node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
4,185 | 1 | Ebean:ebean ebean object-relational mapping product written java designed simpler use understand jpa java persistence api jdo java data objects products ebean simpler api jpa achieves 'session less architecture ebean require jpa entitymanager jdo persistencemanager removes concepts detached/attached beans issues associated flushing/clearing 'session management entitymanagers adds make ebean api much easier learn understand use although ebean full orm features equivalent jpa also incorporated 'sql/relational features idea many development efforts require control exact sql calling stored procedures simply solved 'relational approaches ultimate goal ebean combine best orm features jpa best 'relational features products like mybatis single persistence framework ebean uses mapping jpa entity table onetomany etc annotations xml mapping entity beans compatible ebean jpa going beyond jpa ebean supports java generics fetching partial objects query object | [
3077,
2180,
631,
7347,
5571,
5228,
7459,
3879,
2519,
2520,
3915,
6156,
6319,
2619,
6594,
2623,
4287
] | Test |
4,186 | 2 | AsteroidOS:asteroidos asteroidos open source operating system designed smartwatches available firmware replacement android wear devices motto asteroidos project hack wrist asteroidos built like embedded linux distribution openembedded works top linux kernel systemd service manager asteroidos also includes various mobile linux middlewares originally developed mer nemo mobile lipstick mce user interface completely written qt5 framework applications coded qml graphic components coming qt quick qml-asteroid sdk cross-compilation toolchain integrated qt creator generated openembedded easier development asteroid-launcher wayland compositor customizable home screen managing applications watchfaces notifications quick settings asteroid-launcher runs top libhybris compatibility layer make use bionic gpu drivers asteroidos offers bluetooth low energy synchronization capabilities asteroid-btsyncd daemon running top bluez5 reference client named asteroidos sync available android users 1.0 release following applications shipped pre-installed default asteroidos | [
7442,
1109,
5803,
4549,
5571,
2300,
5666
] | Test |
4,187 | 2 | NUbuntu:nubuntu nubuntu network ubuntu project take existing ubuntu operating system livecd full installer remaster tools needed penetration testing servers networks main idea keep ubuntu ease use mix popular penetration testing tools besides usage network server testing nubuntu made desktop distribution advanced linux users nubuntu uses light window manager fluxbox includes used security programs linux wireshark nmap dsniff ettercap april 4 2010 official website closed explanation list previous current releases | [
5200,
1629,
3179,
3444,
7251,
5912,
474,
3780,
7075,
5571,
5658,
1941,
1942,
578,
314,
7587,
2758,
7463,
2585,
1663,
2864,
588,
4165,
6209,
6761,
2511,
3738,
4632,
2063,
4991,
343,
4824,
5523,
5259,
1893,
5530,
5704,
2074,
3751,
968,
22... | Test |
4,188 | 5 | Internet_Protocol_Control_Protocol:internet protocol control protocol computer networking internet protocol control protocol ipcp network control protocol ncp establishing configuring internet protocol point-to-point protocol link ipcp responsible configuring ip addresses well enabling disabling ip protocol modules ends point-to-point link ipcp uses packet exchange mechanism link control protocol ipcp packets may exchanged ppp reached network-layer protocol phase ipcp packets received phase reached silently discarded ipcp ncp protocol code number 0x8021 two endpoints ppp connection must send ipcp configure request peer tcp/ip options independent direction ppp connection ppp endpoint request specific ip address peer also ask peer suggest ip address requesting address 0.0.0.0 peer sends suggestion ipcp nak packet first peer must subsequently request order complete negotiation practice protocols like pppoe commonly used home broadband connections latter method request suggestion nak suggestion request suggested address used set ip address isp client endpoint i.e customer-premises equipment former method request address used inform client isp endpoint ip provider edge equipment similar ncp ipv6 control protocol exists ipv6 used together ipcp ppp connection dual stack link interfacing newer older equipment n't support ipv6 one sees lcp protrej messages protocol 0x8057 side n't support ipv6cp configuration done link able carry ip data payload ppp frame code indicates ip data carried ipcp header code 8 bits. br specifies function performed identifier 8 bits used match requests replies length 16 bits. br size packet including header data variable length. br zero bytes data indicated length field may contain one options ipcp configuration options allow negotiatiation desirable internet protocol parameters ipcp uses configuration option format defined lcp link control protocol separate set options ipcp configuration options option 8 bits length 8 bits data variable length microsoft implementation common ipcp options include ip address ip addresses dns netbios name servers | [
3821,
4188,
5880,
2119,
4649
] | Validation |
4,189 | 9 | LispMe:lispme lispme interpreter scheme programming language developed fred bayer palm os pdas free software released gnu general public license reasonably close standard scheme fully r5rs compliant scheme source programs stored palm os memopad format scheme sessions stored palm os pdb database files interrupted restarted support palm os user interface primitives lispme also provides database support lispme sessions given starter icon appears applications menu enabling session run palm pilot application product ended development august 2008 fairly complete quite robust | [
6778,
7032,
5571
] | Validation |
4,190 | 7 | CISPE_-_Cloud_Infrastructure_Services_Providers_in_Europe:cispe cloud infrastructure services providers europe cispe cloud infrastructure services providers europe trade association gathering infrastructure service iaas cloud providers express views european scale cispe non profit organisation registered belgium declared european union transparency register 041495920038-44 association started since iaas players difficulties make business model understood policy makers association aims advocate eu wide cloud first public procurement policy engage european digital single market including promotion high level security data protection rules/standards well avoiding vendor lock-in although association formally registered early 2017 operating since 2015 order help iaas providers customers reach compliance coming eu general data protection regulation gdpr enter force 25 may 2018 cispe released cispe data protection code conduct top required compliance meet gdpr code also ensures iaas customers may choose data located processed exclusively europe supplier re-use customer data compliance declared cisps/iaas providers service service cispe code conduct launched 27 september 2016 european parliament first 30 services declared first cisps/iaas providers 14 february 2017 announcements received large press coverage across europe including le monde infodsi el pais la repubblica silicon cloud magazine computer sweden tom hardware l'informaticien global security mag eu observer politico computer weekly iapp il corriere della sicurezza lemagit bloomberg tv itr manager heise.de cor.com zdnet eleconomista.es channel europapress 01net register cio dive many others members supportive organizations manage operations 15 european countries including france germany italy ireland uk finland sweden netherlands spain bulgaria poland switzerland companies members cispe and/or supporting code conduct includes arsys art automation aruba aws bit dada daticum dominion enter fasthosts fjordit gigas hetzner online home host europe group ids ikoula leaseweb lomaco netalia netcetera outscale ovh seeweb serverplan solidhost upcloud vtx xxl webhosting 1 1 internet cispe non profit association belgian law general assembly elects within members board less 10 members composition board directors time take account composition rules majority board composed european headquartered companies majority board composed small mid caps eur 1b turnover represent least 3 different eu countries considering worldwide hq location first chairman board alban schmutz general secretary named board first general secretary francisco mingorance board also names code conduct task force cispe cctf charge working evolution improvements cispe data protection code conduct organization open member operating least one iaas service one european country engaging declare least one service cispe code conduct within 6 months | [] | Test |
4,191 | 3 | Balloon_Fight:balloon fight player controls unnamed balloon fighter two balloons attached helmet repeatedly pressing button holding b button causes balloon fighter flap arms rise air balloon popped player flotation decreased making harder rise life lost balloons popped enemy balloon fighters player falls water gets eaten large piranha near surface water hit lightning two modes play 1-player/2-player game goal clear screen enemies balloon trip goal avoid obstacles side-scrolling stage original arcade game include balloon trip level layouts completely different take advantage vertical scrolling addition minor gameplay differences defeat enemies screen clear stage mode played alone co-operatively second player player starts three extra lives 3ds balloon fight port comes download play option allows play along friend another 3ds system enemy balloon fighters float around screen player must hit balloons defeat enemy also fall water eaten fish flying close water surface enemy defeated falls water bubble rise screen hit extra points play progresses stages number enemies platforms increases every three stages bonus stage goal burst balloons float screen chimneys bottom single-player game goal avoid lightning sparks collect balloons aiming move ranks compete high score player starts one life home nintendo entertainment system version ported nec pc-8801 october 1985 sharp x1 november 1985 game boy advance balloon fight-e e-reader united states september 16 2002 part famicom mini series japan may 21 2004 also played animal crossing gamecube nintendo released game watch version name based nes version balloon trip mode protagonist balloon man unlike balloon fighters balloon men use rocket suits instead flapping hands elevate holding balloons sequel balloon fight called balloon kid released october 1990 north america january 31 1991 europe game boy expands game roots revamped full platforming adventure title released japan game boy colorized versions titled hello kitty world published character soft famicom balloon fight gb game boy color later released japan september 2001 game ported sharp zaurus series pdas balloon fighter flipper trophies obtainable super smash bros. melee flipper also usable item replacing bumper previous game balloon fighter considered playable role development super smash bros. melee ice climbers chosen instead original background music balloon trip balloon fight heard melee icicle mountain stage alternate music giant fish makes cameo appearance super smash bros. brawl appears ice climber-based stage summit tries attack players sea addition remixed version main theme titled balloon trip available summit stage well stickers balloon fighter balloon fight enemy collected brawl addition villager animal crossing series uses balloon fighter helmet one special moves super smash bros. nintendo 3ds wii u 3ds version game stage based balloon fight appears original 8-bit graphics stage returns super smash bros ultimate balloon fighter appears spirit said game warioware inc. series 9-volt games based balloon fight also minigame functioning three-dimensional version balloon trip players use wii remote microgame version also use nunchuk complete 3d balloon trip original tech demo yoshi touch go called yoshi balloon trip balloon fight theme touch mode tetris ds although mode almost nothing game music decorative graphics april 12 2007 club nintendo released tingle balloon fight nintendo ds exclusive game featuring tingle nintendo character originated legend zelda series game remake home version featuring balloon fight balloon trip modes levels expanded slightly utilize screens similar arcade game except based entirely around nes levels gallery contained concept art also included piece could unlocked completing specific in-game tasks balloon fighter appears super mario maker unlockable mystery mushroom costume part update balloon fight re-released part nintendo virtual console june 8 2007 balloon fight released europe followed release north america july 16 2007 japan november 12 2007 game released virtual console nintendo 3ds part system ambassador program september 2011 nintendo land attraction called balloon trip breeze similar balloon trip original balloon fight game released wii u virtual console service january 23 2013 north america february 23 2013 part promotion celebrating 30th anniversary release original nintendo famicom balloon fight became first wii u virtual console title released november 11 2016 game alongside 29 games included nes classic edition nintendo classic mini europe nes version balloon fight re-released one launch titles nintendo switch online september 18 2018 | [
1237,
7583
] | Test |
4,192 | 8 | WS-Context:ws-context ws-context web services specification developed oasis organization part ws-caf suite purpose provide means reference shared context relates set interactions web services termed activity context provides details application-specific execution environment services typically included header soap message contexts may passed value reference case retrieved using context manager service context service described allows management activities means begin complete operations create destroy context respectively | [
5500,
345,
3498,
7315,
84
] | Test |
4,193 | 9 | Refal:refal refal recursive functions algorithmic language functional programming language oriented toward symbolic computations including string processing language translation artificial intelligence one oldest members family first conceived 1966 theoretical tool first implementation appearing 1968 refal intended combine mathematical simplicity practicality writing large sophisticated programs one first functional programming languages unlike lisp time refal based pattern matching pattern matching works conjunction term rewriting basic data structure lisp prolog linear list built cons operation sequential manner thus n access list n th element refal lists built scanned ends pattern matching working nested lists well top-level one effect basic data structure refal tree rather list gives freedom convenience creating data structures using mathematically simple control mechanisms pattern matching substitution refal also includes feature called freezer support efficient partial evaluation refal applied processing transformation tree structures similarly xslt refal hello world example shown program includes two functions named go hello function written name function followed function body curly braces go function marked entry point program using entry directive one could think expressions function bodies function calls lisp-like syntax example hello function appears call built-in prout function string 'hello world argument meaning mechanism call however quite different illustrate difference consider following function determines whether string palindrome example shows function complex body consisting four sentences clauses sentence begins pattern followed equal sign followed general expression right hand side sentence terminated semicolon example pattern second sentence function s.1 expression true example shows patterns include pattern variables form character identifying type variable variable matches followed variable identifier variables begin match single symbol begin e match arbitrary expression variable identifier arbitrary alphanumeric sequence optionally separated type identifier dot function executes comparing argument patterns sentences order appear definition first pattern matches function replaces argument expression right hand side matched sentence result function application includes subexpression angle brackets third sentence example applied result processed refal invoking function identified first symbol brackets execution stops result angle brackets expand way function pal thus read informally expression empty replace true otherwise expression single symbol replace true otherwise expression symbol followed arbitrary expression e.2 followed symbol replace expression pal e.2 words throw away two identical symbols beginning end recurse otherwise replace expression false pattern e.1 always matches following three step-by-step execution traces annotated sentence numbers applied step produce next see hello world example fact executes sequence following expression transformations fact 0 1 0 matches 0 number produces 1 symbol number multiply result fact s.n 1 note prefix style operators fact s.n loop s.n 1 seen s.n acts loop counter equal function defined given two terms terms first clause matches produces true else second clause matches produces false important property refal functions refal single argument may decomposed terms expression defining control structures easy e1 evaluated expression entered matches 'true e1 else e2 e2 squeeze first clause matches whenever function squeeze encounters double blanks input expression replaces single blank second clause matches first one returns resultant value current expression squeeze | [
6507,
4543,
8137,
5878,
7416
] | Validation |
4,194 | 2 | Nokia_E90_Communicator:nokia e90 communicator nokia e90 communicator 3g smartphone nokia fifth generation communicator also part eseries announced 11 february 2007 3gsm show barcelona succeeded nokia 9500 communicator unlike predecessors e90 runs s60 platform symbian os 3rd edition feature pack 1 v9.2 respectively previous communicators meanwhile based either geos symbian-based series 80 move common s60 good software compatibility get rid exclusive series 80 ui behaviours e90 also first communicator umts/hsdpa connectivity integrated gps features osgi ercp eclipse rcp embedded systems first nokia e90 unit sold auction jakarta indonesia 17 may 2007 rp 45,000,000 5,000 us indonesia one largest market share nokia communicator series cited reason unit first launch location early user-feedback reviews highlighted defect microphone communicator nokia initially denied existence defect nokia europe later acknowledged q3 earnings report released 18 october 2007 stated issue fully resolved replacement qwerty-ridden interface series 80 s60 software designed used one thumb criticised people communicator firmware version 7.40.1.2 released late october 2007 added support a-gps improved gps performance version also upgraded maps application communicator recent firmware version 400.34.93 free navigation program ovi maps also available communicator currently without free navigation | [
1066,
5979,
2271,
6517,
372,
1724,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
8072,
1544,
2922,
4407,
118,
23,
2564,
3703,
7261,
7545,
5044,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
6378,
6465,
5062,
3039,
3653,
4894,
506... | Test |
4,195 | 3 | NonStop_SQL:nonstop sql nonstop sql commercial relational database management system designed fault tolerance scalability currently offered hewlett packard enterprise latest version sql/mx 3.4 product originally developed tandem computers tandem acquired compaq 1997 compaq later acquired hewlett packard 2002 hewlett packard split 2015 hp inc. hewlett packard enterprise nonstop sql rest nonstop product line went hewlett packard enterprise product primarily used online transaction processing tailored organizations need high availability scalability database system typical users product stock exchanges telecommunications pos bank atm networks nonstop sql designed run effectively parallel computers adding functionality distributed data distributed execution distributed transactions first released 1987 second version 1989 added ability run queries parallel product became fairly famous one systems scales almost linearly number processors machine adding second cpu existing nonstop sql server almost exactly doubled performance second version added /mp name massively parallel third version nonstop sql/mx attempt tandem computers create product ansi sql compliant predecessor nonstop sql/mx shipped nonstop platform since 2002 access tables created nonstop sql/mp although native sql/mx tables offer ansi compliance many oracle-like enhancements hp neoview business intelligence platform built using nonstop sql origins nonstop sql/mx hp oltp database product parts neoview code base open-sourced 2014 name trafodion top-level apache project | [
5735,
1134,
1112,
5772,
6748,
3396,
7248,
6817,
5447,
4747
] | Test |
4,196 | 4 | Internet_police:internet police internet police generic term police government agencies departments organizations charge policing internet number countries major purposes internet police depending state fighting cybercrime well censorship propaganda several attempts made introduce tools would allow law enforcement security agencies eavesdrop online communications without warrant latest bill c-30 tabled february 2012 abandoned strong public opposition computer emergency response team estonia cert estonia established 2006 organization responsible management security incidents .ee computer networks task assist estonian internet users implementation preventive measures order reduce possible damage security incidents help responding security threats cert estonia deals security incidents occur estonian networks started notified citizens institutions either estonia abroad cyber crime investigation cell wing mumbai police india deal computer crimes enforce provisions india information technology law namely information technology act 2000 various cyber crime related provisions criminal laws including indian penal code companies act india subsection it-sector responsibilities corporate measures protect cybersecurity cyber crime investigation cell part crime branch criminal investigation department mumbai police andhra pradesh cyber crime investigation cell wing hyderabad police india deal cyber crimes indian computer emergency response team cert-in also deals cyber security cyber police hi-tech crime enquire cell kerala police dutch police reported set internet brigade fight cybercrime allowed infiltrate internet newsgroups discussion forums intelligence gathering make pseudo-purchase provide services reported 2005 departments provincial municipal governments mainland china began creating teams internet commentators propaganda police departments offering classes marxism propaganda techniques internet reported guide discussion public bulletin boards away politically sensitive topics posting opinions anonymously false names chinese internet police also erase anti-communist comments posts pro-government messages chinese communist party leader hu jintao declared party intent strengthen administration online environment maintain initiative online opinion 2006 coup thailand thai police active monitoring silencing dissidents online censorship internet carried ministry information communications technology thailand royal thai police collaboration communications authority thailand telecommunication authority thailand 29 april 2010 wipas raksakulthai arrested charges lèse majesté following post facebook account criticizing king bhumibol may 2011 amnesty international named prisoner conscience internet watch foundation iwf recognised organisation united kingdom operating internet 'hotline public professionals report exposure potentially illegal content online works partnership police government public internet service providers wider online industry | [
803,
6419,
3855,
1175,
909,
731,
8191,
6908,
3383,
7189,
2043,
7286,
3480,
3821,
431,
1142,
84
] | Test |
4,197 | 3 | List_of_Qualcomm_Snapdragon_systems-on-chip:list qualcomm snapdragon systems-on-chip list qualcomm snapdragon chips snapdragon family mobile system chip soc made qualcomm use smartphones tablets watches smartbook devices three types snapdragon s4 s4 play s4 plus s4 pro launched 2012 snapdragon s4 prime mpq8064 processor announced part snapdragon 600 series snapdragon 208 snapdragon 210 announced september 9 2014 snapdragon 212 announced july 28 2015 qualcomm 205 mobile platform formally falls mobile platform brand practically snapdragon 208 x5 lte modem announced march 20 2017 qualcomm 215 announced july 9 2019 snapdragon 410 announced december 9 2013 qualcomm first 64-bit mobile system chip snapdragon 412 announced july 28 2015 snapdragon 415 older snapdragon 425 later cancelled announced february 18 2015 snapdragon 425 427 430 435 pin software compatible software compatible snapdragon 429 439 450 625 626 632 snapdragon 430 announced september 15 2015 new snapdragon 425 snapdragon 435 announced february 11 2016 snapdragon 427 announced october 18 2016 snapdragon 450 announced june 28 2017 pin software compatible snapdragon 625 626 632 software compatible snapdragon 425 427 429 430 435 439 snapdragon 429 439 announced june 26 2018 snapdragon 429 439 pin software compatibility software compatible snapdragon 425 427 430 435 450 625 626 632 snapdragon 600 announced january 8 2013 snapdragon 610 snapdragon 615 announced february 24 2014 snapdragon 615 qualcomm first octa-core soc snapdragon 616 announced july 31 2015 snapdragon 617 announced september 15 2015 snapdragon 625 announced february 11 2016 snapdragon 626 announced october 18 2016 snapdragon 625 626 632 450 pin software compatible software compatible snapdragon 425 427 429 430 435 439 snapdragon 618 snapdragon 620 announced february 18 2015 since renamed snapdragon 650 snapdragon 652 respectively snapdragon 653 announced october 18 2016 snapdragon 630 636 660 pin software compatible snapdragon 630 snapdragon 660 announced may 9 2017 snapdragon 636 announced october 17 2017 snapdragon 632 announced june 26 2018 pin software compatible snapdragon 625 626 450 software compatible snapdragon 425 427 429 430 435 439 snapdragon 670 announced august 8 2018 pin software compatible snapdragon 710 snapdragon 675 announced october 22 2018 snapdragon 665 announced april 9 2019 february 27 2018 qualcomm introduces new snapdragon 700 mobile platform series snapdragon 710 announced may 23 2018 pin software compatible snapdragon 670 snapdragon 712 announced february 6 2019 snapdragon 730 730g announced april 9 2019 snapdragon 802 chip 8092 use smart tvs formerly announced qualcomm later confirmed released demand processors market smaller anticipated snapdragon 800 announced january 8 2013 snapdragon 801 announced february 24 2014. notable features snapdragon 805 announced november 20 2013 snapdragon 808 810 announced april 7 2014 snapdragon 808 notable features predecessor 805 snapdragon 810 notable features lower end 808 snapdragon 820 announced mobile world congress march 2015 first phones featuring soc released early 2016 snapdragon 821 announced july 2016 821 provides 10 improvement performance 820 due faster clocked cpu otherwise similar features qualcomm stating 821 designed complement rather replace 820. notable features predecessor snapdragon 808 810 snapdragon 835 announced november 17 2016 snapdragon 835 mobile compute platform windows 10 pcs announced december 5 2017. notable features predecessor 821 snapdragon 845 announced december 7 2017 snapdragon 845 notable features snapdragon 850 mobile compute platform windows 10 pcs announced june 4 2018 essentially over-clocked version snapdragon 845 snapdragon 855 announced december 5 2018 snapdragon 855 qualcomm first 7 nm finfet chipset notable features predecessor 845 snapdragon 8cx compute platform windows 10 pcs announced december 6 2018. notable features 855 snapdragon 855+ announced july 15 2019 different video codecs supported snapdragon socs decode e encode fhd fullhd 1080p 1920x1080px hd 720p 1366x768px 1280x720px different video codecs supported snapdragon 200 series different video codecs supported snapdragon 400 series different video codecs supported snapdragon 600 series different video codecs supported snapdragon 700 series different video codecs supported snapdragon 800 series qualcomm snapdragon wear 2100 processor designed smartwatches available connected 4g/lte 3g tethered bluetooth wi-fi versions lg watch style uses processor snapdragon wear 2500 announced june 26 2018 snapdragon wear 3100 announced september 10 2018 snapdragon 602a application motor industry announced january 6 2014 snapdragon 820a announced january 6 2016 snapdragon 410e embedded snapdragon 600e embedded announced september 28 2016 snapdragon 800 embedded snapdragon 810 embedded snapdragon 820e embedded announced february 21 2018 qualcomm vision intelligence platform announced april 11 2018 qualcomm vision intelligence platform purpose built bring powerful visual computing edge computing machine learning wide range iot devices qualcomm smart audio platform apq8009 apq8017 announced june 14 2017 qualcomm 212 home hub apq8009 qualcomm 624 home hub apq8053 announced january 9 2018 qcs400 series announced march 19 2019 may 2018 qualcomm announced snapdragon xr1 platform first purpose-built soc augmented reality virtual reality mixed reality qualcomm also announced htc vive pico meta vuzix would announcing consumer products featuring xr1 end 2018 following qualcomm acquisition csr 2015 qualcomm designs ultra-low-power bluetooth socs csr qca qcc brands wireless headphones earbuds qualcomm worked amazon google reference designs help manufactures develop headsets support alexa google assistant google fast pair qualcomm announced qcc5100 series ces 2018 | [
2539,
6082,
6421,
7890,
722,
2926,
5740,
1473,
5750,
740,
5752,
5405,
5406,
1864,
768,
67,
446,
451,
6874,
6165,
463,
804,
5472,
469,
4041,
5473,
3008,
3365,
6910,
5845,
7654,
6919,
3397,
6219,
1977,
2339,
1237,
2711,
1995,
550,
3786,
... | Validation |
4,198 | 8 | Clean_URL:clean url clean urls also sometimes referred restful urls user-friendly urls search engine-friendly urls uniform resource locators urls intended improve usability accessibility website web service immediately intuitively meaningful non-expert users url schemes tend reflect conceptual structure collection information decouple user interface server internal representation information reasons using clean urls include search engine optimization seo conforming representational state transfer rest style software architecture ensuring individual web resources remain consistently url makes world wide web stable useful system allows durable reliable bookmarking web resources clean urls also contain implementation details underlying web application carries benefit reducing difficulty changing implementation resource later date example many urls include filename server-side script underlying implementation resource changed urls would need change along likewise urls clean site database moved restructured potential cause broken links internally external sites latter lead removal search engine listings use clean urls presents consistent location resources user-agents regardless internal structure potential benefit use clean urls concealment internal server application information improve security system url often comprise path script name query string query string parameters dictate content show page frequently include information opaque irrelevant users—such internal numeric identifiers values database illegibly-encoded data session ids implementation details clean urls contrast contain path resource hierarchy reflects logical structure users easily interpret manipulate implementation clean urls involves url mapping via pattern matching transparent rewriting techniques usually takes place server side clean url often form seen user search engine optimization purposes web developers often take opportunity include relevant keywords url remove irrelevant words common words removed include articles conjunctions descriptive keywords added increase user-friendliness improve search engine rankings fragment identifier included end clean url references within page need user-readable systems define slug part url identifies page human-readable keywords usually end part url interpreted name resource similar basename filename title page name based use word slug news media indicate short name given article internal use slugs typically generated automatically page title also entered altered manually page title remains designed display human readability slug may optimized brevity consumption search engines long page titles may also truncated keep final url reasonable length slugs may entirely lowercase accented characters replaced letters english alphabet whitespace characters replaced dash underscore avoid encoded punctuation marks generally removed also remove short common words conjunctions example original title outré collection would generated slug | [
2086,
6986,
3935,
5151,
7390,
2054,
84,
2079,
5355,
3999,
1805,
6024
] | Validation |
4,199 | 3 | Disk_array:disk array disk array disk storage system contains multiple disk drives differentiated disk enclosure array cache memory advanced functionality like raid virtualization components typical disk array include typically disk array provides increased availability resiliency maintainability using additional redundant components controllers power supplies fans etc often point single points failure spofs eliminated design additionally disk array components often hot-swappable typically disk arrays divided categories primary vendors storage systems include coraid inc. datadirect networks dell emc fujitsu hewlett packard enterprise hitachi data systems huawei ibm infortrend netapp oracle corporation panasas pure storage companies often act oem vendors market storage components manufacture | [
1160,
1640,
5380,
2390,
7822,
2032,
6454,
7189,
6461,
1391,
1394,
5502,
6748,
1670,
3134,
5447,
1315,
7213,
1134,
1703,
3244,
2442,
6505
] | Train |
4,200 | 3 | SpursEngine:spursengine spursengine microprocessor toshiba built media oriented coprocessor designed 3d- video processing consumer electronics set-top boxes computers spursengine processor also known quad core hd processor announced 20 september 2007 spursengine stream processor powered four synergistic processing elements spe also used cell processor featured sony playstation 3 processing elements fed chip h.264 mpeg-2 codecs controlled die host cpu connected chip pcie controller contrast cell processor chip cpu ppe similar work enable smoother interaction host spursengine toshiba also integrated simple proprietary 32-bit control core spursengine employs dedicated xdr dram working memory spursengine designed work much lower frequencies cell toshiba also optimized circuit layout spes reduce size 30 resulting chip consumes 10-20 w power spursengine accessible developer device driver developed windows linux systems software supporting spursengine limited primarily realm video editing encoding first generation spursengine processors specified follows april 2008 toshiba shipped samples spursengine se1000 device pcie-based reference board toshiba included spursengine processors qosmio laptops models f50 g50 g55 third quarter 2008 | [
6597,
450,
4759,
4479,
4408,
5042,
578,
4242,
5665,
1388,
7509,
2139,
4718,
239,
763,
2873,
602,
2601,
3234,
357,
1606,
1244,
4839
] | Validation |
4,201 | 4 | Kenneth_Minihan:kenneth minihan kenneth a. minihan born december 31 1943 former united states air force lieutenant general served director national security agency defense intelligence agency retiring may 1 1999 minihan born pampa texas entered united states air force 1966 distinguished graduate reserve officer training corps program florida state university also member phi kappa psi served senior intelligence officer air force senior staff officer positions pentagon headquarters tactical air command langley air force base virginia electronic security command kelly air force base texas defense intelligence agency washington d.c. national security agency fort george g. meade maryland commanded squadrons groups major air command united states overseas assistant chief staff intelligence headquarters united states air force washington d.c. director defense intelligence agency retiring united states air force minihan served president security affairs support association 1999 2002 currently serves managing director paladin capital group | [
4210,
5914,
820,
6627,
1278,
3716,
4969,
4429,
7917,
5412,
5767,
5509,
4988,
2343,
4996,
1701
] | Test |
4,202 | 3 | Weitek:weitek weitek corporation american chip-design company originally focused floating-point units number commercial cpu designs early mid-1980s weitek designs could found powering number high-end designs parallel-processing supercomputers early 1990s cpu designs started including fpus built system basically “ free ” weitek made series attempts break general cpu graphics driver market 1995 company almost dead late 1996 remains purchased rockwell semiconductor systems quickly disappeared weitek started 1981 several intel engineers left form company weitek developed math coprocessors several systems including based motorola 68000 family 1064 intel-based i286 systems 1067 intel fpu design i386 fell far behind development weitek delivered 1167 later upgrades design led 2167 3167 4167 weitek would later deliver similar fpus mips architecture known xl line weitek fpus several differences compared x87 offerings lacking extended double precision register-file rather stack-based model orders increased supercomputer applications weitek found seriously disadvantaged fab becoming rather “ outdated ” hp approached deal use newer fabs proved advantageous soon hp ’ fabs open anyone weitek also worked hp design latest pa-risc design sold version known risc 8200 sold embedded design use laser printers late 1980s weitek saw new opportunity started developing frame buffers sun microsystems workstations early 1990s also introduced sparc power µp “ power-up ” technically referred wtl 8601 pin-compatible version sparc processor µp could dropped existing sparcstation 2 sparcstation ipx workstations ran 80 mhz double clock speed cpus replaced 8701 ran twice fast internally providing boost 50–60 overall speed due bus getting faster however pursue concept later generations sparc processors weitek turned frame-buffer experience pc market early 90s introduced series svga multimedia chipsets known “ power ” systems consisting two chips one drawing graphics known p9000 another handling output videopower 5x86 power series used number third-party designs based vesa local bus standard p9001 moved pci became fairly popular 1994 known viper designs diamond orchid final generation p9100 combined p9001 5286 single chip weitek adapters fairly successful early days 486 market fell use less expensive systems introduced host new players mid-1990s weitek attempted re-enter low-end market w464 486 w564 p5 systems used host machine ram frame buffer lower costs one reasons company purchased rockwell shortly shipped | [
5055,
7010,
1023,
3764,
8139,
1237,
4372,
4479,
352,
6236,
971
] | Test |
4,203 | 8 | Web_Services_Flow_Language:web services flow language web services flow language 1.0 wsfl xml programming language proposed ibm 2001 describing web services compositions language considered two types compositions first type describing business processes collection web services second describing interactions partners wsfl proposed layered top web services description language 2003 ibm microsoft combined wsfl xlang bpel4ws submitted oasis standardization oasis published bpel4ws ws-bpel properly fit naming ws-* standards web services endpoint language wsel xml format proposed used description non-operational characteristics service endpoints quality-of-service cost security properties format proposed part report published web service flow language never gained wide acceptance | [
6986,
1760,
5631,
3498,
6714
] | Train |
4,204 | 9 | MIIS_(programming_language):miis programming language miis meditech interpretive information system mumps-like programming language created a.neil pappalardo curt w. marble dec pdp mass general hospital 1964 1968 mumps evolution took two major directions mumps proper miis mumps became ansi iso-standard language many mumps implementations standardized compatible miis standardize became proprietary system instead example differences mumps miis value logical expression mumps may false zero 0 true non-zero canonically one 1 miis value false empty string value true string consisting ascii delete character code 127 decimal also philosophical difference dialects miis often takes approach code march along regardless possible errors mumps error prevent serious problems example encountering undefined variable mumps generates error miis treats nil 1980s brigham women hospital massachusetts used miis program data general mainframe 1986 scamc reported vancouver general hospital also integrated cardiology patient management system written miis miis language used programming library systems well health industry systems oclc library system one example also used create financial systems insurance brokers seen ireland uk late 1970s | [
4946
] | Validation |
4,205 | 7 | Powtoon:powtoon powtoon company sells cloud-based software saas creating animated presentations animated explainer videos powtoon founded january 2012 following 180k seed round investment december 2011 company released beta version august 2012 seen fast subscriber growth since december 2012 powtoon secured 600,000 investment los angeles-based venture capital firm startup minds february 2013 powtoon introduced free account option allowing users create animated videos exported youtube free videos include powtoon branding powtoon web-based animation software allows users create animated presentations manipulating pre-created objects imported images provided music user-created voice-overs powtoon uses apache flex engine generate xml file played powtoon online viewer exported youtube downloaded mp4 file powtoon also available google chrome store application edmodo.com | [
330
] | Test |
4,206 | 3 | The_Tower_of_Cabin:tower cabin tower cabin unusual spinoff fantasy role-playing video game series called japanese developer microcabin tower cabin released microcabin decided discontinue development msx tower cabin also ported nec pc9801 game player plays new microcabin employee wander microcabin headquarters building japan goal work various lead programmers developers making company successful similar japanese game known segagaga dreamcast player runs entire sega company president sega corporation game featured many characters xak series latok fray pixie two unlockable mini-games tower cabin short fighting game pixie fray text adventure called crusader took place within xak universe game setting takes place microcabin office building japan player descends ascends various floors throughout building carrying various business related tasks besides main character player several miscellaneous npc player talk order proceed game addition characters microcabin games make cameo appearance game played traveling office building various departments relaying information employees completing various business related tasks order ensure success microcabin company | [
2955,
7354
] | Test |
4,207 | 2 | List_of_tools_to_create_Live_USB_systems:list tools create live usb systems list utilities creating live usb multiboot means tool allows multiple systems usb stick well bootloader usb flash drive choose system load boot time | [
5540,
3602,
2179,
4119,
5197,
3271,
6528,
4496,
5571,
2930,
3042,
5524,
2074,
3919,
788
] | Test |
4,208 | 4 | ARP_spoofing:arp spoofing computer networking arp spoofing arp cache poisoning arp poison routing technique attacker sends spoofed address resolution protocol arp messages onto local area network generally aim associate attacker mac address ip address another host default gateway causing traffic meant ip address sent attacker instead arp spoofing may allow attacker intercept data frames network modify traffic stop traffic often attack used opening attacks denial service man middle session hijacking attacks attack used networks use arp requires attacker direct access local network segment attacked address resolution protocol arp widely used communications protocol resolving internet layer addresses link layer addresses internet protocol ip datagram sent one host another local area network destination ip address must resolved mac address transmission via data link layer another host ip address known mac address needed broadcast packet sent local network packet known arp request destination machine ip arp request responds arp reply contains mac address ip arp stateless protocol network hosts automatically cache arp replies receive regardless whether network hosts requested even arp entries yet expired overwritten new arp reply packet received method arp protocol host authenticate peer packet originated behavior vulnerability allows arp spoofing occur basic principle behind arp spoofing exploit lack authentication arp protocol sending spoofed arp messages onto lan arp spoofing attacks run compromised host lan attacker machine connected directly target lan generally goal attack associate attacker host mac address ip address target host traffic meant target host sent attacker host attacker may choose inspect packets spying forwarding traffic actual default destination avoid discovery modify data forwarding man-in-the-middle attack launch denial-of-service attack causing packets network dropped simplest form certification use static read-only entries critical services arp cache host ip address-to-mac address mappings local arp cache may statically entered hosts n't need transmit arp requests entries exist static entries provide security spoofing result maintenance efforts address mappings systems network must generated distributed scale large network since mapping set pair machines resulting n n arp entries configured n machines present machine must arp entry every machine network n-1 arp entries n machines software detects arp spoofing generally relies form certification cross-checking arp responses uncertified arp responses blocked techniques may integrated dhcp server dynamic static ip addresses certified capability may implemented individual hosts may integrated ethernet switches network equipment existence multiple ip addresses associated single mac address may indicate arp spoof attack although legitimate uses configuration passive approach device listens arp replies network sends notification via email arp entry changes antiarp also provides windows-based spoofing prevention kernel level arpstar linux module kernel 2.6 linksys routers drops invalid packets violate mapping contains option repoison/heal virtualized environment kvm also provides security mechanism prevent mac spoofing guest running host additionally ethernet adapters provides mac vlan anti-spoofing features openbsd watches passively hosts impersonating local host notifies case attempt overwrite permanent entry operating systems react differently linux ignores unsolicited replies hand uses responses requests machines update cache solaris accepts updates entries timeout microsoft windows behavior arp cache configured several registry entries hkey_local_machine\system\currentcontrolset\services\tcpip\parameters arpcachelife arpcacheminreferencelife arpuseethersnap arptrsingleroute arpalwayssourceroute arpretrycount techniques used arp spoofing also used implement redundancy network services example software allows backup server issue gratuitous arp request order take defective server transparently offer redundancy arp spoofing often used developers debug ip traffic two hosts switch use host host b communicating ethernet switch traffic would normally invisible third monitoring host m. developer configures mac address b b mac address also configures forward packets monitor traffic exactly man-in-the-middle attack tools used carry arp spoofing attacks | [
5194,
96,
6976,
4396,
7623,
2466,
1640,
651,
2119,
4509,
5492,
3797,
6026,
2944,
57,
3484,
3821,
6574,
7216,
1691,
7039,
3828,
259,
5181,
2894,
5884,
1708,
3426
] | Test |
4,209 | 1 | DBEdit:dbedit dbedit 2 database editor connect oracle db2 mysql database provides jdbc driver runs windows linux solaris dbedit free open source software distributed gnu general public license source code hosted sourceforge dbedit developed jef van den ouweland first windows version released january 2006 used edit oracle db2 database written java later generic jdbc support added application could connect basically type database provides jdbc driver one year first release support operating systems linux solaris added last version dbedit released may 2012 | [
7213,
6462,
4759,
5571,
578,
6386,
4964
] | Test |
4,210 | 4 | John_Michael_McConnell:john michael mcconnell john michael mcconnell born july 26 1943 former vice admiral united states navy naval career served director national security agency 1992 1996 civilian career includes serving united states director national intelligence 20 february 2007 27 january 2009 bush administration seven days obama administration currently vice chairman booz allen hamilton mcconnell born grew greenville south carolina mcconnell received commission united states navy 1967 worked intelligence officer j2 chairman joint chiefs staff united states secretary defense operation desert shield/storm dissolution soviet union developed improving information flow among intelligence agencies combat forces gulf war 1992 1996 mcconnell served director national security agency nsa led nsa adapted multi-polar threats brought end cold war leadership nsa routinely provided global intelligence information security services white house cabinet officials united states congress broad array military civilian intelligence customers also served member director central intelligence senior leadership team address major intelligence programmatic substantive issues 1992 1996 1996 mcconnell retired navy vice admiral 29 years service – 26 career intelligence officer addition many nation highest military awards meritorious service holds nation highest award service intelligence community also served chairman intelligence national security alliance mcconnell second person hold position director national intelligence nominated president george w. bush january 5 2007 sworn bolling air force base washington d.c. february 20 2007 mcconnell appointment post initially greeted broad bipartisan support although since attracted criticism advocating bush administration controversial policies nomination dni mcconnell served senior vice president consulting firm booz allen hamilton focusing intelligence national security areas 2005 confirmation dni 2007 also chairman board intelligence national security alliance premier not-for-profit nonpartisan private sector professional organization providing structure interactive forum thought leadership sharing ideas networking within intelligence national security communities whose members include leaders industry government academia tuesday august 14 2007 mcconnell visited texas house intelligence committee chairman silvestre reyes review border security granted wide-ranging interview el paso times newspaper surprised many intelligence community candor sensitive topics recent changes foreign intelligence surveillance act nsa warrantless surveillance controversy end interview mcconnell cautioned reporter chris roberts consider whether enemies u.s. could gain information shared leaving paper decide publish el paso times put entire unexpurgated interview website august 22 executive editor dionicio flores saying n't believe damaged national security endangered people resurgent taliban back charge parts afghanistan mcconnell told cnn february 27 2008 assessment differed one made january 2008 defense secretary robert gates january 24 2009 announced mcconnell would return booz allen senior vice president two months taking office mcconnell created series initiatives designed build foundation increased cooperation reform u.s. intelligence community ic plan dubbed 100 day plan integration collaboration focused efforts enable ic act unified enterprise collaborative manner focused six enterprise integration priorities 100 day plan accomplished launch civilian joint duty program improved security clearance processing times increased diversity intelligence workforce information sharing across community 500 day plan designed sustain momentum expanded set initiatives greater level participation set deepen integration community people processes technologies plan address new performance management framework entail six performance elements agencies must entail 100 day plan meant jump start series initiatives based deliberate planning process specific deadlines measures ensure needed reforms implemented 500 day plan started august 2007 designed accelerate sustain momentum expanded set initiatives broader ic participation contains 10 core initiatives tracked senior leadership intelligence community 33 enabling initiatives initiatives based six focus areas described 100 day plan top initiatives director mcconnell ended office near 400th day 500-day plan mcconnell approached congress early august 2007 need modernize fisa claiming two changes needed initial efforts began april – see factsheet first intelligence community required technology changes since 1978 obtain court orders effectively collect foreign intelligence foreign targets located overseas also argued telecoms sued violating nation wiretapping laws must protected liability—regardless veracity charges shortly thereafter mcconnell took active role capitol hill legislation drafted congress august 3 mcconnell announced strongly oppose house proposal n't strong enough heated debate congress updated fisa passing protect america act 2007 september 10 2007 testimony senate committee homeland security governmental affairs mcconnell asserted recently passed protect america act 2007 eased restrictions fisa helped foil major terror plot germany u.s. intelligence-community officials questioned accuracy mcconnell testimony urged office correct statement issued september 12 2007 critics cited incident example bush administration exaggerated claims contradictory statements surveillance activities counterterrorism officials familiar background mcconnell testimony said believe made inaccurate statements intentionally part strategy administration persuade congress make new eavesdropping law permanent officials said believed mcconnell gave wrong answer overwhelmed information merely mixed facts testimony mcconnell blamed death kidnapped american soldier iraq requirements fisa slowness courts however timeline later released showed delays mostly inside nsa casting doubt mcconnell truthfulness mcconnell speaking congressional panel defense protect america act said russian chinese foreign intelligence services nearly active cold war september 18 2007 testimony house judiciary committee mcconnell addressed nsa warrantless surveillance controversy saying agency conducted telephone surveillance americans without obtaining warrant advance since became director national intelligence february 2007 mcconnell called fisa foundational law important legacy protecting rights americans passed era watergate aftermath church pike investigations stressed changes honor legacy privacy foreign threats july 2008 director mcconnell issued directive icd 205 analysts build relationships outside experts topics concern intelligence community—a recommendation highlighted wmd commission report director mcconnell worked white house overhaul executive order 12333 outlines fundamental guidance intelligence agencies mcconnell believes update necessary incorporate intelligence community ’ new organizations new technologies methods redo expected help sixteen intelligence agencies work together reflect post 9/11 threat environment july 2008 president bush issued executive order 13470 amended 12333 one mcconnell last acts dni signed icd501 discovery dissemination retrieval information within intelligence community dramatically increase access several databases held various agencies community policy establishes rules govern disputes access granted dni final adjudicator resolve disputes organizations also established intelligence information integration program i2p leadership then-cio patrick gorman nsa-cio dr. prescott winter goal i2p create shared infrastructure family shared services means increase information access sharing collaboration throughout us intelligence community mcconnell led effort create integrated planning programming budgeting system fully integrate optimize capabilities intelligence community previously agency budget developed independently aggregated congress issuance icd106 strategic enterprise management ic sem intelligence community budget closely aligned strategic goals objectives requirements performance criteria icd 106 replaced icd 116 2011 early april 2010 admiral mcconnell called expanding powers dni giving tenure creating department intelligence dni oversee fully control settle continued fighting amongst agencies within various departments | [
820,
6627,
1278,
3716,
4429,
7917,
5412,
5767,
5509,
6756,
7120,
4988,
1687,
2343,
4996,
1701,
4201
] | Test |
4,211 | 7 | SAP_Converged_Cloud:sap converged cloud sap converged cloud private managed cloud developed marketed sap set cloud computing services offers managed private cloud based openstack technology-based public cloud used sap organization internal resources create mix different cloud computing environments made openstack services offers compute storage platform services accessible sap 2012 sap promoted aspects cloud computing october 2012 sap announced platform service offering called sap cloud platform may 2013 managed private cloud offering called s/4hana enterprise cloud service announced sap converged cloud announced january 2015 sap converged cloud managed sap business unit established 2015 named converged cloud unit headed markus riedinger unit manager converged cloud beta went live may 2017 included openstack technology-based storage compute network components shared new services made sap later designate dns service added well 2017 year sap charged superior cloud innovation customers sizes sap s/4hana cloud sap ariba sap successfactors sap cloud applications customers access complete portfolio cloud-based solutions support digital transformation journeys june 7 2017 sap announced company plans invest 1 billion cloud next two years business organizations want use cloud computing choice using private cloud cloud infrastructure run specifically single organization built third-party public cloud whereby service provider makes available applications storage resources general public decision use based number factors whether company operates highly regulated sector pharmaceuticals industry must comply rules regarding control security data business must bring services market quickly web applications developer first would opt private cloud security peace mind web developer would choose public cloud offering companies would operate mixture two also known hybrid cloud delivery employing hybrid delivery cloud strategy lets organizations use different cloud delivery services specific applications instance public cloud may cost-effective service compute-intensive task processing analytics data would remain local private comply regulations hybrid delivery strategy lets organizations run applications services across different clouds collocation data centers example benefit delivery mechanism organizations move app one geographic location another major storms different types hybrid clouds specific tasks infrastructure service iaas model hybrid cloud could use operating systems virtualization technologies public private cloud infrastructure provide cloud services models mix on-premises cloud public cloud technologies include platform service paas includes infrastructure services combined development tools middleware software service saas used develop packaged software however moving data cloud difficult procedure case software service saas difficult particularly incumbent cloud provider used proprietary software altered open source application way mitigate cloud migration difficulties architect applications cloud reduce eliminate dependencies cloud application stack capabilities cloud service provider another way select generic higher-level applications move cloud first place another method select open standards cloud computing best practice avoiding cloud migration problems use management platform support applications environment user organization likely use described using best-of-breed approach companies engage cloud professional services consultants help plan incorporate cloud services business operations consultants advise businesses whether use public private hybrid delivery model implement consume delivery models example cloud professional services consultants might recommend businesses interested cost savings place appropriate applications public cloud keep higher-security application private cloud hybrid cloud 2013 competitive vendor analysis report international data corporation market research firm authors state cloud professional services help companies map short-term long-term strategy use cloud way aids business goals common reason businesses engage cloud professional services assistance incorporating cloud technology existing environments plan implement cloud according study published february 2014 independent research firm technology business research inc according published reports use cloud professional services indicates businesses adequate internal resources knowledgeable implementing cloud sap converged cloud follows premise converged infrastructure integration compute storage networking components technologies self-provisioning pools shared resources supported services one benefits data center based converged infrastructure including converged infrastructure data center delivers cloud services manual tasks automated thus reducing time cost carry sap converged cloud supporting vmware hypervisors supports multiple operating systems microsoft red hat ubuntu etc supports wide range development environments based openstack technology means compatible public cloud platforms based openstack technology rackspace nebula sap converged cloud consultants work sap users help configure best cloud approach users receive advice implement cloud consistent manner get value cloud investment users also receive advice manage cloud sap cloud marketing—delivers information possible uses cloud services solutions identifies opportunities begin implementing cloud sap converged cloud includes security features businesses connect private cloud on-site network using software-defined networking technology multiple copies virtual lan vlan supplied providing method businesses connect firewall on-site network converged cloud appearing part on-site network backup service load balancing using f5 networks allows service load balancing across virtual servers cloud storage data stored off-site file systems server operating systems sap retains local backups postgresql swift containers 30 days user organizations choose 50gb 100gb one-terabyte blocks storage area network san storage server nodes high-availability clustering added instances microsoft windows server red hat enterprise linux suse linux enterprise server sap converged cloud service solution sap hana private service developed sap sap hana in-memory database migration services businesses want move sap hana platform system designed enable businesses analyze big data november 2016 sap opened walldorf first data centers host converged cloud according published reports data centers provide disaster recovery services high availability | [
1254,
4295,
2988,
7613,
632,
1634,
3091,
6262,
3627,
6806,
5571,
5927,
2212,
578,
5135,
3637,
1757,
3028,
842,
5064,
330,
7848,
7756,
5956,
2961,
2700,
5965,
7037,
6586,
1514,
5889
] | Train |
4,212 | 3 | Computer_compatibility:computer compatibility family computer models said compatible certain software runs one models also run models family computer models may differ performance reliability characteristic differences may affect outcome running software software compatibility refer compatibility particular software running particular cpu architecture intel powerpc software compatibility also refer ability software run particular operating system rarely compiled software compatible multiple different cpu architectures normally application compiled different cpu architectures operating systems allow compatible different system interpreted software hand normally run many different cpu architectures operating systems interpreter available architecture operating system software incompatibility occurs many times new software released newer version operating system incompatible older version operating system may miss features functionality software depends hardware compatibility refer compatibility computer hardware components particular cpu architecture bus motherboard operating system hardware compatible may always run highest stated performance nevertheless work legacy components example ram chips run lower sometimes higher clock rate rated hardware designed one operating system may work another device kernel drivers unavailable example much hardware mac os x proprietary hardware drivers unavailable use operating systems linux | [
2087,
3767,
7801,
7069,
7631,
5571,
578,
2403,
3308,
2773,
2056,
4543,
3915,
6778,
2263
] | Test |
4,213 | 6 | StuffIt_Expander:stuffit expander stuffit expander proprietary freeware closed source decompression software utility developed allume systems subsidiary smith micro software formerly known aladdin systems runs classic mac os macos microsoft windows prior 2011 linux version also available download latest version mac platform follows stuffit target criticism dissatisfaction mac users past file format changes frequently notably introduction stuffit version 5.0 expander 5.0 contained many bugs file format readable earlier version 4.5 leaving mac users time without viable compression utility latest stand-alone version windows 2009 13.0 unlike version 12.0 able decompress newer .sitx zip archives version 2009 claims able decompress 30 formats listed executables require .net v2.0 framework msvc 2008 9.0 runtimes previous stand-alone version able decompress .sit classic mac os-specific archives 7.02 distributed stuffit v7.0.x windows versions 7.5.x 11 expander capabilities actually performed stuffit standard edition allowed decompression even end trial period start stuffit expander mode following command line switches used -expand -uiexpander note registration reminder dialogue box shown case older versions stuffit expander classic mac os platform stuffit expander 3.5 possible enhance capabilities stuffit expander add support decompressing additional archive formats means shareware dropstuff expander enhancer software aladdin systems also command line dos application called unstuff v1.1 allows decompression .sit files stuffit expander 2009 decompresses files following formats | [
7058,
985,
4759,
1352,
7814,
6992,
2566,
5571,
578,
4700,
405,
1955,
7746,
3032,
7201,
7387,
3219,
510,
1675,
8126,
1127,
2334,
6940,
4732,
4453,
5256,
3152,
169,
1139,
5349,
2530,
4461,
2897,
619
] | Test |
4,214 | 2 | IOS_8:ios 8 ios 8 eighth major release ios mobile operating system developed apple inc. successor ios 7 announced company worldwide developers conference june 2 2014 released september 17 2014 succeeded ios 9 september 16 2015. ios 8 incorporated significant changes operating system introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories ability answer calls reply sms mac ipad continuity includes handoff feature lets users start task one device continue another changes included new spotlight suggestions search results feature provides detailed results family sharing family link together accounts share content one parent administrator permission controls updated keyboard quicktype providing contextual predictive word suggestions extensibility allows easier sharing content apps third-party developers got additional features integrate apps deeper operating system including support widgets notification center ability make keyboards users replace default ios keyboard app updates release included new health app aggregate data different fitness apps well enabling medical id accessible lock screen emergencies support icloud photo library photos app enables photos synchronized stored cloud icloud drive lets users store files cloud browse across devices ios 8.4 apple updated music app streaming service called apple music 24-hour radio station called beats 1 reception ios 8 positive critics praised continuity extensibility major features enabling easier control interaction different apps devices also liked quicktype keyboard word suggestions highlighted spotlight suggestions making iphone almost portable search portal everything however reviewers noted full potential ios 8 would realized third-party developers integrated apps support new features particularly widgets notification center roughly week release ios 8 reached 46 ios usage share october 2014 reported adoption rate stalled increasing single percentage point previous month situation blamed requirement high amount free storage space install upgrade especially difficult iphones sold 8 16 gigabytes maximum storage space following december ios 8 reached 63 usage share notable 16 increase october measurement ios 8 introduced company worldwide developers conference june 2 2014 first beta made available conference attendees keynote presentation ios 8 officially released september 17 2014. ios 8.0.1 released september 24 2014 first update ios 8 update meant bring various bug fixes however update withdrawn due issue disabled touch id cellular network connectivity models apple instead recommended affected users reinstall initial ios 8 release wait version 8.0.2 ready ios 8.0.2 released september 25 2014 day release ios 8.0.1 included fixes bugs present previous update ios 8.1 released october 20 2014 update introduced apple pay iphone 6 6 plus united states added icloud photo library beta status returned camera roll photos added continuity features enable iphone users read send sms mms ipad mac also introduced instant hotspot allowing mac users remotely activate personal hotspot feature nearby iphone ios 8.1.1 released november 17 2014 bug fixes performance improvements iphone 4s ipad 2. ios 8.1.2 released december 9 2014 fix issue ringtones purchased itunes store would removed ios device ios 8.1.3 released january 27 2015 update included bug fixes reduced amount storage space required perform ios update ios 8.2 released march 9 2015 update included support apple watch apple watch app iphone providing app store configuration options access health options units measurement well lots stability improvements bug fixes release ios 8.3 apple announced public beta testing program allowing consumers receive test upcoming versions ios software official general release ios 8.3 released april 8 2015 update included emoji improvements updated emoji keyboard picker organizes emoji categories new diversified emoji skin tone modifiers new languages siri support wireless carplay well major bug fixes improvements ios 8.4 released june 30 2015 update introduced apple music therefore overhauled existing music app apple music service ios 8.4 also relocated audiobooks music app ibooks app ios 8.4.1 released august 13 2015 various fixes apple music ios 8 introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories continuity enables phone call functionality ipad mac calls routed iphone secondary device secondary device serves speaker phone also brings sms support ipad mac extension imessage feature previous versions continuity adds feature called handoff lets users start task one device continue another composing e-mail iphone continuing ipad sending mac order support handoff continuity macs needed os x yosemite operating system released october 2014 well support bluetooth low energy ios 8 introduced spotlight suggestions new search feature integrates many websites services show detailed search results including snippets wikipedia articles local news quick access apps installed device itunes content movie showtimes nearby places info various websites spotlight suggestions available ios home screen well safari web browser search bar drop-down notification center redesigned allow widget functionality third-party apps add widget support apps let users see information notification center without open respective app users add rearrange remove widgets time examples widgets include weather app showing current weather calendar app showing upcoming events notifications actionable allowing users reply message appears quick drop-down act notification notification center ios 8 includes new predictive typing feature called quicktype displays word predictions keyboard user types apple allows third-party developers make keyboard apps users replace default ios keyboard added privacy apple added settings toggle called allow full access optionally enables keyboard act outside app sandbox synchronizing keyboard data cloud third-party keyboards allowed use siri voice dictation secure text fields allow input ios 8 introduced family sharing allows 6 people register unique itunes accounts linked together one parent becoming administrator controlling overall experience purchases made one account shared family members purchases made kids 13 years age require parental approval purchases made adults visible kids family sharing also extends apps shared album automatically generated photos app family member allowing everyone add photos videos comments shared place ask buy feature allows anyone request purchase items app store itunes store ibooks store well in-app purchases icloud storage administrator option either approve deny purchase multitasking screen shows list recently called favorited contacts feature turned settings ios 8 includes additional data roaming option settings european users allowing greater control data usage abroad siri personal voice assistant integrated shazam support asking siri song identify song playing wi-fi calling added allow mobile phone calls wi-fi mobile operator carriers enable voice-over-wi-fi functionality services camera app gets two new features time-lapse self-timer time-lapse records frames shorter intervals normal film frequencies builds movies showing events faster speed self-timer gives user option three-second ten-second countdown automatically taking photo ipads take pictures panoramic mode ios 8 added icloud photo library support photos app enabling photo synchronization different apple devices photos videos backed full resolution original formats feature almost meant lower-quality versions photos could cached device rather full-size images potentially saving significant storage space models limited storage availability photos app received better search different search categorization options including nearby one year ago favorites home based geolocation date photo capture additionally photos app gained precise editing controls including improved rotation one-touch auto-enhancement tools deeper color adjustments brightness contrast exposure shadows also option hide photo without deleting apple added extensibility feature ios 8 allows filters effects third-party apps accessed directly within menu standard photos app rather import export photos respective app apply effects initial release ios 8 apple removed camera roll feature photos app camera roll overview photos device replaced recently added photo view displaying photos recently user captured despite replaced recently added album removal camera roll sparked user complaints apple returned feature ios 8.1 update ios 8 messages gets new features group conversations including disturb mode disables conversation notifications well ability remove participants chat new tap talk chat button lets users send quick voice comments recipient record button allows users record short videos interaction two apple users messages app allows users send short picture video audio clips 2-minute expiration time settings app user option messages automatically deleted certain time period safari web browser developers add support safari password sharing allows share credentials sites apps potentially cutting number times users need type credentials apps services browser also adds support webgl graphics api similar style file manager icloud drive file hosting service enabled settings lets users save kind file app media synchronized ios devices well mac ios 8 apple updated app store explore tab providing improved app discovery trending searches search tab ability developers bundle multiple apps single discounted package new preview videos allow developers visually show app function healthkit service allows developers make apps integrate new health app health app primarily aggregates data fitness apps installed user device except steps flights climbed tracked motion processor user iphone users enter medical history medical id accessible lock screen case emergency homekit serves software framework lets users set iphone configure communicate control smart-home appliances designing rooms items actions homekit service users enable automatic actions house simple voice dictation siri apps manufacturers homekit-enabled devices required purchase license homekit products required encryption co-processor equipment manufactured without homekit-support enabled use gateway product hub connects devices homekit service passbook app ios 8 updated include apple pay digital payment service available iphone 6 6 plus release ios 8.1 new music streaming service apple music introduced ios 8.4 update allows subscribers listen unlimited number songs on-demand subscriptions release music service standard music app ios revamped visually functionally include apple music well 24-hour live radio station beats 1 notes received rich text editing support ability bold italicize underline text image support allowing users post photos app weather app uses weather data weather channel instead yahoo app also received slight changes user interface ios 8 added new tips app shows tips brief information features ios weekly basis ios 8 allows touch id used third-party apps ios 8 received positive reviews brad molen engadget highlighted continuity major advancement users multiple apple devices also praised extensibility feature allowing apps share data liked support third-party keyboards however molen noted new introductions family sharing continuity icloud drive require diving apple ecosystem work particularly enjoyed actionable notifications third-party widget support notification center charles arthur guardian also liked extensibility well new quicktype word suggestions functionality ios keyboard criticized lack option choosing default apps also criticized settings menu confusing unintuitive darrell etherington techcrunch praised improvements imessage writing best ability mute leave group conversations something ’ sorely missing since introduction group imessage conversations liked new search editing features photos quicktype feature keyboard particularly highlighted spotlight suggestions one better features ios 8 even ’ small service addition noting makes iphone almost portable search portal everything martin bryant next web wrote real advances yet come adding apple included demonstrations done true power ’ hood realized coming days weeks months third-party developers gradually incorporate new features apps september 23 2014 roughly week release ios 8 user adoption ios 8 reached 46 october 2014 andrew cunningham ars technica reported ios 8 user adoption rate stalled climbing single percentage point since previous september measurement 46 cunningham blamed over-the-air update requiring 5 gigabytes install unusually large amount may posed challenges using 8 gigabyte 16 gigabyte devices alternative apple offered update via itunes software cunningham noted itunes hookup going even way days years ago least apple spent last three years coaching people use idevices independently computers december new report ars technica stated ios 8 usage increased 63 solid 16 percent study apteligent formerly crittercism found rate apps crashed tests 3.56 ios 8 higher 2 found ios 7.1 september 2014 ios 8.0.1 update caused significant issues touch id iphone 6 cellular network connectivity models apple stated affected users reinstall initial ios 8 release version 8.0.2 ready ios 8.0.2 released one day 8.0.1 fix issues caused 8.0.1 update forbes published several articles focusing problems ios 8 regarding wi-fi battery bluetooth calendar may 2015 news outlets reported bug receiving text message specific combination symbols arabic characters caused messages application crash iphone reboot bug named effective power could potentially continuously reboot device message visible lock screen flaw exploited purpose trolling intentionally causing others phones crash bug fixed ios 8.4 update released june 2015 september 2014 hoax apple advertisement alleged feature called wave ios 8 circulated twitter promised users would able recharge iphone heating microwave oven feature exist media cited numerous people reporting twitter destroyed iphone following procedure described advertisement release apple dropped support iphone 4 | [
6788,
3940,
4670,
7890,
5029,
6092,
6093,
4320,
2926,
4690,
734,
5399,
5752,
6113,
405,
6119,
6125,
2954,
1123,
6479,
6847,
6142,
2609,
1895,
4376,
5091,
4749,
5450,
7601,
3001,
2284,
7259,
2294,
120,
1940,
2300,
3025,
2665,
2679,
1582,
... | Test |
4,215 | 3 | MOVDDUP:movddup x86 assembly programming language movddup name specific action performable modern x86 processors 3rd-generation streaming simd extensions sse3 action involves copying number temporary space processor use computations specifically movddup causes one double-precision floating-point source copied lower half upper half xmm register source operand either xmm register xmm2 memory address m64 source operand xmm register lower half register used operation source operand memory address assumed address 8-byte region value used operation destination operand must xmm register xmm1 x86 instruction listings | [
7465,
4611,
352,
6171,
1335,
5670
] | Test |
4,216 | 5 | Route_poisoning:route poisoning route poisoning method prevent router sending packets route become invalid within computer networks distance-vector routing protocols computer networks use route poisoning indicate routers route longer reachable considered routing tables unlike split horizon poison reverse route poisoning provides sending updates unreachable hop counts immediately nodes network protocol detects invalid route routers network informed bad route infinite ∞ route metric makes nodes invalid route seem infinitely distant preventing routers sending packets invalid route distance-vector routing protocols rip use maximum hop count determine many routers traffic must go reach destination route hop count number assigned incremented routing information passed router router route considered unreachable hop count exceeds maximum allowed route poisoning method quickly forgetting outdated routing information router routing tables changing hop count unreachable higher maximum number hops allowed sending routing update case rip maximum hop count 15 perform route poisoning route hop count changed 16 deeming unreachable routing update sent updates lost nodes network would informed route invalid could attempt send packets bad route cause problem known routing loop therefore route poisoning used conjunction holddowns keep update messages falsely reinstating validity bad route prevents routing loops improving overall efficiency network | [] | Test |
4,217 | 1 | Amazon_SimpleDB:amazon simpledb amazon simpledb distributed database written erlang amazon.com used web service concert amazon elastic compute cloud ec2 amazon s3 part amazon web services announced december 13 2007 ec2 s3 amazon charges fees simpledb storage transfer throughput internet december 1 2008 amazon introduced new pricing free tier 1 gb data 25 machine hours transfer amazon web services free charge simpledb provides eventual consistency weaker form consistency compared database management systems often considered limitation harder reason makes harder write correct programs make use simpledb limitation result fundamental design trade-off foregoing consistency system able achieve two highly desirable properties component failures assumed inevitable thus properties deemed necessary order provide reliable web service cap theorem states possible system exhibit properties along consistency thus designers needed settle weaker form consistency published limitations conditional put conditional delete new operations added february 2010 address problem arises accessing simpledb concurrently consider simple program uses simpledb store counter i.e number incremented program must three things program runs programs access simpledb work correctly however often desirable software applications particularly web applications access data concurrently data accessed concurrently race condition arises would result undetectable data loss continuing previous example consider two processes b running program suppose simpledb services requests data described step 1 b b see value let say current value counter 0 steps 2 3 try store 1 b try thus final counter value 1 even though expected final counter value 2 system attempted two increment operations one another b problem solved use conditional put suppose change step 3 follows instead unconditionally storing new value program asks simpledb store new value value currently holds value retrieved step 1 sure counter value actually increases introduces additional complexity simpledb able store new value current value expected program must repeat steps 1-3 conditional put operation actually changes stored value consistent read new feature released time conditional put conditional delete name suggests consistent read addresses problems arise due simpledb eventual consistency model see limitations section consider following sequence operations simpledb eventual consistency guarantee allow us say data retrieved step 2 reflects updates made step 1 eventual consistency guarantees step 2 reflects complete set updates step 1 none updates consistent read used ensure data retrieved step 2 reflect changes step 1 reason inconsistent results arise consistent read operation used simpledb stores data multiple locations availability new data step 1 might written locations simpledb receives data request step 2 case possible data request step 2 serviced one locations new data written amazon discourages use consistent read unless required correctness reason recommendation rate consistent read operations serviced lower regular reads talk simpledb superseded dynamodb longer iterated though amazon plan remove dynamodb appears successor | [
5894,
2988,
7613,
632,
3613,
1634,
3091,
6262,
3953,
7722,
4946,
6986,
6806,
3627,
4318,
1550,
8083,
5927,
2212,
5135,
1757,
3028,
7838,
842,
4163,
7102,
5064,
330,
6219,
518,
2961,
7037,
2700,
5706,
1514,
5889
] | Test |
4,218 | 3 | MLX_(software):mlx software mlx series machine language entry utilities published magazines compute compute gazette well books compute publications programs designed allow relatively easy entry type-in machine language listings often included publications versions available commodore 64 pet vic-20 atari 8-bit family apple ii mlx introduced december 1983 issue compute versions commodore 64 atari 8-bit family followed january 1984 issue compute gazette version vic-20 8k expansion march 1984 issue tiny mlx version unexpanded vic-20 versions mlx shared format consisting six data bytes decimal format plus seventh byte served checksum although line began memory address bytes separated commas typed program auto-incremented address automatically printed comma delimiters every three characters invalid keystrokes filtered line completely typed automatically verified checksum value matched user would prompted next line warning buzzer would sound invalid input would discarded user could retype line commodore version beginning may 1984 issue compute several keyboard keys redefined create makeshift numeric keypad mlx listings reserved relatively long machine language programs speedscript shorter programs often printed form basic loaders used codice_1 statements codice_2 code memory although original mlx efficient entry method basic loaders codice_1 statements number issues foremost among codice_2d data entered directly affected area memory since many machine language programs located partially entirely basic ram area meant user manually adjust pointers top bottom basic ram using codice_2 statements provided article running mlx keep entry program encroaching code vice versa program entered multiple sittings done time also decimal storage required seven keystrokes two bytes entered taking account checksums furthermore many transposition errors overlooked original mlx unsophisticated checksum algorithm new version mlx introduced apple ii june 1985 issue version used 8-byte-per-line hexadecimal format sophisticated hash algorithm implemented catch errors overlooked original failing notice substitution 0xff 0x00 improved layout hashing backported commodore 64 version also added editor buffer located single location memory removing need codice_2 memory locations startup new version known title screen mlx ii otherwise simply new mlx first appeared december 1985 issue compute appeared compute gazette following month replacement version mlx continued used compute gazette switched disk-only format december 1993 | [
5190
] | Test |
4,219 | 4 | The_Plot_to_Hack_America:plot hack america plot hack america putin cyberspies wikileaks tried steal 2016 election non-fiction book malcolm nance author describes russian interference 2016 united states elections published paperback audiobook e-book formats 2016 skyhorse publishing second edition also published year third edition 2017 nance researched russian intelligence working russian interpreter studying kgb history nance described black propaganda warfare known active measures rt russia today sputnik news recounts vladimir putin kgb rise details trump campaign ties russia nance concludes putin managed cyberattack hacker groups cozy bear fancy bear wall street journal placed book list best-selling books week february 19 2017 seventh place category nonfiction e-books new york journal books called essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election napa valley register described nance work best book subject huffington post remarked putin played game thrones election newsweek wrote problem disinformation tactics time debunked public already consumed falsehoods book dedicated u.s. army officer humayun khan begins foreword spencer ackerman nance details russian interference 2016 u.s. elections describes march 2016 democratic national committee dnc servers hacked someone seeking opposition research donald trump nance learnt hacker guccifer 2.0 would release hacked dnc materials nance gives context including trump motivations run president made fun 2011 white house correspondents association dinner criticism barack obama entry 2016 race white house nance discusses black propaganda techniques used russian federation characterizes rt russia today sputnik news agencies disinformation asserts putin intimately involved russian intelligence operation elect trump directing entire covert operation trump agents putin assets nance delves links trump associates russian officials asserting multiple agents trump assets putin providing access trump nance identifies putin strategy electing trump u.s. president referred operation lucky-7 kremlin plan elect president describes multitask effort involving hacking dnc acquire personal information members well seek compromising material known kompromat battles cyber bears describes two hacker entities tied russian intelligence cozy bear fancy bear cozy bear believed linked russian federal security service fsb foreign intelligence service svr fancy bear associated russian military intelligence agency gru nance describes russian intelligence attempted make releases leaked dnc emails appear deniable wikileaks russia intelligence laundromat likens use whistleblower website wikileaks money laundering nance asserts wikileaks willingly collaborated operation cyber bears attack describes impact podesta emails dnc email leaks 2016 clinton campaign finally cyberwar defend democracy nance reiterates u.s. target cyberwarfare russian intelligence agencies gru fsb directly ordered putin nance writes russia succeeded casting doubt citizens strength u.s. democracy posits u.s. populace large internalize future acts cyberwarfare dangerous attempts subvert daily life could lead actual war beginning research plot hack america nance gained counter-intelligence experience u.s. navy senior chief petty officer naval cryptology served 1981–2001 garnered expertise within fields intelligence counterterrorism author learned russian history interpreter russian began working intelligence field research history soviet union spying agency kgb devoted years research analyzing foreign relations russia prior analyzing russian interference 2016 u.s. elections nance background counter-intelligence analysis included management think tank called terror asymmetrics project strategy tactics radical ideologies consisting central intelligence agency military intelligence officers direct prior field experience nance books counter-terrorism include end al-qaeda terrorist recognition handbook terrorists iraq defeating isis hacking isis nance began work plot hack america incidentally already engaged writing hacking isis course research hacking isis discovered computer hacking germany legislative body bundestag french television station tv5monde time hacks thought caused isis instead traced back russian hacking group cyber bears nance knew russian intelligence gru operated group realized attribution isis false flag operation throw investigators trail gave nance prior knowledge russian intelligence tactics cyber bears infiltrate servers purposes disrupting government case germany injecting propaganda case france 2016 hack dnc apparent nance identical foreign agency carried attack gru nance suspicions borne accurate security firm crowdstrike determined cozy bear fancy bear behind attack nance saw akin watergate scandal albeit virtual attack instead physical break-in democratic facilities nance told c-span majority working life identified member u.s. republican party describing colin powell school republicanism plot hack america written desire intelligence expert document background behind attack foreign power u.s. democratic institutions nance realized gravity attack considered operation must sanctioned managed former kgb officer vladimir putin nance member board directors international spy museum washington d.c work museum nance befriended former kgb general oleg kalugin advised kgb always kgb nance considered putin objectives would simply harm hillary clinton actually attempt achieve ascendancy donald trump u.s. president plot hack america first published online format september 23 2016 day united states intelligence community assessments russian interference 2016 united states elections delivered president barack obama appendix book notes timing points many conclusions included consensus opinion principal three intelligence agencies nsa cia fbi identical plot hack america first paperback format published october 10 2016 second edition released year addition ebook format another edition published 2017 along audiobook narrated gregory itzin author subject hecklers appeared event discuss work books books miami florida 2017 book commercial success wall street journal placed plot hack america list best-selling books week february 19 2017 7th place category nonfiction e-books book included reading course political science pasadena city college review new york journal books michael lipkin effusive writing malcolm nance plot hack america essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election lipkin wrote author expertise subject matter patriot highly experienced respected intelligence expert bringing bear deep extensive knowledge conclusions perhaps one important developments american history lawrence swaim gave nance work favorable reception book review napa valley register wrote quick read present easily best book subject swaim recommended resources back book writing ’ really killer nance book appendix contains extremely revealing assessments made american intelligence agencies presented unclassified format kenneth j. bernstein wrote daily kos convince read important book echoed warning conclusion dangers posed cyberwarfare bernstein wrote book argumentation strengthened every single assertion nance offers backed material ... clearly documented end notes bernstein wrote favorably addition book foreword guardian editor national security spencer ackerman italian language newspaper la stampa called book molto bello writing independent andy martin commented suppose weak spot subtitle word 'tried surely 'try maclean wrote plot hack america prescient russia ’ meddling 2016 u.s election brian lamb founder retired ceo c-span commented book titled choice seemed political nature strategic finance noted nance focuses new hybrid cyber warfare kompromat uses cyber assets way attack political enemies techgenix journalist michael adams wrote nance provides in-depth analysis issue characterized multiple commentators national controversy rivalling watergate scandal adams called book engaging tale espionage including context russian intelligence background vladimir putin kgb voice america commented nance capably outlined evidence book fears russian foreign manipulation 2016 election bob burnett wrote huffington post nance described game thrones strategem vladimir putin using donald trump tool embarrass hillary clinton barack obama burnett observed nance posited trump putin play trump avarice narcissism jeff stein newsweek wrote power disinformation tactics described nance book genius technique correction takes days weeks catch fiction gullible masses digested fabrications truth plot hack america published october 2016 nance interviewed april 2017 c-span book impact media operations american society argued russia today actions back notion black propaganda operations effective referencing impact disinformation operations nance cited research senate intelligence committee house intelligence committee director national intelligence russia today methods publishing propaganda propagating fake news traced larger problem echo chambers wherein false invented story sputnik news traveled bloggers breitbart news became believed factual trump administration officials eventually re-reported russia today falsely stating simply reporting events created white house author recalled c-span days soviet union soviet intelligence operation practice infiltrate manage reporting agencies communist party addition political figures right left perspectives order denigrate u.s. democratic interests nance warned russia control vladimir putin motivated identical initiative armed greater tools funding soviet union past lamented prior putin appointment prime minister russia boris yeltsin country taking steps towards democracy nance traced putin rise descent democracy russia favor oligarchy ruling class wealthy individuals managing autocratic society nance said u.s. citizens become agents russia employ russia today due naivete nature russian propaganda operations geared harm u.s. values civil liberties nance placed utilization propaganda russian intelligence agencies russia today outlets including social media part larger effort global cyberwarfare characterized form hybrid warfare blending traditional propaganda computer tools subversion media organizations case study cited aleksandr dugin russian neofascist political activist views favored putin whose tweets expound perspectives u.s democratic institutions successful | [
124,
6756
] | Test |
4,220 | 9 | Shading_language:shading language shading language graphics programming language adapted programming shader effects characterizing surfaces volumes objects language forms usually consist special data types like vector matrix color normal due variety target markets 3d computer graphics different shading languages developed shading languages used offline rendering produce maximum image quality material properties totally abstracted little programming skill hardware knowledge required kind shaders often developed artists get right look texture mapping lighting facets work processing shaders time-consuming computational power required expensive ability produce photorealistic results time production rendering run large computer clusters renderman shading language often referenced rsl sl short defined renderman interface specification common shading language production-quality rendering also one first shading languages ever implemented language defines six major shader types houdini vex vector expressions shading language often abbreviated vex closely modeled renderman however integration complete 3d package means shader writer access information inside shader feature usually available rendering context language differences rsl vex mainly syntactic addition differences regarding names several shadeop names gelato shading language like houdini vex closely modeled renderman differences gelato shading language rsl mainly syntactical — gelato uses semicolons instead commas separate arguments function definitions shadeops different names parameters open shading language osl developed sony pictures imageworks use arnold renderer also used blender cycles render engine osl surface volume shaders define surfaces volumes scatter light way allows importance sampling thus well suited physically-based renderers support ray tracing global illumination shading languages real-time rendering widespread provide higher hardware abstraction flexible programming model previous paradigms hardcoded transformation shading equations gives programmer greater control rendering process delivers richer content lower overhead shaders designed executed directly gpu became useful high throughput general processing stream programming model led development compute shaders running similar hardware see also gpgpu historically languages successful establishing maintaining strong market position short description languages follows opengl architecture review board established arb assembly language 2002 standard low-level instruction set programmable graphics processors high-level opengl shading languages often compile arb assembly loading execution unlike high-level shading languages arb assembly support control flow branching however continues used cross-gpu portability required also known glsl glslang standardized shading language meant used opengl language unifies vertex fragment processing single instruction set allowing conditional loops generally branches historically glsl preceded arb assembly language programming language cg developed nvidia designed easy efficient production pipeline integration language features api independence comes large variety free tools improve asset management development cg stopped 2012 language deprecated shader assembly language direct3d 8 9 main programming language vertex pixel shaders shader model 1.0/1.1 2.0 3.0 shader assembly language direct representation intermediate shader bytecode passed graphics driver execution shader assembly language directly used program unified shader model 4.0 4.1 5.0 5.1 although retains function representation intermediate bytecode debug purposes high-level shading language also called hlsl short c-style shader language directx 9 higher xbox game consoles similar nvidia cg supported directx xbox hlsl programs compiled bytecode equivalent directx shader assembly language hlsl introduced optional alternative shader assembly language direct3d 9 became requirement direct3d 10 higher shader assembly language deprecated adobe systems added pixel bender part adobe flash 10 api pixel bender could process pixel 3d-vertex data flash 11 introduced entirely new 3d api called stage3d uses shading language called adobe graphics assembly language agal offers full 3d acceleration support gpu acceleration pixel bender removed flash 11.8 agal low-level platform-independent shading language compiled example glsl sony announced pssl playstation shader language platform-specific shading language similar hlsl playstation 4 apple created low-level graphics api called metal runs macs made since 2012 iphones since 5s ipads since ipad air metal introduces shading language called metal shading language msl based c++14 implemented using clang llvm msl unifies vertex fragment compute processing | [
6507,
7071,
7442,
1662,
2866,
3061,
7541,
7335,
214,
4483,
684,
357,
2085
] | Test |
4,221 | 3 | ECC_memory:ecc memory error-correcting code memory ecc memory type computer data storage detect correct most-common kinds internal data corruption ecc memory used computers data corruption tolerated circumstances scientific financial computing typically ecc memory maintains memory system immune single-bit errors data read word always data written even one bits actually stored flipped wrong state non-ecc memory detect errors although non-ecc memory parity support allows detection correction electrical magnetic interference inside computer system cause single bit dynamic random-access memory dram spontaneously flip opposite state initially thought mainly due alpha particles emitted contaminants chip packaging material research shown majority one-off soft errors dram chips occur result background radiation chiefly neutrons cosmic ray secondaries may change contents one memory cells interfere circuitry used read write hence error rates increase rapidly rising altitude example compared sea level rate neutron flux 3.5 times higher 1.5 km 300 times higher 10–12 km cruising altitude commercial airplanes result systems operating high altitudes require special provision reliability example spacecraft cassini–huygens launched 1997 contained two identical flight recorders 2.5 gigabits memory form arrays commercial dram chips thanks built-in edac functionality spacecraft engineering telemetry reported number correctable single-bit-per-word errors uncorrectable double-bit-per-word errors first 2.5 years flight spacecraft reported nearly constant single-bit error rate 280 errors per day however november 6 1997 first month space number errors increased factor four single day attributed solar particle event detected satellite goes 9 concern dram density increases thus components chips get smaller time operating voltages continue fall dram chips affected radiation frequently—since lower-energy particles able change memory cell state hand smaller cells make smaller targets moves technologies soi may make individual cells less susceptible counteract even reverse trend recent studies show single-event upsets due cosmic radiation dropping dramatically process geometry previous concerns increasing bit cell error rates unfounded work published 2007 2009 showed widely varying error rates 7 orders magnitude difference ranging 10 error/bit·h roughly one bit error per hour per gigabyte memory 10 error/bit·h roughly one bit error per millennium per gigabyte memory large-scale study based google large number servers presented sigmetrics/performance ’ 09 conference actual error rate found several orders magnitude higher previous small-scale laboratory studies 25,000 roughly 2.5 × 10 error/bit·h 70,000 roughly 7 × 10 error/bit·h 5 bit errors per 8 gigabytes ram per hour errors per billion device hours per megabit 8 dimm memory modules affected errors per year consequence memory error system-dependent systems without ecc error lead either crash corruption data large-scale production sites memory errors one most-common hardware causes machine crashes memory errors cause security vulnerabilities memory error consequences changes bit neither causes observable malfunctioning affects data used calculations saved 2010 simulation study showed web browser small fraction memory errors caused data corruption although many memory errors intermittent correlated effects memory errors greater would expected independent soft errors tests conclude isolation dram memory cells circumvented unintended side effects specially crafted accesses adjacent cells thus accessing data stored dram causes memory cell leak charges interact electrically result high cell density modern memory altering content nearby memory rows actually addressed original memory access effect known row hammer also used privilege escalation computer security exploits example single-bit error would ignored system error-checking would halt machine parity checking would invisibly corrected ecc single bit stuck 1 due faulty chip becomes changed 1 due background cosmic radiation spreadsheet storing numbers ascii format loaded character 8 decimal value 56 ascii encoding stored byte contains stuck bit lowest bit position change made spreadsheet saved result 8 0011 1000 binary silently become 9 0011 1001 several approaches developed deal unwanted bit-flips including immunity-aware programming ram parity memory ecc memory problem mitigated using dram modules include extra memory bits memory controllers exploit bits extra bits used record parity use error-correcting code ecc parity allows detection single-bit errors actually odd number wrong bits most-common error correcting code single-error correction double-error detection secded hamming code allows single-bit error corrected usual configuration extra parity bit double-bit errors detected chipkill ecc effective version also corrects multiple bit errors including loss entire memory chip seymour cray famously said parity farmers asked left cdc 6600 later included parity cdc 7600 caused pundits remark apparently lot farmers buy computers original ibm pc pcs early 1990s used parity checking later ones mostly many current microprocessor memory controllers including almost amd 64-bit offerings support ecc many motherboards particular using low-end chipsets ecc-capable memory controller detect correct errors single bit per 64-bit word unit bus transfer detect correct errors two bits per 64-bit word bios computers matched operating systems versions linux macos windows allows counting detected corrected memory errors part help identify failing memory modules problem becomes catastrophic dram chips include internal on-chip error correction circuits allow systems non-ecc memory controllers still gain benefits ecc memory systems similar effect may achieved using eos memory modules error detection correction edac depends expectation kinds errors occur implicitly assumed failure bit word memory independent resulting improbability two simultaneous errors used case memory chips one-bit wide typical first half 1980s later developments moved many bits chip weakness addressed various technologies including ibm chipkill sun microsystems extended ecc hewlett packard chipspare intel single device data correction sddc dram memory may provide increased protection soft errors relying error correcting codes error-correcting memory known ecc edac-protected memory particularly desirable high fault-tolerant applications servers well deep-space applications due increased radiation systems also scrub memory periodically reading addresses writing back corrected versions necessary remove soft errors interleaving allows distribution effect single cosmic ray potentially upsetting multiple physically neighboring bits across multiple words associating neighboring bits different words long single event upset seu exceed error threshold e.g. single error particular word accesses corrected e.g. single-bit error correcting code effectively error-free memory system may maintained error-correcting memory controllers traditionally use hamming codes although use triple modular redundancy tmr latter preferred hardware faster hamming error correction scheme space satellite systems often use tmr although satellite ram usually uses hamming error correction many early implementations ecc memory mask correctable errors acting error never occurred report uncorrectable errors modern implementations log correctable errors ce uncorrectable errors ue people proactively replace memory modules exhibit high error rates order reduce likelihood uncorrectable error events many ecc memory systems use external edac circuit cpu memory systems ecc memory use internal external edac systems external edac system designed correct certain errors internal edac system unable correct modern desktop server cpus integrate edac circuit cpu especially shift toward cpu-integrated memory controllers related numa architecture 2009 most-common error-correction codes use hamming hsiao codes provide single-bit error correction double-bit error detection sec-ded error-correction codes proposed protecting memory double-bit error correcting triple-bit error detecting dec-ted codes single-nibble error correcting double-nibble error detecting snc-dnd codes reed–solomon error correction codes etc however practice multi-bit correction usually implemented interleaving multiple sec-ded codes early research attempted minimize area delay overheads ecc circuits hamming first demonstrated sec-ded codes possible one particular check matrix hsiao showed alternative matrix odd weight columns provides sec-ded capability less hardware area shorter delay traditional hamming sec-ded codes recent research also attempts minimize power addition minimizing area delay many processors use error-correction codes on-chip cache including intel itanium xeon processors amd athlon opteron zen- zen+-based processors epyc epyc embedded ryzen ryzen threadripper dec alpha 21264. edc/ecc ecc/ecc two most-common cache error-protection techniques used commercial microprocessors edc/ecc technique uses error-detecting code edc level 1 cache error detected data recovered ecc-protected level 2 cache ecc/ecc technique uses ecc-protected level 1 cache ecc-protected level 2 cache cpus use edc/ecc technique always write-through stores level 2 cache error detected read level 1 data cache copy data recovered level 2 cache registered buffered memory ecc technologies perform different functions usual memory used servers registered allow many memory modules used without electrical problems ecc data integrity memory used desktop computers neither economy however unbuffered not-registered ecc memory available non-server motherboards support ecc functionality modules used cpu supports ecc registered memory work reliably motherboards without buffering circuitry vice versa ultimately trade-off protection unusual loss data higher cost ecc protects undetected memory data corruption used computers corruption unacceptable example scientific financial computing applications file servers ecc also reduces number crashes especially unacceptable multi-user server applications maximum-availability systems motherboards processors less critical application designed support ecc prices kept lower ecc-enabled boards processors able support unbuffered unregistered ecc also work non-ecc memory system firmware enables ecc functionality ecc ram installed ecc memory usually involves higher price compared non-ecc memory due additional hardware required producing ecc memory modules due lower production volumes ecc memory associated system hardware motherboards chipsets processors support ecc may also expensive ecc may lower memory performance around 2–3 percent systems depending application implementation due additional time needed ecc memory controllers perform error checking however modern systems integrate ecc testing cpu generating additional delay memory accesses long errors detected | [
4657,
982,
1254,
3849,
4765,
4108,
1640,
3365,
6687,
7826,
5305,
578,
4241,
1197,
7654,
1761,
1961,
1670,
5323,
2234,
6655,
6753,
1052,
7499,
6505
] | Test |
4,222 | 9 | Konrad_Zuse:konrad zuse konrad zuse 22 june 1910 – 18 december 1995 german civil engineer computer scientist inventor businessman computer pioneer greatest achievement world first programmable computer functional program-controlled turing-complete z3 became operational may 1941 thanks machine predecessors zuse often regarded inventor modern computer zuse also noted s2 computing machine considered first process control computer founded one earliest computer businesses 1941 producing z4 became world first commercial computer 1943 1945 designed first high-level programming language plankalkül 1969 zuse suggested concept computation-based universe book rechnender raum calculating space much early work financed family commerce 1939 given resources nazi german government due world war ii zuse work went largely unnoticed united kingdom united states possibly first documented influence us company ibm option patents 1946 replica z3 well original z4 deutsches museum munich deutsches technikmuseum berlin exhibition devoted zuse displaying twelve machines including replica z1 several zuse paintings born berlin 22 june 1910 moved family 1912 east prussian braunsberg braniewo poland father postal clerk zuse attended collegium hosianum braunsberg 1923 family moved hoyerswerda passed abitur 1928 qualifying enter university enrolled technische hochschule berlin technical university berlin explored engineering architecture found boring zuse pursued civil engineering graduating 1935 time worked ford motor company using considerable artistic skills design advertisements started work design engineer henschel aircraft factory schönefeld near berlin required performance many routine calculations hand found mind-numbingly boring leading dream machine beginning 1935 experimented construction computers parents flat wrangelstraße 38 moving new flat methfesselstraße 10 street leading kreuzberg berlin working parents apartment 1936 produced first attempt z1 floating point binary mechanical calculator limited programmability reading instructions perforated 35 mm film 1937 zuse submitted two patents anticipated von neumann architecture finished z1 1938 z1 contained 30,000 metal parts never worked well due insufficient mechanical precision 30 january 1944 z1 original blueprints destroyed parents flat many neighbouring buildings british air raid world war ii 1987 1989 zuse recreated z1 suffering heart attack midway project cost 800,000 dm approximately 500,000 required four individuals including zuse assemble funding retrocomputing project provided siemens consortium five companies zuse completed work entirely independently leading computer scientists mathematicians day 1936 1945 near-total intellectual isolation 1939 zuse called military service given resources ultimately build z2 september 1940 zuse presented z2 covering several rooms parental flat experts deutsche versuchsanstalt für luftfahrt dvl i.e german research institute aviation z2 revised version z1 using telephone relays dvl granted research subsidies 1941 zuse started company zuse apparatebau zuse apparatus construction manufacture machines renting workshop opposite side methfesselstraße 7 stretching block belle-alliance straße 29 renamed renumbered mehringdamm 84 1947 improving basic z2 machine built z3 1941 12 may 1941 zuse presented z3 built workshop public z3 binary 22-bit floating point calculator featuring programmability loops without conditional jumps memory calculation unit based telephone relays telephone relays used machines largely collected discarded stock despite absence conditional jumps z3 turing complete computer however turing-completeness never considered zuse practical applications mind demonstrated 1998 see history computing hardware z3 first fully operational electromechanical computer partially financed german government-supported dvl wanted extensive calculations automated request co-worker helmut schreyer—who helped zuse build z3 prototype 1938—for government funding electronic successor z3 denied strategically unimportant work z4 could resumed immediately extreme privation post-war germany 1949 able resume work showed mathematician eduard stiefel swiss federal institute technology zurich eidgenössische technische hochschule eth zürich ordered one 1950 8 november 1949 zuse kg founded z4 delivered eth zurich 12 july 1950 proved reliable 1940 german government began funding aerodynamische versuchsanstalt ava aerodynamic research institute forerunner dlr used work production glide bombs zuse built s1 s2 computing machines special purpose devices computed aerodynamic corrections wings radio-controlled flying bombs s2 featured integrated analog-to-digital converter program control making first process-controlled computer machines contributed henschel werke hs 293 hs 294 guided missiles developed german military 1941 1945 precursors modern cruise missile circuit design s1 predecessor zuse z11 zuse believed machines captured occupying soviet troops 1945 working z4 computer zuse realised programming machine code complicated started working phd thesis containing groundbreaking research years ahead time mainly first high-level programming language plankalkül plan calculus elaborate example program first real computer chess engine 1945 luisenstadt bombing flew berlin rural allgäu unable hardware development continued working plankalkül eventually publishing brief excerpts thesis 1948 1959 work entirety however remained unpublished 1972 phd thesis submitted university augsburg rejected formal reasons zuse forgot pay 400 mark university enrollment fee rejection bother plankalkül slightly influenced design algol 58 implemented 1975 dissertation joachim hohmann heinz rutishauser one inventors algol wrote first attempt devise algorithmic language undertaken 1948 k. zuse notation quite general proposal never attained consideration deserved implementations followed 1998 2000 team free university berlin donald knuth suggested thought experiment might happened bombing taken place phd thesis accordingly published planned addition computing-related work described zuse began work 1956 high precision large format plotter demonstrated 1961 hanover fair became well known also outside technical world thanks frieder nake pioneering computer art work plotters designed zuse include zuse z90 zuse z9004 last years life zuse conceptualized created purely mechanical extensible modular tower automaton named helix tower helixturm structure based gear drive employs rotary motion e.g provided crank assemble modular components storage space elevating tube-shaped tower process reversible inverting input direction deconstruct tower store components deutsches museum restored zuse original 1:30 functional model extended height 2.7 m. zuse intended full construction reach height 120 envisioned use wind power generators radio transmission installations konrad zuse married gisela brandes january 1945 employing carriage dressed tailcoat top hat gisela wedding veil zuse attached importance noble ceremony son horst first five children born november 1945 zuse never became member nazi party known expressed doubts qualms working nazi war effort much later suggested modern times best scientists engineers usually choose either work less questionable business military interests faustian bargain pursuing line work according memoirs german computer pioneer heinz billing max planck institute physics published genscher düsseldorf meeting alan turing konrad zuse took place göttingen 1947 encounter form colloquium participants womersley turing porter england german researchers like zuse walther billing details see herbert bruderer konrad zuse und die schweiz retired focused hobby painting zuse atheist zuse died 18 december 1995 hünfeld hesse near fulda heart failure world war 2 zuse founded one earliest computer companies zuse-ingenieurbüro hopferau capital raised 1946 eth zurich ibm option zuse patents zuse founded another company zuse kg haunetal-neukirchen 1949 1957 company head office moved bad hersfeld z4 finished delivered eth zurich switzerland september 1950 time working computer continental europe second computer world sold beaten binac never worked properly delivered computers numbered leading z z43 built zuse company notable z11 sold optics industry universities z22 first computer memory based magnetic storage 1967 zuse kg built total 251 computers owing financial problems company sold siemens 1967 zuse also suggested universe running cellular automaton similar computational structure digital physics 1969 published book rechnender raum translated english calculating space idea attracted lot attention since physical evidence zuse thesis edward fredkin 1980s jürgen schmidhuber 1990s others expanded zuse received several awards work zuse institute berlin named honour konrad zuse medal gesellschaft für informatik konrad zuse medal zentralverband des deutschen baugewerbes central association german construction named zuse 100th anniversary birth computer pioneer celebrated exhibitions lectures workshops remember life work bring attention importance invention digital age movie revolves around world inside computer system features character named zuse presumably honour konrad zuse german posts dp ag issued commemorative stamp occasion june 6 2010 zuse portrait composed solely binary code numbers 1 0 fine print | [
1361,
4864,
7658,
6922,
1237,
3895,
6497,
4152,
5190
] | Test |
4,223 | 2 | Target_Disk_Mode:target disk mode target disk mode sometimes referred tdm target mode boot mode unique macintosh computers mac supports target disk mode started 't key held operating system boot instead mac firmware enables drives behave scsi firewire thunderbolt and/or usb-c external mass storage device mac booted target mode attached port computer mac pc appear external device hard drives within target mac example formatted partitioned etc. exactly like external drive computers also make internal cd/dvd drives internal external peripheral hardware available host computer target disk mode useful accessing contents mac booted operating system target disk mode preferred form old-computer new-computer interconnect used apple migration assistant migration assistant supports ethernet wired wi-fi tdm neither supports usb however thunderbolt-to-firewire thunderbolt-to-gigabit-ethernet usb-3.0-to-gigabit-ethernet adapters option one computers firewire thunderbolt apple introduced disk mode access original powerbook 100 continued offer subsequent powerbook series firewire-equipped macs long requisite software appeared system rom mac could booted disk mode originally called scsi disk mode special cable scsi system cable allowed original powerbook series attach desktop mac external scsi disk unique system control panel powerbook used select non-conflicting scsi id number host mac also made possible select disk startup control panel boot change ide drives starting powerbook 150 190 apple implemented hd target mode essentially enabled scsi disk mode translating external scsi commands via ata driver officially reserved apple portables powerbooks exclusively supported disk mode except 140 145 145b 150 170 however scsi disk mode implemented unofficially macintosh external scsi port suspending startup process interrupt switch long internal drives chain set different ids active host system devices apple dropped scsi interface starting agp power mac g4 “ pismo ” powerbook g3 firewire target disk mode replaced earlier disk mode implementation also receiving official support beyond laptops subsequent macs built-in firewire thunderbolt supports target disk mode 12-inch retina macbook early 2015 one expansion port usb-c port supports charging external displays target disk mode using target disk mode macbook requires cable supports usb 3.0 usb 3.1 either usb-a usb-c connector one end usb-c connector end macbook target computer computer placed tdm must host computer computer target disk mode booted computer plugged merely needs meet requirements external mass storage device using bus question access native mac formatted partitions boot volume desired support correct version hierarchical file system classic mac os means firewire 2.3.3 later mac os 8.6 later required use firewire target host computer may run microsoft windows possible shortcomings read mac hfs-formatted partitions extra drivers macdrive transmac macdisk hfsexplorer necessary users also must ensure computer possesses appropriate interface hardware order physically connect mac target mode macdrive also read-only option prevent accidental editing computer target disk mode however mode set hfs/hfs+ disk mounted addition hfs drivers apple bootcamp also become possible macs running windows read write hfs partitions without purchase software users separated drivers main bootcamp install also install windows computers host computers running linux also able read write mac hfs hfs+ formatted devices target disk mode working out-of-the-box distributions hfs+ support part linux kernel however filesystems checked errors shrinking moving partitions preferred use mac os | [
8051,
1933,
4759,
5571,
4738,
102,
5660,
578,
1992,
997
] | Test |
4,224 | 3 | MDMX:mdmx mdmx mips digital media extension also known madmax extension mips architecture released october 1996 microprocessor forum mdmx developed accelerate multimedia applications becoming popular common 1990s risc cisc systems mdmx defines new set thirty-two 64-bit registers called media registers mapped onto existing floating-point registers save hardware 192-bit extended product accumulator media registers hold two new data types octo byte ob quad half qh contain eight bytes 8-bit four halfwords 16-bit integers variants existing instructions operate data types performing saturating arithmetic logical shift compare align operations mdmx also introduced 19 instructions permutation manipulating bytes registers performing arithmetic accumulator accumulator access | [
5893,
2000,
1252,
3173,
4845,
2989,
6523,
6616,
1465,
5665,
5934,
742,
5669,
5670,
584,
5055,
6647,
2226,
1770,
4077,
6563,
6133,
1881,
5431,
3747,
6675,
6236,
352,
971,
6956,
3248
] | Test |
4,225 | 4 | DerbyCon:derbycon derbycon computer security conference based louisville kentucky first derbycon took place 2011 founded martin bos dave kennedy alex kah adrian crenshaw conference held hyatt regency louisville typically late september january 14 2019 organizers announced derbycon 9.0 held september 2019 would last series citing increasing difficulty holding conferences face small yet vocal group people creating negativity polarization disruption derbycon common activities include along five parallel tracks also vendors tables games training village lockpick feature also included book publishers hardware vendors t-shirts printed | [] | Test |
4,226 | 7 | MTA_SZTAKI_Laboratory_of_Parallel_and_Distributed_Systems:mta sztaki laboratory parallel distributed systems laboratory parallel distributed systems lpds department mta sztaki research laboratory distributed grid cloud technologies lpds founding member hungarian grid competence centre hungarian national grid initiative hungarian opennebula community also coordinates several european grid/cloud projects mission lpds twofold one hand would like provide efficient software development tools high-level services together customizable scientific gateways hand lpds developing easy-to-maintain middleware solutions technologies interoperability enables cost-efficient alternative distributed grid cloud platforms scientific business applications lpds laboratory cooperation departments mta sztaki involved development sztaki cloud takes part cloud-based projects lpds cloud research focusing field infrastructure service iaas -based cloud systems make previously evolved products services lpds available cloud-based executing scalable transparent way guse grid cloud user support environment well-known permanently improving open source science gateway framework enables users convenient easy access grid cloud infrastructures developed support large variety user communities provides general purpose workflow-oriented graphical user interface create run workflows various distributed computing infrastructures including clusters grids desktop grids clouds guse framework used national grid initiatives ngis support small user communities afford develop customized science gateway p-grade portal liferay technology-based web portal guse accessed via major modern web browsers like chrome firefox etc supports development submission distributed applications executed computational resources various distributed computing infrastructures dcis including clusters service grids desktop grids clouds data avenue file commander tool data transfer enabling easy data moving various storage services various network protocols data avenue integrated ws-pgrade portlet goal sztaki cloud develop deploy institutional cloud infrastructure allows significant improvement traditional institutional infrastructure new cloud-based infrastructure significantly effective cost efficient former infrastructure built traditional conceptions individual specific servers sztaki desktop grid provides enterprise solution exploit pcs clusters located different sites company institute solving large scale distributed programs via easy-to-use application programming interface extended include clusters single powerful pcs hierarchically propagate work one desktop grid lpds participated national international grid cloud research projects since 2000 outstanding results area grid/cloud resources development high-level user interfaces field important result ws-pgrade/guse used several european grid made access grid cloud systems portal convenient user-friendly way additionally lpds participates big data management storage within field agricultural research ongoing projects participation lpds laboratory maintains comprehensive list projects lpds played active role providing grid cloud trainings europe worldwide national international trainings laboratory provides knowledge transfer targets new users industry well science lpds organized hosted summer schools trainings grid- cloud-related topics since 2005 head lpds prof. dr. péter kacsuk deputy head lpds dr. robert lovas 1 dsc 10 phds 20 full part-time members work laboratory english hungarian | [
2961,
4159,
5870,
5834,
3947,
3184
] | Train |
4,227 | 2 | Whitix:whitix whitix desktop computer operating system written scratch x86 architecture matthew whitworth others project aims combine proven system technology unix-like kernel offering consistent clear interface new way navigate desktop operating system runs custom open source kernel written whitworth new features include icfs dynamic configuration filesystem replaces ioctl modular kernel whitix licensed gnu general public license fully preemptive multitasking kernel multithreading supports number filesystems including fat family filesystems ext3 journaling reiserfs iso9660 whitix available live cd download installed hard drive beginning version 0.2 userspace comprises native shell burn text editor fruity range ported applications c-based bsd-licensed software development kit available bindings various languages whitix contains posix compatibility library codice_1 aim full posix compliance whitix windowing environment xynth lightweight windowing environment developed alper akcan custom userspace software whitix consists range third party applications burn non-posix shell fruity simple text editor several filesystem utilities software ported whitix includes mono runtime environment c compiler python gnu compiler collection lua mplayer ports operating system self-hosting since october 2008 built gnu build chain 0.3 port gtk several linux applications planned whitix also adopts centralized approach userland configuration similar windows registry although widely used whitix software moment includes settings operating system software also linked whitix package management system currently development whitix supports several programming languages using utilities ported operating systems common collection utilities building whitix applications operating system programs found within gnu toolchain includes gnu compiler collection gcc gnu build system amongst others gcc provides compilers ada c c++ fortran whitix kernel designed built gcc ports languages python lua dynamic languages available ports .net languages also supported mono ported platform applications planned blaze platform built managed code development team issue releases ready however versions whitix declared stable general use latest release 0.2b released 1 march 2009 timing release depends stability features planned included although monthly release pattern minor versions improvements aim developers whitix.org | [
3368,
304,
5571,
6500,
352,
3751,
2266,
2530,
2803,
1435,
788
] | Validation |
4,228 | 7 | Ntractive:ntractive ntractive privately held software development company based grand forks north dakota marketed business software small medium-sized companies established 2006 company main product elements crm mac crm customer relationship management application aimed small business use mac os x computers ipads iphones. elements crm cloud computing web application employed unique site-specific browser merge desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm products original name 1.0 took place macworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 architecture overall development elements crm product line initially began 2003 company founder justin bartak company later founded january 2006 justin bartak dale jensen company specializing cloud computing mac crm customer relationship management apple hardware devices company elements crm platform part desktop part cloud powered webkit company ceased operations end 2016 mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support elements crm mac customer relationship management mac crm solution apple business offered subscription-based service elements crm part desktop part cloud main functions include managing leads contact information tracking communication history managing tasks follow ups tracking email communication creating estimates invoices managing projects elements crm ios universal mobile app iphone ipad ipad mini elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app elements crm mail email tracking tool works conjunction elements crm monitors user email server communication leads clients stored elements crm match found copy email stored elements crm within client record | [
2961,
2089,
5091
] | Test |
4,229 | 3 | OpenIndiana:openindiana openindiana free open-source unix operating system derived opensolaris based illumos developers forked opensolaris oracle corporation discontinued order continue development distribution source code openindiana project stewarded illumos foundation also stewards illumos operating system openindiana developers strive make de facto opensolaris distribution production servers security bug fixes required free charge project indiana originally conceived sun microsystems construct binary distribution around opensolaris source code base openindiana conceived negotiations takeover sun microsystems oracle proceeding order ensure continued availability development opensolaris-based os widely used uncertainty among opensolaris development community led developers form tentative plans fork existing codebase plans came fruition following announcement discontinuation support opensolaris project oracle formal announcement openindiana project made september 14 2010 jisc centre london first release operating system made available publicly time despite untested reason untested release openindiana team set launch date ahead oracle openworld order beat release solaris 11 express announcement openindiana met mainly positive response 350 people viewed online announcement iso image downloaded 2000 times twitter account obtained 500 followers numerous notable press websites wrote release broadcast bandwidth announcement substantial noted top 350mbit/second network package depot server experienced 20x much traffic interested distribution originally planned resulting threads later provisioned reporting positive online articles questioned relevance solaris given market penetration linux one article critical openindiana launch citing lack professionalism regard releasing untested build project lack commitment release schedule initial openindiana release advertised experimental directly based latest opensolaris development build preliminary opensolaris 2010 release opensolaris binary distribution moved solarisexpress real-time feed opensolaris updates discontinued concerns abounded would happen openindiana oracle decided stop feeding source code back community openindiana team mitigated concerns announced intention move source code feed illumos foundation concerns raised possible discontinuation free access oracle-owned compiler used produce openindiana response openindiana modified able compile open source gnu compiler collection hcl hardware compatibility list remains somewhat informal fragmented un-centralized requiring much end-user research hardware selection lack comprehensive centralized hcl follows fact opensolaris hcl hosted oracle server infrastructure server-side code device driver utility submission made available august 2012 founding project lead alasdair lumsden stepped project citing personal reasons frustration lack progress made project among reasons lack progress lack developers resources resignation lumsden wrote many us first open source project ever contributed included task hand vast ill equipped deal since resignation project developed team volunteers completely horizontal participative community effort september 2013 distrowatch review stated openindiana project seemingly steady decline last couple years review concluded openindiana progressed significantly state opensolaris five years may 2015 distrowatch review openindiana similarly concluded little major progress made system years review stated package selection hardware support seemed lag behind systems many system administration features either replicated ported linux bsd review concludes claims lack package support may mitigated fact 3500+ software packages provided openindiana hipster split several packages would artificially increase package count e.g like linux distributions image packaging system file-based package management providing incremental updates package facets making splitting unnecessary burden course first two years existence hipster project migrated updated 1500 packages maintains collection selected software packages relying third-party repositories like sfe add-ons extended selection pkgsrc system supported joyent readily provides 20000+ packages illumos systems openindiana fork technical sense continuation opensolaris spirit project intends deliver system v family operating system binary-compatible oracle products solaris 11 solaris 11 express however rather based os/net consolidation like opensolaris openindiana based illumos project use image packaging system ips package management system opensolaris openindiana codebase initially based majority publicly available code oracle case since oi_151a development builds based illumos september 2011 onwards project effectively moved away oracle-owned tools sun studio builds since 2013 including active hipster branch use gnu compiler collection gcc sole compiler illumos project built gcc since june 15 2012 first experimental release openindiana build 147 released september 14 2010 second experimental release build 148 released december 17 2010 first development release build 151 released september 14 2011 first release based upon illumos martux 151a0 released first sparc build openindiana build 151a7 intel/amd architectures released october 6 2012 build 151a8 released august 10 2013 opensxce 2013.01 sparc build 151a formerly martux released openindiana february 1 2013 second possibly last openindiana sparc build subsequent releases based upon dilos since development model inherited opensolaris project unsuitable community project hipster initiative created late 2013 reboot modernize openindiana hipster project fast development branch openindiana based rolling-release model horizontal contribution scheme oi-userland build system use continuous integration hipster actively maintained repository receives software updates well security fixes installation images published twice year every snapshot release announced via mailing list twitter first snapshot release delivered february 14 2014 subsequent snapshots based six-month development cycle notable features hipster list features updated development cycle roadmap page issue tracker | [
1522,
4751,
4478,
1260,
2098,
900,
2467,
3697,
6984,
2294,
6011,
5571,
2300,
7827,
2118,
6360,
578,
5232,
6367,
3559,
326,
3732,
5956,
1128,
4447,
6149,
3751,
6859,
6952,
971,
443,
3423,
8037,
3678,
1435,
6505
] | Test |
4,230 | 3 | ARM_Accredited_Engineer:arm accredited engineer arm accredited engineer aae program professional accreditations awarded arm holdings aae program designed computer software hardware engineers wishing validate knowledge arm technology program launched 2012 series events including arm techcon 2012 aae program consists number certifications syllabus assessed means separate one-hour multiple-choice exam aae program ended 2016 two accreditations currently available others launched next years http //ds.arm.com/developer-resources/arm-accredited-engineer-program/ aae entry-level accreditation first launched aae syllabus covers software-related aspects armv7 architecture specific focus cortex-a cortex-r profiles including applications processors real-time processors syllabus cover cortex-m systems aae certification aimed general embedded software systems developers broad knowledge arm technology syllabus covers following subject areas aame accreditation launched 16 september 2013 entry-level accreditation similar basic aae accreditation focused armv7 cortex-m profile accreditation aimed general embedded software engineers broad knowledge arm technology bias toward microcontrollers syllabus covers following subject areas following accreditations considered launch 2013 2016 aae program exams delivered prometric inc. supervised computer-based tests dedicated test platforms throughout network 10,000 authorized prometric test centers aptcs around world 70 multiple choice questions candidates given one hour complete test results issued instantly on-screen grades either pass fail letter percentage grades issued passing exam candidates also request paper certificate mailed | [
3365
] | Validation |
4,231 | 4 | David_Litchfield:david litchfield david litchfield born 1975 security expert united kingdom anne saita writing information security magazine called along brother mark litchfield world best bug hunters december 2003.also 2003 sister amelia litchfield born litchfield found hundreds vulnerabilities many popular products among outstanding discoveries products microsoft oracle ibm blackhat security briefings july 2002 presented exploit code demonstrate buffer overflow vulnerability discovered microsoft sql server 2000 six months later 25 january 2003 persons unknown used code template sql slammer worm several years vulnerability research litchfield made move oracle forensics documented perform forensic analysis compromised database server series white papers – oracle forensics parts 1 6 process researching developing open source tool called forensic examiner database scalpel f.e.d.s litchfield founded company named cerberus information security acquired stake july 2000 year half later founded next generation security software five colleagues stake author various software packages also many technical documents security issues author oracle hacker handbook co-author database hacker handbook shellcoder handbook sql server security also contributing author special ops david litchfield currently employed apple | [
519,
7213,
3842,
2618
] | Validation |
4,232 | 0 | Boris_Katz:boris katz boris katz born october 5 1947 chișinău moldavian ssr soviet union chișinău moldova principal american research scientist computer scientist mit computer science artificial intelligence laboratory massachusetts institute technology cambridge head laboratory infolab group research interests include natural language processing understanding machine learning intelligent information access brother victor kac mathematician mit able get ussr help u.s senator ted kennedy end cold war last several decades boris katz developing start natural language system allows user access various types information using english boris katz born october 5 1947 chișinău family hersh katz died 1976 hayki klara landman born 1921 lipcani briceni district died 2006 cambridge middlesex county moved lipcani town located northern bessarabian chișinău war graduated moscow state university november 1978 left united states thanks personal intervention senator edward m. kennedy defended thesis candidate physical mathematical sciences 1975 supervision evgenii m. landis currently lives boston heads infolabresearch team laboratory informatics artificial intelligence massachusetts institute technology boris katz creator start information processing system since 1993 internet author several works field processing generation perception natural languages machine learning accelerated access multimedia information brothers victor gershevich katz american mathematician professor massachusetts institute technology mikhail gershevich katz israeli mathematician graduate harvard columbia ph.d. 1984 universities professor bar-ilan university author monograph systolic geometry topology mathematical surveys monographs vol 137 american mathematical society providence 2007 daughter luba katz bioinformatics scientist husband alan jasanoff neuroimaging scientist professor mit son harvard university professors jay jasanoff sheila jasanoff | [
5429,
1243
] | Test |
4,233 | 2 | Berry_Linux:berry linux berry linux live cd linux distribution english japanese support berry linux based compatible fedora 20 packages distribution primarily focused use live cd also installed live usb drive berry linux used try showcase linux educational purposes rescue system without need make changes hard disk current version 1.19 released berry includes read/write ntfs support aiglx beryl bundled 3d desktop effects berry also uses bootsplash giving graphical startup full version v1.12 includes runs linux kernel 3.0.4 alsa sound system acpi support selinux berry linux features automatic hardware detection support many graphics cards sound cards scsi usb devices many peripherals network devices automatically configured dhcp full version berry linux uses kde version 4.6.5 berry linux mini uses fluxbox window manager full version 512.7mb mini version 273.4mb test berry linux necessary install distribution hard disk operating system runs entirely cd-rom however possible install berry linux hard disk requires 1.7 gigabytes free space supporting japanese berry includes whiz sharp kana-kanji conversion system also comes libreoffice version 3.4.3 microsoft office compatible office suite well textmaker/planmaker berry office software gimp version 2.6.10 bundled graphics software berry includes media players audacious mplayer xine kaffeine dvd divx codecs installed default berry linux historical releases following | [
5200,
1534,
1629,
3444,
7251,
3271,
474,
7075,
395,
1941,
578,
314,
5232,
2758,
1663,
2864,
3559,
6209,
5156,
6761,
2063,
343,
4824,
5523,
4455,
4008,
1893,
5259,
5530,
5704,
3751,
6317,
7587,
7954,
6244,
788
] | Test |
4,234 | 2 | Dalvik_Turbo_virtual_machine:dalvik turbo virtual machine dalvik turbo proprietary alternative google implementation dalvik virtual machine runs android operating system platforms developed french/swiss firm myriad group virtual machine runs java platform compatible mobile devices runs applications converted compact dalvik executable .dex format suitable systems constrained terms memory processor speed mips technologies/imagination technologies entered license agreement myriad make dalvik turbo virtual machine vm available licensees part standard distribution android mips architecture myriad claims applications run dalvik turbo three times faster reducing battery drain giving developers power need create graphically intense games dalvik turbo shown video 2.8 times faster running benchmark test | [
2903,
6074,
5372,
6427,
1095,
5740,
740,
5055,
4340,
42,
3310,
2591,
5771,
5775,
4365,
4368,
4370,
4372,
6865,
5804,
5473,
474,
6183,
822,
136,
6209,
6937,
6232,
536,
4116,
5195,
551,
5208,
195,
6978,
7346,
561,
201,
5917,
2017,
5919,
... | Test |
4,235 | 4 | Trojan.WinLNK.Agent:trojan.winlnk.agent trojan.winlnk.agent also trojan win32/startpage.os definition kaspersky labs trojan downloader trojan dropper trojan spy first known detection goes back may 31 2011 according microsoft malware protection center trojanware opens internet explorer browser predefined page like i.163vv.com/ 96 trojan files lnk extension expression windows shortcut malicious file program folder lnk file family launches malicious executable may dropped malware files mostly used worms spread via usb drives i.e | [
5452,
91,
1395,
601
] | Test |
4,236 | 3 | Interrupt_priority_level:interrupt priority level interrupt priority level ipl part current system interrupt state indicates interrupt requests currently accepted ipl may indicated hardware registers programmable interrupt controller software bitmask integer value source code threads integer based ipl may small single bit two values 0 interrupts enabled 1 interrupts disabled mos technology 6502 however architectures permit greater range values value enables interrupt requests specify higher level blocking ones lower level assigning different priorities interrupt requests useful trying balance system throughput versus interrupt latency kinds interrupts need responded quickly others amount processing might large makes sense assign higher priority kind interrupt control interrupt level also used synchronize access kernel data structures thus level-3 scheduler interrupt handler would temporarily raise ipl 7 accessing actual scheduler data structures lower back 3 actually switching process contexts however allowed interrupt handler lower ipl entered since could destroy integrity synchronization system course multiprocessor systems add complications addressed regardless hardware might support typical unix-type systems make use two levels minimum interrupts disabled maximum interrupts enabled example one elaborate ipl-handling systems ever deployed vax computer associated vms operating system supports 32 priority levels 0 31 priorities 16 requests external hardware values 16 available software interrupts used internally operating system schedule activities values actually used important ones alpha hardware contains native support ipls openvms ported itanium 2001 ipl scheme simulated using features provided itanium hardware | [
2226,
3214,
4061,
3849,
8117,
578
] | Test |
4,237 | 4 | Mutual_authentication:mutual authentication mutual authentication two-way authentication refers two parties authenticating time default mode authentication protocols ike ssh optional others tls default tls protocol proves identity server client using x.509 certificate authentication client server left application layer tls also offers client-to-server authentication using client-side x.509 authentication requires provisioning certificates clients involves less user-friendly experience rarely used end-user applications mutual tls authentication mtls much widespread business-to-business b2b applications limited number programmatic homogeneous clients connecting specific web services operational burden limited security requirements usually much higher compared consumer environments mutual authentication machine-to-machine leaving chance whether users notice care remote authentication fails e.g red address bar browser padlock wrong domain name non-technical mutual-authentication also exists mitigate problem requiring user complete challenge effectively forcing notice blocking authenticating false endpoint mutual authentication two types | [
3434,
4757,
7626,
2644,
7630,
1747,
3794,
661,
2489,
4346,
4261,
1593,
7214,
7865,
4836,
1805,
3426
] | Test |
4,238 | 3 | SEX_(computing):sex computing computing sex assembly language mnemonic often used codice_1 machine instruction found motorola 6809 computer cpu sex also mean endianness computer architecture used x86 computers byte sex hc11 computers example functions sometimes needed computers different endianness communicate internet protocols often use big endian byte coding default rca 1802 series microprocessors sex codice_2 instruction used designate machine sixteen 16-bit registers x index register tla sex humorously said stand software exchange meaning copying software file sharing sometimes spread computer viruses stated “ illicit sex transmit viral diseases computer. ” involvement ftp servers /pub directories process led name explained contraction 'pubic | [
6922,
352,
5401,
336
] | Test |
4,239 | 4 | Mary_D'Imperio:mary d'imperio mary d'imperio american cryptographer introduced problem voynich manuscript john tiltman 1975 written several books journal articles manuscript include 'the voynich manuscript elegant enigma 'the voynich manuscript scholarly mystery 'an application cluster analysis multiple scaling question hands languages voynich manuscript d'imperio degrees comparative philology classics radcliffe college graduated magna cum laude structural linguistics university pennsylvania elected member phi beta kappa radcliffe 1950 according 1976 introduction vera filby career government since 1951 linguist cryptanalyst thinks mainly computer programmer 1960 1962 d'imperio created temac text macro compiler language processing text 1987 2006 frequent contributor north american breeding bird survey reports father philadelphia sculptor dominic d'imperio | [
1353
] | Test |
4,240 | 9 | Logical_framework:logical framework logic logical framework provides means define present logic signature higher-order type theory way provability formula original logic reduces type inhabitation problem framework type theory approach used successfully interactive automated theorem proving first logical framework automath however name idea comes widely known edinburgh logical framework lf several recent proof tools like isabelle based idea unlike direct embedding logical framework approach allows many logics embedded type system logical framework based general treatment syntax rules proofs means dependently typed lambda calculus syntax treated style similar general per martin-löf system arities describe logical framework one must provide following summarized case lf logical framework meta-language λπ-calculus system first-order dependent function types related propositions types principle first-order minimal logic key features λπ-calculus consists entities three levels objects types kinds type classes families types predicative well-typed terms strongly normalizing church-rosser property well-typed decidable however type inference undecidable logic represented lf logical framework judgements-as-types representation mechanism inspired per martin-löf development kant notion judgement 1983 siena lectures two higher-order judgements hypothetical formula_1 general formula_2 correspond ordinary dependent function space respectively methodology judgements-as-types judgements represented types proofs logical system formula_3 represented signature assigns kinds types finite set constants represents syntax judgements rule schemes object-logic rules proofs seen primitive proofs hypothetico-general judgements formula_4 implementation lf logical framework provided twelf system carnegie mellon university twelf includes | [
4405,
3149,
7719,
3659,
3300
] | Test |
4,241 | 3 | Sun_Fire_T2000:sun fire t2000 sun fire t2000 server code named ontario system engineered sun microsystems applications including web 2.0 databasing part sun fire line t2000 among first servers leverage sun coolthreads processing technology improves energy-efficiency systems introduced december 2005 sun t2000 reached end life eol november 2009 t2000 powered four-core six-core eight-core ultrasparc t1 processor supports 64 gib ecc ddr2 sdram system memory using 16 dimm slots 584 gigabytes internal storage serial attached scsi drives infoworld noted system light class 3.5 inches tall 16.7 inches wide 24.4 inches deep weighs 40 pounds t2000 offered sun preloaded solaris 10 operating system | [
4221,
418
] | Test |
4,242 | 3 | James_A._Kahle:james a. kahle jim kahle ibm fellow chief architect many ibm power microprocessors mr. kahle born venezuela father worked oil business received b.s degree rice university 1983 working ibm since early 1980s risc-based microprocessors work started physical design tools currently concentrated risc architecture 20 years experience chip design 160 patents key defining power architecture superscalar microprocessor designs ibm forefront developing multicore designs asymmetric multiprocessors smt microarchitectures key designer rios processor launched rs/6000 family workstations servers one founders somerset design center birthplace powerpc architecture project manager powerpc 603 subsequent designs like powerpc 750 also chief architect power4 core later director technology sti design center cell technology austin texas | [
6597,
450,
2719,
4408,
5042,
7453,
5665,
1388,
2139,
4718,
239,
763,
602,
2873,
2601,
3234,
3674,
4200,
1606,
1244,
4839
] | Test |
4,243 | 7 | Radek_Maneuver:radek maneuver radek maneuver scale-up-then-scale-down tactic used administration web services specifically deployed cloud computing paradigm provider e.g amazon elastic compute cloud microsoft azure developed olivier radek dabrowski mid-2010 radek maneuver originally conceived using maintaining applications running paas system radek maneuver consists series steps usually executed via paas web portal interface tactic used service misbehaving otherwise experiencing errors suspected cause underlying cloud layer rather application layer includes networking issues bad box problems steps follows scale-up-scale-down method understood shift application different physical machine underlying paas service application virtual machine layer cloud computing stack generally access application developer instead hands cloud provider maneuver allows troubleshooting dodging errors layer | [
2961,
6986
] | Validation |
4,244 | 2 | TRIPOS:tripos tripos trivial portable operating system computer operating system development started 1976 computer laboratory cambridge university headed dr. martin richards first version appeared january 1978 originally ran pdp-11 later ported computer automation lsi4 data general nova work motorola 68000 version started 1981 university bath metacomco acquired rights 68000 version continued development tripos chosen commodore amiga march 1985 form part operating system new computer also used cambridge part cambridge distributed computing system july 1985 amiga introduced incorporating tripos amigados module amigaos amigados included command line interface amiga file system entire amigados module originally written bcpl ancestor c programming language language used write tripos amigados would later rewritten c amigaos 2.x onwards retaining backwards compatibility 1.x amigaos 4 completely rewritten c amigados abandoned bcpl legacy tripos provided features pre-emptive multi-tasking using strict-priority scheduling hierarchical file system multiple command line interpreters important tripos concepts non-memory-management approach meaning checks performed stop programs using unallocated memory message passing means passing pointers instead copying message contents two concepts together allowed sending receiving 1250 packets per second 10 mhz motorola 68010 cpu tripos implemented bcpl kernel device drivers implemented assembly language one notable feature tripos/bcpl cultural use shared libraries untypical time resulting small therefore fast loading utilities example many standard system utilities well 0.5 kbytes size compared typical minimum 20 kbytes functionally equivalent code modern unix linux tripos ported number machines including data general nova 2 computer automation lsi4 motorola 68000 intel 8086- based hardware included support cambridge ring local area network recently martin richards produced port tripos run linux using cintcode bcpl virtual machine january 2019 tripos still actively maintained open g ltd. formerly misys financial systems worcestershire uk many british insurance brokers linux/intel based tripos system serving networked workstations tcp/ip connection systems used run open g brooms application suite open g added number features support modern office ability integrate many mainstream applications services sql server citrix xenapp terminal servers etc following list commands supported tripos cli cintpos experimental interpretive version tripos runs cintcode bcpl virtual machine also developed martin richards | [
1807,
4297,
4670,
5021,
13,
1454,
3271,
6431,
3276,
5041,
7546,
7550,
405,
1855,
4347,
4354,
65,
5079,
4733,
7942,
6853,
5088,
6500,
785,
2266,
788,
3682,
1522,
7605,
7611,
4759,
7242,
3688,
1534,
4397,
6892,
5833,
126,
6907,
4786,
4423... | Test |
4,245 | 4 | IID_(company):iid company iid previously internet identity privately held internet security company based tacoma washington united states iid acquired all-cash transaction infoblox february 8 2016 primarily provides cyberthreat data platform exchange cyberthreat data anti-phishing malware domain control security services us federal government agencies financial service firms e-commerce social networking internet service provider isp companies microsoft uses iid data feed anti-phishing software well partner domain defense program customers include becu boeing employees ’ credit union monster.com yakima valley credit union iid founded 1996 providing outsourced domain management services 1997 company claims discovered disabled one earliest phishing attacks since iid ’ business revolved around protecting companies cyber attacks 2013 iid accepted first round institutional funding 8 million bessemer venture partners iid acquired all-cash transaction infoblox february 8 2016 activetrust iid ’ threat intelligence management system company claims gets threat data thousands sources determines data useful defend cyberattacks activetrust feeds data fortune 500 companies ’ u.s. government agencies ’ cybersecurity appliances leading iid claim activetrust world ’ largest commercial cyberthreat data exchange provides list latest malicious compromised ip addresses domains e-mail accounts identifies bad players organization connected extended enterprise activetrust data formerly known activeknowledge iid ’ threat intelligence team investigates analyzes validates threat data identify patterns trends revealing ongoing attacks future hazards ti team takes shared data activetrust uses filtering analysis add structure context detects diagnoses mitigates dns domain name system security configuration issues organization extended enterprise tool reportedly helped iid identify dns hijacking twitter december 2009 also reportedly helped find half fortune 500 companies infected dnschanger provides anti-phishing malware security solutions help organizations ensure online brands trusted mitigation formerly known activecontrol power shark iid holds leadership positions various security industry groups including anti-phishing working group apwg internet corporation assigned names numbers icann messaging anti-abuse working group maawg | [
2789,
5619
] | Test |
4,246 | 8 | Web_Services_Conversation_Language:web services conversation language web service conversation language wscl proposal defines overall input output message sequences one web service using finite state automaton fsa alphabet message types | [
6986,
1760,
5500,
84
] | Test |
4,247 | 4 | Prolexic_Technologies:prolexic technologies prolexic technologies u.s.-based provider security solutions protecting web sites data centers enterprise ip applications distributed denial service ddos attacks network transport application layers february 2014 akamai technologies acquired prolexic technologies operated ddos mitigation platform global network traffic scrubbing centers real-time monitoring mitigation services provided 24/7 security operations control center socc prolexic indicated ddos mitigation services make websites data centers enterprise ip applications harder take via ddos attacks 2003 prolexic technologies founded barrett lyon subject book fatal system error joseph menn prolexic protects organizations following markets airlines/hospitality e-commerce energy financial services gambling gaming public sector software service sony said customer company prolexic claims largest banks clients 2005 company named one 100 hottest private companies north america red herring 2011 prolexic indicated secured payment card industry data security standard pci dss level 2 compliance certification pci security standards council would speed deployment remediation compliant organizations encrypted application layer 7 ddos attacks 2011 prolexic ceo scott hammack president stuart scholly joined company prolexic acquired internet content delivery network akamai technologies 370 million deal completed february 2014 2011 prolexic completed two financing rounds led kennet partners totaling 15.9 million 2012 company reported 2011 achieved profitability compound annual growth rate 45 2012 baltimore private equity firm camden partners invested 6 million company american trading production corp invested 2 million part 8 million series b funding round deal jason tagler camden partners joined board directors prolexic prolexic said would use series b money support staff augment network 2013 prolexic closed us 30 million series c funding round led new investors trident capital intel capital kennet partners camden partners medina capital took part funding round company claims partners bt global services datacraft grove internap ip converge level 3 communications preventia telstra prolexic provides three kinds ddos protection services clients monitoring attack detection services mitigation services intercept attacks attack intelligence post-attack intelligence services addition prolexic aggregates intelligence information reports active botnets fraud-linked ip addresses company opened first network traffic scrubbing center north america 2003 europe 2005 asia 2007 2012 company ’ traffic scrubbing capability excess 500 gbit/s bandwidth comprised multiple carriers distributed global network firm said investing infrastructure cope 1.2tbit/s peak traffic loads end 2013 many ddos attacks concerted efforts sophisticated live attackers prolexic uses combination automated tools human expertise part services 2012 company said successfully stopped ddos attacks affecting clients date including attacks application servers layer 4 syn floods layer 7 attacks well http get flood attacks zero-day attacks udp/icmp floods tcp flag abuses dns reflection dns attacks prolexic said mitigated largest ddos attack 2011 involved 250,000 computers infected malware company ’ service typically mitigates attacks within 5 20 minutes client network traffic starts flowing scrubbing center prolexic mitigated 30,000 ddos attacks 2003–2011 2011 prolexic mitigated 10 80 attacks daily 2012 hacktivism vandalism cited main inspiration ddos attacks rather extortion past type motivation said make company victim high-profile organizations organizations sizes said risk ddos attacks newer application-level attacks targeted classic ddos botnet attacks ’ need many resources deploy cloud-based ddos mitigation approach used prolexic employs technology redirect traffic company ’ ddos mitigation service scrub traffic send legitimate traffic client site attack mitigation approach said lower-cost traditional approach company maintaining network firewall making ddos attack prevention option firms business web | [
1691,
330,
7048,
1612,
4966
] | Validation |
4,248 | 4 | Sendio:sendio sendio newport beach california-based e-mail security company privately held company founded 2004 tal golan currently serves company president cto using sender address verification technology sendio provides e-mail security solution stops spam viruses malware phishing attacks unsolicited e-mail reaching e-mail inbox february 2007 sendio received 4 million venture capital funding vicente capital shepherd ventures athenian venture partners former microsoft cio rick devenuti appointed board directors sendio 2007 sendio customers include central dupage hospital arnerich massena inc. leading hotels world penn state sentinel real estate corporation sendio e-mail security platform formerly named i.c.e box appliance solution eliminates spam viruses e-mail security platform esp uses verification model first-time unsolicited senders scans viruses phishing directions outbound message recipients added user personal accept contact list authenticated subsequent messages sender assured reaching recipient inbox esp combines silverlisting technology includes set low-level smtp tests determine legitimacy sending e-mail server sender address verification verifies authenticity first-time unsolicited senders introduces human element process combination silverlisting sav prevents 100 spam esp employs verification model similar one embraced millions social networking users facebook linkedin “ buddy ” list model used leading instant messaging providers skype yahoo google aol sendio i.c.e box named best best product year 2006 government computer news email integrity award winner 2007 tomorrow technology today sendio named emerging vendor crn magazine security technology sector june 2008 | [
6092
] | Test |
4,249 | 2 | PC/TCP_Packet_Driver:pc/tcp packet driver pc/tcp packet driver networking api ms-dos pc dos later x86 dos implementations dr-dos freedos etc implements lowest levels tcp/ip stack remainder typically implemented either tsr drivers library linked application program invented 1983 mit lab computer science csr/csc group jerry saltzer david d. clark commercialized 1986 ftp software packet driver uses x86 interrupt number int number used detected runtime commonly 60h may changed avoid application programs use fixed interrupts internal communications interrupt vector used pointer 4-bytes little endian address possible interrupt handler text string pkt drvr found within first 12-bytes immediately following entry point driver located packet drivers implement many different network interfaces including ethernet token ring rs-232 arcnet x.25 winpkt driver enables use packet drivers microsoft windows moves around applications willy nilly w3c507 dll packet driver microsoft windows environment support ethernet alike network interface using 8250 uart cslip ipx token ring localtalk arcnet | [
204,
709,
6380,
126,
352,
7029
] | Validation |
4,250 | 8 | Tcpkill:tcpkill tcpkill network utility program used kill connections particular host network port combination programs take standard berkeley packet filter bpf filters used port mirroring arp spoofing prevent connections host www.google.com use command computer attempting go site blocked site surf site good idea either redirect output nothingness 2 /dev/null 1 /dev/null file later analysis file.tcpkill default redirect output console hosts specified command block well−known ports e.g. napster port 8888 port 6699 gnutella port 6346 command tcpkill used create dos attack within wan lan done using sniffer like dsniff tcpdump look packets transmitted pick target want deny service assume target identified 192.168.100.38 simple command like tcpkill -9 host 192.168.100.38 kill outgoing tcp packets tcp segment target rest network prior attack target receive packets rest network -i -i option specify interface want program listen default option interface computers eth0 computers one interface -1 ... 9 -1 -9 specify degree brute force want attack use target -1 least brute -9 brute computers network fast connection usually require brute force order successfully perform dos attack otherwise command run without -1 -9 option -i option description one various dsniff programs text belongs dsniff “ readme ” written author dug song see also filesnarf macof mailsnarf msfsnarf sshmitm tcpnice urlsnarf webmitm webspy | [] | Validation |
4,251 | 3 | IBM_ROMP:ibm romp romp reduced instruction set computer risc microprocessor designed ibm late 1970s also known research opd microprocessor two ibm divisions collaborated inception ibm research office products division opd 032 romp originally developed office equipment small computers intended follow-on mid-1970s ibm opd mini processor microprocessor used ibm office system/6 word-processing system first examples became available 1981 first used commercially ibm rt pc announced january 1986 time rt pc planned personal computer romp replacing intel 8088 found ibm personal computer however rt pc later re-positioned engineering scientific workstation computer later cmos version romp first used coprocessor board ibm 6152 academic system introduced 1988 later appeared models rt pc architectural work romp started late spring 1977 spin-off ibm research 801 risc processor hence research acronym architectural changes cost reduction adding 16-bit instructions byte-efficiency original romp 24-bit architecture instruction set changed 32 bits years development first chips ready early 1981 making romp first industrial risc processor revealed international solid-state circuits conference 1984 romp first appeared commercial product processor ibm rt pc workstation introduced 1986 provide examples rt pc production volume production romp mmu began 1985 delay completion romp design introduction rt pc caused overly ambitious software plans rt pc operating system os os virtualized hardware could host multiple operating systems technology called virtualization commonplace mainframe systems began gain traction smaller systems 21st century improved cmos version romp first used ibm 6152 academic system workstation later models rt pc ibm research used romp research parallel processor prototype rp3 early experimental scalable shared-memory multiprocessor supported 512 processors first detailed 1985 cmos version ace experimental numa multiprocessor operational 1988 romp architecture based original version ibm research 801 minicomputer main differences larger word size 32 bits instead 24 inclusion virtual memory architecture supported 8- 16- 32-bit integers 32-bit addressing 40-bit virtual address space instruction pointer register sixteen 32-bit general-purpose registers microprocessor controlled 118 simple 16- 32-bit instructions romp virtual memory segmented 40-bit 1tb address space consisting 4,096 256mb segments 40-bit virtual address formed mmu concatenating 12-bit segment identifier 28 low-order bits 32-bit romp-computed virtual address segment identifier obtained set 16 segment identifiers stored mmu addressed four high-order bits 32-bit romp-computed virtual address romp scalar processor three-stage pipeline first stage instructions 16-byte instruction prefetch buffer instruction fetched decoded operands general-purpose register file read instruction prefetch buffer read 32-bit word memory whenever romp accessing instructions executed second stage written back general-purpose register file third stage romp used bypass network appropriate scheduled register file reads writes support back-to-back execution dependent instructions register-to-register instructions executed single cycle 118 instructions 84 single-cycle latency romp ibm-developed companion integrated circuit code-named rosetta development rosetta memory management unit mmu provided romp address translation facilities translation lookaside buffer store buffer romp rosetta originally implemented ibm 2μm silicon-gate nmos technology two levels metal interconnect romp consists 45,000 transistors 7.65×7.65mm large 58.52mm rosetta consists 61,500 transistors 9.02×9.02mm large 81.36mm packaged 135-pin ceramic pin grid arrays cmos version romp rosetta called romp-c rosetta-c later developed | [
5893,
4479,
895,
8066,
6177,
4408,
7541,
3014,
2567,
5571,
1556,
2929,
5055,
2130,
2226,
4254,
6922,
1772,
5521,
3747,
5614,
6236,
534,
1430,
2443,
971
] | Test |
4,252 | 1 | Flat-file_database:flat-file database flat-file database database stored file called flat file records follow uniform format structures indexing recognizing relationships records file simple flat file plain text file binary file relationships inferred data database database format make relationships explicit term generally implied small database large databases also flat plain text files usually contain one record per line different conventions depicting data comma-separated values delimiter-separated values files fields separated delimiters comma tab characters cases field may fixed length short values may padded space characters extra formatting may needed avoid delimiter collision using delimiters incurs overhead locating every time processed unlike fixed-width formatting may performance implications however use character delimiters especially commas also crude form data compression may assist overall performance reducing data volumes — especially data transmission purposes use character delimiters include length component declarative notation comparatively rare vastly reduces overhead associated locating extent field examples flat files include codice_1 codice_2 unix-like operating systems another example flat file name-and-address list fields name address phone number list names addresses phone numbers written hand sheet paper flat-file database also done typewriter word processor spreadsheet text editor program may used implement flat-file database may printed used online improved search capabilities herman hollerith work us census bureau first exercised 1890 united states census involving data tabulated via hole punches paper cards may considered first computerized flat-file database presumably included cards indexing cards otherwise relating individual records i.e individual cards one another save group membership 1980s configurable flat-file database computer applications popular ibm pc macintosh programs designed make easy individuals design use databases almost par word processors spreadsheets popularity examples flat-file database software include early versions filemaker shareware pc-file popular dbase flat-file databases common ubiquitous easy write edit suit myriad purposes uncomplicated way linear stores nosql data json formatted data primitive spreadsheets perhaps comma-separated tab-delimited text files seen flat-file databases lack integrated indexes built-in references data elements complex data types programs manage collections books appointments address book may use essentially single-purpose flat-file databases storing retrieving information flat files unadorned indexes pointing systems user write table contents text file text file format include concept table contents user may write friends kathy notes section john contact information interpreted user rather built-in feature database database system begins recognize codify relationships records begins drift away flat detailed system describing types hierarchical relationships structured considered flat following example illustrates typical elements flat-file database data arrangement consists series columns rows organized tabular format specific example uses one table columns include name person name second column team name athletic team supported person third column numeric unique id used uniquely identify records first column example textual representation described data type data representation quite standard flat-file database although additional considerations readily apparent text | [
1905,
3928,
3169,
3255,
7071,
6543,
6364,
2937,
7999,
6462,
1768,
2054,
5419,
7757,
5338,
5778,
7303,
784,
4463,
2265
] | Test |
4,253 | 4 | Cliqz:cliqz cliqz privacy oriented web browser developed cliqz gmbh majority-owned hubert burda media available desktop mobile web browser well extension firefox fork firefox web browser privacy-oriented changes among crowdsourced anti-tracking mechanism in-house search engine embedded within browser utilizing index web pages produce suggestions within address bar dropdown menu rather separate pages browser developers argued privacy-focused search engines may still pass user ip address third-party search providers august 2016 mozilla developer firefox made minority investment cliqz cliqz plans eventually monetize software program known cliqz offers deliver sponsored offers users based interests browsing history however recommendations processed locally based remote repository offers personally identifiable data sent remote servers 15 february 2017 cliqz international gmbh wholly owned subsidiary cliqz gmbh acquired privacy-oriented browser extension ghostery 6 october 2017 mozilla announced test approximately 1 users downloading firefox germany would receive version cliqz software included feature providedrecommendations directly browser search field including news weather sports websites based user browsing history activities press release noted users receive version firefox cliqz browsing activity sent cliqz servers including urls pages visit cliqz uses several techniques attempt remove sensitive information browsing data sent firefox according firefox support website version firefox collects sends data cliqz corporation including text typed address bar queries search engines information visited webpages interactions including mouse movement scrolling amount time spent user interactions user interface cliqz software data tied unique identifier allowing cliqz track long-term performance interaction data collected sent mozilla corporation includes among things counts visits search engine pages search engines used cliqz identifier data collection enabled default users must actively opt-out wish data transmitted | [
1152,
4565,
4655,
2812,
2451,
5542,
5984,
4759,
5283,
7628,
5821,
1276,
6809,
5127,
393,
5571,
3291,
2574,
578,
3383,
7015,
8006,
5506,
3043,
4352,
4725,
6221,
520,
3057,
5699,
1136,
348,
1057,
5887,
1435
] | Test |
4,254 | 2 | Virtual_address_space:virtual address space computing virtual address space vas address space set ranges virtual addresses operating system makes available process range virtual addresses usually starts low address extend highest address allowed computer instruction set architecture supported operating system pointer size implementation 4 bytes 32-bit 8 bytes 64-bit os versions provides several benefits one security process isolation assuming process given separate address space new application 32-bit os executed process vas one memory addresses 0 2 − 1 space single byte value initially none values '- represents value using setting values vas would cause memory exception application executable file mapped vas addresses process vas mapped bytes exe file os manages mapping v values bytes mapped file required dll files mapped includes custom libraries well system ones kernel32.dll user32.dll process starts executing bytes exe file however way process use set '- values vas ask os map bytes file common way use vas memory way map page file page file single file multiple distinct sets contiguous bytes mapped vas different parts page file map vas different processes microsoft windows 32-bit default made available processes use used operating system later 32-bit editions microsoft windows possible extend user-mode virtual address space left kernel-mode virtual address space marking programs image_file_large_address_aware enabling /3gb switch boot.ini file microsoft windows 64-bit process running executable linked /largeaddressaware operating system artificially limits user mode portion process virtual address space 2 gib applies 32- 64-bit executables processes running executables linked /largeaddressaware yes option default 64-bit visual studio 2010 later access virtual address space 32-bit executables 64-bit executables windows windows 8 64-bit executables windows 8.1 later allocating memory via c malloc establishes page file backing store new virtual address space however process also explicitly map file bytes x86 cpus linux 32-bit allows splitting user kernel address ranges different ways 3g/1g user/kernel default 1g/3g user/kernel 2g/2g user/kernel | [
6593,
2633,
4759,
5637,
6256,
8066,
4039,
5472,
8174,
7071,
4779,
5225,
4694,
1435,
5571,
8097,
578,
5751,
1857,
4251,
5415,
5190,
3905,
4359,
6849,
5962,
2886,
352,
2617,
1803,
1248
] | Test |
4,255 | 4 | Relocatable_user_backup:relocatable user backup relocatable user backup rub ability restore relocate backups another system site one primary ways mitigate threat service-provider lock-in software service model also provides backup event service-provider suffers catastrophic failure concept requires 3 fundamental components third component also contains implication either application provided backup consistent ongoing application upgrade path prevent situation restore rub prevented due obsolete version application software | [
330,
2390
] | Test |
4,256 | 4 | Point-of-sale_malware:point-of-sale malware point-of-sale malware pos malware usually type malicious software malware used cybercriminals target point sale pos payment terminals intent obtain credit card debit card information card track 1 track 2 data even cvv code various man-in-the-middle attacks interception processing retail checkout point sale system simplest evasive approach ram-scraping accessing system memory exporting copied information via remote access trojan rat minimizes software hardware tampering potentially leaving footprints pos attacks may also include use various bits hardware dongles trojan card readers wireless data transmitters receivers gateway transactions pos malware enables hackers process steal thousands even millions transaction payment data depending upon target number devices affected long attack goes undetected done outside card information usually encrypted sent payment processor authorization discovered 2011 installs windows computer service called rdasrv.exe scans track 1 track 2 credit card data using perl compatible regular expressions includes customer card holder ’ name account number expiry date cvv code discretionary information information gets scraped stored data.txt currentblock.txt sent hacker discovered october 2012 gets installed pc automatically gets embedded auto script loads malware memory scrapes credit card cc data pos software vskimmer scrapes information windows system detecting card readers attached reader sends captured data cyber criminal control server discovered december 2012 steal system information along track 1 track 2 card details help keylogger installed onto computer spyware created steal credit debit card information pos system blackpos gets pc stealth-based methods steals information send external server memory-scraping malware tracks track 2 data access card magnetic stripe help magnetic stripe readers sends data hacker clone fake credit cards fastpos malware pos malware discovered trend micro researchers strikes point sale system fast snatches credit debit card information sends data cyber criminal instantly malware capability exfiltrate track data using two techniques key logger memory scraper pandalabs discovered malware infects point sale system breach credit debit card details punkeypos malware uses two functions keylogger ram scraper steal information point sale terminal information stolen encrypted sent cybercriminal ’ control command server c c new variant pos malware point sale malware discovered fireeye follows new advanced technique steal retail customer ’ card information help lunh algorithm exfiltrate stolen information first block http ftp traffic monitors data exfiltration belongs family newposthings malware centerpos pos point sale malware found year 2015 september along malicious malware blackpos newposthings alina malware fireeye experts scrapes stolen credit debit card sends data http post request help triple des encryption malumpos point sale malware records point sale ’ data running oracle micros payment system breached 333,000 data world uses delphi programming language stealing credit debit card details stolen data sent cyber criminal sold black market | [
5269,
7332,
5723,
2566,
3302,
7194,
3038,
3480,
4440,
153,
8133,
2891,
1241,
88,
3426
] | Train |
4,257 | 4 | Chkrootkit:chkrootkit chkrootkit check rootkit common unix-based program intended help system administrators check system known rootkits shell script using common unix/linux tools like codice_1 codice_2 commands search core system programs signatures comparing traversal codice_3 filesystem output codice_4 process status command look discrepancies used rescue disc typically live cd optionally use alternative directory run commands techniques allow chkrootkit trust commands upon depends bit inherent limitations reliability program attempts detect compromises rootkits computer viruses newer rootkits may specifically attempt detect compromise copies chkrootkit programs take measures evade detection | [
3838,
4618,
5571,
5857,
7246,
578,
900,
5401,
788,
6823
] | Train |
4,258 | 2 | IBoot:iboot iboot stage 2 bootloader apple products replaces old bootloader bootx compared predecessor iboot improves authentication performed boot chain macos boot process starts running code stored secured uefi boot rom first stage boot rom two primary responsibilities initialize system hardware post component select operating system run uefi component ios boot process starts running device boot rom code systems s1 processors a9 earlier a-series processors boot rom loads low-level bootloader llb loads iboot systems newer processors boot rom loads iboot goes well iboot proceed load ios kernel well rest operating system llb iboot fails load ios fails verify ios bootloader jumps recovery mode otherwise loads remaining kernel modules macos iboot located codice_1 kernel drivers necessary booting loaded boot loader starts kernel ’ initialization procedure point enough drivers loaded kernel find root device | [
8051,
2627,
7609,
3940,
7335,
713,
7064,
6342,
5109,
3445,
2284,
997,
569,
1187,
4690,
5571,
6188,
734,
7000,
1562,
6909,
6548,
502,
6557,
6295,
2679,
4975,
3989,
2597,
6565,
2145,
3322,
2880,
1502,
163,
3151,
6582,
5786,
352,
1897,
375... | Validation |
4,259 | 5 | TCP_fusion:tcp fusion tcp fusion feature providing tcp loopback implemented transmission control protocol stack within oracle solaris-10 solaris-11 operating systems well number software projects based open source codebase opensolaris project idea trivial client server connection local loopback interface within system need entire tcp/ip protocol stack exchange data therefore provide faster data path fusion two end points source code well documented inet/tcp/tcp_fusion.c clearly states tcp fusion protocol-less data path tcp loopback connections fusion two local tcp endpoints occurs connection establishment time various conditions see details tcp_fuse need met fusion successful fails fall back regular tcp data path succeeds endpoints proceed use tcp_fuse_output transmit path tcp_fuse_output enqueues application data directly onto peer receive queue protocol processing involved sychronization handled squeue mutex tcp_non_sq_lock one requirements fusion succeed endpoints need using squeue ensures neither side disappear side still sending data flow control information manipulated outside squeue tcp_non_sq_lock must held touching tcp_flow_stopped feature may enabled disabled via /etc/system config file solaris genunix kernel line required set ip do_tcp_fusion 0x0 set feature false 0x1 hexadecimal true see https //github.com/illumos/illumos-gate/blob/master/usr/src/uts/common/inet/tcp/ | [] | Test |
4,260 | 3 | Dragon_Quest_II:dragon quest ii dragon quest ii luminaries legendary line titled dragon warrior ii initially localized north america role-playing video game rpg developed chunsoft published enix 1987 family computer famicom part dragon quest series enix u.s. subsidiary published american version dragon warrior ii nintendo entertainment system nes 1990 dragon quest ii set one hundred years events first game game story centers prince midenhall ordered stop evil wizard named hargon hargon destroys moonbrooke castle adventure accompanied two cousins prince cannock princess moonbrooke dragon quest ii expands first game larger party areas explore multiple heroes enemies battle sailing ship game successor dragon quest iii follows ancestor main characters legendary hero erdrick three games collectively called erdrick saga trilogy planning began month original dragon quest released one major goal development exciting combat system inspired similar multi-character party systems one found wizardry artwork used basis characters monsters painted akira toriyama translated pixel art game hit delays due game balance fully corrected early sections game combined staff included students familiar coding debugging process pushed back release month developers also many ideas discarded due technical limitations famicom system though later incorporated subsequent remakes game sequel dragon quest iii dragon quest ii successful japan original famicom version shipped 2.4 million copies later game remade super famicom game boy color combined original dragon quest game release entitled dragon quest ii version game android ios released japan june 26 2014 worldwide october 9 2014 dragon quest ii luminaries legendary line game praised improving almost aspects original including better graphics larger world explore characters participate dynamic combat system dragon quest ii known one difficult dragon quest games especially late game retained reputation even later ports platforms made game somewhat forgiving dragon quest ii role-playing video game allows player control one character characteristics first game dragon quest series game introduced party system instead beginning game entire party common previous computer rpgs player begins game one character gradually recruits party members course game player controls characters move game world search treasure chests talk trade villagers equip weapons armor cast spells wandering fields towers caves seas dungeons player randomly encounters monsters game shifts battle mode game battle mode introduces groups monsters upgrade one-on-one battles dragon quest battle mode player gives orders characters fight monsters player defeats monsters characters gain experience points gold experience points raise characters experience levels improves characters attributes may also learn new spells win player must fight monsters improve characters experience levels get gold buy better weapons armor eventually player characters become strong enough make next town dungeon repeats player reaches final boss defeats however gameplay necessarily linear especially player gets boat exploration key component game game offers spots save game towns talking king minister saves game american version incorporated battery saved games rather password system original talking king also allows deletion moving saved games dragon quest ii noted greatly expanding upon gameplay previous game dragon quest game first series feature multiple heroes enemies battle well sailing ship also allowed player land ship anywhere making possible explore entire game world open-ended manner included new gameplay features weapons cast spells used battles compared predecessor dragon warrior ii offers wider array spells items much larger world game also expanded inventory management system predecessor giving character individual inventory holds eight items placing greater emphasis conservative item management characters dragon quest ii luminaries legendary line also first dragon quest game include game chance played lottery tickets player finds also first dragon quest game use multiple key types include travel doors warp gates dragon quest ii set one hundred years dragon quest story begins attack upon moonbrooke castle wizard hargon seeks summon demon malroth destroy world wounded soldier escaped battle fled kingdom midenhall informs king attack dies king commands son descendant erdrick known loto japanese translations later localizations defeat hargon prince begins quest alone later joined two cousins prince cannock princess moonbrooke finding prince cannock began similar journey time prince midenhall restore princess moonbrooke human form transformed dog hargon assault moonbrooke castle reduced ruins trio quest find defeat hargon secure ship allows travel across oceans reach new continents including alefgard dragon quest took place meet grandson dragonlord villain previous game gives party valuable information tells collecting five crests hidden around world party create charm rubiss allowing defeat hargon illusions obtaining charm rubiss party travels hargon castle ice-covered plateau rhone confronts hargon throne room hargon defeated offers malroth demon emerges destroy heroes together three heroes slay malroth return midenhall prince named new king like main games dragon quest series yuji horii wrote story dragon quest ii akira toriyama artwork koichi sugiyama composed music co-creator koichi nakamura chunsoft president directed game half programming planning dragon quest ii began april 1986 month release original dragon quest system memory map decided started development early july beginning development producer yukinobu chida asked director programmer koichi nakamura definite release date offhandedly set one development team divided two groups one designing story well monsters one programming initial deadline set early november game ultimately suffered small delay development team finished programming almost everything time initial release believed game could released end year japanese magazine weekly shōnen jump published november 11 1986 announced game would released late december however developers found game difficult delayed month adjust balance finish final version mid-december rushed deliver nintendo make physical game cartridges game released january 26 1987 developers believed dragon quest one-vs-one combat system tedious simple leveling system boring decided dragon quest ii use party system players controlling multiple characters another game time entitled wizardry players control party six characters directly nakamura saw liked idea wanted something similar due technical restrictions decided use three characters famicom video game system supports display eight sprites side side one game character used two units direction possible three characters talk non-playable character npc yuji horii believed many players would play dragon quest ii without first playing dragon quest thus players search party members development staff discussed idea deprecating stair command predecessor several times nakamura stated cave rhone found game inspired classic trick exit mazes always moving forward sticking right-hand side wall avoid traps story group monsters first thing designed monsters names skills personalities decided first drawn artist akira toriyama yuji horii allowed toriyama paint full drawings rather directly create pixel art would shown game artwork converted computer graphics toriyama unfamiliar computer graphics technology staff took charge many new monsters needed designed make game feel real process laborious toriyama also said compared manga comics used enjoyed painting balance experience positive yuji horii stated process like manga film creators quickly outlines story plot mind regard map design blank map used create physical shape place like castle cave tower key elements story created together afterwards scenarios mainly written friend hiroshi miyaoka compared write lines writing paper design map graph paper staff wrote two 5 mm graph papers a4 felt easy organizing manuscript thickness 15 cm compared predecessor game advanced nearly technological aspects koichi nakamura programmed several students since first time working team n't know delegate work communicate goals since students unfamiliar coding process know debug keep track whose code came nakamura caused delays programming maps first worked characters including numbered characters maps assigned lines designed npc moving route next step programming items final step setting monsters data converting toriyama artwork work completed end october due aforementioned balance issues game initially difficult especially later stages nakamura written program simulated every single combat used adjust game setting character leveling strength enemies players would encounter program failed account larger monster groups however fell outside model caused game difficult enemies leveling weapons power designed area koichi nakamura n't think boat players get boat land might quickly defeated developers realized balance problem modifications limiting number enemies midenhall groups three moving cannock castle closer midenhall castle due lack cartridge space many ideas abandoned development alternate ending lorasia prince assassinated prince cannock sister dies final battle elements later used remakes sequels subplot prince cannock cursed added super famicom remake later remakes also promontory olivia dragon quest iii initially idea dragon quest ii game cartridge rom capacity 1 mbit 10 bytes free space remains final products north american release game dragon warrior ii created enix published 1990 unlike original japanese famicom version used passwords saving nes version used internal battery backup instead record player progress storyline introduction moonbrooke presented exclusively dragon warrior ii japanese original game starts right injured soldier moonbrooke entering midenhall castle seeking help king dialogue american localization often used intentionally archaic english vocabulary among differences japanese version like dragon warrior american version dragon warrior ii censored aspects example used ghost-like sprite instead original defeated character coffin cross sprite koichi sugiyama composed directed music game first album dragon quest ii suite dragon quest ii ~gods evil spirits~ released february 1987 covers ten orchestra version soundtracks twenty-five minute original sound story suite performed tokyo strings ensemble tracks classical jazz august 20 1987 first family classic concert held concert dragon quest dragon quest ii nowiki /nowiki music performed tokyo strings ensemble later october 1987 concert recording released symphonic suite cd title dragon quest concert music dragon quest ii also released piano cd drama cd several symphonic suite albums dragon quest ii nowiki /nowiki musics also collected music compilations like symphonic suite dragon quest best selection vol.1 ~roto~ 1997 dragon quest game music super collection vol 1 – 3 2001–2002 symphonic suite dragon quest complete cd-box 2003 symphonic suite dragon quest scene-separated i~ix 2011 lonely boy background music game name password input interface single anna makino since original dragon quest opened pop song sugiyama decided use song make games stylistically connected music also used japan professional baseball team chiba lotte marines fight song song played wandering fields dragon quest unknown world also played hero area ending theme road journey also ending song related anime dragon quest ii ported msx computers february 1988 ported version many issues like choppy scrolling black-surround characters titles poor graphics along sluggish combat menus msx2 ported version released may 1988 japan december 18 1993 dragon quest ii remade combined dragon quest part dragon quest ii super famicom used dragon quest v nowiki /nowiki engine besides enhanced graphics sound gameplay also improved super famicom remake features improved enemy targeting system enemy defeated character assigned attack perform attack move character attack another enemy rather nothing like famicom version like successors players find stat-improving items pots dressers super famicom remake released japan 1999 dragon quest ii released game boy color game also compatible game boy year later localized america dragon warrior ii remake similar super famicom version 8-bit graphics compared nes version featured better graphics less difficult remake also provided quick-save function allow players save load game anywhere unless reset game boy game boy color localization main characters towns names retranslated similar original japanese names legendary hero erdrick retranslated loto castle name midenhall re-dubbed lorasia original translation lot errors enix changed names help fix dragon quest ii remade japanese ntt docomo brand cell phones 2005 remakes size four times bigger original dragon quest port since phone capacity limited game divided two parts first part pre-installed cell phones second part could downloaded free world map provided pre-installed pdf file 2006 japanese mobile companies brew softbank also started selling game mobile platforms famicom super famicom versions game along dragon quest dragon quest iii re-released dragon quest 25th anniversary collection compilation wii japan september 15 2011 wii compilation featured interruptive save functions games compilation also included original copies strategy guides games along original artwork material games development square enix announced first eight dragon quest titles would re-released android ios japan dragon quest ii based previous cell phone version optimized smartphones released june 26 2014 japan english version released october 9 2014 title dragon quest ii luminaries legendary line square enix registed trademark japan 2013 united states early 2014 several guide books published first published shueisha february 1987 second tokuma shoten july 1987 third game publisher enix 1988 official guide book similar early main games series dragon quest ii novelized adapted game books dragon quest ii novel written hideo takayashiki published 1989 reprinted 1991 2000 dragon quest ii game book series also published 1989 famicom version sold approximately 2.4 million copies japan together super famicom game boy color remakes shipped excess 1.92 million copies worldwide japan mobile version downloaded one million times game included 2011 compilation called dragon quest collection wii sold 403,953 copies dragon quest ii received critical financial success japan readers gave score 28.02 30 named best overall cartridge game year 2006 readers famitsu magazine voted game 17th best video game time game generally known fixing problems found first game including improvements allowing parties three characters larger world better graphics ability carry items noted improvements keys used multiple times new strategic elements introduced larger parties larger groups enemies game music often praised despite limited 8-bit capabilities considered classic rpg genre game regarded praiseworthy japanese reviews highlighted famicom version difficulty stemming issues many traps cave rhone final boss ability cast healall spell led critics calling game difficult dragon quest dragon quest iii released director koichi nakamura said result dragon quest ii received favourable everybody creator side feel half wanted remakes dragon quest ii also successful well received famitsu awarded japanese super famicom remake 35/40 game boy color remake got 30/40 famitsu u.s. version dragon warrior ii received fairly high marks including 8.0 10 ign 9.6 10 gamespot 8 10 nintendo power also received rpgamer game boy color award year 2000 release dragon quest ii also promoted sales original dragon quest success dragon quest ii series became japanese cultural phenomenon sequel dragon quest ii dragon quest iii seeds salvation released 1988 japan serves prequel first two games follows ancestor main characters legendary hero erdrick three games collectively called erdrick saga trilogy also success game boy color remake enix released game boy color dragon warrior iii 2001 based japan-only super famicom update original dragon quest iii world dragon quest ii later used setting game boy advance | [
4023,
2254,
4907
] | Test |
4,261 | 4 | Kerberos_(protocol):kerberos protocol kerberos computer-network authentication protocol works basis tickets allow nodes communicating non-secure network prove identity one another secure manner protocol named character kerberos cerberus greek mythology ferocious three-headed guard dog hades designers aimed primarily client–server model provides mutual authentication—both user server verify identity kerberos protocol messages protected eavesdropping replay attacks kerberos builds symmetric key cryptography requires trusted third party optionally may use public-key cryptography certain phases authentication kerberos uses udp port 88 default massachusetts institute technology mit developed kerberos protect network services provided project athena protocol based earlier needham–schroeder symmetric key protocol several versions protocol exist versions 1–3 occurred internally mit kerberos version 4 primarily designed steve miller clifford neuman published late 1980s version 4 also targeted project athena neuman kohl published version 5 1993 intention overcoming existing limitations security problems version 5 appeared rfc 1510 made obsolete rfc 4120 2005 authorities united states classified kerberos auxiliary military equipment us munitions list banned export used data encryption standard des encryption algorithm 56-bit keys non-us kerberos 4 implementation kth-krb developed royal institute technology sweden made system available outside us us changed cryptography export regulations circa 2000 swedish implementation based limited version called ebones ebones based exported mit bones release stripped encryption functions calls based version kerberos 4 patch-level 9 2005 internet engineering task force ietf kerberos working group updated specifications updates included mit makes implementation kerberos freely available copyright permissions similar used bsd 2007 mit formed kerberos consortium foster continued development founding sponsors include vendors oracle apple inc. google microsoft centrify corporation teamf1 inc. academic institutions royal institute technology sweden stanford university mit vendors cybersafe offering commercially supported versions windows 2000 later versions use kerberos default authentication method microsoft additions kerberos suite protocols documented rfc 3244 microsoft windows 2000 kerberos change password set password protocols rfc 4757 documents microsoft use rc4 cipher microsoft uses extends kerberos protocol use mit software kerberos used preferred authentication method general joining client windows domain means enabling kerberos default protocol authentications client services windows domain domains trust relationships domain contrast either client server joined domain part trusted domain environment windows instead use ntlm authentication client server intranet web applications enforce kerberos authentication method domain joined clients using apis provided sspi many unix unix-like operating systems including freebsd openbsd apple macos red hat enterprise linux oracle solaris ibm aix z/os hp hp-ux openvms others include software kerberos authentication users services embedded implementation kerberos v authentication protocol client agents network services running embedded platforms also available companies client authenticates server forwards username key distribution center kdc kdc issues ticket-granting ticket tgt time stamped encrypts using ticket-granting service tgs secret key returns encrypted result user workstation done infrequently typically user logon tgt expires point although may transparently renewed user session manager logged client needs communicate another node principal kerberos parlance service node client sends tgt tgs usually shares host kdc service must registered tgt service principal name spn client uses spn request access service verifying tgt valid user permitted access requested service tgs issues ticket session keys client client sends ticket service server ss along service request protocol described detail data encryption standard des cipher used combination kerberos longer internet standard weak security vulnerabilities exist many legacy products implement kerberos updated use newer ciphers like aes instead des november 2014 microsoft released patch ms14-068 rectify exploitable vulnerability windows implementation kerberos key distribution center kdc vulnerability purportedly allows users elevate abuse privileges domain level | [
363,
3,
1460,
1464,
2566,
3629,
3293,
6818,
7214,
6489,
7217,
1511,
6501,
5449,
2993,
6894,
5824,
4050,
1186,
840,
5149,
5859,
1593,
5887,
3434,
1625,
900,
5571,
6997,
3794,
5956,
3172,
644,
6717,
1743,
4237,
7451,
7455,
2489,
6045,
604... | Test |
4,262 | 4 | European_Information_Technologies_Certification:european information technologies certification european information technologies certification eitc programme international professional ict knowledge skills certification standard developed governed eitci institute non-profit organization based brussels provides certification individuals knowledge skills narrow specialized single-subject areas ict office software computer-aided project management online collaboration systems raster graphics processing | [] | Test |
4,263 | 5 | Registration_Data_Access_Protocol:registration data access protocol registration data access protocol rdap computer network communications protocol standardized working group internet engineering task force 2015 experimental developments thorough discussions successor whois protocol used look relevant registration data internet resources domain names ip addresses autonomous system numbers whois essentially retrieves free text rdap delivers data standard machine-readable json format order accomplish goal output operative whois servers analyzed taking census labels used rdap designers many members number name registries strove keep protocol simple possible since complexity considered one reasons previous attempts crisp failed rdap based restful web services error codes user identification authentication access control delivered http biggest delay getting rdap done turned bootstrap figuring server top level domain ip range asn range iana agreed host bootstrap information suitable registries publish well-known location urls json format registries started empty gradually populated registrants domains address spaces provide rdap server information iana number registries arin set public rdap service also features bootstrap url similar whois name registries icann requires rdap compliance since 2013 | [
7848,
2043
] | Test |
4,264 | 2 | EmuTOS:emutos emutos replacement tos operating system atari st successors released free software mainly intended used atari emulators clones hatari firebee emutos provides support modern hardware avoids use old proprietary tos usually difficult obtain unlike original tos latest emutos work sometimes limited support atari hardware even amiga computers support features available coldfire cpu ide fat partitions emulators native features support support lacks deprecated os apis though line-a api functions included design emutos lacks support non-documented os features support atari falcon sound matrix dsp support missing vdi supports 1- 2- 4- 8-bit interleaved graphics modes support atari falcon amiga 16-bit resolutions completely missing therefore certain old games demos applications also falcon-specific software may work release 0.9.1 support firebee evaluation boards 256 colours display videl systems xbios dma sound functions emucon2 shell tab completion renaming folders added full-featured desktop included also smallest 192k rom version release 0.9.2 bugfix release 0.9.3 support sd/mmc cards external ide connector poweroff functions firebee platform compactflash used ide media handling fat partition media change detection enhanced fixes improvements emutos-ram booting fvdi compatibility general vdi speed acsi xhdi support see atari tos release 0.9.4 compiled -o2 default better performance except 192k version use less ram add new variant coldfire evaluation boards bas_gcc bios desktop display text files move files/folders control key release 0.9.5 fix issues steem emulator hard disk emulation add alt+arrow mouse emulation pexec mode 7 support dual keyboard support user specify boot partition startup recovery exceptions user programs stack initialization amiga translated text object alignment improvements support line-a functions completed release 0.9.6 fixes real tt hw full vdi support atari tt video resolutions enable midi input add emucon 'mode command support etv_term function many fixes release 0.9.7 support extended mbr partitions monster board eiffel bus coldfire evb apollo core 68080 freemint support non-atari hardware desktop 'install devices 'install icon 'remove desktop icon features standalone version emucon2 | [
1522,
126,
1604,
7848,
1060
] | Test |
4,265 | 3 | Duncan's_Taxonomy:duncan taxonomy duncan taxonomy classification computer architectures proposed ralph duncan 1990 duncan proposed modifications flynn taxonomy include pipelined vector processes taxonomy developed 1988-1990 first published 1990 original categories indicated category includes parallel architectures coordinate concurrent execution lockstep fashion via mechanisms global clocks central control units vector unit controllers subdivision category made primarily basis synchronization mechanism pipelined vector processors characterized pipelined functional units accept sequential stream array vector elements different stages filled pipeline processing different elements vector given time parallelism provided pipelining individual functional units described well operating multiple units kind parallel chaining output one unit another unit input vector architectures stream vector elements functional units special vector registers termed register-to-register architectures feed functional units special memory buffers designated memory-to-memory architectures early examples register-to-register architectures 1960s early 1970s include cray-1 fujitsu vp-200 control data cyber 205 texas instruments advanced scientific computer early examples memory-to-memory vector architectures late 1980s early 1990s saw introduction vector architectures cray y-mp/4 nippon electric corporation sx-3 supported 4-10 vector processors shared memory see nec sx architecture scheme uses simd single instruction stream multiple data stream category flynn taxonomy root class processor array associative memory subclasses simd architectures characterized control unit broadcast common instruction processing elements execute instruction lockstep diverse operands local data common features include ability individual processors disable instruction ability propagate instruction results immediate neighbors interconnection network systolic arrays proposed 1980s multiprocessors data partial results rhythmically pumped processor processor regular local interconnection network systolic architectures use global clock explicit timing delays synchronize data flow processor processor processor systolic system executes invariant sequence instructions data results pulsed neighboring processors based flynn multiple-instruction-multiple-data streams terminology category spans wide spectrum architectures processors execute multiple instruction sequences potentially dissimilar data streams without strict synchronization although instruction data streams different processor need thus mimd architectures run identical programs various stages given time run unique instruction data streams processor execute combination scenarios category subdivided primarily basis memory organization mimd-based paradigms category subsumes systems specific programming execution paradigm least fundamental architectural design structural considerations thus design dataflow architectures reduction machines much product supporting distinctive execution paradigm product connecting processors memories mimd fashion category subdivisions defined paradigms | [
6922
] | Test |
4,266 | 7 | Integrated_Middleware_Platform:integrated middleware platform imp integrated middleware platform external system aiming service logic communication imp receives messages outside translates messages understandable scs way imp isolates external platform enhances communication efficiency safety way imp connect olc server csip server northbound interface | [
5666
] | Test |
4,267 | 7 | Chrome_River_Technologies:chrome river technologies chrome river technologies american software-as-a-service company creates expense reporting supplier invoice automation software mid-size large commercial non profit organizations higher education institutions worldwide founded 2007 alan rich dave terry formerly executives thomson reuters elite los angeles-based company received several awards recognition including rankings inc. 5000 deloitte fast 500 los angeles business journal fast growth company headquartered sag-aftra plaza los angeles miracle mile chrome river co-founded alan rich dave terry 2007 rich originally started software company elite data processing father harvey rich 1988 company specializing similar field financial management systems renamed thomson elite acquired thomson corporation 2003 rich stepped thomson elite february 2007 founding chrome river march year chrome river first released market 2008 initially focusing law firms 2012 chrome river used almost half 100 largest law firms united states company began focus expanding general corporate market 2012 company took us 3 million investment fund expansion chrome river also announced first overseas expansion london 2012 january 2014 company received us 17 million capital bain capital ventures.. june 2015 equity firm great hill partners invested us 100 million company order grow company global presence company using capital accelerate development enterprise mobile technologies continue global expansion 35 million raised company 2018 2016 chrome river announced international expansion launch presence sydney 2018 company launched presence germany 2018 chrome river listed los angeles business journal fastest growing companies list inc. 500/5000 seven times deloitte fast 500 five times chrome river software focuses automating processes around expense reporting supplier invoice processing businesses focusing corporate expense management software offered software service company solution uses optical character recognition data extraction technologies extract categorize data images typically paper receipts html email receipts create line items expense reports chrome river ’ interface web app built using html5 featuring responsive web design rwd allows accessed via mobile web browser without need download mobile app company prosper product integrates company expense data sales data salesforce.com crm solution allowing sales finance teams visualize expense types influence sales managers deploy sales staff based upcoming travel plans company partners number financial institutions including u.s. bank western union business travel software providers including amadeus sabre expedia egencia corporate travel division yatra create solutions streamline process creating processing expenses 2018 analyst firm idc positioned chrome river leader marketscape analysis expense management software vendors chrome river customer base 1,000 organizations 2 million users across 115 countries company predominantly sells global 2000 fortune 500 organizations although also multiple small medium-sized enterprise non-profit customers result company ’ heritage legal industry chrome river used three-quarters amlaw 100 two-thirds global 100 law firms chrome river also 100 customers higher education result partnership education management software provider ellucian notable customers include cargill coca-cola hellenic bosch sabre corporation | [
4089,
7037,
330
] | Validation |
4,268 | 7 | Parallelization_contract:parallelization contract parallelization contract pact programming model generalization mapreduce programming model uses second order functions perform concurrent computations large petabytes data sets parallel similar mapreduce arbitrary user code handed executed pacts however pact generalizes couple mapreduce concepts apache flink open-source parallel data processing platform implemented pacts flink allows users specify user functions annotations parallelization contracts pacts data processing operators data flow therefore pact one data inputs one outputs pact consists two components figure shows components work together input contracts split input data independently processable subset user code called independent subsets calls executed parallel subsets independent optionally user code annotated additional information annotations disclose information behavior black-box user function pact compiler utilize information obtain efficient execution plans however missing annotation change result execution incorrect output contract produces wrong results currently supported input contracts annotation presented discussed following input contracts split input data pact independently processable subsets handed user function pact input contracts vary number data inputs way independent subsets generated formally input contracts second-order functions first-order function user code one input sets none key fields per input parameters first-order function called one multiple times subsets input set since first-order functions side effects call independent calls done parallel second-order functions map reduce mapreduce programming model input contracts context pact programming model map input contract works way mapreduce single input assigns input record subset hence records processed independently see figure \\ reduce input contract semantics reduce function mapreduce single input groups together records identical key fields groups handed whole user code processed see figure pact programming model also support optional combiners e.g partial aggregations \\ cross input contract works two inputs builds cartesian product records inputs element cartesian product pair records handed user code \\ match input contract works two inputs inputs matches records identical key fields come different inputs hence resembles equality join keys inputs attributes join matched pair records handed user code \\ cogroup input contract works two inputs well seen reduce two inputs input records grouped key reduce handed user code contrast match user code also called key one input pair see blue key example contrast mapreduce pact uses generic data model records pact record pass data functions pact record thought tuple free schema interpretation fields record user function key/value pair mapreduce special case record two fields key value input contracts operate keys like //reduce// //match// //cogroup// one specifies combination record fields make key arbitrary combination fields may used see query example programs defining //reduce// //match// contracts one fields written minimally move data fields record may sparsely filled i.e may fields //null// values legal produce record example fields 2 5 set fields 1 3 4 interpreted //null// fields used contract key fields may however null exception raised user code annotation optional pact programming model allow developer make certain behaviors her/his user code explicit optimizer pact optimizer utilize information obtain efficient execution plans however impact correctness result valid annotation attached user code hand invalidly specified annotations might cause computation wrong results following list current set available output contracts **constant fields** annotation marks fields modified user code function note every input record constant field may change content position output record case binary second-order functions cross match cogroup user specify one annotation per input **constant fields except** annotation inverse **constant fields** annotation annotates fields might modified annotated user-function hence optimizer considers **any annotated field constant** annotation used carefully binary second-order functions cross match cogroup one annotation per input defined note either constant fields constant fields except annotation may used input pact programs constructed data flow graphs consist data sources pacts data sinks one data sources read files contain input data generate records files records processed one pacts consisting input contract user code optional code annotations finally results written back output files one data sinks contrast mapreduce programming model pact program arbitrary complex fixed structure \\ figure shows pact program two data sources four pacts one data sink data source reads data specified location file system sources forward data respective pacts map input contracts user code shown figure output map pacts streams pact match input contract last pact reduce input contract forwards result data sink detailed comparison mapreduce pact programming models read paper // mapreduce pact comparing data parallel programming models // see page | [
6387,
7924
] | Test |
4,269 | 2 | Driver_Verifier:driver verifier driver verifier tool included microsoft windows replaces default operating system subroutines ones specifically developed catch device driver bugs enabled monitors stresses drivers detect illegal function calls actions may causing system corruption acts within kernel mode target specific device drivers continual checking make driver verifier functionality multithreaded several device drivers stressed time simulate certain conditions low memory i/o verification pool tracking irql checking deadlock detection dma checks irp logging etc verifier works forcing drivers work minimal resources making potential errors might happen rarely working system manifest immediately typically fatal system errors generated stressed drivers test environment producing core dumps analysed debugged immediately without stressing intermittent faults would occur field without proper troubleshooting facilities personnel driver verifier verifier.exe first introduced command-line utility windows 2000 windows xp gained easy-to-use graphical user interface called driver verifier manager makes possible enable standard custom set settings select drivers test verify new windows version since introduced several new stringent checks testing verifying drivers detecting new classes driver defects driver verifier normally used machines used productive work cause undetected relatively harmless errors drivers manifest especially ones digitally signed windows hardware quality labs causing blue screen fatal system errors also causes resource-starved drivers underperform slow general operation constraints imposed verifier reversed debugging microsoft recommends verifying drivers time | [
7879,
3937,
3263,
378,
2198,
6096,
1475,
3298,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
435,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
6558,
... | Test |
4,270 | 3 | SigmaTel_STMP3700:sigmatel stmp3700 sigmatel stmp3700 low power system chip made pmp portable media players stmp3700 using single arm processor core clocked maximum 300 mhz system chip developed 2007 use portable media players supports playing video qvga decoding various media formats used creative zen 2007 creative zen x-fi 2008 stmp378x supports vga resolutions 640×480 higher clock frequencies video hardware assist sony walkman models using product line include salsa newton freed appeared ces 2009 see freescale stmp3700 series site info | [] | Test |
4,271 | 3 | INT_13H:int 13h int 13h shorthand bios interrupt call 13 20th interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides sector-based hard disk floppy disk read write services using cylinder-head-sector chs addressing int x86 instruction triggers software interrupt 13 interrupt number hexadecimal value called modern computers come bios int 0x13 uefi functionality provides services exception uefi class 3 completely removes csm thus lacks int 13h interrupts typically uefi drivers use lba-addressing instead chs-addressing real mode operating systems dos calling int 13h would jump computer rom-bios code low-level disk services would carry physical sector-based disk read write operations program dos serves low-level interface built-in block device drivers hard disks floppy disks allows int 25h int 26h provide absolute disk read/write functions logical sectors fat file system driver dos kernel handles file-related requests dos api int 21h functions protected mode operating systems microsoft windows nt derivatives e.g nt4 2000 xp server 2003 linux dosemu os intercepts call passes operating system native disk i/o mechanism windows 9x windows workgroups 3.11 also bypass bios routines using 32-bit file access original bios real-mode int 13h interface supports drives sizes 504 mb using commonly referred physical chs addressing limit originates hardware interface ibm pc/xt disk hardware bios used cylinder-head-sector chs address given int 13h call transferred directly hardware interface interface later extended support addressing exactly 8064 mb using commonly referred logical chs addressing limit originates combination register value based calling convention used int 13h interface goal maintaining backward compatibility originally number bioses offered incompatible versions interface eventually computer industry standardized interface developed microid research mr bios 1989 limit uses 1024 cylinders 256 heads 63 sectors 512 byte blocks allowing exactly 7.875 gib addressing 1024 256 63 512 bytes support even larger addressing modes interface known int 13h extensions introduced western digital phoenix technologies part bios enhanced disk drive services edd uses 64-bit logical block addressing lba allows addressing 8 zib drive also support 28-bit 48-bit lba allows 128 gib 128 pib respectively assuming 512-byte sector/block size packet interface uses pointer packet information rather register based calling convention original int 13h interface packet data structure contains interface version data size lbas versions ms-dos including ms-dos 7 windows 95 bug prevents booting disk drives 256 heads register value 0xff many modern bioses provide mappings 255 0xfe heads thus reducing total addressable space exactly 8032.5 mib approx 7.844 gib cache drivers flush buffers detecting dos bypassed directly issuing int 13h applications dummy read used one several methods force cache flushing unknown caches e.g rebooting ami bioses around 1990–1991 trash word unaligned buffers dos tsr programs clobber interrupt enabling registers pc dos ms-dos install filters prevent award bios ami 386sx bios extended handle 1024 cylinders placing bits 10 11 cylinder number bits 6 7 dh second column empty function may used floppy hard disk bit 7=0 floppy drive bit 7=1 fixed drive register cx contains cylinder number 10 bits possible values 0 1023 sector number 6 bits possible values 1 63 cylinder sector bits numbered examples translation addressing buffer guarantee complete buffer inside given segment i.e codice_1 otherwise interrupt may fail bios hardware versions assume want read 16 sectors 2000h bytes buffer starts memory address 4ff00h utilizing memory segmentation different ways calculate register values e.g function 02h interrupt 13h may read sectors first 16,450,560 sectors hard drive read sectors beyond 8 gb limit use function 42h extensions another alternate may dos interrupt 25h reads sectors within partition difference function function 02h see function 0ah reads 516 bytes per sector instead 512 last 4 bytes contains error correction code ecc checksum sector data physical chs values function 48h may/should differ logical values function 08h | [
276,
1052,
6380,
6823,
4061,
352,
3221,
578,
3137,
3903,
858
] | Test |
4,272 | 3 | Full_Throttle_(1984_video_game):full throttle 1984 video game full throttle video game released 1984 zx spectrum msx player races 500cc grand prix motorcycle ten world top racing circuits selecting track race player starts back grid 39 bikes cornering quickly cause skid running road slow bike making contact another rider forces bike halt allowing following riders stream past player bike gets going ten circuits game part key winning know circuit well enough predict bends practice mode player rides round track without riders player choose race one five laps best position achieved shown bottom menu-screen along player time ahead second-place man soon track number laps changed record reset game written mervyn estcourt creator 3d deathchase reviews positive crash giving 91 crash smash spectrum rating 4/5 computer video games sinclair user rating 8/10 | [] | Validation |
4,273 | 8 | Mod_qos:mod qos mod_qos quality service qos module apache http server implementing control mechanisms provide different priority different requests web server serve limited number concurrent requests qos used ensure important resources stay available high server load mod_qos used reject requests unimportant resources granting access important applications also possible disable access restrictions example requests important resources important users control mechanisms available following levels module useful used reverse proxy order divide resources different webserver first use case shows mod_qos avoid service outage web server due slow responses single application case application /ccc slow requests wait timeout occurs due many waiting requests web server runs free tcp connections able process requests application /aaa /bbb mod_qos limits concurrent requests application order assure availability resources keep-alive extension http 1.1 allows persistent tcp connections multiple request/responses accelerates access web server due less optimised network traffic disadvantage persistent connections server resources blocked even though data exchanged client server mod_qos allows server support keep-alive long sufficient connections free stopping keep-alive support defined connection threshold reached single client may open many simultaneous tcp connections order download different content web server client gets many connections users may able access server since free connections remain mod_qos limit number concurrent connections single ip source address limit number requests url mod_qos help mod_qos limits maximum number requests per second url module may also control bandwidth simply specify maximum allowed bandwidth moq_qos starts throttling becomes necessary mod_qos may help protect apache web server low-bandwidth dos attacks enforcing minimum upload/download throughput client must generate initial release mod_qos created may 2007 published sourceforge.net open source software project able limit number concurrent http requests specified resources path portion request urls web server features added useful protect apache servers dos attacks 2012 mod_qos included ubuntu linux distribution major releases | [
2086,
1691,
3915,
5571,
1435
] | Validation |
4,274 | 1 | Partition_(database):partition database partition division logical database constituent elements distinct independent parts database partitioning normally done manageability performance availability reasons load balancing popular application partitioning distributed database management system partition may spread multiple nodes users node perform local transactions partition increases performance sites regular transactions involving certain views data whilst maintaining availability security current high end relational database management systems provide different criteria split database take partitioning key assign partition based certain criteria common criteria partitioning done either building separate smaller databases tables indices transaction logs splitting selected elements example one table horizontal partitioning involves putting different rows different tables example customers zip codes less 50000 stored customerseast customers zip codes greater equal 50000 stored customerswest two partition tables customerseast customerswest view union might created provide complete view customers vertical partitioning involves creating tables fewer columns using additional tables store remaining columns normalization also involves splitting columns across tables vertical partitioning goes beyond partitions columns even already normalized different physical storage might used realize vertical partitioning well storing infrequently used wide columns different device example method vertical partitioning done explicitly implicitly type partitioning called row splitting row split columns common form vertical partitioning split dynamic data slow find static data fast find table dynamic data used often static creating view across two newly created tables restores original table performance penalty however performance increase accessing static data e.g statistical analysis taken ultimate end results something like columnar database | [
5717,
7963,
1449,
7248,
3268,
5209,
1730,
3951,
3776,
6345,
7067,
7715,
3005,
6430,
8079,
1003,
3011,
4950,
6543,
6817,
2124,
927,
4798,
6462,
1861,
7924,
6128,
2054,
7022,
5419,
7205,
684,
5956,
517,
1132,
7213,
7303,
6144,
1891,
4457,
... | Test |
4,275 | 6 | Filename_mangling:filename mangling process filename mangling computing involves translation file name compatibility operating system level occurs filename filesystem appears form incompatible operating system accessing mangling occurs example computer networks windows machine attempts access file unix server file filename includes characters valid windows common example name mangling occurs vfat file systems versions windows windows 95 onwards vfat specification allows long file names lfns backwards-compatibility ms-dos older windows software recognizes filenames maximum 11 characters length 8.3 format i.e eight-letter filename dot three-letter extension codice_1 files lfns get stored disk 8.3 format codice_2 becoming codice_3 long file name stored elsewhere disk normally using compatible windows programs use standard windows methods reading disk i/o subsystem returns long filename program — however old dos application old windows application tries address file use older 8.3-only apis work lower level perform disk access results return 8.3 filename case filenames become mangled taking first six non-space characters filename adding tilde number ensure uniqueness 8.3 filename disk mangling scheme turn example codice_4 codice_5 technique persists today people use dosbox play classic dos games use windows 3.1 conjunction play win16 games 64-bit windows unix file names contain colons backslashes whereas windows interprets characters ways accordingly software could mangle unix file notes 11\04\03 notes_ 11-04-03 enable windows software remotely access file unix-like systems samba unix use different mangling systems map long filenames dos-compatible filenames although samba administrators configure behavior config file macos finder displays instances file directory names classic mac os used character internally path separator listing files directories using terminal emulator displays rather character though | [
1710,
2361,
3843,
4759,
6264,
4771,
3626,
5571,
1281,
1198,
6640,
405,
6380,
4438,
4174,
1047,
6857,
2528
] | Validation |
4,276 | 8 | JSON-RPC:json-rpc json-rpc remote procedure call protocol encoded json simple protocol similar xml-rpc defining data types commands json-rpc allows notifications data sent server require response multiple calls sent server may answered order json-rpc works sending request server implementing protocol client case typically software intending call single method remote system multiple input parameters passed remote method array object whereas method return multiple output data well depends implemented version transfer types single objects serialized using json request call specific method provided remote system must contain three certain properties receiver request must reply valid response received requests response must contain properties mentioned since situations response needed even desired notifications introduced notification similar request except id needed response returned case codice_3 property omitted version 2.0 codice_8 version 1.0 examples codice_9 denotes data sent service request codice_10 denotes data coming service although codice_10 often called response client–server computing depending json-rpc version necessarily imply answer request request response notification response request response request response category json category web services category remote procedure call | [
7763,
562,
6986,
7315,
4131,
2715
] | Test |
4,277 | 3 | IBM_PC_compatible:ibm pc compatible ibm pc compatible computers computers similar original ibm pc xt able use software expansion cards computers referred pc clones ibm clones duplicate almost exactly significant features pc architecture facilitated ibm choice commodity hardware components various manufacturers ability reverse engineer bios firmware using clean room design technique columbia data products built first clone ibm personal computer clean room implementation bios early ibm pc compatibles used computer bus original pc models ibm compatible bus later named industry standard architecture isa bus manufacturers compatible computers term ibm pc compatible historical description since ibm ended personal computer sales descendants ibm pc compatibles comprise majority personal computers market presently dominant operating system microsoft windows although interoperability bus structure peripherals original pc architecture may limited non-existent computers ran ms-dos enough hardware differences ibm compatible software could used examples include slight differences memory map serial ports video hardware macintosh kept significant market share without compatibility ibm pc ibm decided 1980 market low-cost single-user computer quickly possible 12 august 1981 first ibm pc went sale three operating systems os available least expensive popular pc dos made microsoft crucial concession ibm agreement allowed microsoft sell version ms-dos non-ibm computers component original pc architecture exclusive ibm bios basic input/output system ibm first asked developers avoid writing software addressed computer hardware directly instead make standard calls bios functions carried hardware-dependent operations software would run machine using ms-dos pc-dos software directly addressed hardware instead making standard calls faster however particularly relevant games software addressing ibm pc hardware way would run ms-dos machines different hardware ibm pc sold high enough volumes justify writing software specifically encouraged manufacturers produce machines could use programs expansion cards peripherals pc 808x computer marketplace rapidly excluded machines hardware- software-compatible pc 640 kb barrier conventional system memory available ms-dos legacy period non-clone machines subject limit could exceed 640 kb rumors lookalike compatible computers created without ibm approval began almost immediately ibm pc release infoworld wrote first anniversary ibm pc june 1983 pc magazine defined pc 'clone computer accommodate user takes disk home ibm pc walks across room plugs 'foreign machine shortage ibm pcs year many customers purchased clones instead columbia data products produced first computer less compatible ibm pc standard june 1982 soon followed eagle computer compaq announced first ibm pc compatible november 1982 compaq portable compaq first sewing machine-sized portable computer essentially 100 pc-compatible company could copy bios directly result court decision apple v. franklin could reverse-engineer ibm bios write bios using clean room design time many manufacturers tandy/radioshack xerox hewlett-packard digital equipment corporation sanyo texas instruments tulip wang olivetti introduced personal computers supported ms-dos completely software- hardware-compatible ibm pc tandy described tandy 2000 example 'next generation true 16-bit cpu speed disk storage expansion ibm pc ms-dos computers admitting 1984 many ms-dos programs support computer company stated popular sophisticated software market available either immediately next six months like ibm microsoft intention application writers would write application programming interfaces ms-dos firmware bios would form would termed hardware abstraction layer computer would original equipment manufacturer oem version ms-dos customized hardware software written ms-dos would operate ms-dos computer despite variations hardware design expectation seemed reasonable computer marketplace time microsoft based primarily computer languages basic established small system operating software cp/m digital research use hobbyist level professional using microcomputers achieve widespread use thus make product viable economically os operate across range machines different vendors widely varying hardware customers needed applications starter programs could reasonably expect publishers offer products variety computers suitable media microsoft competing os intended initially operate similar varied spectrum hardware although based 8086 processor thus ms-dos several years sold oem product microsoft-branded ms-dos ms-dos could purchased directly microsoft oem release packaged trade dress given pc vendor malfunctions reported oem microsoft however machines compatible ibm hardware—thus supporting direct calls hardware—became widespread soon became clear oem versions ms-dos virtually identical except perhaps provision utility programs ms-dos provided adequate functionality character-oriented applications could implemented text-only terminal bulk commercially important software nature low-level hardware compatibility might mattered however order provide maximum performance leverage hardware features work around hardware bugs pc applications quickly developed beyond simple terminal applications ms-dos supported directly spreadsheets wysiwyg word processors presentation software remote communication software established new markets exploited pc strengths required capabilities beyond ms-dos provided thus early development ms-dos software environment many significant commercial software products written directly hardware variety reasons may 1983 future computing defined four levels compatibility development compaq engineers found microsoft flight simulator would run sublogic bruce artwick described bug one intel chips forcing make new computer bug compatible ibm pc first clones compaq offered truly full compatibility jerry pournelle purchased ibm pc mid-1983 rotten keyboard four cubic feet unevaluated software much wo n't run anything ibm pc although lot machines claim 100 percent ibm pc compatible 've yet one arrive ... alas lot stuff n't run eagle z-100 compupro anything else around columbia university reported january 1984 kermit ran without modification compaq columbia data products clones eagle seequa ms-dos computers also required custom code many companies reluctant products pc compatibility tested pc magazine requested samples computer manufacturers claimed produce compatibles april 1984 review 14 31 declined corona data systems specified systems run software conforms ibm pc programming standards popular software byte journalist asked test peachtext spring 1983 comdex corona representatives hemmed hawed bit finally led ... corner one would see fail magazine reported hesitancy unnecessary disk booted without problem zenith data systems bolder bragging z-150 ran applications people brought test 1984 west coast computer faire creative computing 1985 stated reiterate standard line regarding ibm pc compatibles try package want use buy computer companies modified computers bios work newly discovered incompatible applications reviewers users developed stress tests measure compatibility 1984 ability operate lotus 1-2-3 flight simulator became standard compatibles specifically designed run ibm believed companies eagle corona handwell infringed copyright apple computer inc. v. franklin computer corp. successfully forced clone makers stop using bios phoenix bios 1984 however similar products ami bios permitted computer makers legally build essentially 100 -compatible clones without reverse-engineer pc bios september 1985 infoworld chart listed seven compatibles 256 kb ram two disk drives monochrome monitors 1,495 2,320 equivalent ibm pc cost 2,820 1986 compute stated clones generally reliable 99 percent compatible february 1984 byte wrote ibm burgeoning influence pc community stifling innovation many companies mimicking big blue market grew ibm influence diminished november 1985 pc magazine stated created pc market market n't necessarily need ibm machines may depend ibm set standards develop higher-performance machines ibm better conform existing standards hurt users january 1987 bruce webster wrote byte rumors ibm would introduce proprietary personal computers proprietary operating system cares ibm likely isolate largest marketplace really ca n't compete anymore anyway magazine predicted 1987 market complete transition ibm standard intel/ms-dos/expansion bus standard ... folks n't much concerned ibm compatibility lotus 1-2-3 compatibility 1992 macworld stated clones ibm lost control market became minor player technology ibm announced os/2-oriented ps/2 line early 1987 sales existing dos-compatible pc compatibles rose part proprietary operating system available 1988 gartner group estimated public purchased 1.5 clones every ibm pc 1989 compaq influential industry executives spoke compaq compatible observers stating customers saw company ibm equal 1987 ibm pc compatibles dominated home business markets commodity computers notable alternative architectures used niche markets like macintosh computers offered apple inc. used mainly desktop publishing time aging 8-bit commodore 64 selling 150 time became world best-selling computer 32-bit commodore amiga line used television video production 32-bit atari st used music industry however ibm lost main role market ibm pc compatibles 1990 events retrospect important despite popularity thinkpad set laptop pc ibm finally relinquished role consumer pc manufacturer april 2005 sold laptop desktop pc divisions lenovo us 1.75 billion october 2007 hewlett-packard dell largest shares pc market north america also successful overseas acer lenovo toshiba also notable worldwide huge number pcs white box systems assembled myriad local systems builders despite advances computer technology current ibm pc compatibles remain much compatible original ibm pc computers although components implement compatibility special backward compatibility modes used system boot often practical run old software modern system using emulator rather relying features 2014 lenovo acquired ibm x86-based server business us 2.1 billion one strengths pc compatible design modular hardware design end-users could readily upgrade peripherals degree processor memory without modifying computer motherboard replacing whole computer case many microcomputers time however processor speed memory width increased limits original xt/at bus design soon reached particularly driving graphics video cards ibm introduce upgraded bus ibm ps/2 computer overcame many technical limits xt/at bus rarely used basis ibm compatible computers since required licence payments ibm ps/2 bus prior at-bus designs produced company seeking license unpopular hardware manufacturers several competing bus standards developed consortiums agreeable license terms various attempts standardize interfaces made practice many attempts either flawed ignored even many expansion options despite confusion users pc compatible design advanced much faster competing designs time even market dominance 1990s ibm influence pc architecture started decline ibm-brand pc became exception rather rule instead placing importance compatibility ibm pc vendors began emphasize compatibility windows 1993 version windows nt released could operate processors x86 set required applications recompiled developers hardware independence used silicon graphics sgi x86 workstations–thanks nt hardware abstraction layer hal could operate nt vast application library mass-market personal computer hardware vendor dared incompatible latest version windows microsoft annual winhec conferences provided setting microsoft could lobby for—and cases dictate—the pace direction hardware pc industry microsoft intel become important ongoing development pc hardware industry writers began using word wintel refer combined hardware-software system terminology becoming misnomer intel lost absolute control direction x86 hardware development amd amd64 also non-windows operating systems like macos linux established presence x86 architecture although ibm pc designed expandability designers could anticipate hardware developments 1980s size industry would engender make things worse ibm choice intel 8088 cpu introduced several limitations developing software pc compatible platform example 8088 processor 20-bit memory addressing space expand pc beyond one megabyte lotus intel microsoft jointly created expanded memory ems bank-switching scheme allow memory provided add-in hardware accessed set four 16-kilobyte windows inside 20-bit addressing later intel cpus larger address spaces could directly address 16- megabytes mibs 80286 causing microsoft develop extended memory xms require additional hardware expanded extended memory incompatible interfaces anyone writing software used one megabyte provide systems greatest compatibility ms-dos began including emm386 simulated ems memory using xms memory protected mode os also written 80286 dos application compatibility difficult expected dos applications accessed hardware directly bypassing bios routines intended ensure compatibility also bios requests made first 32 interrupt vectors marked reserved protected mode processor exceptions intel video cards suffered incompatibilities standard interface using higher-resolution svga graphics modes supported later video cards manufacturer developed methods accessing screen memory including different mode numberings different bank switching arrangements latter used address large images within single 64kb segment memory previously vga standard used planar video memory arrangements effect easily extend greater colour depths higher resolutions offered svga adapters attempt creating standard named vesa bios extensions vbe made manufacturers used 386 introduced protected mode os could written time dos compatibility much easier virtual 8086 mode unfortunately programs could switch directly eventually new memory-model apis developed vcpi dpmi latter becoming popular great number third-party adapters standard programming pc could difficult professional developers would operate large test-suite various known-to-be-popular hardware combinations meanwhile consumers overwhelmed competing incompatible standards many different combinations hardware offer give idea sort pc would need operate software multimedia pc mpc standard set 1990 pc met minimum mpc standard could marketed mpc logo giving consumers easy-to-understand specification look software could operate minimally mpc-compliant pc would guaranteed operate mpc mpc level 2 mpc level 3 standards set later term mpc compliant never became popular mpc level 3 1996 mpc standards established late 1990s success microsoft windows driven rival commercial operating systems near-extinction ensured “ ibm pc compatible ” computer dominant computing platform meant developer made software wintel platform would still able reach vast majority computer users late 1980s major competitor windows percentage points market share apple inc. macintosh mac started billed computer rest us mac high prices closed architecture meant dos/windows onslaught quickly drove macintosh education desktop publishing niche emerged mid-2000s mid-1990s mac market share dwindled around 5 introducing new rival operating system become risky commercial venture experience shown even operating system technically superior windows would failure market beos os/2 example 1989 steve jobs said new next system either last new hardware platform succeed first fail four years later 1993 next announced ending production nextcube porting nextstep intel processors early pc history companies introduced xt-compatible chipsets example chips technologies introduced 82c100 xt controller integrated replaced six original xt circuits one 8237 dma controller one 8253 interrupt timer one 8255 parallel interface controller one 8259 interrupt controller one 8284 clock generator one 8288 bus controller similar non-intel chipsets appeared at-compatibles example opti 82c206 82c495xlc found many 486 early pentium systems x86 chipset market volatile though 1993 vlsi technology become dominant market player virtually wiped intel year later intel uncontested leader ever since wintel platform gained dominance intel gradually abandoned practice licensing technologies chipset makers 2010 intel involved litigation related refusal license processor bus related technologies companies like nvidia companies amd cyrix developed alternative cpus functionally compatible intel towards end 1990s amd taking increasing share cpu market pcs amd even ended playing significant role directing development x86 platform athlon line processors continued develop classic x86 architecture intel deviated netburst architecture pentium 4 cpus ia-64 architecture itanium set server cpus amd developed amd64 first major extension created intel intel later adopted x86-64 2006 intel began abandoning netburst release set core processors represented development earlier pentium iii major alternative wintel domination rise alternative operating systems since early 2000s marked start post-pc era term ibm pc compatible commonly used presently current mainstream desktop laptop computers based pc architecture ibm longer makes pcs competing hardware architectures either discontinued like amiga relegated niche enthusiast markets past successful exception apple macintosh platform used non-intel processors inception although macintosh initially based motorola 68000 family transitioned powerpc architecture macintosh computers transitioned intel processors beginning 2006 today macintosh computers share system architecture wintel counterparts boot microsoft windows without dos compatibility card processor speed memory capacity modern pcs many orders magnitude greater original ibm pc yet backwards compatibility largely maintained 32-bit operating system still operate many simpler programs written os early 1980s without needing emulator though emulator like dosbox near-native functionality full speed additionally many modern pcs still run dos directly although special options usb legacy mode sata-to-pata emulation may need set bios setup utility computers using extensible firmware interface might need set legacy bios mode able boot dos however bios/efi options mass-produced consumer-grade computers limited configured truly handle oses original variants dos recent spread x86-64 architecture distanced current computers operating systems internal similarity original ibm pc introducing yet another processor mode instruction set modified 64-bit addressing x86-64 capable processors also retain standard x86 compatibility | [
4291,
4658,
4293,
7512,
7520,
5023,
7172,
3275,
5380,
1094,
732,
6813,
396,
2932,
5401,
3303,
4341,
7197,
410,
1119,
5421,
2243,
5777,
3324,
7212,
74,
5784,
1508,
5088,
7228,
443,
2978,
1150,
5450,
447,
6159,
2983,
3346,
797,
5101,
4759... | Test |
4,278 | 1 | Spatiotemporal_database:spatiotemporal database spatiotemporal database database manages space time information common examples include spatiotemporal databases extension spatial databases spatiotemporal database embodies spatial temporal spatiotemporal database concepts captures spatial temporal aspects data deals although exist numerous relational databases spatial extensions spatiotemporal databases based relational model practical reasons chiefly among data multi-dimensional capturing complex structures behaviours 2008 rdbms products spatiotemporal extensions products open-source terralib use middleware approach storing data relational database unlike pure spatial domain however official de facto standards spatio-temporal data models querying general theory area also less well-developed another approach constraint database system mlpq management linear programming queries geomesa open-source distributed spatiotemporal index built top bigtable-style databases using implementation z-order_curve create multi-dimensional index combining space time | [
1998,
6462,
367,
5455,
1768,
8013,
1848,
2054,
5641,
5666
] | Test |
4,279 | 9 | GameMonkey_Script:gamemonkey script gamemonkey script small cross-platform scripting language designed embedding games gamemonkey bears many similarities lua except syntax similar c. gamemonkey script written 2002 matthew riek greg douglas part closed-source project auran development however 12 june 2003 auran granted license full source code gamemonkey released public mit license currently used commercial hobby applications wide range machines windows pc apple mac microsoft xbox sony playstation 2 playstation 3 nintendo gamecube nintendo ds nintendo wii various distributions linux like lua primary data structure gamemonkey script table tables allow variety data structures created arrays sets hashmaps lists records also used simulate namespaces c++ class structures containing functions properties | [
1616,
3368,
3915,
1435
] | Validation |
4,280 | 2 | IPython:ipython ipython interactive python command shell interactive computing multiple programming languages originally developed python programming language offers introspection rich media shell syntax tab completion history ipython provides following features ipython based architecture provides parallel distributed computing ipython enables parallel applications developed executed debugged monitored interactively hence interactive ipython architecture abstracts parallelism enabling ipython support many different styles parallelism including release ipython 4.0 parallel computing capabilities made optional released ipyparallel python package ipython frequently draws scipy stack libraries like numpy scipy often installed alongside one many scientific python distributions ipython provides integration libraries scipy stack notably matplotlib producing inline graphs used jupyter notebook python libraries implement ipython specific hooks customize rich object display sympy example implements rendering mathematical expressions rendered latex used within ipython context ipython allows non-blocking interaction tkinter pygtk pyqt/pyside wxpython standard python shell allows interaction tkinter ipython interactively manage parallel computing clusters using asynchronous status callbacks and/or mpi ipython also used system shell replacement default behavior largely similar unix shells allows customization flexibility executing code live python environment using ipython shell replacement less common recommended use xonsh provide ipython feature better shell integrations ipython 5.x long time support series last version ipython support python 2 ipython project pledged support python 2 beyond 2020 one first projects join python 3 statement 6.x series compatible python 3 still possible though run ipython kernel jupyter notebook server different python versions allowing user still access python 2 newer version jupyter 2014 fernando pérez announced spin-off project ipython called project jupyter ipython continued exist python shell kernel jupyter notebook interface language-agnostic parts ipython moved jupyter name jupyter language agnostic name reference core programming languages supported jupyter julia python r. jupyter notebook formerly ipython notebooks web-based interactive computational environment creating executing visualizing jupyter notebooks similar notebook interface programs maple mathematica sagemath computational interface style originated mathematica 1980s supports execution environments aka kernels dozens languages default jupyter notebook ships ipython kernel 100 jupyter kernels may 2018 ipython mentioned popular computing press popular media presence scientific conferences scientific engineering work often presented companion tool matplotlib beginning 1 january 2013 alfred p. sloan foundation announced would support ipython development two years 23 march 2013 fernando perez awarded free software foundation advancement free software award ipython august 2013 microsoft made donation 100,000 sponsor ipython ’ continued development january 2014 jolt productivity award dr. dobb category coding tools july 2015 project funding 6 million gordon betty moore foundation alfred p. sloan foundation leona m. harry b. helmsley charitable trust may 2018 awarded 2017 acm software system award largest team award | [
5363,
1524,
2451,
3410,
4070,
5965,
3915,
5571,
7848,
6221,
5116,
4705
] | Test |
4,281 | 0 | ELAN_software:elan software elan computer software professional tool manually semi-automatically annotate transcribe audio video recordings tier-based data model supports multi-level multi-participant annotation time-based media applied humanities social sciences research language documentation sign language gesture research purpose documentation qualitative quantitative analysis distributed free open source software gnu general public license version 3 elan well established professional-grade software widely used academia well received several academic disciplines example psychology medicine psychiatry education behavioral studies topics human computer interaction sign language conversation analysis group interactions music therapy bilingualism child language acquisition analysis non-verbal communication gesture analysis animal behavior several third-party tools developed enrich analyse elan data corpora features include elan developed max planck institute psycholinguistics nijmegen first version released around year 2000 name eat eudico annotation tool renamed elan 2002 since two three new versions released year developed programming language java interfaces platform native media frameworks developed c c++ objective-c | [
4759,
5571,
578,
1435
] | Test |
4,282 | 9 | Praspel:praspel praspel php realistic annotation specification language formal specification language php based design-by-contract paradigm uses preconditions postconditions invariants etc specifications written comments php code always accessible praspel used manual automatic software validation verification thanks realistic domains | [
6507,
6029,
6489,
8137,
5571
] | Test |
4,283 | 2 | Chgrp:chgrp chgrp change group command may used unprivileged users unix-like systems change group associated file system object file directory link one member file system object 3 sets access permissions one set owner one set group one set others changing group object could used change users write file codice_1 chgrp name_of_group_to_change file_name -r recurse subdirectories -v verbosely output names objects changed useful fso list -f force forge ahead objects even error encountered command changes group associated file prog.conf wheel staff provided executing user member group could used allow members staff modify configuration programs prog prox | [
361,
6789,
2817,
366,
3685,
4387,
4662,
8165,
3085,
1537,
2834,
1837,
5480,
3106,
5571,
923,
5933,
5138,
1389,
667,
1572,
5942,
6648,
3984,
2589,
5946,
1213,
7667,
4447,
6050,
7494,
6242,
7868,
3417,
3587,
5789,
6062,
6404,
4020
] | Test |
4,284 | 5 | Harvest_project:harvest project harvest darpa funded research project internet research task force research group resource discovery ietf-rd hosted university colorado boulder provided web cache developed standards internet cache protocol summary object interchange format spawned many technologies software products conclusion project 1996 development harvest object cache continued university edinburgh releasing version 1.5 open source squid cache commercial netcache based harvest object cache | [
4596,
4828,
84
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.