node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,885
4
Dorothy_Blum:dorothy blum dorothy toplitzky blum february 21 1924 – october 1980 american computer scientist cryptanalyst worked national security agency predecessors 1944 death 1980 dorothy toplitzky born 1924 new york city austro-hungarian immigrant parents graduating brooklyn college 1944 joined cryptologic unit u.s. army remained organization world war ii became united states army security agency later national security agency nsa married nsa mathematician joseph blum 1950 later son 1950s blum worked nsa internal organization tasked keep ing abreast latest advances field computing recommended computer technologies could adapted cryptanalysis communications intelligence wrote computer software nsa spearheaded effort teach nsa employees write cryptanalytic programs began using fortran programming language three years public release 1957 throughout 1960s 1970s blum continued work field computer science helping design nsa computer systems automate processes 1972 became chief nsa computer operations organization c7 woman time organization management hierarchy appointed chief plans project development organization t4 telecommunications computer services organization 1977 also involved women nsa win group blum died cancer october 1980 aged 56 internal award nsa named 2004 inducted nsa hall honor official nsa biography states 36-year career blum significantly changed way nsa cryptanalysis also elected one top 100 outstanding women federal government
[ 2803, 1353 ]
Test
3,886
4
Security_BSides:security bsides security bsides commonly referred bsides series loosely affiliated information security conferences co-founded mike dahn jack daniel chris nickerson 2009 due overwhelming number presentation submissions black hat usa 2009 rejected presentations presented smaller group individuals time conference format matured released enable individuals start bsides conferences three event styles structured unconference hybrid structured event follows traditional conference model often times happens tandem larger conferences black hat rsa etc attendees typically intermingle attend one events talks submitted local event ahead time selected scheduled prior start conference unconference event style completely attendee driven attendees appear predetermined time discuss ideas collaboratively agree upon schedule look like day talks get attention conversation get added schedule
[ 1594, 5511, 7997 ]
Validation
3,887
5
H.248:h.248 gateway control protocol megaco h.248 implementation media gateway control protocol architecture providing telecommunication services across converged internetwork consisting traditional public switched telephone network pstn modern packet networks internet h.248 designation recommendations developed itu telecommunication standardization sector itu-t megaco contraction media gateway control protocol used earliest specifications internet engineering task force ietf standard published march 2013 itu-t entitled h.248.1 gateway control protocol version 3 megaco/h.248 follows guidelines published rfc 2805 april 2000 entitled media gateway control protocol architecture requirements protocol performs functions media gateway control protocol mgcp however formal standard mgcp informational status using different syntax symbolic representation two protocols directly interoperable complementary h.323 session initiation protocol sip protocols h.248 result collaboration megaco working group internet engineering task force ietf international telecommunication union telecommunication study group 16 ietf originally published standard rfc 3015 superseded rfc 3525 term megaco ietf designation megaco combines concepts mgcp media device control protocol mdcp mgcp originated combination simple gateway control protocol sgcp internet protocol device control ipdc itu took responsibility protocol maintenance ietf reclassified publications historic rfc 5125 itu published three versions h.248 recent september 2005 h.248 encompasses base protocol specification h.248.1 many extensions defined throughout h.248 sub-series h.248/megaco due master-slave nature describe establishment calls across domains across media gateway controllers h.248/megaco used communication downward media gateways constitute complete system architecture requires protocols communication multiple mgcs device handles call control function referred intelligent media gateway controller device handles media referred relatively unintelligent media gateway h.248 defines protocol media gateway controllers control media gateways support multimedia streams across ip networks public switched telephone network pstn typically used providing voice internet protocol voip services like voice fax ip networks pstn entirely within ip networks types devices targeted control h.248/megaco low level control structure h.248 generally viewed complementary h.323 session initiation protocol sip media gateway controller mgc uses h.248/megaco manage media establishment control number media gateways mgs voip protocols sip h.323 used one communication controllers sip perspective combination mgc mgs treated together sip gateway h.248/megaco model describes connection model contains logical entities objects within media gateways mgs controlled media gateway controller main entities contexts terminations ip multimedia subsystem ims media gateway control function mgcf control media gateways mgw send receive call pstn circuit switched cs networks using h.248 mgcf uses sip messages interact call session control function cscf breakout gateway control function bgcf although modeling media gateway differs h.248/megaco compared mgcp similarity semantics commands two specifications almost one-to-one mapping commands megaco mgcp example create connection command mgcp equivalent add termination command megaco modify connection command mgcp equates modify termination command megaco delete connection command equates subtract termination command megaco h.248/megaco model complex media gateway control protocol mgcp model provides flexibility defining media control example mgcp call use endpoint mode conference manage stream mixing achieve fine grain control h.248/megaco managing media streams h.248/megaco model simplifies connection setup within mg entities outside mg simplifies mechanism media gateway controller mgc specify associated media streams well specify direction media flow h.248/megaco therefore able provide greater application level support mgcp example setting multi-party conference h.248 merely involves adding several terminations context case mgcp however mgc needs establish several connections special type endpoint called conference bridge following main differences megaco/h.248 mgcp
[ 5361, 1988, 2534, 7170 ]
Validation
3,888
7
Sqrrl:sqrrl sqrrl data inc. american company founded 2012 markets software big data analytics cyber security company roots united states intelligence community national security agency sqrrl involved creation actively contributes apache accumulo related apache projects sqrrl ’ primary product threat hunting platform designed active detection advanced persistent threats january 2018 sqrrl acquired amazon sqrrl ’ founders previously worked national security agency ceo co-founder oren falkowitz formerly cybercommand co-founder ely kahn former director us cybersecurity policy sqrrl platform relies open-source apache accumulo technology accumulo began development 2008 went open source 2011 sqrrl founded summer 2012 use accumulo cybersecurity sqrrl founded washington d.c. quickly moved cambridge massachusetts august 2012 sqrrl announced 2 million seed round led accomplice formerly atlas venture matrix partners october 2013 sqrrl received 5.2 million funding led accomplice matrix partners february 2015 sqrrl raised another 7.1 million funding linked data analysis toolkit january 24 2018 reported sqrrl acquired amazon would become part amazon web services sqrrl ’ main product visual cyber threat hunting platform combines technology link analysis user behavior analytics user entity asset event data combined behavior graph users navigate respond security incidents well search undetected threats sqrrl integrates security information event management siem systems ibm qradar platform also integrates machine learning risk-scoring sqrrl mentioned cyber security industry marketing sc mag ’ top innovator award 2015 2016 2017 cybersecurity excellence award new threat hunting category
[ 5455, 2434, 7359, 5064, 7924, 6219 ]
Test
3,889
2
RubyGems:rubygems rubygems package manager ruby programming language provides standard format distributing ruby programs libraries self-contained format called gem tool designed easily manage installation gems server distributing created chad fowler jim weirich david alan black paul brannan richard kilmer rubyconf 2004 interface rubygems command-line tool called gem install manage libraries gems rubygems integrates ruby run-time loader help find load installed gems standardized library folders though possible use private rubygems repository public repository commonly used gem management public repository helps users find gems resolve dependencies install rubygems bundled standard ruby package ruby 1.9 development rubygems started november 2003 released public march 14 2004 pi day 2004 2010 default public repository gems moved http //gems.rubyforge.org http //rubygems.org still use also rubygems development moved github 2010 though rubygems existed since ruby 1.8 part standard ruby distribution ruby 1.9 previously compatibility rubygems ruby varied many versions rubygems almost fully incompatible many versions ruby versions key features unusable example ruby 1.9 came rubygems 1.3.7 standard distribution rubygems 1.4.x compatible ruby 1.9 meant updating rubygems ruby 1.9 possible rubygems 1.5.0 released 2011 two years first stable release ruby 1.9 compatibility issues led rapid development rubygems switching 4–6 week release schedule reflected 38 releases 2004 2010 117 releases 2011 2016 45 versions released 2013 highest number releases year rubygems every gem contains name version platform gems work ruby designed particular platform based cpu architecture operating-system type version gem consists code organization follows following structure gem called gem_name gems packages similar ebuilds contain package information along files install gems usually built .gemspec files yaml files containing information gems however ruby code may also build gems directly practice usually used rake codice_1 command used build upload download install gem packages rubygems similar apt-get portage yum npm functionality installation uninstallation listing installed gems listing available gems e.g create rdoc documentation gems adding trusted certificate download install gem search available gems e.g gem command may also used build maintain codice_5 codice_6 files build codice_6 codice_5 file since ruby gems run code application may lead various security issues due installation malicious gems creator malicious gems may able compromise user system server number methods developed counter security threat
[ 5629, 6249, 1532, 5369, 6609, 1260, 5726, 7619, 5912, 6428, 3366, 3368, 4778, 5571, 213, 2211, 397, 3021, 1478, 4151, 4059, 1287, 3879, 6743, 3559, 6922, 2771, 326, 3562, 2594, 7848, 4441, 1406, 7671, 1684, 952, 523, 163, 1598, 6312, 81...
Validation
3,890
4
Nick_Levay:nick levay nick levay also known rattle american computer security expert hacker president ngo-isac former chief security officer council foreign relations carbon black computer security company boston area 2008 2013 director technical operations information security center american progress public policy research organization rattle subject pioneering profile hacker culture published nashville tennessee 1999 2001 tom cross co-founded industrial memetics built memestreams web log early social networking web site rattle presented phreaknic annual hacker technology convention held nashville 2005 2011 2011 talk counter espionage strategy tactics
[ 2106, 3486, 1805, 5978 ]
Test
3,891
6
Global_Storage_Architecture:global storage architecture gsa global storage architecture distributed file system created ibm replace andrew file system dce distributed file system
[ 2704, 2755 ]
Test
3,892
5
Token_passing:token passing local area network token passing channel access method signal called token passed nodes authorize node communicate contrast polling access methods pre-defined master node well-known examples token ring arcnet range others including fddi fiber distributed data interface popular early mid 1990s token passing schemes degrade deterministically load key reason popular industrial control lans map manufacturing automation protocol advantage contention based channel access csma/cd early ethernet collisions eliminated channel bandwidth fully utilized without idle time demand heavy disadvantage even demand light station wishing transmit must wait token increasing latency types token passing schemes need explicitly send token systems process passing token implicit example channel access method used contention free time slots itu-t g.hn standard high-speed local area networking using existing home wires power lines phone lines coaxial cable
[ 4801, 3314, 2061, 3207 ]
Validation
3,893
9
QUIKSCRIPT:quikscript quikscript simulation language derived simscript based 20-gate
[ 4033 ]
Train
3,894
1
Orbada:orbada orbada free tool database developers sql developers administrators software includes many wizards special features help database administrator job using java jdbc drivers allows users connect multiple databases orbada provided dedicated plug-in databases oracle sqlite firebird hsqldb derbydb help syntax highlighting database browser profiler tool still developed additional plug-ins program distributed gnu general public license
[ 7213, 3863, 3915, 6538, 5571, 2054, 6386 ]
Test
3,895
9
Programming_language_theory:programming language theory programming language theory plt branch computer science deals design implementation analysis characterization classification programming languages individual features falls within discipline computer science depending affecting mathematics software engineering linguistics even cognitive science well-recognized branch computer science active research area results published numerous journals dedicated plt well general computer science engineering publications ways history programming language theory predates even development programming languages lambda calculus developed alonzo church stephen cole kleene 1930s considered world first programming language even though intended model computation rather means programmers describe algorithms computer system many modern functional programming languages described providing thin veneer lambda calculus many easily described terms first programming language invented plankalkül designed konrad zuse 1940s publicly known 1972 implemented 1998 first widely known successful high-level programming language fortran developed 1954 1957 team ibm researchers led john backus success fortran led formation committee scientists develop universal computer language result effort algol 58 separately john mccarthy mit developed lisp programming language based lambda calculus first language origins academia successful success initial efforts programming languages became active topic research 1960s beyond key events history programming language theory since several fields study either lie within programming language theory profound influence many considerable overlap addition plt makes use many branches mathematics including computability theory category theory set theory formal semantics formal specification behaviour computer programs programming languages three common approaches describe semantics meaning computer program denotational semantics operational semantics axiomatic semantics type theory study type systems tractable syntactic method proving absence certain program behaviors classifying phrases according kinds values compute many programming languages distinguished characteristics type systems program analysis general problem examining program determining key characteristics absence classes program errors program transformation process transforming program one form language another form comparative programming language analysis seeks classify programming languages different types based characteristics broad categories programming languages often known programming paradigms metaprogramming generation higher-order programs executed produce programs possibly different language subset original language result domain-specific languages languages constructed efficiently solve problems particular part domain compiler theory theory writing compilers generally translators programs translate program written one language another form actions compiler traditionally broken syntax analysis scanning parsing semantic analysis determining program optimization improving performance program indicated metric typically execution speed code generation generation output equivalent program target language often instruction set cpu runtime systems refers development programming language runtime environments components including virtual machines garbage collection foreign function interfaces conferences primary venue presenting research programming languages well known conferences include symposium principles programming languages popl programming language design implementation pldi international conference functional programming icfp international conference object oriented programming systems languages applications oopsla international conference architectural support programming languages operating systems asplos notable journals publish plt research include acm transactions programming languages systems toplas journal functional programming jfp journal functional logic programming higher-order symbolic computation
[ 3931, 3254, 7152, 1853, 1854, 3300, 1889, 2614, 6497, 6507, 5801, 7627, 4405, 7256, 2662, 2311, 6922, 515, 6223, 1600, 6949, 1607, 4105, 1616, 1997, 4472, 7707, 2740, 7352, 1274, 3788, 5571, 6995, 920, 6642, 5583, 7009, 7382, 3810, 2054, ...
Test
3,896
4
Igor_Muttik:igor muttik igor muttik born 1962 russia computer security expert researcher inventor dr. igor muttik senior principal research architect mcafee part intel corporation since 2011 started researching computer malware 1980s anti-virus industry infancy muttik holds phd degree physics mathematics moscow state university member caro computer antivirus research organization since 1994 lives uk worked virus researcher dr. solomon ’ software since 1998 muttik running mcafee ’ anti-malware research emea switched architectural role 2002 2008 one co-founders amtso anti-malware testing standards organization board amtso 3 years muttik also co-founder industry connections security group icsg part ieee chair taggant system working group vice-chair icsg cmx clean file metadata exchange working groups taggant system cmx part amss anti-malware support service regular speaker major international security conferences like black hat briefings rsa conference def con virus bulletin eicar muttik visiting professor information security group royal holloway university london heading mcafee work security research mobile devices funded epsrc mobsec acid appguarden projects current work focused architecture security solutions smart devices hardware-assisted security technologies may 2009 muttik blog risks associated use software packers caused criticism rob rosenberger despite incident muttik working closely today several software companies developing software packers like themida taggant system
[ 496, 1594, 7748, 25, 4171, 1705, 5511 ]
Test
3,897
7
Okta_(identity_management):okta identity management okta inc. publicly traded identity access management company based san francisco provides cloud software helps companies manage secure user authentication modern applications developers build identity controls applications website web services devices founded 2009 initial public offering 2017 valued 6 billion okta sells six services including single sign-on solution allow users log variety systems using one centralized process example company claims ability log gmail workday salesforce slack one login also offers api authentication services okta services built top amazon web services cloud january 2019 okta ceo announced company 100 million registered users okta founded 2009 current okta ceo founder todd mckinnon previously served senior vice president engineering salesforce prior salesforce held various roles peoplesoft founders include okta coo frederic kerrest also previously salesforce 2015 company raised 75 million venture capital andreessen horowitz greylock partners sequoia capital valuation 1.2 billion previously raised 150 million across earlier funding rounds 2017 initial public offering raised additional 187 million. /ref traded first day time ipo sequoia capital biggest shareholder 21.2 percent stake company headquartered san francisco also offices san jose bellevue toronto washington d.c. london amsterdam sydney paris stockholm okta primarily targets enterprise businesses current customers include jetblue nordstrom mgm resorts international u.s. department justice runs annual “ oktane ” user conference recently featured former president barack obama keynote speaker
[ 69, 7037, 5064 ]
Test
3,898
9
Comparison_of_programming_languages_(array):comparison programming languages array comparison programming languages array compares features array data structures matrix processing 48 various computer programming languages following list contains syntax examples determine dimensions index first element last element size elements note particularly languages index zero others index one least since dijkstra famous essay zero-based indexing seen superior new languages tend use following list contains syntax examples access single element array following list contains syntax examples range element array accessed following table compiled languages ada fortran scripting languages idl matlab s-lang native support vectorized operations arrays example perform element element sum two arrays produce third necessary write addition support vectorized arithmetic relational operations languages also vectorize common mathematical functions sine example array result array whose elements sine corresponding elements array vectorized index operations also supported example one would use fortran create arrays even odd entries array another common use vectorized indices filtering operation consider clipping operation sine wave amplitudes larger 0.5 set 0.5 using s-lang done
[ 361, 2087, 5363, 2451, 5983, 1345, 1445, 4302, 5639, 6882, 7333, 993, 109, 5288, 5117, 6428, 381, 2740, 8082, 3368, 304, 4053, 6277, 2661, 5932, 7005, 7460, 4705, 666, 6029, 3981, 4070, 1114, 4164, 5855, 5948, 5506, 7844, 2803, 5510, 17...
Validation
3,899
4
Lucky_Thirteen_attack:lucky thirteen attack lucky thirteen attack cryptographic timing attack implementations transport layer security tls protocol use cbc mode operation first reported february 2013 developers nadhem j. alfardan kenny paterson information security group royal holloway university london novel variant serge vaudenay padding oracle attack previously thought fixed uses timing side-channel attack message authentication code mac check stage tls algorithm break algorithm way fixed previous attempts mitigate vaudenay attack sense attacks pose significant danger ordinary users tls current form however truism attacks get better time anticipate improvements attacks entirely new attacks may yet discovered — nadhem j. alfardan kenny paterson researchers examined free software implementations tls found examined products potentially vulnerable attack tested attacks successfully openssl gnutls researchers applied responsible disclosure worked software vendors software updates mitigate attacks available time publication martin r. albrecht paterson since demonstrated variant lucky thirteen attack amazon s2n tls implementation even though s2n includes countermeasures intended prevent timing attacks
[ 794, 363, 887, 6795, 1173, 1460, 2560, 5824, 8189, 8093, 6540, 5399, 6458, 6553, 2587, 4071, 7567, 5765, 7925, 2691, 6049, 4990, 7214, 3588, 1059, 1513, 2620, 359 ]
Test
3,900
9
Mod_lisp:mod lisp mod_lisp extension module apache http server enables apache interface application servers written lisp making possible dynamically generate web pages provide web applications lisp programs unlike mod_* projects mod_perl mod_python mod_lisp embed lisp interpreter apache concept closer fastcgi handling requests serializing textual representation sending socket persistent lisp program sending lisp system response client client may web browser likely reverse proxy server server interacts user browser source freebsd style license lisp examples pre-compiled binaries freebsd linux win32 available mod_lisp web site
[ 6986, 6991, 3290, 578, 3383, 6029, 8006, 4082, 4445, 4543, 5432, 6489, 6059, 6858, 87, 6787 ]
Test
3,901
2
Windows_USER:windows user windows user component microsoft windows operating system provides core functionality building simple user interfaces component existed versions windows includes functionality window management message passing input processing standard controls windows user provides large part core user experience microsoft windows historically responsible gradually windows become larger better factored windows user cooperated components provide functionality windows user implements abstractions used build windows applications include hwnd basic unit visual display input windows developer platform visual elements either hwnds live part larger hwnd many functions windows user manipulate properties hwnds size position title hwnd also communication channel wndproc window procedure delivery messages windows managed tree desktop window root hierarchy child windows usually always visually contained within parents applications operating system communicate hwnds using messages window message combination target hwnd message code details mouse position combining calls windows user right way windows application processes messages core windows message loop including calls getmessage translatemessage dispatchmessage core windows application developer functionality related windows user provided c header file winuser.h 16-bit versions windows windows user implemented file called user.exe file extension misnomer windows user fact always dynamic link library 32-bit versions windows 32-bit version windows user called user32.dll located system32 directory compatibility 16-bit applications provided modified version user.exe also present 64-bit versions windows 64-bit implementation windows user called user32.dll located system32 directory modified 32-bit version also called user32.dll present syswow64 directory
[ 7879, 3937, 3263, 378, 2198, 6096, 1840, 1475, 7553, 7195, 5410, 7564, 2953, 6840, 422, 6844, 1128, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, ...
Test
3,902
1
Single_source_of_truth:single source truth information systems design theory single source truth ssot practice structuring information models associated data schema every data element mastered edited one place possible linkages data element possibly areas relational schema even distant federated databases reference locations data refer back primary source truth location updates data element primary location propagate entire system without possibility duplicate value somewhere forgotten deployment ssot architecture becoming increasingly important enterprise settings incorrectly linked duplicate de-normalized data elements direct consequence intentional unintentional denormalization explicit data model pose risk retrieval outdated therefore incorrect information common example would electronic health record imperative accurately validate patient identity single referential repository serves ssot duplicate representations data within enterprise would implemented use pointers rather duplicate database tables rows cells ensures data updates elements authoritative location comprehensively distributed federated database constituencies larger overall enterprise architecture ssot systems provide data authentic relevant referable ideal implementation ssot described rarely possible enterprises many organisations multiple information systems needs access data relating entities e.g. customer often systems purchased off-the-shelf vendors modified non-trivial ways various systems therefore needs store version common data entities therefore system must retain copy record hence immediately violating ssot approach defined example erp enterprise resource planning system sap oracle e-business suite may store customer record crm customer relationship management system also needs copy customer record part warehouse dispatch system might also need copy customer data e.g. shipping address cases vendors support modifications always possible replace records pointers ssot organisations one information system wishing implement single source truth without modifying one master system store pointers systems entities three supporting technologies commonly used enterprise service bus esb allows number systems organisation receive updates data changed another system implement single source truth single source system correct data entity must identified changes entity creates updates deletes published via esb systems need retain copy data subscribe update update records accordingly given entity master source must identified sometimes called golden record given system could publish source truth information particular entity e.g. customer also subscribe updates another system information entity e.g. product alternative approach point-to-point data updates become exponentially expensive maintain number systems increases approach increasingly favour architecture mdm system act source truth given entity might necessarily alternative source truth another system typically mdm acts hub multiple systems many could allow source truth updates different aspects information given entity example crm system may source truth aspects customer updated call centre operator however customer may example also update address via customer service web site different back-end database crm system mdm application receives updates multiple sources acts broker determine updates regarded authoritative golden record syndicates updated data subscribing systems mdm application normally requires esb syndicate data multiple subscribing systems customer data integration cdi common application master data management sometimes abbreviated cdi-mdm 4554 primary purpose data warehouse support reporting analysis data combined multiple sources fact data combined according business logic embedded data transformation integration processes means data warehouse often used de facto ssot generally however data available data warehouse used update systems rather dw becomes single source truth reporting multiple stakeholders context data warehouse correctly referred single version truth since versions truth exist operational data sources data originates dw simply reporting mechanism data loaded operational systems software design schema business logic components often repeated multiple different contexts version refers source code address problem concepts ssot also applied software development principals using processes like recursive transcompiling iteratively turn single source truth many different kinds source code match structurally derived ssot
[ 8174, 2124 ]
Validation
3,903
6
El_Torito_(CD-ROM_standard):el torito cd-rom standard el torito bootable cd specification extension iso 9660 cd-rom specification designed allow computer boot cd-rom announced november 1994 first issued january 1995 joint proposal ibm bios manufacturer phoenix technologies according el torito specification 32-bit cpu pc bios search boot code iso 9660 cd-rom standard allows booting two different modes either hard disk emulation boot information accessed directly cd media floppy emulation mode boot information stored image file floppy disk loaded cd behaves virtual floppy disk useful computers built 1999 designed boot floppy drive modern computers emulation mode generally reliable method bios assign bios drive number cd drive drive number int 13h assigned 80 hard disk emulation 00 floppy disk emulation arbitrary number bios provide emulation emulation allows older operating systems booted cd making appear booted hard floppy disk el torito also used produce cds boot linux operating systems including grub bootloader cd following multiboot specification el torito spec alludes mac platform id apple computers n't use according legend el torito cd/dvd extension iso 9660 gained name design originated el torito restaurant irvine california 33.684722 -117.852547 supported claim jack allweiss founder future domain inc. states future domain helped establish standard initial two authors curtis stevens phoenix technologies stan merkin ibm
[ 4496, 5384, 5128, 5571, 5656, 578, 1992, 3554, 6051, 4271, 1052, 3672, 2349, 788 ]
Validation
3,904
3
Web_interoperability:web interoperability web interoperability producing web pages viewable standard compatible web browsers various operating systems windows macintosh linux devices personal computers pcs pdas mobile phones tablets based latest web standards term originated web interoperability pledge promise adhere current html recommendations promulgated world wide web consortium w3c wip w3c initiative started run zdnet anchordesk quite independently issue known cross browsing browser war internet explorer netscape windows internet explorer dominant browser modern web browsers mozilla firefox opera safari supported web standards backward compatibility internet explorer many web pages supported non-standard html tags dom handling script yet well platform-dependent techniques activex harmful web accessibility device independence various activities example web standards project mozilla technology evangelism web standards group also educational activities web essential conference
[ 2451, 5984, 6991, 4759, 5571, 2773, 6172, 578, 87 ]
Validation
3,905
3
Address_space:address space computing address space defines range discrete addresses may correspond network host peripheral device disk sector memory cell logical physical entity software programs save retrieve stored data unit data must address individually located else program unable find manipulate data number address spaces available depend underlying address structure usually limited computer architecture used address spaces created combining enough uniquely identified qualifiers make address unambiguous within address space person physical address address space would combination locations neighborhood town city country elements address space may element address different addresses said space reference different entities example could multiple buildings address 32 main street different towns demonstrating different towns different although similarly arranged street address spaces address space usually provides allows partitioning several regions according mathematical structure case total order memory addresses simply chunks nested domain hierarchies appear case directed ordered tree domain name system directory structure similar hierarchical design postal addresses internet example internet assigned numbers authority iana allocates ranges ip addresses various registries order enable manage parts global internet address space uses addresses include limited following another common feature address spaces mappings translations often forming numerous layers usually means higher-level address must translated lower-level ones way example file system logical disk operates linear sector numbers translated absolute lba sector addresses simple cases via addition partition first sector address disk drive connected via parallel ata must converted logical cylinder-head-sector address due interface historical shortcomings converted back lba disk controller finally physical cylinder head sector numbers domain name system maps names network-specific addresses usually ip addresses turn may mapped link layer network addresses via address resolution protocol also network address translation may occur edge different ip spaces local area network internet iconic example virtual-to-physical address translation virtual memory different pages virtual address space map either page file main memory physical address space possible several numerically different virtual addresses refer one physical address hence physical byte ram also possible single virtual address maps zero one one physical address
[ 4662, 4295, 2549, 5021, 5027, 5041, 3635, 1104, 7554, 4706, 1855, 3646, 416, 5079, 4006, 5784, 6856, 2617, 6160, 2633, 5114, 839, 6922, 4810, 852, 4438, 858, 8026, 2350, 3751, 1994, 1254, 8066, 6976, 5911, 6984, 1640, 3797, 4882, 2043, ...
Test
3,906
4
Commvault:commvault commvault publicly traded data protection information management software company headquartered tinton falls new jersey formed 1988 development group bell labs later became business unit network systems incorporated 1996 commvault software used data backup recovery cloud infrastructure management retention compliance commvault business split software licensing services march 1998 bob hammer al bunte joined commvault chairman president ceo vice president coo respectively feb. 5 2019 sanjay mirchandani replaced retiring hammer mirchandani joined commvault puppet oregon-based automation company resided ceo commvault software enterprise-level data platform contains modules back restore archive replicate search data built ground-up single platform unified code base data protected installing agent software physical virtual hosts use operating system application native apis protect data consistent state production data processed agent software client computers backed data manager mediaagent disk tape cloud storage data management activity environment tracked centralized server commserve managed administrators central user interface end users access protected data using web browsers mobile devices 2018 commvault began sell hyperscale backup appliance appliance commvault software pre-integrated hardware customers install directly data centers commvault provides consulting services customers commvault advises customers setting new data management systems architecture design implementation monitoring remote managed service commvault manages software production customers
[ 1081, 7838 ]
Test
3,907
2
Cairo_(operating_system):cairo operating system cairo code name project microsoft 1991 1996 charter build technologies next generation operating system would fulfill bill gates vision information fingertips cairo never shipped although portions technologies since appeared products cairo announced 1991 microsoft professional developers conference jim allchin demonstrated publicly including demo system attendees use 1993 cairo/win95 pdc microsoft changed stance cairo several times sometimes calling product times referring collection technologies cairo used distributed computing concepts make information available quickly seamlessly across worldwide network computers windows 95 user interface based initial design work done cairo user interface dce/rpc shipped windows nt 3.1 content indexing part internet information server windows desktop search remaining component object file system planned implemented form winfs part windows vista development cancelled june 2006 technologies merged microsoft products microsoft sql server 2008 also known codename katmai subsequently confirmed interview bill gates microsoft planned migrate applications like windows media player windows photo gallery microsoft office outlook etc use winfs data storage back-end
[ 444, 448, 4751, 2452, 458, 5101, 4759, 5637, 6256, 7616, 1536, 5108, 7715, 3180, 7172, 5648, 3187, 2472, 4500, 4687, 1097, 5571, 5313, 224, 6294, 1668, 4524, 6380, 7660, 3039, 8118, 2329, 3048, 6136, 2066, 5781, 2885, 5872, 6399, 6580, ...
Test
3,908
5
LocalTalk-to-Ethernet_bridge:localtalk-to-ethernet bridge localtalk-to-ethernet bridge network bridge joins physical layer appletalk networking used previous generations apple computer products ethernet network important class products late 1980s early 1990s ethernet support became universal mac lineup localtalk-to-ethernet bridges performed appletalk bridging others also able bridge protocols using ad-hoc standards one example macip system allowed localtalk-based macs send receive tcp/ip internet packets using bridges go-between hardware devices software mactcp era 1995 software open transport era 1995
[ 4094, 3072 ]
Train
3,909
1
Independent_Safeguarding_Authority:independent safeguarding authority independent safeguarding authority isa non-departmental public body england northern ireland wales existed 1 december 2012 merged criminal records bureau crb form disclosure barring service dbs isa created labour government 2007-2010 tabloid media campaign decision set isa followed inquiry headed sir michael bichard set wake soham murders isa oversee new vetting barring scheme england wales northern ireland required working vulnerable groups undergo enhanced vetting procedure allowed commence relevant duties 15 june 2010 new coalition government home secretary theresa may announced plans new applicants jobs working children vulnerable along changing posts would register independent safeguarding authority halted vetting barring scheme would severely scaled back save uk taxpayer around £100 million year home secretary went say protection children vulnerable adults would focus upon common sense rather measures labour introduced said got actually trust people philosophy behind setting isa based upon assumption assumed guilty sense proven innocent told able work children review vetting barring scheme published 11 february 2011 made recommendations merger criminal records bureau independent safeguarding authority one non-departmental public body responsible barring individuals completing criminal record checks protection freedoms act new scheme require registration cases details retained database exception barred whether basis crime basis 'soft intelligence e.g dismissal employer led continued criticism variety organizations bichard report published 22 june 2004 made 31 recommendations recommendation 19 called new registration scheme stated new arrangements introduced requiring wish work children vulnerable adults registered register – perhaps supported card licence – would confirm known reason individual work client groups new register would administered central body would take decision subject published criteria approve refuse registration basis information made available police agencies responsibility judging relevance police intelligence deciding person ’ suitability would lie central body note recommendation use double-negative known reason individual work client groups say isa inception designed clear individuals suitable work vulnerable groups remove pose known risk proposals implement recommendations put public consultation 5 april 2005 results exercise announced rt hon ruth kelly secretary state department education skills 19 january 2006 translated primary legislation safeguarding vulnerable groups act 2006 received royal assent 8 november 2006 within act isa referred independent barring board known isa since august 2007 formally renamed following royal assent policing crime bill 2009 safeguarding vulnerable groups act covers england wales comparable legislation passed cover northern ireland scotland department children schools families known held consultations along creating isa safeguarding vulnerable groups act 2006 defines two categories work whether paid fall within scope act regulated controlled activity regulated activity primary area work covered act broadly deals direct contact vulnerable groups specifically regulated activity covers activity involves contact children vulnerable adults specified nature e.g teaching training care supervision advice treatment transport activity allowing contact children vulnerable adults specified place e.g school children ’ home etc. activity regulated activity must take place frequent intensive basis regulated activity also covers fostering childcare adoption child defined anyone 18 except employment settings age limit 16 addition number defined office holders position prescribed post-holder deemed engaging regulated activity irrespective actual contact vulnerable groups list includes people local authority director children ’ services trustees children ’ charities school governors distinction made paid voluntary work duties responsibilities regulated activity organisation providing activity although serious criminal offence engage regulated activity barred individuals engage regulated activity required register isa prominent example involved domestic employment individuals required register isa employed parents work children vulnerable adult arranges individuals provide care homes examples domestic employment would include groups private tutors employed directly parents individuals involved direct payments scheme policy confirmed government response isa scheme consultation document may 2008 controlled activity much limited area work tightly defined safeguarding vulnerable groups act controlled activity applies mandatory check isa registration status individuals controlled activity although possible employ barred person providing sufficient safeguards put place isa functioned decision-making element new vetting barring scheme application process monitoring functions run criminal records bureau largely retains functions 2012 entirely merged crb operational vetting barring scheme originally designed would required engaged regulated controlled activity register registration status checked would possible 'opt-out scheme would criminal offences non-compliance employer employee apply case barred individual seeks attains work successful original application process would provided unique reference number employers would verify potential employee membership allowing commence duties via free online check estimates time stated number would required register would approximately 11.3 million people quarter adult population criticised press 2009 proposal create intrusive database ever created democracy described later initial proposals withdrawn press hostility led government creation singleton review 2009 subsequent review led eileen munro 2010 cost registration originally set £64 per person except volunteers would free charge fees also withdrawn requirement register abandoned 2010 point isa barred list reshaped simply list barred accessible employers certain others akin predecessor 'list 99 definition volunteer remains used crb volunteer person engaged activity involves spending time unpaid except travelling approved out-of-pocket expenses something aims benefit someone individuals groups addition close relatives aspects original design retained since singleton review isa owns maintains two lists one covering children sector one cover adults barred working vulnerable groups replaced previous barred lists list 99 protection children act 1999 poca scheme relating protection vulnerable adults pova disqualification orders inclusion barred lists result either automatic bar following police caution conviction following discretionary bar typically following dismissal resignation dismissal possible following act gross misconduct work although potential reasons secondary legislation decisions taken isa isa base decisions upon information range sources including limited held police locally police national computer local authorities social services regulatory organisations general medical council general teaching council england supervisory authorities ofsted also receive cases directly employers employer referrals constitute largest number cases considered discretionary barring receive cases directly individuals cases clear decisions escalated within isa final decisions made board chaired former chief executive barnardo roger singleton isa able consider information led cautions convictions include unproven allegations former employers professional bodies members public stories press however referral information allegations lead automatic inclusion isa barred lists barring decision made individual given information decision based opportunity explain case however hearing process caused controversy see case workers allowed undertake appropriate research internet chatrooms social networking websites although published guidance isa decision making process safeguarding vulnerable groups act 2006 state isa satisfied relevant conduct occurred able consider factor safeguarding vulnerable groups act 2006 defines relevant conduct philosophic burden proof whether event occurred balance probability used civil trials rather beyond reasonable doubt required criminal trials case assessment within risk factors obsession sex violence presence severe emotional loneliness and/or inability manage/sustain emotionally intimate relationships age-appropriate adults links anti-social peers presence impulsive chaotic unstable lifestyle using substances sex cope stress considered relation relevant conduct appeal inclusion means administrative court judicial review recent case demonstrates court minded de-register individual bar lawful disproportionate sb v independent safeguarding authority 2011 ukut 404 aac 04 october 2011 decision reflects similar decisions family criminal law regarding risk assessment conviction sexual offences isa barred lists performed separate albeit related role crb disclosure isa decision-making process considered information relating potential risk individual poses vulnerable groups using sources go beyond held police whereas crb disclosure may contain details offences may lead bar example drink driving may pertinent given role driving school bus isa-registration replace crb disclosures 2012 isa crb merged disclosure barring service dbs march 2009 elements vetting barring scheme begun rolled stages linked series pieces secondary legislation safeguarding vulnerable groups act 2006 isa came existence 2 january 2008 31 march 2008 isa began advising ministers barring decisions taken ministers current schemes 20 january 2009 barring decisions england wales began taken isa taking responsibility secretary state extended northern ireland 13 march 2009 20 february 2009 detailed guidance isa decision-making process published 12 october 2009 increased safeguards came effect around five million jobs voluntary positions – including national health service jobs – covered barring arrangements additional safeguards original intention 26 july 2010 new entrants roles working vulnerable groups switching jobs new provider within sectors would able register vbs assessed isa employers would able check registration status online subscribe notified employee registration status changes ability requirement register withdrawn 2011 following singleton munro reviews lists still maintained remains offence employ person regulated activity barred isa person seek work several prominent children authors – believed would required join scheme order conduct talks schools – criticised isa philip pullman called scheme outrageous demeaning insulting said would longer appear schools go school author illustrator talk class time else whole school earth – earth – world anybody going rape assault child circumstances preposterous author screenwriter frank cottrell boyce said author 're never alone class possible reason unless revenue-raising scam former children laureate anne fine said refuse – spoken schools without incident 32 years refuse undergo demeaning process part unhealthy situation 've got people close children seen potential paedophiles lindsay mackie representing literary charity english pen said signal children public space defined potentially dangerous space – values worlds visitors work whether writing engineering family secondary definition adult vetted safe – limiting fearful creating paranoia others questioned usefulness scheme pointing could prevented soham murders first place perpetrator ian huntley knew victims girlfriend job critical media coverage scheme launched 2009 led confusion registration requirements singleton review set due concerns expressed degree contact children trigger requirement register isa sir roger singleton chief adviser safety children chair isa produced ‘ drawing line ’ report check government drawn line right place relation requirement register december 2009 government accepted recommendations found ‘ drawing line ’ report included clarification number areas dcsf published vetting barring myth buster clarify requirements scheme however fact-sheet challenged rather simplistic one-sided several unions professional associations represent effected isa 2009 onwards organizations produced large amount documentation form statements conference resolutions advice either clarifying challenging isa publications referenced including written royal college nursing nurses union national union teachers nut national association schoolmasters union women teachers nasuwt unison union non-teaching staff schools even small sample responses different unions associations significant differences within opinions expressed positions adopted rcn specific branches nasuwt seemingly taking strongest oppositional stance perhaps indicates quite complex child protection debate uk currently 2010 government partly response pressure organizations mentioned launched second review isa led professor eileen munro department social policy london school economics political science lse following munro review 2011 requirement register withdrawn entirely also announced isa would merged crb 2012 isa role maintain lists accessed employers certain bodies barred working either children vulnerable adults changes extent brought end virulent press criticisms isa however also led deeper questioning thinking behind original creation isa specific accusations government overseen many changes reviews showing lack support organization isa initially created knee jerk reaction soham murders philip pullman remains one vociferous critics accusing government using soham murders 'scare story scare british public accepting intrusive database visible opposition isa came large nurses union royal college nursing rcn included successful legal cases brought rcn 2010 several journalists campaigning organizations continued voice criticism including 'civitas 'the manifesto club run journalist josie appleton criticisms concerns commonly raised regarding structure independent safeguarding authority included person barred without hearing minimum standard evidence legal support available 'minded bar right appeal limited single sanction barring 10 years anyone aged 25 refusal independent safeguarding authority use word 'sanction describe barring process formed basis rcn cases organizations continued question basis upon independent safeguarding authority created asking whether bureaucratic solution child protection issues realistic sensible isa accused vociferous critics broadsheets guardian 'unethical 'orwellian rcn campaigning groups ask whether creates problems creating 'climate fear amongst professionals simultaneously creating 'an illusion security amongst public general end pointed recent cases paedophile offences schools committed vanessa george plymouth – 2010 could prevented form database cases others like offender previous criminal disciplinary record debate seems likely continue especially neither pro anti viewpoint regarding expansion systems claimed political party conventional political standpoint right left
[ 6099 ]
Test
3,910
9
Brian_Silverman:brian silverman brian silverman canadian computer scientist creator many programming environments children researcher cellular automata silverman student massachusetts institute technology 1970s one creators tinkertoy computer played tic-tac-toe student mit silverman worked seymour papert papert founded logo computer systems inc. 1980 commercialize logo programming language silverman became director research later worked consulting scientist mit media lab ported logo programmable bricks precursor lego mindstorms one developers scratch programming language co-founder along paula bonta mitchel resnick president playful invention company headquartered montreal quebec canada develops programmable cricket spin-off media lab silverman part team reverse-engineered mos technology 6502 intel 4004 microprocessors developed transistor-level emulators ported spacewar one earliest digital computer games java writing another emulator pdp-1 game originally written also invented several well-known cellular automaton rules including brian brain seeds wireworld
[ 4609, 7093, 6955, 4940 ]
Validation
3,911
8
SimilarWeb:similarweb similarweb website provides web analytics services businesses company offers customers information clients competitors website traffic volumes referral sources including keyword analysis website stickiness e.g. time site page views bounce rate among features like alexa internet extrapolates data panel web users allow monitor internet activity combined direct observations subset internet properties websites traffic statistics 2019 claimed world largest panel hundreds millions users company founded 2007 offer tel-aviv israel 2009 similarweb first israeli seedcamp attracting attention international media investors company raised series round 1.1 million investment led yossi vardi docor international management similarsites browser extension help users find sites similar visiting launched later year september 24 2013 company closed 6 million series b round led david alliance moshe lichtman participation existing investor docor international management february 24 2014 south africa media giant naspers invested 18 million similarweb leading series c round within month similarweb used part capital acquisition israeli early-stage company tapdog million dollars shares cash less year tapdog founded november 2014 raised 15 million series investment july 2015 similarweb acquired personalized content discovery platform developer swayy december 10 2015 similarweb announced acquired quettra silicon valley-based mobile intelligence startup boost mobile operations quettra provided personalization tools developers return detailed mobile telemetry data july 2017 company announced 47 million round financing led viola growth saban ventures participation ce ventures existing investors
[ 167, 6092, 4600, 3249, 518 ]
Test
3,912
2
CEN/XFS:cen/xfs cen/xfs xfs extensions financial services provides client-server architecture financial applications microsoft windows platform especially peripheral devices eftpos terminals atms unique financial industry international standard promoted european committee standardization known acronym cen hence cen/xfs standard based wosa extensions financial services wosa/xfs developed microsoft move standardized software base financial institutions increasingly interested ability pick choose application programs drive equipment xfs provides common api accessing manipulating various financial services devices regardless manufacturer chronology wosa/xfs changed name simply xfs standard adopted international cen/isss standards body however commonly called cen/xfs industry participants perceived benefit xfs similar java write run anywhere mantra often different hardware vendors different interpretations xfs standard result differences interpretation means applications typically use middleware even differences various platforms implementation xfs notable xfs middleware platforms include xfs test tools allow testing xfs applications middleware simulated hardware tools include sophisticated automatic regression testing capabilities providers xfs test tools include j/xfs alternative api cen/xfs windows specific also xpeak operating system independent based xml messages j/xfs written java objective provide platform agnostic client-server architecture financial applications especially peripheral devices used financial industry eftpos terminals atms move standardized software base financial institutions increasingly interested ability pick choose application programs drive equipment j/xfs provides common object oriented api pure java application wide range financial devices providing layer separation application device logic implemented using native j/xfs api wrapping existing implementation javapos cen/xfs j/xfs developed companies de la rue ibm ncr wincor nixdorf sun microsystems hosted monitored maintained european committee standardisation cen
[ 6896, 4759, 5666 ]
Test
3,913
3
Yie_Ar_Kung-Fu_II:yie ar kung-fu ii lee young young martial arts master son brave warrior rid china chop suey gang however one member survived declared emperor yie-gah like father lee young rid china yie-gah allies lee young goes three sections level face boss along way meets ninjas power-ups lee acquire oolong tea replenish health lo mein temporary invincibility lee carry three oolong teas time game also features two-player mode player 1 controls lee player 2 choice play either yen pei lan fang po chin making lan fang first ever playable female character fighting game predating chun li street fighter ii five years
[]
Test
3,914
9
Scott_Fahlman:scott fahlman scott elliott fahlman born march 21 1948 computer scientist professor emeritus carnegie mellon university notable early work automated planning blocks world semantic networks neural networks particular cascade correlation algorithm dylan programming language common lisp particular cmu common lisp one founders lucid inc. period standardized recognized leader common lisp recently fahlman engaged constructing knowledge base scone based part thesis work netl semantic network fahlman born medina ohio son lorna may dean john emil fahlman received bachelor degree master degree 1973 mit ph.d. mit 1977 master thesis advisor patrick winston doctoral thesis advisor gerald sussman noted doctoral diploma says degree awarded original research demonstrated thesis field artificial intelligence suggested may first use term fellow american association artificial intelligence fahlman acted thesis advisor donald cohen david b. mcdonald david s. touretzky skef wholey justin boyan michael witbrock alicia tribble sagae may 1996 july 2001 fahlman directed justsystem pittsburgh research center fahlman credited originating first smiley emoticon thought would help people message board carnegie mellon distinguish serious posts jokes proposed use purpose symbols caught original message symbols originated posted september 19 1982 message recovered jeff baird september 10 2002 quoted though credited originating smiley emoticons first emoticon user similar marker appeared article reader digest may 1967 interview printed new york times 1969 vladimir nabokov noted often think exist special typographical sign smile — sort concave mark supine round bracket
[ 7878, 186, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 1557, 218, 1478, 4878, 5494, 4704, 3880, 4609, 6116, 3212, 5501, 6210, 144, 1116, 6471, 7481, 2144, 2600, 7298, 5515, 8025, 5077, 5429, 4543, 7032, 1889, 2156, ...
Test
3,915
3
Cross-platform_software:cross-platform software computing cross-platform software also multi-platform software platform-independent software computer software implemented multiple computing platforms cross-platform software may divided two types one requires individual building compilation platform supports one directly run platform without special preparation e.g. software written interpreted language pre-compiled portable bytecode interpreters run-time packages common standard components platforms example cross-platform application may run microsoft windows linux macos cross-platform programs may run many existing platforms two platforms cross-platform frameworks qt flutter nativescript xamarin phonegap ionic react native exist aid cross-platform development platform refer type processor cpu hardware given operating system application runs type operating system computer combination type hardware type operating system running example common platform microsoft windows running x86 architecture well-known desktop computer platforms include linux/unix macos cross-platform however many devices smartphones also effectively computer platforms less commonly thought way application software written depend features particular platform—either hardware operating system virtual machine runs java platform virtual machine platform runs many operating systems hardware types common platform software written hardware platform refer instruction set architecture example x86 architecture variants ia-32 x86-64 machines often run one version microsoft windows though run operating systems well including linux openbsd netbsd macos freebsd 32-bit arm architectures newer 64-bit version common smartphones tablet computers run android ios mobile operating systems software platforms either operating system programming environment though commonly combination notable exception java uses operating system independent virtual machine compiled code known world java bytecode examples software platforms previously noted java platform exception general rule operating system software platform java language typically compiles virtual machine virtual cpu runs code written language enables executable binary run systems implement java virtual machine jvm java programs executed natively using java processor n't common mostly used embedded systems java code running jvm access os-related services like disk i/o network access appropriate privileges granted jvm makes system calls behalf java application setup allows users decide appropriate protection level depending acl example disk network access usually enabled desktop applications browser-based applets jni also used enable access operating system specific functions currently java standard edition programs run microsoft windows macos several unix-like operating systems several non-unix-like operating systems like embedded systems mobile applications browser plugins used windows mac based devices android built-in support java also subsets java java card java platform micro edition designed resource-constrained devices piece software considered cross-platform must able function one computer architecture operating system developing program time-consuming task different operating systems different application programming interfaces api example linux uses different api application software windows software written particular operating system automatically work architectures operating system supports one example august 2006 openoffice.org natively run amd64 intel 64 lines processors implementing x86-64 standards computers since changed openoffice.org suite software “ mostly ” ported 64-bit systems also means program written popular programming language c c++ mean run operating systems support programming language—or even operating system different architecture web applications typically described cross-platform ideally accessible various web browsers within different operating systems applications generally employ client–server system architecture vary widely complexity functionality wide variability significantly complicates goal cross-platform capability routinely odds goal advanced functionality basic web applications perform processing stateless server pass result client web browser user interaction application consists simple exchanges data requests server responses types applications norm early phases world wide web application development applications follow simple transaction model identical serving static web pages today still relatively common especially cross-platform compatibility simplicity deemed critical advanced functionalities prominent examples advanced web applications include web interface gmail a9.com google maps website live search service bing microsoft advanced applications routinely depend additional features found recent versions popular web browsers dependencies include ajax javascript dynamic html svg components rich internet applications older versions popular web browsers tend lack support certain features competing interests cross-platform compatibility advanced functionality numerous alternative web application design strategies emerged strategies include graceful degradation attempts provide similar functionality users platforms diminishing functionality least common denominator limited client browsers example user attempting use limited-feature browser access gmail may notice gmail switches basic mode reduced functionality differs cross-platform techniques attempt provide equivalent functionality adequate functionality across platforms multiple codebase applications maintain distinct codebases different hardware os platforms equivalent functionality obviously requires duplication effort maintaining code worthwhile amount platform-specific code high strategy relies one codebase may compiled multiple platform-specific formats one technique conditional compilation technique code common platforms repeated blocks code relevant certain platforms made conditional interpreted compiled needed another technique separation functionality disables functionality supported client browsers operating systems still delivering complete application user see also separation concerns technique used web development interpreted code scripting languages query platform running execute different blocks conditionally third-party libraries attempt simplify cross-platform capability hiding complexities client differentiation behind single unified api responsive web design rwd web design approach aimed crafting visual layout sites provide optimal viewing experience—easy reading navigation minimum resizing panning scrolling—across wide range devices mobile phones desktop computer monitors little platform-specific code used technique one complicated aspect cross-platform web application design need software testing addition complications mentioned previously additional restriction web browsers prohibit installation different versions browser operating system although several development approaches companies use target multiple platforms result software requires substantial manual effort testing maintenance across supported platforms techniques full virtualization sometimes used workaround problem using tools page object model cross platform tests scripted way one test case usable multiple versions app long different versions similar user interfaces versions tested one time one test case web applications becoming increasingly popular many computer users still use traditional application software rely client/web-server architecture distinction traditional web applications always clear features installation methods architectures web traditional applications overlap blur distinction nevertheless simplifying distinction common useful generalization traditionally modern computing application software distributed end-users binary file especially executable files executables support operating system computer architecture built for—which means making single cross-platform executable would something massive task generally replaced offering selection executables platforms supported software distributed binary executable software written c c++ programmer must build software different operating system computer architecture i.e must use toolset translates—transcompiles—a single codebase multiple binary executables example firefox open-source web browser available windows macos powerpc x86 apple inc. calls universal binary linux *bsd multiple computer architectures four platforms case windows macos linux *bsd separate executable distributions although come source code use different toolsets perform different builds may sufficient achieve variety working executables different platforms case software engineer must port i.e amend code suitable new computer architecture operating system example program firefox already runs windows x86 family modified re-built run linux x86 potentially architectures well multiple versions code may stored separate codebases merged one codebase conditional compilation see note porting must accompanied cross-platform building reverse case alternative porting cross-platform virtualization allows applications compiled one cpu operating system run system different cpu and/or operating system without modification source code binaries example apple rosetta built intel-based macintosh computers runs applications compiled previous generation macs used powerpc cpus another example ibm powervm lx86 allows linux/x86 applications run unmodified linux/power operating system script considered cross-platform interpreter available multiple platforms script uses facilities provided language script written python unix-like system likely run little modification windows python also runs windows also one implementation python run scripts e.g. ironpython .net framework goes many open-source programming languages available scripting languages unlike binary executable files script used computers software interpret script script generally stored plain text text file may issues however type new line character sits lines generally however little work done make script written one system run another quite popular cross-platform scripting interpreted languages cross-platform multi-platform term also apply video games released range video game consoles specialized computers dedicated task playing games examples cross-platform video games include miner 2049er fifa video game series nhl series minecraft released across variety gaming platforms wii playstation 3 xbox 360 personal computers pcs mobile devices characteristics particular system may lengthen time taken implement video game across multiple platforms video game may initially released platforms later released remaining platforms typically situation occurs new gaming system released video game developers need acquaint hardware software associated new console games may become cross-platform licensing agreements developers video game console manufacturers limit development game one particular console example disney could create game intention release latest nintendo sony game consoles disney license game sony first disney may exchange required release game solely sony ’ console short time indefinitely—effectively prohibiting cross-platform release duration several developers implemented means play games online using different platforms psyonix epic games microsoft valve corporation possess technology allows xbox 360 playstation 3 gamers play pc gamers leaving decision platform use consumers first game allow level interactivity pc console games quake 3 games feature cross-platform online play include rocket league street fighter v killer instinct paragon fable fortune minecraft better together update windows 10 vr editions pocket edition xbox one cross-platform programming practice actively writing software work one platform different ways approaching problem writing cross-platform application program one approach simply create multiple versions program different source trees —in words microsoft windows version program might one set source code files macintosh version might another foss *nix system might another straightforward approach problem potential considerably expensive development cost development time especially corporate entities idea behind create two different programs ability behave similarly also possible means developing cross-platform application result problems bug tracking fixing two different source trees would different programmers thus different defects version another approach used depend pre-existing software hides differences platforms—called abstraction platform—such program unaware platform running could said programs platform agnostic programs run java virtual machine jvm built fashion applications mix various methods cross-platform programming create final application example firefox web browser uses abstraction build lower-level components separate source subtrees implementing platform-specific features like gui implementation one scripting language help facilitate ease portability firefox implements xul css javascript extending browser addition classic netscape-style browser plugins much browser written xul css javascript well number tools available help facilitate process cross-platform programming certain issues associated cross-platform development include
[ 5717, 4291, 7156, 1445, 4303, 5726, 5728, 5734, 26, 1478, 1479, 5753, 7190, 5757, 2945, 4352, 68, 1502, 5780, 5782, 7219, 5786, 5787, 7223, 1511, 1512, 84, 90, 2984, 4384, 95, 7238, 1532, 1550, 1554, 1557, 126, 3019, 3021, 5841, 3031, ...
Test
3,916
7
RM-ODP:rm-odp reference model open distributed processing rm-odp reference model computer science provides co-ordinating framework standardization open distributed processing odp supports distribution interworking platform technology independence portability together enterprise architecture framework specification odp systems rm-odp also named itu-t rec x.901-x.904 iso/iec 10746 joint effort international organization standardization iso international electrotechnical commission iec telecommunication standardization sector itu-t rm-odp reference model based precise concepts derived current distributed processing developments far possible use formal description techniques specification architecture many rm-odp concepts possibly different names around long time rigorously described explained exact philosophy example works mario bunge systems thinking example works friedrich hayek concepts—such abstraction composition emergence—have recently provided solid mathematical foundation category theory rm-odp four fundamental elements rm-odp family recommendations international standards defines system interrelated essential concepts necessary specify open distributed processing systems provides well-developed enterprise architecture framework structuring specifications large-scale systems including software systems much preparatory work led adoption rm-odp iso standard carried advanced networked systems architecture ansa project ran 1984 1998 leadership andrew herbert md microsoft research cambridge involved number major computing telecommunication companies parts 2 3 rm-odp eventually adopted iso standards 1996 parts 1 4 adopted 1998 rm-odp consists four basic itu-t recommendations iso/iec international standards complex system specifications extensive single individual fully comprehend aspects specifications furthermore different interests given system different reasons examining system specifications business executive ask different questions system make-up would system implementer concept rm-odp viewpoints framework therefore provide separate viewpoints specification given complex system viewpoints satisfy audience interest particular set aspects system associated viewpoint viewpoint language optimizes vocabulary presentation audience viewpoint viewpoint modeling become effective approach dealing inherent complexity large distributed systems current software architectural practices described ieee 1471 divide design activity several areas concerns one focusing specific aspect system examples include 4+1 view model zachman framework togaf dodaf course rm-odp viewpoint subdivision specification complete system established bring together particular pieces information relevant particular area concern analysis design system although separately specified viewpoints completely independent key items identified related items viewpoints moreover viewpoint substantially uses foundational concepts defined part 2 rm-odp however viewpoints sufficiently independent simplify reasoning complete specification mutual consistency among viewpoints ensured architecture defined rm-odp use common object model provides glue binds together specifically rm-odp framework provides five generic complementary viewpoints system environment currently growing interest use uml system modelling however widely agreed approach structuring specifications adds cost adopting use uml system specification hampers communication system developers makes difficult relate merge system specifications need integrate systems although odp reference model provides abstract languages relevant concepts prescribe particular notations used individual viewpoints viewpoint languages defined reference model abstract languages sense define concepts used represented lack precise notations expressing different models involved multi-viewpoint specification system common feature enterprise architectural approaches including zachman framework 4+1 model rm-odp approaches consciously defined notation- representation-neutral manner increase use flexibility however makes difficult among things development industrial tools modeling viewpoint specifications formal analysis specifications produced possible derivation implementations system specifications order address issues iso/iec itu-t started joint project 2004 itu-t rec x.906|iso/iec 19793 information technology open distributed processing use uml odp system specifications document usually referred uml4odp defines use unified modeling language 2 uml 2 iso/iec 19505 expressing specifications open distributed systems terms viewpoint specifications defined rm-odp defines set uml profiles one viewpoint language one express correspondences viewpoints approach structuring according rm-odp principles purpose uml4odp allow odp modelers use uml notation expressing odp specifications standard graphical way allow uml modelers use rm-odp concepts mechanisms structure large uml system specifications according mature standard proposal allow uml tools used process viewpoint specifications thus facilitating software design process enterprise architecture specification large software systems addition itu-t rec x.906 iso/iec 19793 enables seamless integration rm-odp enterprise architecture framework model-driven architecture mda initiative omg service-oriented architecture soa addition several projects used currently use rm-odp effectively structuring systems specifications 239-item reference list covering rm-odp standards well related research applications case studies included
[ 2087, 6172, 7721, 3620, 1543, 6428, 7732, 6015, 2214, 737, 4884, 6208, 1114, 5948, 5858, 1774, 2057, 2872, 2877, 2610, 698, 7144 ]
Test
3,917
9
Normalized_loop:normalized loop computer science normalized loop sometimes called well-behaved loop loop loop variable starts 0 constant gets incremented one every iteration exit condition met normalized loops important compiler theory loop dependence analysis simplify data dependence analysis well behaved loop normally form increment unitary constant easy see b bigger max loop never access memory outside allocated range non-normalized loop may begin different indexes increment not-unitary amounts exit conditions complicated define loops hard optimize vectorize even traverse especially functions executed part loop conditions simple example n't start beginning increments one complicated example additional exit condition loops also non-predictable behavior compilation time exit condition depends contents data modified even dynamic calculations means function calls reverse loops also simple easily normalized non-normalized n't dynamic behaviour normally easy transform normalized one instance first example example 1 easily converted third example partially normalized allow parallelization still lack ability know loop span many iterations making harder vectorize using multi-media hardware starting 7 much problem long increment regular preferably one multiple statements inside loop use index private temporary variables may created cope different iteration paces reverse loop example 5 also easy normalize note access still backwards case makes sense leave backwards data dependence dependences exist caution must taken revert access well could disrupt order assignments example 4 makes impossible predict anything loop unless functions trivial constant way know loop start stop much 'll increment iteration loops hard parallelize also perform horribly iteration loop evaluate two functions max increment even functions inlined condition becomes complex worth optimizing programmer take extra care create loops unless strictly necessary ever another danger loops appear evaluation depends data modified instance normal error using iterators remove items list modifying relying sizes exit condition true
[]
Test
3,918
3
Ricoh_5A22:ricoh 5a22 ricoh 5a22 microprocessor produced ricoh super nintendo entertainment system snes video game console 5a22 based 8/16-bit cmd/gte 65c816 version wdc 65c816 used apple ii personal computer 8-bit data bus 16-bit accumulator 24-bit address bus based mos technology 6502 family processors addition 65c816 cpu core 5a22 contains support hardware including cpu whole employs variable-speed system bus bus access times determined memory location accessed bus runs 3.58 mhz non-access cycles accessing bus b internal registers either 2.68 3.58 mhz accessing bus runs 1.79 mhz accessing controller port serial-access registers works approximately 1.5 mips theoretical peak performance 1.79 million 16-bit operations per second
[ 7960, 708, 7519, 463, 468, 7531, 5296, 2925, 7730, 1864, 7569, 2237, 4532, 7668, 4815, 7222, 1237, 5087, 1150 ]
Test
3,919
2
Remastersys:remastersys remastersys free open-source program debian ubuntu-based linux mint derivative software systems april 28 2013 originator direct development ceased. br project development ceased originator fragadelic group developers members copper linux user group arizona began respin development project fork transition new supporters original code received originator team members discussed fork fork released working version late july 2015 early october 2015 debian principal developer reverted maintaining remastersys kept linux respin open project future features development ubuntu developer/maintainer sergio mejia debian developer/maintainer marcia wilbur keep respin available github launchpad respectively initially created able easily back create distributable copy ubuntu derivative installation inspiration tool came mklivecd script mandriva uses remasterme script pclinuxos since scripts easy port ubuntu written scratch remastersys intended serve easy way create customized live cd/dvd version ubuntu resulting iso also installed usb pendrive creating live usb distro using either command-line approach graphical tool unetbootin future enhancements discussion include possible rescue software incorporated remastersys command line version gui version
[ 7033, 4638, 5524, 5571, 682, 4207, 3271, 788 ]
Test
3,920
2
Macintosh_operating_systems:macintosh operating systems family macintosh operating systems developed apple inc. includes graphical user interface-based operating systems designed use macintosh series personal computers since 1984 well related system software created compatible third-party systems 1984 apple debuted operating system known classic mac os release original macintosh system software system rebranded mac os 1996 preinstalled every macintosh 2002 offered macintosh clones short time 1990s noted ease use also criticized lack modern technologies compared competitors current mac operating system macos originally named mac os x 2012 os x 2016 developed 1997 2001 apple purchase next mac os x brought entirely new architecture based nextstep unix system eliminated many technical challenges classic mac os faced current macos preinstalled every mac updated annually basis apple current system software devices – ios watchos tvos audioos prior introduction mac os x apple experimented several concepts releasing different products designed bring macintosh interface applications unix-like systems vice versa a/ux mae mklinux apple effort expand upon develop replacement classic mac os 1990s led cancelled projects code named star trek taligent copland although different architectures macintosh operating systems share common set gui principles including menu bar across top screen finder shell featuring desktop metaphor represents files applications using icons relates concepts like directories file deletion real-world objects like folders trash overlapping windows multitasking classic mac os original macintosh operating system introduced 1984 alongside first macintosh remained primary use macs 2001 apple released original macintosh january 24 1984 early system software partially based lisa os xerox parc alto computer former apple ceo steve jobs previewed originally named system software simply system apple rebranded mac os 1996 due part macintosh clone program ended year later classic mac os characterized monolithic design initial versions system software run one application time system 5 introduced cooperative multitasking system 7 supports 32-bit memory addressing virtual memory allowing larger programs later updates system 7 enable transition powerpc architecture system considered user-friendly architectural limitations critiqued limited memory management lack protected memory access controls susceptibility conflicts among extensions nine major versions classic mac os released name classic signifies system whole reference compatibility layer helped ease transition mac os x. macos originally named mac os x 2012 os x 2016 current mac operating system officially succeeded classic mac os 2001 although system originally marketed simply version 10 mac os history largely independent classic mac os unix-based operating system built nextstep technology developed next late 1980s early 1997 apple purchased company ceo steve jobs returned apple precursors original release mac os x include openstep apple rhapsody project mac os x public beta macos makes use bsd codebase xnu kernel core set components based upon apple open source darwin operating system macos basis apple operating systems including iphone os/ios watchos tvos audioos first desktop version system released march 24 2001 supporting aqua user interface since several versions adding newer features technologies released since 2011 new releases offered annual basis early server computing version system released 1999 technology preview followed several official server-based releases server functionality instead offered add-on desktop system since 2011 apple real-time operating system environment a/rose small embedded operating system ran macintosh coprocessor platform expansion card macintosh idea offer single overdesigned hardware platform third-party vendors could build practically product reducing otherwise heavy workload developing nubus-based expansion card first version system ready use february 1988 1988 apple released first unix-based os a/ux unix operating system mac os look feel competitive time due part crowded unix market macintosh hardware lacking high-end design features present workstation-class computers a/ux success sales u.s. government posix compliance requirement mac os could meet macintosh application environment mae software package introduced apple 1994 allowed users certain unix-based computer workstations run apple macintosh application software mae used x window system emulate macintosh finder-style graphical user interface last version mae 3.0 compatible system 7.5.3 mae available sun microsystems sparcstation hewlett-packard systems discontinued may 14 1998 announced 1996 worldwide developers conference wwdc mklinux open source operating system started osf research institute apple february 1996 port linux powerpc platform thus macintosh computers mid 1998 community-led mklinux developers association took development operating system mklinux short microkernel linux refers project adaptation linux kernel run server hosted atop mach microkernel mklinux based version 3.0 mach star trek boldly go mac gone relatively unknown secret prototype beginning 1992 whose goal create version classic mac os would run intel-compatible x86 personal computers partnership apple support intel project instigated novell looking integrate dr-dos mac os gui mutual response monopoly microsoft windows 3.0 ms-dos team consisting four apple four novell able get macintosh finder basic applications quicktime running smoothly x86 architecture project canceled year later early 1993 code later reused porting mac os powerpc taligent portmanteau talent intelligent name object-oriented operating system company dedicated producing started project within apple provide replacement classic mac os later spun joint venture ibm part aim alliance purpose building competing platform microsoft cairo nextstep development process never worked taligent often cited example project death march apple pulled project 1995 code delivered copland project apple create updated version classic mac os introduced protected memory preemptive multitasking number new underlying operating system features yet still compatible existing mac software originally planned follow-up release known gershwin would add multithreading advanced features new features added rapidly could completed completion date slipped future sign release 1996 apple decided cancel project outright find suitable third-party system replace copland development ended august 1996 december 1996 apple announced buying next nextstep operating system arrival macintosh 1984 apple history operating systems began apple ii series computers 1977 ran apple dos prodos later gs/os apple iii 1980 ran apple sos apple lisa 1983 ran lisa os later macworks xl macintosh emulator apple also developed newton os newton personal digital assistant 1993 1997 recent years apple also launched several new operating systems based core macos including ios 2007 iphone ipad ipod touch mobile devices watchos 2015 apple watch tvos 2015 apple tv set-top box audioos homepod smart speakers
[ 4297, 13, 4320, 4347, 65, 1502, 5783, 5786, 5787, 4376, 1522, 7242, 4397, 3001, 7259, 120, 126, 1562, 4423, 1574, 149, 5865, 3050, 163, 4453, 1599, 7308, 7325, 7335, 190, 204, 1648, 1654, 1656, 1657, 7396, 4537, 5962, 3151, 7404, 7408, ...
Test
3,921
4
SaferNet:safernet safernet brazilian non-governmental organization combats internet crime partnership federal public ministry facilitates anonymous reporting provides information training internet safety security safernet facilitates anonymous reporting crimes extra consideration preventing investigating child pornography identity theft various hate crimes also works government improve legislation internet-related crimes safernet also educates trains mobilizes public issues relating rights safety 2006 safernet federal public ministry brought suit google brazilian business unit alleging google policing orkut pages enough prevent pornography hate crimes complying judge ruling google provided requested user information brazilian authorities
[ 2944, 3147, 5722, 1321, 3480 ]
Test
3,922
9
Bookmarklet:bookmarklet bookmarklet bookmark stored web browser contains javascript commands add new features browser bookmarklets unobtrusive javascripts stored url bookmark web browser hyperlink web page bookmarklets usually javascript programs regardless whether bookmarklet utilities stored bookmarks hyperlinks add one-click functions browser web page clicked bookmarklet performs one wide variety operations running search query extracting data table example clicking bookmarklet selecting text webpage could run internet search selected text display search engine results page another name bookmarklet favelet favlet derived favorite steve kangas bookmarklets.com coined word bookmarklet started create short scripts based suggestion netscape javascript guide tantek çelik called scripts favelets used word early 6 september 2001 personal email brendan eich developed javascript netscape gave account origin bookmarklets increased implementation content security policy csp websites caused problems bookmarklet execution usage 2013-2015 suggesting hails end death bookmarklets william donnelly created work-around solution problem specific instance loading referencing using javascript library code early 2015 using greasemonkey userscript firefox pale moon browser add-on extension simple bookmarklet-userscript communication protocol allows library-based bookmarklets executed websites including using csp https // uri scheme note however if/when browsers support disabling/disallowing inline script execution using csp if/when websites begin implement feature break fix web browsers use uris codice_1 attribute tag bookmarks uri scheme codice_2 codice_3 codice_4 specifies protocol format rest string browsers also implement prefix codice_5 parser like uri internally browser sees specified protocol javascript treats rest string javascript application executed uses resulting string new page executing script access current page may inspect change script returns undefined type rather example string browser load new page result script simply runs current page content permits changes in-place font size color changes without page reload anonymous function return value define function etc. used force script return undefined type javascript function however script includes function definition/redefinition function use_this_globally ... environment populated reason arbitrary script suffixed void ... javascript arbitrary script void 0 bookmarklets saved used normal bookmarks simple one-click tools add functionality browser example installation bookmarklet performed creating new bookmark pasting code url destination field alternatively bookmarklet presented link browsers dragged dropped onto bookmark bar bookmarklet run loading bookmark normally microsoft edge possible add bookmarklet favourites instead right-click link choose 'add reading list bookmarklet run clicking reading list microsoft edge reading list favourites opened using icon pile lines example bookmarklet performs wikipedia search highlighted text web browser window normal use following javascript code would installed bookmark browser bookmarks toolbar selecting text clicking bookmarklet performs search javascript function function se se document i=0 frames.length i++ se frames .document || s== prompt 'enter 20search 20terms 20for 20wikipedia open 'https //en.wikipedia.org '/w/index.php title=special search search= encodeuricomponent .focus bookmarklets modify location e.g save web page wayback machine javascript location.href='https //web.archive.org/save/'+document.location.href open new web browser window tab e.g show source web resource web browser supports view-source uri scheme javascript void window.open 'view-source '+location show info related current url e.g. javascript alert '\tdocument.url\n'+document.url+'\n\tdocument.lastmodified\n'+document.lastmodified+'\n\tlocation\n'+location among things
[ 1152, 2086, 4565, 2812, 4655, 2451, 4755, 5542, 5984, 5987, 5283, 7628, 5821, 562, 1276, 6809, 5127, 393, 3291, 2574, 3383, 7015, 8006, 4170, 3043, 4352, 4725, 6221, 520, 3057, 4822, 5699, 1136, 348, 1057, 3922, 5887 ]
Validation
3,923
4
Identity_driven_networking:identity driven networking identity driven networking idn process applying network controls network device access based identity individual group individuals responsible operating device individuals identified network tuned respond presence context osi model provides method deliver network traffic system application requested listening data applications operate either system based user-daemon process may user application web browser internet security built around idea ability request respond requests subjected degree authentication validation authorization policy enforcement identity driven networking endeavors resolve user system based policy single management paradigm since internet comprises vast range devices applications also many boundaries therefore ideas resolve connectivity users within boundaries endeavor overlay system identity framework must first decide identity determine use existing controls decide intended new information digital identity represents connectedness real projection identity may incorporate references devices well resources policies systems policies provide entitlements identity claim particular point time space example person may entitled privileges work workplace may denied home hours user gets network usually form machine authentication probably verifies configures system basic level access short mapping user mac address prior process 802.1x simple users authenticate point usual user attempt authenticate system processes daemons started may well require network configuration already performed follows principle network identity device established permitting network connectivity example using digital certificates place hardware addresses trivial spoof device identifiers furthermore consistent identity model account typical network devices routers switches ca n't depend user identity since distinctive user associated device absent capability practice however strong identity asserted network level first task seeking apply identity driven network controls comprises form authentication device level stack since first piece infrastructure placed upon network often network operating system nos often identity authority controls resources nos contains usually printers file shares also procedures authenticate users onto incorporating form single sign-on means flow effect controls seamless many network capabilities made rely upon authentication technologies provisioning access control policy instance packet filtering -firewall content-control software quota management systems quality service qos systems good examples controls made dependent upon authentication
[ 2489, 2789, 3884, 5149, 1368, 5181, 3794, 2577 ]
Test
3,924
4
Anderson's_rule_(computer_science):anderson rule computer science field computer security anderson rule refers principle formulated ross j. anderson nature large databases never free abuse breaches security large system designed ease access becomes insecure made watertight becomes impossible use
[ 2054, 1805 ]
Test
3,925
3
War_in_Middle_Earth:war middle earth war middle earth real-time strategy game released zx spectrum msx commodore 64 amstrad cpc ms-dos commodore amiga apple iigs atari st 1988 australian company melbourne house game combined large scale army unit level small scale character level action happened simultaneously game world places could seen map ground level individual characters could also seen larger battles either survived died — gandalf alone could easily defeat hundred orcs battle quite small less 100 units approximately watched ground level otherwise displayed numerically ground level characters could acquire objects talk computer-controlled friendly characters radagast tom bombadil game reviewed 1989 dragon 147 hartley patricia kirk lesser role computers column reviewers gave game 3 5 stars computer gaming world gave game mixed review noting although faithfully recreates events books genuine strategy lacking game plays similarly subsequent playthroughs compute review positive criticizing anticlimactic ending otherwise impressive game faithful middle earth story line spanish magazine microhobby valued game following scores originality 80 graphics 70 motion sound 50 difficulty 100 addiction 80
[ 4883, 6380 ]
Test
3,926
9
Linkage_(software):linkage software programming languages particularly compiled ones like c c++ linkage describes names refer entity throughout whole program one single translation unit codice_1 keyword used c restrict visibility function variable translation unit also valid c++ c++ 98/03 deprecated usage favor anonymous namespaces longer deprecated c++ 11 also c++ implicitly treats codice_2 namespace-scope variable internal linkage unless explicitly declared codice_3 unlike c. name linkage related distinct scope scope name part translation unit visible instance name global scope file-scope c global namespace-scope c++ visible part file scope end end translation unit whether name given external internal linkage name external linkage entity name denotes may referred another translation unit using distinct declaration name scopes within translation unit using distinct declarations name given internal linkage declaration would denote distinct entity although using name entity could referred distinct declarations within translation unit name linkage referred declarations different scopes even within translation unit examples names parameters functions local variables details differ c objects functions types linkage c++ simplified overview linkage languages must done care different languages adorn external symbols differently common idiom uses codice_4 link c++ c code definition 'linkage quoted iso/iec 9899 tc3 c99 standard c uses term identifier article uses name latter c++ uses formalize linkage identifier declared different scopes scope made refer object function process called linkage following common example linkage function codice_5 declared two files function body defined demo2.c via linkage codice_5 called codice_7 inside demo1.c refers codice_5 demo2.c example external linkage function
[ 4662, 6186, 7333, 1198, 1435 ]
Test
3,927
4
Yahoo!_Assistant:yahoo assistant yahoo assistant formerly named 3721 internet assistant browser helper object internet explorer developed beijing 3721 technology co. ltd renamed yahoo assistant beijing 3721 technology acquired yahoo 3721 internet assistant together 3721 chinese keywords known spyware microsoft antispyware malware browser hijacker others panda antivirus however yahoo china filed lawsuit beijing sanjiwuxian internet technology co. ltd developer 360safe antispyware identifying yahoo assistant malware 360safe 3721 internet assistant originally released normal client-server application however turned use activex technology install client system later also shipped many sharewares default install options 3721 internet assistant also blamed use flaw microsoft internet explorer install automatically user browsing array 3721 sponsored personal commercial websites microsoft internet explorer yahoo assistant also included 3721 chinese keywords yahoo mail express sometimes whole package internet assistant chinese keywords mail express named yahoo assistant sharewares company says automatic installation ended september 2005 asks user permission installing however ca inc. reported yahoo assistant installation extra components installed without obtaining user consent software also bundled chinese client cga gaming platform 3721 claims 3721 internet assistant includes many useful features ie setting repair security shield removal internet history information blocking ads however installs various windows hooks slow system tries install hooks repeatedly users also reported internet assistant buttons reappeared immediately manual removal using internet explorer customization features blue screen death appeared using internet assistant test using http //www.kephyr.com/popupkillertest shows 3721 internet assistant block roughly half popup methods built-in popup blocker windows xp sp2 turned 3721 internet assistant enable/disable internet explorer extensions except advertisement links extensions installed yahoo products 3721 internet assistant runs multiple rundll32.exe processes one killed windows task manager immediately restarted others thereby resisting efforts user terminate application driver named cnsminkp.sys installed 3721 internet assistant along several hidden windows services uninstallation several files left system visible windows explorer found using tools total commander dos box yahoo assistant also removes 360safe antispyware program competitor without notifying user august 15 2007 beijing court ruled behavior unfair competition 3721 internet assistant together 3721 chinese keywords according interfax regarded chinese internet users hooligan zombie applications uninstall program pair provided 3721 simply redirects users 3721 website simplified chinese thus recognizable except chinese speakers default option web page keep 3721 internet assistant uninstallation following web uninstallation wizard reboot many 3721 files still remain client system pair ranked 1 beijing association online media list chinese malware 2005
[ 6991, 6092 ]
Test
3,928
1
Triplestore:triplestore triplestore rdf store purpose-built database storage retrieval triples semantic queries triple data entity composed subject-predicate-object like bob 35 bob knows fred much like relational database one stores information triplestore retrieves via query language unlike relational database triplestore optimized storage retrieval triples addition queries triples usually imported/exported using resource description framework rdf formats triplestores built database engines scratch others built top existing commercial relational database engines sql-based nosql document-oriented database engines like early development online analytical processing olap databases intermediate approach allowed large powerful database engines constructed little programming effort initial phases triplestore development seems likely native triplestores advantage performance longer period time difficulty implementing triplestores sql although triples may thus stored implementing efficient querying graph-based rdf model mapping sparql onto sql queries difficult adding name triple makes quad store named graph graph database generalized structure triplestore using graph structures nodes edges properties represent store data graph databases might provide index-free adjacency meaning every element contains direct pointer adjacent elements index lookups necessary general graph databases store graph distinct specialized graph databases triplestores network databases
[ 1905, 5894, 4303, 6543, 2937, 6364, 7999, 4252, 6462, 1768, 2054, 5419, 7757, 684, 5338, 5778, 4635, 7303, 784, 4463, 2265, 2445 ]
Validation
3,929
9
Formula_language:formula language formula language scripting language used lotus notes often referred formula language pronounced at-formula many language elements start -character example selection formula created ray ozzie early development lotus notes borrowed compiler decompiler lotus 1-2-3 spreadsheet unlike spreadsheet language formula language designed primarily string list processing numerical processing originally functional programming language unique text list-handling features inspired ray ozzie prior use icon lisp formula language engine rewritten damien katz notes domino 6 new features added language looping dynamic execution performance improved formula language two parts functions used several places throughout lotus notes important uses commands like menu commands perform actions lotus notes client examples actions commands primarily used formulas triggered user action button formulas possible combine functions example making execution command conditional field value
[ 2463, 4543 ]
Test
3,930
9
Ousterhout's_dichotomy:ousterhout dichotomy ousterhout dichotomy computer scientist john ousterhout categorization high-level programming languages tend fall two groups distinct properties uses system programming languages scripting languages – compare programming large programming small distinction underlies design language tcl system programming languages applications languages usually following properties system programming languages tend used components applications large amounts internal functionality operating systems database servers web browsers applications typically employ complex algorithms data structures require high performance prototypical examples system programming languages include c modula-2 contrast scripting languages glue languages tend following properties scripting languages tend used applications functionality comes programs often implemented system programming languages scripts used glue together programs add additional layers functionality top existing programs ousterhout claims scripts tend short often written less sophisticated programmers execution efficiency less important simplicity ease interaction programs common applications scripting include web page generation report generation graphical user interfaces system administration prototypical examples scripting languages include applescript c shell dos batch files tcl dichotomy fully set though ousterhout drawn distinction since least design tcl 1988 stated publicly various times early episode tcl war late september october 1994 richard stallman posted article critical tcl entitled use tcl ousterhout replied articulation dichotomy many believe dichotomy highly arbitrary refer ousterhout fallacy ousterhout false dichotomy strong-versus-weak typing data structure complexity independent versus stand-alone might said unrelated features usual critique ousterhout dichotomy distinction compiling versus interpreting since neither semantics syntax depend significantly whether code compiled machine-language interpreted tokenized byte-compiled start run mix many languages fall interpreted compiled e.g lisp forth ucsd pascal perl java makes compiling versus interpreting dubious parameter taxonomy programming languages
[ 2315, 3509, 4543, 5983, 6497, 6778, 486, 2379, 7970, 5190, 1435, 4589 ]
Test
3,931
9
Lexical_analysis:lexical analysis computer science lexical analysis lexing tokenization process converting sequence characters computer program web page sequence tokens strings assigned thus identified meaning program performs lexical analysis may termed lexer tokenizer scanner though scanner also term first stage lexer lexer generally combined parser together analyze syntax programming languages web pages forth lexer forms first phase compiler frontend modern processing analysis generally occurs one pass older languages algol initial stage instead line reconstruction performed unstropping removed whitespace comments scannerless parsers separate lexer steps done part lexer lexers parsers often used compilers used computer language tools prettyprinters linters lexing divided two stages scanning segments input string syntactic units called lexemes categorizes token classes evaluating converts lexemes processed values lexers generally quite simple complexity deferred parser semantic analysis phases often generated lexer generator notably lex derivatives however lexers sometimes include complexity phrase structure processing make input easier simplify parser may written partly fully hand either support features performance lexeme sequence characters source program matches pattern token identified lexical analyzer instance token authors term token using token interchangeably represent string tokenized token data structure resulting putting string tokenization process word lexeme computer science defined differently lexeme linguistics lexeme computer science roughly corresponds word linguistics confused word computer architecture although cases may similar morpheme lexical token simply token string assigned thus identified meaning structured pair consisting token name optional token value token name category lexical unit common token names consider expression c programming language lexical analysis expression yields following sequence tokens token name might termed part speech linguistics specification programming language often includes set rules lexical grammar defines lexical syntax lexical syntax usually regular language grammar rules consisting regular expressions define set possible character sequences lexemes token lexer recognizes strings kind string found lexical program takes action simply producing token two important common lexical categories white space comments also defined grammar processed lexer may discarded producing tokens considered non-significant separating two tokens codice_2 instead codice_3 two important exceptions first off-side rule languages delimit blocks indenting initial whitespace significant determines block structure generally handled lexer level see phrase structure secondly uses lexers comments whitespace must preserved – examples prettyprinter also needs output comments debugging tools may provide messages programmer showing original source code 1960s notably algol whitespace comments eliminated part line reconstruction phase initial phase compiler frontend separate phase eliminated handled lexer tokenization process demarcating possibly classifying sections string input characters resulting tokens passed form processing process considered sub-task parsing input example text string string n't implicitly segmented spaces natural language speaker would raw input 43 characters must explicitly split 9 tokens given space delimiter i.e. matching string codice_5 regular expression codice_6 tokens could represented xml sentence /sentence s-expression token class represents one possible lexeme lexer often saves enough information reproduce original lexeme used semantic analysis parser typically retrieves information lexer stores abstract syntax tree necessary order avoid information loss case numbers identifiers tokens identified based specific rules lexer methods used identify tokens include regular expressions specific sequences characters termed flag specific separating characters called delimiters explicit definition dictionary special characters including punctuation characters commonly used lexers identify tokens natural use written programming languages tokens often categorized character content context within data stream categories defined rules lexer categories often involve grammar elements language used data stream programming languages often categorize tokens identifiers operators grouping symbols data type written languages commonly categorize tokens nouns verbs adjectives punctuation categories used post-processing tokens either parser functions program lexical analyzer generally nothing combinations tokens task left parser example typical lexical analyzer recognizes parentheses tokens nothing ensure matched lexer feeds tokens parser representation used typically enumerated list number representations example identifier represented 0 assignment operator 1 addition operator 2 etc tokens defined often regular expressions understood lexical analyzer generator lex lexical analyzer generated automatically tool like lex hand-crafted reads stream characters identifies lexemes stream categorizes tokens termed tokenizing lexer finds invalid token report error following tokenizing parsing interpreted data may loaded data structures general use interpretation compiling first stage scanner usually based finite-state machine fsm encoded within information possible sequences characters contained within tokens handles individual instances character sequences termed lexemes example integer lexeme may contain sequence numerical digit characters many cases first non-whitespace character used deduce kind token follows subsequent input characters processed one time reaching character set characters acceptable token termed maximal munch longest match rule languages lexeme creation rules complex may involve backtracking previously read characters example c one l character enough distinguish identifier begins l wide-character string literal lexeme however string characters known certain kind e.g. string literal sequence letters order construct token lexical analyzer needs second stage evaluator goes characters lexeme produce value lexeme type combined value properly constitutes token given parser tokens parentheses really values evaluator function return nothing type needed similarly sometimes evaluators suppress lexeme entirely concealing parser useful whitespace comments evaluators identifiers usually simple literally representing identifier may include unstropping evaluators integer literals may pass string deferring evaluation semantic analysis phase may perform evaluation involved different bases floating point numbers simple quoted string literal evaluator needs remove quotes evaluator escaped string literal incorporates lexer unescapes escape sequences example source code computer program string might converted following lexical token stream whitespace suppressed special characters value due licensing restrictions existing parsers may necessary write lexer hand practical list tokens small general lexers generated automated tools tools generally accept regular expressions describe tokens allowed input stream regular expression associated production rule lexical grammar programming language evaluates lexemes matching regular expression tools may generate source code compiled executed construct state transition table finite-state machine plugged template code compiling executing regular expressions compactly represent patterns characters lexemes might follow example english-based language identifier token might english alphabetic character underscore followed number instances ascii alphanumeric characters and/or underscores could represented compactly string means character a-z a-z followed 0 a-z a-z 0-9 regular expressions finite-state machines generate powerful enough handle recursive patterns n opening parentheses followed statement followed n closing parentheses unable keep count verify n sides unless finite set permissible values exists n takes full parser recognize patterns full generality parser push parentheses stack try pop see stack empty end see example structure interpretation computer programs book typically tokenization occurs word level however sometimes difficult define meant word often tokenizer relies simple heuristics example languages use inter-word spaces use latin alphabet programming languages approach fairly straightforward however even many edge cases contractions hyphenated words emoticons larger constructs uris purposes may count single tokens classic example new york-based naive tokenizer may break space even though better break arguably hyphen tokenization particularly difficult languages written scriptio continua exhibit word boundaries ancient greek chinese thai agglutinative languages korean also make tokenization tasks complicated ways address difficult problems include developing complex heuristics querying table common special-cases fitting tokens language model identifies collocations later processing step lexers often generated lexer generator analogous parser generators tools often come together established lex paired yacc parser generator free equivalents flex/bison generators form domain-specific language taking lexical specification – generally regular expressions markup – emitting lexer tools yield fast development important early development get working lexer language specification may change often often provide advanced features pre- post-conditions hard program hand however automatically generated lexer may lack flexibility thus may require manual modification all-manually written lexer lexer performance concern optimizing worthwhile stable languages lexer run often c html lex/flex-generated lexers reasonably fast improvements two three times possible using tuned generators hand-written lexers sometimes used modern lexer generators produce faster lexers hand-coded ones lex/flex family generators uses table-driven approach much less efficient directly coded approach latter approach generator produces engine directly jumps follow-up states via goto statements tools like re2c proven produce engines two three times faster flex produced engines general difficult hand-write analyzers perform better engines generated latter tools following lexical analysers handle unicode lexical analysis mainly segments input stream characters tokens simply grouping characters pieces categorizing however lexing may significantly complex simply lexers may omit tokens insert added tokens omitting tokens notably whitespace comments common needed compiler less commonly added tokens may inserted done mainly group tokens statements statements blocks simplify parser line continuation feature languages newline normally statement terminator often ending line backslash immediately followed newline results line continued – following line joined prior line generally done lexer backslash newline discarded rather newline tokenized examples include bash shell scripts python many languages use semicolon statement terminator often mandatory languages semicolon optional many contexts mainly done lexer level lexer outputs semicolon token stream despite one present input character stream termed semicolon insertion automatic semicolon insertion cases semicolons part formal phrase grammar language may found input text inserted lexer optional semicolons terminators separators also sometimes handled parser level notably case trailing commas semicolons semicolon insertion feature bcpl distant descendant go though absent b c. semicolon insertion present javascript though rules somewhat complex much-criticized avoid bugs recommend always using semicolons others use initial semicolons termed defensive semicolons start potentially ambiguous statements semicolon insertion languages semicolon-terminated statements line continuation languages newline-terminated statements seen complementary semicolon insertion adds token even though newlines generally generate tokens line continuation prevents token generated even though newlines generally generate tokens off-side rule blocks determined indenting implemented lexer python increasing indenting results lexer emitting indent token decreasing indenting results lexer emitting dedent token tokens correspond opening brace codice_7 closing brace codice_8 languages use braces blocks means phrase grammar depend whether braces indenting used requires lexer hold state namely current indent level thus detect changes indenting changes thus lexical grammar context-free indent–dedent depend contextual information prior indent level generally lexical grammars context-free almost thus require looking back ahead backtracking allows simple clean efficient implementation also allows simple one-way communication lexer parser without needing information flowing back lexer exceptions however simple examples include semicolon insertion go requires looking back one token concatenation consecutive string literals python requires holding one token buffer emitting see next token another string literal off-side rule python requires maintaining count indent level indeed stack indent level examples require lexical context complicate lexer somewhat invisible parser later phases complex example lexer hack c token class sequence characters determined semantic analysis phase since typedef names variable names lexically identical constitute different token classes thus hack lexer calls semantic analyzer say symbol table checks sequence requires typedef name case information must flow back parser semantic analyzer back lexer complicates design
[ 5800, 2451, 5983, 7333, 6882, 4124, 3944, 1823, 6891, 993, 2285, 2832, 1361, 7071, 2740, 4139, 1837, 6186, 6275, 6015, 2215, 5312, 4425, 3303, 666, 931, 4520, 2413, 3895, 4361, 1317, 6311, 5965, 2156, 2348, 6778, 5885, 1435, 1064 ]
Validation
3,932
4
Vulnerability_(computing):vulnerability computing computer security vulnerability weakness exploited threat actor attacker perform unauthorized actions within computer system exploit vulnerability attacker must least one applicable tool technique connect system weakness frame vulnerability also known attack surface vulnerability management cyclical practice identifying classifying remediating mitigating vulnerabilities practice generally refers software vulnerabilities computing systems security risk often incorrectly classified vulnerability use vulnerability meaning risk lead confusion risk potential significant impact resulting exploit vulnerability vulnerabilities without risk example affected asset value vulnerability one known instances working fully implemented attacks classified exploitable vulnerability—a vulnerability exploit exists window vulnerability time security hole introduced manifested deployed software access removed security fix available/deployed attacker disabled—see zero-day attack security bug security defect narrower concept vulnerabilities related software hardware site personnel vulnerabilities examples vulnerabilities software security bugs constructs programming languages difficult use properly large source vulnerabilities iso 27005 defines vulnerability asset anything value organization business operations continuity including information resources support organization mission ietf rfc 4949 vulnerability committee national security systems united states america defined vulnerability cnss instruction 4009 dated 26 april 2010 national information assurance glossary many nist publications define vulnerability context different publications fismapedia term provide list sp 800-30 give broader one enisa defines vulnerability open group defines vulnerability factor analysis information risk fair defines vulnerability according fair vulnerability related control strength i.e strength control compared standard measure force threat capabilities i.e probable level force threat agent capable applying asset isaca defines vulnerability risk framework data computer security dictionary standards concepts terms authors dennis longley michael shain stockton press defines vulnerability matt bishop dave bailey give following definition computer vulnerability national information assurance training education center defines vulnerability resource either physical logical may one vulnerabilities exploited threat agent threat action result potentially compromise confidentiality integrity availability resources necessarily vulnerable one belonging organization and/or parties involved customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromising integrity availability passive attack attempts learn make use information system affect system resources compromising confidentiality owasp see figure depicts phenomenon slightly different terms threat agent attack vector exploits weakness vulnerability system related security controls causing technical impact resource asset connected business impact overall picture represents risk factors risk scenario set policies concerned information security management information security management system isms developed manage according risk management principles countermeasures order ensure security strategy set following rules regulations applicable country countermeasures also called security controls applied transmission information called security services vulnerabilities classified according asset class related research shown vulnerable point information systems human user operator designer human humans considered different roles asset threat information resources social engineering increasing security concern impact security breach high fact managers upper management easily know systems applications vulnerabilities perform action manage risk seen misconduct legislations privacy law forces managers act reduce impact likelihood security risk information technology security audit way let independent people certify environment managed properly lessen responsibilities least demonstrated good faith penetration test form verification weakness countermeasures adopted organization white hat hacker tries attack organization information technology assets find easy difficult compromise security proper way professionally manage risk adopt information security management system iso/iec 27002 risk follow according security strategy set forth upper management one key concept information security principle defence depth i.e set multilayer defence system intrusion detection system example class systems used detect attacks physical security set measures protect physically information asset somebody get physical access information asset quite easy make resources unavailable legitimate users sets criteria satisfied computer operating system applications order meet good security level developed itsec common criteria two examples responsible disclosure many refer 'coordinated disclosure first biased word vulnerabilities topic great debate reported tech herald august 2010 google microsoft tippingpoint rapid7 recently issued guidelines statements addressing deal disclosure going forward responsible disclosure first alerts affected vendors confidentially alerting cert two weeks later grants vendors another 45-day grace period publishing security advisory full disclosure done details vulnerability publicized perhaps intent put pressure software procedure authors find fix urgently well respected authors published books vulnerabilities exploit good example security researchers catering needs cyberwarfare cybercrime industry stated approach provide adequate income efforts instead offer exploits privately enable zero day attacks never ending effort find new vulnerabilities fix called computer insecurity january 2014 google revealed microsoft vulnerability microsoft released patch fix microsoft representative called coordinated practices among software companies revealing disclosures mitre corporation maintains list disclosed vulnerabilities system called common vulnerabilities exposures vulnerability classified scored using common vulnerability scoring system cvss owasp collects list potential vulnerabilities aim educating system designers programmers therefore reducing likelihood vulnerabilities written unintentionally software time disclosure vulnerability defined differently security community industry commonly referred kind public disclosure security information certain party usually vulnerability information discussed mailing list published security web site results security advisory afterward time disclosure first date security vulnerability described channel disclosed information vulnerability fulfill following requirement many software tools exist aid discovery sometimes removal vulnerabilities computer system though tools provide auditor good overview possible vulnerabilities present replace human judgment relying solely scanners yield false positives limited-scope view problems present system vulnerabilities found every major operating system including windows macos various forms unix linux openvms others way reduce chance vulnerability used system constant vigilance including careful system maintenance e.g applying software patches best practices deployment e.g use firewalls access controls auditing development throughout deployment lifecycle vulnerabilities related evident pure technical approach even protect physical assets one administrative procedure let maintenance personnel enter facilities people adequate knowledge procedures motivated follow proper care see social engineering security four examples vulnerability exploits common types software flaws lead vulnerabilities include set coding guidelines developed large number static code analysers used verify code follows guidelines
[ 704, 5721, 1813, 367, 2912, 2192, 376, 2560, 1461, 2923, 3277, 5381, 5737, 8121, 2566, 3967, 1847, 3635, 2577, 5051, 5401, 6823, 2587, 5765, 7571, 58, 3323, 1500, 429, 1501, 3665, 1135, 774, 74, 2251, 5435, 6148, 6858, 1512, 2615, 84, ...
Test
3,933
2
Rooting_(Android):rooting android rooting process allowing users smartphones tablets devices running android mobile operating system attain privileged control known root access various android subsystems android uses linux kernel rooting android device gives similar access administrative superuser permissions linux unix-like operating system freebsd macos rooting often performed goal overcoming limitations carriers hardware manufacturers put devices thus rooting gives ability permission alter replace system applications settings run specialized applications apps require administrator-level permissions perform operations otherwise inaccessible normal android user android rooting also facilitate complete removal replacement device operating system usually recent release current operating system root access sometimes compared jailbreaking devices running apple ios operating system however different concepts jailbreaking bypass several types apple prohibitions end user including modifying operating system enforced locked bootloader installing non-officially approved available google play applications via sideloading granting user elevated administration-level privileges rooting many vendors htc sony asus google explicitly provide ability unlock devices even replace operating system entirely similarly ability sideload applications typically permissible android devices without root permissions thus primarily third aspect ios jailbreaking giving users administrative privileges directly correlates android rooting rooting lets user-installed applications run privileged commands typically unavailable devices stock configuration rooting required advanced potentially dangerous operations including modifying deleting system files removing pre-installed applications low-level access hardware rebooting controlling status lights recalibrating touch inputs typical rooting installation also installs superuser application supervises applications granted root superuser rights requesting approval user granting said permissions secondary operation unlocking device bootloader verification required remove replace installed operating system contrast ios jailbreaking rooting needed run applications distributed outside google play store sometimes called sideloading android os supports feature natively two ways unknown sources option settings menu android debug bridge however us carriers including prevented installation applications play store firmware although several devices subject rule including samsung infuse 4g lifted restriction devices middle 2011. amazon kindle fire defaults amazon appstore instead google play though like android devices kindle fire allows sideloading applications unknown sources easy installer application amazon appstore makes easy vendors android devices may look sources future access alternate apps may require rooting rooting always necessary rooting android phone lets owner add edit delete system files turn lets perform various tweaks use apps require root access advantages rooting include possibility complete control look feel device superuser access device system files aspects operating system customized real limitation level coding expertise immediately expectable advantages rooted devices include following rooting methods involve use command prompt development interface called android debug bridge adb methods may use specialized applications simple clicking one button devices sometimes even different variants device different hardware configurations thus guide rom root method used device variant different hardware setup risk bricking device recent years new method rooting android devices called systemless root systemless root uses various techniques gain root access without modifying system partition device one example magisk also ability hide root access applications refuse work safetynet protected applications like android pay pokémon go distinction soft rooting third-party application uses security vulnerability root exploit hard-rooting flashing codice_1 binary executable sometimes made phone soft rooted vulnerable malware process rooting varies widely device usually includes exploiting one security bugs firmware i.e. version android os installed device exploit discovered custom recovery image skip digital signature check firmware updates flashed modified firmware update typically includes utilities needed run apps root installed example codice_1 binary open-source one paired superuser supersu application copied location current process path e.g. codice_3 granted executable permissions codice_4 command third-party supervisor application like superuser supersu regulate log elevated permission requests applications many guides tutorials automatic processes exist popular android devices facilitating fast easy rooting process process rooting device may simple complex even may depend upon serendipity example shortly release htc dream htc g1 discovered anything typed using keyboard interpreted command privileged root shell although google quickly released patch fix signed image old firmware leaked gave users ability downgrade use original exploit gain root access manufacturers including lg htc motorola provide official support unlocking bootloader allows rooting without exploiting vulnerability however support may limited certain phones example lg released bootloader unlock tool certain models phones google-branded android google nexus line devices boot-loader unlocked simply connecting device computer boot-loader mode running fastboot protocol command codice_5 accepting warning boot-loader unlocked new system image written directly flash without need exploit past many manufacturers tried make non-rootable phones elaborate protections like droid x usually still rootable way may root exploit available new recently updated phones one usually available within months 2010 tablet smartphone manufacturers well mobile carriers mainly unsupportive third-party firmware development manufacturers expressed concern improper functioning devices running unofficial software related support costs moreover firmware omnirom cyanogenmod sometimes offer features carriers would otherwise charge premium tethering due technical obstacles locked bootloaders restricted access root permissions commonly introduced many devices example late december 2011 barnes noble amazon.com inc. began pushing automatic over-the-air firmware updates 1.4.1 nook tablets 6.2.1 kindle fires removed one method gain root access devices nook tablet 1.4.1 update also removed users ability sideload apps sources official barnes noble app store without modding however community-developed software began grow popular late 2009 early 2010 following statement copyright office librarian congress us allowing use jailbroken mobile devices manufacturers carriers softened position regarding cyanogenmod unofficial firmware distributions manufacturers including htc samsung motorola sony mobile communications actively provide support encourage development 2011 need circumvent hardware restrictions install unofficial firmware lessened increasing number devices shipped unlocked unlockable bootloaders similar nexus series phones device manufacturer htc announced would support aftermarket software developers making bootloaders new devices unlockable however carriers verizon wireless recently continuously blocked oems htc motorola releasing retail devices unlocked bootloaders opting instead developer edition devices sold unsubsidized off-contract similar practice nexus devices premium contract discounts 2014 samsung released security service called knox tool prevents modifying system boot files attempts set e-fuse 0x1 permanently voiding warranty international treaties influenced development laws affecting rooting 1996 world intellectual property organization wipo copyright treaty requires nations party treaties enact laws drm circumvention american implementation digital millennium copyright act dmca includes process establishing exemptions non-copyright-infringing purposes rooting 2001 european copyright directive implemented treaty europe requiring member states european union implement legal protections technological protection measures copyright directive includes exceptions allow breaking measures non-copyright-infringing purposes run alternative software member states vary implementation directive 2010 electronic frontiers australia said unclear whether rooting legal australia anti-circumvention laws may apply laws strengthened copyright amendment act 2006 november 2012 canada amended copyright act new provisions prohibiting tampering digital locks exceptions including software interoperability rooting device run alternative software form circumventing digital locks purpose software interoperability several efforts 2008 2011 amend copyright act bill c-60 bill c-61 bill c-32 prohibit tampering digital locks along initial proposals c-11 restrictive bills set aside 2011 michael geist canadian copyright scholar cited iphone jailbreaking non-copyright-related activity overly-broad copyright act amendments could prohibit free software foundation europe argues legal root flash device according european directive 1999/44/ec replacing original operating system another void statutory warranty covers hardware device two years unless seller prove modification caused defect law copyright related rights regulations 2003 makes circumventing drm protection measures legal purpose interoperability copyright infringement rooting may form circumvention covered law tested court competition laws may also relevant see also european union section india copyright law permits circumventing drm non-copyright-infringing purposes indian parliament introduced bill including drm provision 2010 passed 2012 copyright amendment bill 2012 india signatory wipo copyright treaty requires laws drm circumvention listed us special 301 report priority watch list applied pressure develop stricter copyright laws line wipo treaty new zealand copyright law allows circumvention technological protection measure tpm long use legal non-copyright-infringing purposes law added copyright act 1994 part copyright new technologies amendment act 2008 rooting might legal singapore done provide interoperability circumvent copyright tested court unlocking consumer choice wireless competition act guarantees consumers unlock let others unlock phones digital millennium copyright act dmca rooting illegal united states except exemption u.s copyright office granted exemption law least 2015 2010 response request electronic frontier foundation u.s copyright office explicitly recognized exemption dmca permit rooting ruling library congress affirmed july 26 2010 rooting exempt dmca rules respect circumventing digital locks dmca exemptions must reviewed renewed every three years else expire october 28 2012 us copyright office updated exemption policies rooting smartphones continues legal circumvention accomplished sole purpose enabling interoperability lawfully obtained software applications computer programs telephone handset however u.s copyright office refused extend exemption tablets arguing term tablets broad ill-defined exemption class devices could unintended side effects copyright office also renewed 2010 exemption unofficially unlocking phones use unapproved carriers restricted exemption phones purchased january 26 2013 tim wu professor columbia law school argued 2007 jailbreaking legal ethical plain fun wu cited explicit exemption issued library congress 2006 personal unlocking notes locks used wireless carriers limit ability subscribers switch carriers business decision nothing whatsoever interests protected copyright thus implicate dmca wu claim exemption applies help others unlock device traffic software 2010 2012 u.s copyright office approved exemptions dmca allow users root devices legally still possible employ technical countermeasures prevent rooting prevent rooted phones functioning also unclear whether legal traffic tools used make rooting easy
[ 362, 6788, 2, 5372, 6427, 1095, 2564, 5386, 740, 1108, 4340, 42, 3310, 2591, 5771, 2240, 5775, 7956, 6515, 5473, 4400, 474, 6183, 822, 136, 6209, 1582, 6937, 6232, 3063, 4101, 4116, 5195, 195, 6978, 7346, 561, 201, 2017, 5919, 7357, 2...
Test
3,934
2
XMK_(operating_system):xmk operating system extreme minimal kernel xmk real-time operating system rtos designed minimal ram/rom use achieves goal though almost entirely written c programming language consequence easily ported 8- 16- 32-bit microcontroller xmk comes two independent packages xmk scheduler contains core kernel everything necessary run multithreaded embedded application application programming layer apl provides higher level functions atop xmk scheduler api xmk distribution contains standard libraries libc part development tools target systems
[ 5571, 1435, 4336 ]
Validation
3,935
5
Persistent_uniform_resource_locator:persistent uniform resource locator persistent uniform resource locator purl uniform resource locator url i.e. location-based uniform resource identifier uri used redirect location requested web resource purls redirect http clients using http status codes purl concept generic used designate redirection service named purl resolver purls used curate url resolution process thus solving problem transitory uris location-based uri schemes like http technically string resolution purl like sef url resolution remainder article oclc purl system proposed implemented oclc online computer library center purl concept developed oclc 1995 purl system implemented using forked pre-1.0 release apache http server software modernized extended 2007 zepheira contract oclc official website moved http //purlz.org z came zepheira name used differentiate purl open-source software site purl resolver operated oclc purl version numbers may considered confusing oclc released versions 1 2 apache-based source tree initially 1999 oclc research public license 1.0 license later oclc research public license 2.0 license http //opensource.org/licenses/oclc2 zepheira released purlz 1.0 2007 apache license version 2.0 purlz 2.0 released beta testing 2010 release never finalized callimachus project implemented purls 1.0 release 2012 oldest purl http resolver operated oclc 1995 september 2016 reached purl.oclc.org well purl.org purl.net purl.com notable purl resolvers include us government printing office http //purl.fdlp.gov operated federal depository library program operation since 1997 purl concept used w3id.org may replace old purl-services purl-technologies 27 september 2016 oclc announced cooperation internet archive resulting transfer resolver service administration interface internet archive service supported newly created software separate previous implementations transfer reenabled ability manage purl definitions disabled oclc hosted service several months service hosted internet archive servers supports access via purl.org purl.net purl.info purl.com oclc redirecting dns requests purl.oclc.org purl.org purl concept allows generalized url curation http uris world wide web purls allow third party control url resolution resource metadata provision url simply address resource world wide web persistent url address world wide web causes redirection another web resource web resource changes location hence url purl pointing updated user purl always uses web address even though resource question may moved purls may used publishers manage information space web users manage purl service independent publisher information purl services thus allow management hyperlink integrity hyperlink integrity design trade-off world wide web may partially restored allowing resource users third parties influence url resolves simple purl works responding http get request returning response type 302 equivalent http status code 302 meaning found response contains http location header value url client subsequently retrieve via new http get request purls implement one form persistent identifier virtual resources persistent identifier schemes include digital object identifiers dois life sciences identifiers lsids persistent identification schemes provide unique identifiers possibly changing virtual resources schemes provide curation opportunities curation virtual resources defined active involvement information professionals management including preservation digital data future use purls criticized need resolve url thus tying purl network location network locations several vulnerabilities domain name system registrations host dependencies failure resolve purl could lead ambiguous state would clear whether purl failed resolve network failure prevented exist purls valid urls components must map url specification scheme part tells computer program web browser protocol use resolving address scheme used purls generally http host part tells purl server connect next part purl domain analogous resource path url domain hierarchical information space separates purls allows purls different maintainers one designated maintainers may administer purl domain finally purl name name purl domain name together constitute purl id permalink purl used permanent/persistent url redirect location requested web resource roughly speaking differences domain name time scale common types purls named coincide http response code return http response codes equivalent purl types purl servers implement purl types http response codes e.g 401 unauthorized clear meanings context http conversation apply process http redirection three additional types purls chain partial clone given mnemonic names related functions purls so-called simple purls provide redirection desired resource http status code hence purl type simple purl 302 intent 302 purl inform web client end user purl always used address requested resource final uri resolved allow continued resolution resource purl changes operators prefer use purls type 301 indicating final uri addressed future requests purl type chain allows purl redirect another purl manner identical 301 302 redirection difference purl server handle redirection internally greater efficiency efficiency useful many redirections possible since web browsers stop following redirections set limit encountered attempt avoid loops purl type 200 active purl purl actively participates creation aggregation metadata returned active purl includes arbitrary computation produce output active purls implemented purlz 2.0 callimachus project may used gather runtime status reports perform distributed queries type data collection persistent identifier desired active purls act similar stored procedure relational databases purl type 303 used direct web client resource provides additional information regarding resource requested without returning resource subtlety useful http uri requested used identifier physical conceptual object represented information resource purls type 303 used often redirect metadata serialization format resource description framework rdf relevance semantic web linked data content use 303 http status code conformant http-range-14 finding technical architecture group world wide web consortium purl type 307 informs user resource temporarily resides different url norm purls types 404 410 note requested resource could found suggests information support http 307 temporary redirect 404 found 410 gone response codes provided completeness purls types 404 410 provided assist administrators marking purls require repair purls types allow efficient indications resource identification failure target resources moved suitable replacement identified purls type clone used solely purl administration convenient method copying existing purl record new purl purl service includes concept known partial redirection request match purl exactly requested url checked determine contiguous front portion purl string matches registered purl redirection occurs remainder requested url appended target url example consider purl url nowiki http//purl.org/some/path/ /nowiki target url nowiki http //example.com/another/path/ /nowiki attempt perform http get operation url nowiki http//purl.org/some/path/and/some/more/data /nowiki would result partial redirection nowiki http //example.com/another/path/and/some/more/data /nowiki concept partial redirection allows hierarchies web-based resources addressed via purls without resource requiring purl one purl sufficient serve top-level node hierarchy single target server new purl service uses type partial denote purl performs partial redirection partial redirections level url path violate common interpretations http 1.1 specification however handling url fragments across redirections standardized consensus yet emerged fragment identifiers indicate pointer specific information within resource designated following separator uris partial redirection presence fragment identifier problematic two conflicting interpretations possible fragment attached purl type partial purl service assume fragment meaning target url discard presumption resource changed location may also changed content thus invalidating fragments defined earlier bos suggested fragments retained passed target urls http redirections resulting 300 multiple choice 301 moved permanently 302 found 303 see responses unless designated target url already includes fragment identifier fragment identifier already present target url fragment original url abandoned unfortunately bos ’ suggestion failed navigate ietf standards track expired without work dubost et al resurrected bos ’ suggestions w3c note standard guidance absence standard makers web clients browsers generally failed follow bos ’ guidance starting purlz 1.0 series purl service implements partial redirections inclusive fragment identifiers writing fragments onto target urls attempt comply avoid problematic inconsistent behavior browser vendors
[ 1411, 2086, 5151, 3776, 4198, 84, 7290, 87 ]
Test
3,936
3
RAD750:rad750 rad750 radiation-hardened single board computer manufactured bae systems electronics intelligence support successor rad6000 rad750 use high radiation environments experienced board satellites spacecraft rad750 released 2001 first units launched space 2005 cpu 10.4 million transistors order magnitude rad6000 1.1 million manufactured using either 250 150 nm photolithography die area 130 mm core clock 110 200 mhz process 266 mips cpu include extended l2 cache improve performance cpu withstand 200,000 1,000,000 rads 2,000 10,000 gray temperature ranges –55 °c 125 °c requires 5 watts power standard rad750 single-board system cpu motherboard withstand 100,000 rads 1,000 gray temperature ranges –55 °c 70 °c requires 10 watts power rad750 system price comparable rad6000 us 200,000 per board per 2002 reference however customer program requirements quantities greatly affect final unit costs rad750 based powerpc 750 packaging logic functions completely compatible powerpc 7xx family term rad750 registered trademark bae systems information electronic systems integration inc 2010 reported 150 rad750s used variety spacecraft notable examples order launch date include
[ 7327, 2719, 3348, 4661, 1075, 1346, 2458, 3440, 1083, 4408, 5652, 912, 7361, 2845, 3708, 5665, 4702, 1199, 1386, 1388, 6204, 7099, 234, 2501, 239, 6474, 8125, 4815, 1131, 6226, 608, 7499, 1237, 2257, 3674, 5622 ]
Test
3,937
2
Microsoft_Mahjong:microsoft mahjong microsoft mahjong formerly mahjong titans taipei computer game version mahjong solitaire published microsoft version titled mahjong titans developed oberon games included windows vista windows 7 except starter home basic editions takes advantage new graphical user interface gui windows vista includes features tile set background choices windows vista builds 5219 5231 5259 game known shanghai solitaire game make windows 8 however standalone version developed arkadium published microsoft studios downloaded windows store free charge older version game known taipei bundled microsoft entertainment pack 1 best microsoft entertainment pack version included 32767 possible configurations player choice six tile layouts cat turtle crab dragon fortress spider stylized portrayal respective object animal background image chosen five different options four tile sets including traditional mahjong tiles variations fuller coloring larger print alternative pastel tile set entirely different picture theme games entirely random always least one pair within five tiles topmost five tiles turtle layout often two pairs algorithm tile organization positions tiles mostly paired level otherwise matching tile available accessible position one level check ensure matching tile positioned beneath partner since every tile 3 partners enough prove game impossible solve newer version microsoft mahjong numerous layouts improved graphics sound internet features set daily challenges reward user badges completed xbox live integration
[ 7879, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 6839, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, ...
Test
3,938
2
Keith_Bergelt:keith bergelt keith daniel bergelt born september 11 1958 american corporate executive former u.s. diplomat ceo open invention network responsible coordinating establishment maintenance patent ‘ ‘ no-fly ” zone around linux responsible safeguarding open competitive landscape key technology markets back-office transaction processing mission critical applications mobile communications/smartphones desktop computing bergelt born new york city raised village bayville new york north shore long island attended st. boniface martyr school sea cliff new york graduate locust valley high school high school classmate eileen chamberlain donahoe u.s ambassador un human rights council geneva switzerland bergelt holds degrees duke university ’ trinity college ab dedman school law southern methodist university jd edhec business school theseus mba addition studied management insead institut national des telecommunications int france economics technology policy university san francisco mclaren graduate school business upon graduation law school entered public service held diplomatic postings un new york city american embassy tokyo japan 12-year public service career also lived san francisco california washington d.c colleague tennis partner u.s. treasury secretary tim geithner time together american embassy tokyo early 1990s berlin wall fell wake collapse soviet union bergelt left government service embarked private sector career c-level strategy consulting focused innovation sri consulting menlo park ca sri consulting co-founded first strategy consulting practice area intellectual asset management major strategy consulting firm practice enabled companies develop strategies effectively build manage leverage value codified patents trademarks copyrights non-codified knowledge know-how etc intellectual capital licensing joint ventures donation abandonment creation spin-outs spin-ups spin-ins uniquely suited monetize corporate intangible assets bergelt brought motorola corporation schaumburg il establish serve general manager strategic intellectual asset management business unit focused distilling value motorola ’ intellectual property addition served director technology strategy tenure motorola following experience motorola coincident departure bob galvin motorola board directors recruited kelso company new york-based private equity firm manage ip strategy business development licensing ip-based portfolio company – cambridge display technology cdt – cambridge england establishing strategy licensing program cdt kelso bergelt engaged texas pacific group tpg full-time advisor technology investment group recruited principal financial group establish run first-of-its-kind ip fund financial services advisory firm focused transforming ip viable source collateral fourth lending vertical complement asset-based lending backed property/plant/equipment accounts receivable inventory tenure ceo paradox capital bergelt worked professionals banking ip law raise 350mm capital enabled paradox pioneer emergence ip viable asset class asset-based lending obviate necessity second lien lending ip-rich companies bergelt recruited ibm red hat sony nec philips novell serve ceo open invention network pro-competitive defensive patent management organization established enable freedom operate linux support democratization innovation occasioned open source projects linux 'bergelt chief executive officer open invention network since 2008 responsible defending integrity linux ecosystem previously bergelt criticized microsoft several times behavior towards open source community microsoft changed behavior embraced open source community signed open invention network cross license bergelt pleased company also interviewed linux.com 2008 linuxworld expo
[ 5540, 5453, 5803, 3174, 3084, 462, 7429, 1351, 1535, 1260, 1822, 7528, 1176, 4401, 5292, 2559, 3780, 5822, 5829, 6725, 1192, 578, 6736, 7740, 7463, 7555, 7559, 5759, 589, 3559, 412, 4435, 3133, 8149, 2689, 3404, 1227, 7855, 6586, 966, 9...
Test
3,939
4
McCumber_cube:mccumber cube 1991 john mccumber created model framework establishing evaluating information security information assurance programs known mccumber cube security model depicted three-dimensional rubik cube-like grid concept model developing information assurance systems organizations must consider interconnectedness different factors impact devise robust information assurance program one must consider security goals program see also goals relate specifically various states information reside system full range available security safeguards must considered design mccumber model helps one remember consider important design aspects without becoming focused one particular i.e. relying exclusively technical controls expense requisite policies end-user training per john mccumber website idea push back advance security art support structured methodology functions independent technology evolution basis methodology inter-relationship among confidentiality integrity availability storage transmission processing applying policy procedures human side technology
[ 5568 ]
Validation
3,940
2
Apple_Push_Notification_service:apple push notification service apple push notification service commonly referred apple notification service apns platform notification service created apple inc. enables third party application developers send notification data applications installed apple devices notification information sent include badges sounds newsstand updates custom text alerts first launched ios 3 june 17 2009 apns support local applications later added mac os x api beginning release mac os x 10.7 lion support website notifications later added release mac os x 10.9 mavericks apple announced service june 9 2008 original stated release september however stated scott forstall ios 3.0 preview event march 17 2009 rollout delayed decision restructure apns scalability purposes due allegedly overwhelming response announcement apns events forstall stated push notifications better conserve battery background processes used pull technology receiving notifications apns first launched together ios 3.0 june 17 2009 release ios 5.0 included notification center adding support receiving reading local notifications single place apns also added api mac os x 10.7 lion developers could begin updating third-party applications start utilizing service support later improved os x 10.8 mountain lion introduction notification center ios 5.0 improvement allowed users manage read received notifications single location release os x 10.9 mavericks included safari 7.0 added support accepting receiving apns notifications websites user granted permission 2014 maximum size allowed notification payload sent binary interface increased 256 bytes 2 kilobytes december 2015 new http/2 provider api released apple effectively replacing now-legacy binary interface maximum notification payload size allowed using http/2 api 4 kilobytes october 22 2014 apple announced would cease support ssl 3.0 october 29 2014 due poodle attack gained public attention shortly date developers required use tls protocol send notification using apns
[ 6788, 713, 7890, 4320, 2926, 4690, 734, 5752, 2587, 6832, 6125, 3989, 2954, 2597, 1123, 3322, 6847, 1502, 6142, 2609, 5786, 1895, 4740, 1897, 5091, 4749, 6505, 7601, 2627, 7609, 1171, 5109, 7971, 2284, 1178, 6188, 1187, 1940, 2300, 5486, ...
Validation
3,941
0
Automated_Lip_Reading:automated lip reading automated lip reading alr software technology developed speech recognition expert frank hubner video image person talking analysed software shapes made lips examined turned sounds sounds compared dictionary create matches words spoken technology used successfully analyse silent home movie footage adolf hitler taken eva braun bavarian retreat berghof video words included documentary titled hitler private world revealed studios 2006 source new technology catches hitler guard
[ 1314, 7372, 3095 ]
Test
3,942
3
Kaby_Lake:kaby lake kaby lake intel codename processor microarchitecture intel announced august 30 2016 like preceding skylake kaby lake produced using 14 nanometer manufacturing process technology breaking intel previous tick–tock manufacturing design model kaby lake represents optimized step newer process-architecture-optimization model kaby lake began shipping manufacturers oems second quarter 2016 mobile chips started shipping kaby lake desktop chips officially launched january 2017 august 2017 intel announced kaby lake refresh kaby lake r marketed 8th generation mobile cpus breaking long cycle architectures matched corresponding generations cpus skylake anticipated succeeded 10 nanometer cannon lake announced july 2015 cannon lake delayed second half 2017 meantime intel released fourth 14 nm generation october 5 2017 named coffee lake kaby lake first intel platform lack official driver support versions windows older windows 10 furthermore windows update disabled windows 8.1 earlier although enthusiast-created modification released disabled check allowed continue work platform previous intel processors 8088 banias dothan conroe sandy bridge ivy bridge skylake kaby lake development led intel israeli team based haifa intel israel development centers manager ran senderovitz said started project thinking basic improvements previous generation began looking things differently lot innovation determination achieved major improvements added performance seventh generation chips improved 12 applications 19 internet use compared sixth generation chips third-party benchmarks confirm percentages far gaming concerned built improved 14 nm process 14ff+ kaby lake features faster cpu clock speeds clock speed changes higher turbo frequencies beyond process clock speed changes little cpu architecture changed skylake resulting identical ipc instructions per clock kaby lake features new graphics architecture improve performance 3d graphics 4k video playback adds native hdcp 2.2 support along fixed function decode h.264 hevc main main10/10-bit vp9 10-bit 8-bit video hardware encode supported h.264 hevc main10/10-bit vp9 8-bit video vp9 10-bit encode supported hardware opengl 4.6 opencl 2.1 supported kaby lake first core architecture support hyper-threading pentium-branded desktop cpu sku kaby lake also features first overclocking-enabled i3-branded cpu kaby lake features cpu core performance per mhz skylake features specific kaby lake include microsoft officially supports kaby lake computers running windows 10 per support policies windows update blocks updates installed kaby lake systems running versions older windows 10 support position intel provides chipset drivers windows 10 enthusiast-created modification released disabled windows update check allowed windows 8.1 earlier continue updated platform kaby lake critical flaw short loops may cause unpredictable system behavior issue fixed motherboard manufacturer releases bios update fix thermal design power tdp designed maximum heat generated chip running specific workload base clock single microarchitecture heat produced increases voltage frequency thermal design limit also limit maximum frequency processor however cpu testing binning allows products lower voltage/power particular frequency higher frequency within power limit desktop processors mobile processors features common desktop kaby lake cpus maximum pcie lanes 16 release date q1 2017 late 2016 reported intel working processor family codenamed “ kaby lake r ” r stands refresh august 21 2017 eighth generation mobile cpus announced first products released four kaby lake r processors 15w tdp marketing distinct previous generational changes core product line new generation coincided new microarchitecture intel stated 8th generation would based multiple microarchitectures including kaby lake coffee lake cannon lake maximum number pcie lanes 8 release date q1 2018 august 28 2018 intel announced refreshed lineup ultra low power mobile kaby lake cpus moniker amber lake
[ 2449, 2814, 5802, 6332, 6698, 6793, 3942, 3849, 4765, 6170, 3443, 6344, 6616, 4108, 1640, 1465, 7449, 1645, 7453, 3020, 7364, 3717, 5669, 5670, 584, 3803, 6647, 7280, 1867, 1770, 3565, 4077, 7666, 3139, 4985, 766, 691, 5343, 6057, 4098, ...
Test
3,943
7
Yandex_Disk:yandex disk yandex.disk cloud service created yandex lets users store files “ cloud ” servers share others online service based syncing data different devices yandex.disk launched english june 2012 storage — users upload save files restrictions length time files stored files uploaded encrypted connection checked antivirus syncing — files synced user internet-enabled devices either web interface yandex.disk mobile/desktop application sharing — users share file download links others preview — built-in flash player lets people preview songs integration yandex services — lets people manage files yandex services yandex.mail yandex.narod sent received mail attachments automatically placed one folder easily searched webdav support — means files managed application supporting webdav protocol yandex.disk api used software program supporting webdav web version located inside yandex.mail “ files ” tab applications available following operating systems mobile version included part yandex.mail mobile app lets users view files yandex.disk upload files mobile device download files use offline email file download links yandex.disk api also supports webdav protocol allows third-party applications upload files yandex cloud storage service yandex.disk api makes easier sync info smartphones tablet pcs laptops desktop computers api lets developers yandex.disk api documentation released april 28 2012 service provided completely free charge everyone starts free allowance 10gb easily increased 512 mb increments referring others additional maximum 10 gb 20 gb total also additional storage paid monthly yearly basis choose enable device auto-uploads using yandex.disk app android ios granted additional 32 gb free storage increases maximum storage 10 gb 42 gb april 5 2012 – beta version service launched may 3 2012 – first api open source client launched may 24 2012 – flash player introduced web interface “ save disk ” button added shared file page allows users share files published others account june 26 2012 – english turkish versions available
[ 2961, 3430, 1911, 3328, 4594, 7013, 7102, 578, 4759, 3460, 5571, 7083, 854, 1589 ]
Test
3,944
9
Off-side_rule:off-side rule computer programming language said adhere off-side rule blocks language expressed indentation term coined peter j. landin offside rule football contrasted free-form languages notably curly-bracket programming languages indentation meaningful indent style matter convention code formatting peter j. landin article called next 700 programming languages defined off-side rule thus non-whitespace token left first token previous line taken start new declaration following example indentation blocks python colons part python language syntax readability necessary implement off-side rule python rule taken define boundaries statements rather declarations python also suspends off-side rule within brackets statement within brackets continues brackets match mismatch off-side rule implemented lexical analysis phase python increasing indentation results lexer outputting indent token decreasing indentation results lexer outputting dedent token tokens correspond opening brace codice_1 closing brace codice_2 languages use braces blocks means phrase grammar depend whether braces indentation used requires lexer hold state namely current indentation level thus detect changes indentation changes thus lexical grammar context-free – indent/dedent depend contextual information previous indentation level primary alternative delimiting blocks popularized c ignore whitespace mark blocks explicitly curly brackets i.e. codice_1 codice_2 delimiter allows freedom – developer might choose indent small pieces code like break continue statements – sloppily indented code might lead reader astray lisp s-expression based languages differentiate statements expressions parentheses enough control scoping statements within language curly bracket languages whitespace mostly ignored reader i.e. read function whitespace used separate tokens explicit structure lisp code allows perform automatic indentation acts visual cue human lisp readers another alternative block begin end explicit keywords example algol 60 descendant pascal blocks start keyword codice_5 end keyword codice_6 languages pascal means newlines important unlike curly brace languages indentation basic fortran blocks begin block name codice_7 end block name prepended codice_8 e.g. codice_9 fortran every block also unique block name adds additional level explicitness lengthy code algol 68 bourne shell sh bash similar ending block usually given name block written backward e.g. codice_10 starts switch statement spans matching codice_11 similarly conditionals codice_12 ... codice_13 ... codice_14 ... codice_15 ... codice_16 loops codice_17 ... codice_18 ... codice_19 algol68 codice_17 ... codice_18 ... codice_22 bash interesting variation made modula-2 pascal-like language away difference one multiline blocks allows block opener codice_1 codice_24 skipped function level block requiring block terminating token codice_2 codice_8 also fixes dangling else custom codice_6 token placed indentation level rest block giving blockstructure readable one advantage fortran approach improves readability long nested otherwise complex code group outdents closing brackets alone provide contextual cues blocks closed necessitating backtracking closer scrutiny debugging addition languages allow suffix end-like keywords improve cues codice_28 versus codice_29 however modern code editing applications often provide visual indicators features folding assist drawbacks
[ 6507, 1908, 3931, 3772, 6712, 4589, 7533, 2740, 3106, 2211, 3966, 920, 1102, 666, 6120, 1763, 1114, 2866, 5948, 4078, 5190, 336, 5171, 160, 4543, 7032, 5965, 6497, 6498, 2803, 1435 ]
Test
3,945
5
Ephemeral_port:ephemeral port ephemeral port short-lived transport protocol port internet protocol ip communications ephemeral ports allocated automatically predefined range ip stack software ephemeral port typically used transmission control protocol tcp user datagram protocol udp stream control transmission protocol sctp port assignment client end client–server communication well-known port server servers ephemeral ports may also used port assignment server end communication done continue communications client initially connected one server well-known service listening ports file transfer protocol ftp remote procedure call rpc applications two protocols behave manner note term server includes workstations running network services receive connections initiated clients e.g remote desktop protocol allocations temporary valid duration communication session completion timeout communication session ports become available reuse since ports used per request basis also called dynamic ports internet assigned numbers authority iana suggests range 49152 65535 2+2 2−1 dynamic private ports many linux kernels use port range 32768 61000 freebsd used iana port range since release 4.6 previous versions including berkeley software distribution bsd use ports 1024 5000 ephemeral ports microsoft windows operating systems xp use range 1025–5000 ephemeral ports default windows vista windows 7 server 2008 use iana range default windows server 2003 uses range 1025–5000 default microsoft security update ms08-037 2008 installed uses iana range default windows server 2008 exchange server 2007 installed default port range 1025–60000 addition default range versions windows since windows 2000 option specifying custom range anywhere within 1025–65535 certain server software used uses non ephemeral custom port ranges initiating connections needs ensured configuration custom port range ephemeral port range overlap
[ 3821, 5847, 2885, 3172, 7637, 4759, 1354, 7508, 4650, 3855, 6367 ]
Train
3,946
5
SMART_Multicast:smart multicast smart multicast experimental method secure reliable ip multicast allows user forward ip datagrams unlimited group receivers see article multicast general discussion subject article specifically smart ip multicast ip multicast successfully deployed private controlled networking environments example ip fiber cable tv operators educational institutions significant on-campus student housing financial sector applications stock tickers hoot-n-holler systems however ip multicast slow adopted interdomain routing environment current interdomain infrastructure lacks necessary tools efficiently handle packet loss security needed create functional business model smart ip multicast experimental protocol enables interdomain transmission secure reliable ip multicast thus overcoming challenges deploying wide area interdomain ip multicast transmissions smart ip multicast reduces complexity deploying wide area ip multicast way mftp multicast file transfer protocol accomplishes goal file transfer namely allowing security reliability full interoperability ip multicast file distribution successful use ip multicast within campus commercial networks file distribution used variant experimental protocol mftp multicast file transfer protocol mftp secure reliable runs top ip multicast protocol like mftp smart multicast wrapper runs top ip multicast taking advantage ip multicast efficiency smart multicasts secure reliable provide bi-directional feedback info see rfc3170 ip multicast applications challenges solutions smart supports mbone like implementation multicast sites use dynamically allocated multicast tunnels smart takes advantage simple self implementing multicast protocol level escalation four forms ip addressing unique properties
[ 979, 5519, 827, 7297 ]
Validation
3,947
7
P-GRADE_Portal:p-grade portal p-grade grid portal software web portals manage life-cycle executing parallel application grid computing developed laboratory parallel distributed systems lpds hungarian academy sciences hungary building onto gridsphere portal framework p-grade portal hides details grid systems high-level interfaces integrated middleware offers portlet based access following services p-grade portal allows multi-user development execution workflows also provides support workflow level grid interoperation portal supports various middleware technologies including globus toolkit egee lcg glite advanced resource connector p-grade portal developed gnu general public license online tutorials videos documents available p-grade portal site release p-grade grid portal version 2.10 2.9 version introduced features portable batch system pbs platform lsf cluster support edges 3g bridge resource support local ps port support extended nordugrid arc support p-grade portal served grid communities research industry providing access grids including application specific portals created adding application specific portlets p-grade portal omitting generic purpose portlets hiding underlying workflow within application specific portlet applications include grid application support centre gasuc established 2008 within laboratory parallel distributed systems supported part european grid infrastructure gasuc provides assistance porting legacy applications onto grid infrastructures
[ 2362, 4159, 1293, 138, 8160, 3915, 5571, 5834, 7930, 4226 ]
Test
3,948
3
Minimal_instruction_set_computer:minimal instruction set computer minimal instruction set computer misc processor architecture small number basic operations corresponding opcodes instruction sets commonly stack-based rather register-based reduce size operand specifiers stack machine architecture inherently simpler since instructions operate top-most stack entries result stack architecture overall smaller instruction set smaller faster instruction decode unit overall faster operation individual instructions separate stack definition misc architecture misc architecture defined respect number instructions supported also instruction pipelines misc rule tend simple instruction pipelines branch prediction out-of-order execution register renaming speculative execution broadly exclude cpu classified misc architecture system first digital computers implemented instruction sets modern definition minimal instruction set computers among various computers illiac ordvac compatible instruction sets early stored-program computers disadvantage misc instructions tend sequential dependencies reducing overall instruction-level parallelism misc architectures much common forth programming language java virtual machine weak providing full instruction-level parallelism probably commercially successful misc original inmos transputer architecture floating-point unit however many eight-bit microcontrollers embedded computer applications fit category stereo spacecraft includes two p24 misc cpus two cpu24 misc cpus
[ 5012, 1447, 5371, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 441, 2266, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4845, 4847, 4479, 895, ...
Test
3,949
2
Installwatch:installwatch installwatch program designed make easier catalog maintain software installed source code originally developed stand-alone project installwatch exists primarily component checkinstall installwatch originally written pancrazio 'ezio de mauro 1998 development later taken felipe sánchez installwatch allows user monitor files directories created installation software package real-time allows user know exactly installed system purposes documentation later removal software used installwatch limited usefulness create log installation process felipe sánchez created checkinstall takes information generated installwatch uses create installable package used linux distribution makes use debian slackware red hat package management systems use checkinstall largely superseded installwatch alone installwatch merged checkinstall distribution older stand-alone versions installwatch still remain primarily historical educational purposes present version installwatch packaged checkinstall incompatible current version gnu coreutils core utilities installwatch ca n't monitor changes made coreutils rendering logs incomplete depending software package may completely invalidate information provided installwatch thus program depends checkinstall issue documented slackware 12 changelog prompted checkinstall removal distribution august 3 2007 problem explained detailed felipe sánchez checkinstall mailing list updated version checkinstall promised coming soon address issue meantime workaround suggested
[ 7075, 6586 ]
Validation
3,950
4
Packet_crafting:packet crafting packet crafting technique allows network administrators probe firewall rule-sets find entry points targeted system network done manually generating packets test network devices behaviour instead using existing network traffic testing may target firewall ids tcp/ip stack router component network packets usually created using packet generator packet analyzer allows specific options flags set created packets act packet crafting broken four stages packet assembly packet editing packet play packet decoding tools exist stages tools focussed one stage others ostinato try encompass stages packet assembly creation packets sent popular programs used packet assembly hping nemesis ostinato cat karat packet builder libcrafter libtins pcapplusplus scapy wirefloss yersinia packets may protocol designed test specific rules situations example tcp packet may created set erroneous flags ensure target machine sends reset command firewall blocks response packet editing modification created captured packets involves modifying packets manners difficult impossible packet assembly stage modifying payload packet programs scapy ostinato netdude allow user modify recorded packets fields checksums payloads quite easily modified packets saved packet streams may stored pcap files replayed later packet play packet replay act sending pre-generated captured series packets packets may come packet assembly editing captured network attacks allows testing given usage attack scenario targeted network tcpreplay common program task since capable taking stored packet stream pcap format sending packets original rate user-defined rate scapy also supports send functions replay saved packets/pcap ostinato added support pcap files version 0.4 packet analyzers also capable packet replay packet decoding capture analysis network traffic generated packet play order determine targeted network response scenario created packet play response must captured packet analyzer decoded according appropriate specifications depending packets sent desired response may packets returned connection successfully established among others famous tools task wireshark scapy
[ 6574, 726, 1813, 588, 5513, 8023, 3680, 7696 ]
Test
3,951
3
Transaction_processing:transaction processing transaction processing information processing computer science divided individual indivisible operations called transactions transaction must succeed fail complete unit never partially complete example purchase book online bookstore exchange money form credit book credit good series related operations ensures get book bookstore gets money however single operation series fails exchange entire exchange fails get book bookstore get money technology responsible making exchange balanced predictable called transaction processing transactions ensure data-oriented resources permanently updated unless operations within transactional unit complete successfully combining set related operations unit either completely succeeds completely fails one simplify error recovery make one application reliable transaction processing systems consist computer hardware software hosting transaction-oriented application performs routine transactions necessary conduct business examples include systems manage sales order entry airline reservations payroll employee records manufacturing shipping since though necessarily transaction processing today interactive term often treated synonymous online transaction processing transaction processing designed maintain system integrity typically database modern filesystems known consistent state ensuring interdependent operations system either completed successfully canceled successfully example consider typical banking transaction involves moving 700 customer savings account customer checking account transaction involves least two separate operations computer terms debiting savings account 700 crediting checking account 700 one operation succeeds books bank balance end day must therefore way ensure either operations succeed fail never inconsistency bank database whole transaction processing links multiple individual operations single indivisible transaction ensures either operations transaction completed without error none operations completed errors occur others attempted transaction-processing system rolls back operations transaction including successful ones thereby erasing traces transaction restoring system consistent known state processing transaction began operations transaction completed successfully transaction committed system changes database made permanent transaction rolled back done transaction processing guards hardware software errors might leave transaction partially completed computer system crashes middle transaction transaction processing system guarantees operations uncommitted transactions cancelled generally transactions issued concurrently overlap i.e need touch portion database create conflicts example customer mentioned example 150 savings account attempts transfer 100 different person time moving 100 checking account one succeed however forcing transactions processed sequentially inefficient therefore concurrent implementations transaction processing programmed guarantee end result reflects conflict-free outcome could reached executing transactions sequentially order property called serializability example means matter transaction issued first either transfer different person move checking account succeeds one fails basic principles transaction-processing systems however terminology may vary one transaction-processing system another terms used necessarily universal transaction-processing systems ensure database integrity recording intermediate states database modified using records restore database known state transaction committed example copies information database prior modification transaction set aside system transaction make modifications sometimes called image part transaction fails committed copies used restore database state transaction began also possible keep separate journal modifications database management system sometimes called images required rollback failed transactions useful updating database management system event database failure transaction-processing systems provide database management system fails entirely must restored recent back-up back-up reflect transactions committed since back-up made however database management system restored journal images applied database rollforward bring database management system date transactions progress time failure rolled back result database consistent known state includes results transactions committed moment failure cases two transactions may course processing attempt access portion database time way prevents proceeding example transaction may access portion x database transaction b may access portion database point transaction tries access portion database transaction b tries access portion x deadlock occurs neither transaction move forward transaction-processing systems designed detect deadlocks occur typically transactions cancelled rolled back started different order automatically deadlock n't occur sometimes one deadlocked transactions cancelled rolled back automatically restarted short delay deadlocks also occur among three transactions transactions involved difficult detect point transaction processing systems find practical limit deadlocks detect systems commit rollback mechanisms available undesirable compensating transaction often used undo failed transactions restore system previous state jim gray defined properties reliable transaction system late 1970s acronym acid — atomicity consistency isolation durability transaction changes state atomic either happen none happen changes include database changes messages actions transducers consistency transaction correct transformation state actions taken group violate integrity constraints associated state even though transactions execute concurrently appears transaction others executed either transaction completes successfully commits changes database survive failures retain changes transaction processing benefits standard transaction-processing software ibm information management system first developed 1960s often closely coupled particular database management systems client–server computing implemented similar principles 1980s mixed success however recent years distributed client–server model become considerably difficult maintain number transactions grew response various online services especially web single distributed database practical solution addition online systems consist whole suite programs operating together opposed strict client–server model single server could handle transaction processing today number transaction processing systems available work inter-program level scale large systems including mainframes one effort x/open distributed transaction processing dtp see also java transaction api jta however proprietary transaction-processing environments ibm cics still popular although cics evolved include open industry standards well term extreme transaction processing xtp used describe transaction processing systems uncommonly challenging requirements particularly throughput requirements transactions per second systems may implemented via distributed cluster style architectures used least 2011
[ 1449, 2554, 6430, 5735, 1112, 2226, 1861, 6462, 6128, 7205, 5419, 1495, 5772, 2961, 7213, 6144, 1891, 6500, 6156, 784, 2265, 6505, 7958, 7248, 3005, 3011, 1554, 1943, 6543, 4798, 145, 515, 517, 519, 7303, 4457, 1237, 1616, 5209, 7715, 3...
Test
3,952
2
Nokia_E70:nokia e70 nokia e70 candybar/fold keyboard type smartphone eseries range announced october 2005 released may 2006 two models phone e70-1 world market tri-band 900 1800 1900 mhz gsm umts e70-2 americas tri-band 850 1800 1900 mhz gsm edge packet data capability models use s60 platform 3rd edition top symbian os version 9.1 e70 business version/successor nokia 6800 series 6800 6810 6820 6822 nokia e70 aimed high-end professional market 16 million color screen 352×416 pixel totalling 146,432 pixels resolution e70 capable gsm wifi bluetooth connectivity sip voip functionality currently work firewall router configurations nokia made statement working implementing stun originally planned 2006 available e70-1 april 2012 turn ice also planned 2007 available june 2008 well advanced bluetooth capabilities phone capable connecting six devices simultaneously lacks a2dp support
[ 1066, 5979, 2271, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 5909, 472, 8072, 7170, 2922, 4407, 118, 23, 2564, 3703, 7261, 5039, 484, 7545, 5044, 6908, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 3039, 3653, 4894...
Test
3,953
8
AWS_Elastic_Beanstalk:aws elastic beanstalk aws elastic beanstalk orchestration service offered amazon web services deploying applications orchestrates various aws services including ec2 s3 simple notification service sns cloudwatch autoscaling elastic load balancers elastic beanstalk provides additional layer abstraction bare server os users instead see pre-built combination os platform 64bit amazon linux 2014.03 v1.1.0 running ruby 2.0 puma 64bit debian jessie v2.0.7 running python 3.4 preconfigured docker deployment requires number components defined 'application logical container project 'version deployable build application executable 'configuration template contains configuration information beanstalk environment product finally 'environment combines 'version 'configuration deploys executables uploaded archive files s3 beforehand 'version pointer supported applications software stacks include application performance monitoring automatic upscaling downscaling better performance fault-tolerant applications robust security features user authentication increased availability application supported deployment methods include
[ 5894, 4217, 4928, 6428, 7722, 8083, 4498, 1550, 5571, 7838, 6029, 4163, 7102, 5064, 3135, 6219, 518, 5965, 2530, 5706 ]
Test
3,954
7
OpenNebula_Systems:opennebula systems opennebula systems formerly c12g labs international software company develops provides commercial support open source cloud management platform opennebula.the company first established 2010 c12g labs based madrid c12g founded original developers opennebula october 15 2014 c12g announced would change name opennebula systems associating closely product may 2015 opennebula systems created subsidiary us opennebula systems usa llc located cambridge massachusetts
[ 2988, 7613, 632, 1634, 3091, 6262, 6806, 3627, 5927, 2212, 5135, 1757, 3028, 842, 5064, 330, 2961, 7037, 2700, 1514, 5889 ]
Validation
3,955
9
Free_Pascal:free pascal free pascal compiler fpc compiler closely related programming-language dialects pascal object pascal free software released gnu general public license exception clauses allow static linking runtime libraries packages purpose combination software license supports object pascal dialect well dialects several pascal family compilers certain extent including turbo pascal delphi historical macintosh compilers dialect selected per-unit module basis one dialect used per program follows write compile anywhere philosophy available many cpu architectures operating systems see targets supports inline assembly language includes internal assembler capable parsing several dialects intel style separate projects exist facilitate developing cross-platform graphical user interface gui applications prominent one lazarus integrated development environment ide initially free pascal adopted de facto standard dialect pascal programmers borland pascal later adopted delphi version 2.0 delphi compatibility continuously implemented improved project compilation mode concept developers made clear would incorporate working patches standardized dialects american national standards institute ansi international organization standardization iso create standards-compliant mode small effort made support apple pascal syntax ease interfacing classic mac os macos since apple dialect implements standard pascal features turbo pascal delphi omit free pascal bit iso-compatible 2.2 x release series significantly change dialect objectives beyond roughly delphi 7 level syntax instead aiming closer compatibility notable exception addition support generics free pascal version 2.2.0 several years supported capacity delphi several delphi 2006-specific features added development branch starting work features new delphi 2009 notably addition codice_1 type completed development branch also features objective-pascal extension objective-c cocoa interfacing version 2.7.1 free pascal implemented basic iso pascal mode though many things codice_2 codice_3 procedure file-buffer variable concept file handling still absent version 3.0.0 iso pascal mode fairly complete one remaining bug since fixed trunk branch able compile standardpascal.org p5 iso pascal compiler changes free pascal created borland clarified borland pascal development dos would stop version 7 replaced windows-only product later became delphi student florian paul klämpfl began developing compiler written turbo pascal dialect produced 32-bit code go32v1 dos extender used developed dj gnu programming platform djgpp project time originally compiler 16-bit dos executable compiled turbo pascal two years compiler able compile became 32-bit executable initial 32-bit compiler published internet first contributors joined project later linux port created michael van canneyt five years borland kylix compiler became available dos port adapted use os/2 using eberhard mattes extender emx made os/2 second supported compiling target well florian klämpfl original author daniël mantione also contributed significantly make happen providing original port run-time library os/2 emx compiler improved gradually dos version migrated go32v2 extender culminated release 0.99.5 much widely used prior versions last release aiming turbo pascal compliance later releases added delphi compatibility mode release also ported systems using motorola 68000 family m68k processors release 0.99.8 win32 target added start made incorporating delphi features stabilizing non-beta release began version 1.0 released july 2000 1.0 x series widely used business education 1.0 x releases port 68k cpu redone compiler produced stable code several 68k unix-like amigaos operating systems stabilization would become 1.0 x also porting motorola 68k systems clear design code generator far limited many aspects principal problems adding processors meant rewriting code generator register allocation based principle always keeping three free registers building blocks inflexible difficult maintain reasons 1.1 x series branched 1.0 x main branch december 1999 first changes mostly clean-ups rewrite-redesigns parts compiler code generator register allocator also rewritten remaining missing delphi compatibility added work 1.1.x continued slowly steadily late 2003 working powerpc port became available followed arm port summer 2004 sparc port fall 2004 x86-64-amd64 port early 2004 made compiler available 64-bit platform november 2003 first beta release 1.1 x branch packaged numbered 1.9.0 quickly followed versions 1.9.2 1.9.4 latter introduced os x support work continued version 1.9.6 january 2005 1.9.8 late february 2005 2.0.0 may 2005 2.0.2 december 2005 2.0.4 august 2006 2006 major reworks planned 2.2 rewrite unit system still begun decided instead start stabilizing already implemented features motives roadmap change needs lazarus integrated development environment project particularly internal linker support win64 windows ce os x x86 related features like dwarf betas 2.1.2 2.1.4 version 2.2.0 released september 2007 followed version 2.2.2 august 2008 version 2.2.4 march 2009 2.2 x series vastly improved support activex component object model com interface object linking embedding ole though bugs still found delegation interface using codice_4 keyword partly implemented complete library support activex also improved another major feature internal linker win32 win64 windows ce greatly improveď linking time memory use make compile-link-run cycle lazarus much faster efficiency smart-linking dead code elimination also improved minor new features included improved dwarf 2/3 debug format support optimizations tail recursion omission unneeded stack frames register-based common subexpression elimination cse optimization first implementation generic programming generics support also became available experimentally 2.4.x release series less clear set goals earlier releases unit system rewrite postponed branch became 2.4 created keep risky commits 2.2 stabilize mostly risky commits involved improvements new platforms mac powerpc 64 mac x86-64 iphone many fixes arm x86-64 architectures general well dwarf compiler improvements included whole program optimization wpo devirtualization arm embedded-application binary interface eabi support later 2.2 cycle delphi-like resource support based special sections binary instead pascal constants added feature direly needed lazarus became main highlight branch minor additions memory manager improved heap manager performance threaded environments small improvements delphi compatibility codice_5 improvements interface delegation january 1 2010 free pascal 2.4.0 released followed november 13 2010 bug fix release 2.4.2 support codice_6 loops codice_7 codice_8 classes changes january 2012 free pascal 2.6 released first version 2.6 release series also supported objective pascal os x ios targets implemented many small improvements bug fixes february 2013 fpc 2.6.2 released contained netbsd openbsd releases first time since 1.0.10 based fresh ports march 2014 last point release 2.6 series 2.6.4 launched featuring mostly database fcl-db updates. br version 3.0.0 released november 25 2015 first major release since january 1 2012 contains many new language features fpc new features 3.0 version 3.0.2 released february 15 2017 includes bug fixes minor compiler updates. br version 3.0.4 released november 28 2017. br includes many language improvements previous versions like internal linker executable linkable format elf arm aarch64 ios linux revived i8086 platform extended libraries much free pascal also supports byte code generation java virtual machine version 3.0.0 targets oracle java google android jvm although object pascal syntax fully supported free pascal 3.0.0 also supports armhf platforms like raspberry pi including armv6-eabihf running raspbian mips work 64-bit arm resulted support ios 3.0.0 well native arm android target added ending formerly hacked arm linux target generate native arm libraries android makes porting lazarus applications android using custom drawn interface easier since fpc 2.6.2 openbsd netbsd supported ia32 x86_64 architectures new target embedded added usage without os arm cortex mips mainly instantfpc possible run pascal programs translated time unix scripts cgi back-end like modern compilers free pascal used integrated development environment ide besides independent ides also plugins various existing ides apart compiler ide free pascal provides following libraries
[ 4296, 3623, 3968, 6449, 405, 5055, 410, 753, 7581, 6489, 5786, 783, 4017, 4759, 7970, 2639, 1556, 7990, 5137, 1198, 5846, 6211, 7669, 7308, 1604, 3069, 6960, 7357, 6991, 2026, 5571, 6277, 578, 3463, 1284, 5937, 224, 584, 4885, 5948, 739...
Test
3,956
5
Chirp_spread_spectrum:chirp spread spectrum digital communications chirp spread spectrum css spread spectrum technique uses wideband linear frequency modulated chirp pulses encode information chirp sinusoidal signal frequency increase decrease time often polynomial expression relationship time frequency picture example upchirp frequency increases linearly time sometimes frequency upchirps increase exponentially time spread spectrum methods chirp spread spectrum uses entire allocated bandwidth broadcast signal making robust channel noise chirps utilize broad band spectrum chirp spread spectrum also resistant multi-path fading even operating low power however unlike direct-sequence spread spectrum dsss frequency-hopping spread spectrum fhss add pseudo-random elements signal help distinguish noise channel instead relying linear nature chirp pulse additionally chirp spread spectrum resistant doppler effect typical mobile radio applications chirp spread spectrum originally designed compete ultra-wideband precision ranging low-rate wireless networks 2.45 ghz band however since release ieee 802.15.4a also known ieee 802.15.4a-2007 longer actively considered ieee standardization area precision ranging chirp spread spectrum ideal applications requiring low power usage needing relatively low data rates 1 mbit/s less particular ieee 802.15.4a specifies css technique use low-rate wireless personal area networks lr-wpan however whereas ieee 802.15.4-2006 standard specifies wpans encompass area 10 less ieee 802.15.4a-2007 specifies css physical layer used longer ranges devices moving high speeds part network nanotron css implementation actually seen work range 570 meters devices nanotron implementation work data rates 2 mbit/s higher specified 802.15.4a finally ieee 802.15.4a phy standard actually mixes css encoding techniques differential phase shift keying modulation dpsk achieve better data rates chirp spread spectrum may also used future military applications difficult detect intercept operating low power similar frequency swept waveforms used frequency modulated continuous wave radars measure range distance unmodulated continuous wave doppler radar measure range-rate relative velocity along line sight fm-cw radars widely used radio altimeters aircraft
[ 7876, 6874, 1443, 7241, 2099, 8184, 5387, 7824, 1375, 2117, 4970, 8108, 3724, 2149, 768, 5693, 5175, 1988 ]
Test
3,957
4
Havex:havex havex malware also known backdoor.oldrea rat employed russian attributed apt group “ energetic bear ” “ dragonfly havex discovered 2013 one five known ics tailored malware developed past decade malwares include stuxnet blackenergy industroyer/crashoveride triton/trisis energetic bear began utilizing havex widespread espionage campaign targeting energy aviation pharmaceutical defense petrochemical sectors campaign targeted victims primarily united states europe havex malware discovered researchers cybersecurity researchers f-secure symantec reported ics-cert utilizing information firms 2014 ics-cert alert reported analyzing new malware campaign targeting ics equipment via several attack vectors using opc conduct reconnaissance industrial equipment target network havex malware two primary components rat c c server written php havex also includes opc open platform communications scanning module used search industrial devices network opc scanning module designed scan tcp devices operating ports 44818 105 502 researchers sans noted ports common ics/scada companies siemens rockwell automation abusing opc protocol havex mapped industrial networks inside victim systems researchers note opc scanning module operated older dcom-based distributed component object model opc standard recent opc unified architecture ua havex joins category ics tailored malware written conduct information gathering specific systems havex also exploited supply chain watering-hole attacks ics vendor websites addition spear phishing campaigns gain access victim systems.the watering-hole supply chain attacks twofold methodology first method victims redirected legitimate vendor websites corrupted pages containing havex malware second method attackers compromised vulnerable vendor websites corrupted legitimate software inject havex rat users would unknowingly download malware downloading otherwise legitimate software vendor websites.this method allowed malware bypass traditional security measure software downloaded users authorization install programs onto network known compromised vendors mesa imaging ewon/talk2m mb connect line attack vectors aimed business networks lack robust airgaps many ics environments could allow malware like havex jump easily business networks industrial networks infect ics/scada equipment havex like backdoor malwares also allows injection malicious code onto victim devices specifically havex often used inject karagany payload onto compromised devices karagany could steal credentials take screenshots transfer files dragonfly c c servers dragonfly group utilized havex malware espionage campaign energy aviation pharmaceutical defense petrochemical victims primarily united states europe cybersecurity researchers dragos estimated campaign targeted 2,000 sites regions sectors researchers symantec observed havex malware began seeking energy infrastructure targets initially targeting us canadian defense aviation sectors discovery process researchers examined 146 c c servers associated havex campaign 88 variants malware havex infected systems via watering hole attacks redirecting users malicious websites corrupted websites campaign used lightsout hello exploit kits infect systems havex karagany trojans lightsout exploit kit abused java browser vulnerabilities deliver havex karagany payloads hello exploit kit updated version lightsout exploit kit came use 2013 updated hello exploit kit uses footprinting determine target os versions fonts browser add-ons user information information gathered exploit kit redirects victim malicious url based efficient exploits gain access target
[ 2086, 6644, 6989, 671, 8164, 2891, 8119, 3733 ]
Test
3,958
7
Microsoft_Azure_Web_Sites:microsoft azure web sites microsoft azure web sites cloud computing based platform hosting websites created operated microsoft microsoft azure web sites platform service paas allows publishing web apps running multiple frameworks written different programming languages .net node.js php python java including microsoft proprietary ones 3rd party ones microsoft azure web sites became available first preview version june 2012 official version general availability announced june 2013 microsoft azure web sites originally named windows azure web sites renamed part re-branding move across azure march 2014 subsequently renamed app services march 2015 microsoft azure web sites web-hosting platform supports multiple technologies programming languages .net node.js php python users microsoft azure subscriptions create websites deploy content code web sites microsoft azure web sites supports website creation wizard allows user create blank site create site based one several available pre-configured images website gallery part creating website site url assigned subdomain azurewebsites.net various for-pay tiers website assigned one custom domains implemented setting cname record dns server hosts user domain zone point user web site hosted azure for-pay tiers user added option uploading ssl certificate configuring site bound https site created user add modify content using multiple deployment methods including web deploy msdeploy tfs via visual studio ftp ftps webmatrix codeplex github dropbox bitbucket mercurial local git features azure web sites microsoft azure web sites implemented websites dynamically created on-demand servers running windows server 2012 iis 8.0 client posts request web site microsoft azure web sites dynamically provisions site one azure virtual machines pointing content stored azure storage containers azure virtual machines deployed groups called stamps may contain hundreds machines microsoft deploys stamps azure data centers across world adds stamps demand grows azure web sites services offered 4 tiers entry-level tier free tier free tier supports 10 websites 1 gb content storage limited 165 mb daily data egress first for-pay tier shared tier shared tier sites support custom domains scaled 6 instances current highest for-pay tier standard tier standard tier websites run vms dedicated exclusively single customer websites standard tier supports ssl sni ip-based scaling 10 instances file storage 50 gb content basic standard tier websites deployed 3 sizes virtual machines small vms 1 virtual cpu 1.75gb ram medium vms 2 virtual cpus 3.5 gb ram large vms 4 virtual cpus 7gb available ram microsoft initially offered basic web hosting service part office live small business launched late 2007 office live small business offered customers free commercial web hosting built-in system creating websites based build-in templates site creation wizard microsoft started allocating resources developing numerous cloud solutions group formed microsoft azure develop microsoft azure web sites microsoft azure web sites announced june 2012 preview release parallel microsoft developed microsoft azure pack offers technology installed private-cloud sets servers customer site direct customer control mid-2013 microsoft azure web sites microsoft azure pack officially released public microsoft operates microsoft azure number data centers throughout world microsoft azure web sites available subset deploying websites microsoft azure web sites customers choose deploy sites data center following geographical regions east us north central us west us east asia brazil south north europe west europe japan east japan west east asia
[ 2086, 3076, 8054, 2988, 4759, 632, 6795, 7613, 7619, 1634, 3091, 6262, 8076, 5563, 6806, 3627, 8189, 5571, 5927, 2212, 6110, 5135, 1757, 3028, 6029, 842, 6294, 7660, 5064, 1870, 330, 1402, 3135, 7848, 8118, 2961, 432, 5965, 2700, 6054, ...
Test
3,959
0
PropBank:propbank propbank corpus annotated verbal propositions arguments—a proposition bank although propbank refers specific corpus produced martha palmer et al term propbank also coming used common noun referring corpus annotated propositions arguments propbank project played role recent research natural language processing used semantic role labelling propbank differs framenet resource frequently compared several ways propbank verb-oriented resource framenet centered abstract notion frames generalizes descriptions across similar verbs e.g describe characterize well nouns words e.g description propbank annotate events states affairs described using nouns propbank commits annotating verbs corpus whereas framenet project chooses sets example sentences large corpus cases annotated longer continuous stretches text propbank-style annotations often remain close syntactic level framenet-style annotations sometimes semantically motivated start propbank developed idea serving training data machine learning-based semantic role labeling systems mind requires arguments verb syntactic constituents different senses word distinguished differences bear arguments due differences semantic role labeling respect propbank often somewhat easier task producing framenet-style annotations
[ 2558, 1314, 5429, 2629, 5304, 7410, 4313, 3660 ]
Validation
3,960
0
LIVAC_Synchronous_Corpus:livac synchronous corpus livac uncommon language corpus dynamically maintained since 1995 different existing corpora livac adopted rigorous regular well windows approach processing filtering massive media texts representative communities pan-chinese region including hong kong macau taipei singapore shanghai beijing guangzhou shenzhen contents thus deliberately repetitive cases represented textual samples drawn editorials local international news cross-formosan straits news well news finance sports entertainment 2017 2.5 billion characters news media texts filtered far 600 million characters processed analyzed yielded expanding pan-chinese dictionary 2 million words pan-chinese printed media rigorous analysis based computational methodology livac time accumulated large amount accurate meaningful statistical data chinese language speech communities pan-chinese region result shows considerable important variations windows approach representative feature livac enabled pan-chinese media texts quantitatively analyzed according various attributes locations time subject domains thus various types comparative studies applications information technology well development often related innovative applications possible moreover livac allowed longitudinal developments taken account facilitating key word context kwic comprehensive study target words underlying concepts well linguistic structures past 20 years based variables region duration content results extensive accumulative data analysis contained livac enabled cultivation textual databases proper names place names organization names new words bi-weekly annual rosters media figures related applications included establishment verb adjective databases formulation sentiment indices related opinion mining measure compare popularity global media figures chinese media livac annual pan-chinese celebrity rosters later renamed pan-chinese media personalities rosters construction monthly new word lexicons livac annual pan-chinese new word rosters basis analysis emergence diffusion transformation new words publication dictionaries neologisms made possible
[ 3915, 5571, 5304 ]
Test
3,961
1
Quick_Objects:quick objects quick objects powerful object-relational mapping tool microsoft .net framework built framework business logic validation architecture quick objects different orm tools see list object-relational mapping software focus quick objects provide advantages code reuse code generation object relational mapping single tool set quick objects api simple packed powerful features capabilities linq fully supported used supported databases classes generated quick objects ready web services windows communication foundation remoting comprehensive data access modification capabilities complemented flexible object model allows developer specify control every aspect crud operations see list features september 15 2008 version 4.2 released enhanced support windows forms visual databinding september 1 2008 version 4.1 released support microsoft .net compact framework august 1 2008 version 4.0 released several new features vistadb microsoft access mysql added list supported databases quick objects designer added support adding multiple custom templates code generation v4.0 also added support linq enabled capability specify queries linq run supported databases april 7 2008 version 3.5 released new free edition product called community edition addition community edition quick objects designer also added visual validation designer business logic framework also introduced support databases multiple schemas introduced support aggregate sub queries march 3 2008 version 3.3 released support visual studio 2008 october 30 2007 major release quick objects v3 released addition validation framework among features v3 also introduced support disconnected mode delayed synchronization new component called quick objects data source asp.net introduced v3 well april 25 2007 quick objects version 2.2 released public
[ 5252, 6986, 7213, 2180, 1840, 4759, 5571, 6594, 2530, 7715, 3776 ]
Test
3,962
2
Microsoft_Baseline_Security_Analyzer:microsoft baseline security analyzer microsoft baseline security analyzer mbsa discontinued software tool longer available microsoft determines security state assessing missing security updates less-secure security settings within microsoft windows windows components internet explorer iis web server products microsoft sql server microsoft office macro settings security updates determined current version mbsa using windows update agent present windows computers since windows 2000 service pack 3 less-secure settings often called vulnerability assessment va checks assessed based hard-coded set registry file checks example va might permissions one directories /www/root folder iis could set low level allowing unwanted modification files outsiders versions 1.2.1 run nt4 windows 2000 windows xp windows server 2003 provide support iis versions 5 6 sql server 7 2000 internet explorer 5.01 6.0 microsoft office 2000 2003 security update assessment provided integrated version shavlik hfnetchk 3.8 scan tool mbsa 1.2.1 localized english german french japanese versions supported security assessment locale version 2.0 retained hard-coded va checks replaced shavlik security assessment engine microsoft update technologies adds dynamic support microsoft products supported microsoft update mbsa 2.0.1 released support revised windows update wu offline scan file wsusscn2.cab mbsa 2.1 added vista windows server 2008 support new vista-styled gui interface support latest windows update agent 3.0 new remote directory /rd feature extended va checks x64 platforms august 2012 security bulletin webcast q technet announced current version mbsa 2.2 support windows 8 microsoft currently plans release updated version tool november 2013 mbsa 2.3 released release adds support windows 8 windows 8.1 windows server 2012 windows server 2012 r2 windows 2000 longer supported release microsoft support updates mbsa ended current version 2.3 offer official support windows 10 windows server 2016 microsoft mbsa webpage removed mbsa scans 3 classes updates security updates service packs update rollups critical optional updates left aside
[ 1620, 1721, 4759, 7715, 5571, 5227, 3551, 7564, 7203, 3135, 2784, 6762, 2885, 7867, 5794, 1805, 271 ]
Test
3,963
4
Secure_signature_creation_device:secure signature creation device secure signature creation device specific type computer hardware software used creating electronic signature put service secure signature creation device sscd device must meet rigorous requirements laid annex ii regulation eu 910/2014 eidas referred qualified electronic signature creation device qscd using secure signature creation devices helps facilitating online business processes save time money transactions made within public private sectors minimum requirements must met elevate electronic signature creation device level secure signature creation device provided annex ii eidas appropriate procedural technical means device must reasonably assure confidentiality data used create electronic signature must ensure data used create electronic signature unique used lastly shall allow qualified trust service provider certificate authority create manage signatory ’ electronic signature data ensure security signature creation data used sscd create electronic signature must provide reasonable protection current technology prevent forgery duplication signature creation data must remain sole control signatory prevent unauthorized use sscd prohibited altering signature ’ accompanying data trust service provider certificate authority places sscd service must securely prepare device according annex ii eidas fully compliance following three conditions secure signature creation device must also meet international standard computer security certification referred common criteria information technology security evaluation iso/iec 15408 standard gives computer system users ability specify security requirements via protection profiles pps security functional requirements sfrs security assurance requirements sars trust service provider certificate authority required implement specified requirements attest product ’ security attributes third-party testing laboratory evaluates device ensure level security claimed provider secure signature creation device used part central authentication service cas may act cas server multi-tier authentication scenarios cas software protocol allows users authenticated signing web application common scheme cas protocol includes client ’ web browser application requesting authentication cas server authentication needed application send request cas server server compare user ’ credentials database information matches cas respond user authenticated eidas provided tiered approach determining legal implications electronic signatures signature created secure signature creation device considered strongest probative value document message signed device non-reputable meaning signatory deny responsible creation signature regulation eu 910/2014 eidas evolved directive 1999/93/ec electronic signatures directive intent directive make eu member states responsible creating legislation would allow creation european union ’ electronic signing system eidas regulation required member states follow specifications electronic signatures effective date 1 july 2016
[ 2312, 4945, 363, 6208, 6672, 5596, 1037 ]
Test
3,964
4
FraudWatch_International:fraudwatch international fraudwatch international internet security organization founded 2003 mainly specializes online fraud protection anti-phishing activities headquarters privately owned company melbourne australia offices london dubai san francisco ceo trent youl activities company include anti-phishing protection malware online brand protection offering security service companies fraudwatch international active sponsoring participating congresses cybercrime also sponsors anti-phishing working group techniques used fraudwatch international include anti-phishing company released fwi fraud shield 2007 application windows platforms warns users browse phishing websites
[ 3480, 1321, 7630 ]
Train
3,965
9
Andrey_Ershov:andrey ershov academician andrey petrovych ershov 19 april 1931 moscow – 8 december 1988 moscow soviet computer scientist notable pioneer systems programming programming language research donald knuth considers independently co-discovered idea hashing linear probing also created one first algorithms compiling arithmetic expressions responsible languages alpha rapira aist-0 first soviet time-sharing system electronic publishing system rubin mramor multiprocessing workstation also initiator developing computer bank russian language soviet project creating large representative russian corpus project 1980s comparable bank english british national corpus russian national corpus created russian academy sciences 2000s successor ershov project 1959 worked siberian division ussr academy sciences helped found novosibirsk computer center siberian school computer science received academy sciences first programmer recognized 1974 made distinguished fellow british computer society 1981 received silver core award ifip computer science community mostly known speech aesthetics human factor programming presented dinner afips spring joint computer conference 1972 due importance republished article communications acm
[ 5304, 1243 ]
Train
3,966
9
Synchronous_programming_language:synchronous programming language synchronous programming language computer programming language optimized programming reactive systems computer systems sorted three main classes 1 transformational systems take inputs process deliver outputs terminate execution typical example compiler 2 interactive systems interact continuously environment speed typical example web 3 reactive systems interact continuously environment speed imposed environment typical example automatic flight control system modern airplanes reactive systems must therefore react stimuli environment within strict time bounds reason often also called real-time systems found often embedded systems synchronous programming also synchronous reactive programming srp computer programming paradigm supported synchronous programming languages principle srp make abstraction programming languages synchronous abstraction digital circuits synchronous circuits indeed designed high-level abstraction timing characteristics electronic transistors neglected gate circuit ... therefore assumed compute result instantaneously wire assumed transmit signal instantaneously synchronous circuit clocked tick clock computes instantaneously output values new values memory cells latches input values current values memory cells words circuit behaves electrons flowing infinitely fast first synchronous programming languages invented france 1980s esterel lustre signal since many synchronous languages emerged synchronous abstraction makes reasoning time synchronous program lot easier thanks notion logical ticks synchronous program reacts environment sequence ticks computations within tick assumed instantaneous i.e. processor executing infinitely fast statement a||b therefore abstracted package ab b simultaneous take concrete example esterel statement every 60 second emit minute specifies signal minute exactly synchronous 60-th occurrence signal second fundamental level synchronous abstraction eliminates non-determinism resulting interleaving concurrent behaviors allows deterministic semantics therefore making synchronous programs amenable formal analysis verification certified code generation usable formal specification formalisms contrast asynchronous model computation sequential processor statement a||b either implemented b b known interleaving-based non determinism drawback asynchronous model intrinsically forbids deterministic semantics e.g. race conditions makes formal reasoning analysis verification complex nonetheless asynchronous formalisms useful model design verify distributed systems intrinsically asynchronous also contrast systems processes basically interact synchronously example would systems built based communicating sequential processes csp model also allows nondeterministic choice
[ 6507, 1908, 5102, 3772, 3944, 3852, 6712, 2740, 3372, 1102, 7557, 2866, 4078, 5190, 336, 5171, 6497, 6498, 1803, 1435 ]
Validation
3,967
4
Arbitrary_code_execution:arbitrary code execution computer security arbitrary code execution ace used describe attacker ability execute arbitrary commands code target machine target process arbitrary code execution vulnerability security flaw software hardware allowing arbitrary code execution program designed exploit vulnerability called arbitrary code execution exploit ability trigger arbitrary code execution network especially via wide-area network internet often referred remote code execution rce number classes vulnerability lead attacker ability execute arbitrary commands code arbitrary code execution commonly achieved control instruction pointer jump branch running process instruction pointer points next instruction process executed control value instruction pointer therefore gives control instruction executed next order execute arbitrary code many exploits inject code process example sending input gets stored input buffer ram use vulnerability change instruction pointer point injected code injected code automatically get executed type attack exploits fact computers use von neumann architecture make general distinction code data malicious code camouflaged harmless input data many newer cpus mechanisms make harder no-execute bit arbitrary code execution exploit give attacker privileges target process vulnerable example exploiting flaw web browser attacker could act user performing actions modifying personal computer files accessing banking information would able perform system-level actions unless user question also access work around attacker execute arbitrary code target often attempt privilege escalation exploit order gain additional control may involve kernel account administrator system root without enhanced control exploits potential severe damage turn computer zombie privilege escalation helps hiding attack legitimate administrator system combining exploits way called exploit chain arbitrary remote code execution privilege escalation vulnerability widely deployed software considered severe class computer vulnerability retrogaming hobbyists managed find vulnerabilities classic video games allow execute arbitrary code usually using precise sequence button inputs order cause buffer overflow allowing write protected memory awesome games done quick 2014 group speedrunning enthusiasts managed code run primitive versions games pong flappy bird copy super mario world utilizing buffer overflow write arbitrary code memory june 12 2018 security researcher jean-yves avenard mozilla discovered ace vulnerability windows 10 may 1 2018 security researcher discovered ace vulnerability 7-zip file archiver php subject numerous ace vulnerabilities
[ 3932, 4759, 2991, 619, 8064, 4585, 113, 2289, 1739, 4864, 7262, 7541, 7319, 658, 1019, 6029, 1956, 1670, 2772, 1584, 2327, 6940, 6681, 7508, 5449, 1805 ]
Test
3,968
9
Short-circuit_evaluation:short-circuit evaluation short-circuit evaluation minimal evaluation mccarthy evaluation john mccarthy semantics boolean operators programming languages second argument executed evaluated first argument suffice determine value expression first argument codice_1 function evaluates codice_2 overall value must codice_2 first argument codice_4 function evaluates codice_5 overall value must codice_5 programming languages lisp perl haskell lazy evaluation usual boolean operators short-circuit others ada java delphi short-circuit standard boolean operators available boolean operations like exclusive xor possible short-circuit operands always required determine result short-circuit expression codice_7 equivalent conditional expression codice_8 expression codice_9 equivalent codice_10 short-circuit operators effect control structures rather simple arithmetic operators strict imperative language terms notably c c++ side effects important short-circuit operators introduce sequence point – completely evaluate first argument including side effects optionally processing second argument algol 68 used proceduring achieve user-defined short-circuit operators procedures loosely typed languages two truth-values codice_11 codice_12 short-circuit operators may return last evaluated subexpression expression codice_7 equivalent codice_14 expression codice_9 equivalent codice_16 without evaluating codice_17 twice called last value table languages use lazy evaluation default like haskell functions effectively short-circuit special short-circuit operators needed use short-circuit operators criticized problematic abap distinct boolean type usual example using c-based language consider following example example short-circuit evaluation guarantees codice_26 never called codice_27 evaluates false feature permits two useful programming constructs illustrated following c snippet minimal evaluation prevents null pointer dereference excess memory fetches despite benefits minimal evaluation may cause problems programmers realize forget happening example code codice_26 supposed perform required operation regardless whether codice_29 executed allocating system resources codice_30 evaluates false codice_26 execute could cause problems programming languages java two operators one employs minimal evaluation one avoid problem problems unperformed side effect statements easily solved proper programming style i.e. using side effects boolean statements using values side effects evaluations tends generally make code opaque error-prone since minimal evaluation part operator semantic definition optional optimization many coding patterns come rely succinct idiomatic conditional construct examples include perl idioms bash unix shell script idioms short-circuiting lead errors branch prediction modern central processing units cpus dramatically reduce performance notable example highly optimized ray axis aligned box intersection code ray tracing compilers detect cases emit faster code programming language semantics may constrain optimizations
[ 2451, 5983, 4573, 5639, 993, 6428, 4589, 3955, 5117, 8082, 2740, 4946, 7416, 3368, 304, 7005, 1854, 4705, 6029, 3981, 4070, 5948, 5506, 7032, 4543, 5965, 1237, 2803, 7417, 5091, 1435 ]
Test
3,969
5
YPOPs!:ypops ypops previously known yahoopops open-source software provides pop3 smtp access yahoo mail available microsoft windows linux solaris mac platforms software released 2006 latest update 2009
[ 3915, 4759, 5571, 6908, 578 ]
Validation
3,970
3
INMOS_G364_framebuffer:inmos g364 framebuffer g364 framebuffer line graphics adapters using sgs thomson inmos g364 chipset produced inmos known transputer eventually acquired sgs thomson incorporated stmicroelectronics early 1990s g364 included ramdac 64-bit interface vram graphical memory implement framebuffer include hardware-based graphical acceleration hardware cursor function g364 largely similar design functionality g300 framebuffer 64-bit vram interface instead slower 32-bit interface lower-price g300 inmos g364 quite similar g332 found personal decstation although g364 capable providing comparatively high resolution output 1600×1200 pixels 8 bits-per-pixel many cases typically achieved unix workstations sun microsystems sgi popular chipset personal computer manufacturers early 1990s adopted major workstation manufacturers g364 framebuffer found use after-market commodore amiga graphics card primary graphics system sold mips magnum 4000 series mips-based windows nt workstations amiga cards based g364
[ 5055, 7010, 7442, 4799, 4006, 6256, 4099, 4816 ]
Test
3,971
8
Comunes_Collective:comunes collective comunes non-profit organization stated aims encouraging commons facilitating grassroots work free/libre web tools previously known ourproject.org collective established legal entity 2009 forming comunes nowadays serves umbrella organization several projects related commons among comunes objectives provide legal protection member projects together technical infrastructure claims inspired software public interest organization provides similar protection free software projects comunes member projects must focus encouraging protection expansion commons comunes manifesto shows view social movements nodes social network analysing problems ecosystem proposing comunes web tools diminishing ourproject.org web-based collaborative free content repository acts central location offering web space tools projects topic focusing free culture free knowledge aims extend ideas methodology free software social areas free culture general thus provides multiple web services hosting mailing lists wiki ftp forums… online community social/cultural/artistic/educational projects long share contents creative commons licenses free/libre licenses active since 2002 nowadays hosts 1200 projects services receive 1,000,000 monthly visits kune software platform federated social networking collaborative work focusing workgroups rather individuals aims allow creation online spaces collaborative work organizations individuals build projects online coordinate common agendas set virtual meetings join organizations similar interests programmed using gwt top xmpp protocol integrating wave-in-a-box licensed affero gpl development since 2007 launched beta production site april 2012 move commons mc web tool initiatives collectives ngos declare visibilize core principles committed idea behind mc follows mechanics creative commons tagging cultural works providing user-friendly bottom-up labelling system initiative four meaningful icons keywords aims boosting visibility diffusion initiatives building network among related initiatives/collectives allowing mutual discovery besides newcomers could easily understand collective approach website discover collectives matching field/location/interests semantic search presented several forums nowadays beta version already organizations using mc badges comunes includes young projects alerta community-driven alert system plantaré community currency seed exchange others comunes developed partnership several organizations
[ 2011, 7148 ]
Train
3,972
2
Pungi_(software):pungi software pungi program making spins fedora linux distribution release 7 upwards
[ 578 ]
Train
3,973
4
Cloud_computing_issues:cloud computing issues cloud computing become social phenomenon used people every day every important social phenomenon issues limit widespread adoption present scenario cloud computing seen fast developing area instantly supply extensible services using internet help hardware software virtualization biggest advantage cloud computing flexible lease release resources per requirement user benefits encompass betterment efficiency compensating costs operations curtails high prices hardware software although numerous benefits adopting latest cloud technology still privacy issues involved cloud computing cloud time data outbreak service provider information deleted purposely security issues various kinds related cloud computing falling two broader categories first issues related cloud security cloud providers face like software provided organizations infrastructure service secondly issues related cloud security customers experience organizations store data cloud issues start fact user loses control data stored computer belonging someone else cloud provider happens owner remote servers person organization user interests may point different directions example user may wish information kept private owner remote servers may want take advantage business issues hampering adoption cloud technologies include uncertainties related guaranteed qos provisioning automated management remediation cloud systems many issues relate cloud computing discussed gnu project initiator richard stallman characterized cloud computing raising cost information-ownership concerns oracle founder larry ellison viewed trend cloud computing terms fashion-driven ... complete gibberish however concept cloud computing appeared gain steam 56 major european technology decision-makers seeing cloud priority 2013 2014 cloud budget may reach 30 overall budget according techinsights report 2013 cloud succeeds based survey cloud implementations generally meet exceed expectations across major service models infrastructure service iaas platform service paas software service saas several deterrents widespread adoption cloud computing remain include cloud offers many strong points infrastructure flexibility faster deployment applications data cost control adaptation cloud resources real needs improved productivity etc cloud market early 2010s especially private clouds dominated software services saas mode iaas infrastructure paas public cloud lag comparison increased use cloud computing services gmail google docs pressed issue privacy concerns cloud computing services utmost importance provider services lie position greater use cloud computing services given access plethora data access immense risk data disclosed either accidentally deliberately privacy companies compromised information sent cloud service provider privacy advocates criticized cloud model giving hosting companies greater ease control—and thus monitor will—communication host company end user access user data without permission instances secret nsa program working verizon recorded 10 million telephone calls american citizens causes uncertainty among privacy advocates greater powers gives telecommunication companies monitor user activity cloud service provider csp complicate data privacy extent virtualization virtual machines cloud storage used implement cloud service csp operations customer tenant data may remain system data center even within provider cloud lead legal concerns jurisdiction efforts us-eu safe harbor harmonise legal environment providers amazon still cater major markets typically united states european union deploying local infrastructure allowing customers select regions availability zones cloud computing poses privacy concerns service provider access data cloud time could accidentally deliberately alter even delete information becomes major concern service providers employ administrators leave room potential unwanted disclosure information cloud sometimes technical issues like servers might time becomes difficult gain access resources time anywhere e.g non-availability services due denial service attack use technique cloud computing always strong internet connection without would able take advantage cloud computing issue related cloud computing consumes great power physical devices smartphone many cloud providers share information third parties necessary purposes law order even without warrant permitted privacy policies users agree start using cloud services life-threatening situations time wait police issue warrant many cloud providers share information immediately police situations dropbox privacy policy states may share information discussed … law order may disclose information third parties determine disclosure reasonably necessary comply law b protect person death serious bodily injury c prevent fraud abuse dropbox users protect dropbox property rights sydney morning herald reported mosman bomb hoax life-threatening situation whether nsw police needed warrant access information likely byrne said depended process taken gmail set process terms legal disclosure guidelines done search warrant ... exceptions apply different parts world different service providers example facebook generally provides exception emergency life threatening situations signed law enforcement another computer forensic expert it4ensics works large corporations dealing matters like internal fraud scott lasak said police would contact google police fbi background google would assist whether need go warrants sort thing 'm sure even ip address might even need warrant something like police background nsw police would comment whether received help google search giant also declined comment instead offering standard statement cooperated law enforcement spokesman online users lobby group electronic frontiers australia stephen collins said google likely handed need information basis probable cause warrant said perfectly legitimate also said “ happens relative frequency … things rarely used australia trivial malevolent purposes. ” solutions privacy cloud computing include policy legislation well end users choices data stored cloud service provider needs establish clear relevant policies describe data cloud user accessed used cloud service users encrypt data processed stored within cloud prevent unauthorized access cryptographic encryption mechanisms certainly best options addition authentication integrity protection mechanisms ensure data goes customer wants go modified transit strong authentication mandatory requirement cloud deployment user authentication primary basis access control specially cloud environment authentication access control important ever since cloud data publicly accessible biometric identification technologies linking user ’ biometrics information data available technologies use searchable encryption techniques perform identification encrypted domain cloud providers potential attackers gain access sensitive data even contents individual queries comply regulations including fisma hipaa sox united states data protection directive eu credit card industry pci dss users may adopt community hybrid deployment modes typically expensive may offer restricted benefits google able manage meet additional government policy requirements beyond fisma rackspace cloud qubespace able claim pci compliance many providers also obtain audit criticised grounds hand-picked set goals standards determined auditor auditee often disclosed vary widely providers typically make information available request non-disclosure agreement customers eu contracting cloud providers outside eu/eea adhere eu regulations export personal data multitude laws regulations forced specific compliance requirements onto many companies collect generate store data policies may dictate wide array data storage policies long information must retained process used deleting data even certain recovery plans examples compliance laws regulations virtualized cloud computing environment customers may never know exactly data stored fact data may stored across multiple data centers effort improve reliability increase performance provide redundancies geographic dispersion may make difficult ascertain legal jurisdiction disputes arise u.s. federal agencies directed office management budget use process called fedramp federal risk authorization management program assess authorize cloud products services federal cio steven vanroekel issued memorandum federal agency chief information officers december 8 2011 defining federal agencies use fedramp fedramp consists subset nist special publication 800-53 security controls specifically selected provide protection cloud environments subset defined fips 199 low categorization fips 199 moderate categorization fedramp program also established joint accreditation board jab consisting chief information officers dod dhs gsa jab responsible establishing accreditation standards 3rd party organizations perform assessments cloud solutions jab also reviews authorization packages may grant provisional authorization operate federal agency consuming service still final responsibility final authority operate changes landscape computing certain legal issues arise cloud computing including trademark infringement security concerns sharing proprietary data resources electronic frontier foundation criticized united states government megaupload seizure process considering people lose property rights storing data cloud computing service one important often mentioned problem cloud computing problem possession data cloud company possessor data possessor certain legal rights cloud company custodian data different set rights would apply next problem legalities cloud computing problem legal ownership data many terms service agreements silent question ownership legal issues confined time period cloud-based application actively used must also consideration happens provider-customer relationship ends cases event addressed application deployed cloud however case provider insolvencies bankruptcy state data may become blurred cloud computing still relatively new standards still developed many cloud platforms services proprietary meaning built specific standards tools protocols developed particular vendor particular cloud offering make migrating proprietary cloud platform prohibitively complicated expensive three types vendor lock-in occur cloud computing heterogeneous cloud computing described type cloud environment prevents vendor lock-in aligns enterprise data centers operating hybrid cloud models absence vendor lock-in lets cloud administrators select choice hypervisors specific tasks deploy virtualized infrastructures enterprises without need consider flavor hypervisor enterprise heterogeneous cloud considered one includes on-premises private clouds public clouds software-as-a-service clouds heterogeneous clouds work environments virtualized traditional data centers heterogeneous clouds also allow use piece parts hypervisors servers storage multiple vendors cloud piece parts cloud storage systems offer apis often incompatible result complicated migration backends makes difficult integrate data spread across various locations described problem vendor lock-in solution clouds adopt common standards heterogeneous cloud computing differs homogeneous clouds described using consistent building blocks supplied single vendor intel general manager high-density computing jason waxman quoted saying homogeneous system 15,000 servers would cost 6 million capital expenditure use 1 megawatt power open-source software provided foundation many cloud computing implementations prominent examples hadoop framework vmware cloud foundry november 2007 free software foundation released affero general public license version gplv3 intended close perceived legal loophole associated free software designed run network cloud providers expose apis typically well documented often creative commons license also unique implementation thus interoperable vendors adopted others apis number open standards development view delivering interoperability portability november 2012 open standard broadest industry support probably openstack founded 2010 nasa rackspace governed openstack foundation openstack supporters include amd intel canonical suse linux red hat cisco dell hp ibm yahoo huawei vmware security generally desired state free harm anything compromises state entity well defined information security condition information asset protected confidentiality quality state free unauthorised insecure disclosure contrary defined access rights listed access control list matrix integrity quality state whole/ complete original uncorrupted functionally proven hash integrity values availability desired state information resource accessible authorised parties listed access control list matrix desired state right time security important domain far cloud computing concerned number issues addressed cloud perfectly secure condition doubt ever achieved martin muduva 2015 cloud computing achieving increased popularity concerns voiced security issues introduced adoption new model effectiveness efficiency traditional protection mechanisms reconsidered characteristics innovative deployment model differ widely traditional architectures alternative perspective topic cloud security another although quite broad case applied security similar security principles apply shared multi-user mainframe security models apply cloud security relative security cloud computing services contentious issue may delaying adoption physical control private cloud equipment secure equipment site someone else control physical control ability visually inspect data links access ports required order ensure data links compromised issues barring adoption cloud computing due large part private public sectors unease surrounding external management security-based services nature cloud computing-based services private public promote external management provided services delivers great incentive cloud computing service providers prioritize building maintaining strong management secure services security issues categorised sensitive data access data segregation privacy bug exploitation recovery accountability malicious insiders management console security account control multi-tenancy issues solutions various cloud security issues vary cryptography particularly public key infrastructure pki use multiple cloud providers standardisation apis improving virtual machine support legal support cloud computing offers many benefits vulnerable threats cloud computing uses increase likely criminals find new ways exploit system vulnerabilities many underlying challenges risks cloud computing increase threat data compromise mitigate threat cloud computing stakeholders invest heavily risk assessment ensure system encrypts protect data establishes trusted foundation secure platform infrastructure builds higher assurance auditing strengthen compliance security concerns must addressed maintain trust cloud computing technology data breach big concern cloud computing compromised server could significantly harm users well cloud providers variety information could stolen include credit card social security numbers addresses personal messages u.s. requires cloud providers notify customers breaches notified customers worry identity theft fraud providers deal federal investigations lawsuits reputational damage customer lawsuits settlements resulted 1 billion losses cloud providers cloud provider may shut without warning instance anki robot company suddenly went bankrupt 2019 making 1.5 million robots unresponsive voice command although cloud computing often assumed form green computing currently way measure green computers primary environmental problem associated cloud energy use phil radford greenpeace said “ concerned new explosion electricity use could lock us old polluting energy sources instead clean energy available today. ” greenpeace ranks energy usage top ten big brands cloud computing successfully urged several companies switch clean energy thursday december 15 2011 greenpeace facebook announced together facebook would shift use clean renewable energy power operations soon thereafter apple agreed make data centers ‘ coal free ’ end 2013 doubled amount solar energy powering maiden nc data center following suit salesforce agreed shift 100 clean energy 2020 citing servers effects environmental effects cloud computing areas climate favors natural cooling renewable electricity readily available environmental effects moderate holds true traditional data centers thus countries favorable conditions finland sweden switzerland trying attract cloud computing data centers energy efficiency cloud computing result energy-aware scheduling server consolidation however case distributed clouds data centers different sources energy including renewable energy use energy efficiency reduction could result significant carbon footprint reduction privately purchased hardware customers purchase services cloud computing nefarious purposes includes password cracking launching attacks using purchased services 2009 banking trojan illegally used popular amazon service command control channel issued software updates malicious instructions pcs infected malware introduction cloud computing requires appropriate governance model ensure secured computing environment comply relevant organizational information technology policies organizations need set capabilities essential effectively implementing managing cloud services including demand management relationship management data security management application lifecycle management risk compliance management danger lies explosion companies joining growth cloud computing becoming providers however many infrastructural logistical concerns regarding operation cloud computing businesses still unknown over-saturation may ramifications industry whole increased use cloud computing could lead reduction demand high storage capacity consumer end devices due cheaper low storage devices stream content via cloud becoming popular wired article jake gardner explains unregulated usage beneficial tech moguls like amazon anonymous nature cost consumption cloud usage makes difficult business evaluate incorporate business plans outside information technology software industry term cloud found reference wide range services fall category cloud computing others cloud often used refer product service discovered accessed paid internet necessarily computing resource examples service sometimes referred cloud include limited crowd sourcing cloud printing crowd funding cloud manufacturing due multi-tenant nature resource sharing cloud computing must also deal noisy neighbor effect effect essence indicates shared infrastructure activity virtual machine neighboring core physical host may lead increased performance degradation vms physical host due issues e.g cache contamination due fact neighboring vms may activated deactivated arbitrary times result increased variation actual performance cloud resources effect seems dependent nature applications run inside vms also factors scheduling parameters careful selection may lead optimized assignment order minimize phenomenon also led difficulties comparing various cloud providers cost performance using traditional benchmarks service application performance time period location benchmark performed result widely varied results observation led turn research efforts make cloud computing applications intrinsically aware changes infrastructure application automatically adapt avoid failure philosopher slavoj žižek points although cloud computing enhances content accessibility access increasingly grounded virtually monopolistic privatization cloud provides access according access necessarily mediated handful companies ensures progressive privatization global cyberspace žižek criticizes argument purported supporters cloud computing phenomenon part natural evolution internet sustaining quasi-monopolies set prices also filter software provide give universality particular twist depending commercial ideological interests
[ 1998, 2961, 972, 3764, 4295, 2700, 2680, 3084, 6586, 330, 466, 1805, 5889 ]
Test
3,974
4
Elizabeth_France:elizabeth france elizabeth irene france leicester born 1 february 1950 former chair office legal complaints appointed february 2009 chair 2014 steve green became chair 1994 2002 data protection registrar information commissioner 2002 2009 chief ombudsman chief executive ombudsman services ltd. elizabeth france chair uk public affairs council member british transport police authority vice president aberystwyth university member general assembly manchester university elizabeth france also chair security industry authority role took january 2014 elizabeth read politics aberystwyth 1968- 1971 prior appointment 1994 data protection registrar worked home office awarded cbe 2002 services data protection holds honorary doctorate degrees
[ 2862 ]
Validation
3,975
1
Information_schema:information schema relational databases information schema information_schema ansi-standard set read-only views provide information tables views columns procedures database used source information databases make available non-standard commands notable exception among major database systems oracle implement information schema open-source project exists address rdbmss support information_schema include rdbmss support information_schema include
[ 187, 3268, 7715, 3776, 3863, 1096, 6538, 4798, 6462, 2054, 5956, 5252, 7213, 6056, 4747 ]
Test
3,976
6
Dired:dired dired directory editor computer program editing file system directories typically runs inside emacs text editor specialized mode though standalone versions written dired first file manager visual editor file system information first version dired written stand-alone program circa 1974 stan kugell stanford artificial intelligence laboratory sail incorporated gnu emacs earliest versions re-implemented c c++ operating systems run emacs dired displays ls-like file listing emacs buffer list navigated using standard navigation commands several emacs lisp scripts developed extend dired emacs combination tramp able access remote file systems editing files means ssh ftp telnet many protocols well capability accessing local files another user session also functions make possible rename multiple files via emacs search replace capabilities apply regular expressions marking selecting multiple files marked files operated various ways deleting renaming executing external shell command elisp function means lisp package dired-x also possible handle existing ls-like directory listings virtual dired mode also saved often using filename extension codice_1
[ 4759, 6269, 8087, 5571, 5574, 405, 2600, 7214, 7765, 3915, 3920, 1435 ]
Test
3,977
9
Gotcha_(programming):gotcha programming programming gotcha valid construct system program programming language works documented counter-intuitive almost invites mistakes easy invoke unexpected unreasonable outcome classic gotcha c/c++ construct syntactically valid puts value codice_1 codice_2 executes codice_3 codice_2 non-zero sometimes even intended however commonly typo programmer probably meant executes codice_3 codice_2 codice_1 equal modern compilers usually generate warning encountering former construct conditional branch assignment comparison depending compiler options e.g. -wall option gcc avoid gotcha recommendation keep constants left side comparison e.g codice_8 rather codice_9 way using codice_10 instead codice_11 cause compiler error see yoda conditions many kinds gotchas detected compilers however
[ 1361, 1435 ]
Test
3,978
2
ZeroVM:zerovm zerovm open source light-weight virtualization sandboxing technology virtualizes single process using google native client platform since single process virtualized instead full operating system startup overhead order 5 ms. zerovm creates sandbox around single process using technology based google native client nacl sandbox ensures application executed access data host operating system safe execute untrusted code programs executed zerovm must first cross-compiled nacl platform zerovm execute nacl code compiled x86-64 platform portable native client pnacl format code executed zerovm call normal system calls initially interact host environment communication outside world takes place channels must declared program starts outside sandbox channel connected local file pipe another zerovm instance inside sandbox program sees channel file descriptor sandboxed program read/write data from/to channel know channel connected host programs compiled zerovm optionally use zerovm runtime library called zrt library aims provide program posix environment replacing parts c standard library particular zrt replaces c file input/output functions codice_1 codice_2 versions operate in-memory filesystem root filesystem provided tarball allows program see normal unix environment zrt also replaces c date time functions codice_3 give programs fixed deterministic environment fixed inputs every execution guaranteed give result even non-functional programs become deterministic restricted environment makes programs easier debug since behavior fixed zerovm integrated swift distributed object storage component openstack zerocloud middleware installed swift client make request swift containing zerovm program program executed directly storage nodes means program direct access data zerovm developed litestack israeli startup first commit codice_4 git repository added november 2011 litestack bought rackspace october 2013 zerovm participated techstars cloud 2013 incubator program got 500,000 seed funding first zerovm design summit held january 2014 university texas san antonio
[ 3761, 4293, 2182, 5904, 4771, 1547, 4498, 7357, 5571, 5396, 578, 6634, 3544, 6731, 5064, 5244, 7848, 336, 1050, 2700, 3495, 5884, 1435 ]
Test
3,979
9
Process_substitution:process substitution computing process substitution form inter-process communication allows input output command appear file command substituted in-line file name would normally occur command shell allows programs normally accept files directly read write another program process substitution available compile-time option ksh88 1988 version korn shell bell labs bash shell provided process substitution later version 1.14 released 1994 following examples use korn shell syntax unix diff command normally accepts names two files compare one file name standard input process substitution allows compare output two programs directly diff sort file1 sort file2 codice_1 expression tells command interpreter run command make output appear file command arbitrarily complex shell command without process substitution alternatives alternatives cumbersome process substitution also used capture output would normally go file redirect input process bash syntax writing process codice_2 example using codice_3 codice_4 codice_5 commands counts lines file codice_6 compresses codice_5 one pass tee wc -l 2 bigfile gzip bigfile.gz main advantages process substitution alternatives hood process substitution two implementations systems support codice_8 unix-like systems works calling codice_9 system call returns file descriptor codice_10 new anonymous pipe creating string codice_11 substitutes command line systems without codice_8 support calls codice_13 new temporary filename create named pipe substitutes filename command line illustrate steps involved consider following simple command substitution system codice_8 support diff file1 sort file2 steps shell performs named pipes execution differs solely creation deletion pipe created codice_13 given new temporary file name removed codice_20 aspects remain process substitution limitations
[ 1975, 4539, 1745, 3219, 5931, 5116, 878 ]
Test
3,980
4
Anne_P._Mitchell:anne p. mitchell anne p. mitchell born april 3 1958 attorney professor law founder ceo institute social internet public policy 1988 mitchell founded early fathers rights group buffalo new york studying pre-law suny buffalo upon moving california attend stanford law school founded first fathers rights bbs ran student housing bbs later became site dadsrights.org graduating stanford mitchell opened fathers rights law practice represented fathers wishing remain involved lives children following divorce spoke publicly privately issues fathers rights need children fathers involved lives mitchell spoke invitation california judges bench beyond bench program santa clara family court services governor pete wilson focus fathers summit 1997 mitchell produced host cable show fathers parents half-hour television talk show focused concerns issues realities related becoming staying involved father thirty-six episodes fathers parents filmed 1997 shown cable television stations throughout united states 1998 mitchell closed fathers rights practice changed focus internet law anti-spam efforts joined mail abuse prevention system maps first formal anti-spam organization director legal public affairs maps mitchell led strategy first anti-spam lawsuits 2002 mitchell stepped ceo co-founder newly created habeas year later mitchell left habeas found run institute spam internet public policy isipp tenure habeas mitchell led first email deliverability summits became impetus founding isipp left habeas september 2005 mitchell founded auction aid help victims hurricane katrina enlisting donated items friends colleagues guy kawasaki béla fleck warren farrell anne fadiman eduardo sánchez sir harold evans raise 5,000 originally auction aid created using ebay giving works platform mitchell later criticized mitchell published many papers authored one ebook
[ 1018 ]
Validation
3,981
9
GNU_Octave:gnu octave gnu octave software featuring high-level programming language primarily intended numerical computations octave helps solving linear nonlinear problems numerically performing numerical experiments using language mostly compatible matlab may also used batch-oriented language since part gnu project free software terms gnu general public license octave one major free alternatives matlab others scilab freemat scilab however puts less emphasis bidirectional syntactic compatibility matlab octave project conceived around 1988 first intended companion chemical reactor design course real development started john w. eaton 1992 first alpha release dates back january 4 1993 february 17 1994 version 1.0 released version 4.0.0 released may 29 2015 program named octave levenspiel former professor principal author levenspiel known ability perform quick back-of-the-envelope calculations addition use desktops personal scientific computing octave used academia industry example octave used massive parallel computer pittsburgh supercomputing center find vulnerabilities related guessing social security numbers dramatic acceleration opencl cuda also possible use gpus octave language interpreted programming language structured programming language similar c supports many common c standard library functions also certain unix system calls functions however support passing arguments reference octave programs consist list function calls script syntax matrix-based provides various functions matrix operations supports various data structures allows object-oriented programming syntax similar matlab careful programming script allow run octave matlab octave made available gnu general public license may freely changed copied used program runs microsoft windows unix unix-like operating systems including macos typing tab character command line causes octave attempt complete variable function file names similar bash tab completion octave uses text cursor initial portion name complete running interactively octave saves commands typed internal buffer recalled edited octave includes limited amount support organizing data structures example see structure x elements b c integer array string respectively octave 'codice_1 'codice_2 logical operators evaluated short-circuit fashion like corresponding operators c language contrast element-by-element operators 'codice_3 'codice_4 octave includes c-like increment decrement operators 'codice_5 'codice_6 prefix postfix forms octave also augmented assignment e.g 'codice_7 octave supports limited form exception handling modelled 'codice_8 lisp general form unwind_protect block looks like general rule gnu octave recognizes termination given 'codice_9 either keyword 'codice_10 compatible matlab language specific keyword 'codice_11 consequence 'codice_8 block terminated either keyword 'codice_13 example portable keyword 'codice_10 cleanup part block always executed case exception raised body part cleanup executed immediately propagating exception outside block 'codice_8 gnu octave also supports another form exception handling compatible matlab language latter form differs 'codice_8 block two ways first exception_handling executed exception raised body second execution exception_handling exception propagated outside block unless 'codice_17 statement explicitly inserted within exception_handling code octave mechanism handling functions take unspecified number arguments without explicit upper limit specify list zero arguments use special argument codice_18 last argument list function set return number values using special return value codice_19 example also possible execute octave code directly c++ program example code snippet calling codice_20 c c++ code integrated gnu octave creating oct files using matlab compatible mex files octave built matlab compatibility mind shares many features matlab octave treats incompatibility matlab bug therefore could considered software clone infringe software copyright per lotus v. borland court case matlab scripts mathworks fileexchange repository principle compatible octave however often provided uploaded users octave compatible proper open source bsd license fileexchange terms use prohibit usage beside mathworks proprietary matlab purposeful albeit minor syntax additions many numerous matlab functions available gnu octave accessible packages octave forge functions available part either core octave forge packages listed online list unavailable functions included octave function __unimplemented.m__ unimplemented functions also listed many octave forge packages octave wiki unimplemented function called following error message shown octave comes official graphical user interface gui integrated development environment ide based qt available since octave 3.8 become default interface command line interface release octave 4.0 well-received edn contributor said octave workable gui several 3rd-party graphical front-ends also developed like toolbox coding education octave code user create gui applications examples button edit control checkboxtextboxlistbox message boxes.radiobuttons octave also packages available free packages located octave-forge available packages
[ 707, 3606, 3619, 2559, 3968, 1102, 4705, 5757, 7559, 753, 761, 2599, 1879, 7579, 7581, 6489, 5787, 6497, 7951, 4020, 1523, 5098, 2985, 1158, 6876, 4759, 5117, 1563, 5138, 5846, 1569, 4067, 3388, 4070, 6211, 6934, 7669, 5515, 3410, 2698, ...
Test
3,982
5
Mobile_Application_Part:mobile application part mobile application part map ss7 protocol provides application layer various nodes gsm umts mobile core networks gprs core networks communicate order provide services users mobile application part application-layer protocol used access home location register visitor location register mobile switching center equipment identity register authentication centre short message service center serving gprs support node sgsn primary facilities provided map mobile application part specifications originally defined gsm association controlled etsi/3gpp map defined two different standards depending upon mobile network type cellular networks based ansi standards currently cdma2000 past amps is-136 cdmaone plays role map similar protocol usually called is-41 ansi-41 ansi map since 2000 maintained 3gpp2 n.s0005 since 2004 named 3gpp2 x.s0004 map transaction capabilities application part tcap user transported using 'traditional ss7 protocols ip using transport independent signalling connection control part ti-sccp using sigtran yate partial open source implementation map mobile cellular telephony networks like gsm umts ss7 application map used voice connections circuit switched cs data connections packet switched ps applications gsm/umts circuit switched interfaces mobile switching center msc transported ss7 include following also several gsm/umts ps interfaces serving gprs support node sgsn transported ss7
[ 3821, 498, 4976, 7590, 1988, 5417, 995 ]
Test
3,983
2
RPM_Fusion:rpm fusion rpm fusion software repository providing add-on packages fedora distribution linux computer operating system born merge older repositories livna dribble freshrpms distributed software fedora either meet fedora definition free software distribution software may violate us law announced 8 november 2007 livna merged dribble freshrpms create unified repository add-on software called rpm fusion originally fedora 9 first release rpm fusion would providing add-ons however initially rpm fusion ready time livna repositories continued provide packages fedora 9 subsequently 3 november 2008 three software repositories merged rpm fusion livna ananym anvil handle damien nadé french programmer maintains rpm.livna.org livna deprecated favour rpm fusion defunct libdvdcss remains livna repository due copyright concerns dribble contains software found fedora livna meet stricter requirements dribble concentrates multimedia games emulators yet limited genres made matthias saou 2000 usage
[ 5571, 578 ]
Validation
3,984
6
Locate_(Unix):locate unix codice_1 unix utility serves find files filesystems searches prebuilt database files generated codice_2 command daemon compressed using incremental encoding operates significantly faster codice_3 requires regular updating database sacrifices overall efficiency regular interrogation filesystems even user needs information absolute accuracy since database update real time significant speed improvements particularly large filesystems codice_1 first created 1982 bsd gnu findutils versions derive original implementation primary database world-readable index built unprivileged user codice_1 command also included macos codice_6 merging locate earlier codice_7 secure locate use restricted-access database showing filenames accessible user variants
[ 1710, 361, 6789, 2817, 1537, 5480, 3106, 5571, 578, 923, 5138, 667, 5946, 2589, 2054, 3417, 6404, 4283, 4020 ]
Train