-file granular attribute-based access control also applied big data systems like hadoop policies similar used previously applied retrieving data data lakes windows server 2012 microsoft implemented abac approach controlling access files folders achieved dynamic access control lists dacl security descriptor definition language sddl sddl seen abac language uses metadata user claims file folder control access gartner improving-runtime-authorization-maturity | [
1249,
6162,
5725,
7248,
1368,
3461,
2310,
2489,
3568,
5074,
1409,
6944,
3923
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.