node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,985
9
JerryScript:jerryscript jerryscript ultra-lightweight javascript engine internet things capable executing ecmascript 5.1 source code devices less 64 kb memory engine open sourced github june 2015 jerryscript licensed apache license 2.0 october 2016 js foundation formed jerryscript one initial projects
[ 562, 2451, 237, 7848, 6172, 1435 ]
Test
3,986
2
Kernel_Normal_Form:kernel normal form kernel normal form knf coding style used development code bsd operating systems based original knf concept computer systems research group dictates programming style contributed code adhere prior inclusion codebase knf started codification ken thompson dennis ritchie formatted original unix c source code describes things name variables use indents use ansi c k r c code styles bsd variant knf rules evolved time differ small ways sunos kernel userland also uses similar indentation style derived style documents sometimes known bill joy normal form correctness indentation list source files verified style checker program written bill shannon style checker program called cstyle
[ 1341, 191, 6711, 1356, 1547, 7355, 1279, 8194, 8096, 1193, 3636, 4059, 8001, 5760, 5065, 594, 4441, 6477, 4534, 5250, 1315, 4990, 1133, 689, 6402, 2161, 4910, 6860, 1703, 875, 1435, 6505 ]
Test
3,987
3
Applix_1616:applix 1616 applix 1616 kit computer motorola 68000 cpu produced small company called applix sydney australia 1986 early 1990s ran custom multitasking multiuser operating system resident rom version minix also ported 1616 mgr window system andrew morton designer 1616 one founders applix later became maintainer 2.6 version linux kernel paul berger andrew morton formed australian company applix pty ltd. approximately 1984 sell z80 card developed apple iic allowed run cp/m product commercial success paul later proposed develop motorola 68000-based personal computer sale kit form project presented jon fairall editor australia new zealand electronics magazine electronics today international december 1986 first four construction articles published project 1616 series concluding june 1987 october november 1987 disk controller card also published project 1617 next decade 400 1616s sold applix pty ltd. way related north american company name produced applixware main board contains main board also four 80-pin expansion slots 1616 shared backplane platform developed andrew morton keno computer systems allowing 1616 use expansion boards developed keno computer systems platform primarily 34010 graphics coprocessor although form-factor different left kcs cards sticking top 1616 case disk controller card contains coprocessor able run zrdos cp/m clone act smart disk controller memory card tms34010 card developed andrew morton keno computer systems 34010 bit-addressable graphics processor instructions two-dimensional graphics primitives arbitrary width arithmetic operations pixel data one-off interface cards developed specific projects including numerically controlled sheet metal spinning machine controller several eeprom programmers etc 1616/os initially little powerful monitor commands dumping modifying memory loading saving tape built macro assembler full screen editor time operating system gained hierarchical file system preemptive multitasking support multiple users access controls although memory protection lightweight threads message passing primitives pipes ultimately operating system around 250 system calls 78 commands built shell operating system enough similarity unix porting unix source 1616/os relatively painless colin mccormack ported minix 1616 worked around lack memory management unit fork ing copying bss heap stack child parent processes scheduling one mmu ram expansion card developed support colin minix port although unclear ever used purpose conal walsh ported cp/m clone zrdos z80-based disk controller card operating mode 68000 acted console zrdos although still possible suspend connection zrdos run 1616 programs provided n't need disk i/o strictly operating system mgr windowing system run 1616/os usurped console video keyboard added virtual tty devices window mgr port required video hack add higher resolution monochrome video mode done replacing pal video circuit unix minix programs able ported 1616/os ports included several messaging bulletin board systems written including usenet fidonet gateways many utilities allow safe shell-level dial-up access several computer languages supported including collection 1616/os shareware eventually grew seventeen 800kb floppies included innumerable small utilities ported applications environments applix pty ltd started holding informal user group meetings sydney store 1987 meetings held second saturday month often finished well midnight consumption much pizza users brought latest 1616-related creations demonstrate share discussion ranged hardware design operating system theory language design politics philosophy mortons sold shop 1990s meetings moved house yerrinbool southern highlands nsw mortons moved wollongong meetings moved able escape user group moving around nsw mortons moved palo alto california 2001 user group still meets second saturday every month although many years since applix 1616 booted one everyone older meetings tend end somewhat midnight pizza consumed moderation
[ 5097, 6789, 5367, 4479, 2379, 7442, 4946, 3106, 5571, 2589, 336, 5079, 4543, 1237, 1435 ]
Validation
3,988
3
Murder_on_the_Mississippi:murder mississippi murder mississippi fully titled murder mississippi adventures sir charles foxworth 1986 detective adventure game developed published activision commodore 64 commodore 128 apple ii computers also licensed release exclusively japan jaleco ported game nintendo famicom msx2 adventure game player must solve murder mystery luxury ship delta princess heading new orleans st. louis ship delta princess detective sir charles watson caught midst murder case chance must solve holmes becomes second victim appearance similar painting sherlock holmes charles doyle arthur conan doyle father known regis activision version memos taken occasionally takes walks without notice charles death longs everything right way prostitute staying room 8 going new orleans visit aunt pearl aunt secret formula okra soup popular among passengers prostitute nevada staying room 2f20 judge staying room 9 reputation drinking widow millionaire staying room 2f23 bad reputation amongst passengers captain speaks incident even entering cabin discovering body philanthropist staying room 2f15 hobby shooting often hits birds crew member staying room 1f27 brown illegitimate son love taylor victim found dead room 4 owner delta princess co-manages nelson also managed many additional businesses sir charles staying room 3 normal assumption start investigation room 1- however pitfalls exist room 1 room 14 falling one holes results death instant game also trap room 16 knife flies air towards sir charles immediately enters unless knife dodged hits sir charles head kills resulting another instant game solving case reveals true criminal identity person set traps remains mystery since watson fall pitfall traps players suspect might one set suspect spoken per piece new information— consequently piece information missed first time around since impossible talk lead player becoming impossibly stuck game unable progress bears sense reality angered many players also bad ending game final stage game player must present evidence reveal prosecute true criminal however insufficient evidence examined/obtained player simply receive game due lack evidence compute called murder mississippi rich enjoyable adventure game
[]
Test
3,989
2
Font_Book:font book font book font manager apple inc. macos operating system first released mac os x panther 2003 opened default whenever user clicks new .otf .ttf font file user view font install point font copied centralised folder user-installed fonts available apps use may also used browser installed fonts user may view list fonts see alphabets complete repertoire characters set sample text user choice program also allows users feature editing tools even changing font properties means user use rename merge split fonts redesign modify fonts example changing kerning rules exporting small capitals separate style 2003-7 period apple font book faced criticism regarding inability validate auto-activate fonts features added font book release mac os x leopard
[ 3940, 713, 4690, 734, 405, 6832, 2597, 3322, 1502, 5786, 4740, 1897, 6505, 2627, 7609, 1171, 5109, 2284, 1178, 117, 6188, 1187, 1562, 6909, 6548, 502, 6557, 2679, 6565, 2329, 3050, 163, 6582, 5535, 5191, 8051, 7335, 3445, 569, 5571, 700...
Test
3,990
2
Burroughs_MCP:burroughs mcp mcp master control program proprietary operating system burroughs small medium large systems including unisys clearpath/mcp systems originally written 1961 espol executive systems programming language extension burroughs extended algol 1970s converted newp better structured robust secure form espol mcp leader many areas including first operating system manage multiple processors first commercial implementation virtual memory first os written exclusively high-level language 1961 mcp first os written exclusively high-level language hll burroughs large system b5000 successors unique designed expectation software including system software would written hll rather assembly language unique innovative approach 1961 unlike ibm faced hardware competition departure gene amdahl burroughs software designed run proprietary hardware reason burroughs free distribute source code software sold including mcp designed openness mind example upgrading required user recompile system software apply needed local patches time common practice necessary unusual customers especially large ones federal reserve modify program fit specific needs result burroughs users group formed held annual meetings allowed users exchange extensions os parts system software suite many extensions found way base os code years available customers mcp could considered one earliest open-source projects burroughs first manufacturer distribute source code late entry electronic computing compared traditional rivals ncr ibm univac mcp runs commodity hardware elements mcp based software suite longer made available source form unisys mcp first commercial os provide virtual memory supported burroughs large systems architecture since inception scheme unique industry stores retrieves compiler-defined objects rather fixed-size memory pages consequence overall non-von neumann uniformly stack-based architecture mcp provides file system hierarchical directory structures early mcp implementations directory nodes represented separate files directory entries systems however since 1970 mcp internally uses 'flat directory listing file paths volume opening files visiting opening directory file path inefficient production environment found better keep files single directory even though retain hierarchical naming scheme programmatically makes difference difference visible users entity file name directory example a/b a/b/c exist b node file directory files stored named volumes example 'this/is/a/filename myvol 'myvol volume name device independent since disk containing 'myvol moved copied different physical disk drives disks also concatenated single volume installed across several drives well mirrored recoverability sensitive data added flexibility program make volume substitutions volume name may substituted primary secondary alternate name referred process ’ family instance assignment “ family disk userpack otherwise syspack ” stores files logically designated volume disk onto volume userpack seek files first volume userpack search success another search file done volume syspack disk default volume name none specified file system set file attributes attributes record sorts meta data file importantly name type tells system handle file like limited four-character file type code macintosh attributes file record size fixed commercial applications block size multiples records tells mcp many records read write single physical io area size multiples blocks gives size disk areas allocated file expands file type indicates file character data source code written particular languages binary data code files files protected usual security access mechanisms public private file may guard file owner specify complex security rules another security mechanism code files created trusted compilers malicious programmers create program call compiler – program could converted compiler operator sufficient privileges 'mc make compiler operator command mcp implements journaling file system providing fault tolerance case disk failure loss power etc possible corrupt file system except operating system trusted system software direct access lower layers file system case-insensitive case-preserving unless quotes added around name case case-sensitive case-preserving mcp processes called jobs tasks job contains one tasks tasks within job run sequentially parallel logic implemented job level typically mcp job control language wfl control flow job tasks job complete job completed mcp process goes life cycle time enters system leaves initial state job queued period time job resides one several user defined job queues next state scheduled job moves queue memory tasks within job wait queue instead going directly 'scheduled state initiated job task started transition active waiting scheduled progresses job task completes moves 'completed state running processes use processor resource marked 'running processes ready assigned processor free processor placed ready queue processes may assigned “ declared ” “ visible ” priority generally 50 default 0 99 user processes system processes may assigned higher values note numerical priority secondary overall priority based task type processes directly part operating system called independent runners highest priority regardless numeric priority value next come processes using mcp lock message control systems cande discontinued processes work flow language jobs finally come user processes lower level fine priority intended elevate priority tasks use full processor slice allows io bound task get processor time ahead processor bound task declared priority processes waiting resources file read wait event data structure thus processes waiting single resource wait single event resource becomes available event caused wakes processes waiting processes may wait multiple events one happen including time events fully user programmable – users write systems use generalized event system provided mcp processes terminated marked completed operationally status tasks system displayed operator running ready processes displayed 'active tasks since system implements preemptive multitasking change ready running back quick distinguishing ready running tasks pointless get slice processor within second active tasks displayed command terminated tasks displayed completed tasks reason termination eot normal 'end task dsed reason process failure processes assigned mix number operators use number identify process control one command ds command stands either delete schedule discontinue deep six influence navy personnel early computer projects depending talk tasks terminated operator listed complete entries o-ds tasks also terminate due program faults marked f-ds p-ds faults invalid index numeric overflow etc completed entries listed operator c command tasks waiting resource listed waiting entries reason waiting waiting tasks may listed w command reason waiting also listed information task may seen command may task waiting operator input sent task via accept 'ax command note operator input different user input would input network device gui interface tasks waiting user input file reads would normally listed waiting entries operator attention another reason task waiting waiting file process opens file file present task placed waiting entries noting waiting certain file operator user owns process opportunity either copy file expected place redirect task read file another place file might even created independent process n't yet completed resource provided operator operator ds task last resort different systems automatically terminate task resource file available mcp provides level operator recoverability tasks systems force programmers add code check presence files accessing thus extra code must written every case provide recoverability process synchronization code may written mcp program desirable task wait operator-level recoverability forced therefore makes programming much simpler addition ability dynamically remap file database requests files databases program execution several mechanisms available allow programmers detect recover errors one way 'on statement around many years specific faults e.g. divide zero listed catch-all 'anyfault used statement block following 'on statement recognized compiler fault-handling code execution recoverable fault occurs scope 'on statement stack cut back control transferred statement following one problem handling logic behind statement would invoked program faults program terminations causes time need guaranteed handling abnormal terminations grew particular mechanism needed allow programs invoke plug-ins written customers third parties without risk plug-in behave badly addition general plug-in mechanisms new form dynamic library linkage connection libraries allows programs import export functions data hence one program runs code supplied another accomplish enhanced protection newer mechanism introduced mid 1990s misguided attempt compatibility named then-proposed c++ language construct name syntax behavior two differ large extent choosing name led confusion misunderstanding syntactically 'try statements look like 'if statements 'try followed statement block followed 'else another statement block additional 'else clauses may follow first execution recoverable termination occurs code following 'try clause stack cut back required control branches code following first 'else addition attributes set allow program determine happened including specific line number events would result task termination recoverable includes stack overflow array access out-of-bounds integer over/under flow etc operator user ds recoverable except privileged tasks using unsafe form try mcp thus provides fault-tolerant environment crash-and-burn core-dump systems file attributes tasks attributes well task priority assigned compile time execution time changed task running processor time wait time status etc task attributes accessed programmatically file attributes files parent task available programmatically task attribute type task example 'myself.initiator.name gives name process initiated current process codice_1 codice_2 two main procedures handling memory allocation deallocation memory needs allocated process initiation whenever block entered uses arrays files etc codice_1 codice_2 handle memory space also allocate deallocate disk space non memory resident data may overlaid memory may save i.e. memory resident overlayable i.e. virtual memory sticky meaning memory resident movable called upon e.g codice_5 process addresses uninitialized array codice_6 codice_5 handles hardware interrupts may call upon codice_1 codice_9 like codice_10 called upon task exiting block blockexit may turn call codice_11 codice_2 like cleaning releasing resources declared used within block j_edgar_hoover main security guardian system called upon process start file open user log etc codice_13 procedure decides process next one receive cpu resources thus one processes uses movestack instruction task goes various states starting nascent delivery event birth caused task state changes alive processkill called upon state changes diseased death caused task gets put queue structure morgue remaining resources freed system process called processkill task alive mcp functions run top particular process thus cpu resources automatically charged task causing mcp overhead also much mcp work performed particular stack security rights birth death mcp need operating stack none available system maintains idle stack mcp libraries provide way sharing data code processes article burroughs large systems looks way dependent processes could asynchronously run many processes could share common data mechanisms provide synchronized update family related processes written single program unit processing procedures higher lex levels asynchronous processes could still access global variables variables lower lex levels libraries completely inverted scenario following advantages clean radical library mechanism much system software underwent major rewrites resulting better structured systems performance boosts libraries introduced mcp systems early 1980s developed roy guck others burroughs much like c. a. r. hoare monitors provide opportunity controlled mutual exclusion synchronization client processes using mcp events dahm locking technique libraries offer procedural entry-points client checked compatible interface parameters return types imported procedures checked client linked library library client may written different languages advantage synchronization provided library client code need worry level programming results robust code since clients ca n't undermine synchronization code library would call 'trusted computing initiative libraries sophisticated forms libraries systems dlls mcp libraries 'shared ‘ shared rununit ’ 'private private case closest libraries systems – client separate copy library invoked data sharing processes shared interesting client starts run requires services library upon first reference library entry-point linkage initiated instance library already running client linked instance library clients share instance shared rununit sharing mechanism two sharing schemes designed specifically cobol rununit defined original initiating client program libraries linked rununit gets one instance library different rununits get different instance dynamic implementation cobol rununits first invocation library library would run main program outer block algol program initialize global environment initialization complete would execute freeze point exported entry points would made available clients point library stack said frozen since nothing would run stack library became unfrozen case clean-up termination code would run client calls routine library routine runs top client stack storing locals temporary variables allows many clients running routine time synchronized library routine accesses data global environment library stack freeze could also three forms – temporary permanent controlled temporary meant client count dropped zero library would unfrozen terminated permanent meant library remained available clients even client count dropped zero – permanent libraries could unfrozen operator thaw command controlled freeze meant library actually kept running could execute monitoring functions perform data initialization cleanup functions linking client libraries could also accessed 'by title 'by function 'by title client specified file name library 'by function indirect method client would specify function name library example 'system_support actual location library found table previously set operator 'sl system library commands example 'sl system_support *system/library/support mcp fault tolerant attitude also works – client tries accessing library present client put 'waiting tasks library could made present request redirected libraries also updated fly needs done 'sl new version running clients continue use old version terminate new clients directed new version function libraries also implemented important security feature linkage classes normal libraries linkage class zero libraries used mcp privileged system modules may usable normal programs accessed function forced linkage class one client linkage class zero link linkage class one entry-points library linkage class one needs offer entry-points normal programs designated ‘ trusted ’ offer selected entry-points linkage class zero entire database system implemented libraries providing efficient tailored access databases shared many clients goes networking functionality system intrinsics mid-1990s new type library made available connection libraries programs right execute independently well import export data functions programs arrays structure blocks example networking component operating system available connection library allowing programs use services exporting importing functions upon linkage client gets dedicated structure block keep state information program uses network might import network-write function export network-read function thus open network connection e.g. using tcp data arrives read networking component directly call function consume without first copy data buffer context switch likewise write data network directly calling network-write function connection libraries allow significant degree control linkages side linkage optionally approve linkage sever linkage desired state easily maintained per linkage well globally another technique inter-process communication ipc port files like unix pipes except generalized multiway bidirectional since order magnitude slower ipc techniques libraries better use techniques ipc different processes machine advantageous use port files therefore distributed ipc port files introduced bna burroughs network architecture advent standard networking technologies osi tcp/ip port files used networks well server listening incoming connections declares port file file kind attribute equal port connection made client creates subfile index port file represents multiple connections different clients around network server process receives client requests anywhere network issuing read port file subfile 0 read subfile issues response client issued request writing particular subfile request read mcp also provides sophisticated yet simple operator environment large installations many operators might required make physical resources printers loading paper toner cartridges etc available low-end environments small offices single user may require operator-free environment especially laptop implementation large systems dedicated operations terminals called odts operator display terminals usually kept secure environment small systems machines controlled terminal provided terminal user sufficient privileges using marc program menu assisted resource control operator commands also used users familiar operator commands mostly two letters unix one letter means operator interface must learned efficient experienced operators run large mainframe system day day commands case insensitive tasks entered program 'mix identified mix numbers libraries execute program operators use 'ex 'run command followed file name program odts run typically adm automatic display mode tailorable display system status usually set display active waiting completed mix entries well system messages operator notifications situations requiring operator action complete listing displays given active w waiting c completed 'msg message commands task becomes waiting operator action operator find task needs entering mix number followed command note object-oriented style commands selecting object first followed command example '3456y operator force task waiting entries stop command '3456st make active ok '3456ok ok command also used operator made resource available task although frequently mcp detect resources become available cause event processes waiting without operator intervention pass textual information operator program accept command ‘ 3456ax info ’ used programs pass information operators using display mechanism causes display messages added msg display well tasks processes operators also control files files listed using file command copied using copy removed using remove renamed operating environment mcp powerful yet simple usually requires fraction number operators systems important part operations environment high-level work flow language actions system logged example messages displayed operator operator actions significant program actions optionally logged system log program log example boj beginning wfl job bot beginning task within wfl job eot eoj end tasks jobs well file database open closes logged logging many events contributes apparent slowness mcp operating environment compared systems like unix since everything logged forced physical writes program log every record systems like unix ’ even though keep many things system logs logs used forensics find programs systems may failed detecting attempts compromise system security system logs automatically closed system-settable period new one opened system logs contain huge amount information filtered analyzed programs loganalyzer dumpanalyzer analyzes memory dumps originally written tape compilers added lineinfo code-files dumpanalyzer able pinpoint exactly source statement executed time error also normal program dump one program dumped contains information source-code sequence number variable names two analyzers major diagnostic tools kinds purposes beyond many technical innovations mcp design burroughs large systems many management innovations used internet community large system software shipped customers inclusive source code editing compilation tools needed generate new versions mcp customers many customers developed niche expertise inner workings mcp customers often sent 'patches fragment pieces source code sequence numbers suggestions new enhanced features fault corrections ftr field trouble reports many suggested patches included systems developers integrated next version mcp release including community voluntary self-professed experts mainstream technical work widely practised essence open innovation management innovation community development dated back 1970s mcp first os developed exclusively high-level language 50-year history many firsts commercial implementation including virtual memory symmetric multiprocessing high-level job control language wfl long many facilities appearing widespread operating systems together burroughs large systems architecture mcp provides secure high performance multitasking transaction processing environment
[ 1710, 1522, 2540, 1524, 3509, 4670, 8066, 1180, 7637, 1743, 5571, 7827, 5931, 7733, 7003, 3557, 1114, 1400, 336, 3821, 1785, 1600, 2438, 1989, 6500, 1435 ]
Validation
3,991
9
MINLOG:minlog minlog proof assistant developed university munich team helmut schwichtenberg minlog based first order natural deduction calculus intended reason computable functionals using minimal rather classical intuitionistic logic main motivation behind minlog exploit proofs-as-programs paradigm program development program verification proofs fact treated first class objects normalized formula existential proof used reading instance changed appropriately program development proof transformation end minlog equipped tools extract functional programs directly proof terms also applies non-constructive proofs using refined a-translation system supported automatic proof search normalization evaluation efficient term rewriting device
[]
Test
3,992
5
Physical_Layer_Convergence_Protocol:physical layer convergence protocol physical layer convergence protocol physical layer protocol several data transmission networks used 802.11 standard
[]
Test
3,993
3
Tank_Battalion:tank battalion player controlling tank must destroy twenty enemy tanks round enter playfield top screen enemy tanks attempt destroy player base represented map eagle well player tank round cleared player destroys twenty enemy tanks game ends player base destroyed runs lives
[ 723, 7179, 1237 ]
Test
3,994
7
Cloud_research:cloud research many universities vendors institutes government organizations investing cloud computing research 2012 european commission issued analysis relevance open research issues commercial stabilisation various experts industry academia identify particular following major concerns findings refined research roadmap proposed cloud computing expert group research december 2012 tries lay timeline identified research topics according commercial relevance 8th framework programmes research technological development european commission trying support according research work along lines europe 2020 strategy
[ 2961 ]
Test
3,995
6
Coherent_file_distribution_protocol:coherent file distribution protocol coherent file distribution protocol cfdp ietf-documented experimental protocol intended high-speed one-to-many file transfers class 1 assured delivery class 2 blind unassured delivery see rfc 1235
[]
Test
3,996
2
Xandros:xandros xandros software company sold xandros desktop linux distribution name xandros derived x window system greek island andros xandros founded may 2001 linux global partners roseman dr. frederick berenstein company headquartered new york city xandros desktop based corel linux debian-based distribution acquired along development team behind product corel corporation august 2001 corel decided sell linux distribution market xandros founding member desktop linux consortium member interop vendor alliance july 2007 xandros bought scalix linux-based email collaboration product based hp openmail july 2008 xandros acquired linspire xandros ’ website unresponsive last update november 2009 distrowatch lists xandros discontinued 1 january 2018 announced pc/opensystems llc purchased xandros linspire bridgeways inc. xandros made products consumer business markets distributions included many packages licensed free software open-source xandros also included proprietary software developed in-house xandros corporation edition came 30-day trial crossover office also included applications cd includes extra programs installed via xandros networks opposed home edition premium home edition include photo manager music manager security suite wireless profiles ability write ntfs partitions edition came full version crossover office standard edition second cd applications cd included extra applications could installed via xandros networks despite name xandros desktop home edition premium include xandros networks premium membership xandros corporation offered 30-day trial version xandros home edition premium free download evaluation purposes formerly known xandros desktop business edition edition basically xandros desktop home edition premium included ability authenticate windows pdc active directory domains used pptp vpn connect remotely office used broadband wireless connectivity 3g gsm umts support xandros desktop professional officially released 28 november 2006 home edition premium xandros corporation also offered 30-day trial version xandros professional introduced 2009 presto lightweight instant-on operating system uses lightweight xfce 4.6 desktop environment similar canonical wubi installer ubuntu installed inside microsoft windows windows xp earliest supported version also access application store based cnr acquired xandros acquisition linspire mid-2008 2009 xandros announced would develop new netbook operating system based moblin v2 xandros desktop management server xdms available easily set repositories deploys customized xandros desktop configurations across large organization xandros server designed run servers officially launched 2006 linuxworld conference expo toronto 25 april 2006 officially released purchase xandros website 1 may 2006 msrp usd 450 xandros server 2.0 released may 2007 xandros open circulation edition oce freely redistributable edition non-commercial use limited set additional software soon 4.0 version released dvd shrinkwrapped linux magazines torrent pulled xandros servers references oce removed xandros website without explanation previous versions xandros oce generally released 4 months release commercial versions xandros desktop os standard edition basically open circulation edition included full-speed cd/dvd burning product replaced home edition xandros desktop os deluxe edition included applications cd included extra programs could installed via xandros networks product replaced home edition premium xandros desktop os surfside edition branded sold xandros surfside linux basically xandros desktop os standard edition however surfside edition also included plantronics usb headset 120 minutes skypeout service according distrowatch xandros desktop discontinued distrowatch made decision new official version official updates xandros desktop released since november 2006 xandros purchased linspire announced plans retain freespire debian-based free community distribution base future editions xandros desktop professional – home edition home edition premium discontinued – freespire would similar way novell bases suse linux enterprise desktop free opensuse way red hat bases red hat enterprise linux free fedora however according one website xandros discontinued freespire addition distrowatch website added freespire list discontinued distributions xandros graphical user interface gui used modified version kde included replacing konqueror proprietary file manager called xandros file manager also used package manager known xandros networks handles installation software installation xandros done wizard asks questions partitioning administrator root password possible install use gnome xfce desktop environments xandros june 2007 broad collaboration agreement xandros microsoft announced agreement included patent covenants similar agreement microsoft reached novell 2009 xandros bridgeways released first many management packs systems center bridgeways management pack suite products includes 2010 bridgeways “ extending system center ” expanding scope market potential systems center windows linux unix vmware application environment monitoring bridgeways ’ focus building selling supporting management packs system center see bridgeways users track alerts system center service manager 2010 bridgeways compete microsoft group works closely microsoft system center r sales marketing teams maximize value system center customers addition xandros bridgeways system center resells direct partner network distributors isvs si mvps worldwide contributing member system center community collaboration asus hardware xandros operating system first netbook came asus eee pc available either xandros windows xp installed version xandros tab based built scratch using xlib qt 4.5 toolkit full desktop version advanced mode may installed—but always easily—through set administrative command prompts full desktop version features kde 3 desktop modifications performed xandros desktop mode also provides access synaptic package manager used update manage eee pc software february 2009 announced xandros porting eee pc linux distribution 2 arm processor-based freescale i.mx515 qualcomm snapdragon cpu platforms netbooks mobile devices
[ 5540, 1909, 710, 5200, 4759, 1534, 1629, 3444, 7251, 2916, 7528, 7253, 474, 644, 7075, 2297, 1941, 1561, 314, 6910, 5232, 2758, 2581, 7654, 1663, 2864, 6209, 2240, 7873, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 3...
Test
3,997
4
Insider_threat:insider threat insider threat malicious threat organization comes people within organization employees former employees contractors business associates inside information concerning organization security practices data computer systems threat may involve fraud theft confidential commercially valuable information theft intellectual property sabotage computer systems insider threat comes three categories insiders may accounts giving legitimate access computer systems access originally given serve performance duties permissions could abused harm organization insiders often familiar organization data intellectual property well methods place protect makes easier insider circumvent security controls aware physical proximity data means insider need hack organizational network outer perimeter traversing firewalls rather building already often direct access organization internal network insider threats harder defend attacks outsiders since insider already legitimate access organization information assets insider may attempt steal property information personal gain benefit another organization country threat organization could also malicious software left running computer systems former employees so-called logic bomb insider threat active area research academia government cert coordination center carnegie-mellon university maintains cert insider threat center includes database 850 cases insider threats including instances fraud theft sabotage database used research analysis cert insider threat team also maintains informational blog help organizations businesses defend insider crime 2018 insider threat report whitepaper determined 53 companies surveyed confirmed insider attacks organization previous 12 months 27 saying insider attacks become frequent report published july 2012 insider threat u.s. financial sector gives statistics insider threat incidents 80 malicious acts committed work working hours 81 perpetrators planned actions beforehand 33 perpetrators described difficult 17 disgruntled insider identified 74 cases financial gain motive 81 cases revenge 23 cases 27 people carrying malicious acts financial difficulties time us department defense personnel security research center published report describes approaches detecting insider threats earlier published ten case studies insider attacks information technology professionals forensically investigating insider data theft notoriously difficult requires novel techniques stochastic forensics national insider threat special interest group nitsig created response u.s. goverment presidential executive order 13587 structural reforms improve security classified networks responsible sharing safeguarding classified information national insider threat policy national industrial security program operating manual conforming change 2 nitsig created function national insider threat information sharing analysis center nitsig membership largest network 1000+ insider threat mitigation professionals u.s. globally willingness members collaborate share information among membership driving force made nitsig successful encourage become member attend meetings events charge become member https //nationalinsiderthreatsig.org insider threat defense group one first companies offer comprehensive insider threat program development management training u.s. government agencies department defense intelligence community defense contractors required develop implement insider threat programs https //www.insiderthreatdefense.us damaging insider threat incident impacts insider threat incidents severe costly damaging incidents insiders malicious non-malicious insider incidents damaging malicious incidents listed link numerous insider threat incidents severe impacts organizations https //www.insiderthreatdefense.us/insider-threat/
[ 429, 2491, 7057, 1135, 2434, 5125, 6920, 2566, 1805 ]
Test
3,998
2
389_Directory_Server:389 directory server 389 directory server previously fedora directory server lightweight directory access protocol ldap server developed red hat part community-supported fedora project name 389 derives port number used ldap 389 directory server supports many operating systems including fedora red hat enterprise linux debian solaris hp-ux 11i late 2016 project merged experimental freebsd support however 389 directory server team 2017 likely remove hpux solaris support upcoming 1.4.x series 389 source code generally available gnu general public license version 3 components exception plugin code components use lgplv2 apache red hat also markets commercial version project red hat directory server part support contracts rhel 389 directory server derived original university michigan slapd project 1996 project developers hired netscape communications corporation project became known netscape directory server nds acquiring netscape aol sold ownership nds intellectual property sun microsystems retained rights akin ownership sun sold developed netscape directory server name jes/sunone directory server oracle directory server since takeover sun oracle aol/netscape rights acquired red hat june 1 2005 much source code released free software terms gnu general public license gpl 389 directory server version 1.0 december 1 2005 red hat released free software remaining source code components included release package admin server console etc continues maintain respective licenses may 2009 fedora directory server project changed name 389 give project distribution vendor neutral name encourage porting running software operating systems 389 directory server rfc4511 compliant server project focus ease use stability correctness performance subset rfcs 389 directory server supports addition supported rfcs 389 directory server supports number features unique project
[ 5983, 7246, 900, 2104, 644, 5571, 578, 7092, 5847, 8149, 5956, 3489, 5965, 6586, 1435, 2536 ]
Validation
3,999
8
HTTP_referer:http referer http misspelling referrer optional http header field identifies address webpage i.e uri iri linked resource requested checking referrer new webpage see request originated common situation means user clicks hyperlink web browser browser sends request server holding destination webpage request may include field indicates last page user one clicked link default behaviour referer leaking puts websites risk privacy security breaches misspelling referrer originated original proposal computer scientist phillip hallam-baker incorporate field http specification misspelling set stone time incorporation request comments standards document rfc 1945 document co-author roy fielding remarked neither referrer misspelling recognized standard unix spell checker period since become widely used spelling industry discussing http referrers usage misspelling universal though correct spelling referrer used web specifications document object model visiting web page referrer referring page url previous webpage link followed generally referrer url previous item led request referrer image example generally html page displayed referrer field optional part http request sent web browser web server many websites log referrers part attempt track users web log analysis software process information referrer information violate privacy web browsers allow user disable sending referrer information proxy firewall software also filter referrer information avoid leaking location non-public websites turn cause problems web servers block parts website web browsers send right referrer information attempt prevent deep linking unauthorised use images bandwidth theft proxy software ability give top-level address target website referrer usually prevents problems still divulging user last-visited website many blogs publish referrer information order link back people linking hence broaden conversation led turn rise referrer spam sending fake referrer information order popularize spammer website possible access referrer information client side using document.referrer javascript used example individualize web page based user search engine query however referrer field always include queries using google search https web servers maintain logs traffic record http referrer sent web browser request raises number privacy concerns result number systems prevent web servers sent real referring url developed systems work either blanking referrer field replacing inaccurate data generally internet-security suites blank referrer data web-based servers replace false url usually raises problem referrer spam technical details methods fairly consistent – software applications act proxy server manipulate http request web-based methods load websites within frames causing web browser send referrer url website address web browsers give users option turn referrer fields request header web browsers send referrer field instructed redirect using refresh field include versions opera many mobile web browsers however method redirection discouraged world wide web consortium w3c website accessed http secure https connection link points anywhere except another secure location referrer field sent html5 standard added support attribute/value rel= noreferrer instructs user agent send referrer another referrer hiding method convert original link url data uri scheme-based url containing small html page meta refresh original url user redirected data page original referrer hidden content security policy standard version 1.1 introduced new referrer directive allows control browser behavior regards referrer header specifically allows webmaster instruct browser block referrer reveal moving origin etc
[ 2086, 2451, 5984, 1355, 5115, 3273, 3861, 4144, 4600, 3383, 6031, 6296, 6931, 1411, 2789, 3147, 4198, 3338, 5887, 87, 2901 ]
Test
4,000
4
Loss_of_United_Kingdom_child_benefit_data_(2007):loss united kingdom child benefit data 2007 loss united kingdom child benefit data data breach incident october 2007 two computer discs owned majesty revenue customs containing data relating child benefit went missing incident announced chancellor exchequer alistair darling 20 november 2007 two discs contained personal details families united kingdom claiming child benefit takeup uk near 100 discs sent junior staff hm revenue customs hmrc based waterview park washington tyne wear national audit office nao unrecorded internal mail via tnt october 18 october 24 nao complained hmrc received data november 8 senior officials hmrc informed loss chancellor exchequer alistair darling informed november 10 november 20 darling announced lost data thought concern approximately 25 million people uk nearly half country population personal data missing discs reported include names addresses parents children dates birth children together national insurance numbers bank building society details parents password protection question provided winzip version 8 weak proprietary scheme unnamed encryption hash algorithms well-known attacks anyone competent computing would able break protection downloading readily-available tools winzip version 9 introduced aes encryption would secure breakable correctly knowing passphrase list frequently asked questions bbc news website breakdown loss reported whilst government ministers claimed junior official blame conservatives said fault lay part senior management based claim national audit office requested bank details removed data sent hmrc denied request would costly complicated emails released 22 november confirmed senior hmrc officials made aware decision cost grounds strip sensitive information cost removing sensitive information given £5,000 although cost found substantially less £650 academic study according trade journal computer weekly said back march 2007 nao asked completed information child benefit database sent post cds instead sample database first time done things went smoothly package registered post however time unregistered courier later revealed 17 december 2007 data protection manual hmrc restriction senior members staff junior civil servants summary manual says security followed several data scandals 17th december revealed ruth kelly details three million learner drivers lost united states however details said lost name address phone number fee paid test centre payment code e-mail much panic caused due reduced risk financial fraud 23 december revealed nine nhs trusts also lost data hundreds thousands patients archive information medical records contact details soft financial data trusts also lost data found fairly quickly several uk firms also admitted security failings darling stated indication details fallen criminal hands urged affected monitor bank accounts said someone innocent victim fraud result incident people assured protection banking code suffer financial loss result hmrc set child benefit helpline concerned data loss incident breach uk data protection act resulted resignation hmrc chairman paul gray darling commented discs probably destroyed hunt probably within days opaque management structure hmrs difficult see responsible gray subsequently found working cabinet office metropolitan police independent police complaints commission investigated security breach uniformed police officers investigated hmrc offices loss led much criticism acting leader liberal democrats vince cable shadow chancellor george osborne osborne said addition said final blow ambitions government create national id database cable also criticised use disks modern age electronic data transfer spokespersons gordon brown however said prime minister fully supported darling said darling expressed intention resign general reaction public one anger worry banks individuals businesses government departments became vigilant data fraud identity theft government pledged careful data public media particularly angry fact data registered recorded securely encrypted nick assinder political correspondent bbc expressed opinion believed darling borrowed time george osborne questioned whether darling job suggested would matter days decision made regarding darling future however darling remained chancellor labour defeat 2010 tnt stated delivery recorded would possible even ascertain actually sent let alone went 7 january 2008 jeremy clarkson found subject direct debit fraud publishing bank account sort code details column sun make point public concern scandal unnecessary wrote “ 'll able put money account take honestly 've never known palaver nothing ” someone used details set £500 direct debit charity diabetes uk next sunday times column clarkson wrote “ wrong punished mistake.″ terms direct debit guarantee payment could reversed
[ 860, 3609, 7927, 877 ]
Test
4,001
1
SQL_Database_Studio:sql database studio sql database studio professional client microsoft sql server developed jan prochazka czech republic sql database studio sds used database developers designing database also average users browsing data sds comes two version express version free even commercial purposes lacks features pro version sds allows visualization gps data built using wpf application running microsoft .net framework 4.5
[ 930, 4759, 5571, 2530, 7715, 6386 ]
Test
4,002
2
MINIMOP:minimop minimop operating system ran international computers limited icl 1900 series computers minimop provided on-line time-sharing environment multiple online programming mop icl terminology typically ran alongside george 2 running batch jobs minimop named reflect role alternative mop facilities george 3 required powerful machine minimop would run 1900 processors apart low-end 1901 1902 required 16k words memory two 4 8 million character magnetic disks user provided fixed size file hold data subdivided number variable sized subfiles command language could extended simple macros minimop implemented multithreaded sub-programmed icl terminology user level program running standard executive low level operating system icl 1900 program control facilities executive used run user programs minimop user i/o operations trapped minimop emulated rather accessing real peripherals memory premium user programs would swapped memory whenever needed wait input output reached end time slice queen mary college london queen mary university london later developed maximop improved system largely compatible minimop icl universities sales region started distributing maximop used 100 sites
[ 1789, 5571, 2933, 515 ]
Test
4,003
9
Integer_BASIC:integer basic integer basic written steve wozniak basic interpreter apple original apple ii computers originally available cassette included rom original apple ii computer release 1977 first version basic used many early home computer owners language supported mathematics using integers lacking floating point support using integers allowed numbers stored much compact 16-bit format could rapidly read processed 6- 9-byte floating point formats found basics era however limited applicability general purpose language integer basic phased favor applesoft basic starting apple ii plus 1979 licensed modified version microsoft basic included floating point support missing integer basic steve wozniak first used basic computer language late 1960s time-sharing computer terminal california high school read 101 basic computer games member homebrew computer club 1970s decided computer designed would able play games book run logic simulations worked hewlett-packard hp wozniak knew bill gates written altair basic intel 8080 microprocessor hoped would first write one mos technology 6502 wozniak would later describe language intended primarily games educational uses experience basic days time-sharing system high school without access system wozniak write language—which called game basic —on paper hand assembling language 6502 machine code without training write computer language used hp experience implement stack machine interpret expressions wozniak previously studied hp basic manual borrowed work knowing syntax hp version language different dec basic language 101 basic computer games altair basic save time games logic simulations emphasized integer math wozniak removed floating-point routines game basic interpreter would implement 16-bit integer calculations wozniak previously developed breakout atari hardware hoped implement game basic designing apple ii computer wozniak added support color graphics game paddles sound language named integer basic language needed 4k ram made minimum memory apple ii demonstrating computer brick steve jobs wozniak demonstrated could quickly change colors game used altering source code woz later wrote proved software much flexible hardware jobs realized anyone could create arcade games without design hardware wozniak demonstrated brick meeting homebrew computer club later described satisfying day life ... seemed like huge step designing hardware arcade games knew able program basic going change world integer basic roms also included machine code monitor mini-assembler disassembler create debug assembly language programs interpreter 16-bit bytecode language called sweet16 wozniak hand assembled monitor apple ii first program used write integer basic
[ 6788, 5367, 12, 2925, 4690, 7906, 6113, 405, 2941, 3303, 6119, 61, 2609, 4012, 4376, 4745, 5450, 6882, 6891, 3001, 120, 5129, 2300, 5137, 2679, 2327, 3050, 163, 1599, 3412, 5877, 5190, 3764, 1255, 6971, 3445, 3782, 4139, 7353, 5926, 523...
Test
4,004
1
Linter_SQL_RDBMS:linter sql rdbms linter sql rdbms main product relex group linter russian dbms compliant standard supporting majority operating systems among windows various versions unix qnx others system enables transparent interaction client applications database server functioning different hardware software environments dbms linter includes program interfaces majority popular development tools system provides high data security level allowing user work secret information linter dbms certified fstec russia compliant class 2 data security requirements level 2 undeclared feature absence control many years linter used russian ministry defense ministry foreign affairs government bodies history linter dates back 1980 system domestic predecessors whose developers later took direct part creation linter 1983 according state order voronezh construction design office systemprogramm successfully completed relational dbms bars real-time operating system rafos rt-11 prototype computers sm set since 1985 system developers accepted mobility compatibility openness concept result dbms intereal implemented system covered wide spectrum hardware software platforms electronika-85 intel 8086 control modules sm1702 electronika-82 computer complexes vax prototypes 1990 dbms development team founded research-and-production company relex relational expert systems time dbms linter launched late 1990s linter-vs 6.0 developed part project performed relex russian ministry defense prototype system linter 5.7 1999 developed relex linter-vs 6.0 available os msvs mobile system armed forces also exists linter-vs 6.0.1 developed vniins based postgresql 7.2 system also available os msvs. br relx embedded compact american/japanese-developed version linter implemented sony products including linter phone sony ericsson so903i well kenwood navigation system hdd smá navi emotional sound hdv-990 hdv-790
[ 4759, 7248, 8117, 5956, 1435 ]
Test
4,005
3
Xevious:_Fardraut_Saga:xevious fardraut saga msx2 version players select two modes title screen recon port original xevious scramble new 16-area game new enemies new boss battles well andor genesis four ships solvalou solgrado zeodalley gampmission two modes renamed arcade fardraut pc engine version however fardraut bit different original scramble 4-stage game new enemies different ship level end level boss battle similar andor genesis end level level players given dialogue story given game
[]
Test
4,006
3
Commodore_CDTV:commodore cdtv cdtv commodore dynamic total vision later treated backronym compact disc television home multimedia entertainment video game console – convertible full-fledged personal computer addition optional peripherals – developed commodore international launched april 1991 cdtv essentially commodore amiga 500 home computer cd-rom drive remote control optional keyboard mouse floppy disk drive gained functionality regular amiga commodore marketed machine all-in-one multimedia appliance targeted market philips cd-i expected market multimedia appliances materialize neither machine met real commercial success though cdtv based entirely amiga hardware marketed strictly cdtv amiga name omitted product branding commodore announced cdtv summer 1990 consumer electronics show chicago promising release end year 100 software titles product debuted north america march 1991 ces las vegas uk world commodore 1991 earls court london advertised £499 cdtv unit remote control two software titles device released united states 999 1990 computer gaming world stated commodore poor reputation among consumers developers citing abysmal record customer technical support past company chose amiga-enthusiast magazines chief advertising channel amiga community whole avoided cdtv expectation add-on cd-rom drive amiga eventually came form a570 hurt sales cdtv a570-equipped a500 electronically cdtv consequently could run cdtv software little motivation amiga owner buy cdtv commodore would rectify cdtv successor a1200-based amiga cd32 adding akiko chip enabling developers produce cd32 games playable cd32 however nolan bushnell one chief endorsers cdtv argued system high price alone enough explain market failure ... difficult sell significant numbers anything 500 ... felt could sell hundred thousand something costs 800 standing head thought would no-brainer tell number units sold u.s. 800 could put eye draw tears cdtv supplied amigaos 1.3 rather advanced user-friendly 2.0 release launched around time notably cdxl motion video format primarily developed cdtv making one earliest consumer systems allow video playback directly cd-rom 1994 computer gaming world described cdtv fiasco commodore though company later developed improved cost-reduced cdtv-ii never released commodore discontinued cdtv 1993 launch amiga cd32 substantially based amiga hardware case newer amiga 1200 explicitly targeted games market cdtv intended media appliance rather mainstream personal computer housing dimensions styling fairly comparable household stereo system components period came infrared remote control similarly initially sold without keyboard mouse could added separately later bundled machine cdtv based technology earlier amiga systems featured single-speed cd-rom drive floppy disk drive standard cdtv compatible many amiga peripherals period addition official cdtv peripherals upgrades included
[ 6330, 3688, 1534, 638, 5822, 6431, 6009, 5571, 307, 5833, 5661, 3970, 4970, 7746, 7384, 3222, 6217, 3905, 5079, 7942, 5526, 4736, 1237, 7775, 788 ]
Test
4,007
3
Computer_for_operations_with_functions:computer operations functions computer operations mathematical functions unlike usual computer operates functions hardware level i.e without programming operations computing machine operations functions presented developed mikhail kartsev 1967 among operations computing machine functions addition subtraction multiplication functions comparison operations function number finding function maximum computing indefinite integral computing definite integral derivative two functions derivative two functions shift function along x-axis etc architecture computing machine using modern terminology vector processor array processor central processing unit cpu implements instruction set containing instructions operate one-dimensional arrays data called vectors used fact many operations may interpreted known operation vectors addition subtraction functions addition subtraction vectors computing definite integral two functions derivative— computing vector product two vectors function shift along x-axis – vector rotation axes etc 1966 khmelnik proposed functions coding method i.e functions representation uniform function whole positional code mentioned operations functions performed unique computer operations codes single arithmetic unit positional code integer number formula_1 numeral notation digits formula_2 certain positional number system form code may called linear unlike positional code one-variable formula_4 function formula_5 form flat triangular digits comprise triangle value positional number formula_1 sum formula_9 radix said number system positional code one-variable function correspond 'double code form formula_11 integer positive number quantity values taken formula_2 formula_13 certain function argument formula_4 addition positional codes numbers associated carry transfer higher digit according scheme addition positional codes one-variable functions also associated carry transfer higher digits according scheme transfer carried simultaneously two higher digits triangular code called r-nary denoted formula_17 numbers formula_18 take values set example triangular code ternary code formula_22 formula_23 quaternary formula_24 formula_25. br r -nary triangular codes following equalities valid formula_27 arbitrary number exists formula_17 arbitrary integer real number particular formula_29 also exists formula_17 function form formula_31 instance formula_32 r-nary triangular codes consists following procedure described also one-digit addition numbers table one-digit addition values terms formula_45 formula_46 must present values carries appearing decomposition sum formula_38 table may synthesized formula_48 br written table one-digit addition formula_49 r-nary triangular codes differs one-digit addition fact given formula_33-digit value formula_34 determined formula r-nary triangular codes based using correlation follows division digit causes carries two lowest digits hence digits result operation sum quotient division digit r two carries two highest digits thus divided parameter r procedure described table one-digit division parameter r values terms values carries appearing decomposition sum formula_56 must present table may synthesized formula_48 br table given one-digit division parameter r formula_49 r-nary triangular codes consists positional codes numbers subsequently performed one-digit operations mind one-digit operations digits column performed simultaneously r-nary triangular codes multiplication code formula_66 formula_33-digit another code formula_68 consists formula_33-shift code formula_66 i.e shift k columns left rows multiplication codes formula_66 formula_68 consists subsequent formula_33-shifts code formula_66 addition shifted code formula_66 part-product positional codes numbers r-nary triangular codes derivative function formula_5 defined derivation triangular codes function formula_5 consists determining triangular code partial derivative formula_79 multiplication known triangular code derivative formula_80 determination triangular code partial derivative formula_79 based correlation derivation method consists organizing carries mk-digit m+1 k -digit m-1 k -digit summing given digit performed way one-digit addition r-nary triangular codes function represented series form integer coefficients formula_84 may represented r-nary triangular codes coefficients functions formula_85 r-nary triangular codes mentioned beginning section hand r-nary triangular code may represented said series term formula_86 positional expansion function corresponding code may represented similar series r-nary triangular codes name operation reducing number non -zero columns necessity truncation appears emergence carries beyond digit net truncation consists division parameter r. coefficients series represented code reduced r times fractional parts coefficients discarded first term series also discarded reduction acceptable known series functions converge truncation consists subsequently performed one-digit operations division parameter r. one-digit operations digits row performed simultaneously carries lower row discarded r-nary triangular code accompanied scale factor similar exponent floating-point number factor permits display coefficients coded series integer numbers factor multiplied r code truncation addition factors aligned one added codes must truncated multiplication factors also multiplied positional code function two variables depicted figure 1 corresponds triple sum form formula_87 br formula_11 integer positive number number values figure formula_89 formula_90 — certain functions arguments formula_91 correspondingly figure 1 nodes correspond digits formula_89 circles values indexes formula_93 corresponding digit shown positional code function two variables called pyramidal positional code called r-nary denoted formula_94 numbers formula_89 assume values set formula_96 addition codes formula_94 carry extends four digits hence formula_98 positional code function several variables corresponds sum form formula_11 integer positive number number values digit formula_101 formula_102 certain functions arguments formula_103 positional code function several variables called hyperpyramidal figure 2 depicted example positional hyperpyramidal code function three variables nodes correspond digits formula_104 circles contain values indexes formula_105 corresponding digit positional hyperpyramidal code called r-nary denoted formula_106 numbers formula_101 assume values set formula_96 codes addition formula_106 carry extends -dimensional cube containing formula_110 digits hence formula_111
[ 6922, 1237, 3156, 8024 ]
Validation
4,008
2
Aurora_SPARC_Linux:aurora sparc linux aurora sparc linux operating system based fedora core sparc-based computers aurora originally created red hat dropped support sparc architecture red hat linux 6.2 name derives internal sun codename sparcstation 5 chassis since aurora derived fedora developers located us maintains packages legally distributable united states like fedora red hat linux aurora names releases like fedora core aurora includes core set packages downloading installing programs codecs distributed aurora several repositories available currently aurora extras official status repository supports currently released version aurora sparc linux build 2.0 aurora extras maintained group volunteers link extras currently included base distribution extra configuration required enable
[ 5200, 1629, 3444, 7251, 474, 7075, 4233, 5571, 395, 1941, 314, 5232, 2758, 1663, 2864, 3559, 6209, 6761, 2063, 343, 4824, 5523, 4455, 5259, 1893, 5530, 5704, 6317, 3751, 6586, 7587, 971, 7954, 6244 ]
Test
4,009
3
Halt_and_Catch_Fire:halt catch fire computer engineering halt catch fire known assembly mnemonic hcf idiom referring computer machine code instruction causes computer central processing unit cpu cease meaningful operation typically requiring restart computer originally referred fictitious instruction ibm system/360 computers making joke numerous non-obvious instruction mnemonics advent mc6800 design flaw discovered programmers due incomplete opcode decoding two illegal opcodes 0x9d 0xdd cause program counter processor increment endlessly renders processor useless codes unofficially named hcf design process mc6802 engineers originally planned remove instruction kept as-is testing purposes result hcf officially recognized real instruction later hcf became humorous term instructions may freeze processor including intentional instructions testing purposes unintentional illegal instructions considered hardware defects system shared malicious user execute launch denial-of-service attack case real instructions implication expression whereas cases cpu executes unintended instruction bug code computer may still able recover case hcf instruction definition way system recover without restart expression catch fire context normally facetious rather literal referring total loss cpu functionality current session imaginative idea cpu chip would switching bus circuits fast would cause overheat burn computer assembly language mnemonics used directly equivalent machine code instructions mnemonics frequently three letters long add cmp compare two numbers jmp jump different location program hcf instruction originally fictitious assembly language instruction said development ibm use system/360 computers along many amusing three-letter acronyms like xpr execute programmer cai corrupt accounting information similar joke mnemonics sdi self destruct immediately crn convert roman numerals list mnemonics including hcf shows overextended mnemonics april 1980 creative computing flip-side parody issue ibm system/360 already included numerous non-obvious mnemonics like zap zero add packed edmk edit mark trt translate test read backward i/o channel command programmers began creating similarly cryptic fictitious instructions humorous vein 1990 usenet discussion claimed hcf dated back 1977 rick cook science fiction/fantasy novel wizardry compiled programmers transported universe magic could programmed one refers command hmcf halt melt catch fire cpu designers sometimes incorporate one undocumented machine code instructions testing purposes ibm system/360 diagnose instruction instructions intended executed normal operation cpu actually executed program normal operation unusual side-effects halt catch fire hcf instruction mnemonic sometimes appropriated users discover instructions humorous way expressing unintended execution instruction causes system fail perform normal functions motorola 6800 microprocessor first undocumented assembly mnemonic hcf became widely known operation codes opcodes—the portions machine language instructions specify operation performed —hexadecimal 9d dd reported given unofficial mnemonic hcf article written gerry wheeler december 1977 issue byte magazine undocumented opcodes wheeler noted motorola reported 197 valid operation codes m6800 processor inferred 256 possible 8 bit combinations must 59 invalid instructions goes describe hcf big surprise saying catch fire portion moniker well almost process reviewed david agans thus old days motorola 6800 microprocessor instruction code dd caused processor go endless loop reading memory address order engineers referred 'halt catch fire hcf instruction remembered code calling 'drop dead instruction drop dead mode wonderful spotting hardware timing address logic problems scope address clock lines nice cycling square waves either opcode made processor enter mode continuously performing memory read cycles successive addresses intervening instruction fetches hence address bus effectively became counter allowing operation address lines quickly verified processor entered mode responsive interrupts normal operation could restored reset hence drop dead halt catch fire monikers references thus unresponsive behavior cpu state form erratic behavior mnemonic hcf believed first built-in self-test feature motorola microprocessor intel 8086 subsequent processors x86 series hlt halt instruction opcode f4 stopped instruction execution placed processor halt state enabled interrupt debug exception binit signal init signal reset signal resumed execution meant processor could always restarted early intel dx4 chips problem hlt instruction could restarted instruction used disabled computer turned hlt hcf instruction linux kernel added no-hlt option telling linux run infinite loop instead using hlt allowed users broken chips use linux 80286 undocumented opcode 0f 04 causing cpu hang executed way cpu reset implementations opcode emulated bios halting sequence many computers intel pentium line could locked executing invalid instruction f00f c7c8 caused computer lock became known pentium f00f bug compiler would create instruction malicious programmer could insert code render afflicted computer inoperable machine power-cycled since discovery workarounds developed prevent locking computer bug eliminated subsequent intel processors black hat usa 2017 christopher domas showed found new currently unknown halt catch fire instruction particular x86 processor model using x86 processor fuzzer called sandsifter affected instruction processor manufacturer yet revealed due responsible disclosure guidelines mos technology 6502 12 invalid instructions freeze cpu zilog z80 executing di disable interrupts followed halt wait interrupt results cpu staying frozen indefinitely waiting interrupt happen similar processor found game boy lr35902 contained partial fix allowing recover one halt would become frozen three consecutive halts interrupts disabled lr35902 contains less 11 opcodes fully lock cpu executed also noted z80 supports non-maskable interrupt /nmi signal pin 17 original 40 pin dip package since non-maskable interrupt regain control cpu even executing instruction sequence di halt pair represent true hcf result hcf condition either /nmi pin connected directly +5v rail making generation signal impossible interrupt routine services /nmi ends return placing back halt state apocryphal stories connect term illegal opcode ibm system/360 processor upon encountering instruction would start switching bus lines fast potentially leading overheating
[ 364, 1815, 6078, 2459, 467, 4307, 6177, 1176, 1335, 4415, 6915, 6118, 1670, 1584, 336, 1682, 1594, 4542, 1691, 1052, 1237, 5441, 263, 5190 ]
Test
4,010
1
Index_locking:index locking databases index data structure part database used database system efficiently navigate access user data index data system data distinct user data consist primarily pointers changes database insert delete modify operations may require indexes updated maintain accurate user data accesses index locking technique used maintain index integrity portion index locked database transaction portion accessed transaction result attempt access related user data additionally special database system transactions user-invoked transactions may invoked maintain modify index part system self-maintenance activities portion index locked transaction transactions may blocked accessing index portion blocked modifying even reading depending lock type needed operation index locking protocol guarantees phantom phenomenon wo n't occur index locking protocol states specialized concurrency control techniques exist accessing indexes techniques depend index type take advantage structure typically much effective applying indexes common concurrency control methods applied user data notable widely researched specialized techniques b-trees b-tree concurrency control regularly used database indexes index locks used coordinate threads accessing indexes concurrently typically shorter-lived common transaction locks user data professional literature often called latches
[ 1730, 3801, 2054, 5209 ]
Test
4,011
3
EyeToy:eyetoy eyetoy color webcam use playstation 2 supported games use computer vision gesture recognition process images taken eyetoy allows players interact games using motion color detection also sound built-in microphone released october 2003 camera manufactured logitech known logicool japan although newer eyetoys manufactured namtai camera mainly used playing eyetoy games developed sony companies intended use normal pc camera although programmers written unofficial drivers eyetoy compatible playstation 3 used video chatting november 6 2008 eyetoy sold 10.5 million units worldwide eyetoy conceived richard marks 1999 witnessing demonstration playstation 2 1999 game developers conference san jose california marks idea enable natural user interface mixed reality video game applications using inexpensive webcam using computational power playstation 2 implement computer vision gesture recognition technologies joined sony computer entertainment america scea year worked technology special projects manager research development marks work drew attention phil harrison vice president third party relations research development scea soon promoted senior vice president product development sony computer entertainment europe scee 2000 harrison brought marks division headquarters london demonstrate technology number developers demonstration marks joined ron festejo sce camden studio would later merge become sce london studio begin developing software title using technology would later become originally called itoy short interactive toy london branch webcam later renamed eyetoy harrison first demonstrated public playstation experience event august 2002 four minigames already planned release europe eyetoy picked sce japanese american branches successful showing playstation experience 2003 eyetoy released bundle eyetoy play europe july 4 north america november 4 end year eyetoy sold 2 million units europe 400,000 units united states february 11 2004 eyetoy released japan camera mounted pivot allowing positioning focusing camera performed rotating ring around lens comes two led lights front blue light turns ps2 indicating ready used red light flashes insufficient light room also microphone built second newer model eyetoy provides similar features sports smaller size silver casing since eyetoy essentially webcam inside casing designed match playstation 2 uses usb 1.1 protocol usb plug possible make work systems relatively easily drivers created make work many computer operating systems however linux os drivers installed yet official drivers offered namtai logitech sony microsoft windows mac os linux type driver required depends model eyetoy camera three different models model information included label bottom camera custom drivers red led normally signals inadequate lighting used active recording indicator blue led lit eyetoy plugged computer 25 games require eyetoy played 2 korean-exclusive ones released pal regions 8 2 third party titles released north america games may used eyetoy optionally typically enhanced eyetoy eyetoy enhanced label box eyetoy cameo system allowing players include images avatars games games support feature include head scanning program used generate 3d model player head stored memory card file available games support cameo feature eyetoy cameo licenses head creation technology digimask
[ 450, 6330, 2177, 7962, 7514, 4759, 4761, 6621, 4408, 3704, 481, 1379, 578, 746, 3304, 7014, 4718, 6839, 602, 2873, 424, 253, 4911, 5446, 4748 ]
Validation
4,012
9
Basic_For_Qt:basic qt basic qt successor kbasic object-oriented framework related vb.net visual basic well integrated development environment designed run multiple platforms pre-compiled binaries available mac windows gnu/linux distributions source code also available
[ 2810, 4296, 5367, 1255, 12, 2463, 6891, 8183, 4139, 5651, 2925, 7448, 5926, 2026, 5129, 5571, 7906, 578, 5137, 5234, 2941, 3303, 753, 6211, 1304, 7669, 61, 6394, 4003, 7581, 6489, 7864, 1789, 5877, 7308, 4745, 1435, 1064 ]
Test
4,013
3
Wait_(system_call):wait system call computer operating systems process task may wait another process complete execution systems parent process create independently executing child process parent process may issue wait system call suspends execution parent process child executes child process terminates returns exit status operating system returned waiting parent process parent process resumes execution modern operating systems also provide system calls allow process thread create threads wait terminate join similar fashion operating system may provide variations wait call allow process wait child processes exit wait single specific child process identified process id exit operating systems issue signal sigchld parent process child process terminates notifying parent process allowing retrieve child process exit status exit status returned child process typically indicates whether process terminated normally abnormally normal termination status also includes exit code usually integer value process returned system first 20 years unix low 8 bits exit code available waiting parent 1989 svr4 new call waitid introduced returns bits exit call structure called siginfo_t structure member si_status waitid mandatory part posix standard since 2001 child process terminates becomes zombie process continues exist entry system process table even though longer actively executing program normal operation typically immediately waited parent reaped system reclaiming resource process table entry child waited parent continues consume resource indefinitely thus resource leak situations typically handled special reaper process locates zombies retrieves exit status allowing operating system deallocate resources conversely child process whose parent process terminates becomes orphan process situations typically handled special root init process assigned new parent process parent process exits special process detects orphan process terminates retrieves exit status allowing system deallocate terminated child process child process receives signal waiting parent continue execution leaving orphan process behind hence sometimes needed check argument set wait waitpid waitid case wifsignaled true wait child process deallocate resources
[ 5571, 2118, 6915 ]
Test
4,014
4
Virtual_private_network:virtual private network virtual private network vpn extends private network across public network enables users send receive data across shared public networks computing devices directly connected private network applications running computing device e.g laptop desktop smartphone across vpn may therefore benefit functionality security management private network encryption common though inherent part vpn connection vpn technology developed allow remote users branch offices access corporate applications resources ensure security private network connection established using encrypted layered tunneling protocol vpn users use authentication methods including passwords certificates gain access vpn applications internet users may secure connections vpn circumvent geo-restrictions censorship connect proxy servers protect personal identity location stay anonymous internet however websites block access known vpn technology prevent circumvention geo-restrictions many vpn providers developing strategies get around roadblocks vpn created establishing virtual point-to-point connection use dedicated circuits tunneling protocols existing networks vpn available public internet provide benefits wide area network wan user perspective resources available within private network accessed remotely early data networks allowed vpn-style connections remote sites dial-up modem leased line connections utilizing x.25 frame relay asynchronous transfer mode atm virtual circuits provided networks owned operated telecommunication carriers networks considered true vpns passively secure data transmitted creation logical data streams replaced vpns based ip ip/multi-protocol label switching mpls networks due significant cost-reductions increased bandwidth provided new technologies digital subscriber line dsl fiber-optic networks vpns characterized host-to-network remote access connecting single computer network site-to-site connecting two networks corporate setting remote-access vpns allow employees access company intranet outside office site-to-site vpns allow collaborators geographically disparate offices share virtual network vpn also used interconnect two similar networks dissimilar intermediate network example two ipv6 networks ipv4 network vpn systems may classified vpns make online connections completely anonymous usually increase privacy security prevent disclosure private information vpns typically allow authenticated remote access using tunneling protocols encryption techniques vpn security model provides secure vpn protocols include following tunnel endpoints must authenticated secure vpn tunnels established user-created remote-access vpns may use passwords biometrics two-factor authentication cryptographic methods network-to-network tunnels often use passwords digital certificates permanently store key allow tunnel establish automatically without intervention administrator tunneling protocols operate point-to-point network topology would theoretically considered vpn vpn definition expected support arbitrary changing sets network nodes since router implementations support software-defined tunnel interface customer-provisioned vpns often simply defined tunnels running conventional routing protocols depending whether provider-provisioned vpn ppvpn operates layer 2 layer 3 building blocks described may l2 l3 combine multi-protocol label switching mpls functionality blurs l2-l3 identity device within customer network directly connected service provider network c devices aware vpn device edge customer network provides access ppvpn sometimes demarcation point provider customer responsibility providers allow customers configure pe device set devices edge provider network connects customer networks ce devices presents provider view customer site pes aware vpns connect maintain vpn state p device operates inside provider core network directly interface customer endpoint might example provide routing many provider-operated tunnels belong different customers ppvpns p device key part implementing ppvpns vpn-aware maintain vpn state principal role allowing service provider scale ppvpn offerings example acting aggregation point multiple pes p-to-p connections role often high-capacity optical links major locations providers virtual lan vlan layer 2 technique allow coexistence multiple local area network lan broadcast domains interconnected via trunks using ieee 802.1q trunking protocol trunking protocols used become obsolete including inter-switch link isl ieee 802.10 originally security protocol subset introduced trunking atm lan emulation lane developed institute electrical electronics engineers virtual lans vlans allow multiple tagged lans share common trunking vlans frequently comprise customer-owned facilities whereas vpls described section osi layer 1 services supports emulation point-to-point point-to-multipoint topologies method discussed extends layer 2 technologies 802.1d 802.1q lan trunking run transports metro ethernet used context vpls layer 2 ppvpn emulating full functionality traditional lan user standpoint vpls makes possible interconnect several lan segments packet-switched optical provider core core transparent user making remote lan segments behave one single lan vpls provider network emulates learning bridge optionally may include vlan service pw similar vpls provide different l2 protocols ends typically interface wan protocol asynchronous transfer mode frame relay contrast aiming provide appearance lan contiguous two locations virtual private lan service ipls would appropriate etherip ethernet ip tunneling protocol specification etherip packet encapsulation mechanism confidentiality message integrity protection etherip introduced freebsd network stack softether vpn server program subset vpls ce devices must layer 3 capabilities ipls presents packets rather frames may support ipv4 ipv6 section discusses main architectures ppvpns one pe disambiguates duplicate addresses single routing instance virtual router pe contains virtual router instance per vpn former approach variants gained attention one challenges ppvpns involves different customers using address space especially ipv4 private address space provider must able disambiguate overlapping addresses multiple customers ppvpns method defined bgp extensions advertise routes ipv4 vpn address family form 12-byte strings beginning 8-byte route distinguisher rd ending 4-byte ipv4 address rds disambiguate otherwise duplicate addresses pe pes understand topology vpn interconnected mpls tunnels either directly via p routers mpls terminology p routers label switch routers without awareness vpns virtual router architecture opposed bgp/mpls techniques requires modification existing routing protocols bgp provisioning logically independent routing domains customer operating vpn completely responsible address space various mpls tunnels different ppvpns disambiguated label need routing distinguishers virtual networks use tunneling protocols without encryption protecting privacy data vpns often provide security unencrypted overlay network neatly fit within secure trusted categorization example tunnel set two hosts generic routing encapsulation gre virtual private network neither secure trusted native plaintext tunneling protocols include layer 2 tunneling protocol l2tp set without ipsec point-to-point tunneling protocol pptp microsoft point-to-point encryption mppe trusted vpns use cryptographic tunneling instead rely security single provider network protect traffic security standpoint vpns either trust underlying delivery network must enforce security mechanisms vpn unless trusted delivery network runs among physically secure sites trusted secure models need authentication mechanism users gain access vpn users utilize mobile virtual private networks settings endpoint vpn fixed single ip address instead roams across various networks data networks cellular carriers multiple wi-fi access points without dropping secure vpn session losing application sessions mobile vpns widely used public safety give law-enforcement officers access applications computer-assisted dispatch criminal databases organizations similar requirements field service management healthcare increasing use vpns many started deploying vpn connectivity routers additional security encryption data transmission using various cryptographic techniques home users usually deploy vpns routers protect devices smart tvs gaming consoles supported native vpn clients supported devices restricted capable running vpn client many router manufacturers supply routers built-in vpn clients use open-source firmware dd-wrt openwrt tomato order support additional protocols openvpn setting vpn services router requires deep knowledge network security careful installation minor misconfiguration vpn connections leave network vulnerable performance vary depending internet service provider isp limitation traditional vpns point-to-point connections tend support broadcast domains therefore communication software networking based layer 2 broadcast packets netbios used windows networking may fully supported local area network variants vpn virtual private lan service vpls layer 2 tunneling protocols designed overcome limitation users must consider transmitted content encrypted entering vpn data visible receiving endpoint usually public vpn provider site regardless whether vpn tunnel wrapper encrypted inter-node transport secure vpn participants oversight ends entire data path content encrypted enters tunnel provider unapproved vpns reportedly illegal china used circumvent great firewall enforcement however might comprehensive
[ 8, 6419, 1459, 1460, 6806, 2563, 2566, 3638, 4706, 6458, 5414, 1123, 4353, 5773, 1125, 2961, 7213, 1886, 6487, 7214, 7585, 436, 5440, 6499, 3338, 2984, 96, 458, 3350, 5808, 6879, 2991, 803, 1171, 7975, 1175, 2644, 7258, 7637, 5488, 1559...
Test
4,015
7
Microsoft_Dynamics_365_for_Finance_and_Operations:microsoft dynamics 365 finance operations microsoft dynamics 365 finance operations enterprise edition microsoft enterprise resource planning erp system medium large organisations software part dynamics 365 product line first general release november 2016 initially branded dynamics 365 operations july 2017 rebranded dynamics 365 finance operations time microsoft rebranded business software suite small businesses business edition financials finance operations business edition however two applications based completely different platforms dynamics 365 finance operations available part unified operations plan also includes dynamics 365 talent dynamics 365 retail microsoft powerapps three options deployment
[ 7766, 2961 ]
Test
4,016
3
The_Tower_of_Druaga:tower druaga druaga designed masanobu endo best known creating xevious 1983 inspired games wizardry dungeons dragons conceived fantasy pac-man combat puzzle solving taking inspiration sumerian mesopotamian babylonian mythology began prototype game called quest interlocking mazes revised run arcade system original concept scrapped due endo disliking heavy use role-playing elements instead becoming action-oriented game japan tower druaga widely successful attracting millions fans use secrets hidden items cited important game genre laying foundation future games well inspiring idea sharing tips friends guidebooks druaga noted influential many games follow including ys hydlide dragon slayer legend zelda dragon quest creator koichi nakamura citing endo favorite game developer north america game met negative reception obtuse design many said near-impossible finish without guidebook alongside high difficulty controls success game japan would inspire several ports multiple platforms well spawning massive franchise known babylonian castle saga including multiple sequels spin-offs literature anime series produced gonzo tower druaga action role-playing maze video game controlling knight gilgamesh player must scale 60 floors tower rescue maiden ki druaga four-armed demon plans use artifact called blue crystal rod enslave mankind gilgamesh need locate key floor order open door allowing proceed next floor floor different types enemies slimes knights projectile-firing wizards ghosts travel walls fire-spewing dragons gilgamesh defeat enemies hitting sword — require multiple hits defeat gilgamesh also block projectiles facing shield floor also hidden item uncovered completing tasks defeating certain number enemies inputting specific code joystick items include pickaxe destroy walls boots drastically increase gilgamesh walking speed candle reveal ghosts items required fully beat game failing either cause player die make game unwinnable time limit also present floor player take long two indestructible spherical enemies named will-o-wisps charge towards gilgamesh player forget get required item instead sent back zapped earlier floor retrieve game mazes randomized playthrough although treasure appear player starting point tower druaga designed masanobu endo joined namco april 1982 releasing xevious following year overwhelming success japan endo took business trip north america bought copy dungeons dragons intrigued gameplay setting endo fan apple ii game wizardry set make next game action role-playing title returning japan designed basic prototype game called quest player would able explore inter-locking rooms defeating enemies using keys open doors — expanded version made run namco super pac-man arcade system titled return ishtar upon completion endo dissatisfied game heavy use role-playing elements leading game instead becoming action-oriented game puzzle solving conceived fantasy pac-man second prototype endo took inspiration sumerian mesopotamian babylonian mythology including epic gilgamesh tower babel several characters named mesopotamian indian gods including antagonist druaga goddess ishtar game made run hardware setup used mappy featured horizontal-scrolling vertical screen layout 60 floors inspired sunshine 60 tallest building asia time music game composed junko ozawa promotional arcade flyer used miniature dioramas cardboard cutouts instead drawings response namco president masaya nakamura hatred towards manga last frame poster gilgamesh wearing horned helmet fighting druaga meant imply players would need order finish game tower druaga released arcades japan june 1984 druaga would ported several japanese game systems including msx 1984 family computer 1985 fujitsu fm-7 1985 portable game boy version released 1990 16-bit remake pc-engine 1992 — gb version re-released 1996 part compilation title namco gallery vol 2 also included galaxian dig dug famista 4 1997 windows port released part namco history vol 2 alongside several early namco arcade titles 2003 famicom version re-released japan gamecube pre-order bonus several japanese mobile phone ports released first 2002 java version followed i-mode release 2003 2009 digital version released wii virtual console one four launch titles then-new virtual console arcade service alongside mappy gaplus star force famicom version released onto 3ds virtual console december 2012 exclusive japan druaga would included several namco museum compilations including namco museum vol 3 1996 namco museum battle collection 2005 namco museum virtual arcade 2009 namco museum switch 2017 japan tower druaga overwhelming critical success attracting millions fans use puzzle-solving action-oriented gameplay cited important landmark role-playing genre helped lay foundations future titles druaga cited influential many japanese role-playing games including ys hydlide dragon slayer legend zelda koichi nakamura creator dragon quest since cited masanobu endo favorite video game developer druaga also helped inspire idea note sharing players tower druaga met negative reception north america many criticizing game controls high difficulty design reviewing wii virtual console port dan whitehead eurogamer referred game design diabolically obtuse criticized gilgamesh slow movement notably deflecting projectiles whitehead also criticized hidden treasures elusive appealing towards dedicated players although stated interesting gameplay idea brett alan weiss allgame also criticized hidden items especially required later levels well player wimpy attack time limit marcel van duyn nintendo life said recommended truly sadistic gamers expressing distaste towards repetitive levels high difficulty obtuse secrets lucas m. thomas ign critical game lambasting arbitrary wall item requirements slow pace high difficulty calling woefully boring pointless play also noted player would need walkthrough order fully beat 2003 interview endo stated somewhat regretted making game difficult noting might made players paranoid finding secrets games success tower druaga would spawn wave sequels spin-off games collectively known babylonian castle saga series first released 1986 return ishtar based original prototype druaga developed endo game company game studio published namco arcades taking place right events original two players controlled gilgamesh ki made way bottom druaga tower blue crystal rod 1996 ported playstation part namco museum vol 4 famicom prequel game quest ki released 1988 — controlling ki player make top druaga tower search blue crystal rod leading events first game super famicom follow-up released 1994 blue crystal rod also known destiny gilgamesh gameplay much different compared earlier games instead graphical adventure game characters series 1996 two altered versions original game another tower darkness tower included hidden extras namco museum vol 3 made much harder original game altered requirements finding treasure game boy color spin-off seme com dungeon drururuaga released 2000 2004 namco partnered arika develop playstation 2 one babylonian castle saga games localized outside japan part mystery dungeon series game notorious extreme difficulty death would revoke player items half money online-based arcade game released 2005 druaga online story aon followed similar pc game 2009 tower druaga recovery babylim spin-off game labyrinth druaga released japanese mobile phones january 12 2011 1990 namco produced theme park attraction based tower druaga expo '90 osaka alongside show conclusion moved namco wonder eggs amusement park tokyo 1992 remaining park closing december 31 2000 sugoroku medal game released arcades 2000 sugoroku adventure tower druaga also featured characters namco valkyrie series gilgamesh red-striped shield blue crystal rod appear sophita alternative weapons soul edge gamecube game features gamemode inspired game titled hole druaga mii fighter costume based gilgamesh released super smash bros. nintendo 3ds wii u 2015 anime reboot series tower druaga aegis uruk produced japanese studio gonzo premiering april 4 2008 taking place roughly 60 years events arcade game followed sequel series tower druaga sword uruk premiering january 8 2009
[ 2177, 2207, 7179, 1237, 2976, 7141, 2148 ]
Validation
4,017
2
Windows_API:windows api windows api informally winapi microsoft core set application programming interfaces apis available microsoft windows operating systems name windows api collectively refers several different platform implementations often referred names example win32 api see versions section almost windows programs interact windows api windows nt line operating systems small number programs started early windows startup process use native api developer support available form software development kit microsoft windows sdk providing documentation tools needed build software based windows api associated windows interfaces windows api win32 focused mainly programming language c exposed functions data structures described language recent versions documentation however api may used programming language compiler assembler able handle well-defined low-level data structures along prescribed calling conventions calls callbacks similarly internal implementation api function developed several languages historically despite fact c object-oriented programming language windows api windows historically described object-oriented also many wrapper classes extensions microsoft others object-oriented languages make object-oriented structure explicit microsoft foundation class library mfc visual component library vcl gdi+ etc. instance windows 8 provides windows api winrt api implemented c++ object-oriented design functions provided windows api grouped eight categories internet explorer ie web browser also exposes many apis often used applications could considered part windows api ie included operating system since windows 95 osr2 provided web-related services applications since windows 98 specifically used provide classic windows multimedia api placed winmm.dll contains functions play sound files send receive midi messages access joysticks facilitate features so-called mci subsystem windows originates multimedia extensions available windows 3.0 separately integral part operating system since windows 3.1 time located mmsystem.dll apart part every windows version since windows 95 osr2 microsoft provided directx apis—a loosely related set graphics gaming services includes microsoft also provides several apis media encoding playback windows api designed mostly interaction operating system application communication among different windows applications microsoft developed series technologies alongside main windows api started dynamic data exchange dde superseded object linking embedding ole later component object model com automation objects activex controls .net framework always clear distinction technologies much overlap variety terms basically result grouping software mechanisms relate given aspect software development automation specifically relates exporting function application component application programming interface api controlled applications instead human users .net self-contained general methodology technology develop desktop web applications written variety just-in-time jit compiled languages windows.pas pascal/delphi unit contains windows-specific api declarations pascal equivalent windows.h used c. various wrappers developed microsoft took low level functions windows api allowed applications interact api abstract manner microsoft foundation class library mfc wrapped windows api functionality c++ classes thus allows object-oriented way interact api active template library atl template oriented wrapper com windows template library wtl developed extension atl intended smaller alternative mfc application frameworks windows least partly wrap windows api thus .net framework java likewise programming languages windows contain wrapper libraries windows api code pack microsoft .net framework .net wrapper library windows api windows api always exposed large part underlying structure windows systems programmers advantage giving much flexibility power applications also creates great responsibility applications handle various low-level sometimes tedious operations associated graphical user interface example beginning c programmer often write simple hello world first assignment working part program single printf line within main subroutine overhead linking standard i/o library also one line windows version still one working line code required many many lines overhead charles petzold wrote several books programming windows api said original hello world program windows 1.0 sdk bit scandal hello.c 150 lines long hello.rc resource script another 20 lines ... veteran programmers often curled horror laughter encountering windows hello-world program years various changes additions made windows systems windows api changed grew reflect windows api windows 1.0 supported fewer 450 function calls whereas modern versions windows api support thousands however general interface remained fairly consistent old windows 1.0 application still look familiar programmer used modern windows api microsoft made effort maintain backward compatibility achieve developing new versions windows microsoft sometimes implemented workarounds allow compatibility third-party software used prior version undocumented even inadvisable way raymond chen microsoft developer works windows api said could probably write months solely bad things apps get work often spite get particularly furious people accuse microsoft maliciously breaking applications os upgrades application failed run windows 95 took personal failure one largest changes windows api transition win16 shipped windows 3.1 older win32 windows nt windows 95 win32 originally introduced windows nt 3.1 win32s allowed use win32 subset windows 95 windows 95 widespread porting applications win32 began ease transition windows 95 developers outside inside microsoft complex scheme api thunks used could allow 32-bit code call 16-bit code win16 apis vice versa flat thunks allowed 32-bit code call 16-bit libraries scheme used extensively inside windows 95 libraries avoid porting whole os win32 one batch windows nt os pure 32-bit except parts compatibility 16-bit applications generic thunks available thunk win16 win32 windows 95 platform sdk shipped compiler could produce code needed thunks versions 64-bit windows also able run 32-bit applications via wow64 syswow64 folder located windows folder os drive contains several tools support 32-bit applications almost every new version microsoft windows introduced additions changes windows api name api however remained consistent different windows versions name changes kept limited major architectural platform changes windows microsoft eventually changed name current win32 api family windows api made catch-all term past future api versions wine project provides win32 api compatibility layer unix-like platforms linux kernel api programs written windows api reactos goes step aims implement full windows operating system working closely wine project promote code re-use compatibility doswin32 hx dos extender projects emulate windows api allow executing simple windows programs dos command line odin project emulate win32 os/2 superseding original win-os/2 emulation based microsoft code minor implementations include mewel zinc libraries intended implement subset win16 api dos see list platform-independent gui libraries windows interface source environment wise licensing program microsoft allowed developers recompile run windows-based applications unix macintosh platforms wise sdks based emulator windows api could run platforms efforts toward standardization included sun public windows interface pwi win16 see also sun windows application binary interface wabi willows software application programming interface windows apiw win16 win32 see also willows twin ecma-234 attempted standardize windows api bindingly develop software uses windows api compiler must able use microsoft-specific dlls listed com-objects outside win32 assume certain vtable layout compiler must either handle header files expose interior api function names supply files language c++ zortech later symantec digital mars watcom borland produced well known commercial compilers used often win16 win32s win32 supplied memory extenders allowing win32 programs run win16 microsoft redistributable win32s dll zortech compiler probably one first stable usable c++ compilers windows programming microsoft c++ compiler certain classes applications compiler system also able handle interface description language idl files collectively prerequisites compilers tools libraries headers known microsoft platform sdk time microsoft visual studio borland integrated development system integrated development environments ides could provide although sdk downloadable free separately entire ide suite microsoft windows sdk windows 7 .net framework 4 mingw cygwin projects also provide environment based gnu compiler collection gcc using stand-alone header file set make linking win32-specific dlls simple lcc-win32 c compiler maintained jacob navia freeware non-commercial use pelles c freeware c compiler maintained pelle orinius free pascal free software object pascal compiler supports windows api masm32 package mature project providing support windows api microsoft macro assembler masm using custom made converted headers libraries platform sdk flat assembler fasm allows building windows programs without using external linker even running linux windows specific compiler support also needed structured exception handling seh system serves two purposes provides substrate language-specific exception handling implemented kernel notifies applications exceptional conditions dereferencing invalid pointer stack overflow microsoft/borland c++ compilers ability use system soon introduced windows 95 nt however actual implementation undocumented reverse engineered wine project free compilers seh based pushing exception handler frames onto stack adding linked list stored thread local storage first field thread environment block exception thrown kernel base libraries unwind stack running handlers filters encountered eventually every exception unhandled application dealt default backstop handler pops windows common crash dialog
[ 7149, 7878, 1445, 714, 3266, 6428, 2198, 720, 3955, 1460, 1840, 2568, 2928, 3290, 7907, 4697, 5747, 5401, 4336, 405, 6116, 410, 2589, 2953, 53, 6840, 7573, 1495, 422, 425, 1128, 5786, 1895, 5787, 4377, 5794, 5091, 6504, 447, 1152, 4022,...
Test
4,018
3
Compaq_Deskpro:compaq deskpro compaq deskpro line business-oriented personal computers manufactured compaq discontinued merger hewlett-packard models produced containing microprocessors 8086 x86-based intel pentium 4 original compaq deskpro released 1984 available several disk configurations xt-class pc equipped 8 mhz 8086 cpu compaq unique display hardware combined color graphics adapter graphics high resolution monochrome display adapter text result considerably faster ibm pc much better quality text display compared ibm pc equipped graphics like earlier compaq portable hardware bios 100 compatible ibm pc model 5150 characteristic pc workalikes shared soon establishment ibm standard 1985 compaq released deskpro 286 looks quite similar ibm pc/at 1987 deskpro 386 launched intel released 80386 microprocessor beating ibm 7 months comparable 386 computer thus making name deskpro 386/25 released august 28 1989 cost 7,999 form factor compaq deskpro mostly desktop model lies upon desk monitor placed top compaq produced many tower upright models highly successful sales usually convertible desktop form factor sff small form factor desktop version also produced deskpro lifetime many different models include
[ 7698, 3764, 2278, 900, 5735, 396, 3882, 7467, 5060, 1581, 7759, 1134, 1052, 4736, 5784, 352 ]
Train
4,019
2
Brick_Breaker:brick breaker brick breaker videogame came preloaded blackberry available app store ios brick breaker platformer breakout clone player must smash wall bricks deflecting bouncing ball paddle paddle may move horizontally controlled blackberry trackwheel computer mouse touch finger case touchscreen player gets 3 lives start life lost ball hits bottom screen bricks destroyed player advances new harder level 34 levels many levels unbreakable silver bricks lives lost game many versions brick breaker shoot flaming fireballs play one ball player gets power brick breaker cult following professional players trying achieve high scores game addictiveness highlighted vancouver sun dozens forums support groups yes brick breaker addiction facebook page spouses complaining addicted mates
[ 1544, 6312 ]
Validation
4,020
6
Pwd:pwd unix-like operating systems codice_1 command print working directory writes full pathname current working directory standard output command shell builtin unix shells bourne shell ash bash ksh zsh implemented easily posix c functions codice_2 codice_3 also available operating systems spartados x panos kolibrios equivalent dos codice_4 microsoft windows codice_5 codice_6 command arguments windows powershell provides equivalent codice_7 cmdlet standard aliases codice_8 codice_1 openvms equivalent codice_10 version codice_1 bundled gnu coreutils written jim meyering numerical computing environments matlab gnu octave include codice_1 function similar functionality note posix requires default behavior -l switch provided posix shells set following environment variables using cd command
[ 361, 362, 6789, 4662, 366, 2559, 1837, 7559, 3981, 3984, 2589, 2599, 4358, 5787, 3336, 5789, 1523, 3685, 4387, 4759, 1537, 5117, 5480, 5138, 1572, 4070, 1213, 7667, 4447, 3417, 6242, 3085, 3106, 5571, 923, 5933, 5942, 6648, 5946, 7021, ...
Train
4,021
9
MIRC_scripting_language:mirc scripting language mirc scripting language often unofficially abbreviated msl scripting language embedded mirc irc client windows scripts stored either plain text files usually .mrc file extension ini files however stored extension multiple script files loaded one time although cases one script conflict another cause one longer work properly mirc scripting involves peculiar nomenclature entirely consistent rest programming world notably term identifier—which languages refers name variable function whether returns value —in mirc refers specifically value returning function intended singular access file time issue codice_7 codice_6 open close file access multiple accesses loop instance best handled codice_9 codice_10 codice_11 since opens file cases codice_12 codice_13 even efficient non scripted loop method code remote scripts format placed alias file command names preceded word codice_32 test comments include common codice_33 codice_34 example hello world alias remote script automatically respond certain text
[ 6507, 4759, 4302, 5571, 4425, 3722, 1674, 2142, 5162, 1691, 8137, 3915, 1989 ]
Test
4,022
2
Windows_Filtering_Platform:windows filtering platform microsoft computer-systems windows filtering platform wfp comprises set system services application programming interface first introduced windows vista 2006/2007 allows applications tie packet processing filtering pipeline next generation tcp/ip network stack provides features integrated communication administrators configure invoke processing logic per-application basis microsoft intended wfp use firewalls packet-processing connection-monitoring components antivirus antimalware software parental controls additionally wfp used implement nat store ipsec policy configuration filtering platform includes following components since windows 8 windows server 2012 wfp allows filtering second layer tcp/ip windows 7 functionality added netsh command allows rich diagnostics internal state wfp functionality useful debug root-cause issues packet drops ms kb 979223 documents serious memory leak affecting vista windows 7 issues deployments wfp include ms hotfix rollup 981889 windows 7 sp1 vista sp3 comes newer require fixes note problems persist regarding use multiple network buffer lists
[ 7149, 6420, 714, 720, 1460, 2928, 7907, 5747, 2953, 6840, 422, 4017, 6504, 4026, 7607, 1526, 3687, 2283, 5479, 7263, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 3775, 4129, 8073, 2018, 6989, 8085, 6991, 8094, 4...
Test
4,023
3
ASCII_Corporation:ascii corporation ascii founded 1977 kazuhiko nishi keiichiro tsukamoto originally publisher magazine name ascii talks bill gates nishi led creation microsoft first overseas sales office ascii microsoft 1979 nishi also known role marketing msx 1983 8-bit standard computer well known former ussr japan 1984 ascii engaged semiconductor business followed expansion commercial online service 1985 brand ascii-net popularity home video game systems soared 1980s ascii became active development publishing software peripherals popular consoles family computer mega drive microsoft public stock offering 1986 ascii microsoft dissolved around time company also obliged reform result aggressive diversification first half 1980s company went public 1989 ascii revenue fiscal year ending march 1996 56 billion yen broken sectors publication 52.5 27.0 billion yen game entertainment 27.8 14.3 billion yen systems semiconductors 10.8 6 billion yen others despite struggles remain focused core businesses company continued suffer accumulated debts arrangement set csk corporation execute major investment ascii 1997 mid-90s ascii acquired company something good renamed ascii something good developed 3 sega saturn games ai shougi 1995 ai igo 1997 ai shougi 2 1998 ascii become popular software market branched created american satellite 1991 known ascii entertainment focus supporting interactive entertainment channel america startup company agetec ascii game entertainment technology spun independent corporation 1998 later became fully independent publisher one year later co-founder tsukamoto left ascii create company 1992 named impress november 26 2001 csk corporation unison capital partners l.p. announced approval transferring control subsidiary ascii unison capital partners l.p. effective 2002-03-30 part strategy focus csk group operations b2b businesses transfer approved december 21 2001 part deal ascii outstanding debt owed csk forgiven unison control ascii enterbrain publishing divisions would maintain autonomy ascii restructured concentrate pc publishing businesses may 28 2002 unison media partners announced ascii would become fully owned subsidiary via share exchange ascii would delisted effective october 1 2002 november 18 2002 astroarts subsidiary renamed ascii ascii renamed medialeaves former astroarts subsidiary would inherit publishing business former ascii january 29 2004 unison capital partners l.p. announced sale ascii parent company medialeaves kadokawa group holdings completed 2004-03 september 27 2007 kadokawa group holdings announced merger subsidiaries mediaworks ascii name ascii media works effective april 1 2008 merger approved 2008 january 10 2010 formerly named ascii company medialeaves merged enterbrain dissolving last ascii entity
[ 1442, 6010, 1472, 126, 3796, 6377, 3308, 4260, 4809, 3730, 3049, 423, 6939, 339, 1507 ]
Test
4,024
8
Archi_(tool):archi tool archi free open-source visual-modelling design tool creating archimate models modelling sketches archi initially funded 2010 2012 jisc part national project aimed supporting programme enterprise architecture uk higher education sector original project hosted institute educational cybernetics bolton university uk since january 2013 archi continued maintained volunteer basis creator phil beauvoir jean-baptiste sarrodie archi supports archimate 3.0 modelling language technical standard open group archi provides open source reference implementation archimate currently used one tools implement open group archimate model exchange file format plugins available github
[]
Test
4,025
4
Flame_(malware):flame malware flame also known flamer skywiper skywiper modular computer malware discovered 2012 attacks computers running microsoft windows operating system program used targeted cyber espionage middle eastern countries discovery announced 28 may 2012 maher center iranian national computer emergency response team cert kaspersky lab crysys lab budapest university technology economics last stated report flame certainly sophisticated malware encountered practice arguably complex malware ever found flame spread systems local network lan record audio screenshots keyboard activity network traffic program also records skype conversations turn infected computers bluetooth beacons attempt download contact information nearby bluetooth-enabled devices data along locally stored documents sent one several command control servers scattered around world program awaits instructions servers according estimates kaspersky may 2012 flame initially infected approximately 1,000 machines victims including governmental organizations educational institutions private individuals time 65 infections happened iran israel palestine sudan syria lebanon saudi arabia egypt huge majority targets within iran flame also reported europe north america flame supports kill command wipes traces malware computer initial infections flame stopped operating public exposure kill command sent flame linked equation group kaspersky lab however costin raiu director kaspersky lab global research analysis team believes group cooperates creators flame stuxnet position superiority equation group definitely masters giving others maybe bread crumbs time time giving goodies integrate stuxnet flame flame a.k.a da flame identified may 2012 maher center iranian national cert kaspersky lab crysys lab laboratory cryptography system security budapest university technology economics kaspersky lab asked united nations international telecommunication union investigate reports virus affecting iranian oil ministry computers kaspersky lab investigated discovered md5 hash filename appeared customer machines middle eastern nations discovering pieces researchers dubbed program flame one main modules inside toolkit nowiki /nowiki frog.defaultattacks.a-installflame nowiki /nowiki according kaspersky flame operating wild since least february 2010 crysys lab reported file name main component observed early december 2007 however creation date could determined directly creation dates malware modules falsely set dates early 1994 computer experts consider cause attack april 2012 caused iranian officials disconnect oil terminals internet time iranian students news agency referred malware caused attack wiper name given malware creator however kaspersky lab believes flame may separate infection entirely wiper malware due size complexity program—described twenty times complicated stuxnet—the lab stated full analysis could require long ten years 28 may iran cert announced developed detection program removal tool flame distributing select organizations several weeks flame exposure news media symantec reported 8 june flame command control c c computers sent suicide command infected pcs remove traces flame according estimates kaspersky may 2012 initially flame infected approximately 1,000 machines victims including governmental organizations educational institutions private individuals time countries affected iran israel palestinian territories sudan syria lebanon saudi arabia egypt flame uncharacteristically large program malware 20 megabytes written partly lua scripting language compiled c++ code linked allows attack modules loaded initial infection malware uses five different encryption methods sqlite database store structured information method used inject code various processes stealthy malware modules appear listing modules loaded process malware memory pages protected read write execute permissions make inaccessible user-mode applications internal code similarities malware exploits two security vulnerabilities used previously stuxnet infect systems malware determines antivirus software installed customises behaviour example changing filename extensions uses reduce probability detection software additional indicators compromise include mutex registry activity installation fake audio driver malware uses maintain persistence compromised system flame designed deactivate automatically supports kill function makes eliminate traces files operation system receipt module controllers flame signed fraudulent certificate purportedly microsoft enforced licensing intermediate pca certificate authority malware authors identified microsoft terminal server licensing service certificate inadvertently enabled code signing still used weak md5 hashing algorithm produced counterfeit copy certificate used sign components malware make appear originated microsoft successful collision attack certificate previously demonstrated 2008 flame implemented new variation chosen-prefix collision attack like previously known cyber weapons stuxnet duqu employed targeted manner evade current security software rootkit functionality system infected flame spread systems local network via usb stick record audio screenshots keyboard activity network traffic program also records skype conversations turn infected computers bluetooth beacons attempt download contact information nearby bluetooth enabled devices data along locally stored documents sent one several command control servers scattered around world program awaits instructions servers unlike stuxnet designed sabotage industrial process flame appears written purely espionage appear target particular industry rather complete attack toolkit designed general cyber-espionage purposes using technique known sinkholing kaspersky demonstrated huge majority targets within iran attackers particularly seeking autocad drawings pdfs text files computing experts said program appeared gathering technical diagrams intelligence purposes network 80 servers across asia europe north america used access infected machines remotely 19 june 2012 washington post published article claiming flame jointly developed u.s. national security agency cia israel ’ military least five years prior project said part classified effort code-named olympic games intended collect intelligence preparation cyber-sabotage campaign aimed slowing iranian nuclear efforts according kaspersky chief malware expert geography targets also complexity threat leaves doubt nation-state sponsored research went kaspersky initially said malware bears resemblance stuxnet although may parallel project commissioned attackers analysing code kaspersky later said strong relationship flame stuxnet early version stuxnet contained code propagate via usb drives nearly identical flame module exploits zero-day vulnerability iran cert described malware encryption special pattern see coming israel daily telegraph reported due flame apparent targets—which included iran syria west bank—israel became many commentators prime suspect commentators named china u.s. possible perpetrators richard silverstein commentator critical israeli policies claimed confirmed senior israeli source malware created israeli computer experts jerusalem post wrote israel vice prime minister moshe ya'alon appeared hinted government responsible israeli spokesperson later denied implied unnamed israeli security officials suggested infected machines found israel may imply virus could traced u.s. western nations u.s. officially denied responsibility leaked nsa document mentions dealing iran discovery flame nsa gchq jointly-worked event
[ 704, 2173, 3932, 363, 7151, 6795, 6419, 2912, 376, 3277, 2923, 2577, 5401, 6823, 2587, 3323, 5779, 74, 7600, 3680, 5452, 6508, 1528, 6515, 4759, 2991, 104, 1173, 6526, 113, 3698, 3368, 6904, 6541, 6194, 2678, 3038, 4440, 3047, 6569, 269...
Test
4,026
2
MSXML:msxml microsoft xml core services msxml legacy set services allowed applications written jscript vbscript microsoft development tools build windows-native xml-based applications supports xml 1.0 dom sax xslt 1.0 processor xml schema support including xsd xdr well xml-related technologies msxml products similar exposed programmatically ole automation subset com components developers program msxml components c c++ active scripting languages jscript vbscript managed .net interop msxml com components supported recommended com components msxml object programmatically instantiated clsid progid version msxml exposes set clsid progids example create msxml 6.0 domdocument object exposes codice_1 codice_2 codice_3 com interfaces progid msxml2.domdocument.6.0 must used msxml also supports version-independent progids version-independent progids version number associated example microsoft.xmlhttp progids first introduced msxml 1.0 however currently mapped msxml 3.0 objects msxml3.dll different versions msxml support slightly different sets functionality example msxml 3.0 supports xdr schemas support xsd schemas msxml 4.0 msxml 5.0 msxml 6.0 support xsd schemas however msxml 6.0 support xdr schemas support xml digital signatures provided msxml 5.0 new xml-related software development microsoft recommends using msxml 6.0 lightweight cousin xmllite native code-only projects msxml collection distinct products released supported microsoft product versions enumerated follows information version also available microsoft downloads website
[ 7149, 6420, 714, 720, 5378, 1460, 7176, 2928, 7907, 5747, 2953, 6840, 422, 6495, 4017, 6504, 4022, 2625, 7607, 1526, 3687, 2283, 5479, 7263, 5850, 150, 6933, 1970, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 555, 7715, 4129, 59...
Test
4,027
4
Spider.io:spider.io spider.io company london specializes detection malware botnets generate web traffic used online advertising fraud company founded 2010 founder douglas de jager software used company includes storm shelf open source software handle large amounts data using solutions like hadoop later also mahout spider.io start writing software online advertising fraud detection later point choice shelf open source software looked sensible 2012 spider.io pointed vulnerability internet explorer mouse cursor position pc victim could tracked attacker claimed vulnerability exploited large scale example botnet detected analyzed spider.io 2013 chameleon botnet spider.io also raises awareness general easy generate fake web traffic sharing information techniques used 2014 spider.io acquired google inc.. time company seven employees google inc. important advertising fraud eliminated internet one reasons much income company comes online advertisements besides acquisition spider.io also employs many people combat fraud ways
[ 3232 ]
Test
4,028
8
Enterprise_Architect_(software):enterprise architect software sparx systems enterprise architect visual modeling design tool based omg uml platform supports design construction software systems modeling business processes modeling industry based domains used businesses organizations model architecture systems process implementation models across full application development life-cycle systems modeling using uml provides basis modeling aspects organizational architecture along ability provide foundation designing implementing new systems changing existing systems aspects covered type modeling range laying organizational systems architectures business process reengineering business analysis service-oriented architectures web modeling application database design re-engineering development embedded systems along system modeling enterprise architect covers core aspects application development life-cycle requirements management design construction testing maintenance phases support traceability project management change control processes well facilities model driven development application code using internal integrated-development platform user base ranges programmers business analysts enterprise architects organizations ranging small developer companies multi-national corporations government organizations international industry standards bodies sparx systems initially released enterprise architect 2000 originally designed uml modeling tool modeling uml 1.1 product evolved include omg uml specifications 1.3 2.0 2.1 2.3 2.4.1 2.5 enterprise architect supports range open industry standards designing modeling software business systems uml 2.5 sysml 1.5 bpmn 2.0 dmn bpel soaml spem wsdl xsd dds archimate 3.0 arcgis ifml cmmn geography markup language gml odm owl rdf enterprise integration patterns eip enterprise architect also supports industry frameworks zachman framework togaf including feaf uaf updm framework supports dodaf modaf naf service-oriented modeling framework somf supportd frameworks supplied industry bodies trak geosciml niem supports core service-oriented architectures soaml service-oriented modeling framework somf enterprise-level architecture along round trip engineering wsdl xsd used facilitate bpel generation models published industry standards development bodies using enterprise architect include underlying uml modeling key aspects modeling tools support core aspects supported enterprise architect include profiles patterns mof ocl mda transforms corba idl uml validation run model common features requirements management supported enterprise architect include customization requirements documented linking requirements design implementation details providing requirement traceability design construction phases requirements subject change management workflow processing baseline comparison auditing enterprise architect supports number methods modeling business processes using uml foundation modeling language core languages business modeling analysis include bpmn bpel along various historic profiles enterprise architect also supports definition business rules ability generate executable code rules business modeling combined gap analysis view potential gaps proposed solutions model simulation supported behavioral diagrams state machines interaction sequence diagrams activities execution flow defined using triggers guards effects simulation supports re-runs alteration triggered events supports viewing variables call stack setting debug markers also support interaction emulated user-interface screens containing common ui fields bpmn diagrams using bpsim bpmn models simulated creating tabulated results analysis. monte carlo probability based simulations sysml parametric simulation using open modelica mathematical formulas sysml blocks parametric blocks simulated plotting graphs used analysis dmn simulation simulation supports interaction dmn models bpmn models using bpsim line model driven design principles enterprise architect supports mda transforms pim class structures psm class structures round-trip engineering code 10 software languages several key embedded hdl systems languages ada vhdl verilog also supports code generation behavioral models languages supported include actionscript c c c++ delphi java including java 1.5 aspects generics php python july 2019 enterprise architect capability reverse engineer object oriented python code parse _init_ method visual basic visual basic .net accordance model driven development principles enterprise architect provides integrated development environment supports code editing syntax highlighting intellisense building debugging code testing within model compilers interpreters supported microsoft windows native c c++ visual basic.net family c j vb sun microsystems java php gnu compilers c++ c ada gcc gdb .add-ins available integration ms visual studio eclipse wireframe modeling supports using templates modeling appearance dialogs presented users interacting application supported device dialogs include screen dialogs webpages android apple windows 8.1 phones tablets code based testing support xunit testing involves mda transformation classes nunit junit classes ability generate unit tests model automatically record results tested classes testpoint testing model based code testing parallel test contracts defined ‘ design contract ’ runs using debug definitions methods support test definitions test results logged related classes model integrated building debugging code enterprise architect allows developer perform abstract analysis software using profiling sequence diagram generation sequence diagram generation provides means analyze general process flow iron inconsistencies profiling summarizes thread routine code general efficiency system engineering supported sysml 1.4 modeling coupled executable code generation sysml supports modeling requirement definition system composition using sysml blocks parts parametric model simulation executable code generation supports embedded hdl system languages ada vhdl verilog coupled behavioral code generation standard code languages defined enterprise architect supports data modeling conceptual physical levels forward reverse engineering database schemas mda transformation logical platform independent physical dbms platform dependant diagram types supported include ddl notation erd notation idef1x notation information engineering notation supported dbmss include db2 firebird/interbase ms access 97 2000 2003 2007 2013 ms sql server editions 2005 including express azure mysql mariadb sqlite oracle 9i editions postgresql arcgis informix ingres sybase adaptive server anywhere sybase asa sybase adaptive server enterprise sybase ase features supporting project management include resource allocation tracking using gantt charts kanban diagrams event logging using model calendars workflow scripting setting workflow processes security model metrics key facilities supporting change management auditing baseline difference merge version control version control interface supports major version control applications subversion cvs team foundation server scc interface scc compatible version control system features support integration tools include xmi import/export supports xmi 1.1 1.2 2.1 specifications import .emx rhapsody files open services lifecycle collaboration oslc csv import/export archimate open exchange format import export version 13 automation interface – supports comprehensive api use com based language java among add-ins available interfaces vs .net eclipse microsoft office doors along third party add-ins interfacing likes jira
[ 1155, 7715, 3863, 304, 6538, 5571, 2659, 3463, 578, 4798, 6029, 1760, 5956, 1128, 7213, 5965, 6056, 7777, 1435 ]
Validation
4,029
4
Bvckup_2:bvckup 2 bvckup 2 unidirectional file synchronization app windows nt family developed swiss-based pipemetrics sa replicates files one location another original format uses delta copying speed operation program supports scheduling removable device tracking using shadow copy service transfer open locked files move renaming detection security attribute cloning email alerts however support compression encryption
[ 1254, 2566, 5571, 6256 ]
Test
4,030
2
John_Quarterman:john quarterman john s. quarterman born april 27 1954 american author long time internet participant wrote one classic books networking prior commercialization internet also written risk management quarterman grew bemiss community near valdosta georgia usa first used arpanet 1974 attending harvard worked unix arpanet software bbn original prime contractor arpanet 1977 1981 twice elected board directors usenix association professional association related unix operating system board instrumental vote 1987 approve first funding received uunet along psinet became one first two commercial internet service providers isps co-founded first internet consulting firm texas tic 1986 co-founded one first isps austin zilker internet park since sold jump point founder tispa texas isp association founder chief technology officer matrix netsystems inc. established matrix information directory services mids 1990 quarterman published first maps whole internet conducted first internet demographic survey started first continuing series performance data entire internet 1993 web since 1995 internet weather report also visible internet average plus comparisons isps visible isp ratings inter ctive week listed john quarterman one 25 unsung heroes internet 1998 saying ... president mids quarterman 43 net demographics gallup organization opinion polls internet world interviewed quarterman length full page picture june 1996 issue surveyors cyberspace september 21 2006 quarterman served panelist hank hultquist michele chaboudy joint meeting ieee central texas section communications signal processing chapters titled network neutrality altruism capitalism st. edward university austin texas also organized november 2 2006 panel net neutrality eff-austin featuring quarterman hank hultquist michael hathaway austin bay
[ 5275, 6046, 5591, 6583, 8186, 6017, 6367, 2512 ]
Test
4,031
7
Space-based_architecture:space-based architecture space-based architecture sba software architecture pattern achieving linear scalability stateful high-performance applications using tuple space paradigm follows many principles representational state transfer rest service-oriented architecture soa event-driven architecture eda well elements grid computing space-based architecture applications built set self-sufficient units known processing-units pu units independent application scale adding units sba model closely related patterns proved successful addressing application scalability challenge shared nothing architecture sn used google amazon.com well-known companies model also applied many firms securities industry implementing scalable electronic securities trading applications application built principles space-based architecture typically following components articles/papers technical
[ 5666, 7958, 4159, 5014, 6415, 231, 235, 3396, 2827, 6817, 5447, 1407 ]
Validation
4,032
4
Richard_Proto:richard proto richard proto noted american cryptographer former director research advanced technology united states national security agency elected nsa hall honor 2013 proto born fair section new connecticut graduated wilbur cross high school 1958 member 1958 team new england high school basketball championship boston garden proto received bachelor degree mathematics fairfield university 1962 master degree mathematics boston college 1964 proto joined united states national security agency nsa 1964 cryptologic mathematician communications security research development organization dedicated next thirty-five years nsa served key roles research organization operational side information security worked security component design security system architectures vulnerability finding risk management proto eventually served nsa director research advanced technology 1994 1999 proto credited creating nsa applied mathematics program train mathematicians apply knowledge range problems beyond traditional cryptologic mission also created laboratory telecommunications sciences focus resources mastering network technology proto authored 28 technical papers nsa responsible invention several information security devices two patented name career proto received presidential rank award distinguished service national intelligence distinguished service medal 2009 proto recognized nsa naming richard c. proto symposium center within nsa compound fort george g. meade maryland second time nsa formally named one facilities 2013 proto elected nsa hall honor 2013 distinguished service american cryptology
[]
Train
4,033
9
Simulation_language:simulation language computer simulation language used describe operation simulation computer two major types simulation continuous discrete event though modern languages handle complex combinations languages also graphical interface least simple statistic gathering capability analysis results important part discrete-event languages ability generate pseudo-random numbers variants different probability distributions
[ 1569, 1908, 7382, 3893, 5020, 897, 3502 ]
Test
4,034
4
Fireball_(software):fireball software fireball browser hijacking malware discovered security company check point takes target browsers turns zombies check point claims discovered fireball malware 2017 microsoft claims tracking malware since 2015 malware tracked chinese company called rafotech digital marketing agency based beijing bundling legitimate software provide users programs rafotech bundled fireball software deal wifi mustang browser sosodesk fvp image viewer rafotech claims 300 million users similar estimated number infections worldwide denies uses fake search engines security researchers dispute claim noting rafotech may also purchased additional distribution means threat actors fake search engines popular 14 ranked among top 10,000 websites reaching top 1,000 malware ability running code victim computers downloading arbitrary file hijacking manipulating infected user web traffic order generate advertisement revenue installs plugins additional configurations boost advertisements potential turn distributor additional malware malware spread mostly via bundling installed victim machine alongside wanted program often without user ’ consent digital marketing agency rafotech indicated producer software company accused host fake search engines redirect queries yahoo.com google.com fake search engines include tracking pixels used collect private information users fireball manipulates infected browsers turn default search engines home pages mentioned fake search engines enable software spy users infected browsers fireball malware conform usual characteristics bundled software check point asserts “ malware fake search engines ’ carry indicators connecting rafotech uninstalled ordinary user conceal true nature. ” furthermore fireball “ displays great sophistication quality evasion techniques including anti-detection capabilities multilayer structure flexible c c. ” another deception use legitimate-seeming digital certificates rafotech ’ fake search engines malware ’ carry identifying marks program capability run arbitrary code download applications harvest sensitive information banking medical details cyber criminals could leverage source code create new types malware estimated 250 million computers infected worldwide check point researches also claim malware might infected computers 20 corporate networks making high volume internet threat according source highest infection rates discovered indonesia india brazil speculated related browser hijackers operations form possibly largest infection operation history table 1 top countries infected fireball malware dispute numbers according microsoft tracking malware since 2015 results based fireball infections cleaned windows defender malicious software removal tool based collected data total infections 40 million check point researchers used number visits malware-carrying search pages device check ’ infected first open web browser 1 verify home-pages set 2 modify home-page 3 check default search engine verify modify 4 check browser extensions installed 1 use adware removal tool 2 remove unknown add-ons browser 3 restore browsers default settings
[ 6043 ]
Test
4,035
4
DriveSavers:drivesavers drivesavers inc. computer hardware data recovery digital forensics electronic discovery firm located novato california founded ceo jay hagan former company president scott gaidano 1985 1985 former jasmine technologies executives jay hagan scott gaidano founded drivesavers operating gaidano ’ condo 1,400 drivesavers originally offered hard drive repair data recovery services company dropped drive repair services within first eight months 1992 drivesavers signed agreement supermac technology assume technical support warranty obligations supermac mass storage products company merged data recovery disk repair 1994 retained drivesavers name 2008 drivesavers invested two million dollars build series five iso-certified cleanrooms disassemble rebuild damaged hard drives 2004-2009 company grew 35 85 employees drivesavers also works secretive branches government celebrities order provide comfort assistance clients upset stressed data loss situation drivesavers staff individual data crisis counselor counselor experience working suicide hotline drivesavers recovery firm licensed every major hard-drive manufacturer work drive void warranty recover data hard disk drives solid state drives smart phones servers digital camera media ios devices drivesavers certified hipaa-compliant undergoes annual reviews encryption training certificates guardianedge pgp pointsec utimaco diamond certified 2013–18 storage visions visionary company award 2014 flash memory summit innovative flash memory consumer application award 2018
[ 5773, 740 ]
Test
4,036
4
Federal_Information_Security_Management_Act_of_2002:federal information security management act 2002 federal information security modernization act 2002 fisma et seq united states federal law enacted 2002 title iii e-government act 2002 act recognized importance information security economic national security interests united states act requires federal agency develop document implement agency-wide program provide information security information information systems support operations assets agency including provided managed another agency contractor source fisma brought attention within federal government cybersecurity explicitly emphasized risk-based policy cost-effective security fisma requires agency program officials chief information officers inspectors general igs conduct annual reviews agency information security program report results office management budget omb omb uses data assist oversight responsibilities prepare annual report congress agency compliance act fy 2008 federal agencies spent 6.2 billion securing government total information technology investment approximately 68 billion 9.2 percent total information technology portfolio law replaced federal information security modernization act 2014 sometimes known fisma2014 fisma reform fisma2014 struck subchapters ii iii chapter 35 title 44 united states code amending text new law new subchapter ii fisma assigns specific responsibilities federal agencies national institute standards technology nist office management budget omb order strengthen information security systems particular fisma requires head agency implement policies procedures cost-effectively reduce information technology security risks acceptable level according fisma term information security means protecting information information systems unauthorized access use disclosure disruption modification destruction order provide integrity confidentiality availability accordance fisma nist responsible developing standards guidelines associated methods techniques providing adequate information security agency operations assets excluding national security systems nist works closely federal agencies improve understanding implementation fisma protect information information systems publishes standards guidelines provide foundation strong information security programs agencies nist performs statutory responsibilities computer security division information technology laboratory nist develops standards metrics tests validation programs promote measure validate security information systems services nist hosts following fisma defines framework managing information security must followed information systems used operated u.s. federal government agency executive legislative branches contractor organization behalf federal agency branches framework defined standards guidelines developed nist fisma requires agencies information systems inventory place according fisma head agency shall develop maintain inventory major information systems including major national security systems operated control agency identification information systems inventory subsection shall include identification interfaces system systems networks including operated control agency first step determine constitutes information system question direct mapping computers information system rather information system may collection individual computers put common purpose managed system owner nist sp 800-18 revision 1 guide developing security plans federal information systems provides guidance determining system boundaries information information systems categorized based objectives providing appropriate levels information security according range risk levels first mandatory security standard required fisma legislation fips 199 standards security categorization federal information information systems provides definitions security categories guidelines provided nist sp 800-60 guide mapping types information information systems security categories overall fips 199 system categorization high water mark impact rating criteria information types resident system example one information type system rating low confidentiality integrity availability another type rating low confidentiality availability rating moderate integrity impact level integrity also becomes moderate federal information systems must meet minimum security requirements requirements defined second mandatory security standard required fisma legislation fips 200 minimum security requirements federal information information systems organizations must meet minimum security requirements selecting appropriate security controls assurance requirements described nist special publication 800-53 recommended security controls federal information systems process selecting appropriate security controls assurance requirements organizational information systems achieve adequate security multifaceted risk-based activity involving management operational personnel within organization agencies flexibility applying baseline security controls accordance tailoring guidance provided special publication 800-53 allows agencies adjust security controls closely fit mission requirements operational environments controls selected planned must documented system security plan combination fips 200 nist special publication 800-53 requires foundational level security federal information information systems agency risk assessment validates security control set determines additional controls needed protect agency operations including mission functions image reputation agency assets individuals organizations nation resulting set security controls establishes level security due diligence federal agency contractors risk assessment starts identifying potential threats vulnerabilities mapping implemented controls individual vulnerabilities one determines risk calculating likelihood impact given vulnerability could exploited taking account existing controls culmination risk assessment shows calculated risk vulnerabilities describes whether risk accepted mitigated mitigated implementation control one needs describe additional security controls added system nist also initiated information security automation program isap security content automation protocol scap support complement approach achieving consistent cost-effective security control assessments agencies develop policy system security planning process nist sp-800-18 introduces concept system security plan system security plans living documents require periodic review modification plans action milestones implementing security controls procedures place outlining reviews plans keeps plan current follows planned security controls system security plan major input security certification accreditation process system security certification accreditation process system security plan analyzed updated accepted certification agent confirms security controls described system security plan consistent fips 199 security category determined information system threat vulnerability identification initial risk determination identified documented system security plan risk assessment equivalent document system documentation risk assessment completed system controls must reviewed certified functioning appropriately based results review information system accredited certification accreditation process defined nist sp 800-37 guide security certification accreditation federal information systems security accreditation official management decision given senior agency official authorize operation information system explicitly accept risk agency operations agency assets individuals based implementation agreed-upon set security controls required omb circular a-130 appendix iii security accreditation provides form quality control challenges managers technical staffs levels implement effective security controls possible information system given mission requirements technical constraints operational constraints cost/schedule constraints accrediting information system agency official accepts responsibility security system fully accountable adverse impacts agency breach security occurs thus responsibility accountability core principles characterize security accreditation essential agency officials complete accurate trustworthy information possible security status information systems order make timely credible risk-based decisions whether authorize operation systems information supporting evidence needed security accreditation developed detailed security review information system typically referred security certification security certification comprehensive assessment management operational technical security controls information system made support security accreditation determine extent controls implemented correctly operating intended producing desired outcome respect meeting security requirements system results security certification used reassess risks update system security plan thus providing factual basis authorizing official render security accreditation decision accredited systems required monitor selected set security controls system documentation updated reflect changes modifications system large changes security profile system trigger updated risk assessment controls significantly modified may need re-certified continuous monitoring activities include configuration management control information system components security impact analyses changes system ongoing assessment security controls status reporting organization establishes selection criteria subsequently selects subset security controls employed within information system assessment organization also establishes schedule control monitoring ensure adequate coverage achieved security experts bruce brody former federal chief information security officer alan paller director research sans institute described fisma well-intentioned fundamentally flawed tool arguing compliance reporting methodology mandated fisma measures security planning rather measuring information security past gao chief technology officer keith rhodes said fisma helped government system security implementation everything security people view fisma checklist nothing going get done
[ 3932, 6251, 5568, 2656, 5131, 6189, 2666, 404, 7558, 4350, 6756, 3400, 2513, 429, 4449, 5255, 1805 ]
Test
4,037
0
SemEval:semeval semeval semantic evaluation ongoing series evaluations computational semantic analysis systems evolved senseval word sense evaluation series evaluations intended explore nature meaning language meaning intuitive humans transferring intuitions computational analysis proved elusive series evaluations providing mechanism characterize precise terms exactly necessary compute meaning evaluations provide emergent mechanism identify problems solutions computations meaning exercises evolved articulate dimensions involved use language began apparently simple attempts identify word senses computationally evolved investigate interrelationships among elements sentence e.g. semantic role labeling relations sentences e.g. coreference nature saying semantic relations sentiment analysis purpose semeval senseval exercises evaluate semantic analysis systems semantic analysis refers formal analysis meaning computational refer approaches principle support effective implementation first three evaluations senseval-1 senseval-3 focused word sense disambiguation time growing number languages offered tasks number participating teams beginning fourth workshop semeval-2007 semeval-1 nature tasks evolved include semantic analysis tasks outside word sense disambiguation triggered conception *sem conference semeval community decided hold evaluation workshops yearly association *sem conference also decision every evaluation task run every year e.g none wsd tasks included semeval-2012 workshop earliest days assessing quality word sense disambiguation wsd algorithms primarily matter intrinsic evaluation “ almost attempts made evaluate embedded wsd components ” recently extrinsic evaluations begun provide evidence value wsd end-user applications 1990 discussions sense disambiguation task focused mainly illustrative examples rather comprehensive evaluation early 1990s saw beginnings systematic rigorous intrinsic evaluations including formal experimentation small sets ambiguous words april 1997 martha palmer marc light organized workshop entitled tagging lexical semantics conjunction conference applied natural language processing time clear recognition manually annotated corpora revolutionized areas nlp part-of-speech tagging parsing corpus-driven approaches potential revolutionize automatic semantic analysis well kilgarriff recalled “ high degree consensus field needed evaluation ” several practical proposals resnik yarowsky kicked discussion led creation senseval evaluation exercises semeval-2010 many participants feel 3-year cycle long wait many shared tasks conference natural language learning conll recognizing textual entailments rte run annually reason semeval coordinators gave opportunity task organizers choose 2-year 3-year cycle semeval community favored 3-year cycle br although votes within semeval community favored 3-year cycle organizers coordinators settled split semeval task 2 evaluation workshops triggered introduction new *sem conference semeval organizers thought would appropriate associate event *sem conference collocate semeval workshop *sem conference organizers got positive responses task coordinators/organizers participants association yearly *sem 8 tasks willing switch 2012 thus born semeval-2012 semeval-2013 current plan switch yearly semeval schedule associate *sem conference every task needs run every year framework semeval/senseval evaluation workshops emulates message understanding conferences mucs evaluation workshops ran arpa advanced research projects agency renamed defense advanced research projects agency darpa stages semeval/senseval evaluation workshops senseval-1 senseval-2 focused evaluation wsd systems major languages available corpus computerized dictionary senseval-3 looked beyond lexemes started evaluate systems looked wider areas semantics semantic roles technically known theta roles formal semantics logic form transformation commonly semantics phrases clauses sentences represented first-order logic forms senseval-3 explored performances semantics analysis machine translation types different computational semantic systems grew beyond coverage wsd senseval evolved semeval aspects computational semantic systems evaluated semeval exercises provide mechanism examining issues semantic analysis texts topics interest fall short logical rigor found formal computational semantics attempting identify characterize kinds issues relevant human understanding language primary goal replicate human processing means computer systems tasks shown developed individuals groups deal identifiable issues take concrete form first major area semantic analysis identification intended meaning word level taken include idiomatic expressions word-sense disambiguation concept evolving away notion words discrete senses rather characterized ways used i.e. contexts tasks area include lexical sample all-word disambiguation multi- cross-lingual disambiguation lexical substitution given difficulties identifying word senses tasks relevant topic include word-sense induction subcategorization acquisition evaluation lexical resources second major area semantic analysis understanding different sentence textual elements fit together tasks area include semantic role labeling semantic relation analysis coreference resolution tasks area look specialized issues semantic analysis temporal information processing metonymy resolution sentiment analysis tasks area many potential applications information extraction question answering document summarization machine translation construction thesauri semantic networks language modeling paraphrasing recognizing textual entailment potential applications contribution types semantic analysis constitutes outstanding research issue example word sense induction disambiguation task three separate phases unsupervised evaluation wsi considered two types evaluation v measure rosenberg hirschberg 2007 paired f-score artiles et al. 2009 evaluation follows supervised evaluation semeval-2007 wsi task agirre soroa 2007 tables reflects workshop growth senseval semeval gives overview area computational semantics evaluated throughout senseval/semeval workshops multilingual wsd task introduced semeval-2013 workshop task aimed evaluating word sense disambiguation systems multilingual scenario using babelnet sense inventory unlike similar task like crosslingual wsd multilingual lexical substitution task fixed sense inventory specified multilingual wsd uses babelnet sense inventory prior development babelnet bilingual lexical sample wsd evaluation task carried semeval-2007 chinese-english bitexts cross-lingual wsd task introduced semeval-2007 evaluation workshop re-proposed semeval-2013 workshop facilitate ease integrating wsd systems natural language processing nlp applications machine translation multilingual information retrieval cross-lingual wsd evaluation task introduced language-independent knowledge-lean approach wsd task unsupervised word sense disambiguation task english nouns means parallel corpora follows lexical-sample variant classic wsd task restricted 20 polysemous nouns worth noting semeval-2014 two tasks multilingual/crosslingual i.e l2 writing assistant task crosslingual wsd task includes english spanish german french dutch ii multilingual semantic textual similarity task evaluates systems english spanish texts major tasks semantic evaluation include following areas natural language processing list expected grow field progresses following table shows areas studies involved senseval-1 semeval-2014 refers senseval se refers semeval e.g s1 refers senseval-1 se07 refers semeval2007 semeval tasks created many types semantic annotations type various schema semeval-2015 organizers decided group tasks together several tracks tracks type semantic annotations task hope achieve lists type semantic annotations involved semeval workshops task track allocation flexible task might develop track e.g taxonomy evaluation task semeval-2015 learning semantic relations track semeval-2016 dedicated track semantic taxonomy new semantic taxonomy enrichment task
[ 6166, 282, 2558, 205, 5388, 1555, 5304, 837, 1209, 3651, 6925, 4724, 5429, 6767, 5008 ]
Test
4,038
8
WS-Transaction:ws-transaction ws-transaction web services specification developed bea systems ibm microsoft ws-transaction specification describes coordination types used extensible coordination framework described ws-coordination specification defines two coordination types atomic transaction individual operations business activity ba long running transactions developers use either coordination types building applications require consistent agreement outcome distributed activities
[ 6986, 4043, 5500 ]
Test
4,039
9
First-class_function:first-class function computer science programming language said first-class functions treats functions first-class citizens means language supports passing functions arguments functions returning values functions assigning variables storing data structures programming language theorists require support anonymous functions function literals well languages first-class functions names functions special status treated like ordinary variables function type term coined christopher strachey context functions first-class citizens mid-1960s first-class functions necessity functional programming style use higher-order functions standard practice simple example higher-ordered function map function takes arguments function list returns list formed applying function member list language support map must support passing function argument certain implementation difficulties passing functions arguments returning results especially presence non-local variables introduced nested anonymous functions historically termed funarg problems name coming function argument early imperative languages problems avoided either supporting functions result types e.g algol 60 pascal omitting nested functions thus non-local variables e.g c early functional language lisp took approach dynamic scoping non-local variables refer closest definition variable point function executed instead defined proper support lexically scoped first-class functions introduced scheme requires handling references functions closures instead bare function pointers turn makes garbage collection necessity section compare particular programming idioms handled functional language first-class functions haskell compared imperative language functions second-class citizens c languages functions first-class citizens functions passed arguments functions way values function taking another function argument called higher-order function language haskell languages functions first-class often still allow one write higher-order functions use features function pointers delegates language c two samples number differences two approaches directly related support first-class functions haskell sample operates lists c sample operates arrays natural compound data structures respective languages making c sample operate linked lists would made unnecessarily complex also accounts fact c function needs additional parameter giving size array c function updates array in-place returning value whereas haskell data structures persistent new list returned old left intact haskell sample uses recursion traverse list c sample uses iteration natural way express function languages haskell sample could easily expressed terms fold c sample terms recursion finally haskell function polymorphic type supported c fixed type variables type constant codice_1 languages supporting anonymous functions pass function argument higher-order function language support anonymous functions bind name instead anonymous nested functions becomes natural refer variables outside body called non-local variables functions represented bare function pointers know anymore value outside function body passed closure needs built manually therefore speak first-class functions also note codice_2 specialized functions referring two codice_1s outside environment set generally requires boilerplate code codice_4 would nested function would still run problem reason supported c. returning function fact returning closure c example local variables captured closure go scope return function builds closure forcing closure later point result undefined behaviour possibly corrupting stack known upwards funarg problem assigning functions variables storing inside global datastructures potentially suffers difficulties returning functions one test literals values equality natural ask whether programming language support testing functions equality inspection question appears difficult one distinguish several types function equality type theory type functions accepting values type returning values type b may written → b b curry-howard correspondence function types related logical implication lambda abstraction corresponds discharging hypothetical assumptions function application corresponds modus ponens inference rule besides usual case programming functions type theory also uses first-class functions model associative arrays similar data structures category-theoretical accounts programming availability first-class functions corresponds closed category assumption instance simply typed lambda calculus corresponds internal language cartesian closed categories functional programming languages scheme ml haskell f scala first-class functions lisp one earliest functional languages designed aspects first-class functions properly understood resulting functions dynamically scoped later scheme common lisp dialects lexically scoped first-class functions many scripting languages including perl python php lua tcl/tk javascript io first-class functions imperative languages distinction made algol descendants pascal traditional c family modern garbage-collected variants algol family allowed nested functions higher-order taking function arguments higher-order functions return functions results except algol 68 allows reason known deal non-local variables nested-function returned result algol 68 produces runtime errors cases c family allowed passing functions arguments returning results avoided problems supporting nested functions gcc compiler allows extension usefulness returning functions primarily lies ability return nested functions captured non-local variables instead top-level functions languages generally considered first-class functions modern imperative languages often support garbage-collection making implementation first-class functions feasible first-class functions often supported later revisions language including c 2.0 apple blocks extension c c++ objective-c. c++11 added support anonymous functions closures language non-garbage collected nature language special care taken non-local variables functions returned results see
[ 790, 1616, 622, 1997, 2451, 5983, 5, 1158, 5986, 6877, 1445, 4302, 7333, 5639, 3772, 2638, 1825, 8174, 993, 5117, 6428, 7071, 2740, 3368, 1370, 304, 1435, 486, 8097, 6911, 5751, 4705, 6029, 4254, 4070, 1114, 5948, 3810, 5091, 5506, 6750...
Train
4,040
5
Cubesat_Space_Protocol:cubesat space protocol cubesat space protocol csp small network-layer delivery protocol designed cubesats idea developed group students aalborg university 2008 developed aausat3 cubesat mission launched 2013 protocol based 32-bit header containing network transport layer information implementation designed embedded systems 8-bit avr microprocessor 32-bit arm avr atmel implementation written c ported run freertos posix pthreads-based operating systems linux support mac os x microsoft windows available version 1.1 three-letter acronym csp adopted abbreviation space protocol first mac-layer driver written can-bus physical layer since extended include several technologies name therefore extended general cubesat space protocol without changing abbreviation protocol implementation actively maintained students aalborg university spin-off company gomspace source code available lgpl license hosted github cubesat space protocol enables distributed embedded systems deploy service-oriented network topology layering csp corresponds layers tcp/ip model implementation supports connection oriented transport protocol layer 4 router-core layer 3 several network-interfaces layer 1–2 service-oriented topology eases design satellite subsystems since communication bus interface subsystems means subsystem developer needs define service-contract set port-numbers system responding furthermore subsystem inter-dependencies reduced redundancy easily added adding multiple similar nodes communication bus key features include csp compile platforms recent version gcc compiler csp requires support c99 features inline functions designated initializers csp supports several physical layer technologies lgpl licensed source code contains implementation fragmenting interface drivers socketcan atmel at90can128 at91sam7a1 at91sam7a3 processors version 1.1 onwards csp also includes interfaces i2c rs-232 interfaces need implement function transmit packet insert received packets protocol stack csp_new_packet function csp successfully tested following physical layers port range divided three adjustable segments ports 0 7 used general services ping buffer status implemented csp service handler ports 8 47 used subsystem specific services remaining ports 48 63 ephemeral ports used outgoing connections bits 28 31 used marking packets hmac xtea encryption rdp header crc32 checksum
[ 6432, 5965, 4759, 5571, 352, 1772, 578, 7848, 3775, 2643, 1435 ]
Test
4,041
3
ARM_Cortex-A:arm cortex-a arm cortex-a group 32-bit 64-bit risc arm processor cores licensed arm holdings cores intended application use group consists 32-bit cores arm cortex-a5 arm cortex-a7 arm cortex-a8 arm cortex-a9 arm cortex-a12 arm cortex-a15 arm cortex-a17 mpcore arm cortex-a32 64-bit cores arm cortex-a35 arm cortex-a53 arm cortex-a55 arm cortex-a57 arm cortex-a72 arm cortex-a73 arm cortex-a75 arm cortex-a76 32-bit arm cortex-a cores except cortex-a32 implement armv7-a profile armv7 architecture main distinguishing feature armv7-a profile compared two profiles armv7-r profile implemented arm cortex-r cores armv7-m profile implemented arm cortex-m cores armv7-a profile includes memory management unit mmu many modern operating systems require mmu run 64-bit arm cortex-a cores well 32-bit arm cortex-a32 implement armv8-a profile armv8 architecture arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included arm ic chip consult manufacturer datasheet related documentation cortex-a5 a7 a8 a9 a12 a15 a17 cores implement armv7-a architecture cortex-a32 a35 a53 a57 a72 a73 a75 a76 cores implement armv8-a architecture amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer documents cpu core vendor arm holdings typical top-down documentation tree ic manufacturers usually additional documents including evaluation board user manuals application notes getting started development software software library documents errata
[ 6082, 6421, 7890, 722, 2926, 5740, 2567, 1473, 5750, 5752, 4336, 5405, 5406, 1864, 67, 446, 451, 6165, 463, 804, 5472, 469, 3008, 3365, 6910, 5845, 7654, 6919, 3397, 1977, 2339, 2711, 1995, 550, 3786, 2024, 5576, 4879, 7376, 5585, 4166,...
Test
4,042
5
GetSimple_CMS:getsimple cms getsimple cms free web content management system primary goal simple easy use based programming language php uses xml files store content flat file content management system contrast cms software tend use databases mysql getsimple cms created 2009 resident pittsburgh pa us web developer chris cagle still presides project senior developer claims created getsimple cms need cms powerful wordpress use easier since developers joined getsimple team active community contributes plug-ins translations themes getsimple cms primarily developed creation smaller websites however also suitable medium large websites thanks extendability platform via plug-ins themes target groups cms organizations companies individuals need small medium-sized websites according statistics w3tech getsimple cms used less 0.1 sites internet simple installation process copying files web server start installation routine allows immediate use software web hosts offer cms already pre-installed installed software expanded numerous plug-ins themes getsimple cms downloaded 120,000 times march 2013 magazine t3n assigns getsimple micro minimal-cms one praises simplicity yet possible extensibility plug-ins author article states theming concept getsimple belong intuitive ever seen british magazine computer active raises backup function simplicity cleanliness work surface well supplied templates produced content manager magazine dedicated cms detailed presentation took 2012 next typo3 wordpress comparison 15 open source cms hot scripts counted cms may 2010 ten easiest lightest weight scripts web design shack counts among 50 wordpress alternatives ranks eighth demo specialized installations page opensourcecms.com counted getsimple 30 common best-rated systems stand 2013 german-speaking community dedicated language english separate area official forum
[ 6029, 3915, 5571 ]
Test
4,043
8
WS-Coordination:ws-coordination ws-coordination web services specification developed bea systems ibm microsoft accepted oasis web services transaction tc 1.2 version describes extensible framework providing protocols coordinate actions distributed applications coordination protocols used support number applications including need reach consistent agreement outcome distributed transactions framework defined specification enables application service create context needed propagate activity services register coordination protocols framework enables existing transaction processing workflow systems coordination hide proprietary protocols operate heterogeneous environment additionally ws-coordination describes definition structure context requirements propagating context cooperating services however specification n't enough coordinate transactions among web services provides coordination framework specifications like ws-atomic transaction ws-businessactivity needed purpose
[ 6986, 5500, 345, 4038, 84, 1286 ]
Test
4,044
9
Not_eXactly_C:exactly c exactly c nxc high-level programming language lego mindstorms nxt designed john hansen 2006 nxc short exactly c based next byte codes assembly language nxc syntax like c. ide nxc bricx command center nxc compiler available mozilla public license sample code shown
[ 336, 4763, 7664, 1435 ]
Train
4,045
7
Cloudike:cloudike cloudike brandable file storage platform operated cloudike inc. headquartered san jose california platform provides cloud storage file synchronization contact synchronization personal cloud client software company data storage approach similar dropbox google drive apple icloud store user data provide access files smartphones laptops tablets etc main difference apart functionality end-users cloudike personal cloudike offers customization businesses cloudike enterprise brands widely known white-label cloudike started 2013 saas-platform grew multi-tier cloud solution used build white-label enterprise data storages oems mobile internet service providers platform modules enterprise data administration storage api integration billing systems cloudike enables building large-scale file storages based openstack swift amazon s3 storage systems compatible amazon s3 apis synchronize user files server cloudike provides desktop clients windows macos android ios devices cloudike offers mobile clients files contact lists accessed via web browser data updates synchronized computers mobile devices associated user accounts cloudike based set programmatic interfaces apis written python uses python frameworks django tornado create rest api message broker software rabbitmq mongodb build contact synchronization mechanism cloudike utilizes sabredav framework web-frontend part single page application based angularjs end-user features enterprise modules several cloud platforms provide white-label services similar cloudike list contains cloud storage platforms might directly indirectly compete cloudike
[ 7838, 2961, 2451, 1912, 3172, 5965, 893, 5571, 330, 6061, 740, 5889 ]
Test
4,046
1
Boyce–Codd_normal_form:boyce–codd normal form boyce–codd normal form bcnf 3.5nf normal form used database normalization slightly stronger version third normal form 3nf bcnf developed 1975 raymond f. boyce edgar f. codd address certain types anomalies dealt 3nf originally defined relational schema bcnf redundancy based functional dependency removed although types redundancy may still exist relational schema r boyce–codd normal form every one dependencies x → least one following conditions hold rare cases 3nf table meet requirements bcnf 3nf table multiple overlapping candidate keys guaranteed bcnf depending functional dependencies 3nf table two overlapping candidate keys may may bcnf example 3nf table meet bcnf table superkeys note even though table start time end time attributes duplicate values still admit days two different bookings court 1 court 2 could start time end time reason start time end time considered table superkeys however candidate keys minimal superkeys relation e.g ⊂ candidate key recall 2nf prohibits partial functional dependencies non-prime attributes i.e. attribute occur candidate key see candidate keys 3nf prohibits transitive functional dependencies non-prime attributes candidate keys today court bookings table non-prime attributes attributes belong candidate key therefore table adheres 2nf 3nf table adhere bcnf dependency rate type → court determining attribute rate type court depends 1 neither candidate key superset candidate key 2 court subset rate type dependency rate type → court respected since rate type ever apply single court design amended meets bcnf candidate keys rate types table rate type court member flag candidate keys today bookings table court start time court end time tables bcnf rate type key rate types table one rate type associated two different courts impossible using rate type key rate types table anomaly affecting original table eliminated cases non-bcnf table decomposed tables satisfy bcnf preserve dependencies held original table beeri bernstein showed 1979 example set functional dependencies ab → c c → b represented bcnf schema consider following non-bcnf table whose functional dependencies follow ab → c c → b pattern person shop type combination table tells us shop type geographically nearest person home assume simplicity single shop one type candidate keys table three attributes prime attributes i.e belong candidate keys table 3nf table bcnf however shop type attribute functionally dependent non-superkey nearest shop violation bcnf means table subject anomalies example eagle eye might shop type changed optometrist fuller record retaining shop type optician davidson record would imply contradictory answers question eagle eye shop type holding shop shop type would seem preferable would prevent anomalies occurring revised design shop near person table candidate key person shop shop table candidate key shop unfortunately although design adheres bcnf unacceptable different grounds allows us record multiple shops type person words candidate keys guarantee functional dependency person shop type → shop respected design eliminates anomalies conform bcnf possible design introduces new normal form known elementary key normal form design consists original nearest shops table supplemented shop table described table structure generated bernstein schema generation algorithm actually eknf although enhancement 3nf recognized time algorithm designed referential integrity constraint defined effect shop type nearest shop first table must refer shop type shop second table data anomalies described previously prevented np-complete given database schema third normal form determine whether violates boyce-codd normal form chris date pointed definition know bcnf appeared paper ian heath 1971 date writes since definition predated boyce codd definition three years seems bcnf ought rights called heath normal form n't edgar f. codd released original paper relational model data large shared databanks june 1970 first time notion relational database published work including boyce-codd normal form method based relational model
[ 7375, 4048, 1414, 4888, 1415, 1416, 1417, 4950, 655, 2124 ]
Test
4,047
3
Cellular_architecture:cellular architecture cellular architecture type computer architecture prominent parallel computing cellular architectures relatively new ibm cell microprocessor first one reach market cellular architecture takes multi-core architecture design logical conclusion giving programmer ability run large numbers concurrent threads within single processor 'cell compute node containing thread units memory communication speed-up achieved exploiting thread-level parallelism inherent many applications cell cellular architecture containing 9 cores processor used playstation 3 another prominent cellular architecture cyclops64 massively parallel architecture currently development ibm cellular architectures follow low-level programming paradigm exposes programmer much underlying hardware allows programmer greatly optimize code platform time makes difficult develop software
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 6498, 441, 2266, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4847, 4479, 895, ...
Test
4,048
1
Sixth_normal_form:sixth normal form sixth normal form 6nf term relational database theory used two different ways christopher j date others defined sixth normal form normal form based extension relational algebra relational operators join generalized support natural treatment interval data sequences dates moments time instance temporal databases sixth normal form based generalized join follows relvar r table sixth normal form abbreviated 6nf satisfies nontrivial join dependencies — join dependency trivial least one projections possibly u_projections involved taken set attributes relvar table concerned date et al also given following definition relvar r sixth normal form 6nf every jd join dependency r trivial — jd trivial one components equal pertinent heading entirety relation 6nf also 5nf sixth normal form intended decompose relation variables irreducible components though may relatively unimportant non-temporal relation variables important dealing temporal variables interval data instance relation comprises supplier name status city may also want add temporal data time values valid e.g. historical data three values may vary independently different rates may instance wish trace history changes status review production costs may reveal change caused supplier changing city hence charged delivery discussion temporal aggregation sql see also zimanyi different approach see tsql2 authors used term sixth normal form differently synonym domain/key normal form dknf usage predates date et al work sixth normal form currently used data warehouses benefits outweigh drawbacks example using anchor modeling although using 6nf leads explosion tables modern databases prune tables select queries using process called 'table elimination required thus speed queries access several attributes order table 6nf comply 5nf first requires table satisfies trivial join dependencies let ’ take simple example table already 5nf users table every attribute non null primary key username users_table table 5nf join dependency implied unique candidate key table username specifically possible join dependencies username status username department 6nf version would look like users users_dept one table 5nf 6nf produces two tables following another example table 1 join dependencies table medic name occupation medic name practice years practice years type hence could see table 2nf due appearance transitive dependency following tables try bring 6nf table 2.1 table 2.2 table 2.3
[ 3621, 4046, 2124, 6462, 4888, 1768, 2054, 5419, 1414, 1415, 1416, 1417 ]
Test
4,049
3
Gustafson's_law:gustafson law computer architecture gustafson law gustafson–barsis law gives theoretical speedup latency execution task fixed execution time expected system whose resources improved named computer scientist john l. gustafson colleague edwin h. barsis presented article reevaluating amdahl law 1988 gustafson estimated speedup gained using n processors instead one task serial fraction benefit parallelism follows using different variables gustafson law formulated following way gustafson law addresses shortcomings amdahl law based assumption fixed problem size execution workload change respect improvement resources gustafson law instead proposes programmers tend set size problems fully exploit computing power becomes available resources improve therefore faster equipment available larger problems solved within time impact gustafson law shift research goals select reformulate problems solving larger problem amount time would possible way law redefines efficiency due possibility limitations imposed sequential part program may countered increasing total amount computation task executed system whose resources improved compared initial similar system split two parts example — computer program processes files disk part program may scan directory disk create list files internally memory another part program passes file separate thread processing part scans directory creates file list sped parallel computer part processes files execution workload whole task improvement resources system denoted formula_3 includes execution workload part benefit improvement resources execution workload one benefits fraction execution workload would benefit improvement resources denoted formula_4 fraction concerning part would benefit therefore execution part benefits improvement resources sped factor formula_6 improvement resources consequently execution workload part benefit remains theoretical execution workload formula_7 whole task improvement resources gustafson law gives theoretical speedup latency execution whole task fixed time formula_9 yields amdahl law presupposes computing requirements stay given increased processing power words analysis data take less time given computing power gustafson hand argues computing power cause data carefully fully analyzed pixel pixel unit unit rather larger scale would possible practical simulate impact nuclear detonation every building car contents including furniture structure strength etc calculation would taken time available provide answer increase computing power prompt researchers add data fully simulate variables giving accurate result amdahl law reveals limitation example ability multiple cores reduce time takes computer boot operating system ready use assuming boot process mostly parallel quadrupling computing power system took one minute load might reduce boot time fifteen seconds greater greater parallelization would eventually fail make bootup go faster part boot process inherently sequential gustafson law argues fourfold increase computing power would instead lead similar increase expectations system capable one-minute load time acceptable users starting point increase features functions system time taken boot operating system i.e one minute new system would include graphical user-friendly features problems fundamentally larger datasets example processing one data point per world citizen gets larger percent per year principal point gustafson law problems likely fruitful applications parallelism algorithms nonlinear runtimes may find hard take advantage parallelism exposed gustafson law snyder points n algorithm means double concurrency gives 26 increase problem size thus may possible occupy vast concurrency may bring little advantage original less concurrent solution—however practice still considerable improvements hill marty emphasize also methods speeding sequential execution still needed even multicore machines point locally inefficient methods globally efficient reduce sequential phase furthermore woo lee studied implication energy power future many-core processors based amdahl law showing asymmetric many-core processor achieve best possible energy efficiency activating optimal number cores given amount parallelism known prior execution
[ 4654, 553, 5371, 107, 5559, 1546, 4318, 4051, 3458, 5832, 5042, 7453, 4154, 1481, 5939, 4159, 1023, 4839, 1295, 5947, 48, 6922, 3041, 1405, 240, 1678, 515, 1679, 1586, 4899, 8024, 1592, 2961, 3578, 8130, 4993, 3667, 1786, 2969, 1238, 47...
Test
4,050
3
Univention_Corporate_Server:univention corporate server univention corporate server ucs server operating system derived debian gnu/linux integrated management system central cross-platform administration servers services clients desktops users well virtualized computers operated ucs addition operation local virtual instances ucs also operated openstack-based microsoft azure-based amazon ec2-based cloud environments via integration open source software samba 4 univention also supports functions provided many companies microsoft active directory administration computers operated microsoft windows ucs-based components ucs-certified established third party products installed integrated via univention app center ucs provides app center applications runtime environment services operation including central consistent management apps docker containers also run ucs systems several apps available app center docker-based univention member open source business alliance supports creation open source business alliance open source software stacks impulse development ucs began 2002 lack standardised linux server operating system offering companies organisations alternative microsoft ’ domain concept proprietary directory service active directory comparable linux solutions e.g. suse red hat offer integrated cross-system user computer management system result corresponding solutions configured maintained individually important early driving forces development ucs initially oldenburgische landesbank department bremen senator education science product ready market launch end 2004 since addition new versions number software solutions based main product ucs also launched ucs predominantly employed german-speaking world companies public organisations wide range sectors fields among others regional government authority federal state brandenburg 2005 univention began market ucs also german-speaking countries today ucs used many european countries also outside europe example australia nigeria usa univention established subsidiary 2013 ucs open-source software proprietary developments univention gmbh included ucs published gnu gpl version 2.3 launch version 2.4 company switched gnu agpl also range software appliances based ucs e.g. groupware desktop service management fields since april 21 2015 ucs freely available companies form ucs core edition replaced previous „ free personal use license core edition fully featured version differs fee-based edition terms product liability support univention corporate server based linux distribution debian gnu/linux numerous open source applications integrated ucs example samba authentication service kerberos virtualization software kvm nagios monitoring servers core important unique selling point ucs central administration tool univention management console allows cross-system cross-location management infrastructures ucs uses directory service openldap save data identity system management administration tools operated via web-based applications command-line interfaces thanks integrated administration service ucs virtual machine manager uvmm administration tools also allow central administration virtualized servers clients hard drives cdrom dvd images well physical systems operated manufacturer goes great lengths guarantee possibilities integration ucs existing environments via use open standards supplied connectors way integrated tool active directory connection allows bidirectional synchronisation microsoft directory service active directory directory service used ucs openldap addition ucs offers various interfaces manufacturers application software enabling integrate applications ucs management system since ucs 3.1 ucs provides univention app center graphic management component installation deinstallation ucs components ucs-certified third-party appliances univention app center includes beside univention solutions example open source groupware solutions kopano open-xchange document management system agorum core slack alternative rocket.chat dropbox alternatives owncloud nextcloud collaboration solutions onlyoffice collabora
[ 644, 1227, 1522, 3559, 2680, 5064, 4261, 5884, 6586, 578 ]
Test
4,051
3
Moore's_second_law:moore second law rock law moore second law named arthur rock gordon moore says cost semiconductor chip fabrication plant doubles every four years 2015 price already reached 14 billion us dollars rock law seen economic flip side moores first law – number transistors dense integrated circuit doubles every two years latter direct consequence ongoing growth capital-intensive semiconductor industry— innovative popular products mean profits meaning capital available invest ever higher levels large-scale integration turn leads creation even innovative products semiconductor industry always extremely capital-intensive ever-dropping manufacturing unit costs thus ultimate limits growth industry constrain maximum amount capital invested new products point rock law collide moore law suggested fabrication plant costs increased quickly predicted rock law – indeed plateauing late 1990s – also fabrication plant cost per transistor shown pronounced downward trend may relevant constraint moore law
[ 4654, 1592, 4049, 48, 5832, 553, 1238, 107, 4899 ]
Train
4,052
4
Sysjail:sysjail sysjail defunct user-land virtualiser systems supporting systrace library version 1.0 limited openbsd netbsd miros original design inspired freebsd jail similar utility although part kernel freebsd sysjail developed released 2006 kristaps dzonsons aka johnson research assistant game theory stockholm school economics maikls deksters sysjail re-written scratch 2007 support emulated processes jails limited initially linux emulation project officially discontinued 3 march 2009 due flaws inherent syscall wrapper-based security architectures restrictions sysjail could evaded exploiting race conditions wrapper security checks kernel execution syscalls
[ 4498, 4318, 1512, 578 ]
Validation
4,053
1
Comparison_of_database_access:comparison database access orms manage database class represents row table named table
[ 1345, 7333, 4302, 109, 6277, 2661, 7005, 7460, 666, 6029, 4164, 1114, 5855, 7844, 3898, 2054, 5510, 2871, 7394, 5956, 2881, 5965, 6594 ]
Test
4,054
1
Halloween_Problem:halloween problem computing halloween problem refers phenomenon databases update operation causes change physical location row potentially allowing row visited operation could even cause infinite loop cases updates continually place updated record ahead scan performing update operation potential database error first discovered chamberlin pat selinger morton astrahan 1976 halloween day working query supposed give ten percent raise every employee earned less 25,000 query would run successfully errors finished employees database earned least 25,000 kept giving raise reached level expectation query would iterate employee records salary less 25,000 precisely fact even updated records visible query execution engine continued match query criteria salary records matching multiple times time given 10 raise greater 25,000 name descriptive nature problem rather given due day discovered recounted chamberlin pat morton discovered problem halloween ... remember came office said ‘ chamberlin look make sure optimizer making plan processing update ’ use index based field updated going ’ happened friday said ‘ listen going able solve problem afternoon let ’ give name ’ call halloween problem ’ work next week. ’ turns called ever since
[ 1905, 6604, 7330, 7341, 6345, 5561, 906, 5217, 6098, 6636, 2663, 2124, 6737, 6739, 3119, 3801, 7999, 5943, 2054, 6932, 6386, 684, 6390, 7937, 7303, 6144, 4457, 6320, 1902, 6594 ]
Test
4,055
9
Location_API_for_Java_ME:location api java location api java compact generic java 2 api produces information device present physical location java applications api optionally supported mobile phone pda manufacturers minimum java platform required api cldc v1.1 location api developed java community process jsr 179 released september 2003 updated version 1.0.1 march 2006 nokia main author maintainer jsr openlapi lgpl implementation use emulator environments nokia reference implementation exist devices access gps device bluetooth location api designed work many different positioning methods generic interfaces lets application developers implement systems retrieve location data multiple sources based availability device advantages single means tracking including fail-over indoor/outdoor transparency choice speed accuracy trade-offs gps cellular positioning methods api supports location api support previously location service implementations provider specific aim api provide common api retrieving location information variety devices openlapi supports several back-ends along device specific wrappers since many providers choose implement optional jsr goal universality still happened developers often required create custom builds different devices location api available java applications blackberry windows mobile devices recent motorola sony ericsson devices nokia series 60 3rd edition devices
[ 1544, 2520, 5062, 6190, 6280 ]
Validation
4,056
4
Peerio:peerio peerio cross-platform end-to-end encrypted application provides secure messaging file sharing cloud file storage peerio available application ios android macos windows linux peerio legacy originally released 14 january 2015 replaced peerio 2 15 june 2017 messages user files stored peerio cloud protected end-to-end encryption meaning data encrypted way read third parties peerio service providers security provided single permanent key-password peerio called account key company peerio technologies inc. founded 2014 vincent drouin intent behind peerio provide security program easier use current pgp standard peerio allows users share encrypted messages files direct messages groups peerio calls rooms peerio rooms offered team-oriented group chat allowing administrative functionality add remove users group chat peerio allows users store encrypted files online offering limited cloud storage free optional paid upgrades peerio messages files persist logins hardware differing ephemeral encrypted messaging apps retain message file history logins different devices peerio supports application based multi-factor authentication peerio allows users share animated gifs peerio utilizes end-to-end encryption applied default message file data end-to-end encryption intended encrypt data way sender intended recipients able decrypt thus read data taken peerio privacy policy peerio utilizes nacl pronounced salt cryptographic framework uses following cryptographic primitives additionally peerio uses scrypt memory-hard key derivation blake2s used various hashing operations in-transit encryption peerio services use transport layer security tls best-practice cipher suite configuration including support perfect forward secrecy pfs view detailed up-to-date independent review peerio ’ tls configuration ssl labs prior peerio initial release software audited german security firm cure53 found non-security related bugs fixed prior applications release according peerio website application also audited march 2017 cure53 peerio partly open source publishes code publicly github peerio offers bug bounty offering cash rewards anyone reports security vulnerabilities first iteration peerio peerio legacy developed nadim kobeissi florencia herra-vega released 14 january 2015 closed 8 january 2018 peerio legacy free application available android ios windows macos linux google chrome extension offered end-to-end encryption enabled default encryption used minilock open-source security standard also developed kobeissi 15 june 2017 peerio 2 launched successor peerio legacy according company blog peerio 2 purported radical overhaul original application core technology claimed benefits comparison peerio legacy include increased speed support larger file transfers 7000gb re-designed user interface peerio also stated added focus towards businesses looking encrypted team collaboration software
[ 501, 7843, 3915, 4759, 7865, 5571, 7848, 578, 5773, 4772 ]
Test
4,057
9
AlphaBasic:alphabasic alphabasic computer programming language created alpha microsystems 1976 language written alpha microsystems employees paul edelstein dick wilcox bob courier alphabasic shares much common basic languages offer fairly unusual features multi-user orientation ability control memory layout variables map statement calling external assembly language subroutines xcall statement language designed developers vertical market software packages compiler runtime system written motorola 68000 assembly language thus able run alpha microsystems hardware compiler emits interpreter code
[ 1361, 5079, 336 ]
Validation
4,058
5
TCP-Illinois:tcp-illinois tcp-illinois variant tcp congestion control protocol developed university illinois urbana–champaign especially targeted high-speed long-distance networks sender side modification standard tcp congestion control algorithm achieves higher average throughput standard tcp allocates network resource fairly standard tcp compatible standard tcp provides incentives tcp users switch tcp-illinois loss-delay based algorithm uses packet loss primary congestion signal determine direction window size change uses queuing delay secondary congestion signal adjust pace window size change similarly standard tcp tcp-illinois increases window size w formula_1 acknowledgment decreases formula_2 formula_3 loss event unlike standard tcp formula_4 formula_5 constants instead functions average queuing delay formula_6 formula_7 formula_8 decreasing formula_9 increasing numerous choices formula_8 formula_9 one class formula_12 formula_13 let formula_8 formula_9 continuous functions thus formula_16 formula_17 formula_18 suppose formula_19 maximum average queuing delay denote formula_20 also formula_21 conditions formula_22 specific choice demonstrated figure 1 tcp-illinois increases throughput much quickly tcp congestion far increases throughput slowly congestion imminent result window curve concave average throughput achieved much larger standard tcp see figure 2 also many desirable features like fairness compatibility standard tcp providing incentive tcp users switch robust inaccurate delay measurement
[ 7061, 7637, 2077, 6286 ]
Test
4,059
2
FreeBSD_Ports:freebsd ports freebsd ports collection package management system freebsd operating system providing easy consistent way installing software packages april 2018 31,679 ports available collection also adopted netbsd basis pkgsrc system ports collection uses makefiles arranged directory hierarchy software built installed uninstalled make command installing application little user intervention required issuing beginning command make install make install clean ports directory desired application cases software automatically downloaded internet patched configured necessary compiled installed registered package database new port needed dependencies applications libraries installed beforehand automatically ports already configured default options deemed generally appropriate users however configuration options called knobs sometimes changed installation using make config command brings text-based interface allows user select desired options historically port software package maintained individual port maintainer responsible ensuring currency port providing general support today many ports maintained special task forces sub-projects dedicated mailing list e.g kde freebsd.org java freebsd.org etc unmaintained ports assigned generic group ports freebsd.org general anyone may become port maintainer contributing favorite software collection one may also choose maintain existing port active maintainer precompiled binary ports called packages package created corresponding port make package command prebuilt packages also available download freebsd-hosted package repositories user install package passing package name pkg install command downloads appropriate package installed freebsd release version installs application including software dependencies may default packages downloaded main freebsd package repository pkg.freebsd.org freebsd maintains build farm called pointyhat cluster packages supported architectures major releases built build logs known errors ports built packages pointyhat cluster available database weekly builds logs also available mailing list archives precompiled packages separated categories architectures available packages separated several release directories one current production release built ports collection shipped release production release directories never updated also stable current directories several major release branches updated less weekly cases package created older version freebsd installed used newer system without difficulty since binary backward compatibility across major releases enabled default packaging system binary packages called codice_1 replaced package management system freebsd 10 jordan hubbard committed port make macros freebsd cvs repository august 21 1994 package install suite makefile committed year earlier august 26 1993 core ports framework first maintained hubbard along satoshi asami several years ports management team later formed handle task netbsd pkgsrc openbsd ports collection trace roots freebsd since release 3.6 dragonfly bsd project uses freebsd ports base dports ports collection john marino dragonfly bsd project created deltaports repository – collection patches files overlay modify freebsd ports order generate dports
[ 7514, 5726, 4675, 6428, 5386, 732, 3636, 7555, 5760, 3986, 5065, 2594, 6477, 424, 6149, 781, 6860, 5092, 6505, 90, 1523, 4759, 7619, 7251, 1547, 3366, 481, 4778, 2300, 5488, 1193, 8001, 6918, 6922, 6211, 3036, 4806, 1582, 3042, 4438, 44...
Validation
4,060
3
Knight_Lore:knight lore knight lore 1984 action-adventure game known popularising isometric graphics video games game developed published ultimate play game written company founders chris tim stamper knight lore player character sabreman forty days collect objects throughout castle brew cure werewolf curse castle room depicted monochrome screen consists blocks climb obstacles avoid puzzles solve ultimate released knight lore third sabreman series despite completed first stamper brothers withheld release year position company advantageously anticipation game effect market knight lore novel image masking technique filmation let images appear pass atop behind without contents colliding created illusion depth priority computer natively support delaying knight lore release ultimate protected sales then-upcoming sabre wulf created another filmation game developers could copy style ultimate released original sabreman trilogy quick succession 1984 zx spectrum knight lore came last november ports followed bbc micro amstrad cpc msx family computer disk system 2008 unofficially ported atari 8-bit computers based bbc micro version game later included compilations including rare 2015 xbox one retrospective compilation rare replay knight lore regarded seminal work british gaming history included multiple lists top spectrum games critics considered technical solutions isometric 3d style harbinger future game design praised game controls atmosphere mystery noted difficult gameplay criticised sound occasional graphical slowdown knight lore best-selling game january 1985 named 1984 game year golden joystick awards popular computing weekly readers though first isometric 3d video game knight lore popularised format isometric flip-screen style fell fashion knight lore influence persisted computer role-playing games retrospective reviewers remember game first offer exploratory world rather flat surface consider controls outdated frustrating thirty years since release player sabreman bitten sabre wulf transforms werewolf nightfall 40 days collect items throughout melkhior wizard castle brew cure curse onscreen timer shows progression day night sabreman metamorphoses werewolf returning human form sunrise castle monsters attack sabreman werewolf game ends player completes potion finish task forty days game directions given poem included game cassette tape castle consists series 128 rooms displayed single non-scrolling screen sabreman must navigate 3d maze stone blocks room usually retrieve collectible object whilst avoiding spikes enemies kill contact player starts five lives loses one death running lives ends game stone blocks serve platforms player jump fall player weight move accord pushed enemies sabreman sabreman jumps higher werewolf form helps specific puzzles player often needs move blocks reach distant objects used platforms reach areas puzzles complete game player must return 14 sequential objects throughout castle wizard cauldron room end game player receives final score based remaining time amount quest completed ultimate play game represented co-founding brothers tim chris stamper uncommonly taciturn matters press marketing though provided details knight lore development crash magazine knight lore released third game sabreman series stamper brothers finished first withheld game year market reasons thought knight lore advancements—copyrighted filmation engine—would hurt sales then-upcoming sabre wulf used extra time prepare another filmation game alien 8 preempt sales would lost publishers would try copy technique sit everyone else far behind tim stamper recalled sabre wulf released commercial critical success 1984 alien 8 next two sabreman titles— underwurlde knight lore —followed close succession end year filmation knight lore graphical novelty lay images could render without overlapping filmation introduced masked sprites whereas earlier games used planar sprites overlapped without regard depth order chris stamper solution use image masking mask version image defines background subject matter different colours combining mask on-screen composite image mask background data ignored hole shape desired image sprite added background filled sprite details thus rooms knight lore drawn one sprite time masking method recent times contemporary images render layer priority set individual pixel level knight lore depicted monochrome changes rooms avoid attribute clash computing limitation wherein object colour interfered others close proximity ultimate released knight lore zx spectrum november 1984 press release announced game beginning new class adventure games pinnacle software development 48k spectrum standard cryptic company ultimate circulate screenshots game press materials cover art knight lore subsequently released bbc micro amstrad cpc msx later 1985 amstrad version upgraded monochromatic colouring two-colour foreground setup jaleco released versions knight lore msx later famicom disk system latter 1986 release barely resembled namesake ultimate asked shahid ahmad developed knight lore -inspired chimera 1985 develop knight lore port commodore 64 come fruition knight lore later appeared spectrum version 1986 compilation sold million ii 2015 xbox one compilation 30 ultimate rare titles rare replay computer game magazines lauded knight lore writing graphics first kind marked sea change contemporaries computer video games cvg wrote never seen graphics calibre lived ultimate hype peter sweasey home computing weekly left speechless predicted knight lore would change market crash said unlikely surpassed spectrum best game crash selected knight lore crash smash recommendation january 1985 issue knight lore best selling game united kingdom month popular computing weekly readers named knight lore 1984 arcade game overall game year knight lore also named cvg game year 1985 golden joystick awards event ultimate named developer programmer year knight lore atmosphere sinclair user described crepuscular world claustrophobic menace inspired many curious questions part adventurer contemporaneous 1985 reviews crash appreciated imaginative mystery game attempted answer sabreman turns werewolf preferred play collectible objects throughout castle sabreman werewolf transformation sequence particular annoyed cvg traumatised players according well played book academic close readings video games players empathised suffering sabreman game design gave impression castle far grander scale reality crash wrote game novel eight-way direction scheme suited 3d space crash compared knight lore stylistically 1984 avalon suggested former bolder visuals magazine preferred knight lore predecessor underwurlde one critic even considered former ultimate best game crash noted knight lore masking technique addressed issues flicker attribute clash sinclair user appreciated sabreman disappeared view passing behind blocks criticism reviewers considered knight lore sound weakest component though spectrum clash also identified sometimes cruel difficulty gameplay later rooms castle require pixel-perfect precision compounded anxiety running timer game animations would slow proportional degree onscreen action reviews amstrad release amtix noted colour additions monochromatic original wrote knight lore among amstrad best adventures one complaint graphical slowdown many elements moving onscreen amstrad action shared complaint nevertheless named knight lore among amstrad best three games—an improvement spectrum release par quality commodore 64 titles knight lore widely regarded seminal work british gaming history according kieron gillen rock paper shotgun knight lore second elite 1984 icon 1980s british computer game industry british magazine retro gamer described players first impressions knight lore unforgettable par experience playing space harrier 1985 wolfenstein 3d 1992 super mario 64 1996 first time retro gamer recalled knight lore striking isometric 3d visuals bold advance game graphics foretelling future british magazine edge described game graphics engine single greatest advance history video games retro gamer compared engine impact introduction sound film knight lore first use isometric graphics—earlier examples include zaxxon 1982 q*bert 1982 ant attack 1983 —but graphic style large in-game world popularised technique put ultimate filmation epicentre several video game clones inspired knight lore edge games struggled approximate isometric style internally visiting developer bo jangeborg devised solution result fairlight 1985 regarded another classic platform edge version filmation received branding worldmaker shahid ahmad said firebird chimera 1985 even closer knight lore ahmad shock admiration playing knight lore reportedly changed life convinced continue making games released chimera amstrad cpc atari 8-bit commodore 64 zx spectrum customising port processing limitations hardware 1986 many british video game publishers produced knight lore -style isometric games examples include sweevo world movie quazatron get dexter glider rider molecule man spindizzy bobby bearing many titles suffered slowdown issues knight lore due much on-screen activity ultimate released four filmation games alien 8 1985 rushed release developers opportunity react knight lore though retro gamer said rush noticeable alien 8 larger game world knight lore even puzzles alien 8 knight lore similar gameplay former set outer space updated filmation ii engine nightshade 1985 added colour scrolling graphics place flip-screen room changes however retro gamer regarded gameplay comparatively dull gunfright 1986 reported stampers last game also used filmation ii robust predecessor pentagram 1986 returned flip-screen rooms action-based gameplay included shooting enemies sold poorly last sabreman game meanwhile stamper brothers sought enter burgeoning console industry sold ultimate u.s. gold mid-1980s established rare develop nintendo console games ultimate last two isometric games lesser quality consumer interest genre endured isometric flip-screen trend continued britain several years apart fairlight sweevo world get dexter isometric flip-screen games included jon ritman knight lore -inspired batman 1986 head heels 1987 last ninja 1987 la abadía del crimen 1987 cadaver 1990 console games solstice 1990 landstalker 1992 players grew tired genre similar reiterations ritman games particular brought new ideas sandy white developed pre- knight lore isometric game ant attack impressed ultimate in-game balance gutsy design decisions developer great escape another isometric game considered knight lore rival title inspiration still spurred spend nine months making time stood still retro gamer wrote knight lore influence persisted 30 years later titles populous 1989 syndicate 1993 1994 civilization ii 1996 style also spread computer role-playing games like baldur gate diablo fallout though gamesradar matt cundy reported 2009 isometric perspective longer prominent topic game design 2014 chris scullion vice traced knight lore isometric influence sims 4 2014 diablo iii 2012 knight lore included multiple lists top spectrum games even top games platform inspired two fangames 1999 sequel 2010 3d remake development four years though isometric games existed previously retrospective review gillen rock paper shotgun recalled knight lore first game offer world physical depth exploration opposed simple mechanics arcade games jeremy signor usgamer agreed knight lore felt like world painting added game innovative use successive single-screen rooms flip-screen pre-dated legend zelda years gillen said game punishing style unforgiving gameplay high difficulty awkward controls become obsolete 30 years since release criticised knight lore enormously innovative incredibly atmospheric totally unplayable suggesting similar head heels 1987 aged much better peter parrish eurogamer found game frustrating though well-made dan whitehead publication appreciated 2015 rare replay compilation version knight lore emulated original choppy animations zx spectrum processor struggled render onscreen objects
[ 2175, 2904, 3355, 6434, 3022, 223, 3121, 844, 680, 3735, 6397, 1980, 1517, 6159 ]
Test
4,061
3
Interrupt_handler:interrupt handler computer systems programming interrupt handler also known interrupt service routine isr special block code associated specific interrupt condition interrupt handlers initiated hardware interrupts software interrupt instructions software exceptions used implementing device drivers transitions protected modes operation system calls traditional form interrupt handler hardware interrupt handler hardware interrupts arise electrical conditions low-level protocols implemented digital logic usually dispatched via hard-coded table interrupt vectors asynchronously normal execution stream interrupt masking levels permit often using separate stack automatically entering different execution context privilege level duration interrupt handler execution general hardware interrupts handlers used handle high-priority conditions require interruption current code processor executing later found convenient software able trigger mechanism means software interrupt form synchronous interrupt rather using hard-coded interrupt dispatch table hardware level software interrupts often implemented operating system level form callback function interrupt handlers multitude functions vary based triggered interrupt speed interrupt handler completes task example pressing key computer keyboard moving mouse triggers interrupts call interrupt handlers read key mouse position copy associated information computer memory interrupt handler low-level counterpart event handlers however interrupt handlers unusual execution context many harsh constraints time space intrinsically asynchronous nature makes notoriously difficult debug standard practice reproducible test cases generally n't exist thus demanding specialized skillset—an important subset system programming—of software engineers engage hardware interrupt layer unlike event handlers interrupt handlers expected set interrupt flags appropriate values part core functionality even cpu supports nested interrupts handler often reached interrupts globally masked cpu hardware operation architecture interrupt handler would normally save smallest amount context necessary reset global interrupt disable flag first opportunity permit higher priority interrupts interrupt current handler also important interrupt handler quell current interrupt source method often toggling flag bit kind peripheral register current interrupt n't immediately repeated handler exit resulting infinite loop exiting interrupt handler interrupt system exactly right state every eventuality sometimes arduous exacting task mishandling source many serious bugs kind halt system completely bugs sometimes intermittent mishandled edge case occurring weeks months continuous operation formal validation interrupt handlers tremendously difficult testing typically identifies frequent failure modes thus subtle intermittent bugs interrupt handlers often ship end customers modern operating system upon entry execution context hardware interrupt handler subtle reasons performance handler typically initiated memory execution context running process special connection interrupt essentially usurping running context—process time accounting often accrue time spent handling interrupts interrupted process however unlike interrupted process interrupt usually elevated hard-coded cpu mechanism privilege level high enough access hardware resources directly low-level microcontroller chip might lack protection modes memory management unit mmu chips execution context interrupt handler essentially interrupted program typically runs small stack fixed size memory resources traditionally extremely scant low end nested interrupts often provided exacerbates stack usage primary constraint interrupt handler programming endeavour exceed available stack worst-case condition requiring programmer reason globally stack space requirement every implemented interrupt handler application task allocated stack space exceeded condition known stack overflow normally detected hardware chips class stack exceeded another writable memory area handler typically work expected application fail later sometimes much later due handler side effect memory corruption stack exceeded non-writable protected memory area failure usually occur inside handler generally easier case later debug writable case one implement sentinel stack guard—a fixed value right beyond end legal stack whose value overwritten never system operates correctly common regularly observe corruption stack guard kind watch dog mechanism catch majority stack overflow conditions point time close offending operation multitasking system thread execution typically stack special system stack provided interrupts interrupts consume stack space whatever thread execution interrupted designs usually contain mmu user stacks usually configured stack overflow trapped mmu either system error debugging remap memory extend space available memory resources level microcontroller typically far less constrained stacks allocated generous safety margin systems supporting high thread counts better hardware interrupt mechanism switches stack special system stack none thread stacks need account worst-case nested interrupt usage tiny cpus far back 8-bit motorola 6809 1978 provided separate system user stack pointers many reasons highly desired interrupt handler execute briefly possible highly discouraged forbidden hardware interrupt invoke potentially blocking system calls system multiple execution cores considerations reentrancy also paramount system provides hardware dma concurrency issues arise even single cpu core uncommon mid-tier microcontroller lack protection levels mmu still provide dma engine many channels scenario many interrupts typically triggered dma engine associated interrupt handler expected tread carefully modern practice evolved divide hardware interrupt handlers front-half back-half elements front-half first level receives initial interrupt context running process minimal work restore hardware less urgent condition emptying full receive buffer marks back-half second level execution near future appropriate scheduling priority invoked back-half operates process context fewer restrictions completes handler logical operation conveying newly received data operating system data queue several operating systemslinux unix macos microsoft windows z/os desqview operating systems used pastinterrupt handlers divided two parts first-level interrupt handler flih second-level interrupt handlers slih flihs also known hard interrupt handlers fast interrupt handlers slihs also known slow/soft interrupt handlers deferred procedure calls windows flih implements minimum platform-specific interrupt handling similar interrupt routines response interrupt context switch code interrupt loaded executed job flih quickly service interrupt record platform-specific critical information available time interrupt schedule execution slih long-lived interrupt handling flihs cause jitter process execution flihs also mask interrupts reducing jitter important real-time operating systems since must maintain guarantee execution specific code complete within agreed amount time reduce jitter reduce potential losing data masked interrupts programmers attempt minimize execution time flih moving much possible slih speed modern computers flihs may implement device platform-dependent handling use slih platform-independent long-lived handling flihs service hardware typically mask associated interrupt keep masked case may complete execution unusual flih unmasks associated interrupt completes called reentrant interrupt handler reentrant interrupt handlers might cause stack overflow multiple preemptions interrupt vector usually avoided priority interrupt system flih also briefly masks interrupts equal lesser priority slih completes long interrupt processing tasks similarly process slihs either dedicated kernel thread handler executed pool kernel worker threads threads sit run queue operating system processor time available perform processing interrupt slihs may long-lived execution time thus typically scheduled similarly threads processes linux flihs called upper half slihs called lower half bottom half different naming used unix-like systems part bottom half
[ 4670, 5021, 13, 3271, 3626, 2567, 5041, 7550, 405, 2237, 421, 65, 5783, 5088, 6500, 785, 1150, 2266, 788, 1522, 7605, 4759, 804, 463, 4767, 810, 4397, 5116, 3365, 2300, 4786, 4068, 6919, 6922, 5161, 5865, 2332, 4088, 861, 1237, 3751, ...
Test
4,062
3
SpaceWire:spacewire spacewire spacecraft communication network based part ieee 1355 standard communications coordinated european space agency esa collaboration international space agencies including nasa jaxa rka within spacewire network nodes connected low-cost low-latency full-duplex point-to-point serial links packet switching wormhole routing routers spacewire covers two physical data-link seven layers osi model communications spacewire modulation data formats generally follow data strobe encoding differential ended signaling ds-de part ieee std 1355-1995 spacewire utilizes asynchronous communication allows speeds 2 mbit/s 400 mbit/s initial signalling rate 10mbit/s ds-de well-favored describes modulation bit formats routing flow control error detection hardware little need software spacewire also low error rates deterministic system behavior relatively simple digital electronics spacewire replaced old pecl differential drivers physical layer ieee 1355 ds-de low-voltage differential signaling lvds spacewire also proposes use space-qualified 9-pin connectors spacewire ieee 1355 ds-de allows wider set speeds data transmission new features automatic failover fail-over features let data find alternate routes spacecraft multiple data buses made fault-tolerant spacewire also allows propagation time interrupts spacewire links eliminating need separate time discretes transferred character starts parity bit data-control flag bit data-control flag 0-bit 8-bit lsb character follows otherwise one control codes including end packet eop network data frames look follows one address bytes used routing addresses either physical ones 0-32 logical ones difference physical addresses deleted frame header routing used hop-based routing based path specified frame logical addresses may deleted well depending router configuration hardware devices may connected either directly via spacewire router former case usually pairs devices used guarantee fail-safe operation however handled software spacewire router usually crossbar switch-type device operating wormhole switching mode also may limit speed communication lowest common speed routing decisions based programmed routing table initial incoming frame contents spacewire used worldwide use began primarily esa projects currently used nasa jaxa rka many organizations companies nasa projects using include james webb space telescope swift burst alert telescope lunar reconnaissance orbiter lcross geostationary operational environmental satellite goes-r scan testbed previously known communications navigation networking reconfigurable testbed connect also selected united states department defense operationally responsive space spacewire initiatives coordinated several space agencies frame ccsds order extend communication model network transport layers osi model spacewire supports highly fault-tolerant networks systems one reason popularity esa draft specification place protocol id following protocol id assigned ecss-e-st-50-11 commercial providers spacewire equipment spacewire ip cores articles
[ 4657, 1761, 7569, 3462, 5492, 2442 ]
Test
4,063
9
DIANA_(intermediate_language):diana intermediate language diana descriptive intermediate attributed notation ada intermediate language used represent semantics ada program originally designed interface front end syntactic analysis middle semantic analysis compiler one hand back end code generation optimization also used internal representation language tools diana also used pl/sql based ada diana abstract data type concrete implementations defined using idl specification language diana descends tcol aida earlier representations ada programs ada-0 subset ada karlsruhe 1980 first using aida later aida got replaced diana full karlsruhe ada compilation system used diana well idl external representation marshalling middle-end code generating back-end
[ 304, 7474 ]
Test
4,064
1
Adminer:adminer adminer formerly known phpminadmin tool managing content mysql databases since version 2 also postgresql ms sql sqlite oracle databases adminer distributed apache license gpl v2 form single php file around 470 kib size author jakub vrána started develop tool light-weight alternative phpmyadmin july 2007 adminer got attention 2008 made cca finals sourceforge also first webhosting providers started include adminer mysql managing tool portfolio services 2012 adminer got coverage linux.com second time project priorities according author order safety user-friendliness performance functionality size small single file result compilation minification source codes
[ 7999, 623, 6029, 7213, 2451, 3863, 3652, 5956, 2054, 57, 6386, 3776 ]
Test
4,065
3
Knight_Tyme:knight tyme knight tyme computer game released zx spectrum amstrad cpc commodore 64 msx compatibles 1986 published mastertronic part mastertronic added dimension label two versions zx spectrum release published full version 128k spectrum published first cut-down version 48k spectrum removed music graphics locations published later programmed david jones third game magic knight series in-game music written david whittaker c64 version rob hubbard spectrum amstrad versions graphics ray owen rescued friend gimbal self-inflicted white-out spell magic knight finds transported far future aboard starship uss pisces magic knight must find way back time help tyme guardians apprehended paradox police board u.s.s pisces magic knight first recognized crew ship must create id card receives template derby iv ship main computer getting id completed takes command ship first arriving starbase 1 refuel ship refueling magic knight collects pieces golden sundial monopole retreat outpost returning ship pieces sundial discovers time machine appeared inside uss pisces take back time gameplay similar knight tyme predecessor spellbound game wide range commands carried-out using windimation system whereby text commands carried-out choosing options command windows importance watching magic knight energy level keeping harm rather different time around whilst spellbound required player vigilant health needed player occasionally avoid flying objects could sap strength knight tyme much focused puzzle-solving aspect although still death rooms spellbound reason regarded true graphic adventure gameworld features large number characters hero interact time around however responsible welfare help quest belong time magic knight found displaced person time around knight tyme also involves space travel magic knight commandeering uss pisces using journey various planets star systems planets communicated beamed-down via uss pisces transporter system magic knight also needs keep note ship fuel runs starship stranded means end game refuelling take place many planets uss pisces visits one magic knight game stormbringer released 1987
[ 8048, 6154 ]
Test
4,066
3
NuMachine:numachine numachine nu machine early microprocessor-based computer workstation designed interface local area networks developed late 1970s mit laboratory computer science lcs professor steve ward research group concert western digital project included development trix unix operating system variant numachine first developed commercially western digital bought texas instruments 1983 texas instruments dropped numachine development 1985 favor ti explorer main legacy bus architecture called nubus later adopted apple computer macintosh ii next influenced design pci bus trix operating system used gnu project first attempt operating system kernel
[ 3346, 3614, 6754, 267, 5450 ]
Test
4,067
9
Wolfram_Mathematica:wolfram mathematica wolfram mathematica usually termed mathematica modern technical computing system spanning areas technical computing including neural networks machine learning image processing geometry data science visualizations others system used many technical scientific engineering mathematical computing fields conceived stephen wolfram developed wolfram research champaign illinois wolfram language programming language used mathematica features wolfram mathematica include wolfram mathematica split two parts kernel front end kernel interprets expressions wolfram language code returns result expressions front end designed theodore gray 1988 provides gui allows creation editing notebook documents containing program code prettyprinting formatted text together results including typeset mathematics graphics gui components tables sounds content formatting generated algorithmically edited interactively standard word processing capabilities supported including real-time multi-lingual spell-checking documents structured using hierarchy cells allow outlining sectioning document support automatic numbering index creation documents presented slideshow environment presentations notebooks contents represented mathematica expressions created modified analyzed mathematica programs converted formats front end includes development tools debugger input completion automatic syntax highlighting among alternative front ends wolfram workbench eclipse based integrated development environment ide introduced 2006 provides project-based code development tools mathematica including revision management debugging profiling testing plugin intellij idea based ides work wolfram language code addition syntax highlighting analyse auto-complete local variables defined functions mathematica kernel also includes command line front end interfaces include jmath based gnu readline wolframscript ref
[ 3606, 3619, 6430, 1102, 4705, 744, 7557, 3981, 1879, 7579, 68, 1889, 1524, 5098, 4759, 7966, 5117, 6527, 6912, 3383, 1569, 3723, 3388, 4070, 5855, 6934, 154, 1229, 3410, 1599, 5885, 4474, 1626, 5548, 8065, 8082, 2740, 6986, 4872, 578, 1...
Test
4,068
3
Run_queue:run queue modern computers many processes run active processes placed array called run queue runqueue run queue may contain priority values process used scheduler determine process run next ensure program fair share resources one run time period quantum paused placed back run queue program stopped let another run program highest priority run queue allowed execute processes also removed run queue ask sleep waiting resource become available terminated linux operating system prior kernel 2.6.23 cpu system given run queue maintains active expired array processes array contains 140 one priority level pointers doubly linked lists turn reference processes given priority scheduler selects next process active array highest priority process quantum expires placed expired array priority active array contains processes scheduler swaps active expired arrays hence name 1 scheduler unix linux sar command used check run queue vmstat unix linux command also used determine number processes queued run waiting run appear r column two models run queues one assigns run queue physical processor one run queue system
[ 5216, 578, 4061 ]
Validation
4,069
7
HP_Converged_Systems:hp converged systems hp convergedsystem portfolio system-based products hewlett-packard hp integrates preconfigured components systems virtualization cloud computing big data collaboration converged management client virtualization composed servers storage networking integrated software services systems designed address cost complexity data center operations maintenance pulling components together single resource pool easier manage faster deploy previously would take three six months time order get system running reportedly takes 20 days hp convergedsystem hp convergedsystem uses common converged infrastructure architecture common foundation used hp server storage networking products hp converged infrastructure pools resources shared across different applications managed standardized management platform security software convergence server storage networking help user organizations save investment equipment maintenance management hp converged systems includes hp convergedsystem virtualization developing managing virtualized environments hp cloudsystem building managing cloud computing services across private public hybrid clouds hp convergedsystem big data loading analyzing managing vast quantities data hp convergedsystem collaboration configuration deployment microsoft unified communications software hp oneview converged infrastructure management hp convergedsystem client virtualization running virtual desktop infrastructure hp cloudsystem integrated cloud infrastructure delivering private public hybrid cloud services integrates hp cloud software hp servers storage networking technologies single system hp oneview converged infrastructure management product provides unified interface lets users automate formerly labor-intensive manual data center management maintenance tasks part software-defined data center hp convergedsystem virtualization consists series integrated server storage networking infrastructures offer scalability modular virtualization systems support 50 1,000 virtual machines hp convergedsystem 300 designed support 50 300 virtual machines comes configured hp proliant servers hp convergedsystem 700 designed larger enterprise installations 100 1,000 virtual machines comes configured hp bladesystem servers models customers choose vmware microsoft virtualization environments customers 700 model also install virtualization software models managed single console reported hp convergedsystem virtualization performs twice fast costs 25 percent less competing systems hp cloudsystem used enterprises service providers build manage private public hybrid cloud services system includes consumer-style user interface streamlined management tools based hp converged infrastructure hp cloudsystem modular infrastructure hp cloud service automation software cloudsystem integrates servers storage networking security management automate application infrastructure lifecycle service delivery via private hybrid clouds hp cloudsystem component hp converged cloud combines software cloud services unified set packages single unified architecture hp cloudsystem built hp cloud os features openstack technology enables users choose multiple hypervisors operating systems including microsoft vmware hp cloudsystem automatically shift workloads external clouds busy periods based pre-defined business policies supported public clouds include arsys sfr well amazon web services microsoft windows azure function commonly known cloud bursting hp cloudsystem lifecycle management tools automate process application provisioning customization configuration patch management retirement hp cloudsystem foundation features core components additional management capabilities simplified installation included hp cloudsystem enterprise hp convergedsystem big data provides workload-specific single-purpose systems support tasks performance critical data analytics data warehousing business applications software applications pre-integrated designed integrated hardware networking storage components hp convergedsystem 300 vertica designed businesses run hp vertica data analytics solution system works cloudera hortonworks mapr versions apache hadoop reported system operate 50 1,000 times faster competitors ’ data warehouse offerings hp convergedsystem 300 microsoft analytics platform system aps includes sql server parallel data warehouse pdw configured hdinsight hadoop nodes possible run polybase queries sql server pdw cloudera apache hortonworks hdp nodes hp convergedsystem 500 sap hana operates sap hana in-memory data management platform data analytics data warehousing reported system process data analytics twice fast competing systems sap hana hp convergedsystem 500 sap hana includes convergedsystem 500 hardware hp serviceguard sap hana data management tool protects unscheduled downtime providing capability automatic failover hp convergedsystem 500 sap hana enables users run data analytics enterprise resource planning erp workload-based system reported data analytics processes used take days weeks run accessed real-time hp convergedsystem 900 sap hana designed manage analyze large varied data sets reported hp convergedsystem 900 sap hana capable supplying 12 terabytes data one memory pool hp convergedsystem collaboration integrates hardware software services provide unified communications specific platforms pre-supplied workload configurations include hp collaboration solutions microsoft sharepoint server include hp sharepoint business decision business intelligence combines hp proliant gen8 servers sharepoint 2013 sql server ’ power view reported system takes less hour install launch hp convergedsystems solutions microsoft exchange server designed users deploy business email system modular simplified manner hp converged systems solutions microsoft lync server streamlines deployment microsoft lync communications voice instant messaging video includes reference architecture small medium enterprises hp oneview converged infrastructure management enables data center administrators perform automated lifecycle management hp servers part software-defined data center unlike legacy converged infrastructure management software focuses managing devices hp oneview designed help administrators enable tasks administrators view resources relationships visual map use representational state transfer rest application programming interface api automate system management tasks hp oneview interface modeled consumer applications efficiently manage hp bladesystem hp proliant generation 7 8 servers support hp moonshot arm servers planned reported hp oneview ’ deep knowledge servers hp virtual connect virtualization technology administrators deploy 16-node computer cluster 12 times faster could using manual operations administrators also use hp oneview provision maintain firmware across hp bladesystem enclosures servers virtual connect modules well manage virtual lan vlan network edge hp oneview plug-in vmware vcenter virtualization console enables administrators work directly vcenter console operations vmware vsphere hosts clusters managed automated reducing number steps takes carry tasks like setting new cluster hp convergedsystem 100 hosted desktops works software-defined hp moonshot m700 microserver systems includes software hardware services provide users environment running virtual desktops user gets dedicated cpu gpu removes need hypervisor according published reports moonshot server consumes 63 percent less power competing systems lower total cost ownership 44 percent compared standard desktop computer systems built joint effort amd citrix system reported provide graphics six times faster competing products client virtualization also provides way users securely access business applications data mobile devices
[ 2961, 4295, 4692, 7715, 5447 ]
Test
4,070
9
R_(programming_language):r programming language r programming language free software environment statistical computing graphics supported r foundation statistical computing r language widely used among statisticians data miners developing statistical software data analysis polls data mining surveys studies scholarly literature databases show substantial increases popularity r ranks 20th tiobe index measure popularity programming languages gnu package source code r software environment written primarily c fortran r freely available gnu general public license pre-compiled binary versions provided various operating systems although r command line interface several graphical user interfaces rstudio integrated development environment r implementation programming language combined lexical scoping semantics inspired scheme created john chambers 1976 bell labs important differences much code written runs unaltered r created ross ihaka robert gentleman university auckland new zealand currently developed r development core team chambers member r named partly first names first two r authors partly play name s. project conceived 1992 initial version released 1995 stable beta version 2000 r libraries implement wide variety statistical graphical techniques including linear nonlinear modelling classical statistical tests time-series analysis classification clustering others r easily extensible functions extensions r community noted active contributions terms packages many r standard functions written r makes easy users follow algorithmic choices made computationally intensive tasks c c++ fortran code linked called run time advanced users write c c++ java .net python code manipulate r objects directly r highly extensible use user-submitted packages specific functions specific areas study due heritage r stronger object-oriented programming facilities statistical computing languages extending r also eased lexical scoping rules another strength r static graphics produce publication-quality graphs including mathematical symbols dynamic interactive graphics available additional packages r rd latex-like documentation format used supply comprehensive documentation online number formats hard copy r interpreted language users typically access command-line interpreter user types codice_1 r command prompt presses enter computer replies 4 shown calculation interpreted sum two single-element vectors resulting single-element vector prefix codice_2 indicates list elements following line starts first element vector feature useful output extends multiple lines like similar languages apl matlab r supports matrix arithmetic r data structures include vectors matrices arrays data frames similar tables relational database lists arrays stored column-major order r extensible object system includes objects among others regression models time-series geo-spatial coordinates scalar data type never data structure r. instead scalar represented vector length one many features r derive scheme r uses s-expressions represent data code functions first-class manipulated way data objects facilitating meta-programming allow multiple dispatch variables r lexically scoped dynamically typed function arguments passed value lazy -- say evaluated used function called r supports procedural programming functions functions object-oriented programming generic functions generic function acts differently depending classes arguments passed words generic function dispatches function method specific class object example r generic codice_3 function print almost every class object r simple codice_4 syntax although used mainly statisticians practitioners requiring environment statistical computation software development r also operate general matrix calculation toolbox – performance benchmarks comparable gnu octave matlab capabilities r extended user-created packages allow specialised statistical techniques graphical devices import/export capabilities reporting tools rmarkdown knitr sweave etc packages developed primarily r sometimes java c c++ fortran r packaging system also used researchers create compendia organise research data code report files systematic way sharing public archiving core set packages included installation r 15,000 additional packages available comprehensive r archive network cran bioconductor omegahat github repositories task views page subject list cran website lists wide range tasks fields finance genetics high performance computing machine learning medical imaging social sciences spatial statistics r applied packages available r also identified fda suitable interpreting data clinical research r package resources include crantastic community site rating reviewing cran packages r-forge central platform collaborative development r packages r-related software projects r-forge also hosts many unpublished beta packages development versions cran packages bioconductor project provides r packages analysis genomic data includes object-oriented data-handling analysis tools data affymetrix cdna microarray next-generation high-throughput sequencing methods list changes r releases maintained various news files cran highlights listed several major releases specialized integrated development environment ide r rstudio similar development interface r tools visual studio generic ides like eclipse also offer features work r. graphical user interfaces point-and-click approach include rattle gui r commander rkward common editors varying levels support r include emacs emacs speaks statistics vim nvim-r plugin neovim nvim-r plugin kate lyx notepad++ visual studio code winedt tinn-r. r functionality accessible several scripting languages python perl ruby f julia interfaces high-level programming languages like java .net c available well main r implementation written r c fortran several implementations aimed improving speed increasing extensibility closely related implementation pqr pretty quick r radford m. neal improved memory management support automatic multithreading renjin fastr java implementations r use java virtual machine cxxr rho riposte implementations r c++ renjin riposte pqr attempt improve performance using multiple processor cores form deferred evaluation alternative implementations experimental incomplete relatively users compared main implementation maintained r development core team tibco built runtime engine called terr part spotfire microsoft r open fully compatible r distribution modifications multi-threaded computations r vibrant active local communities worldwide users network share ideas learn growing number r events bringing users together conferences e.g user whyr conectar satrdays meetups well r-ladies groups promote gender diversity official annual gathering r users called user first event user 2004 may 2004 vienna austria skipping 2005 user conference held annually usually alternating locations europe north america subsequent conferences included future conferences planned follows r journal open access refereed journal r project statistical computing features short medium length articles use development r including packages programming tips cran news foundation news r comparable popular commercial statistical packages sas spss stata r available users charge free software license january 2009 new york times ran article charting growth r reasons popularity among data scientists threat poses commercial statistical packages sas june 2017 data scientist robert muenchen published in-depth comparison r software packages popularity data science software although r open-source project supported community developing companies strive provide commercial support and/or extensions customers section gives examples companies 2007 richard schultz martin schultz steve weston kirk mettler founded revolution analytics provide commercial support revolution r distribution r also includes components developed company major additional components include parallelr r productivity environment ide revoscaler big data analysis revodeployr web services framework ability reading writing data sas file format revolution analytics also offer distribution r designed comply established iq/oq/pq criteria enables clients pharmaceutical sector validate installation revolution r. 2015 microsoft corporation completed acquisition revolution analytics since integrated r programming language sql server 2016 sql server 2017 power bi azure sql database azure cortana intelligence microsoft r server visual studio 2017 october 2011 oracle announced big data appliance integrates r apache hadoop oracle linux nosql database exadata hardware oracle r enterprise became one two components oracle advanced analytics option alongside oracle data mining ibm offers support in-hadoop execution r provides programming model massively parallel in-database analytics r. tibco offers runtime-version r part spotfire mango offers validation package r validr make compliant drug approval agencies like fda agencies allow use statistical software submissions software validated either vendor sponsor following examples illustrate basic syntax language use command-line interface r generally preferred assignment operator arrow made two characters codice_5 although codice_6 usually used instead one r ’ strengths ease creating new functions objects function body remain local function data type may returned example user-created function short r code calculating mandelbrot set first 20 iterations equation z z c plotted different complex constants c example demonstrates
[ 707, 4662, 3606, 3607, 4296, 1445, 4302, 3267, 3619, 6428, 2559, 1435, 3968, 1102, 1803, 4705, 405, 5757, 7557, 3981, 6462, 7559, 761, 2599, 1879, 7579, 7213, 775, 5787, 4738, 2619, 7951, 5091, 4020, 6507, 1155, 1523, 2985, 3684, 5098, ...
Test
4,071
4
Automated_Certificate_Management_Environment:automated certificate management environment automatic certificate management environment acme protocol communications protocol automating interactions certificate authorities users web servers allowing automated deployment public key infrastructure low cost designed internet security research group isrg let encrypt service protocol based passing json-formatted messages https published internet standard rfc 8555 chartered ietf working group isrg provides free open-source reference implementations acme certbot python-based implementation server certificate management software using acme protocol boulder certificate authority implementation written go december 2015 web server caddy gained native support automatic certificate issuance renewal using acme protocol since spun go library called certmagic october 2017 let encrypt announced similar built-in functionality module apache httpd since large number client options appeared api v1 released april 12 2016 supports issuing certificates single domains example.com cluster.example.com let encrypt suggests users migrate v2 soon possible support v1 planned deprecated many acme clients already support v2 ahead release api v2 released march 13 2018 pushed back several times acme v2 backwards compatible v1 version 2 supports wildcard domains *.example.com allowing many subdomains trusted ssl e.g nowiki https //cluster01.example.com /nowiki nowiki https //cluster02.example.com /nowiki nowiki https //example.com /nowiki private networks single domain using single shared wildcard certificate major new requirement v2 requests wildcard certificates require modification domain name service txt record verifying control domain changes acme v2 protocol since v1 include
[ 363, 794, 8157, 887, 6795, 1168, 1173, 993, 2644, 297, 1460, 5824, 6006, 8189, 5573, 6540, 8093, 5399, 6458, 6553, 2587, 7567, 7925, 1401, 7848, 3899, 2691, 6049, 4990, 7214, 5965, 1425, 3588, 353, 1059, 1513, 2620, 359, 3426 ]
Test
4,072
4
DefenderMX:defendermx defendermx commercial linux based email security solution company founded 2002 company headquarters located washington dc usa company develops gateway hosted solutions built linux defendermx originally developed 2001 bains digital technologies fsl bains digital merged defendermx product merged barricademx plus line products fsl revived defendermx name next generation products based open source haraka project fsl major contributor defendermx uses following open source projects technologies
[ 5733, 3031, 1474, 6908, 7624, 4511, 5956 ]
Test
4,073
1
Block_contention:block contention database management systems block contention data contention refers multiple processes instances competing access index data block time general caused frequent index table scans frequent updates concurrent statement executions two instances may also lead contention subsequently busy waiting process without lock situations goal spread queries greater number blocks avoid concentrating single one
[]
Test
4,074
9
Matthias_Felleisen:matthias felleisen matthias felleisen german-american computer science professor author grew germany immigrated us 21 years old felleisen currently trustee professor khoury college computer sciences northeastern university boston massachusetts past taught rice university receiving phd indiana university direction daniel p. friedman felleisen interests include programming languages including software tools program design design recipe software contracts many 1990s felleisen launched plt teachscheme programbydesign eventually giving rise bootstrap project goal teaching program-design principles beginners explore use scheme produce large systems part effort authored design programs mit press 2001 findler flatt krishnamurthi dissertation felleisen developed small-step operational semantics higher-order functional imperative extensions state control part semantics engineering plt redex derived dissertation well-known application proof type safety worked phd student andrew wright control delimiters basis delimited continuations introduced felleisen 1988 since used large number domains particularly defining new control operators see queinnec survey a-normal form anf intermediate representation programs functional compilers introduced sabry felleisen 1992 simpler alternative continuation-passing style cps felleisen gave keynote addresses 2011 technical symposium computer science education 2010 international conference functional programming 2004 european conference object-oriented programming 2001 symposium principles programming languages several conferences workshops computer science 2006 inducted fellow association computing machinery 2009 received karl v. karlstrom outstanding educator award acm 2010 received sigcse award outstanding contribution computer science education acm 2012 received acm sigplan programming languages achievement award significant lasting contribution field programming languages including small-step operational semantics control state mixin classes mixin modules fully abstract semantics sequential pcf web programming techniques higher-order contracts blame static typing dynamic languages felleisen co-author
[ 3429, 7878, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 1557, 5397, 218, 1478, 5494, 4704, 3880, 4609, 6116, 7277, 3212, 5501, 6210, 1116, 144, 7474, 6471, 7481, 2144, 2600, 154, 3225, 4085, 7298, 5515, 8025, 5077, ...
Test
4,075
3
Dynamite_Bowl:dynamite bowl general concept five players play 30 bowling lanes available simulating concept bowling league players change lane positioning determine strong throw even make ball go various curves even straight ball pins player character either male female options bowling ball weights ranging
[]
Validation
4,076
1
MySQLi:mysqli mysqli extension mysql improved relational database driver used php scripting language provide interface mysql databases three main api options considering connecting mysql database server php code consists core optional extensions core functionality php mysql-related extensions mysqli extension mysql extension implemented using php extension framework extension typically exposes api php developer allow facilities used programmatically however extensions use php extension framework expose api php developer pdo mysql driver extension example expose api php developer provides interface pdo layer mysqli improved version older php mysql driver offering various benefits authors php scripting language recommend using mysqli dealing mysql server versions 4.1.3 newer takes advantage new functionality mysqli extension provides various benefits respect predecessor prominent according php website mysqli extension features dual interface supports procedural object-oriented programming paradigms users migrating old mysql extension may prefer procedural interface procedural interface similar old mysql extension many cases function names differ prefix mysqli functions take connection handle first argument whereas matching functions old mysql interface took optional last argument example easy migration old mysql extension mysql server supports use different transport layers connections connections use tcp/ip unix domain sockets windows named pipes hostname codice_1 special meaning bound use unix domain sockets possible open tcp/ip connection using hostname codice_1 must use codice_3 instead example special meaning localhost output hr statements executed mysqli_query mysqli_real_query mysqli_multi_query functions mysqli_query function common combines executing statement buffered fetch result set one call calling mysqli_query identical calling mysqli_real_query followed mysqli_store_result example connecting mysql buffered result sets statement execution results retrieved buffered client read row row client-side result set buffering allows server free resources associated statement results early possible generally speaking clients slow consuming result sets therefore recommended use buffered result sets mysqli_query combines statement execution result set buffering php applications navigate freely buffered results navigation fast result sets held client memory please keep mind often easier scale client scale server example navigation buffered results example output unbuffered result sets client memory short resource freeing server resources early possible keep server load low needed unbuffered results used scrolling unbuffered results possible rows read example navigation unbuffered results result set values data types mysqli_query mysqli_real_query mysqli_multi_query functions used execute non-prepared statements level mysql client server protocol command com_query text protocol used statement execution text protocol mysql server converts data result sets strings sending conversion done regardless sql result set column data type mysql client libraries receive column values strings client-side casting done convert columns back native types instead values provided php strings example text protocol returns strings default example output possible convert integer float columns back php numbers setting mysqli_opt_int_and_float_native connection option using mysqlnd library set mysqlnd library check result set meta data column types convert numeric sql columns php numbers php data type value range allows way example sql int columns returned integers example native data types mysqlnd connection option example output mysql database supports prepared statements prepared statement parameterized statement used execute statement repeatedly high efficiency basic workflow prepared statement execution consists two stages prepare execute prepare stage statement template sent database server server performs syntax check initializes server internal resources later use mysql server supports using anonymous positional placeholder see example mysql database supports stored procedures stored procedure subroutine stored database catalog applications call execute stored procedure call sql statement used execute stored procedure parameter stored procedures inout parameters depending mysql version mysqli interface special notion different kinds parameters parameter input parameters provided call statement please make sure values escaped correctly see examples mysql optionally allows multiple statements one statement string sending multiple statements reduces client-server round trips requires special handling multiple statements multi queries must executed mysqli_multi_query individual statements statement string separated semicolon result sets returned executed statements must fetched mysql server allows statements return result sets statements return result sets one multiple statement see examples mysql server supports transactions depending storage engine used since mysql 5.5 default storage engine innodb innodb full acid transaction support transactions either controlled using sql api calls recommended use api calls enabling disabling auto commit mode committing rolling back transactions examples mysql result set contains metadata metadata describes columns found result set metadata sent mysql accessible mysqli interface extension performs negligible changes information receives differences mysql server versions aligned meta data access mysqli_result interface view persistent connection support introduced php 5.3 mysqli extension support already present pdo mysql ext/mysql idea behind persistent connections connection client process database reused client process rather created destroyed multiple times reduces overhead creating fresh connections every time one required unused connections cached ready reused unlike mysql extension mysqli provide separate function opening persistent connections open persistent connection must prepend p hostname connecting problem persistent connections left unpredictable states clients example table lock might activated client terminates unexpectedly new client process reusing persistent connection get connection cleanup would need done new client process could make good use persistent connection increasing burden programmer persistent connection mysqli extension however provides built-in cleanup handling code cleanup carried mysqli includes ensures persistent connections clean state return connection pool client process uses mysqli extension cleanup automatically calling c-api function mysql_change_user automatic cleanup feature advantages disadvantages though advantage developer longer needs worry adding cleanup code called automatically however disadvantage code could potentially little slower code perform cleanup needs run time connection returned connection pool possible switch automatic cleanup code compiling php mysqli_no_change_user_on_pconnect defined
[ 6029, 6462, 2054 ]
Validation
4,077
3
SSE2:sse2 sse2 streaming simd extensions 2 one intel simd single instruction multiple data processor supplementary instruction sets first introduced intel initial version pentium 4 2000 extends earlier sse instruction set intended fully replace mmx intel extended sse2 create sse3 2004 sse2 added 144 new instructions sse 70 instructions competing chip-maker amd added support sse2 introduction opteron athlon 64 ranges amd64 64-bit cpus 2003 sse2 instructions implement integer vector operations also found mmx instead mmx registers use xmm registers wider allow significant performance improvements specialized applications another advantage replacing mmx sse2 avoiding mode switching penalty issuing x87 instructions present mmx sharing register space x87 fpu sse2 also complements floating-point vector operations sse instruction set adding support double precision data type sse2 extensions include set cache control instructions intended primarily minimize cache pollution processing infinite streams information sophisticated complement numeric format conversion instructions amd implementation sse2 amd64 x86-64 platform includes additional eight registers doubling total number 16 xmm0 xmm15 additional registers visible running 64-bit mode intel adopted additional registers part support x86-64 architecture intel parlance intel 64 2004 fpu x87 instructions provide higher precision calculating intermediate results 80 bits precision default minimise roundoff error numerically unstable algorithms see ieee 754 design rationale references therein however x87 fpu scalar unit whereas sse2 process small vector operands parallel codes designed x87 ported lower precision double precision sse2 floating point certain combinations math operations input datasets result measurable numerical deviation issue reproducible scientific computations e.g calculation results must compared results generated different machine architecture related issue historically language standards compilers inconsistent handling x87 80-bit registers implementing double extended precision variables compared double single precision formats implemented sse2 rounding extended precision intermediate values double precision variables fully defined dependent implementation details registers spilled memory sse2 extends mmx instructions operate xmm registers therefore possible convert existing mmx code sse2 equivalent since sse2 register twice long mmx register loop counters memory access may need changed accommodate however 8 byte loads stores xmm available strictly required although one sse2 instruction operate twice much data mmx instruction performance might increase significantly two major reasons accessing sse2 data memory aligned 16-byte boundary incur significant penalty throughput sse2 instructions older x86 implementations half mmx instructions intel addressed first problem adding instruction sse3 reduce overhead accessing unaligned data improving overall performance misaligned loads last problem widening execution engine core microarchitecture core 2 duo later products since mmx x87 register files alias one another using mmx prevent x87 instructions working desired mmx used programmer must use emms instruction c _mm_empty restore operation x87 register file operating systems x87 used much may still used critical areas like pow extra precision needed cases corrupt floating-point state caused failure emit emms may go undetected millions instructions ultimately causing floating-point routine fail returning nan since problem locally apparent mmx code finding correcting bug time consuming sse2 problem usually provides much better throughput provides registers 64-bit code preferred nearly vectorization work first introduced 2000 sse2 supported software development tools example use sse2 microsoft visual studio project programmer either manually write inline-assembly import object-code external source later visual c++ processor pack added sse2 support visual c++ masm intel c++ compiler automatically generate sse4 ssse3 sse3 sse2 sse code without use hand-coded assembly since gcc 3 gcc automatically generate sse/sse2 scalar code target supports instructions automatic vectorization sse/sse2 added since gcc 4 sun studio compiler suite also generate sse2 instructions compiler flag -xvector=simd used since microsoft visual c++ 2012 compiler option generate sse2 instructions turned default sse2 extension ia-32 architecture based x86 instruction set therefore x86 processors include sse2 amd64 architecture supports ia-32 compatibility mode includes sse2 specification also doubles number xmm registers allowing better performance sse2 also requirement installing windows 8 later microsoft office 2013 later enhance reliability third-party apps drivers running windows 8 following ia-32 cpus support sse2 following ia-32 cpus released sse2 developed implement
[ 3942, 1465, 742, 5055, 2226, 6133, 1881, 766, 5431, 780, 6502, 2977, 1152, 2989, 4765, 6171, 6173, 6523, 3717, 6563, 512, 3747, 6236, 2351, 6956, 4108, 2000, 1252, 5895, 4845, 6256, 3443, 6616, 5934, 584, 3803, 6647, 6675, 971, 1335, 24...
Test
4,078
9
First-generation_programming_language:first-generation programming language first generation programming language 1gl grouping programming languages machine level languages used program first-generation computers originally translator used compile assemble first-generation language first-generation programming instructions entered front panel switches computer system instructions 1gl made binary numbers represented 1s 0s makes language suitable understanding machine far difficult interpret learn human programmer main advantage programming 1gl code run fast efficiently precisely instructions executed directly central processing unit cpu one main disadvantages programming low level language error occurs code easy fix first generation languages much adapted specific computer cpu code portability therefore significantly reduced comparison higher level languages modern day programmers still occasionally use machine level code especially programming lower level functions system drivers interfaces firmware hardware devices modern tools native-code compilers used produce machine level higher-level language 1 nwankwogu s.e 2016 programming languages history
[ 6507, 1908, 3944, 3852, 6712, 1361, 3966, 214, 1102, 7557, 2866, 336, 5171, 1237, 6497, 6498, 1803, 5190 ]
Test
4,079
9
Comparison_of_JavaScript_charting_libraries:comparison javascript charting libraries different javascript charting libraries available comparison features available
[ 562, 2451 ]
Test
4,080
4
OpenStego:openstego openstego open source steganography tools developed samir vaidya released gnu general public license version 2 gplv2 tools detect data hidden openstego
[ 5571, 578 ]
Test
4,081
7
Multicloud:multicloud multicloud use multiple cloud computing storage services single heterogeneous architecture also known polynimbus cloud strategy also refers distribution cloud assets software applications etc across several cloud-hosting environments typical multicloud architecture utilizing two public clouds well multiple private clouds multicloud environment aims eliminate reliance single cloud provider differs hybrid cloud refers multiple cloud services rather multiple deployment modes public private legacy also multicloud environment synchronization different vendors essential complete computation process unlike parallel computing distributed computing environments example enterprise may concurrently use separate cloud providers infrastructure iaas software saas services use multiple infrastructure iaas providers latter case may use different infrastructure providers different workloads deploy single workload load balanced across multiple providers active-active deploy single workload one provider backup another active-passive number reasons deploying multicloud architecture including reducing reliance single vendor cost-efficiencies increasing flexibility choice adherence local policies require certain data physically present within area/country geographical distribution processing requests physically closer cloud unit turn reduces latency mitigating disasters similar use best-of-breed applications multiple developers personal computer rather defaults offered operating system vendor recognition fact one provider everything everyone various issues also present multicloud environment security governance complicated moving parts may create resiliency issues selection right cloud products services also present challenge users may suffer paradox choice
[ 2961, 2390, 330, 6262, 5889 ]
Test
4,082
8
Mod_wsgi:mod wsgi mod_wsgi apache http server module graham dumpleton provides wsgi compliant interface hosting python based web applications apache version 4.5.3 mod_wsgi supports python 2 3 starting 2.6 3.2 alternative mod_python cgi fastcgi solutions python-web integration first available 2007 later versions mod_wsgi may installed one two ways original way apache module commonly used many languages v4 'mod_wsgi express method also supported installed python module using setup.py pip without needing manual intervention apache configuration method simplifies installation python developers familiar python apache also advantages virtualization creates local environment without affecting system settings requiring root access install
[ 6986, 6991, 3290, 3383, 6029, 8006, 3900, 4445, 5432, 5965, 6059, 6858, 87, 6787 ]
Validation
4,083
1
Event_condition_action:event condition action event condition action eca short-cut referring structure active rules event driven architecture active database systems rule traditionally consisted three parts structure used early research active databases started use term eca current state art eca rule engines use many variations rule structure also features considered early research introduced strategies event selection event part memory-based rule engine condition could tests local data actions could updates object attributes database system condition could simply query database result set null passed action part changes database either case actions could also calls external programs remote procedures note database usage updates database regarded internal events consequence execution action part active rule match event part another active rule thus triggering equivalent memory-based rule engine would invoke external method caused external event trigger another eca rule eca rules also used rule engines use variants rete algorithm rule processing
[ 4870 ]
Validation
4,084
3
Aleste:aleste story aleste concerns manmade supercomputer dia 51 infected hybrid virus spreading like wildfire eventually leading dia 51 eliminate human race yuri ray girlfriend gets injured dia assault raymond waizen reason world get rid dia 51 aleste fighter game originally released master system february 1988 version released outside japan power strike us release mail-only limited edition european release normal retail package msx2 version released july year featuring two new stages lowered difficulty series cutscenes version game released phones square enix presumably based msx2 version msx2 version rereleased nintendo wii virtual console service japan along aleste 2 also rereleased now-defunct woomb service aleste followed several sequels also number similar games various aleste entries based example gunhed would inspire super aleste finally known around 1993 various employees left compile joined raizing made similar games
[ 8088 ]
Validation